PinnedPublished inInfoSec Write-upsPython libraries every Hacker should knowManually enumerating targets can be a nightmare; Python automates enumeration using these libraries, which are mostly used by pentesters…Jan 38Jan 38
PinnedPublished inInfoSec Write-upsBuilding Ethical hacking lab on cloud to become a hacker | Part 1To practice my hacking skills, I need a target. Instead of using a virtual machine, I would choose Cloud. Here’s why:Jan 11Jan 11
Published inT3CHHacking with GitHub’s hidden gems for subdomain enumeration.Use these tools to automate reconnaissance, save time, and enhance the likelihood of discovering bounties.Mar 23Mar 23
Published inOSINT TeamWordPress ‘xmlrpc.php’ (CVE-2020–28036) — old is goldWhat is xmlrpc.php?Mar 1Mar 1
Published inOSINT TeamSQL Injection Unleashed: How I Learned to Hack (and Protect) DatabasesFree linkFeb 26Feb 26
Published intheWebloomHow My Coffee Chat Turned Into a VC Pitch Masterclass (6 Tips Every Founder Needs)It was the end of the semester, on a chilly February evening, marking the culmination of months filled with hard work and dedication. My…Feb 241Feb 241
Published inT3CHCracking Wi-Fi Passwords: Using the Batch-WI-FI-Brute-Forcer Tool in WindowsDisclaimer: This blog post is for educational purposes onlyJan 122Jan 122
Published inMeetCyberBest Cybersecurity Tools You Must Know Before 2024 EndsDiscover the Top Tools to Fortify Your Defenses Against Evolving Digital ThreatsDec 28, 2024Dec 28, 2024
Published inMeetCyberHow to Get $100 Free Credit in Azure with a Student EmailMicrosoft Azure offers students $100 in free credit through the Azure for Students program to explore cloud computing. This allows you to…Dec 27, 20242Dec 27, 20242
Published inInfoSec Write-upsWordlists Every Pentester Must Have !!Essential wordlists and tools that power password cracking, brute force attacks, and directory enumerationDec 16, 2024Dec 16, 2024