Friday, April 11, 2025
Google Sec-Gemini: Revolutionizing Cybersecurity with AI
›
Cybersecurity has always been a high-stakes battlefield where defenders face an uphill struggle against increasingly sophisticated attackers...
Saturday, April 8, 2023
Discover the Top 7 Steganography Tools in Kali Linux: A Comprehensive Guide
›
What steganography is and why it's important ? Steganography is the practise of concealing information within another medium, such as ...
Tuesday, April 10, 2018
Pentester Tools : SSHScan
›
SSHScan is a testing tool that enumerates SSH Ciphers. We Can easily detect weak ciphers by using this . Lets tryout SSHScan in Br...
3 comments:
Wednesday, February 8, 2017
How to save your server from Apache 2.4.7 Vulnerability (mod_status)
›
If your server is running with an apache 2.4.7 , then the chance for being hacked is high . Listing two solutions to solve this issue . De...
1 comment:
Wednesday, July 13, 2016
How to easily convert C2R files to JPEG with UBUNTU
›
1) sudo apt-get install ufraw 2) cd < directory of cr2 file > 3) for i in *.CR2; do ufraw-batch $i --out-type=jpeg --output $i....
Thursday, June 2, 2016
How to Hack an Android device on the same Wi-Fi Network
›
Disclaimer: Hacking other devices on Wireless Networks (Wi-Fi) without explicit written permission is illegal, unless you are the legal own...
Monday, March 2, 2015
JailBreak APPLE iOS 8.1.3
›
JailBreaking iOS 8.1.3 is currently an impossible task reported by most of the famous jailbreakers .Eventhough you can have a try with 2 di...
›
Home
View web version