Whenever you send a request from your browser, the server responds with content along with HTTP response headers. These response headers contain alot of information like Status, Content-Encoding etc. Along…
Category: Tech Articles
Firefox Lockwise: Secured Password Manager for iOS and Android
Your password is your first line of defense in cyber security. Either it’s your Facebook account, personal email account or Internet banking, everything requires a strong password now a days.…
Top 10 Essential CTF Tools for Solving Reversing Challenges
Top 10 Essential CTF Tools for Solving Reversing Challenges 1. Androguard Androguard is a full python tool to play with android files. You can either use the command line or…
Top 10 NMAP Widely Used Commands
One may be curious to understand how the network intruder to know what ports are open on a computer? Or maybe how they detect which services are running in the…
Top 8 Basic Google Search Dorks [Live Examples]
Google is undisputedly the most important search engine in the world today. Google uses a sophisticated and proprietary algorithm for ranking websites that uses over 100 different criteria in the…
Overview of Mobile Learning Platforms
Technology has penetrated into our lives and occupied an important place there. A number of Internet users grows exponentially. This is especially true for a younger generation approaching all innovations…
HTTP to HTTPS WordPress Migration – In-Depth Guide
If you’re in the digital world at all yourself, this isn’t new but we’ve found surprisingly little in the way of a clear, comprehensive, accurate article to add an SSL…
Useful Commands and Tools – OSCP
In previous article, we’ve shared a wide range of tools for sub-domain enumeration which helps pentesters and bug hunters collect and gather subdomains for the domain they are targeting. Enumeration…
7 Stunning WordPress Themes for Mommy Bloggers
Are you a mom wishing to offer advice on everything from raising kids, cooking healthy meals, to changing diapers? Then why not start a WordPress website? You’ll be in good…
Useful Windows Run Commands – Part 2 (With Screenshots)
On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line…
Useful Windows Run Commands – Part 1 (With Screenshots)
On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line…
20 Public DNS Servers Compilation List
Domain Name Service (DNS) is an Internet service that maps IP addresses and fully qualified domain names (FQDN) to one another. In this way, DNS alleviates the need to remember…
Top 10 Vulnerable Android Applications – [Penetration Testing]
In recent years, the smartphone market has witnessed a rapid expansion, and its momentum seems unstoppable. Its accelerated growth is brought on due to the diverse range of applications. Due…
How to Secure your Wi-Fi Network in 10 Steps
Internet users are widely using Wi-Fi devices to access Internet. Every year millions of wireless based devices are sold in the market. Out of these most of the devices are…
Top 10 WordPress Plugins for Blog Monetization
The beauty of WordPress is its extensibility. Some of the WordPress lead developers have said that the most exciting WordPress features are the ones that don’t ship with the software.…
Top 5 Online Ethical Hacking Platforms – 2018 Update
The most visible features of a Web application that intruders will note and immediately seek to exploit are vulnerabilities in the Web server software itself. No matter the simplicity or…
Top 6 Web Application Vulnerability Scanners
A number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of being able to test a large amount of functionality in a…
Stay Safe Online When Using Public Wi-Fi.
You’ll come across public Wi-Fi almost everywhere, in the airport, your favorite coffee shop, and hotels. While public Wi-Fi has made our lives better, it poses a lot of risks…
OSINT Resources List 2018 Compilation – Exploits & Vulnerabilities Search
OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or…
Top 30 Basic NMAP Commands for Beginners
Nmap is a free tool that can be used to conduct various sorts of scans on networks. Normally, when people think of Nmap, they assume it’s used to conduct some…
TCPDUMP: 25 Common Command Examples
Tcpdump is a well known command line packet analyzer tool. Using tcpdump command we can capture the live TCP/IP packets and these packets can also be saved to a file…
Best Free Contact Form Plugins for WordPress
Essential for any website, a contact form is one of the first things to think about for your project. It is important to give your users a voice, to understand…
4 Ways To Protect Your MyBB Forums
MyBB is one of the most widely used open source, intuitive, extensible, and incredibly Forum software out there. The software is recognized for its security as well as it is…
15 Most Useful Host Scanning Commands – Kali Linux
Discovery tools are used to gather information about a target network or system. The tools enable you to easily perform many otherwise manual processes, such as whois queries, DNS zone…
19 Useful NMAP Commands You Should Know
Network Mapper (Nmap) is one of the most effective and functional tools in Kali Linux. Nmap can be used to perform a large range of different scanning techniques and is highly…
Top 15 Python Cheatsheets By Cheatography
Python is a general purpose programming language that is often applied in scripting roles. It is commonly defined as an object-oriented scripting language – a definition that blends support for…