LATEST ARTICLES

Best IDE and Text Editors for coding 02

https://www.youtube.com/watch?v=FCjHmDmJznA Hey, welcome to another blog of JavaScript complete tutorials. In this blog, we will compare different types of  Text Editors and IDE's. First of all, what...

01 Introduction To JavaScript

Hello everyone, this is a complete tutorial on JavaScript. Watch the video on our youtube channel. https://youtu.be/DbrASSWg75E What is JavaScript? JavaScript is a scripting language that is...
WhatsApp New Privacy Policy Explained

WhatsApp New Privacy Policy

Instant Messaging chat application WhatsApp has recently made changes to its privacy policy. Due to which the curiosity of people to know about privacy policy...

Web cache poisoning to XSS to SSRF

I gonna share my experience of a bug “web cache poisoning” in bug bounty as usually, I was pentesting on private sites and I...

What is Spoofing?

How do you hope you will be fine? Today we will talk about spoofing what happens and how it works, so let's start our...

Pro Tricks to Delete Locked Files in Windows 10

Well, sometimes every windows 10 users phishing this type of problem. While deleting a file in Windows 10, we come across an annoying dialog...

How To Encrypt Keyboard To Avoid Keyloggers

Step 1. First of all download and install the toolKeyScrambler.You Can Easily Get it on Google Step 2. Now after downloading, install it...

How To Recover Hacked Facebook Accounts?

In this article, you will know how to Recover if Facebook Account Hack is done? The most common type of hacking is done by...

Google Map will tell where Corona Patients are in Your Area, New Feature Added

Google Maps has introduced a very special feature to facilitate its users. With the help of which you will know how many corona patients...

Authentication token bypass Leads To IDOR

Here is the article how I was able to bypass authentication token and able to exploit IDOR and add any user to add events...