500+ Free Directory Submission Sites List 2023 Directory submission sites is the process of submitting a website’s link to a directory of websites, organized by category. These directories can …
“Can you use directory submission for SEO?” This question is the most common one asked on forums that I’ve come across. Directory Submission: Meaning, Importance, And Tips To Level Up Your …
Digital Forensics, Part 3: Recovering Deleted Files In the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device …
Digital Forensics, Part 2: Live Memory Acquisition and Analysis In some cases, the forensic investigator will need to grab an image of the live memory. Remember, RAM is volatile …
Digital Forensics, Part 1: Capturing a Forensically Sound Image Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and …
Video Downloader Plus Chrome Extension Hijack Exploit Note: This post is going to be a bit different from the previous Chrome extension vulnerability writeups. I’m going to actually walk …
In this tutorial we will be importing the CVE-2015-5122 (Adobe Flash opaqueBackground Use After Free) zero day Flash Exploit module in Metasploit and have a vulnerable setup download the malicious …
Websploit is an open-source tool for carrying out web-based attacks. It is a framework that can be used for various purposes, such as scanning, spoofing, and exploitation. One of …
Websploit Directory Scanner Websploit is a tool that is used to directory Scanner and files on a web server. It is designed to allow users to discover and enumerate …
HTTP Injector Maintaining your privacy on your mobile phone So you’ve heard all those stories about the NSA surveillance, Government-sponsored hacking; well, even the open Wi-Fi networks at restaurants …
Analyze Mobile Application Vulnerabilities with MobSF There are millions of mobile applications available for Android and iOS users. The download statistics of many of these applications are quite remarkable. …
How to Setup Cuckoo Droid Android Malware Analysis System Cuckoo sandbox is an open-source malware analysis system that can perform the dynamic and static analysis of PC files in …
Mobile Hacking Part 2: Mobile v.s. Desktop Welcome back everyone! In the first part of this series we discussed a basic overview and built our very own Pwn Phone. Now that …
Intro to USB Rubber Ducky for Keystroke Injection Welcome back hackers! Today we’re going to be continuing our mobile hacking series with the introduction of some special equipment. We’re …
Why Androwarn is the best android app source code analyzer Many Android applications (apps) ask for different kinds of permissions during installation. Currently, there are more than 200 types …
Intercepting HTTP and HTTPS / SSL Mоbile traffic using Burp Suite Burp Suite is a interceptiоn and web prоxy tооl tо perfоrming security testing оf web applicatiоns tо finding …