Posts

OWASP Top 10 : Security Vulnerabilities Explained 2021

OWASP TOP 10 VULNERABILITIES EXPLAINED 2021 EDITION. Hello there, Techncyber readers, In today's blog, I gonna tell you about OWASP TO…

Tor Browser : How To Use It And Protect Your Privacy

AN ADVANCE GUIDE TO USING TOR ON ANDROID. Hello there, Techncyber readers, In today's blog, I gonna tell you about how to install Tor …

How To Use Metasploit In Termux

Hello there, Techncyber readers, In today's blog, I gonna tell you about Metasploit-framework means how to install it in Termux and…

Koo App: Here What You Need to Know About The False Data Leak Claim

There was a buzz on the internet about the Indian Twitter alternative of the Koo app, Recently Some People claiming that there was a data leak i…

How To Install IP Geolocation in Termux

Hello there, Today in this tutorial I will be writing on how to install and use IP Geolocation tool in Termux I hope you guys are familiar…

How To Install Cmatrix In Termux

Hello there, Techncyber readers, In today's blog, I gonna tell you about CMatrix and how to install it in Termux. CMatrix is a simpl…