Guidance about Penetration Testing, Programming Languages, Tools guide, social media and much more

install Metasploit in termux 2019
Ethical Hacking

How to install Metasploit in Termux 2019 – Error Free installation
Installing Metasploit framework in Termux without getting any errors

In a previous article, we discussed termux in detail. It answered all the necessary questions about termux. Including what is termux, how it works, how it’s used in hacking, and many more. We also showed how to install hacking tools termux. Metasploit was also one of them. But the process we discussed in the article […]

Kali Linux roadmap 2019-2020: Credit - Kali.org
Hacking and Infosec Technology

Offensive Security reveals Kali Linux roadmap for 2019-2020
Offensive security unveils the roadmap of Kali Linux for 2019-2020. Major updates announced in the hacker's favorite operating system.

As a penetration tester or ethical hacker, you must have used Kali Linux once in a life. And maybe like the majority of security professionals you’re still using it. No doubt Kali Linux is the most used operating system by penetration testers. Among awesome pentest environment and lots of tools, the updates are also a […]

Top 5 web security testing tools
Hacking and Infosec Technology Top 5

Top 5 best Web Security testing tools 2019
Best automated tools for developers and security testers to test security issues in web applications

With increase is cyber attacks, the biggest worry for every developer is security. And that’s the reason web security testing tools exist. Web applications are one of the favorite targets of cybercriminals. From individuals to business firms, security threats are everywhere. There is a saying that Nothing is 100% secure But security professionals try to […]

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
Hacking and Infosec Tech News Technology

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
WhatsApp suffers a remote code execution vulnerability, which allows hackers to exploit WhatsApp users through a phone call - CVE-2019-3568

WhatsApp is the most popular messaging application claims to be the most secure social media platform. It was considered the most secure platform due to the variation of encryptions. Not only encryptions but also the security layers it uses to protect the users. But someone quoted a really beautiful line regarding security: “Every new security […]

Why We Use Nmap? How to Use it?
Hacking and Infosec

Nmap – The Network mapper a detailed Guide
A brief guide to Nmap including features, usage, scanning and video tutorial

Nmap is the most used network mapper. It is an open source tool developed by Gordon Lyon and written in C, C++, Python, Lua. It is available for all operating system including Linux, Windows. Mac OS. The stable version of Nmap was released on 21 March 2018. It is scanning and a network discovery tool. […]

What is Termux
Hacking and Infosec

What is Termux? Installation, Usage and 5 best hacking tools for termux
A detailed guide about Termux answering all questions about installation, usage, doing hacking, best hacking tools for termux

There are some most frequently asked questions we often encounter. How to use Android for hacking? What is the best app for hacking on android? The answer to these queries is Termux. But there are a lot of misconceptions about this application. Many of us think termux turns the android into a hack machine. Well, […]

Password Stealing
Ethical Hacking Hacking and Infosec

Password Stealing: How hackers steal email/social media passwords?

We’ve so far discussed the login process, and how the passwords are stored. We’ve also touched a little bit about types of access and definition of unauthorized access. Now let’s move further. And look at some ways of gaining unauthorized access over a targeted user/system. Such access depends on particular circumstances. Maybe it’s a developer’s […]