A WiFi cracker is a software tool or program that is designed to exploit vulnerabilities in wireless networks and gain…
The purpose of this article is to provide you with a depth understanding of the Windows Registry and the Wealth…
JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the…
Malware delivery trends change every day. For the last few years, we have observed various hacker groups like ( APT12…
Magecart is a malicious threat actor ,operating in structured groups ( Group 1 to Group 6 ) and all this…
AV vendors use various tools and techniques to identify the newly launched malware from the advisory. Before driving into reversing…
Calamity occurrence in any area, arising from natural or man-made causes, or by accident or negligence which results in substantial…
WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results of this audit can…
Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or…
Reconnaissance is a process to get information in-depth about the target. Keep gathering information until penetration testing phase is a…