17 C
Kathmandu
Sunday, January 17, 2021

LATEST ARTICLES

Truecaller Data Breach – 47.5 Million Indian Truecaller Records On Sale in Dark Web

Truecaller is used to identifying unknown callers and also provide options to red-flags spammers. The app was developed by True Software Scandinavia...

GitHub Dorks for Penetration Testing

Collection of GitHub dorks for penetration testing.

Top Hacking Tools For Hackers

Top Hacking Tools For Hackers Everyone wants to be a hacker and keeps looking for tools that he can use to become a...

Open Systems Interconnection model (OSI model)

Introduction To OSI Model When we talk about the Internet it looks simple, just put the domain in the address bar of the...

MSSQL Injection Cheat sheet

After finding the injection point and detecting the exact number of column we can use the following basic queries to show proof...

Networking Terms You Really Need To Know

Hello Guys! This article is going to be about some basic Networking Terms.Moreover, I advise you to read our previous posts about networking...

Why Hackers Use Linux And How To Get Started With It?

What Is Linux? Linux is a Kernel (we will talk about it later), not an Operating System.Operating Systems that use Linux Kernel are...

HTML Injection : The Introduction

Hello Guys!! Today I am going to tell you about HTML Injection which is in OWASP’s Top 10 Vulnerabilities list. And is upon number 1 on...

Most Popular

SUBSCRIBE NOW

Subscribe for free and get latest articles delivered right into your inbox.