NoSQL stands for Not Only SQL and it offers developers a flexible schema that can be changed on demand if required to manage data. Usage of NoSQL opens up a whole new attack surface especially when it comes to injection …
Hey guys, This video shows you how to edit malware source code in a way to bypass antivirus programs. Resources: GlidingSword Github Repo.
Hey guys, In this video, I will talk about the 0day industry, and why emergency security updates happen every week!
What is RFID? RFID or Radio-frequency identification is the use of radio waves to read and capture information stored on a tag attached to an object. In this video, you’ll learn how to use your Arduino as an RFID cloner/reader …
Hello everyone, Hope you are doing great, In today’s video, I will show you the usage of CrackMapExec, CrackMapExec is a really great tool which can be used for bruteforcing various services, It is used a lot while pentesting active …
This video teaches you how to package powershell commands in a batch file and compile it to an executable to download and execute files. This can be used in many scenarios such as creating trojans, or combining a number of …