Today, I got a news from one of my stuff tat, Some Security Researchers from Myanmar are comming out, ya!. Named themselves “MyanmarCyberSecurityTeam or MCST“, WoW! So many hackers (Black | White). I don’t know what going on with those guys but I like da action and activities of this MCST for Researching and Pointing security weakness of Myanmar IT Development in Software/Hardware and Network. I glad to heard and hope that they’ll always keep their good sakes forever.

As for my I don’t want any new generations are going on with the wrong ways…
We research for test and penetrate,
We suggest them to fix their security weakness as soon as possible,
We share our knowledge with everybody..

WE ARE SMALL, BUT TOGETHER WE ARE BIG!

Explore More

XSS: Types and Uses

We all know that XSS is the most common exploit to be found in any website. However, different forms of XSS have different uses, as i will cover in this

SpoofTooph 0.4 Release

Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will

What are snort rules?

Snort rules are the conditions specified by a Network Administrator that differentiate between normal Internet activities and malicious activities. Snort rules are made up of two basic parts: * Rule