Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

  • Introduction to Java

    Hello there! This article is created to help you dive in Java, the programming language that changed the world. This guide assumes you've already got some experience with programming, however I'll try to explain step by step the first moves towards mastering (a bit) of Java. Taking in consideration ... continue reading
  • An Introduction to LSB Steganography

    Steganography & encryption
    Introduction The current articles on the website have talked about how to hide data inside images via either appending bytes after an image and by manipulating pixels. In this article, we’re going to go a bit deeper in the second technique by explaining a few algorithms used to hide data. Knowled... continue reading
  • Hiding files with s-tools

    Steganography & encryption
    STEP 1. you need to download a software called s-tools . [image] STEP 2. search an image in which you want to hide your secret file . image must be in bmp or gif format. jpeg is not compatible . STEP 3.if you have bmp image then good . else you can convert your image into bmp online .convertor [im... continue reading
  • Lock Picking - A Basic Guide

    Lock picking
    Introduction This guide is aimed at showing you the basic theory on how to pick a simple pin-and-tumbler lock. There are a few methods but some popular ones are rakes, bump keys, or actually picking it. Lock Picking Materials * Tension Wrench: Something small/thin enough to fit in the end of the k... continue reading
  • XSLT Inclusion Vulnerabilities

    Website Security
    I've long wanted to introduce this method but never got round to it really. To start off, this writing will discuss some not so common vulnerabilities caused by file and vector transformations by the XSLT processor. So to say, XSL is generally CSS for XML. Acunetix describes this as XSL injection. B... continue reading