What You’ll learn Here
Red Teaming
CTF Writeups
OSINT
Forensics
DIY Projects
Threat Hunting
Malware Analysis
Eat.
Sleep.
Hack.
Repeat.
Invent Your Shit
In this walk through, we will be going through the Frame Source Injection (Styling with Mutillidae) vulnerability...
In this walk through, we will be going through the Frame Source Injection (Document Viewer) vulnerability...
In this walk through, we will be going through the Directory Browsing vulnerability section from Mutillidae...
In this walk through, we will be going through the Cross-Site Scripting (Reflected) vulnerability section...
In this walk through, we will be going through the Client-side Control Challenge vulnerability section...
In this walk through, we will be going through the CBC bit Flipping vulnerability section from Mutillidae...
In this walk through, we will be going through the Cascading Style Injection (Set Background Color) vulnerability...
In this walk through, we will be going through the Buffer Overflow (Repeater) vulnerability section from...
In this walk through, we will be going through the Blind SQL via Timing (User Lookup) vulnerability section...
Hacking social media accounts with Zphisher
In this article, we are continuing our phishing course and going into the practical end of phishing....
Phishing 101 - The Basics
In this article, we are starting our new short course on Phishing. In our last articles, we explore the...
Social engineering 101 - Part 2
In the last part of Social Engineering 101, we went on a ride and learn about what social engineering...
Social Engineering 101 - Part 1
A man called a cellphone manufacturer and says, “Hey! This is Rick over Arlington Heights and I...
How to do SMS and Call bombing on scammers?
Have you ever encountered those scam calls, where they try to rip you by those shady lottery win announcements?...
Kali-whoami - Stay Anonymous while hacking
Hello and Welcome back, my aspiring hackers. How are you? Today, we will be learning, how we can be anonymous...
How do hackers get your exact location?
Hello and welcome back my aspiring hackers, Well, we are back with another hacking tutorial. Today, we...
Hacking Android pin password using Lockphish
Hello and Welcome my aspiring hackers, How are you? Well, I know, there hasn’t been a lot of hacking...
How to hack a Phone's camera in 2023?
Hello, and welcome back my fellow hackers, How are you? So, pretty interesting title, huh! Hacking phone’s...