From RFI(Remote File Inclusion) to Meterpreter Shell

For many years now we’ve participated in many coding forums and discussion platforms. Perhaps one of the biggest issues we see is people using $_GET or another unfiltered variable inside of an include, include_once, require or require_once statement which is... Read more

JAVA RMI (Remote Method Invocation) Exploitation with Metasploit Framework

The Java Remote Method Invocation, or Java RMI, is a mechanism that allows an object that exists in one Java virtual machine to access and call methods that are contained in another Java virtual machine; This is basically the same... Read more

Top 6 Web Application Vulnerability Scanners

A number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of being able to test a large amount of functionality in a relatively short time, and in a typical application are often able... Read more

Stay Safe Online When Using Public Wi-Fi.

You’ll come across public Wi-Fi almost everywhere, in the airport, your favorite coffee shop, and hotels. While public Wi-Fi has made our lives better, it poses a lot of risks particularly security risks. Hackers have made public Wi-Fi’s their playground... Read more

From Command Injection To Meterpreter Shell – Detailed Tutorial 2018

Other than XSS and SQL Injection, there are number of different attack techniques against a web application. In this tutorial,we’ll exploit the DVWA Web Application with Command Injection Attack. There are so many vulnerable web applications where players must locate... Read more

Top 20 Hacking Books To Read Before You Die

Looking to buy best hacking and security books? We have short listed some of the highly recommended books for beginners and advanced hackers. These books will be a breakthrough in your hacking venture. Here we’ve listed out top 20 Hacking Books... Read more

Learn JavaScript with 50+ Resources/Ebooks

S.No Name of the Book Download Link 1 jQuery Enlightenment A book for jQuery developers who have surpassed the introductory concepts. By – Cody Lindley View More 2 AngularJS Directives in Traction This eBook helps you understand how built-in directives... Read more

Biggest Hacking & Security E-Books Collection – FREE Download

Ever thought of creating a library with thousands of free hacking an security e-books? You’d never have to spend a dime. It sounds impossible, but it’s not! Free E-books, on nearly all topics you can think of, are all over... Read more

Top 5 DNS Lookup Websites – Best Rated 2018

DNS organizes hostnames in a domain hierarchy. A domain is a collection of sites that are related in some sense because they form a proper network (e.g., all machines on a campus, or all hosts on BITNET), because they all... Read more

How to Enable Self-Signed Certificates for Local Apache Webserver – LINUX

This article describe how to quickly enable SSL for local apache web server under Linux. This has been done on a Kali Linux virtual machine of version 2018.1, the one maintained and funded by Offensive Security. This procedure may not... Read more

How To Decode Base64 In Most Popular Programming Languages

Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating it into radix-64 representation. All examples below uses base64 decoded text (eWVhaGh1Yg==) for simplicity, but this is not a typical... Read more

A to Z Programming Notes – By

Are you looking for the Best Free Programming eBooks on PHP, Python, Ruby, Java etc? Choose from over 40+ eBooks for Free! Read and Download eBooks for Free: anytime with! Most of the books are compiled from Stack Overflow... Read more

Top 23 Android Static Analysis Tools – 2018 Compilation

Traditional attacks like phishing, and newer twists like vishing, also impact mobile security. Mobile media adoption is huge when it comes to “texting” with others, not to mention brief phone calls and e-mails to friends and family. Devices and the communication systems they... Read more

Top 14 Online APK Analyzers for Android – 2018 Compilation

Last year, Google itself launched Google Play Protect Service which provides an extra layer of security to all users. Although the problem is not fully solved because of risk still exists. NOTE: It is advisable to always install only the... Read more

Tips and Tricks For Outreach: Small Details That Will Warm Up Your Leads

Why is it important to reach out to many people? What are you doing to warm up your leads? Have you seen what your competitors are doing? You are asking the same questions, right? As an entrepreneur or a startup,... Read more

Online Port Scanning – Top 5 Resources

In the context of penetration testing, Port Scanning is usually performed to identify open ports against any target machine. Open ports correspond to the networked services that are running on a system. Programming errors or implementation flaws can make these... Read more

6 Linux Distributions For Forensics Investigation

Over the past 2-3 years, we’ve seen a dramatic increase in sophisticated attacks against organizations. Cyber attacks originating from China, named the APT (Advanced Persistent Threat), have proved difficult to supress. Financial attacks from Eastern Europe and Russia obtain credit... Read more

OSINT Resources List 2018 Compilation – Exploits & Vulnerabilities Search

OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for money, but you should be able... Read more

Top 10 Online Free Scanners

Throughout the scanning phase, penetration testers and ethical hackers gather very useful information about the target environment that will be critical in the ongoing stages of a test. Scanning and identifying vulnerabilities is often considered one of the more tedious... Read more