Today, I got a news from one of my stuff tat, Some Security Researchers from Myanmar are comming out, ya!. Named themselves “MyanmarCyberSecurityTeam or MCST“, WoW! So many hackers (Black | White). I don’t know what going on with those guys but I like da action and activities of this MCST for Researching and Pointing security weakness of Myanmar IT Development in Software/Hardware and Network. I glad to heard and hope that they’ll always keep their good sakes forever.

As for my I don’t want any new generations are going on with the wrong ways…
We research for test and penetrate,
We suggest them to fix their security weakness as soon as possible,
We share our knowledge with everybody..

WE ARE SMALL, BUT TOGETHER WE ARE BIG!

Explore More

What are worms?

Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents,

Selection of tools to automate an attack SQL Injection

sqlmap (http://sqlmap.sourceforge.net/) Full support: MySQL, Oracle, PostgreSQL and Microsoft SQL Server. Partially supported: Microsoft Access, DB2, Informix, Sybase and Interbase. SQL Power Injector (http://www.sqlpowerinjector.com/) Implemented support for: Microsoft SQL Server,

Introducing SpearPhisher – A Simple Phishing Email Generation Tool

SpearPhisher is a simple point and click Windows GUI tool designed for (mostly) non-technical people who would like to supplement the education and awareness aspect of their information security program.