Hello guys, In this video, I will be going through an interesting subject which is post exploitation file transfers.
Introduction Hello hackers, this is Gowtham here an Ethical Hacker and Penetration Tester who loves to investigate loopholes😅. This is my first blog out here on Internet, So Kindly forgive me if there are any mistakes. So today, I am …
Hey guys, In this video, I will go over how to obfuscate malware to make it undetectable. https://www.youtube.com/watch?v=buaBfA0vxYs Resources: ScreenView Phantom-Evasion MsfMania Veil Xeexe-TopAntivirusEvasion GlidingSword
Hello all, In this video, we are going to discuss Linux Privilege Escalation and specifically, we are going to talk about Kernel Exploits and how to use them to gain root access on a Linux system. This is part one …
Hey guys, In this video, I will show you how to use a Python script to write a hash decryptor.
In this post, we are going to build a responsive chat web application using PHP, MySQL and HTML/CSS. Also, we are going to learn how to configure MySQL database for storing data in web application and using PHP we will …