full screen background image
Search
Wednesday 17 October 2018
  • :
  • :

Malware analysis

Ethical Hacking

Anonymous Surfing

Latest Posts

SQLMap v1.2.10 – Automatic SQL Injection And Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking...

Magic Unicorn – PowerShell Downgrade Attack and Exploitation tool

Magic Unicorn is a simple tool for using a PowerShell downgrade attack and injects shellcode straight into memory. Based on Matthew...

Virtual Private Network: What is it and Why is it So Important To Protect Your Privacy?

Computers and the Internet have become one of the main means of transmitting and processing information. Most of the information on the...

abuse-ssl-bypass-waf: Bypassing WAF by abusing SSL/TLS Ciphers

abuse-ssl-bypass-waf Helping you find the SSL/TLS Cipher that WAF cannot decrypt and Server can decrypt same time Referer article Idea...