Thursday, 18 October 2018

Had you ever imagined of a Cell-Phone without a Battery. Check it Out..!! || techtalksgroup ||

Some years before the basic requirement of any person is simply Food, Cloths, and Shelter but today one more thing is added to this queue at that is Cell-phones . Cell-Phones had become the basic requirements of today user . No work is remained now a days that cannot be performed using a smartphones. Bu the biggest problem that comes with smartphone user is to charge the phone, but suppose a lifestyle where you have to just use the smartphone...

Thursday, 27 September 2018

What are Rootkits..?? || techtalksgroup ||

What Is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components...

What is GodMode in Windows.? And how to activate it.. || techtalksgroup ||

GodMode is a special folder in Windows that gives you quick access to over 200 tools and settings that are normally tucked away in the Control Panel and other windows and menus. Once enabled, God Mode lets you do all sorts of things, like quickly open the built-in disk defragmenter, view event logs, access Device Manager, add Bluetooth devices, format disk partitions, update drivers, open Task Manager, change display settings, adjust your mouse...

Monday, 24 September 2018

New Zero-Day Vulnerability Found Effecting All Versions of Windows || techtalksgroup ||

A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system (including server editions) after the company failed to patch a responsibly disclosed bug within the 120-days deadline. Discovered by Lucas Leong of the Trend Micro Security Research team, the zero-day vulnerability resides in Microsoft Jet Database Engine that could allow an attacker to remotely execute...

Monday, 17 September 2018

Chrome vs Chromium . || techtalksgroup ||

Chrome is a massively popular web browser that is developed and released by Google, and Chromium is a niche open-source browser that has far fewer users. However, Chrome and Chromium have a lot more similarities than differences. In fact, Chrome uses the same source code as Chromium, just with extra features that Google adds on top. What is Chromium? Chromium is an open-source web browser that's developed and maintained by the Chromium Project....

Saturday, 15 September 2018

Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter ||techtalksgroup||

A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter.Web Pentest / Information Gathering: Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page Links Directory Fuzz (NEW) File Fuzz (NEW) Shodan Search (NEW) Shodan Host Lookup (NEW)  Web Application Attack: (NEW) Wordpress  |...

Thursday, 13 September 2018

Top 5 Kali Linux Tools Every Hacker Should Know All About |techtalksgroup|

Top Kali Linux Tools:-Now let’s get started with the list of my favorite tools and a lot of other hackers favorite tools too. 1. Metasploit:- Metasploit is a framework for developing exploits, shellcodes, fuzzing tool, payloads etc. And it has a very vast collection of exploits and exploitation tools bundled into this single framework. It is available for all major Operating Sytems out there Windows, OS X, and Linux and comes pre-installed in...