Thursday, February 21, 2019
how to create persistent backdoor for android in metasploit

How to Create a Persistent Android Backdoor for Metasploit with Shell Script

Warning : This tutorial is for educational purposes only. Neither the author, nor the website is responsible for what the visitor does with the...

How to Hack on WAN Without Port Forwarding using Portmap.io

Since most of the ISP doesn't provide port forwarding, hacking on WAN has always been a difficult task few years back. Later, SSH tunneling...

Is exploit-db fair among security researchers ?

I myself Adithyan AK published an blog regarding drupal dagger earlier !! Drupal Dagger is a dork discovered by my Team Mate Mohan Of TPH...

How to Install Metasploit SqlMap Nmap in Google Cloud Shell

As we all know, Gcloud is cloud computing platform for programmers and developers. Google provided a exclusive free coupon for 365 days to students...

Hacking on WAN using Serveo.net without Port Forwarding (Free sub-domain)

Hacking over WAN has been a constant struggle for all the hackers around the world. Although port forwarding can solve this problem, most of...

How Drupal Website users can be Hacked with Drupal dagger (Zero Day Dork)

Drupal Dagger is a dork discovered by my Team Mate Mohan Of TPH Infosec. During his recon, Mohan discovered this dork which let him...

How to leak information from an air gapped computer

If you are  interested  in cyber security or information security then you will come across this unfamous term ‘air gapping’.  Air gapping a computer...

EPFO Portal hacked !!!

EPFO - Employee Provisional Fund Organization recently shut down its website a day ago, since the aadhar seeding portal was hacked. The EPFO is for...

Whatsapp trick to hang others Mobile by sending a text message (Explained)

Hi guys, gotta tired with the “Don’t touch here” txt message  ? ruling over the whatsapp chats and group.fine,lets mess up with this problem...

How to trace the Location of an ip with Bluethunder tool

Trace others ip and know their location. To trace an ip and know their location, there will be the need of the victim's ip....

Stay connected

0FansLike
1FollowersFollow
179FollowersFollow

Latest article

Coship Router Unauthenticated Admin Password Reset CVE-2019-6441

Nearly all the firmware versions of Coship routers are vulnerable for this attack. The vulnerability lies in the apply.cgi file of the...

A New Dream Theory With Parallel Universe

I will go with the term ----“ According to me”, the dream is a dimension where we are not the mere projection of ourselves....

Elon Musk walked out of Tesla!

The Tesla's board of directors announce Robyn Denholm as the new Chair of the Tesla board, effective immediately. Tesla announced on Wednesday night that Australian telecom executive...