Hmm.. I'm pretty sure most of you, if not all, are familiar with something like this... Yes, this does look like your smartphon...

Hmm.. I'm pretty sure most of you, if not all, are familiar with something like this... Yes, this does look like your smartphon...
welcome to my yet another tutorial related to SQLi, this time as the title say it all we are going to do phishing with URL spoofing using SQ...
In this tutorial we will discuss how can some one DDOS a website using SQL injection . As for me its a new concept dint had much research or...
Well After our discussion on different types of injection and places you can find SQL injection Vulnerability, an attacker can successfully ...
After a long journey with SQL injection i guess if we dont try Insert query injection then the whole journey will be incomplete. So here we ...
Hello Friends!! In this post I will show you how you can implement mouse interactivity in OpenCV programs. First step is to declare and d...
Hello friends! Today I will explain how you can use Intel VTune Amplifier to to tune your parallel program. I will use OpenMP as example,...
Well the name itself say everything so i guess you dont need to be clerified what we are upto. But still for a small explaination, we will b...
Well the name itself say everything so i guess you don't need to be clarified what we are upto. But still for a small explaination, we w...
Hello I hope you enjoyed reading Basic Injection and Login Form Bypass etc. So its time to move on to how can someone dump out the database...
Hey Friends, after posting other Tutorials on other injection am just getting fed up of writing on SQL Injection only...as i want to move to...
Okay After Enough of those injection we are now moving towards Bypassing Login pages using SQL Injection. Its a very old trick so i got no...
I hope You Enjoyed reading Basic Injection , Death Row Injection and then XPATH & Sub Query injection . Well if you really enjoyed the...