Cyber Security

Shadowhacker Hit The Headlines with Indian Railways Data

Shadowhacker, the well-known hacker/hacker group, claims to be breached the Indian Railways Booking portal. This time, Shadowhacker are selling 30 Mi…

Capture Android Traffic Remotely With Wireshark

Android network traffic interception is a process of capturing and analyzing network traffic that is transmitted or received by an Android device. Th…

Hackers Selling Access To CoWin Portal in The Dark Web

CoWin Indian's digital platform seems to be in Hacker's hands. Hackers Selling Access To CoWin Portal in a popular Underground forum.  CoWin …

Getting Started With Android App Pentesting

In this blog post will discuss everything you need to know as an Android app penetration tester. Whether you are a Bug bounty hunter, a working …

How to use sqlmap in termux

Hello there, In this tutorial, we will be discussing how to install and use Sqlmap in termux What is Sqlmap? Sqlmap is an automatic SQL Inj…

Termux Commands List 2023

What are Termux Commands? in simple words, Termux Commands are the terminal commands, which is executed to perform a particular tas…

India's New Data Protection Bill, All You Need To Know

As a Cyber Security Expert, I was concerned about the Data Protection Bill of India, and, Finally, The Ministry of Electronics and Information Techno…

Hackers Posted 70GB of Files Related To Tata Power For Free

Tata Power, India's Largest power supply company, has faced a cyber attack this year. This story is about how the hackers gained access to the co…

Bug Bounty Tools that I use as a Bug Bounty Hunter

In this article, I will share the best bug bounty tools I personally use as a Bug bounty hunter. Of course, hundreds of tools exist for Prof…

How to use L3mon Rat [Tutorial]

Hello guys. In this tutorial, we will be discussing how to use the L3MON Rat. If you are entirely new to this RAT, then follow this tutorial car…

10 Ways to Secure Your Business Email: The Ultimate Guide

The rise of cloud services has made it easier than ever for businesses to operate and collaborate remotely. This has also led to a surge in the use o…

Exploiting SQL Injection at Authorization token

Today In this post, I will be sharing a unique writeup on SQL injection with Authorization Headers token. A little bit intro to Authori…

10 essential Linux tools for network and security pros

It isn't easy to include only ten Linux open source security solutions, notably while network experts and security analysts have access to dozens…