Saturday, October 20, 2018

Walmart’s entry to India

Yes, as the title states, US retail giant Walmart has done an agreement with the Indian e-commerce giant Flipkart. The world's largest retailer will take a...

How Websites can be Hacked with Google using Google Dorks

Hey guys ,it seems to be quite interesting that you can hack with the help of google.yes,it can be done with the use...

How to access Dark Web from your Android mobile

Disclaimer:This article will contain some dark web stuffs and the author is not responsible  for the illegal activities done on reading this.Damn sure,it will...

Tap your neighbours key logs with your Android Mobile

Yeah it is definitely  possible , to tap someone’s key log without their knowledge . It involves some technology that is basically developed to ...

Top Free wordpress themes 2018

Tired of searching a catchy theme for your blog in the web. Calm down guyss!!! In this article I have managed to gather some...

Whatsapp trick to hang others Mobile by sending a text message (Explained)

Hi guys, gotta tired with the “Don’t touch here” txt message  ? ruling over the whatsapp chats and group.fine,lets mess up with this problem...

How to mine Monero Crypto currency (Beginners tutorial)

What is Monero actually…? Monero  (XMR) is an open source crypto currency , recently came in to existence on 2014.It provides a greater privacy than...
SSLstrip

How to Sniff HTTPS Traffic Username and Passwords (SSL Stripping)

SSL Stripping is the most used technique for hacking traffic from HTTPS website. SSL strip was found on 2009 in black hat conference and...

How to trace the Location of an ip with Bluethunder tool

Trace others ip and know their location. To trace an ip and know their location, there will be the need of the victim's ip....

Try the Gmail Redesign with new features and security Upgrades

The new redesign of google's gmail is simply cool.... It's the first ever update by google for a single application with these many features. This...

Stay connected

0FansLike
1FollowersFollow
179FollowersFollow

Latest article

How to retrieve a User’s Facebook Private Friend List

This bug was actually before the email confirmation but quite interesting vulnerability to share and can be done for a certain period of time...

Windows Local Privilege Escalation Exploit POC 2018

This O day made my day. The exploit for the big man of the software companies ( The microsoft) was recently released. This vulnerability...

Data Ex-filtration using Smart Light Bulbs

Anindya Maiti from University of Texas at San Antonio has recently published a research paper on "Light Ears: Information Leakage via Smart Lights". In...