
HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAILWhen it comes to email providers, there's no competitor to Google's awesome features. It is efficient which connects seamlessly with the rest of your Google p…
meNGAKui, meNGIKuti, meNGUKir Kebenaran
HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAILWhen it comes to email providers, there's no competitor to Google's awesome features. It is efficient which connects seamlessly with the rest of your Google p…
What is BurpSuite?Burp Suite is a Java based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals. Burp Suite helps you ident…
This post is going to be a rather strange post compared to previous ones. But bear with me, in the middle of the post you will see why this post fits the IT security topic.I'm also terribly sorry for …
Welcome back to the Linux Command Line Hackery series, this is Part-V of the series. Today we are going to learn how to monitor and control processes on our Linux box, so wrap your sleeves up and let'…
Sub-domain takeover vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed or deleted. This allows an attacker to set up …
TL;DR: Are you into red teaming? Need persistence? This post is not that long, read it ;)Are you into blue teaming? Have to find those pesky backdoors? This post is not that long, read it ;)In the pre…