Phishing is a technique commonly used by hackers all over to steal credentials. Usernames, and passwords are the most important information that hackers tend to be after, but it can include other sensitive information as well. BlackEye is a tool …
Hello everyone, In this video, I will show you how to create a custom reverse shell in PHP.
Hello everyone! Hope you are doing great, I am back again with a new video on the Malware Development Series, Today we are going to code a very basic reverse shell in C using socket programming. We will take a …
Hey guys, In this video, I have covered the following topics: What is log4j Log4j Vulnerability (CVE: 2021-44228) Mitigation or Fix What is LDAP (Lightweight Directory Access Protocol) What is JNDI (Java Naming & Directory Interface) How Exploit or Payload …
Hey guys, In this video, I will show you an awesome automated framework that allows us to pen-test websites.
In this video I have covered the following topics Address Resolution Protocol (ARP) IP Address & MAC Address ARP Request & ARP Response ARP Cache ARP Spoofing/Poisoning Demonstration of ARP Spoofing/Poisoning Attack Why & How ARP Spoofing Works What Can …