Pages

CYBER SECURITY

Google Hacking Cheat Sheet

SQL Injection Cheat Sheet

PROXY CHAIN - evade detection when hacking

DOS attacks ( simple explanation )


How To Exploit using Metasploit (ANDROID)

All Terms belongs to Metasploit Framework or Network Attack

NMAP Cheat Sheet and All Explanations
[ DOWNLAOD ]

Usage of Burp-Suit
[ READ ]

NMAP Cheat Sheet 2 
[ DOWNLAOD ]

AIRCRACK-NG 
[ DOWNLAOD ]

METASPLOIT CHEAT SHEET 2
[ DOWNLOAD ]




my ftp : http://3f768a22.ngrok.io/




1 comment: