A curated list of shareable social media links – 27 Platforms

Something strange is happening. Your advertising doesn’t work anymore, at least not like it used to. You used to be able to buy some TV time or put an ad in a newspaper,…

Read more

5 Best Python Libraries for working with HTTP

You’re asking one question: “What makes Python different?” And the short answer is: “lots of things“. The longer answers starts by stating that there’s lots that’s familiar, too. Python is a lot like…

Read more

6 Best Games for MacOSX Platforms – 2018 Update

When you get right down to it, the job description of every operating system is pretty much the same. If you need a break from gaming, why not try launching your own small…

Read more
macOS Yeahhub

Some Useful Command Line Utilities for macOS

The command line interface (CLI) is a powerful tool that allows users to interact with their operating system through text-based commands. While macOS provides a user-friendly graphical interface, the command line can offer…

Read more

Top 6 Password Manager Tools – 2018 Update

A while ago, all it took to be a great password manager was to keep your passwords in an encrypted vault. Now the best password managers give you the option to sync or…

Read more

Top 13 Free JavaScript Frameworks for Web Developers – 2018 Update

When it comes to Web Development, JavaScript frameworks are one of the most favoured platform for developers & businesses in today’s time. Possibly, you have had a chance to experiment with one or…

Read more

Hacker’s Handbook Series – Collection 2018

The Hacker’s Handbook is a non-fiction book from the 1980s effectively explaining how computer systems of the period were hacked. They actually explained the actual hacking attempts such as password hacking, brute forcing,…

Read more

Update your Mozilla Firefox Now – 31st January 2018 Update

Mozilla has fixed a critical flaw i.e. Remote Code Execution that could allow an attacker to execute arbitrary code on any targeted device. This loophole is due to insufficient sanitization of HTML fragments…

Read more

Dangerous Keylogger Found – Infecting over 2000 WordPress sites

WordPress is one of the most popular open source blogging platform, with global and vibrant user, developer, and support communities. Though it can be compared to TypePad, Moveable Type, Google’s Blogger(Blogspot), and the…

Read more

Man in the Middle Attack with Websploit Framework

  We assume most of you know what a Man in the Middle (MitM) attack is, but below is a diagram of a Man in the Middle attack. A man-in-the-middle attack is a…

Read more

Get Windows RDP FREE for one Month – No Credit Card Required

With Apponfly, you can get free Windows RDP for full one month and the best thing is that you don’t need any credit card for verification etc. AppOnFly is your secure remote desktop for…

Read more

Email Harvesting with Metasploit Framework

Footprinting is the process of collecting as much information as possible about a target network, for identifying various ways to intrude into an organization’s network system. Out of the many useful auxiliary modules…

Read more

PHP CGI Argument Injection With Metasploit Framework

PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. When PHP is used in a CGI-based setup (such as Apache’s mod_cgid), in…

Read more

MySQL Pentesting with Metasploit Framework

Everyone who has been involved with IT for more than a few months has at least heard of MySQL. The driving force behind MySQL has been to provide a reliable, high-performance server that…

Read more

Create Multiple Wireless Monitor Modes with Makemon

The best way to put your Wifi adapter to monitor mode is through airmon-ng but with airmon-ng package you can only create a single monitor mode. In this article, you’ll learn how to…

Read more

HTTP PUT Method Exploitation – Live Penetration Testing

In this article, we’ll be exploiting the HTTP PUT method vulnerability on one of the Metasploitable2 webserver through which you can easily upload any malicious file onto the server and can gain the…

Read more

Testing Methods for HTTPS with OpenSSL, Curl and Nmap

If you’re using the HTTP protocol for surfing Internet, you usually use only using two of its methods i.e. GET and POST. However HTTP has a number of other methods like OPTIONS, TRACE,…

Read more

Common Linux Features

On October 5, 1991, Linus Benedict Torvalds, a graduate student from the University of Helsinki in Finland, announced in a Usenet newsgroup that he had created a small UNIX-like operating system called Linux….

Read more

Top 11 Facts about Linux Shell Terminal

Alright, far too often (especially in the IRC channels) there is a time where even the most beginner of users are faced with the terminal. It has many names: terminal, shell, console, “command…

Read more

Test your Website Loading Speed with Curl and Httpstat in Kali Linux

In this article, we’ll cover two methods through which you can easily test your website loading speed and some other performance factors like Lookup Time, Connect Time, Pre-Transfer Time and Start-Transfer Time. To…

Read more

Set ASCII Text Art in Kali Linux Terminal Header

Kali Linux is the most recent live disk security distribution released by Offensive Security. The latest version i.e. Kali Linux 2017.3 has over 600 security and penetration testing tools included, categorized into helpful groups most…

Read more

Top 6 Static Analyzers for different languages

Static program analysis is the analysis of computer software that is performed without actually executing programs. In most cases the analysis is performed on some version of the source code, and in the…

Read more