Anshulchoudhary“Activator” Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto WalletsCracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware capable of harvesting system…Jan 24Jan 24
AnshulchoudharyGoogle Dork for SQL Injection Vulnerable WebsiteGoogle Dorks Updated Database for SQL Injection:Dec 1, 2023Dec 1, 2023
Anshulchoudhary13 Types of Cyber Attacks You Should Know in 2023In 2023, the digital landscape is filled with unprecedented cybersecurity risks. From phishing scams to ransomware attacks. This article…Nov 30, 2023Nov 30, 2023
AnshulchoudharyWhat is K9s?K9s is a terminal-based user interface that provides a real-time view of your Kubernetes cluster. It simplifies navigating, observing, and…Nov 27, 2023Nov 27, 2023
AnshulchoudharyCreating an undetectable payload using Veil-Evasion ToolkitVeil-Evasion is a tool designed to generate metasploit payloads that bypass common Anti-Virus solutions.Nov 20, 2023Nov 20, 2023
AnshulchoudharyHack a website with Ngrok, Msfvenom and Metasploit FrameworkIn a recent survey, only 15% of business owners saw security as a challenge when more than half had reported being hacked and of that, only…Nov 18, 20231Nov 18, 20231