Keyloggers, as the word itself suggests, function by logging or capturing keys or key strokes. Technically, a keylogger is a software tool or…
Hello everyone, my name is Rocky and I am a web developer and hacker. Today, I want to address a…
Bug bounty hunting is a process of identifying and reporting vulnerabilities in a company’s online assets. It is a lucrative…
Vulnerability scanning is a crucial aspect of maintaining the security of computer systems and networks. It is the process of…
CVE 2022-0847 is a privilege escalation vulnerability discovered by Max Kellerman present in Linux Kernel itself post versions 5.8 which…
Hey Folks, today’s article is going to be very interesting because we are going to talk about a method using which…
Hello to all beginner bug hunting fellows. This is Rocky, today i came with an another blog on login page.…
Web application security is critical in today’s digital world, and web application penetration testing is a crucial part of ensuring…
In the beginning, social engineering was an art of social science. It is used to change people’s behaviour and make…
Hello everyone, my name is Rocky Sah and I am an ethical hacker, web developer, and the founder of codelivly.…
Open Source Intelligence, commonly known as OSINT, refers to the information that can be gathered from publicly available sources. In…
Bug bounty programs have become an increasingly popular method for companies to identify and fix security vulnerabilities in their systems.…
In the movies, hacking is like fast keyboard typing and hitting the Enter but in the real world, hackers find…
Introduction Welcome, in this article I am going to show you how I programmed my Python script to make brute…