Packet Sniffers

Best 5 Packet Sniffers for Bandwidth & Network Traffic Analysis

Packet sniffer  also known as network protocol analyzers, are tools that allow users to monitor and analyze network traffic. They can be used for a variety of purposes, including troubleshooting, performance monitoring, and security analysis. There are many different packet sniffers available, but the following five are considered to be among the best for bandwidth…

Read More
India Business Listing Sites List

India Business Listing Sites List 2023

India Business Listing Sites List S.NO WEBSITE LINK TYPE 1 https://www.freeadstime.org/ DoFollow 2 https://www.giganticlist.com/ DoFollow 3 https://www.advertiseera.com DoFollow 4 https://www.h1ad.com DoFollow 5 https://www.classifiedsfactor.com/ DoFollow 6 https://www.wallclassifieds.com/ DoFollow 7 https://www.rectanglead.com DoFollow 8 https://www.indiamart.com/ DoFollow 9 https://www.sulekha.com DoFollow 10 https://www.justdial.com DoFollow 11 https://www.grotal.com DoFollow 12 https://www.tradeindia.com DoFollow 13 https://www.asklaila.com/Delhi-NCR/ DoFollow 14 http://www.trade4india.com DoFollow 15 https://www.exportersindia.com DoFollow 16…

Read More
directory submission

Directory Submission: Meaning, Importance, And Tips To Level Up Your SEO Game

“Can you use directory submission for SEO?” This question is the most common one asked on forums that I’ve come across. Directory Submission: Meaning, Importance, And Tips To Level Up Your SEO Game After several years of experience, I would say that directory submission is one of the easiest ways to acquire high-quality and unidirectional links. Undoubtedly, directories…

Read More
Digital Forensics

Digital Forensics, Part 1: Capturing a Forensically Sound Image

Digital Forensics, Part 1: Capturing a Forensically Sound Image Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the security engineer needs to know how to find it. These skills are applicable to law enforcement, corporate investigations, network intrusions, malware analysis and incident response,…

Read More
Video Downloader Plus Chrome Extension Hijack Exploit

Video Downloader and Video Downloader Plus Chrome Extension Hijack Exploit – UXSS via CSP Bypass (~15.5 Million Affected)

Video Downloader Plus Chrome Extension Hijack Exploit Note: This post is going to be a bit different from the previous Chrome extension vulnerability writeups. I’m going to actually walk through the code along with you to show you how tracing through an extension generally works. For this reason the whole thing is a bit lengthy….

Read More
Metasploit CVE-2015-5122 Flash Exploit Tutorial

Metasploit CVE-2015-5122 Flash Exploit Tutorial

In this tutorial we will be importing the CVE-2015-5122 (Adobe Flash opaqueBackground Use After Free) zero day Flash Exploit module in Metasploit and have a vulnerable setup download the malicious Flash file. Recent versions of Adobe Flash Player contain critical vulnerabilities within the ActionScript 3 ByteArray, opaqueBackground and BitmapData classes. Exploiting one of these vulnerabilities could allow…

Read More
Websploit Cloudflare Resolver module

Websploit Cloudflare Resolver module

Websploit is an open-source tool for carrying out web-based attacks. It is a framework that can be used for various purposes, such as scanning, spoofing, and exploitation. One of the modules in Websploit is the Cloudflare Resolver module, which is designed to bypass Cloudflare’s security measures and reveal the true IP address of a website…

Read More

How to Analyze Mobile Application Vulnerabilities with MobSF

Analyze Mobile Application Vulnerabilities with MobSF There are millions of mobile applications available for Android and iOS users.  The download statistics of many of these applications are quite remarkable. However, the large number of downloads does not guarantee the safety of any application. For instance, the SHAREit is a famous data-sharing application with over one billion users….

Read More