Saturday, October 20, 2018
how to create persistent backdoor for android in metasploit

How to Create a Persistent Android Backdoor for Metasploit with Shell Script

Warning : This tutorial is for educational purposes only. Neither the author, nor the website is responsible for what the visitor does with the...

How to Hack on WAN Without Port Forwarding using Portmap.io

Since most of the ISP doesn't provide port forwarding, hacking on WAN has always been a difficult task few years back. Later, SSH tunneling...

How to Install and Configure Open VPN in Kali Linux

OpenVPN is a open source VPN provider which has more than 50 VPN servers worldwide across 23 regions in 12 countries. OpenVPN is available...

Stay connected

0FansLike
1FollowersFollow
179FollowersFollow

Latest article

How to retrieve a User’s Facebook Private Friend List

This bug was actually before the email confirmation but quite interesting vulnerability to share and can be done for a certain period of time...

Windows Local Privilege Escalation Exploit POC 2018

This O day made my day. The exploit for the big man of the software companies ( The microsoft) was recently released. This vulnerability...

Data Ex-filtration using Smart Light Bulbs

Anindya Maiti from University of Texas at San Antonio has recently published a research paper on "Light Ears: Information Leakage via Smart Lights". In...