Category: hacks

1 321  0 Comment on Upgrade Your Internet in 2 Minutes: Why (and How) to Change Your Router’s DNS

Upgrade Your Internet in 2 Minutes: Why (and How) to Change Your Router’s DNS

security logo
0 661  0 Comment on Top 4 tools to automate SQL Injection vulnerabilities

Top 4 tools to automate SQL Injection vulnerabilities

space desk office pattern
0 583  0 Comment on A storytelling framework, for authoring, business, life and psycology

A storytelling framework, for authoring, business, life and psycology

a person sitting on the floor with vr goggles using a computer
0 661  0 Comment on Writing a Linux Kernel Remote in 2022

Writing a Linux Kernel Remote in 2022

0 945  0 Comment on Beginners Guide to 0day/CVE AppSec Research

Beginners Guide to 0day/CVE AppSec Research

numbers projected on face
0 1339  0 Comment on Log4Shell — Under Active Attack

Log4Shell — Under Active Attack

0 489  0 Comment on Raise privileges in windows 10 and 11

Raise privileges in windows 10 and 11

0 388  0 Comment on How to Create a Nearly Undetectable Backdoor with Cryptcat

How to Create a Nearly Undetectable Backdoor with Cryptcat

0 336  0 Comment on WebSite Hacking Secrets

WebSite Hacking Secrets

0 302  0 Comment on How To Protect Your PC From Hackers?

How To Protect Your PC From Hackers?

0 331  0 Comment on Easy hacker guide

Easy hacker guide

0 323  0 Comment on South Korean Malware Attack

South Korean Malware Attack

0 421  0 Comment on Check vulnerable reverse shell CGI (shellshock)

Check vulnerable reverse shell CGI (shellshock)

0 427  0 Comment on Web server attack tools

Web server attack tools