0
Android Application testing with Android Emulator and Burp Suite - Basic Tutorial
Android Application testing with Android Emulator and Burp Suite - Basic Tutorial

After getting some requests over social media and Youtube comments regarding Android app testing, I decided to make this simple and very bas...

Read more »

0
Chingari Application Hack (iOS and Android) - Complete User Account Takeover without Username and Password
Chingari Application Hack (iOS and Android) - Complete User Account Takeover without Username and Password

 Chingari App (TikTok clone app) is made in India by Indian developers. I saw many posts over social media and many articles over Internet. ...

Read more »

0
Access locked files in Secure Gallery android application without password
Access locked files in Secure Gallery android application without password

Here is the video on how to access locked file in Secure Gallery Android application without password. If you want yo retrieve the passwor...

Read more »

0
Hacking Android Secure Gallery App password from Application Backup data
Hacking Android Secure Gallery App password from Application Backup data

Here is the video on how to Hack password from Secure Gallery Android application backup. If you want to access locked files in secure galle...

Read more »

0
Understanding Bash Bug or Shellshock vulnerability with examples.
Understanding Bash Bug or Shellshock vulnerability with examples.

As you all know that Remote Code Execution vulnerability has been identified in Bourne Again Shell as known as BASH which is command line ...

Read more »

0
Account Safety: Make all your passwords strong which you can remember easily.
Account Safety: Make all your passwords strong which you can remember easily.

Friends as you all know that Hacking activities are increasing rapidly day by day. You might have heard that recently hackers hacked i...

Read more »

0
Find out name of unknown mobile number's user.
Find out name of unknown mobile number's user.

   Hello friends, I am back after long time.    I was busy in some of my work, but today i got free time to write a small tutoria...

Read more »

0
How to protect Web Server from execution of PHP Shells ???
How to protect Web Server from execution of PHP Shells ???

Hello friends... In previous tutorial I have given you an introduction to php.ini file in web servers. If you didn't read it then hav...

Read more »

0
What is php.ini file ??? All about php.ini file.
What is php.ini file ??? All about php.ini file.

Hey friends.. I am back with a new tutorial after long time.... Sorry for not posting any tutorial for a long... But this time I wanna...

Read more »

0
Steganography - Hide Data within data without using any software.
Steganography - Hide Data within data without using any software.

What is Steganography ??? Steganography is the art and science of writing hidden messages in such a way that no one, apart from the...

Read more »

0
Some Useful Commands for Hacker.
Some Useful Commands for Hacker.

I know you all know all these commands,but today I ma posting this for beginners.So here let's start. First of open command prompt,if ...

Read more »
 
 
Top