Posts

Hide your shadow and bypass the security: Part 2

Hacking C codes.The Dark Art of Reverse Engineering Part 1

Tracking Down the Culprit PandoraService.exe

Google Dorks (Google Hacking) Part I

Session Hijacking and Fixation

Web Application Hacking : Cookie Stealing