Crypto Currency Mining Mother Boards There are tons boards which are said to be highly efficient in mining that are…
A 17 year old Vulnerability in Microsoft Word was disclosed recently tracked by CVE-2017-11882 which affected the major versions of…
What is OWASP? OWASP or Open Web Application Security Project is an unbiased open source community focusing on improving the security…
Information Security Consulting company TrustedSec has announced a HTTP(s) command and control (C2) Open Source Framework dubbed TrevorC2. This is…
WiFi and WPA Now a days, every offices, houses, hotels, parks, hospitals, almost everywhere there is wifi. But the real…
A new tool - BLEAH which is used for attacking Bluetooth Low Energy devices is now available for download in…
Kali Linux has been one of the best penetration testing OS of all time. During April 2017, Kali Linux 2017.1 rolling…
We spend a lot of time going through sites, trying to find out the latest stable download link for various…
Interested in WiFi? In this post, I will explain how I made a WiFi station that can give you access…
Moments ago, wikileaks revealed four highly confidential documents (along with 37 related documents) of a top secret project of CIA…