ºÝºÝߣ
Submit Search
E Hacking
25
ºÝºÝߣShares
110
Followers
57
Followings
Block User
25
ºÝºÝߣShares
110
Followers
57
Followings
Personal Information
Organization / Workplace
Auckland, New Zealand Global
Industry
Technology / Software / Internet
Website
About
A community blog for Information security expert / Ethical hackers and penetration testers that help them to learn latest tools and techniques which are helpful to achieve their goals.
Contact Details
Presentations
(17)Ìý
See all
Threats against the next billion devices
Threats against the next billion devices
Ìý
High Definition Fuzzing; Exploring HDMI vulnerabilities
High Definition Fuzzing; Exploring HDMI vulnerabilities
Ìý
New Developments in the BREACH attack
New Developments in the BREACH attack
Ìý
Exploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit Systems
Ìý
Most Important steps to become a hacker
Most Important steps to become a hacker
Ìý
Penetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the Battlefield
Ìý
Documents
(8)Ìý
See all
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
Ìý
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon Talk
Ìý
Searching Shodan For Fun And Profit
Searching Shodan For Fun And Profit
Ìý
WhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POC
Ìý
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
Ìý
LDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections Paper
Ìý