Ethical Hacking

Exploiting SQL Injection at Authorization token

Today In this post, I will be sharing a unique writeup on SQL injection with Authorization Headers token. A little bit intro to Authori…

10 essential Linux tools for network and security pros

It isn't easy to include only ten Linux open source security solutions, notably while network experts and security analysts have access to dozens…

How to transfer files from Android to Kali Nethunter unrooted

Hello guys, In this tutorial, I will be teaching you how you can transfer files from Kali Nethunter to your sdcard It can be quickly done on a Rooted…

Setup Guide for DroidKeylog

In this post, I will be guiding you on how to set up the  DroidKeylog Backend app on any hosting service. Though the setup process is n…

DroidKeyLog - The Best Invisible Keylogger For Android

Hello guys, In this post, I will be introducing you to an advanced Android keylogger built by Techncyber. You might probably know what…

Smap A Fastest Port Scanner Tool

Smap is the fastest Port scanner tool built by our favourite Infosec guy Somdev. He is one of my inspirations for getting into the infosec fie…