Bounty Tips Collected From Twitter

Tip 1 Here’s my last finding (P1)1- register account2- intercept request3- here’s the response in image so in “role” parameter we have ROLE_USERSo i don’t know what i can replace it to privilege my account to admin4- open source code and look in js files5-So in js files i user ctrl+F to search about “user_role” … Read more

Dangerous Hacking Gadgets in Future

Dangerous Hacking Gadgets in the Future: A Glimpse into Cyber Threats As technology evolves, so does the sophistication of hacking tools and gadgets. The future may witness a new wave of innovative yet dangerous devices designed to exploit vulnerabilities in ways we’ve never imagined. Here’s a glimpse into what these futuristic hacking gadgets might look … Read more

How to install kali linux

How to Install Kali Linux in VirtualBox or VMware Kali Linux, a popular penetration testing and ethical hacking operating system, can be run in a virtual environment using software like VirtualBox or VMware. Running Kali Linux virtually ensures you can experiment without affecting your host system. Here’s a step-by-step guide to installing Kali Linux in … Read more

What is Whoami? How does it keep us anonymous and secure? How to use whoami in Kali Linux?

What is Whoami? The term “Whoami” literally stands for “Who Am I?” It’s a simple yet essential command in most Unix-based operating systems, including Linux distributions like Kali Linux. This command is used to display the current user’s identity in the system. At its core, Whoami is: A User Identification Tool: It shows the username … Read more

What is Malware?

Understanding Malware Malware, short for “malicious software,” refers to any software designed to harm, exploit, or otherwise compromise a device, network, or data. Hackers and cybercriminals use malware to gain unauthorized access, disrupt systems, or steal sensitive information. Malware can infect personal computers, smartphones, servers, or entire networks, making it a critical threat in both … Read more

Top ten hacking tool in kali linux

Top Ten Hacking Tools for Ethical Hackers Hacking tools are an essential part of ethical hacking, enabling security professionals to identify vulnerabilities and secure systems effectively. Here’s a list of the top ten hacking tools widely used by ethical hackers. Metasploit Framework Metasploit is a powerful penetration testing tool that enables ethical hackers to identify, … Read more

How to Remove zsh.history in Kali Linux

How to Remove zsh.history in Kali Linux In Kali Linux, as with most Linux distributions, the Z shell (zsh) keeps a record of commands you execute. This history is stored in a file named .zsh_history, typically located in your home directory. While the history feature is useful for tracking command usage or recalling previous commands, … Read more

What is Cryptography?

Cryptography is the practice and study of techniques for securing information and communication, ensuring that only the intended parties can read and understand the content. This field combines mathematics, computer science, and electrical engineering to develop algorithms, protocols, and security systems that protect data from unauthorized access, tampering, and interception. The two main goals of … Read more

What is google Dorking? How dose google Dorking work?

What is Google Dorking? Google Dorking, also known as Google hacking, is a technique used to find specific information or vulnerabilities on the internet by using advanced search operators in Google search. It involves querying Google with specific, often highly targeted search strings, or “dorks,” to uncover information that may not be easily visible through … Read more