ProRat

What is ProRat ? And how we us it ? ProRat is a Remote Administration Tool made by PRO Group.ProRat was written in C programming language and its capable to work with all windows operating systems.ProRat is made for remoting your own computers from other computers.ProRat supports bir lots of Read more…

Loading

Hack Android

Hack Android with MSFvenom   How To Hack android devices ? This post will teach you how to hack android devices to Control them Remotely.Now days every single person uses android device, people love and easily attract to android device because of its features and functionality but. There are soo Read more…

Loading

Kali Linux Commands

A-Z Kali Linux commands which will help you. Kali Linux commands Function A  apropos  Search Help manual pages (man -k)  apt-get  Search for and install software packages (Debian)  aptitude  Search for and install software packages (Debian)  aspell  Spell Checker  awk  Find and Replace text, database sort/validate/index B  basename  Strip directory Read more…

Loading

SQL Injection

What is SQL Injection? SQL injection (SQLi) is an application security weakness that allows attackers to control an application’s database – letting them access or delete data, change an application’s data-driven behavior, and do other undesirable things – by tricking the application into sending unexpected SQL commands. SQL injection weaknesses Read more…

Loading

Buffer overflow attack

What is Buffer overflow? Buffer overflow, in the presence of a buffer overflow security vulnerabilities in the computer, the attacker can exceed the normal length of the number of characters to fill a domain, usually the memory address. In some cases, these excess characters can be run as “executable” code. Read more…

Loading

Server Security

brute force attack A password and cryptography attack that does not attempt to decrypt any information, but continue to try a list of different passwords, words, or letters. For example, a simple brute-force attack may have a dictionary of all words or commonly used passwords and cycle through those words Read more…

Loading