5P1R1DT-Mobile DATA BREACHWhy you you should check this blog out, cause you want to know are you and your data safe?Jan 22, 2023Jan 22, 2023
5P1R1DHow to run a DOCKER NGINX server in 5 Minute!Devops Blogs Series: Part 1Nov 12, 2022Nov 12, 2022
5P1R1DWHAT is CIDR actually?CIDR (Classless Inter-Domain Routing) — also known as supernetting — is a method of assigning Internet Protocol (IP) addresses that…Apr 22, 2022Apr 22, 2022
5P1R1DYour SIM Card Can Get Hacked, And Hackers Can Use It To Steal Your Entire Bank Savings!Cyber hackers have discovered a very clever way to plunder money without making too much effort on their part.Feb 13, 20221Feb 13, 20221
5P1R1DHail Hydra!!Login pages gear with 2FA, or bow before The Ultimate Kali Linux Tool : HydraFeb 1, 2022Feb 1, 2022
5P1R1DinSystem WeaknessClone any Website’s Login Page in 1 Min!Youtube Link: https://youtu.be/Yt0giisAi5YJan 15, 2022Jan 15, 2022
5P1R1DInject Your Own Data Into Any Website!What shit is this Injection Attack?Jan 4, 20221Jan 4, 20221
5P1R1DMysuru Hospital Data BreachHackers steal Karnataka’s Mysuru Hospital Data, and wanted Ransom for it in to be paid in Bitcoin…Dec 5, 2021Dec 5, 2021