hacking

Digital Forensics, Part 4: Finding Key Evidence in the Forensic Image

Digital Forensics, Part 4: Finding Key Evidence in the Forensic Image In the previous articles in this series, we captured… Read More

Apple drops controversial lawsuit against Corellium

Apple has dropped a controversial intellectual property lawsuit against virtualization software maker Corelium, days before the case was set to… Read More

What is ethical hacking ?

Ethical hacking includes an authorized attempt to gain unauthorized access to a computer system, application or data. Ethical hacking involves… Read More

Offensive Security Tool: DroneSploit

Offensive Security Tool: DroneSploit || This CLI framework is based on sploitkit and is an attempt to gather hacking techniques… Read More

Facebook Hacking Tricks 2021 | Facebook hack

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them Despite the security concerns that have… Read More

National Portrait Gallery hit by 350,000 email attacks in three months

The National Portrait Gallery was targeted by 347,602 emails containing spam, phishing and malware attacks in the last quarter of… Read More

Hiding Files using NTFS Streams

Hiding Files using NTFS Read More

How An Artist Used Smartphones To Fake A Traffic Jam On Google Maps itjd

The Artist Used Smartphones To Fake A Traffic Jam Call it bizarre but German artist Simon Weckert posted a video… Read More

Jeff Bezos Hack: WhatsApp Is Dangerous, Says Telegram Founder Pavel Durov

Pavel Durov, founder of private instant messaging app Telegram, has said that Amazon founder and CEO Jeff Bezos could not… Read More

SpiceJet Database Breach Exposure Details Over 1.2 Million Passengers: Report

SpiceJet was reportedly affected by a security flaw that exposed personal details of more than 1.2 million passengers, including flight… Read More

Social Captain Bug Exposed Instagram Profile and Password

The startup that has helped Instagram users gain popularity has inadvertently lost its security, with the service social captain inadvertently… Read More

TikTok Could Exploit Or Delete Users’ Personal Data

Multiple TikTok Vulnerabilities Could Exploit Or Delete Users’ Personal Data The social media craze Tiktok has now made for news… Read More

What is BurpSuite || BurpSuite Tutorial PDF(2023) Free Download

WHAT IS BURP SUITE Burp Suite is a Java-based web penetration testing framework. It has become an industry standard suite… Read More

The Best $1000 Gaming PC BUILD 2023

With this build, our main goal was to provide the best gaming PC for under $ 1,000! It is at… Read More

Exploring Metasploit Auxiliary Modules FTP

Welcome back, my hacker novitiates! In previous guides, we have used one of the most powerful hacking platforms on the… Read More