Vulnerabilities

This Facebook Vulnerability Allows You to Hack Any Profile

Summary: This post is about a simple vulnerability found on Facebook which could have been used to hack into other user’s Facebook account easily without any user interaction. This gave…

Read More

Pentest Course Part 2: Wireshark Basics

In the first part we introduced you to our Pentest Course. This is 2nd part and we will get into network sniffing and basics of communication protocols. Subscribe to our…

Read More

Network Spoofer – Android App For Hackers

Network spoofer is an android app that allows you to intercept and modify a WiFi network traffic. It is a simple tool that can be used to perform multiple spoofs…

Read More

Penetrate Pro: Android App For Hackers

Penetrate pro is an android app developed by Biogo Ferreira for hackers. It is an excellent app for decoding WEP/WPA WiFi keys. The latest version of Penetrate pro ( 2.11.1) supports…

Read More

zANTI – Android App For Hackers

zANTI is a penetration testing toolkit developed by Zimperium Mobile Security for cyber security professionals. Basically, it allows you to simulate malicious attacks on a network. With the help of…

Read More

Free Pentest Course Part 1: Introduction to Course and Kali Linux

Few months ago we started working on pentest course based on Ethical Hacking and using Kali Linux. Now we decided to provide it for FREE! From now, every day – NEW…

Read More

[VIDEO] How to Get IP and Location From Facebook/Twitter/G+/Instagram User

  First of all, we have to clearify that It’s not possible to get someone’s IP directly! You have to communicate with your target and use Social Engineering techniques to…

Read More

SQL Injection Tutorial: Part 2/3 – Standard SQL Injection

[NOTE: The Information given below is for Educational Purpose only, and not for malicious purpose. If you wish to carry out any type of malicious activity using this information, you…

Read More

How to Setup Your Own Pentest Lab on VirtualBox

Every hacker or pentester needs to have safe place where he can test new exploits without involving his real working environment. That’s how professional hackers work. Most of them have…

Read More

[VIDEO] Journalist Got Hacked at DEFCON by Best Hackers!

Fusion’s Kevin Roose asked some of the best hackers at DEFCON to do their worst to him. He didn’t even know what was coming. Nowadays there’s a lot of new…

Read More

Page 2 of 3

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password

Register