Top 10 Websites to Transfer and Share Data For Free
All researcher out there, some point in time want to transfer big files or data with friends or colleagues. There are many websites out there for transferring large data fileRead More →
All researcher out there, some point in time want to transfer big files or data with friends or colleagues. There are many websites out there for transferring large data fileRead More →
Introduction People always search internet to hide data and transfer it across to your friends. Imagine you get a MP3 file with your password in it. Now you can transferRead More →
There are times when we need immediate solution to hide any File/Folder/Drive/User or any Data in Windows machine. There are many softwares available online to do this, but most ofRead More →
Introduction Now it’s easy to exploit and manage Android mobile devices using a python based tool ADBsploit. To use this tool we required ADB (Android Debug Bridge) on hackers machine and theRead More →
Introduction As we all know in Android device there are three different Phone locks to set (Finger print, Password, Pattern). If your friend use pattern as Phone lock, now it’sRead More →
Introduction HoneyPot is always a great way to fool hackers. There are many types of HoneyPot system, some are used to detect, deflect, or even counteract the hackers. Today weRead More →
Introduction Now you can create your own tunnel to hide your IP address. The gtunnel tool creates an exe file based on an operating system like Windows/Linux, this exe fileRead More →
Introduction Now we can limit the bandwidth (uploading/Downloading) of any device connected on LAN (Local Area Network). Using this we can target any device on network to control the speed/blockRead More →
Introduction Phishing attack is the most common types of attacks. All are organizations are struggling hard to combat this type of attack on their employees. International Institute of Cyber SecurityRead More →
Introduction All hacker’s always want to get a handy device, to get power in their own hand. It is always good to have everything handy for all the pentesters outRead More →