Vulnerability Introduction I recently discovered a vulnerability in the Avast and AVG Secure Browser that allows low privileged users to gain access...
AVG & Avast Secure Browser Permission Hijacking CVE-2019-17190

Vulnerability Introduction I recently discovered a vulnerability in the Avast and AVG Secure Browser that allows low privileged users to gain access...
Vulnerability Introduction I recently discovered a vulnerability in the Avast and AVG Secure Browser that allows low privileged users to gain access to any file on the...
XXE Injection attacks is a type of injection attack that takes place when parsing XML data. An XXE attack takes place when XML input contains a reference to an external...
In this SQL injection lab video I show you how to setup your own SQL injection lab for practicing SQL Injections. SQL Injections are easy to exploit as you need nothing...
Hack any WordPress version, including the current 4.9.6 is susceptible to a vulnerability that could lead to command execution. In this video I walk you through...
SQL Injection attacks are still as common today as they were ten years ago. Today I’ll discuss what are SQLi and how you can exploit SQLi vulnerabilities found in...
Kali Linux 2018.2 Released! Find out what’s new, kernel & tools, and how to upgrade to Kali Linux 2018.2. New Linux 4.15 kernel with Spectre and Meltdown...
fsociety hacking tools pack is a penetration testing framework containing all of the penetration testing tools that would need. Included is all the tools that are used...
This article provides an explanation to the icacls output and the specific ntfs permissions. SIDs may be in either numerical or friendly name form. If you use a...
So, you’ve popped a user shell on a windows box and now you’re looking to escalate those privileges. Great! In this article we’ll look at one method of elevating your...
How to install Kali Linux 2018 in Windows 10 directly from the Microsoft App Store! Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration...