XPath Injection (Exploitation)
XPath Injection (Exploitation)

If the website is Vulnerable to XPath Vulnerability , The Attacker can Inject XPath Element  in a query that uses this language. whe...

Read more »

Use Two Whatsapp Account On One Phone Without Root
Use Two Whatsapp Account On One Phone Without Root

Whatsapp is available for all smartphones like Nokia , Lumia , Samsung , iPhones and Blackberry Using Operating systems Android , Window...

Read more »

Combine Facebook Cover Photo With Profile Picture
Combine Facebook Cover Photo With Profile Picture

Hello , Back ! With new article about how you can " Combine Facebook Cover Photos With Profile Picture" or in Other words &qu...

Read more »

Ways To Backdoor/Secure Servers
Ways To Backdoor/Secure Servers

Backdooring Of WebShell : Backdooring is an art in which every Hacker should be an artist .. So when a hacker hack a site . He defac...

Read more »

Email Spoofing Tutorial
Email Spoofing Tutorial

Today's Article is about Email spoofing , There are two ways to spoof email First one is To Use PHP Script uploaded on a server an...

Read more »
 
Top