Freaky! Join Samsung Bug Bounty Program – $200,000 Reward

A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities. And…

Read more

Detect WordPress User/Version/Theme/Plugins with WP-Grab-Info Tool

WP-Grab-Info is an open source tool through which you can easily detect the WordPress Version, Username, Theme Name and Plugins List. Install WP-Grab-Info in Kali Linux – To install this above said tool,…

Read more

Live SQL Injection Exploitation with SQLMap – A Detailed Guide

Hello geeks, today we’ll show you some basic SQL Injection techniques with the help of Python and SQLMap. SQL injection is one of the most critical vulnerabilities till now and is still included…

Read more

Participate in Bug Bounty Program of TOR 2017

The Tor Project just announced the launch of a public bug bounty program where you can easily earn the money in between $2,000 and $4,000 for high severity flaws. The Tor’s Bug Bounty…

Read more

More than 143 Million American Records has been Hacked

Equifax Inc. is a consumer credit reporting agency in the United States, considered one of the three largest American credit agencies along with Experian and TransUnion. Equifax is the oldest of the three…

Read more

Gloom – Linux Penetration Testing Framework

Security is a state in which we ensure a proper gap between the threats and assets of an organization. We try to either move assets far away from threats or we try to…

Read more

Retrieve all Passwords with LaZagne Project

The LaZagne project (A password recovery tool) is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom…

Read more

OOPS, OurMine Hackers itself Hacked by Turkish Hackers

OurMine is a security hacker group based on Saudi Arabia and recently this week, they hacked WikiLeaks.org website with DNS Poisoning Attack. In a statement shared on the Twitter account of one OurMine…

Read more

Privacy Protection on Windows 10 Operating System

Windows 10 helps you reduce the cost and complexity historically associated with managing and deploying Windows devices. With Windows as a service, you receive a continuous innovation so you are always up to…

Read more

Why Do Password Practices Matter – A Detailed Explanation?

Good password practices are critical for the following reasons: The most common form of attack on a corporate system is password guessing. On most systems, most untrusted services are protected primarily by passwords…

Read more

Earn FREE $10 Quickly with Ethereum Wallet

Ethereum is the one of the 2nd most popular digital currency after Bitcoin. As per latest stats ref. 1st Sept 2017, the value of 1 BTC and 1 ETH is: 1 BTC =…

Read more

Wikileaks Website Hacked by Saudi-Arabian Hacking Group OurMine

Another defacement attack just happened and this time wikileaks.org website has been hacked by OurMine Hacker which is a Saudi Arabian Hacking group who hacked so many websites last year. The group appears…

Read more

List of all HTTP Server Response Codes – 2017 Updated List

When you visit a web page, your computer’s web browser communicates with the web server of the website. Your web browser, also known as the client, submits a request to the web server…

Read more

SQLiv – Massive SQL Injection Scanner

SQL injection is one of the most prominent vulnerabilities for web-based applications. In last article, we’ve used viSQL through which we scanned the whole server for SQL Injection vulnerabilities with the help of…

Read more

Hack Windows/Linux using ARCANUS Framework – 100% FUD

ARCANUS is a customized payload generator/handler for penetration testing only. You can easily generate a payload for both OS i.e. Windows and Linux distributions with just a single click. The latest version of…

Read more

OWASP VBScan – A Black Box vBulletin Vulnerability Scanner

vBulletin is a professional, affordable community forum solution. It gives you an instant community that lets your users to interact, take part in discussions, ask questions, give answers and express opinions. The latest…

Read more

Scan SQL Injection vulnerability on whole server

SQL injection occurs when an application processes user-provided data to create an SQL statement without first validating the input and then submits the statement to a database server for execution. When successfully exploited, SQL injection can give…

Read more

Complete Understanding of Web Application Security – 2017

1. Vulnerabilities There are many types of attack vectors a malicious user might use to exploit a web application and when dealing with a large web site, it is often impossible to secure…

Read more

Turn Your Blog into a Money Making Business

Blog monetization has become increasingly popular over the last 10 years. While previously people used to run a blog as a side profession, it has now become a full-fledged source of income for…

Read more

Ethereum | Enigma Investment Platform Hacked – $470,000 stolen

Ethereum is the 2nd most popular cryptocurrency after the bitcoin. The current value of Ethereum for today is $321 approximately. According to latest news, an unknown hacker hacked the Enigma Website which is…

Read more

Some Disgusting Facts of Sarahah Mobile App

Within a span of just 1-2 weeks, Sarahah Mobile App has taken hold in the social media sphere having more than 10 millions Downloads only on Google Play Store. Basically Sarahah is not…

Read more