
Independent Security Evaluators
Security specialists that provide custom services including security assessments and software development. ISE also runs IoT Village, which hosts talks by expert security researchers and hacking contests.

ISE
Independent Security Evaluators https://blog.securityevaluators.com/

Drew Branch
Security Analyst, Independent Security Evaluators

Sam Levin
Associate Developer, Independent Security Evaluators

Joshua Meyer
Security Analyst at Independent Security Evaluators
Latest Posts

Reading Hackable Without a Background in Security
Reading Hackable Without a Background in Security
Social Psychology: Discovering the Weakest Link
In cybersecurity, humans are often considered to be the weakest link in the chain. When IT topics come to mind, the importance of…

Creating AV Resistant Malware — Part 1
Recently, I have been preparing for my eCTPXv2 certification from eLearnSecurity. The certification course covers a lot of advanced topics…

Creating AV Resistant Malware — Part 2
In part two of this series we’re going to be creating the AV destroyer part of our malware! It will be based off of Rasta-mouse’s…

Creating AV Resistant Malware — Part 3
In part 3 of this series we will be covering creating another malicious DLL that we will load into memory using PowerShell’s reflection…

Creating AV Resistant Malware — Part 4
The final part of this blog series will be a short tutorial of how to use your new tools and how to tie it all together to get a reverse…

Independent Security Evaluators
We are ethical hackers, computer scientists, reverse engineers, cryptographers, software developers, penetration testers, and consultants.

Reverse Engineering Bumble’s API
When you have too much time on your hands & want to dump out Bumble’s entire user base and bypass paying for premium Bumble Boost features.

User Information Disclosure in Dating Apps
Extracting user data from mobile apps to craft exploits.

We Went Virtual, What Did You Do This Summer?
COVID-19 has changed the world in more ways than one. Prior to 2020, we had never considered the possibility of making our content virtual…
Reviews
Login to submit your review.