Tech Articles

18 Things to do after fresh installation of Windows 10

Microsoft Windows 10 brings a long list of important changes that any IT pro should look forward to, including major improvements in the user experience, significant security enhancements, and a new web browser i.e. Microsoft Edge. In Windows 10, users can take advantage of rich, new Windows apps on a traditional desktop PC or laptop, […]

Tech Articles

Windows 10 Shortcuts – 2018 Update

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. We use the following keyboard shortcuts every day: Base Key + Combination Result + A Open action center + C Launch Cortana Assistant in listening mode + S Search […]

Tech Articles

Top 10 Features – Windows 10 Fall Creators Update (Must See)

Windows 10 is one of the most stable and secured operating system ever released from Microsoft and now this time by 17th October, Microsoft rolled out Windows 10 Fall Creators Update (10 AM P.T) across the world. This new fall creators update will definitely provides you a high quality experience. For the best experience, we […]

Tutorials

Creating an undetectable payload using Veil-Evasion Toolkit

In previous tutorials, we used msfvenom for generating various payloads but now a days AV companies coded a signature for the templates these schemes uses so to bypass AV, today we’ll use another framework called as Veil-Evasion Framework. Veil-Evasion is a tool designed to generate metasploit payloads that bypass common Anti-Virus solutions. To install Veil-Evasion, […]

Tutorials

Generate 100% FUD Backdoor with TheFatRat – Windows 10 Exploitation

As you all knows, Windows 10 is the latest edition of Microsoft having great security features but what if someone send a trojan/virus/backdoor/payload which is 100% FUD (Fully Undetectable) ? So basically, with the help of TheFatRat, you can easily develop a Trojan or backdoor and perform various post exploitation methods like Browser Hijacking, DDL […]