Tutorials

Useful Windows Run Commands – Part 2 (With Screenshots)

On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface. In other language, the Run command is used to run applications via terminal commands. S.No Command Syntax Description Screenshot (POC) 21 services.msc […]

Latest Stuff

How to Enable Self-Signed Certificates for Local Apache Webserver – LINUX

This article describe how to quickly enable SSL for local apache web server under Linux. This has been done on …
Read More

How To Decode Base64 In Most Popular Programming Languages

Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating …
Read More

Target’s Twitter Account Compromised – Posted Fake Promoted Ad [Bitcoin Scam]

Twitter and Social networks are a very powerful way to market your business. This time, Twitter was compromised with a …
Read More

A to Z Programming Notes – By GoalKicker.com

Are you looking for the Best Free Programming eBooks on PHP, Python, Ruby, Java etc? Choose from over 40+ eBooks …
Read More

Top 23 Android Static Analysis Tools – 2018 Compilation

Traditional attacks like phishing, and newer twists like vishing, also impact mobile security. Mobile media adoption is huge when it comes …
Read More

Top 14 Online APK Analyzers for Android – 2018 Compilation

Last year, Google itself launched Google Play Protect Service which provides an extra layer of security to all users. Although …
Read More

Tips and Tricks For Outreach: Small Details That Will Warm Up Your Leads

Why is it important to reach out to many people? What are you doing to warm up your leads? Have …
Read More

Online Port Scanning – Top 5 Resources

In the context of penetration testing, Port Scanning is usually performed to identify open ports against any target machine. Open …
Read More

6 Linux Distributions For Forensics Investigation

Over the past 2-3 years, we’ve seen a dramatic increase in sophisticated attacks against organizations. Cyber attacks originating from China, …
Read More

OSINT Resources List 2018 Compilation – Exploits & Vulnerabilities Search

OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT …
Read More

Online Safety Quiz Yeahhub

Python Built-in Functions Types of DOS Attack
Kioptrix All Levels CTF Challenges
Wireless Networking Q&A
Information Security Abbrevations

Online Safety Quiz Yeahhub

Advanced Hacking Tutorials Yeahhub