Posts

How To Get Started In Bug Bounty as a Beginner

In this article, let us discuss what Bug Bounty is and how to get started with Bug Bounty as a complete beginner. This article will  guide you on w…

Emerging Biometric Security Trends: Enhancing Data Protection and Authentication

In today's technologically driven society, safeguarding sensitive data and ensuring secure access are paramount concerns. The exponential growth …

Shadowhacker Hit The Headlines with Indian Railways Data

Shadowhacker, the well-known hacker/hacker group, claims to be breached the Indian Railways Booking portal. This time, Shadowhacker are selling 30 Mi…

How to use Nmap in termux

NMAP (Network Mapper) is a free and open-source network scanning tool widely used by network administrators and cybersecurity professionals to discov…

How to install and use the Nano text editor in Termux.

GNU nano is a simple terminal-based text editor, used in command line to edit, create small text files, its similar to VIM but not that powerful and …

Capture Android Traffic Remotely With Wireshark

Android network traffic interception is a process of capturing and analyzing network traffic that is transmitted or received by an Android device. Th…