Latest Articles

4 Best ways to Prevent SQL Injection Vulnerability [PHP]

SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is …
Read More

Windows 10 Exploitation with an Image [Metasploit Framework – 2018]

Metasploit is currently the most buzzing word in the field of information security and penetration testing. It has totally revolutionized …
Read More

Metasploit DB Commands [Cheatsheet 2018]

The post exploitation phase always begins after you have compromised one or more systems but you’re not even close to …
Read More

Save Nmap Output to a File with 4 different ways

As we come to rely more and more on massively interconnected networks,┬áthe stability and security of those networks becomes more …
Read More

Change Mac Address in Kali Linux (Permanently)

MAC Address generally called as Multimedia Access Control, and you should change your MAC Address before to do any hacking …
Read More

Stay Logged in WordPress for Longer Duration

Creating HTML pages dynamically is one half of what a content management system (CMS) does: it takes chunks of code …
Read More

Limit WordPress Comments Length [Manually]

One of the best ways to interact with your visitors is to allow them to leave comments on your site, …
Read More

Change Default Login Error Messages in WordPress

WordPress sites are notoriously lacking when it comes to security because of the default configurations. For example, you are running …
Read More

Change default display name in WordPress

WordPress is one of the most popular CMS (Content Management System) used by so many big companies and professionals but …
Read More

Change WordPress Table Prefix [Before/After Installation]

We all knows that WordPress CMS is one of the favourite CMS for hackers. Hence it’s very important to change …
Read More

Loading...