Hi, In this video I have covered the following topics: What is pkexec How pkexec works Demonstration of Privilege Escalation using SUID pkexec STEPS to Achieve Root Access https://youtu.be/ytRokFfjW-E
Hello everyone, In this video, I will be showing you how to perform recon for bug-bounty!
Hey guys, In this video, I will cover how to solve capture the flag (CTFs) challenges using Sn1per.
Phishing is a technique commonly used by hackers all over to steal credentials. Usernames, and passwords are the most important information that hackers tend to be after, but it can include other sensitive information as well. BlackEye is a tool …
Hello everyone, In this video, I will show you how to create a custom reverse shell in PHP.
Hello everyone! Hope you are doing great, I am back again with a new video on the Malware Development Series, Today we are going to code a very basic reverse shell in C using socket programming. We will take a …