Hello everyone, In this video, I will be showing you part 2 of how to perform recon for bug-bounty!
Hello everyone, this is the first video of the ransomware development Series. In this video, I have explained the basics of cryptography and how to encrypt and decrypt files using fernet module in python.
Hi, In this video I have covered the following topics: What is pkexec How pkexec works Demonstration of Privilege Escalation using SUID pkexec STEPS to Achieve Root Access https://youtu.be/ytRokFfjW-E
Hello everyone, In this video, I will be showing you how to perform recon for bug-bounty!
Hey guys, In this video, I will cover how to solve capture the flag (CTFs) challenges using Sn1per.
Phishing is a technique commonly used by hackers all over to steal credentials. Usernames, and passwords are the most important information that hackers tend to be after, but it can include other sensitive information as well. BlackEye is a tool …