C / Programing / Tutorials

Exiting in C – Program Tutorial

Leave a Comment on Exiting in C – Program Tutorial

Hey there today I will show you two ways to exit your program in C language, I will make this simple as possible and include examples so you know how to use […]

READ MORE

FEATURED

Simple Command Injection

Leave a Comment on Simple Command Injection

Breif Command injection is a vuln that allows you to submit sys commands to a computer running a website. This happens when the app fails to encode user input that goes to […]

READ MORE

Web-app hacking / Pentesting

Taking a look into Directory Traversal

Leave a Comment on Taking a look into Directory Traversal

Yo! Wassup lads, wolf is back and today we be looking at some web hacking, directory traversal in particular. Directory Traversal is a vuln where an application takes user input and uses […]

READ MORE

FEATURED / Free courses

Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

A Manual Bug Bounty Hunting Course Created by Vikash Chaudhary Last updated 8/2018 English What you’ll learn Hall of Fame | Rewards | Bug Bounty | Appreciation | Bug Bounty Hunting | […]

READ MORE

FEATURED

Offensive Security OSCP v2020 pdf

Offensive Security OSCP v2020 pdf We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational […]

READ MORE

FEATURED

Turn your android in to web server

Leave a Comment on Turn your android in to web server

Welcome to hacking a rise i am the laughing man and today im going to show you how to turn your android in to webserver with out root using termux and golag […]

READ MORE

FEATURED / Free courses / pentesting courses

Website Hacking / Penetration Testing & Bug Bounty Hunting

Leave a Comment on Website Hacking / Penetration Testing & Bug Bounty Hunting

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts. What you’ll learn with Website Hacking / Penetration Testing & Bug Bounty Hunting […]

READ MORE