Hello Cyberman, The content of this article will be on changing password with csrf. It’s a pretty dangerous vulnerability. It is very common nowadays. First […]
Changing Client Cookie – Hack The Admin User (Mutillidae: Level Low)
Hello Cyberman, The content of this article will be on changing and stealing browser cookie information for the session. I would like to say […]
There Is A Spy On The Mobile Device
Hello Cyberman! This article will be about mobile spyware and how. With the spread of smartphones, spyware begin to proliferate. And she recently reported that […]
A7 – Directory Traversal – Files (Level: Low/Medium)
Hello cyberman, The content of this article will be on directory traversal vulnerability for files. It is an old type of vulnerability. However, it is […]
A1 – HTML Injection – Reflected (GET) (Level: Low/Medium)
Hello Cyberman, The content of this article will be on HTML injection. It is an old type of vulnerability. However, it is still effective. What […]
A1 – Iframe Injection (Level: Low)
Hello Cyberman! English broadcasts will now be more frequent! This series of articles will be on web bugs. What Is The bWAPP? bWAPP is a […]
Holidays Are Dangerous, Beware of Public Wifi!
Hello Cyberman! English broadcasts will now be more frequent! Holidays… Holidays are beautiful. Sun, sand, summer, heat… There are also hotels that make these holidays […]
Network Scanning and Analysis Script with NodeJS
Hello Cyberman! English broadcasts will now be more frequent! Let’s start! What is sNTools A small group of scripts I wrote in my spare time […]
Hidden Surf With Kodachi (Install and Live Persistence Useage)
Hello Cyberman! English broadcasts will now be more frequent! This article will be about install Kodachi Linux. Let’s start! The topic of this article will […]
How To Increase Windows Network-Bandwidth?
Hello Cyberman! English broadcasts will now be more frequent! This article will be about windows bandwidth. Let’s start! What Is The Bandwith? My computer’s ethernet […]

Breaking News
What is Prompt Injection? The Most Dangerous Vulnerability in Artificial Intelligence Systems.
Gods and Titans of the Tech
Why Are Hackers Interested in Me?
What Is Email Injection? And What Can Be Done?
What Is LDAP And How To Hacking With LDAP?