Latest Articles
Social Engineering Toolkit Credentials Phishing [5 Easy Steps]
In some Kali Linux distributions, social engineering toolkit is already installed. To install SET, we will clone it from its official github repository as
10+ lzop command examples in Linux [Cheat Sheet]
File compression is a process in which the file or group of files is compressed into a single archive file to reduce the size. It is used to store or share
Create Map function for objects (instead of arrays) - Nodejs map
Object mapping enables you to handle data comfortably. However, the main challenge of implementing Nodejs map is that objects lack the native map method that
Use SocialFish V3.0 for simplified phishing [Step-by-Step]
Hello learners, in this guide we will be using socialfish to acquire credentials form our target. In the previous guides we learnt what is social engineering
SQL Stored Procedure Explained [Practical Examples]
SQL stored procedures are generally precompiled group of an ordered series of Transact-SQL statements stored into a single logical unit which allow for
