bug in vlc
Hacking and Infosec

Critical security bug in VLC media player – The real truth
A critical Remote Code Execution bug has been found in VLC media player’s latest version. The bad news is “the vulnerability is still unpatched.” VideoLan denies the reports about vulnerability

The VLC media player is undoubtedly the most popular media player. Majority of computer users have VLC player installed on their computers. It’s equally famous among Windows, Mac, and Linux users. But here comes the bad news. Our favorite media player is a security threat to our computers. A severe security bug in VLC media […]

install ngrok in termux
Hacking and Infosec

How to install ngrok in termux – Configure ngrok for port forwarding
The complete process of installing and configuring ngrok for port forwarding on termux

As I promised in my previous article, I’ll tell you how to install ngrok in termux. Here is the complete method of installing and setting up ngrok on termux. In this article, I’ll tell you about ngrok. You’ll learn what is ngrok, what is port forwarding, and how to use it. This is a short […]

install Metasploit in termux 2019
Ethical Hacking

How to install Metasploit in Termux 2019 – Error Free installation
Installing Metasploit framework in Termux without getting any errors

In a previous article, we discussed termux in detail. It answered all the necessary questions about termux. Including what is termux, how it works, how it’s used in hacking, and many more. We also showed how to install hacking tools termux. Metasploit was also one of them. But the process we discussed in the article […]

Kali Linux roadmap 2019-2020: Credit - Kali.org
Hacking and Infosec Technology

Offensive Security reveals Kali Linux roadmap for 2019-2020
Offensive security unveils the roadmap of Kali Linux for 2019-2020. Major updates announced in the hacker's favorite operating system.

As a penetration tester or ethical hacker, you must have used Kali Linux once in a life. And maybe like the majority of security professionals you’re still using it. No doubt Kali Linux is the most used operating system by penetration testers. Among awesome pentest environment and lots of tools, the updates are also a […]

Top 5 web security testing tools
Hacking and Infosec Technology Top 5

Top 5 best Web Security testing tools 2019
Best automated tools for developers and security testers to test security issues in web applications

With increase is cyber attacks, the biggest worry for every developer is security. And that’s the reason web security testing tools exist. Web applications are one of the favorite targets of cybercriminals. From individuals to business firms, security threats are everywhere. There is a saying that Nothing is 100% secure But security professionals try to […]

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
Hacking and Infosec Tech News Technology

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
WhatsApp suffers a remote code execution vulnerability, which allows hackers to exploit WhatsApp users through a phone call - CVE-2019-3568

WhatsApp is the most popular messaging application claims to be the most secure social media platform. It was considered the most secure platform due to the variation of encryptions. Not only encryptions but also the security layers it uses to protect the users. But someone quoted a really beautiful line regarding security: “Every new security […]

Why We Use Nmap? How to Use it?
Hacking and Infosec

Nmap – The Network mapper a detailed Guide
A brief guide to Nmap including features, usage, scanning and video tutorial

Nmap is the most used network mapper. It is an open source tool developed by Gordon Lyon and written in C, C++, Python, Lua. It is available for all operating system including Linux, Windows. Mac OS. The stable version of Nmap was released on 21 March 2018. It is scanning and a network discovery tool. […]

What is Termux
Hacking and Infosec

What is Termux? Installation, Usage and 5 best hacking tools for termux
A detailed guide about Termux answering all questions about installation, usage, doing hacking, best hacking tools for termux

There are some most frequently asked questions we often encounter. How to use Android for hacking? What is the best app for hacking on android? The answer to these queries is Termux. But there are a lot of misconceptions about this application. Many of us think termux turns the android into a hack machine. Well, […]