Hey guys, In this video, you will learn how to accurately locate smartphones using social engineering through a tool called Seeker. I will be showing you how to set up Seeker and locate smartphones that are outside the network. You …
Hello everyone, Hope you all are doing great! Today, I am back with an awesome video on Active Directory. In today’s video, I am going to show you how you can use PowerView to enumerate Active Directory! Make sure to …
Hello Everyone, In this article, I will be showing you how to hack an Apple Computer using an empire stager. There are various stagers that can be used with empire but in this article I want to focus on OSX/applescript. …
This video shows how to easily expose local services to the internet without router access, without 3rd party software and without registration. So you can use this to expose a local web server such as apache2, use BeEF over wan …
Hello guys, In this video, you will learn more about github recon and how to use it for bugbounty hunting.
Hi! I’m a pentester and a bug bounty hunter who’s learning everyday and sharing useful resources as I move along. Resources: SCAN AN ANDROID APP USING OVERSECURED’S SCANNER: DOWNLOAD ADB: DOWNLOAD JADX DOWNLOAD ANDROID STUDIO GITHUB REPOSITORY FOR THE VULNERABLE …