Top

Category: My Videos

2016
27 Feb

ImageMagick vulnerabilities place countless websites at risk, active exploitation confirmed

27 Feb

This is my 1st IoT Research work for my Ph.D. project, the work still ongoing…IoT Scanner will scan the environment to detect any kind of Electronic device on the given parameter… E.G: Home Routers, Industrial Routers and Booster, All kind[…]

2015
27 Jul

Sending a Certain Text Message Will Force Anyone’s iPhone to Shut Down ………………….. Effective. PowerDown لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗 ℵαʊṧнα∂ ……………………… A flaw in Apple’s iOS is allowing pranksters to remotely shut down other people’s phones. Some iPhone[…]

27 Jun

T-Mobile SQL injection flaw: my.t-mobile.com

27 May

It is an art to performing a pen-test. There are various penetration testing methods available. Pen-testing should be an integral part of product SDLC cycle, and You need an Integrated Penetration Testing Tools and a Lab,These servers are used for[…]

2014
27 May

I have tested twitter app and found many bugs but this is very interesting Vulnerability check this video out 🙂

End