PinnedPublished inT3CHCracking Wi-Fi Passwords: Using the Batch-WI-FI-Brute-Forcer Tool in WindowsDisclaimer: This blog post is for educational purposes onlyJan 121Jan 121
PinnedPublished inInfoSec Write-upsPython libraries every Hacker should knowManually enumerating targets can be a nightmare; Python automates enumeration using these libraries, which are mostly used by pentesters…Jan 38Jan 38
Published inMeetCyberBest Cybersecurity Tools You Must Know Before 2024 EndsDiscover the Top Tools to Fortify Your Defenses Against Evolving Digital ThreatsDec 28, 2024Dec 28, 2024
Published inMeetCyberHow to Get $100 Free Credit in Azure with a Student EmailMicrosoft Azure offers students $100 in free credit through the Azure for Students program to explore cloud computing. This allows you to…Dec 27, 20242Dec 27, 20242
Published inInfoSec Write-upsWordlists Every Pentester Must Have !!Essential wordlists and tools that power password cracking, brute force attacks, and directory enumerationDec 16, 2024Dec 16, 2024
Published inInfoSec Write-upsBuild Your Own Secure VPN : A Complete Guide to Enhanced Online PrivacyIf you’re a college student with a student email ID, you can easily set up your own self-hosted VPN for free on Azure Cloud. Azure Cloud…Jun 8, 2024Jun 8, 2024
Published inInfoSec Write-upsUpgrade Your Old Laptop: Create a Home Server or Cloud with Simple StepsI had my father’s old laptop, an HP Elitebook with an i5 processor, 2GB DDR3 RAM, and a 256GB hard drive. This laptop could be utilized to…Apr 7, 2024Apr 7, 2024
Secured 5th place in the National Entrepreneurship Challenge (NEC) at E-Summit 24, IIT BombayIn February 2024, our team E-cell MET From MET Bhujbal knowledge city institute of technology Nashik, Maharashtra embarked on a thrilling…Feb 25, 20241Feb 25, 20241
Published inMeetCyberA Beginner’s Guide to Cyber Forensics: Unveiling Digital MysteriesExploring the World of Cyber ForensicsAug 24, 2023Aug 24, 2023