BLOG POSTS
Phishing Attacks With Evilginx2
PHISHING ATTACKS WITH EVILGINX2 This [...]
Hacking Android Phones With Malicious APK
HACKING ANDROID PHONES WITH MALICIOUS APK [...]
Vegile (Unlimited Shell In Linux Using Metasploit)
VEGILE (UNLIMITED SHELL IN LINUX USING METASPOILT) [...]
Data Execution Policy (DEP) Bypass Using Return Oriented Programming (ROP) Chains
DATA EXECUTION POLICY BYPASS USING RETURN ORIENTED PROGRAMMING CHAINS [...]
Attacking WPA/WPA2 Wi-Fi and spreading a payload on the compromised network
ATTACKING WPA/WPA2 Wi-Fi & SPREADING A PAYLOAD ON THE [...]
Creating a Fully Undetectable (FUD) Backdoor
CREATING A FULLY UNDETECTABLE (FUD) BACKDOOR [...]