In recent years, cybersecurity has become an increasingly important topic for individuals and organizations around the world. The rapid expansion of the internet and the digitalization of many....
In today's world, where we rely heavily on the internet and computer networks, cyber security and network security have become crucial for protecting our sensitive data from cyber threats. Although....
Web application penetration testing is the process of identifying security vulnerabilities in web applications through active and passive analysis. Penetration testing tools help in identifying....
In this article, we are going to see another interesting topic in web application hacking. This is called remote command execution. the same vulnerability is also known as remote code execution, OS....
Metasploit is an awesome tool which is. It can automate the exploitation process, generate shellcodes, use it as a listener, etc. I hope to start a tutorial series on the Metasploit framework and....
In a normal Windows/Linux environment you have heard about moving data or files. What we do is copy data from a source location to a destination. Assembly MOV instruction is very similar to that.....
Assembly is a low-level programming language. You already know that low-level programming languages are close to machines and very hard to understand by humans. We have already written some programs....
GDB is shipped with the GNU toolset. It is a debugging tool used in Linux environments. The term GDB stands for GNU Debugger. In our previous protostar stack0 walkthrough tutorial, we used GDB many....
Today I selected an interesting topic to discuss. Here we are going to disassemble a binary file and take a look at what it does. We call it reverse engineering. Let's run the program and figure out....
In this tutorial, we are going to see how we can write a complex number program in c++ using the class object concepts. It is a great example for beginners to understand classes and objects. I hope....
A singly linked list is a data structure used in computer programming to store a collection of items. It is made up of nodes, each containing some data and a reference to the next node in the list.....
SQL injection, The classical example of web application vulnerabilities. Actually, the term SQL injection login bypass is pretty old and SQL injection is rare in modern web applications. But if you....
Termux is a terminal emulator application for mobile devices. In this document, we are going to talk about Termux and its features. We can use it to install Linux tools on a mobile phone. Here....
A web shell is a type of code that hackers use to gain control over a web server. It is particularly useful for post-exploitation attacks, and there are various types of web shells available. Some....
We all love free stuff. So many people try to install premium themes and plugins on their WordPress blogs. Most of them use nulled themes or cracked versions of premium themes. The main disadvantage....
Printing a string to the stdout In this section, we are going to see how we can print something on the screen using assembly instructions. We learned in the previous tutorial that we can use....
When it comes to search engine optimization, URL structure plays an important role. If the URL structure of your website is easy to understand and it is readable then you have a good chance of....
Hacking is an interesting area in computer science to study. In this article, I'm going to introduce some great books. With my experience, I can say those are the best ethical hacking books for....
Computer science
Web development
How to guides
Networking
Cryptography
Well explained and interesting cyber security articles and tutorials on the topics such as System exploitation, Web application hacking, exploit development, malwara analysis, Cryptography etc. Let's explorer the awesome world of computer