How to Tell if Your Phone Has Been Hacked

Smartphones are almost always connected to the internet, so it stands to reason that your phone hacked remotely. Hackers are always out there looking for entry points, and they...

How to Bypass SMS Verification of any Website

New tricks for you in this article we will guide on Bypass OTP/ SMS/ Call Verification in Any Website/App. Every website or app nowadays needs a Phone Number Verification...

All About Cookies You May Not Know

The main purpose of a cookie is to identify users and possibly prepare customized Web pages or to save information.Cookies are messages that web servers pass to your web...

A Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to...

How to Find Vulnerable Targets Using Shodan

What Is Shodan? Some have described Shodan as a search engine for hackers, and have even called it "the world's most dangerous search engine". It was developed by John Matherly...

How To Configure Port Forwarding

Ports allow network and internet-connected devices to interact using specified channels. While servers with dedicated IP addresses can connect directly to the internet and make ports publicly available, a...

Facebook: Fake News About Green BFF Security Test

As fake news on continues to thrive online, rumours about typing BFF on your Facebook to test if your account is secure from hackers or not is actually a...

Translate Binary To Text – The Easy Way

Out of curiosity, how exactly does binary code get converted or translate into letters? Yes there are sites that automatically convert binary to words for you but Ever Thought...

How to Disable Startup Programs in Windows

Over time as you install more and more software you may start to notice that it takes longer and longer for your computer to startup. More likely than...

How To Install Kali Linux In Android Phone

Kali Linux is the mostly offensive Operation System used worldwide for penetration testing OS, mostly used by Black Hat’s. Kali contains several hundred tools which are geared towards various...