PinnedBuild Your Own Secure VPN : A Complete Guide to Enhanced Online PrivacyIf you’re a college student with a student email ID, you can easily set up your own self-hosted VPN for free on Azure Cloud. Azure Cloud…Jun 8Jun 8
Wordlists Every Pentester Must Have !!Essential wordlists and tools that power password cracking, brute force attacks, and directory enumeration5d ago5d ago
Upgrade Your Old Laptop: Create a Home Server or Cloud with Simple StepsI had my father’s old laptop, an HP Elitebook with an i5 processor, 2GB DDR3 RAM, and a 256GB hard drive. This laptop could be utilized to…Apr 7Apr 7
Secured 5th place in the National Entrepreneurship Challenge (NEC) at E-Summit 24, IIT BombayIn February 2024, our team E-cell MET From MET Bhujbal knowledge city institute of technology Nashik, Maharashtra embarked on a thrilling…Feb 251Feb 251
A Beginner’s Guide to Cyber Forensics: Unveiling Digital MysteriesExploring the World of Cyber ForensicsAug 24, 2023Aug 24, 2023
How to hack Social Media accountsThis Blog is beginner-Friendly and Written with help of AI.Jan 26, 2023Jan 26, 2023
Linux PermissionsLinux permissions allow the owner of a file or directory to control access to that file or directory. There are three types of permissions…Jan 25, 20231Jan 25, 20231
Web Fuzzing Using ffuf toolWeb fuzzing is a technique used to identify security vulnerabilities in web applications by providing unexpected or malformed inputs to the…Jan 23, 2023Jan 23, 2023