Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
Data of 108 Million Bets and User is Leaked by Online Casino Group
Security researcher Justine Paine discovered a data leak this week from an ElasticSearch server. The leak involved over 108 million bets and user data from...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
Reverse Shell Cheat Sheet
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterward you’ll probably want an interactive shell.
If it’s not possible...
Latest Bluetooth hacking techniques expose new attack vectors for hackers
BlueBorne is a vulnerability discovered in several Bluetooth implementations.
Btlejacking relies on the jamming vulnerability tracked as CVE-2018-7252 and affects BLE devices with...
Best Hacking Movies That You Should Watch Right Now
If you are a geek, a coder, or a hacker then you must be the one who likes movies based on hacking and coding. Such...