Posts

How To Use Shodan Search Engine

Today's post is all About Shodan The Hackers Search engine , in this post am going explain what is Shodan and how to use it, along with ho…

Mobile Security What You Should Know

The Growth Of Smartphones in India is expected to double to 859 million by 2022 from 468 million users in 2017, The World is Moving Towards Smart…

How To Install Kali Nethunter in Termux

Hi friends, Today in this post am going to teach you how to install Kali Nethunter in termux, and tell you how to use kali nethunter in termux M…

Best 2 in 1 Laptops to Buy in 2019

It's 2019 and many of us find ourselves reaching for something more than the laptop. It is the age of multi-functional devices so it only ma…

Burp Suite Tutorial For Beginners

If you're looking for a good web application vulnerability scanner then Burp Suite Stands in the first place, its features and built-in a…

Nmap Tutorial For Beginners [ Basics to Advanced ]

Nmap is the most used tool for all types of hackers, especially the White Hat and System Administrators, Nmap comes with many built-in scri…

Google Dorks | A Complete Guide For Beginners

Google Hacking or Google Dorking is a technique used to retrieve google search results effectively, a dork is a search operator that can be mixed wit…