25 C
Kathmandu
Friday, October 23, 2020

Don't Miss

Tech and Gadgets

Stay Connected

334FansLike
88FollowersFollow

Exploit Search!

LATEST ARTICLES

Musk, Bezos, Gates hacked: Twitter accounts violated for fraud

Gates, Musk, Bezos hacked: Hackers gained access to the Twitter accounts of Bill Gates, Elon Musk, Jeff Bezos, and many others, on Wednesday...

iOS 14 Digital Car Key: Unlock your car with your iPhone!

During the Apple Worldwide Developers Conference (WWDC) 2020, Apple announced some impressive features related to Apple CarPlay in the upcoming iOS 14. One...

Chinese malware is used in attacks on Australia

The Australian government has made some statements over the past week about the increased activity of the country's cyber-attacks...

iPadOS 14: The new version brings new features and functions to the Apple Pencil

Apple unveiled the new version of iPadOS under the WWDC 2020, ie the optimized version of the mobile operating system for the iPad. As the…...

Twitter error: It concerns those who use Twitter Ads!

Twitter error: It concerns those who use Twitter Ads! Twitter has revealed a "Data Security Incident" that causes storage information to be...

A Beginner’s Guide To Cryptography/Encryption

Introduction To Encryption Before we learn about Encryption try reading this —> hsrdzrxOf course, you can read...

How Hackers Use An Ordinary Light Bulb To Spy On Conversations 80 Feet Away

Lamphone: New discussions interception by technical lamp: The lamp visible from the windows, or otherwise «Lamphone», is the new tool interception after...

Breaching Databases In Minutes With SQLMap

Hello Guys!In this article, I will be introducing a powerful database takeover tool called SQLMapNow let's get straight to the point.

Most Popular

Login Bypass With SQL Injection

First of all, read the previous article SQL Injection Explained From Scratch so you can get this stuff better.So today we are going...

GitHub Dorks for Penetration Testing

Collection of GitHub dorks for penetration testing.

MSSQL Injection Cheat sheet

After finding the injection point and detecting the exact number of column we can use the following basic queries to show...

Musk, Bezos, Gates hacked: Twitter accounts violated for fraud

Gates, Musk, Bezos hacked: Hackers gained access to the Twitter accounts of Bill Gates, Elon Musk, Jeff Bezos, and many others, on Wednesday afternoon, to...

SUBSCRIBE NOW

Subscribe for free and get latest articles delivered right into your inbox.