Development of system hardening guidelines to protect your company's user workstations, VIP and servers| Tarlogic Security
Do you know what is a Backdoor? If not, in our cybersecurity glossary, you can get more information about Backdoors| Tarlogic Security
Tutorial for creating PHP extensions. Learn how to create PHP extensions to use it as backdoors during pentests. Backdoors on web servers.| Tarlogic Security
Creating backdoors in SQL for WordPress. Persistence methods in web applications. Backdoors use in SQL during Red Team exercises.| Tarlogic Security
Advanced threat assessment services. Our Red Team services define attack scenarios and test your defenses continuously| Tarlogic Security
Our cybersecurity services are focused on solving our clients needs. We know what risks they are exposed to and how to protect them| Tarlogic Security
Cybersecurity blog. Technical articles on computer security, network teaming and ethical hacking by the Tarlogic cybersecurity team.| Tarlogic Security
We continue our series on the XAMP stack. This time we show how to create a backdoor (UDF) in MySQL to use in our pentests.| Tarlogic Security