Ajay yadav has Published 48 Answers

Executing C# code in Linux

Ajay yadav

Ajay yadav

Updated on 05-Jan-2021 06:38:26

The .NET centric applications are meant to windows operating system up till now, but now Microsoft has introduced a new cross-platform application called Mono which enables the execution of the application developed under the .NET platform in Linux environment by giving an impression in such a way that as if we ... Read More

Malicious QR Code with QRGen

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:14:21

The QR codes are machine-readable data formats used for anything that needs to be scanned automatically. It is possible to exploit the common vulnerabilities using exploits packed into custom QR codes as it is everywhere, from product packaging to airline boarding passes, etc. Hacker used a tool QRGen that create ... Read More

Android app Vulnerability Scanner

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:08:24

AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. We share our personal data through mobile apps if they are not secure its mean we not secured, let start Find vulnerability of android Mobile App - App security. Through ... Read More

Build Your Own Botnet

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:05:23

BYOB provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed ... Read More

How to Bypass YouTube ADs

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:03:26

Sometimes the random ads are irritating in YouTube video. I am showing how you can bypass YouTube Ads by using a simple trick.What to do?Open your browser.Visit YouTube.com URL.When you visit your favorite video on YouTube, on address bar, you need to add a dot [.]Done.POC ExampleWhen you visit a ... Read More

Cover the Tracks using covermyass

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:02:19

It is imperative to fully cover your tracks you made on the systems during assault. This tool is designed for pen testing "covering tracks" phase, before exiting the infected server. Or, permanently disable system logs for post-exploitation.This tool allows you to clear log files such as −/var/log/messages # General message ... Read More

Android Debug Bridge Mode

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 10:56:36

Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The ADB is typical, used to communicate with a smartphone, tablet, smartwatch, set-top box, or any other device that can run the Android operating system. We can do things on an Android device that ... Read More

Pentesting using Docker

Ajay yadav

Ajay yadav

Updated on 23-Sep-2020 12:38:05

You will learn how to configure vulnerable web applications (DVWA) with the help of docker in easy steps. Docker is a third-party tool developed to create an isolated environment to execute any application. These applications are run using containers. These containers are unique because they bring together all the dependencies ... Read More

TheZoo Repository Live Malware Analysis

Ajay yadav

Ajay yadav

Updated on 23-Sep-2020 12:33:30

theZoo's allows the study of malware and enable people who are interested in malware analysis to have access to live malware, analyse the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment.git clone https://github.com/ytisf/theZoocd theZoopip install --user -r requirements.txtpython theZoo.pyI ... Read More

Hacking with HTA file (MSHTA.exe)

Ajay yadav

Ajay yadav

Updated on 23-Sep-2020 12:31:54

The Windows OS utility responsible for running HTA( HTML Application) files that we can run with JavaScript or VBScript. You can interpret these files using the Microsoft MSHTA.exe tool.Metasploit contain the “HTA Web Server” module which generates malicious hta file. This module hosts an HTML Application (HTA) that when opened ... Read More

Advertisements