Ajay yadav has Published 48 Articles

NMAP Cheat Sheet

Ajay yadav

Ajay yadav

Updated on 31-Oct-2023 21:24:08

59K+ Views

Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse ... Read More

Executing C# code in Linux

Ajay yadav

Ajay yadav

Updated on 05-Jan-2021 06:38:26

4K+ Views

The .NET centric applications are meant to windows operating system up till now, but now Microsoft has introduced a new cross-platform application called Mono which enables the execution of the application developed under the .NET platform in Linux environment by giving an impression in such a way that as if we ... Read More

Malicious QR Code with QRGen

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:14:21

618 Views

The QR codes are machine-readable data formats used for anything that needs to be scanned automatically. It is possible to exploit the common vulnerabilities using exploits packed into custom QR codes as it is everywhere, from product packaging to airline boarding passes, etc. Hacker used a tool QRGen that create ... Read More

Android app Vulnerability Scanner

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:08:24

930 Views

AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. We share our personal data through mobile apps if they are not secure its mean we not secured, let start Find vulnerability of android Mobile App - App security. Through ... Read More

Build Your Own Botnet

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:05:23

7K+ Views

BYOB provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed ... Read More

How to Bypass YouTube ADs

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:03:26

297 Views

Sometimes the random ads are irritating in YouTube video. I am showing how you can bypass YouTube Ads by using a simple trick.What to do?Open your browser.Visit YouTube.com URL.When you visit your favorite video on YouTube, on address bar, you need to add a dot [.]Done.POC ExampleWhen you visit a ... Read More

Cover the Tracks using covermyass

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 11:02:19

214 Views

It is imperative to fully cover your tracks you made on the systems during assault. This tool is designed for pen testing "covering tracks" phase, before exiting the infected server. Or, permanently disable system logs for post-exploitation.This tool allows you to clear log files such as −/var/log/messages # General message ... Read More

Android Debug Bridge Mode

Ajay yadav

Ajay yadav

Updated on 29-Sep-2020 10:56:36

4K+ Views

Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The ADB is typical, used to communicate with a smartphone, tablet, smartwatch, set-top box, or any other device that can run the Android operating system. We can do things on an Android device that ... Read More

Pentesting using Docker

Ajay yadav

Ajay yadav

Updated on 23-Sep-2020 12:38:05

240 Views

You will learn how to configure vulnerable web applications (DVWA) with the help of docker in easy steps. Docker is a third-party tool developed to create an isolated environment to execute any application. These applications are run using containers. These containers are unique because they bring together all the dependencies ... Read More

TheZoo Repository Live Malware Analysis

Ajay yadav

Ajay yadav

Updated on 23-Sep-2020 12:33:30

911 Views

theZoo's allows the study of malware and enable people who are interested in malware analysis to have access to live malware, analyse the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment.git clone https://github.com/ytisf/theZoocd theZoopip install --user -r requirements.txtpython theZoo.pyI ... Read More

Advertisements