Hello everyone, In this video, I will be showing you how to perform recon for bug-bounty!
Hey guys, In this video, I will cover how to solve capture the flag (CTFs) challenges using Sn1per.
Phishing is a technique commonly used by hackers all over to steal credentials. Usernames, and passwords are the most important information that hackers tend to be after, but it can include other sensitive information as well. BlackEye is a tool …
Hello everyone, In this video, I will show you how to create a custom reverse shell in PHP.
Hello everyone! Hope you are doing great, I am back again with a new video on the Malware Development Series, Today we are going to code a very basic reverse shell in C using socket programming. We will take a …
Hey guys, In this video, I have covered the following topics: What is log4j Log4j Vulnerability (CVE: 2021-44228) Mitigation or Fix What is LDAP (Lightweight Directory Access Protocol) What is JNDI (Java Naming & Directory Interface) How Exploit or Payload …