Latest Articles
3 easy steps to obfuscate android payload to avoid detection [ApkBleach]
Hello learners, in the first part of our android payload guide, we embedded an android payload to a legitimate application. The application is however getting
Complete Tutorial on Node.js Passport [Practical Examples]
Node.js passport simplifies user authentication and authorization when building web applications. Despite the usefulness of passport.js, you may fail to
Steps to perform Remote Packet Capture with Wireshark
Step-1: WinPcap comes with the older Wireshark versions in default. If you do not have it, download it from here (https://www.winpcap.org/default.htm) and
Complete Shodan Tutorial | The Search Engine for Hackers
Shodan is a search engine but very different from regular search engines like Google, Yahoo, Bing, etc., which search the web for standard websites. Shodan
10+ mdadm command examples in Linux [Cheat Sheet]
mdadm command is used for building, managing, and monitoring Linux md devices (aka RAID arrays). RAID devices are made up of multiple storage devices that are
