Tutorials

Useful Windows Run Commands – Part 2 (With Screenshots)

On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface. In other language, the Run command is used to run applications via terminal commands. S.No Command Syntax Description Screenshot (POC) 21 services.msc […]

Latest Stuff

How to Install XAMPP in Ubuntu 18.04 Linux

The Apache HTTP Server, colloquially called Apache, is the world’s most used web server software. As of November 2015, Apache …
Read More

Exploitation of UnreaIIRCd 3.2.8.1 by using Metasploit and Perl Script

UnrealIRCd is an open source IRC daemon, originally based on DreamForge, and is available for Unix-like operating systems and Windows …
Read More

Top 10 Vulnerable Android Applications – [Penetration Testing]

In recent years, the smartphone market has witnessed a rapid expansion, and its momentum seems unstoppable. Its accelerated growth is …
Read More

Find Virtual Machine IP Through Kali Linux – 3 Methods

While solving CTF or bug bounty challenges, sometimes you need to find out the IP address of the machine because …
Read More

Wireless Packet Injection Testing Tutorial

If you’re in the market for a wireless network adapter, then you always got confused that which adapter is the …
Read More

How to Secure your Wi-Fi Network in 10 Steps

Internet users are widely using Wi-Fi devices to access Internet. Every year millions of wireless based devices are sold in …
Read More

Top 10 WordPress Plugins for Blog Monetization

The beauty of WordPress is its extensibility. Some of the WordPress lead developers have said that the most exciting WordPress …
Read More

Top 5 Online Ethical Hacking Platforms – 2018 Update

The most visible features of a Web application that intruders will note and immediately seek to exploit are vulnerabilities in …
Read More

[RCE] Exploitation of Microsoft Office/WordPad – CVE-2017-0199 [Tutorial]

A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker …
Read More

100+ SEO Tools For 2018 (Updated List)

Do you ever wonder why some websites seem to rank at the top search engines so easily, while other, seemingly …
Read More

Online Safety Quiz Yeahhub

Python Built-in Functions Types of DOS Attack
Kioptrix All Levels CTF Challenges
Wireless Networking Q&A
Information Security Abbrevations

Online Safety Quiz Yeahhub

Advanced Hacking Tutorials Yeahhub