Category: hacks

security logo
0 247  0 Comment on Top 4 tools to automate SQL Injection vulnerabilities

Top 4 tools to automate SQL Injection vulnerabilities

space desk office pattern
0 160  0 Comment on A storytelling framework, for authoring, business, life and psycology

A storytelling framework, for authoring, business, life and psycology

a person sitting on the floor with vr goggles using a computer
0 257  0 Comment on Writing a Linux Kernel Remote in 2022

Writing a Linux Kernel Remote in 2022

0 278  0 Comment on Beginners Guide to 0day/CVE AppSec Research

Beginners Guide to 0day/CVE AppSec Research

numbers projected on face
0 481  0 Comment on Log4Shell — Under Active Attack

Log4Shell — Under Active Attack

0 201  0 Comment on Raise privileges in windows 10 and 11

Raise privileges in windows 10 and 11

0 131  0 Comment on How to Create a Nearly Undetectable Backdoor with Cryptcat

How to Create a Nearly Undetectable Backdoor with Cryptcat

0 120  0 Comment on WebSite Hacking Secrets

WebSite Hacking Secrets

0 98  0 Comment on How To Protect Your PC From Hackers?

How To Protect Your PC From Hackers?

0 117  0 Comment on Easy hacker guide

Easy hacker guide

0 115  0 Comment on South Korean Malware Attack

South Korean Malware Attack

0 126  0 Comment on Check vulnerable reverse shell CGI (shellshock)

Check vulnerable reverse shell CGI (shellshock)

0 143  0 Comment on Web server attack tools

Web server attack tools