Home Tutorial

Tutorial

1. Python For Hackers – Introduction

Youtube Channel : www.youtube.com/priyankgada Facebook  : www.facebook.com/webmaster.pg Blog : www.priyankgada.blogspot.com All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers

Facebook Bomb using VB-script

Script : ' InputBoxes Message = InputBox("What Is The Message?","WhatsApp DDos") MsgBox "VBScript Written By Priyank Gada" T = InputBox("How Many Times Needs It To Be Send?","WhatsApp DDos") If...

Whatsapp Bomb using VB-Script

Today , we are going to learn how to bomb messages on web whatsapp using VB-Script. Explanation of the script. ' InputBoxes This section is the data...

Credit Card 101 – Part 1

Hello guys , we are back with another awesome article. In this series of articles ( credit card 101 ) we are going to...

Hacking CCTV Camera System in 30 Seconds!

Security researcher Zayed Aljaberi, the founder of wesecure.ae has demonstrated the process to hack into the CCTV camera system in just 30 seconds. Here is what he...

Hack Any Android Device

Android devices are widely used around the world; applications are making this platform preferable by millions of users. As these devices are used by...

Facebook Hack: How To Modify Chats

As we all are familiar with the popular social networking site Facebook, which is used by millions of people around the world every day....

Change IMEI – MEUI META 3G

Note : Please read this post before proceeding - All About IMEI . It is important that you know what is database file , etc. Pre-requests...

Hack any website | Brute Force Attack Using Firefox

What is Brute Forcing ? Brute force is a technique in which a hacker tries random passwords ( which are generated by application or via...

How to Deny TOR user Access your Website

Tor users become risk for our servers as they can implement unethical practice into your website, server wihtout tracing as they are using tor...

Four Things You Shouldn’t Forget About Web Application Security

Eliminating all vulnerabilities from your web application is an important part of maintaining your overall security posture. As part of that process, web application vulnerability scanners...

Website Fingerprinting on Tor: attacks and defenses

Tor project is know because of its anonymity, recently many researchers and the security agencies tried to find ways to get in the tor...
- Advertisment -

Most Read

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...