×
Home
Jobs
Tools
Coding Ground
Current Affairs
UPSC Notes
Online Tutors
Whiteboard
Tutorix
Login
Categories
Java
JSP
iOS
HTML
Android
Python
C Programming
C++ Programming
C#
PHP
CSS
Javascript
jQuery
SAP
SAP HANA
Data Structure
RDBMS
MySQL
Mathematics
8085 Microprocessor
Operating System
Digital Electronics
Analysis of Algorithms
Mobile Development
Front End
Web Development
Selenium
MongoDB
Computer Network
General Topics
Q/A
Library
eBooks
Courses
Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Selected Reading
UPSC IAS Exams Notes
Developer's Best Practices
Questions and Answers
Effective Resume Writing
HR Interview Questions
Computer Glossary
Who is Who
Ajay yadav
has Published
48
Answers
Malicious QR Code with QRGen
Python
Server Side Programming
Programming
Ajay yadav
Published on 29-Sep-2020 11:10:21
The QR codes are machine-readable data formats used for anything that needs to be scanned automatically. It is possible to exploit the common vulnerabilities using exploits packed into custom QR codes as it is everywhere, from product packaging to airline boarding passes, etc. Hacker used a tool QRGen that create ...
Read More
Android app Vulnerability Scanner
Android
Mobile Development
Apps/Applications
Ajay yadav
Published on 29-Sep-2020 11:07:15
AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. We share our personal data through mobile apps if they are not secure its mean we not secured, let start Find vulnerability of android Mobile App - App security. Through ...
Read More
Build Your Own Botnet
Python
Server Side Programming
Programming
Ajay yadav
Published on 29-Sep-2020 11:05:23
BYOB provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed ...
Read More
How to Bypass YouTube ADs
YouTube
Youtube Marketing
Ajay yadav
Published on 29-Sep-2020 11:03:26
Sometimes the random ads are irritating in YouTube video. I am showing how you can bypass YouTube Ads by using a simple trick.What to do?Open your browser.Visit YouTube.com URL.When you visit your favorite video on YouTube, on address bar, you need to add a dot [.]Done.POC ExampleWhen you visit a ...
Read More
Cover the Tracks using covermyass
Linux
Operating System
Ajay yadav
Published on 29-Sep-2020 10:59:09
It is imperative to fully cover your tracks you made on the systems during assault. This tool is designed for pen testing "covering tracks" phase, before exiting the infected server. Or, permanently disable system logs for post-exploitation.This tool allows you to clear log files such as −/var/log/messages # General message ...
Read More
Android Debug Bridge Mode
Android
Mobile Development
Ajay yadav
Published on 29-Sep-2020 10:56:36
Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The ADB is typical, used to communicate with a smartphone, tablet, smartwatch, set-top box, or any other device that can run the Android operating system. We can do things on an Android device that ...
Read More
Pentesting using Docker
Docker
Computer Network
MCA
Ajay yadav
Published on 23-Sep-2020 12:37:46
You will learn how to configure vulnerable web applications (DVWA) with the help of docker in easy steps. Docker is a third-party tool developed to create an isolated environment to execute any application. These applications are run using containers. These containers are unique because they bring together all the dependencies ...
Read More
TheZoo Repository Live Malware Analysis
Virus
Computer Network
MCA
Ajay yadav
Published on 23-Sep-2020 12:32:59
theZoo's allows the study of malware and enable people who are interested in malware analysis to have access to live malware, analyse the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment.git clone https://github.com/ytisf/theZoocd theZoopip install --user -r requirements.txtpython theZoo.pyI ...
Read More
Hacking with HTA file (MSHTA.exe)
Ethical Hacking
Computer Network
MCA
Ajay yadav
Published on 23-Sep-2020 12:30:54
The Windows OS utility responsible for running HTA( HTML Application) files that we can run with JavaScript or VBScript. You can interpret these files using the Microsoft MSHTA.exe tool.Metasploit contain the “HTA Web Server” module which generates malicious hta file. This module hosts an HTML Application (HTA) that when opened ...
Read More
Hacking with Santet
Ethical Hacking
Computer Network
MCA
Ajay yadav
Published on 23-Sep-2020 12:29:34
This article articulates how to hack using Santet tool which has several different attacks built into one package. It allows you to create payload, Hijack Facebook Group, perform SMS bomber and SMS Spoof attack and finally Denial of Service attack. Follow the instruction below to learn how to install Santet ...
Read More
1
2
3
4
5
Next
Advertisements
Print
Add Notes
Bookmark this page
Report Error
Suggestions
Save
Close
Dashboard
Logout