Encryption |vs| Encoding |vs| Hashing

In this article we are going discuss about Encoding vs Encryption vs Hashing.

What are Sock Puppets in OSINT | How to Create One

In this article we are going to talk about sock puppets and how to create one

Man-In-The-Middle Attacks|Different Types and Techniques

MITM banner

In this article we are going to see about Man In the middle attack and types of MITM attacks

Cross-Site Request Forgery(CSRF) | Web App Vulnerability

Cross-Site Request Forgery also known as CSRF, XSRF, sea surfing, the one-click attack is another common web application web vulnerability. It tricks the user’s web browser to do the things it doesn’t intend to do. The attacker tricks the victim browser into generating requests to a website that performs certain actions on behalf of the […]

Cross-Site Scripting | Web application Vulnerability

In this article we’re going to learn about cross-site scripting

What is Remote Access Trojan? | RAT Malware

In this article we are going to talk about Remote Access Trojan (RAT)

How to hack and crack passwords | Password attacks

In this article, we’re going to talk about password attacks. Nowadays everyone uses passwords to keep their file protected and safe. But is your password really secure? On websites or even in your operating system when the password is created the password got encrypted using one-way hash algorithms. these algorithms are irreversible that makes your […]

Hacking Facebook |5 Ways a hacker hack Facebook account.

Nowadays Facebook is one of the most popular social media websites in the world. The more it became popular the more ways hacker finds a way to hacking Facebook account. In this article, we’re going to see 5 ways of hacking Facebook. 1. Using Tabnapping Tabnapping is a technique which is involves phishing and scripts, […]