Today I will discuss the top 10 hacking tools used in 2019. These tools can be installed on most operating systems (Windows, Linux or OS X) and are easy to use. I compiled this list of tools based on their …
This video shows how to manually import exploits to the Metasploit framework, as an example we’ll import the apple mac os x feedback assistant race condition privilege escalation exploit CVE: 2019-8565, so the main aim here is to teach you …
Recently a Facebook announced that their popular messaging application Whatsapp has been vulnerable to a remote code execution for quite sometime now (CVE-2019-3568) , you should immediately update yours if you have it installed to 2.19.34 if you have an …
We all know that we need to set up port forwarding if we want to allow access to our machine or receive connections outside the local network, the problem is some ISPs block port forwarding and some don’t even have …
As we know WPA2 has been the latest and greatest in terms of WiFi security for a long time now, you might have also already heard about WPA3 and how its going to replace WPA2 as its more secure. Now …
We all know how burp proxy can be very useful to intercept and modify requests sent from applications to a server or to an API, this of-course is very useful to help understand how a specific application works, how it …