Xiaomi Reveals A Working Smartphone With Under Display Camera

For months, we have been hearing about Xiaomi working on the under-display camera technology. Now, the Chinese tech giant has finally unveiled a smartphone...

NMAP : Tutorial

Network mapped (nmap) is a network scanning and host detection tool that is very useful in the course of numerous steps of penetration checking...

Developer Builds World’s Smallest iMac Using Raspberry Pi

Engineer and developer Michael Pick has developed the world’s smallest and prettiest iMac using Raspberry Pi and 3D printing. DIY enthusiast Michael Pick has...

Flaw in Safari browser’s API lets local files be stolen

Being one of the major web browsers, Safari browser gets its fair share of scrutiny from cybersecurity professionals. In the latest, researcher Pawel Wylecial...

Deep Web : How To Access it ?

Introduction: There are many types of web ! but some of the main on which i will focus on my blog are: 1. Surface Web 2. Dark...

Burpsuite : How I Bypassed OTP!

How I bypassed the OTP ? This is only for the educational purpose. There are different ways by which we can try and bypass the login...

Zoom is down in parts across US and UK

Zoom, the video conferencing app is down in the US and UK, as it created confusion among the users in joining video calls. "We have...

Metasploit : Mobile Hacking

Hack Smart Phone Using Kali(Remotely)   Hello Hackers, This is a tutorial explaining how to hack smart phones with kali. STEP 1: OPEN KALI/PARROT: # Open up your terminal...
google drive malware

The Weakness in Google Drive could let Hackers to install Malware in your PC

Attackers could exploit the weakness in Google Drive by distributing malicious files disguised as legitimate files or images. A system administrator A. Nikoci reported...

Shellphish : A Phishing Tool

Shellphish is a tool used for phishing attacks, this tool offers phishing templates of more than 18 famous websites. NOTICE: This article is for educational...