Remove Write Protection from USB Drives

I visited one of my old friend’s home this morning, we were having fun, talking about our old days and yeah about some ex(es), suddenly he said that he has some photos of our school days in his laptop. I was excited to see them, he booted his PC and I started to see them, suddenly I saw some of the CENSORED photos of mine with my ex(es) …. I was shocked that still those memories are here coz even I forgot them and my friend has those photos but as we know Har ek friend kamina hota hia actually More >


Local File Inclusion and Shell Writing using SQL Injection

First of all hello to all readers whoever is reading this article. Once again I am going to tell you about advance SQL Injection. As this is my second article on SQL Injection, I am not going to tell you about the basic SQLi stuff and I assume that you’ve already read my previous article about URL Based SQL Injection. If you haven’t read that, please go on the following link:

This time I am going to tell you about reading (Local More >


Working Of Zenmap ( Network Scanning Tool )

Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scans can be compared with one another to see More >

Top 10 DOS Attack Tools

List Of Top 10 DOS Attack Tools :

1.    Jolt2 2.    Bubonic.c 3.    Land and Latierra 4.    Targa 5.    Blast 2 0 6.    Nemesy 7.    Panther 2 8.    Crazy Pinger 9.    Some Trouble 10.    UDP Flood

WebScarab 5: XSS Haunt

Today in this tutorial we will discuss about the xss attack using the WebScarab , I’ll introduce to you first with the (XSS)  Cross-Site Scripting is a type of computer security vulnerability typically found in Web applications (such as web browsers through breaches of browser security) that enables attackers to inject client-side script into Web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy.

Now More >

Go to Top