Ajay yadav

Ajay yadav

38 Articles Published

Articles by Ajay yadav

38 articles

Malicious QR Code with QRGen

Ajay yadav
Ajay yadav
Updated on 25-Mar-2026 1K+ Views

QR codes are machine-readable data formats used across various applications, from product packaging to airline boarding passes. However, these convenient codes can be exploited by attackers who embed malicious payloads into custom QR codes using tools like QRGen. Since humans cannot read QR code content without scanning, malicious codes are difficult to identify before exposure, making QR code attacks particularly effective against vulnerable devices. QRGen is a Python tool that generates malicious QR codes by encoding various exploit payloads. It includes a built-in library of popular exploits, making it valuable for penetration testers auditing QR code scanners and security ...

Read More

Build Your Own Botnet

Ajay yadav
Ajay yadav
Updated on 25-Mar-2026 9K+ Views

BYOB (Build Your Own Botnet) is an educational framework designed for security researchers and developers to understand malware behavior and develop countermeasures. This Python-based tool helps create a controlled botnet environment for learning purposes. BYOB Architecture Command & Control Server (server.py) Bot Clients (testbot.py) Target Machines ...

Read More

Bypass Anti-virus using Veil Framework

Ajay yadav
Ajay yadav
Updated on 25-Mar-2026 2K+ Views

This article demonstrates how to bypass antivirus detection using the Veil Framework, a collection of penetration testing tools. The framework consists of several modules designed for payload generation and evasion techniques. Veil Framework Components The Veil Framework includes the following key modules − Veil-Evasion − generates antivirus-evading payloads using various techniques and programming languages Veil-Catapult − a psexec-style payload delivery system that integrates with Veil-Evasion Veil-PowerView − a PowerShell tool for network reconnaissance on Windows domains Veil-Pillage − a modular post-exploitation framework integrated with ...

Read More

Reset Kali Linux Password

Ajay yadav
Ajay yadav
Updated on 17-Mar-2026 2K+ Views

Kali Linux is a Debian-derived Linux distribution designed for penetration testing and digital forensics, adopted by both hackers and security professionals. Users may find themselves unable to login due to a forgotten password or after installing Kali in a virtual environment or dual boot configuration. This article explains how to reset the Kali Linux password using the built-in recovery options. When locked out of the system, users typically encounter a login prompt where entering incorrect credentials results in access denial. Step-by-Step Password Reset Process Step 1: Access GRUB Boot Menu Reboot your Kali Linux ...

Read More

Cover the Tracks using covermyass

Ajay yadav
Ajay yadav
Updated on 17-Mar-2026 414 Views

CoverMyAss is a penetration testing tool designed for the "covering tracks" phase of security assessments. It helps security professionals clean up evidence of their activities on target systems before exiting, or disable system logs for post-exploitation analysis. This tool is essential for ethical hackers and penetration testers who need to simulate real-world attack scenarios. How CoverMyAss Works The tool operates by systematically clearing or manipulating various system log files that record user activities, authentication attempts, and system events. It targets critical log files where evidence of unauthorized access might be stored, ensuring a thorough cleanup process. Target ...

Read More

Windows UAC protection Bypass

Ajay yadav
Ajay yadav
Updated on 17-Mar-2026 437 Views

User Account Control (UAC) is a Windows security feature that prevents unauthorized changes to the system by requiring administrator-level permissions for certain operations. It acts as a barrier between standard user accounts and administrative functions, prompting users to confirm or provide credentials when attempting to perform tasks that could affect system security or stability. UAC is designed to reduce the attack surface by ensuring that even users with administrator accounts run most applications with standard user privileges. When administrative access is needed, UAC displays a prompt requiring explicit consent or credentials. Understanding UAC Bypass Techniques This tutorial ...

Read More

Run Linux Natively on Windows 10

Ajay yadav
Ajay yadav
Updated on 17-Mar-2026 563 Views

Microsoft has introduced the Windows Subsystem for Linux (WSL), which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine. This feature bridges the gap between Windows and Linux environments, allowing developers and system administrators to use Linux tools natively on Windows. Limitations of Windows Subsystem for Linux While WSL is a significant step forward for Microsoft, it has some limitations in terms of full functionality. Specifically, WSL does not support AF_PACKET due to security restrictions. This means you won't be able to put a Wi-Fi adapter in promiscuous mode ...

Read More

Executing C# code in Linux

Ajay yadav
Ajay yadav
Updated on 17-Mar-2026 6K+ Views

The .NET ecosystem was traditionally limited to Windows, but Microsoft's introduction of Mono changed this landscape. Mono enables the execution of .NET applications on Linux systems, making them run as if they were native Linux packages rather than Windows executable files. What is Mono? Mono is an open-source, cross-platform implementation of Microsoft's .NET Framework. It allows developers to run .NET applications on various platforms including Linux and macOS. Mono provides a complete development stack that supports Windows Forms, LINQ, XML web services, ADO.NET, and ASP.NET using the same CLR namespaces. Cross-Platform .NET with ...

Read More

Cyber Attack Symptoms

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 370 Views

A cyber attack can compromise your computer's security even when advanced antivirus software is installed. While regular system scans provide protection, attackers use sophisticated techniques that may bypass detection. Recognizing the warning signs of an active attack is crucial for immediate response and damage control. Understanding these symptoms helps identify potential breaches before significant damage occurs, allowing for prompt remediation actions. Common Cyber Attack Symptoms Process and Network Anomalies Unauthorized PowerShell activity − Unusual PowerShell processes running in Task Manager without user initiation indicate potential remote access or malware execution. Suspicious network ...

Read More

NMAP Cheat Sheet

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 100K+ Views

Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers features for probing computer networks, including host discovery and service and operating system detection. Nmap provides additional information on targets, including reverse DNS names, device types, and MAC addresses. It supports scriptable interaction through the Nmap Scripting Engine (NSE) for advanced network reconnaissance. Nmap Network Discovery Process Scanner Host Discovery ...

Read More
Showing 1–10 of 38 articles
« Prev 1 2 3 4 Next »
Advertisements