Browsing Category
Tutorials
95 posts
How To Run Applications More Efficiently on Linux Server
[ Editor’s note: There are known limitations to CPU pinning in some environments, so be sure to read…
HOCSQLI Automatic SQL Injection Vulnerability Scanner
Today, we are presenting our own Cyber Intelligence suite HOCSQLI. An Automatic (SQL Injection) vulnerability scanner along with…
How To Capture PCAP Logs With Wireshark
Today, we are working to capture the PCAP LOGS with the help of Wireshark. Organization following logs are…
Metasploit Tutorial – How To Write Auxiliary Module?
Metasploit Tutorial Auxiliary module Metasploit is known for its free, open-source exploits – modules that pop shells. But…
RecoX: Scripts For Web Application Reconnaissance
RecoX, an open source software a collection of master scripts for Web Application Scanning. The script aims to…
Turbinia – Automation And Scaling of Digital Forensics
Turbinia is an open-source framework for deploying, managing, and running distributed forensic workloads. It is intended to automate…
HOCXSS Automatic Cross Site Scripting XSS Vulnerability Scanner
Today, we are presenting our own Intelligence HOCXSS Automatic (Cross Site Scripting) vulnerability scanner along with the complete…
Android Root Detection Bypass – Tutorial
Root detection bypass by Objection and Frida Tutorial by Sakshi Sharma, a Cyber Security consultant. What is Root…
Google Bug Bounty $3133 Writeup XSS Vulnerability
$3133.7 Google Bug Bounty Writeup XSS Vulnerability. The vulnerability was found by Pethuraj, he is a security researcher…
SQL Injection Cheat Sheet 2022
SQL Injection Cheatsheet is the great source to find the vulnerabilities and help to protect your website. SQL…