Tutorials

How To Decode Base64 In Most Popular Programming Languages

Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating it into radix-64 representation. All examples below uses base64 decoded text (eWVhaGh1Yg==) for simplicity, but this is not a typical use case, as it can already be safely transferred across all systems that can handle […]

Latest Articles

How To Decode Base64 In Most Popular Programming Languages

Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating …
Read More

Target’s Twitter Account Compromised – Posted Fake Promoted Ad [Bitcoin Scam]

Twitter and Social networks are a very powerful way to market your business. This time, Twitter was compromised with a …
Read More

A to Z Programming Notes – By GoalKicker.com

Are you looking for the Best Free Programming eBooks on PHP, Python, Ruby, Java etc? Choose from over 40+ eBooks …
Read More

Top 23 Android Static Analysis Tools – 2018 Compilation

Traditional attacks like phishing, and newer twists like vishing, also impact mobile security. Mobile media adoption is huge when it comes …
Read More

Top 14 Online APK Analyzers for Android – 2018 Compilation

Last year, Google itself launched Google Play Protect Service which provides an extra layer of security to all users. Although …
Read More

Tips and Tricks For Outreach: Small Details That Will Warm Up Your Leads

Why is it important to reach out to many people? What are you doing to warm up your leads? Have …
Read More

Online Port Scanning – Top 5 Resources

In the context of penetration testing, Port Scanning is usually performed to identify open ports against any target machine. Open …
Read More

6 Linux Distributions For Forensics Investigation

Over the past 2-3 years, we’ve seen a dramatic increase in sophisticated attacks against organizations. Cyber attacks originating from China, …
Read More

OSINT Resources List 2018 Compilation – Exploits & Vulnerabilities Search

OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT …
Read More

Top 10 Online Free Scanners

Throughout the scanning phase, penetration testers and ethical hackers gather very useful information about the target environment that will be …
Read More

Top 30 Basic NMAP Commands for Beginners

Nmap is a free tool that can be used to conduct various sorts of scans on networks. Normally, when people …
Read More

Get Linux IP Address from Command Line – 5 Ways

What is IP Address –  A unique number consisting of four parts separated by dots. Every device on the Internet …
Read More

TCPDUMP: 25 Common Command Examples

Tcpdump is a well known command line packet analyzer tool. Using tcpdump command we can capture the live TCP/IP packets …
Read More

Loading...