Crunch: Password Attacks

  A crunch is a tool that is used to generate the wordlist, the wordlist is generated with all possible permutations and combinations, in which...

Paytm Mall Hacked, Ransom demanded by Hackers; firm denies

Cyble, a security firm based on Atlanta reported that a hacker gained unrestricted access by uploading a backdoor on Paytm Mall’s database. The Hacker group...

DDoS Attack :Denial of Service

A conveyed refusal of administration (DDoS) assault is an effort to form a framework or system asset inaccessible to its planned clients. In spite...

PYSA : Security Tool As Open Source

Facebook releases a tool named PYSA, as an open-source tool, after the success of tool on Instagram. PYSA : It is used to detect the bugs...

Database Hacking : Sql Injection

SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website. SQL injection is the...

NMAP : Tutorial

Network mapped (nmap) is a network scanning and host detection tool that is very useful in the course of numerous steps of penetration checking...

Flaw in Safari browser’s API lets local files be stolen

Being one of the major web browsers, Safari browser gets its fair share of scrutiny from cybersecurity professionals. In the latest, researcher Pawel Wylecial...

Deep Web : How To Access it ?

Introduction: There are many types of web ! but some of the main on which i will focus on my blog are: 1. Surface Web 2. Dark...

Burpsuite : How I Bypassed OTP!

How I bypassed the OTP ? This is only for the educational purpose. There are different ways by which we can try and bypass the login...

Metasploit : Mobile Hacking

Hack Smart Phone Using Kali(Remotely)   Hello Hackers, This is a tutorial explaining how to hack smart phones with kali. STEP 1: OPEN KALI/PARROT: # Open up your terminal...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts