preloader

CYBER SECURITY

  • November 25, 2021

Windows Privilege Escalation: Boot Logon Autostart Execution (Startup Folder)

[ad_1] Windows Startup folder may be targeted by an attacker to escalate privileges or persistence attacks. Adding an application to a startup

Read More
  • November 25, 2021

Windows Privilege Escalation: Logon Autostart Execution (Registry Run Keys)

[ad_1] If an attacker finds a service that has all permission and its bind with the Registry run key then he can

Read More
  • November 25, 2021

Powercat for Pentester

[ad_1] Introduction Powercat is a simple network utility used to perform low-level network communication operations. The tool is an implementation of the

Read More
  • November 25, 2021

Windows Privilege Escalation: HiveNightmare

[ad_1] Introduction CVE-2021-36934 also known as SeriousSAM and HiveNightmare vulnerability was discovered by Jonas Lykkegaard in July 2021. Due to an ACL

Read More
  • November 25, 2021

Msfvenom Cheatsheet: Windows Exploitation

[ad_1] In this post, you will learn how to use MsfVenom to generate all types of payloads for exploiting the windows platform.

Read More
  • November 25, 2021

How Hackers Access Server Using Command Injection » TechNoCP

[ad_1] Hi Hackies, Today I am going to introduce a new thing about hacking ‘OS Command Injection’. This is also known as

Read More
  • November 25, 2021

What Is XXE Injection? |How Hackers Do It. » TechNoCP

[ad_1] Hello Hackies, In this article I’ll explain about XML external extity (XXE) injection.This is similar to SQL and HTML injection and

Read More
  • October 19, 2021

Ethical Hacking Hindi Course for Beginner

Training Summary An Ethical Hacker exposes vulnerabilities in software to help business owners fix those security holes before a malicious hacker discovers

Read More
  • October 18, 2021

Cybersecurity Frameworks That Help Reduce Cyber Risk

In this article we will discuss about Cybersecurity Frameworks That Help Reduce Cyber Risk. Today, it’s virtually inevitable that digital technology and

Read More