Advanced threat assessment services. Our Red Team services define attack scenarios and test your defenses continuously| Tarlogic Security
Our cybersecurity services are focused on solving our clients needs. We know what risks they are exposed to and how to protect them| Tarlogic Security
Cybersecurity blog. Technical articles on computer security, network teaming and ethical hacking by the Tarlogic cybersecurity team.| Tarlogic Security
In this article we will explain how to develop Apache modules to be used in Red Team operations. Backdoors in Apache2.| Tarlogic Security
We continue our series on the XAMP stack. This time we show how to create a backdoor (UDF) in MySQL to use in our pentests.| Tarlogic Security