Commonly Used Termux Commands You Need To Know About
Hacking and Infosec Technology

Commonly used termux commands you need to know
Commands that are important to learn before using termux

Termux is the best android application to learn about Linux as it give the Linux environment without root. It can be installed in mostly every android phone. However, it is the best way to practice your hacking skills via an Android phone. Termux made the penetration of web way more easier. As you can use […]

Hacking and Infosec

Critical security bug in VLC media player – The real truth
A critical Remote Code Execution bug has been found in VLC media player’s latest version. The bad news is “the vulnerability is still unpatched.” VideoLan denies the reports about vulnerability

The VLC media player is undoubtedly the most popular media player. Majority of computer users have VLC player installed on their computers. It’s equally famous among Windows, Mac, and Linux users. But here comes the bad news. Our favorite media player is a security threat to our computers. A severe security bug in VLC media […]

install ngrok in termux
Hacking and Infosec

How to install ngrok in termux – Configure ngrok for port forwarding
The complete process of installing and configuring ngrok for port forwarding on termux

As I promised in my previous article, I’ll tell you how to install ngrok in termux. Here is the complete method of installing and setting up ngrok on termux. In this article, I’ll tell you about ngrok. You’ll learn what is ngrok, what is port forwarding, and how to use it. This is a short […]

install Metasploit in termux 2019
Ethical Hacking

How to install Metasploit in Termux 2019 – Error Free installation
Installing Metasploit framework in Termux without getting any errors

In a previous article, we discussed termux in detail. It answered all the necessary questions about termux. Including what is termux, how it works, how it’s used in hacking, and many more. We also showed how to install hacking tools termux. Metasploit was also one of them. But the process we discussed in the article […]

Kali Linux roadmap 2019-2020: Credit - Kali.org
Hacking and Infosec Technology

Offensive Security reveals Kali Linux roadmap for 2019-2020
Offensive security unveils the roadmap of Kali Linux for 2019-2020. Major updates announced in the hacker's favorite operating system.

As a penetration tester or ethical hacker, you must have used Kali Linux once in a life. And maybe like the majority of security professionals you’re still using it. No doubt Kali Linux is the most used operating system by penetration testers. Among awesome pentest environment and lots of tools, the updates are also a […]

Top 5 web security testing tools
Hacking and Infosec Technology Top 5

Top 5 best Web Security testing tools 2019
Best automated tools for developers and security testers to test security issues in web applications

With increase is cyber attacks, the biggest worry for every developer is security. And that’s the reason web security testing tools exist. Web applications are one of the favorite targets of cybercriminals. From individuals to business firms, security threats are everywhere. There is a saying that Nothing is 100% secure But security professionals try to […]

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
Hacking and Infosec Tech News Technology

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
WhatsApp suffers a remote code execution vulnerability, which allows hackers to exploit WhatsApp users through a phone call - CVE-2019-3568

WhatsApp is the most popular messaging application claims to be the most secure social media platform. It was considered the most secure platform due to the variation of encryptions. Not only encryptions but also the security layers it uses to protect the users. But someone quoted a really beautiful line regarding security: “Every new security […]

Why We Use Nmap? How to Use it?
Hacking and Infosec

Nmap – The Network mapper a detailed Guide
A brief guide to Nmap including features, usage, scanning and video tutorial

Nmap is the most used network mapper. It is an open source tool developed by Gordon Lyon and written in C, C++, Python, Lua. It is available for all operating system including Linux, Windows. Mac OS. The stable version of Nmap was released on 21 March 2018. It is scanning and a network discovery tool. […]