BLOG

Latest Articles

Tutorial - Lockphish V2.0 PIN phishing attack

Many devices use PIN to protect privacy of their users. In this guide, we will be using lockphish tool to phish for pin locks for different target operating

By kennedymuthii · 5 min read · Ethical hacking

SQL Mapping Carnality Explained with Examples

SQL mapping cardinalities define the relationship between the entities or tables of one relationship set with the entities or tables of another relationship

By falgunithakker · 5 min read · SQL