What You’ll learn Here
Red Teaming
CTF Writeups
OSINT
Forensics
DIY Projects
Threat Hunting
Malware Analysis
Eat.
Sleep.
Hack.
Repeat.
Invent Your Shit
In this walk through, we will be going through the Username Enumeration (Login) vulnerability section...
In this walk through, we will be going through the User-Agent Impersonation vulnerability section from...
In this walk through, we will be going through the Unrestricted File Upload vulnerability section from...
In this walk through, we will be going through the Sqlmap Practice (View Blogs) vulnerability section...
In this walk through, we will be going through the SQLi via JSON (Pentest Tool lookup) vulnerability...
In this walk through, we will be going through the SQLi via JSON (Pentest Tool lookup AJAX) vulnerability...
In this walk through, we will be going through the SQLi Insert Injection (View Captured Data) vulnerability...
In this walk through, we will be going through the SQLi Insert Injection (Register) vulnerability section...
In this walk through, we will be going through the SQLi Insert Injection (Add to your blog) vulnerability...
Hacking social media accounts with Zphisher
In this article, we are continuing our phishing course and going into the practical end of phishing....
Phishing 101 - The Basics
In this article, we are starting our new short course on Phishing. In our last articles, we explore the...
Social engineering 101 - Part 2
In the last part of Social Engineering 101, we went on a ride and learn about what social engineering...
Social Engineering 101 - Part 1
A man called a cellphone manufacturer and says, “Hey! This is Rick over Arlington Heights and I...
How to do SMS and Call bombing on scammers?
Have you ever encountered those scam calls, where they try to rip you by those shady lottery win announcements?...
Kali-whoami - Stay Anonymous while hacking
Hello and Welcome back, my aspiring hackers. How are you? Today, we will be learning, how we can be anonymous...
How do hackers get your exact location?
Hello and welcome back my aspiring hackers, Well, we are back with another hacking tutorial. Today, we...
Hacking Android pin password using Lockphish
Hello and Welcome my aspiring hackers, How are you? Well, I know, there hasn’t been a lot of hacking...
How to hack a Phone's camera in 2023?
Hello, and welcome back my fellow hackers, How are you? So, pretty interesting title, huh! Hacking phone’s...