Saturday, October 20, 2018
how to create persistent backdoor for android in metasploit

How to Create a Persistent Android Backdoor for Metasploit with Shell Script

Warning : This tutorial is for educational purposes only. Neither the author, nor the website is responsible for what the visitor does with the...

How to Hack on WAN Without Port Forwarding using Portmap.io

Since most of the ISP doesn't provide port forwarding, hacking on WAN has always been a difficult task few years back. Later, SSH tunneling...

Is exploit-db fair among security researchers ?

I myself Adithyan AK published an blog regarding drupal dagger earlier !! Drupal Dagger is a dork discovered by my Team Mate Mohan Of TPH...

How to Install Metasploit SqlMap Nmap in Google Cloud Shell

As we all know, Gcloud is cloud computing platform for programmers and developers. Google provided a exclusive free coupon for 365 days to students...

Hacking on WAN using Serveo.net without Port Forwarding (Free sub-domain)

Hacking over WAN has been a constant struggle for all the hackers around the world. Although port forwarding can solve this problem, most of...

How Drupal Website users can be Hacked with Drupal dagger (Zero Day Dork)

Drupal Dagger is a dork discovered by my Team Mate Mohan Of TPH Infosec. During his recon, Mohan discovered this dork which let him...

How to leak information from an air gapped computer

If you are  interested  in cyber security or information security then you will come across this unfamous term ‘air gapping’.  Air gapping a computer...

EPFO Portal hacked !!!

EPFO - Employee Provisional Fund Organization recently shut down its website a day ago, since the aadhar seeding portal was hacked. The EPFO is for...

Whatsapp trick to hang others Mobile by sending a text message (Explained)

Hi guys, gotta tired with the “Don’t touch here” txt message  ? ruling over the whatsapp chats and group.fine,lets mess up with this problem...

How to trace the Location of an ip with Bluethunder tool

Trace others ip and know their location. To trace an ip and know their location, there will be the need of the victim's ip....

Stay connected

0FansLike
1FollowersFollow
179FollowersFollow

Latest article

How to retrieve a User’s Facebook Private Friend List

This bug was actually before the email confirmation but quite interesting vulnerability to share and can be done for a certain period of time...

Windows Local Privilege Escalation Exploit POC 2018

This O day made my day. The exploit for the big man of the software companies ( The microsoft) was recently released. This vulnerability...

Data Ex-filtration using Smart Light Bulbs

Anindya Maiti from University of Texas at San Antonio has recently published a research paper on "Light Ears: Information Leakage via Smart Lights". In...