SQL Injection

SQL Injection

SQL Injection is a type of web application security vulnerability in which an attacker is able to submit a database SQL command which is executed by a web application, exposing the back-end database.A SQL
Havij Video TuT

Havij Video TuT

Wireless Attacks Unleashed

Wireless Attacks Unleashed

As we all know, wireless networks are spread at each and every part of the world, starting from personal home to corporate business environments, schools/universities, cafes, etc. The major merit of wireless networking is
Add More Options under “Send To” In Windows

Add More Options under “Send To” In Windows

You’ve seen the SendTo folder in action any time you right-click a file and select the Send To folder from the context menu. What you might be unaware of is that you can customize
Full Version Internet Download Manager 7.1

Full Version Internet Download Manager 7.1

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to
IP Address

IP Address

IP (Internet Protocol) - An IP address is a fascinating product of modern computer technology designed to allow one computer or other digital device to communicate with another via the Internet. IP addresses allow
How To Capture Passwords Across The Air - Network Traffic Analysis

How To Capture Passwords Across The Air - Network Traffic Analysis

ABSTRACT     It is known that WireShark is a powerful tool that goes far beyond a simple sniffer. What many do not know is that there are several ways to harness the potential of this tool
Code Igniter XSS Filter Multiple Bypasses

Code Igniter XSS Filter Multiple Bypasses

Recently we released our "XSS Filter Evasion Cheat Sheet", i was quite surprised to hear the community feedback. The total downloads have surpassed a figure of 2500, which was quite amazing considering that i
Everything About Linux Iptables/Linux Firewall

Everything About Linux Iptables/Linux Firewall

IntroductionFirewalls are used to monitor and control the inbound and outbound traffic on the protected network. They have an ability to block and allow the internal as well as external services within the network.
Bypassing Modern WAF's XSS Filters - Cheat Sheet

Bypassing Modern WAF's XSS Filters - Cheat Sheet

Last month i was asked by my university teacher "Sir Asim Ali" to write a paper on any topic related to "Computer Architecture" as a semester project. I was particularly interested in writing
Fortune in kali linux

Fortune in kali linux

When fortune is run with no arguments it prints out a random epigram. Epigrams are divided into several categories, where each category is sub-divided into those which are potentially offensive and those which are
Understanding This Technique Called MySQL Injection

Understanding This Technique Called MySQL Injection

ABSTRACTIt is known that computers and software are developed and designed by humans, human error is a reflection of a mental response to a particular activity.Did you know that numerous inventions and discoveries are

Contact Us

24x7 online , we happy to answer you
tamilcypc@gmail.com

Disclaimer

This Blog and its TUT's are intended for educational purposes only, no-one involved in the creation of this TuT may be held responsible for any illegal acts brought about by this Blog or TuT.



Featured Post

Custom Domains And HTTPS Redirection Code