Learn how to send phishing emails with ANY sender and land in the inbox with the aid of AI and how to protect yourself and your organisation from phishing.
This video will teach you what is SQL Injection vulnerabilities, how to discover then and how to exploit them to access database records such as usernames and passwords. Resources: SQL injection Cheatsheet
I have been teasing this for a while now on our social media and I did mention in our last 2 blog posts that we have so much cooking in the background. Today I’m so happy to finally announce the …
This is a walkthrough showing how to hack the grandpa machine from hackthebox, escalating privileges to system and reading the root flag.
Previously I made a video giving my own opinion on the best hacking operating system, we compared Kali, Parros OS and more. In my opinion the best option is to make your own hacking OS, so in this video I …
This video shows how to manually create an evil twin network to steal WiFi password / key of a target network. The same method can be used to start a normal fake AP / honeypot for other uses. Resources: Commands. …