Arduino Remote Controller PCB Tutorial | DIY RC Robot
Hey guys, In this post I’ll be showing you how to make a long range Arduino remote controller on a PCB for your robot. If you are stuck somewhere feel free to come into your doubts below…
Hey guys, In this post I’ll be showing you how to make a long range Arduino remote controller on a PCB for your robot. If you are stuck somewhere feel free to come into your doubts below…
Online PCB Design and Manufacturing As you all know, PCB or Printed Circuit boards are there in every piece of electronics devices in our lives. From mobile phones to satellites that orbit around the earth, these boards with…
Metasploit, packed with most dangerous payloads and exploits is of course a hacker’s must need tool; there is no doubt. It is very easy to scan, create payload, deliver it to the target and there you go…..
How to Install Linux Headers Kali 2020? Welcome Fellow Hackers and Tinkerers. In this post, we will share a solution for a Kali Linux Headers Issue that most of us have been facing for years. The Annoying…
Ubertooth One The Ubertooth One is one of the best and cheap hardware tool you can put your hands online for Bluetooth Low Energy device penetration testing. It is basically an open source development board that works…
Hacker Hardware Tools “S in IOT stands for security”. When you look deeper into an IOT device or any embedded device for that matter, what do you see? You see windows of opportunities. Opportunities to modify it….
Kali Linux WiFi Adapter in India Here is a list of Kali Linux WiFi adapter that support all WiFi penetration testing requirements for network/wifi perimeter testing. Updated March 2020 So far, Kali Linux has been one of…
In the previous post, I explained how to use metasploit and establish a reverse TCP connection from outside the LAN without port forwarding. So a lot of our readers asked about using ngrok with Koadic (well, most…
Metasploit is one of the best security testing frameworks that helps pen-testers do more than just detecting issues and sniping down the vulnerabilities; it also gears up and arms the defenders to always stay one or two…
ReelPhish – Defeating Two Factor Authentication using Real Time Phishing Attack Social Engineering Human Beings and their vulnerabilities have always been one of the loop holes in IT security. Even though the technology; software, networks and hardware,…
Crypto Currency Mining Mother Boards There are tons boards which are said to be highly efficient in mining that are available in the online market but choosing the right one can be a bit unsettling. After a…
A 17 year old Vulnerability in Microsoft Word was disclosed recently tracked by CVE-2017-11882 which affected the major versions of Microsoft Office – Microsoft Office 2007 SP 3, Microsoft Office 2010 SP 2, Microsoft Office 2013 SP…
Enter your account data and we will send you a link to reset your password.