ImageMagick vulnerabilities place countless websites at risk, active exploitation confirmed
Category: My Videos
This is my Ph.D Project work
This is my 1st IoT Research work for my Ph.D. project, the work still ongoing…IoT Scanner will scan the environment to detect any kind of Electronic device on the given parameter… E.G: Home Routers, Industrial Routers and Booster, All kind[…]
Sending a Certain Text Message Will Force Anyone’s iPhone to Shut Down ………………….. Effective. PowerDown لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗 ℵαʊṧнα∂ ……………………… A flaw in Apple’s iOS is allowing pranksters to remotely shut down other people’s phones. Some iPhone[…]
T-Mobile SQL injection flaw: my.t-mobile.com
It is an art to performing a pen-test. There are various penetration testing methods available. Pen-testing should be an integral part of product SDLC cycle, and You need an Integrated Penetration Testing Tools and a Lab,These servers are used for[…]
I have tested twitter app and found many bugs but this is very interesting Vulnerability check this video out 🙂
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|