![](https://cdn-images-1.medium.com/fit/c/300/300/1*zlPb8cRt0y45p5s2efL2uw.png)
Independent Security Evaluators
Security specialists that provide custom services including security assessments and software development. ISE also runs IoT Village, which hosts talks by expert security researchers and hacking contests.
![](https://cdn-images-1.medium.com/fit/c/300/300/1*ObdDy0A6pBIigsOvV6SY9Q.png)
ISE
Independent Security Evaluators https://blog.securityevaluators.com/
![](https://cdn-images-1.medium.com/fit/c/300/300/1*ZosNybtMiWGGo8nMaE7TQw.jpeg)
Drew Branch
Security Analyst, Independent Security Evaluators
![](https://cdn-images-1.medium.com/fit/c/300/300/1*rKRIc23OvvzCWxVui6dlNw.jpeg)
Sam Levin
Associate Developer, Independent Security Evaluators
![](https://cdn-images-1.medium.com/fit/c/300/300/2*6d-dcjQ9goKYRtXwRh4FUA.jpeg)
Joshua Meyer
Security Analyst at Independent Security Evaluators
Latest Posts
![](https://cdn-images-1.medium.com/fit/c/400/300/1*zqODLPwWwL5t8BoJywgK7A.jpeg)
Reading Hackable Without a Background in Security
Reading Hackable Without a Background in Security
Social Psychology: Discovering the Weakest Link
In cybersecurity, humans are often considered to be the weakest link in the chain. When IT topics come to mind, the importance of…
![](https://cdn-images-1.medium.com/fit/c/400/300/1*pPr87eMYM_clI_ggcfxoqw.png)
Creating AV Resistant Malware — Part 1
Recently, I have been preparing for my eCTPXv2 certification from eLearnSecurity. The certification course covers a lot of advanced topics…
![](https://cdn-images-1.medium.com/fit/c/400/300/1*7351_eJnm9EkdN-bsrkVoQ.png)
Creating AV Resistant Malware — Part 2
In part two of this series we’re going to be creating the AV destroyer part of our malware! It will be based off of Rasta-mouse’s…
![](https://cdn-images-1.medium.com/fit/c/400/300/1*pJz-Ir-cQdfeyP_FpIyBFA.png)
Creating AV Resistant Malware — Part 3
In part 3 of this series we will be covering creating another malicious DLL that we will load into memory using PowerShell’s reflection…
![](https://cdn-images-1.medium.com/fit/c/400/300/1*L065esVdA8Z8z9n1Em-vHQ.png)
Creating AV Resistant Malware — Part 4
The final part of this blog series will be a short tutorial of how to use your new tools and how to tie it all together to get a reverse…
![](https://cdn-images-1.medium.com/fit/c/400/300/1*EEHLnwlHiZ6g-O4WD53-cw.png)
Independent Security Evaluators
We are ethical hackers, computer scientists, reverse engineers, cryptographers, software developers, penetration testers, and consultants.
![](https://cdn-images-1.medium.com/fit/c/400/300/1*uFDVl3e6_PyfQ7sLOSMDTw.gif)
Reverse Engineering Bumble’s API
When you have too much time on your hands & want to dump out Bumble’s entire user base and bypass paying for premium Bumble Boost features.
![](https://cdn-images-1.medium.com/fit/c/400/300/1*34roKfQWVwMZHT7jylP82A.gif)
User Information Disclosure in Dating Apps
Extracting user data from mobile apps to craft exploits.
![](https://cdn-images-1.medium.com/fit/c/400/300/1*WOidfAFa3L_J0t9fT9PfjA.jpeg)
We Went Virtual, What Did You Do This Summer?
COVID-19 has changed the world in more ways than one. Prior to 2020, we had never considered the possibility of making our content virtual…
Reviews
Login to submit your review.