Complete Android Pentesting Guidea) apktool -) AUR package: yay -S android-apktool b) dex2jar c) jd-gui d) jadx e) adb -) sudo pacman -S android-tools -) I personally…Oct 29, 20201Oct 29, 20201
TRUE CALLER DATA BREACHTrue caller denies breach after data of 4.75 crore Indians appear on the dark webAug 1, 20201Aug 1, 20201
FROM OSINT PROJECT TO MAKING MILLIONS HACKING DATABASES FOR BUG BOUNTYHi, last year i learn about this technique well these techniques were present for a long time but very few people focus on this so i…May 31, 20201May 31, 20201
AADHAR DATA LEAKEDNowadays how careless people are shows by these leaks and how 3rd party websites that taking the data like aadhaar is handling it last…May 30, 2020May 30, 2020
FINDING API ENDPOINT USING WSDL | API HACKING SECRET 4In this part, I will teach you how to extract endpoints from the WSDL file so let's get started.May 27, 20203May 27, 20203
Published inInfoSec Write-upsAPI HACKING SECRETS PART 3parsing the WSDL file to extract ENDPOINTSMay 26, 20201May 26, 20201
API HACKING SECRETS PART 2In part 1 we have covered basic of API and Learn the basic difference between soap and rest API.May 26, 2020May 26, 2020
API HACKING SECRETS PART 1In this series, i will be teaching you my methodology of hacking API. I will share all my knowledge that i learned in the past 3 years and…May 25, 20202May 25, 20202
TOMNOMNOM HTTPROBE USEIn this, you will learn how to properly use tomnomnom httprobeMay 24, 2020May 24, 2020
OWASP Amass InstallationIn this tutorial, we will learn how to install OWASP amass using go langMay 24, 2020May 24, 2020