Understanding the basics of containerization and why it's important Developers can package an application, its dependencies, and its configuration into…
Featured Posts
Detecting DE-AUTH packets on your wifi
Every now and then, some teens or wannabe hackers (or real ones) run a de-auth attack on the wifi signals…
Creating a virtual WebCam on Linux
There can be a lot of reasons you would want to create a virtual webcam on your machine. Your machine…
ffmpeg cheat sheet
I often forget the commands to do conversion of video or audio files. While bigger conversion I would use Handbrake,…
Latest Posts
Bot Management
Whenever a website is being popular, BOTs or fraudsters are rushing to it with the…
Detecting DE-AUTH packets on your wifi
Every now and then, some teens or wannabe hackers (or real ones) run a de-auth…
Penetration Test Tutorial – SQL Injection
Now that we have seen the SQLmap command, let's see how we can utilize this…
SQLmap Tutorial
This is my first tutorial on web-security related topic. I chose SQLmap because it is…