Cyber Security

Get IP address of a person during a Telegram Audio Call

You can get the IP address of a person whom you are calling through telegram. Though this was not a new bug, this bug has been there since 2018,…

Emerging Biometric Security Trends: Enhancing Data Protection and Authentication

In today's technologically driven society, safeguarding sensitive data and ensuring secure access are paramount concerns. The exponential growth …

Transforming Access: The Power of Biometrics

Introduction: The Rise of Biometric Technology Biometric technology has been rapidly growing in popularity across various sectors, revolutionising …

Shadowhacker Hit The Headlines with Indian Railways Data

Shadowhacker, the well-known hacker/hacker group, claims to be breached the Indian Railways Booking portal. This time, Shadowhacker are selling 30 Mi…

Capture Android Traffic Remotely With Wireshark

Android network traffic interception is a process of capturing and analyzing network traffic that is transmitted or received by an Android device. Th…

Hackers Selling Access To CoWin Portal in The Dark Web

CoWin Indian's digital platform seems to be in Hacker's hands. Hackers Selling Access To CoWin Portal in a popular Underground forum.  CoWin …

Getting Started With Android App Pentesting

In this blog post will discuss everything you need to know as an Android app penetration tester. Whether you are a Bug bounty hunter, a working …

How to use sqlmap in termux

Hello there, In this tutorial, we will be discussing how to install and use Sqlmap in termux What is Sqlmap? Sqlmap is an automatic SQL Inj…

Termux Commands List (Updated)

What are Termux Commands? in simple words, Termux Commands are the terminal commands, which is executed to perform a particular tas…

India's New Data Protection Bill, All You Need To Know

As a Cyber Security Expert, I was concerned about the Data Protection Bill of India, and, Finally, The Ministry of Electronics and Information Techno…