Hello Everyone, in this video I will be showing you how to use the Browser Exploitation Framework (BEEF):
In this video, I will be showing you an overview of the network attack tool called Fluxion which uses the evil twin attack method to capture the network key. Resources: Fluxion google drive download link: https://drive.google.com/file/d/1Oy2QV8SCAPWxOXSKGotBrc_2oP_LtV34/view
Hello Everyone, In this video, I will be showcasing basic Mail and Phone OSINT techniques:
This video will teach you what is SQL Injection vulnerabilities, how to discover then and how to exploit them to access database records such as usernames and passwords. Resources: SQL injection Cheatsheet
In this video, I will be showing you an overview of the IP location tracker in IPlogger. Enjoy the video 🙂 IP Logger website: https://iplogger.org/
Hello Everyone, In this video will be talking about how to handle sensitive information disclosure: