Burp Suite 2.0 beta now available
Burp Suite 2.0 beta is now available to Professional users.
This is a major upgrade, with a host of new features, including:
A new crawler, able to automatically handle sessions,...
TechHacker Pre-Hacking Giveaway Winners
Congratulations to all the winners. I really appreciate your participation. Keep going and all the best for your future in ethical hacking!
Arindam...
[Hindi] How Hackers Hack Social Media Accounts [lets try]
Hi Guys chaliye suru krte hai aaj ke naye topic ke upar ki hacker social media accounts kaise hack krte jaha tk mereko pta hai social...
[HINDI] What is DoS attack and DDoS attack?
Guys ye jo dono attack aapne abhi jo topic mai dekha ya pehle bhi shyad kbhi kahi dekha hoga ye cyber attack hai jo hackers rehte...
Ethical Hacking – Famous Hackers
We will have a brief synopsis of some of the famous Hackers and how they became famous.
Jonathan James
Jonathan James was an American hacker, illfamous as the first juvenile sent...
[HINDI] USA fake WhatsApp number trick for complete anonymity
Hi friends i hope aap sb acche honge aaj hum aapke liye ek trick leke aaye hai jisse app fake usa whats app number bana skte hai...
Ethical Hacking – Terminologies
Following is a list of important terms used in the field of hacking.
Adware − Adware is software designed to force pre-chosen ads to display on your system.
Attack...
Firewall Implementation
Administrators must be able to evaluate implementation issues to achieve a successful security solution for their systems. Understanding the type of firewall means knowing how the firewall...
Introduction to Penetration Testing
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to...
Footprinting in Ethical Hacking
Footprinting means gathering information about a target system which can be used to execute a successful cyber attack. To get this information, a hacker might use various methods with...