Dhound
  • Services

    Services

    Penetration Testing Technical Audits Compliance Audits Security Trainings
    Penetration Testing & Security Analysis
    Web App & API Pentesting Identify vulnerabilities in web applications and APIs Mobile Apps Pentesting Security testing for iOS and Android applications Cloud Pentesting Assess cloud infrastructure and configurations Network Pentesting Internal and external network security assessment AI/LLM Pentesting Security testing for AI and language models Web 3.0 & Smart Contracts Blockchain and smart contract security audits Cyber Investigation Digital forensics and incident investigation Pentesting-as-a-Service Continuous security testing for Agile teams
    Technical Audits
    Technical Due Diligence In-depth technology assessment for investors Architecture & Infrastructure Review Evaluate system design and infrastructure Code & Technology Assessment Code quality, tech stack, and best practices review Scalability & Enterprise Readiness Assess readiness for growth and enterprise adoption Hosting Costs Optimisation Reduce cloud and hosting spend AI Integration Audit Review AI/ML implementation and risks
    Compliance Audits
    EU CRA Readiness Assessment Prepare for EU Cyber Resilience Act GDPR Technical Assessment Technical compliance with data protection Cryptocurrency Regulators Compliance audits for crypto platforms Local Security Regulators Meet local security compliance requirements
    Security Awareness Trainings
    Security Testing Training Hands-on security testing skills for teams Phishing Simulation Test employee awareness with realistic attacks
  • About us
  • Resources

    Resources

    Blog Case Studies FAQ WHOIS Knowledge Center
  • Partnership
MENU
  • Security Practices
    • Transport Security
      • SSL Configuration Testing
      • Setting up SSL
      • Configure SSL for Windows
      • Configure SSL for nginx
    • Firewalls
      • Attack Surface Reduction
      • Configure iptables on Linux
    • Brute force protection
      • Brute force attacks
      • Fail2ban
      • Test Protection
    • Android and APK Analysis
      • Intercepting HTTPS Traffic on Android emulator
      • Setting Up an Android Device for Root Access and HTTPS Traffic Interception via Burp Suite
      • Extract APKs from a physical Android device
    • Web Server Config
      • Setting up Nginx Server
      • Setting up XSSHUNTER
    • Cyber OSINT
      • OSINT TOOLS 2025
      • Advanced OSINT
    • Pentest Tools & Scanning
      • Useful Burp Extensions
      • Metasploit: Scanning a Website with Wmap
      • Greenbone OpenVAS installation
    • Exploitation
      • CVE-2014-6271 (Shellshock)
      • CVE-2007-1860: Double Decoding mod_jk
      • CVE-2016-0792: XStream Deserialization in Jenkins
      • CVE-2016-10033: PHPMailer RCE
      • Pickle Code Execution
      • XMLDecoder Deserialization
      • ECB Cipher Authentication Bypass
      • RCE with PostgreSQL Extensions
    • Cheatsheets
      • Nmap Cheatsheet
      • Tcpdump Cheatsheet
      • Lsof Cheatsheet
      • Web Basics
      • Essential Unix Commands
      • HTTP Requests
      • Wireshark
      • Advanced Nmap scanning

Page not found

Page not found. :(