23 C
Kathmandu
Friday, October 23, 2020

LATEST ARTICLES

Truecaller Data Breach – 47.5 Million Indian Truecaller Records On Sale in Dark Web

Truecaller is used to identifying unknown callers and also provide options to red-flags spammers. The app was developed by...

GitHub Dorks for Penetration Testing

Collection of GitHub dorks for penetration testing.

Top Hacking Tools For Hackers

Top Hacking Tools For Hackers Everyone wants to be a hacker and keeps looking for tools that...

Open Systems Interconnection model (OSI model)

Introduction To OSI Model When we talk about the Internet it looks simple, just put...

MSSQL Injection Cheat sheet

After finding the injection point and detecting the exact number of column we can use the following basic queries...

Networking Terms You Really Need To Know

Hello Guys! This article is going to be about some basic Networking Terms.Moreover, I advise you to read our previous...

Why Hackers Use Linux And How To Get Started With It?

What Is Linux? Linux is a Kernel (we will talk about it later), not an Operating...

HTML Injection : The Introduction

Hello Guys!! Today I am going to tell you about HTML Injection which is in OWASP’s Top 10 Vulnerabilities list. And is upon...

Most Popular

Login Bypass With SQL Injection

First of all, read the previous article SQL Injection Explained From Scratch so you can get this stuff better.So today we are going...

GitHub Dorks for Penetration Testing

Collection of GitHub dorks for penetration testing.

MSSQL Injection Cheat sheet

After finding the injection point and detecting the exact number of column we can use the following basic queries to show...

Musk, Bezos, Gates hacked: Twitter accounts violated for fraud

Gates, Musk, Bezos hacked: Hackers gained access to the Twitter accounts of Bill Gates, Elon Musk, Jeff Bezos, and many others, on Wednesday afternoon, to...

SUBSCRIBE NOW

Subscribe for free and get latest articles delivered right into your inbox.