Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
WAF bypass Using Sql Injection
Video Demonstartion Hello Security Explorers , Welcome to Security Explored This is the next tutorial in Sql Injection Series. WAF Bypass...
Tor 0.2.2.34 Released with fixes of anonymity vulnerability
Tor 0.2.2.34 fixes a critical anonymity vulnerability where an attacker can deanonymize Tor users. Everybody should upgrade. The attac...
DEFCON 19: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Speaker: Kenneth Geers Naval Criminal Investigative Service (NCIS), Cooperative Cyber Defence Centre of Excellence (CCD CoE) This presen...
Compressing media to the ultimate (audio, video and image)
Compression can be used to save the space and easily transfer the files. 7zip is the best compression utility, however it is USELESS w...
John The Ripper 1.7.9
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary pur...
Links