Hacking

Termux Commands List (Updated)

What are Termux Commands? in simple words, Termux Commands are the terminal commands, which is executed to perform a particular tas…

5 ways to detect a fake ransomware demand

Ransomware is one of the most dangerous types of cybercrime today. Ransomware is infuriatingly in-your-face, in contrast to many stealth-based…

Air India Confirms the Data Breach Which Impacts 4.5 Million Passengers Data

Air India admits the data breach, they said SITA's Passenger Service System (PSS) was hacked and compromised the personal data of about 4.5…

Mobikwik Data Breach Explained

Data Breaches are not new to India, This is the story of A Digital wallet and Financial Company of India This year Mobikwik faced a Cyber A…

Dominos Data Breach: Here what you need to know

Dominos one of the largest Pizza delivery Company suffered from a data breach this year, The company claims no financial data was compromised i…

OWASP Top 10 : Security Vulnerabilities Explained 2021

OWASP TOP 10 VULNERABILITIES EXPLAINED 2021 EDITION. Hello there, Techncyber readers, In today's blog, I gonna tell you about OWASP TO…

How To Use Metasploit In Termux

Hello there, Techncyber readers, In today's blog, I gonna tell you about Metasploit-framework means how to install it in Termux and…

How To Install IP Geolocation in Termux

Hello there, Today in this tutorial I will be writing on how to install and use IP Geolocation tool in Termux I hope you guys are familiar…

How To Install Cmatrix In Termux

Hello there, Techncyber readers, In today's blog, I gonna tell you about CMatrix and how to install it in Termux. CMatrix is a simpl…