Copyright © 2012 – 2025 IT SELECT LAB COMPANY LIMITED All rights reserved.
Image

Specialized Cybersecurity Expertise

Showcases your organization's solid experience and expertise in cybersecurity.

Customized Solutions for Cybersecurity Challenges

Emphasizes the personalized service delivery and the adaptation of security measures to fit the specific requirements and challenges each client faces.

itselectlab
itselectlab
itselectlab
itselectlab
itselectlab
itselectlab
itselectlab
itselectlab
itselectlab
itselectlab
itselectlab
itselectlab
Modal Image

Red Team Attacks and Blue Team Resilience

Emphasizes a holistic cybersecurity approach, combining offensive and defensive tactics to effectively boost overall security.


Penetration Test (1st line)

A Penetration Test (pen test) simulates cyber attacks to identify and address vulnerabilities in IT systems, mobile apps, ATMs, and vending machines, offering remediation recommendations.


Cyber Drill (1st line)

A Cyber Drill service simulates cyber-attacks to test and strengthen an organization’s response and defenses, improving preparedness against real threats.


Risk Management (2nd line)

Governance and Risk Management services develop frameworks to align security policies with business goals and manage risks through assessments, policy development, compliance, and continuous monitoring.


IT Auditor (3rd line)

Information Technology General and Application Control services focus on enhancing IT security and reliability through audits, data integrity checks, and specific application controls to optimize system performance and security.

Knowledge-Sharing Initiative

Our initiative aims to share valuable insights and expertise in penetration testing to assist enthusiasts and professionals in advancing their careers.

itselectlab

Demystifying SMALI Analysis
This article guides you through the process of adding debug logs to SMALI.

itselectlab

Activating USB Proxy in Flutter Apps
Flutter apps may bypass the Android "system CA store" by embedding a CA list directly, potentially blocking standard proxy-based data interception.

itselectlab

Analysis on com.gzrtnq.Bumble
This article discusses recent prevalent Android malware attacks, particularly overlay techniques and the misuse of Android Accessibility Service (AAS).

itselectlab

More articles
Each article provides essential knowledge and tips to enhance skills in identifying and mitigating vulnerabilities across different technology platforms.

Key Elements Protecting the Organization


IT SELECT LAB COMPANY LIMITED
4/7 Pholyothin 11, Senabadee 2 Bldg., Pholyothin Rd., Phyathai, Phyathai, Bangkok 10400
Business Partner
info@itselectlab.com
Mobile Phone
+(66) 89 182 6777
+(66) 88 677 1199