Techno News
Reviews
Programming
c#
C_Language
Interview Questions
java
Python Programming
Ruby On Rails
Ruby
C Programming
Security
Gaming
Console
Cambiar
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
13.7
C
Delhi
Sunday, January 24, 2021
Guest Post
Cambiar
Careers: Hiring Ruby on Rails Interns
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Buffercode
Techno News
All
Reviews
android
WhatsApp starts rolling out hide mute status updates, Facebook Pay, alignment…
Camera
New Sony A7R IV camera is a 61 MP full-frame mirrorless…
Hardware
MI new TV launch on September 17th, 2019
Apple
OFFICIAL – iPhone 11 Pro release date, specs and price.
Programming
All
c#
C_Language
Interview Questions
java
Python Programming
Ruby On Rails
Ruby
Guest Articles
10 Qualities of a Good Python Developer
Ruby On Rails
QuickBooks with Rails 5
c#
Why certifications make a difference while choosing a .net software development…
java
Building an ArrayList from an Array in Java Software Development
C Programming
Security
Artificial Intelligence
UK court backs police use of face recognition, but the fight…
android
CamScanner: Google store removed the app as it contains malware
Articles
Is Dropbox safe against Ransomware and Hacks?
android
9 Million Google play users infected by Adware (Android Virus)
android
Russia Got Targeted By Rotexy Trojan
Gaming
All
Console
Game
Free Batman Arkham trilogy is available to download
Game
World of Warcraft is dominating Twitch because Fortnite streamers are desperate…
Console
New Nintendo accessory can trick you into exercising!
android
9 Million Google play users infected by Adware (Android Virus)
Cambiar
Home
Tags
Exploits
Tag: Exploits
Exploits
How to make sure a file is safe or threat? |...
Rajbir Singh
-
April 25, 2017
0
Apple
Mac Malware: Time to test Apple’s Security
Rajbir Singh
-
April 24, 2017
0
Exploits
A new Zero-Day vulnerability in recently patched Flash Player
Satyam Vashistha
-
October 14, 2015
0
Security
NETGEAR Router Exploit: Critical Bug in NETGEAR Router
Satyam Vashistha
-
October 11, 2015
0
C_Language
Format string exploits
Kushagra Sharma
-
June 23, 2015
0
Exploits
PentestBox: A Portable Penetration Testing Distribution for Windows Environments
Kushagra Sharma
-
June 22, 2015
0
Exploits
Explore into the Metasploit ( a Ultimate Hackers Tool)
Vipin Kumar
-
March 27, 2015
0
Exploits
Exploit Development Process:Moving towards Real world Hacking
Kushagra Sharma
-
March 20, 2015
0
C_Language
Exploit using shell code from command line
Vipin Kumar
-
March 19, 2015
0
Exploits
Exploiting buffer overflows using command line
Kushagra Sharma
-
March 19, 2015
0
Interview Questions
Next step towards exploit : finding the return address
Kushagra Sharma
-
March 19, 2015
0
Exploits
Important things to do after installing Kali Linux
Vipin Kumar
-
March 11, 2015
2
Exploits
Complete Guidance to Install Kali linux in Dual Boot Mode without...
Vipin Kumar
-
March 9, 2015
2
C++
Memory management in C Programming:Computer Memory
Kushagra Sharma
-
January 18, 2015
0
Exploits
Vulnerability in PayPal user authentication system
Kushagra Sharma
-
December 6, 2014
0
Exploits
Crash friends whatsapp by sending 200 kb message
Kushagra Sharma
-
December 1, 2014
4
C++
Basic Linux exploits: Function Calling Procedure
Kushagra Sharma
-
December 1, 2014
0
Exploits
Basic Exploits : Stack Operations
Kushagra Sharma
-
November 30, 2014
0
Exploits
Basic Linux Exploits:Make your Pc more secure
Kushagra Sharma
-
November 15, 2014
0