Ethical Hacking

Get IP address of a person during a Telegram Audio Call

You can get the IP address of a person whom you are calling through telegram. Though this was not a new bug, this bug has been there since 2018,…

Getting Started With Android App Pentesting

In this blog post will discuss everything you need to know as an Android app penetration tester. Whether you are a Bug bounty hunter, a working …

Termux Commands List (Updated)

What are Termux Commands? in simple words, Termux Commands are the terminal commands, which is executed to perform a particular tas…

Bug Bounty Tools that I use as a Bug Bounty Hunter

In this article, I will share the best bug bounty tools I personally use as a Bug bounty hunter. Of course, hundreds of tools exist for Prof…

How to use L3mon Rat [Tutorial]

Hello guys. In this tutorial, we will be discussing how to use the L3MON Rat. If you are entirely new to this RAT, then follow this tutorial car…

Exploiting SQL Injection at Authorization token

Today In this post, I will be sharing a unique writeup on SQL injection with Authorization Headers token. A little bit intro to Authori…

10 essential Linux tools for network and security pros

It isn't easy to include only ten Linux open source security solutions, notably while network experts and security analysts have access to dozens…

How to transfer files from Android to Kali Nethunter unrooted

Hello guys, In this tutorial, I will be teaching you how you can transfer files from Kali Nethunter to your sdcard It can be quickly done on a Rooted…

Setup Guide for DroidKeylog

In this post, I will be guiding you on how to set up the  DroidKeylog Backend app on any hosting service. Though the setup process is n…