Showing posts with label Hacking Tutorial. Show all posts
Showing posts with label Hacking Tutorial. Show all posts

Cross-Site Scripting (XSS) Cheat Sheet

 XSS attacks are talked about beyond the reflected and persistent types. It is intended to provide a broader vision of the possibilities w...

Routing Windows traffic through the TOR network

Tallow is a small program that redirects all outgoing traffic from a Windows machine through the Tor anonymity network.  Any traffic th...

Vulnerability in firmware for Wi-Fi chips affects millions of devices

This vulnerability has been discovered by a group of security researchers and affects  ThreadX  .  It is the real-time operating system tha...

SIM Swap: know the technique that clones WhatsApp and the application of the credit card

What is SIM Swap? The SIM card of a cell phone saves the user's data in GSM phones.  They are mainly used to authenticate subsc...

Advanced XSS attacks and exploitation examples

An article from   where  XSS  attacks are discussed  beyond the reflected and persistent types.  It is intended to provide a broader view o...

Phishing NG. Bypassing 2FA with Modlishka. and Evilginx 2

The Polish security researcher, named Piotr DuszyƄski, developed a new tool for penetration tests called   Modlishka,  which according to h...