Category: hacks

security logo
0 446  0 Comment on Top 4 tools to automate SQL Injection vulnerabilities

Top 4 tools to automate SQL Injection vulnerabilities

space desk office pattern
0 387  0 Comment on A storytelling framework, for authoring, business, life and psycology

A storytelling framework, for authoring, business, life and psycology

a person sitting on the floor with vr goggles using a computer
0 455  0 Comment on Writing a Linux Kernel Remote in 2022

Writing a Linux Kernel Remote in 2022

0 668  0 Comment on Beginners Guide to 0day/CVE AppSec Research

Beginners Guide to 0day/CVE AppSec Research

numbers projected on face
0 875  0 Comment on Log4Shell — Under Active Attack

Log4Shell — Under Active Attack

0 338  0 Comment on Raise privileges in windows 10 and 11

Raise privileges in windows 10 and 11

0 230  0 Comment on How to Create a Nearly Undetectable Backdoor with Cryptcat

How to Create a Nearly Undetectable Backdoor with Cryptcat

0 216  0 Comment on WebSite Hacking Secrets

WebSite Hacking Secrets

0 189  0 Comment on How To Protect Your PC From Hackers?

How To Protect Your PC From Hackers?

0 223  0 Comment on Easy hacker guide

Easy hacker guide

0 225  0 Comment on South Korean Malware Attack

South Korean Malware Attack

0 292  0 Comment on Check vulnerable reverse shell CGI (shellshock)

Check vulnerable reverse shell CGI (shellshock)

0 271  0 Comment on Web server attack tools

Web server attack tools