XPath Injection (Exploitation)
XPath Injection (Exploitation)

If the website is Vulnerable to XPath Vulnerability , The Attacker can Inject XPath Element  in a query that uses this language. when  website use client-supplied information to construct an XPath qu…

Read more »
09 Sep 2015

Use Two Whatsapp Account On One Phone Without Root
Use Two Whatsapp Account On One Phone Without Root

Whatsapp is available for all smartphones like Nokia , Lumia , Samsung , iPhones and Blackberry Using Operating systems Android , Windows , iOs and Blackberry's OS . But You Can Use Only One Whatsapp…

Read more »
08 Sep 2015

Combine Facebook Cover Photo With Profile Picture
Combine Facebook Cover Photo With Profile Picture

Hello , Back ! With new article about how you can "Combine Facebook Cover Photos With Profile Picture" or in Other words "Create Seamless Cover Photo and Profile Picture " , Facebook Introduced Timel…

Read more »
07 Sep 2015

Ways To Backdoor/Secure Servers
Ways To Backdoor/Secure Servers

Backdooring Of WebShell : Backdooring is an art in which every Hacker should be an artist .. So when a hacker hack a site . He defaces and then the so called admin of that website pop up and recove…

Read more »
04 Sep 2015

Email Spoofing Tutorial

Today's Article is about Email spoofing , There are two ways to spoof email First one is To Use PHP Script uploaded on a server and Second one is Use Online Services to Spoof email . READ ABOUT SMS S…

Read more »
01 Sep 2015
 
Top