Latest Posts

Latest Posts

How Do Man-in-the-Middle Attacks Work, and How Do We Prevent Them?

Man-in-the-middle (MiTM) attacks pose a significant threat to cybersecurity, involving unauthorized interception of communications between t...

Danial Zahoor 21 Apr, 2024

What is a Man-in-the-Middle (MITM) Attack?

A man-in-the-middle (MITM) attack is  a cyber attack where an attacker places themselves between two communicating parties, relaying messa...

Danial Zahoor 20 Apr, 2024

Porch Pirate: The Ultimate Postman Recon and OSINT Tool

Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation ...

Danial Zahoor 15 Apr, 2024

APKDeepLens - Android security insights in full spectrum.

APKDeepLens is a Python based tool designed to scan Android applications (APK files) for security vulnerabilities. It specifically targets t...

Danial Zahoor 14 Apr, 2024

SARA - Simple Android Ransomware Attack

SARA is a simple tool to create Trojan or Ransomware for Android devices

Danial Zahoor 29 Mar, 2024

Why You Should Consider Switching from Google Password Manager

In the realm of digital security, the management of passwords is paramount. While Google's built-in password manager may seem convenient...

Danial Zahoor 27 Mar, 2024

Chinese APT Group 'Earth Krahang' Breaches 70 Organizations in 23 Countries

A sophisticated hacking campaign attributed to a Chinese Advanced Persistent Threat (APT) group known as 'Earth Krahang' has breache...

Danial Zahoor 20 Mar, 2024