Home Blog Page 4

How to Use X-XSS-Protection for Evil

Two important headers that can mitigate XSS are: X-XSS-Protection Content-Security-Policy So what is the difference? Well browsers such as Internet Explorer and Chrome include an “XSS auditor” which attempts to...

Run Kali Linux on Windows 10 – Download From Windows Store

Kali Linux - the most used penetration Linux Distro is now available on Windows 10 to run Natively, download via Windows store. Great news for hackers, the most used Penetration based Operating System by Hackers...

Information Gathering : First Step to Hacking

Information Gathering is the first step towards hacking. It is knowing the System, Person or the victim we are targeting in order to be more precise. The work we do in this section is...

Making A Simple Virus in Python

Python Virus !! Lets code a simple Virus easily in Python, Python, as you know, is widely used by Hackers to code different scripts to ease their task, Now let us Make a Virus...

Xnspy: The iPhone 7 Spying App Review

Spying apps have a relatively tough job. Everyone needs an iOS spy app without jailbreak, but everyone is looking for something different out of them. While one would want to have a look at...

Downloading iMessage for PC Without Ugly Emulators: A Complete Guide

iMessage seems nothing less than some sort of luxury to Windows users for a simple reason that it’s a neat, slick messaging label by Apple and perhaps, never coming to Windows.   A while ago, rumors...

Jailbreak iOS 11 – iOS 11.1.2 Using Electra 5 Easy Steps

iOS Jailbreak software Electra Developer and hacker, coolstar released the Electra jailbreak toolkit for iOS 11 – iOS 11.1.2. The jailbreak toolkit is meant for jailbreak developers so that they can test their tweaks and themes. The...

Loopholes in Aadhaar authentication API services

TLDR: I was able to use Aadhaar demographic authentication API by piggybacking my requests through NSDL servers and abuse the system. Read until the end to find out how. This story is going to be about...

10 Common Mistakes of New / Aspiring Hackers, Pentesters

Hackers Pentesters who are new and aspiring to be good one often make few very common mistakes, here I am sharing them so they may take a note of these.   Only reading books Don’t get us wrong,...

How to Pwn on IPv6

IPv6 is the demon that many testers dare not touch very often as it is still not the norm or widely adopted. Don't get me wrong, it is available(it has been for a while...

Latest article

CEH V10 : Certified Ethical Hacker v10 Lab Tools Download

CEH V10 : Certified Ethical Hacker v10 Lab Tools Download. CEH v10 Lab Tools Download : Certified Ethical Hacker v10 Lab Tools download now,...

Hacking series: Understanding Linux : Part 1

Hello and welcome guys, Many of us struggles to find a starting point for us ,while searching for the resources required for hacking.You maybe searched...

Kali Linux 2018.4 ISO Download

Kali Linux has today release a new ISO for the most famous Hacking / Pentesting Distro Kali Linux 2018.4 . You can download the...

Popular Posts