You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now

cyber security

  1. x32x01

    Myths About Cyber-Security ... !!

  2. x32x01

    Types of Cyber Attacks

  3. x32x01

    Best TV Shows On Hacking & Technology

  4. x32x01

    Get Hidden Data From Images and How to Remove/Edit Personal Information From Photo

    Images contains valuable personal useful data in images metadata. In this digital forensic tutorial we are going to learn how we can get location and other useful information from a image file and how to change them. In this digitalised world we usually share photos online. We share our images...
  5. x32x01

    Modlishka - Advanced Phishing | Bypass Two Factor Authentication

    We all try to secure our all online accounts and social media accounts and we turn on the Two-Factor Authentication or Two-Step Verification. Then we think that we are now safe. Sometimes we check a phishing page with wrong password. But Modlishka can bypass Two-factor authentication (2FA)...
  6. x32x01

    Maltego - Powerful OSINT Reconnaissance Framework

    Maltego is one of the most famous OSINT frameworks for personal and organizational reconnaissance. It is a GUI tool that provides the capability of gathering information on any individuals, by extracting the information that is publicly available on the internet by diffrent methods. Maltego is...
  7. x32x01

    Configuring The ProxyChains

    Sometimes we need to remain untraceable while performing a penetration testing activity. Proxychains helps us by allowing us to use an intermediary system whose IP can be left in the logs of the system without worry of it tracing back to us. Proxychains is a tool that allows any application to...
  8. x32x01

    The Cybersecurity Behind Live Casinos

    Cybersecurity plays an essential role in every sector of any financial institution. But here we are specially talking about live casinos. The live casinos are 100% legal and safe as their cybersecurity is highly protective. Due to their day to day huge transactions, they spent a large amount...
  9. x32x01

    Beware of Cyber-Attacks: Protect Small Business with 7 Proven Cybersecurity Strategies

    2020 has been a rough year to both humankind and economic growth. However, a cybercrime would make it the worst, if you neglect your business’s cybersecurity measures. When you haven’t missed a single inch in achieving online presence over the internet, then there are enough chances that...
  10. x32x01

    Ncrack - Crack Network Credentials in Minutes

    Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack comes pre-installed...
  11. x32x01

    Pixie Dust Attack - Crack Wireless Routers [Easy Guide]

    Wi-Fi Protected Setup (WPS) was introduced in 2006 by Cisco for home users who wanted to connect their home network without the trouble of remembering hard passwords for the WiFi. It used an eight digit PIN to authenticate a client to the network (by PIN/Push Button/USB/Near-field communication...
  12. x32x01

    15 Best Laptops For Kali Linux & Cyber Security in 2021 - Check This Before Buy

    Best Laptop For Kali Linux Laptops for Kali Linux are not exactly like other normal laptops. We are considering to buy a laptop for Kali Linux it should help in penetration testing and programming works. As we all know Kali is a powerful Debian based Linux distribution so it doesn't need so...
  13. x32x01

    Canarytokens - Danger For Attackers

    Canarytokens are one type of customisable unique links that someone click or access this links we can get many information of target like the IP, location, browser, target is using tor or not and many more information. The main use of canarytokens is track malicious activity on our own network...
  14. x32x01

    Ghost Framework - Control Android Devices Remotely

    Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access and control Android device. Ghost Framework 7.0 gives us the power and convenience of remote Android device administration. We can use this framework to control old Android devices...
  15. x32x01

    Black Widow - Web Ripper Tool

    Website security auditing is always on demand in the cybersecurity field. Web application hacking is the main priority of every penetration testing student. We have learned in our many previous articles how we can gather information about a target. After information gathering the next process in...
  16. x32x01

    15 Powerful Gadgets For Ethical Hackers | Hardware Tools for Hackers in 2021

    Our in this platform we usually talk about various applications and their uses to check loopholes on systems. But penetration testers not only uses software applications, they also need some hardware to perform the tasks. In this detailed article we are going to cover hardware devices & gadgets...
  17. x32x01

    EyeWitness - Web Footprints and Enumeration

    EyeWitness is a tool that is designed for Kali Linux and allows a penetration tester to capture screenshots of a website without leaving the Terminal. It also provide some server header info, and identify default credentials if known. EyeWitness does all of the work in the background. Imagine...
  18. x32x01

    How to Locate a Person's Home or Cell Phone Number for Free

    The advancements that we see now in the world of today are highly ferocious and can be detrimental if they are used without any measure or extent of their usage. The most primary device that can be enlisted for the perils it possesses is the mobile phone. The mobile phone can be deemed as a...
  19. x32x01

    OSRFramework - Open Source Research Framework

    OSRFramework is an awesome open-source OSINT tool. This is a set of libraries to perform Open Source Intelligence tasks. They include references to a bunch of different applications related to username checking, DNS lookups, information leaks research, deep web search, regular expressions...
  20. x32x01

    Nakerah Lab v1

    Nakerah Lab Will make You able to install all this labs by one click , without any problems in inshallah. This project is trying to help the community to install their own lab . This is how it looks: Now this is what is Nakerah-lab V1 include . bWAPP xvwa dvwa mutillidae hackademic...
Top