Latest Posts
-
Simple Python Keylogger: Build in Minutes (Under 50 Lines)
What if I told you that one of the most notorious tools in the cybersecurity underworld isn’t some arcane piece of elite code, but something you could build yourself in about 15 minutes with a Python library you can install…
-
Black Friday Cybersecurity Offers Ultimate 2024 Deals
Black Friday has become the day of fantastic sales not just across markets, but for the whole community of cybersecurity. It provides an opportunity for individuals and businesses to purchase security tools, certifications, and training programs at ridiculously low prices.…
-
HackTheBox – PermX Walkthrough
Before starting any HackTheBox machine there are a few rituals that need to be done i.e. let’s add the IP and Host to the /etc/hosts file and start with the Nmap scan.
-
Software Dev phase 7: Beans and its configurations
Understanding the scopes of bean , their life and how to configure them
-
VishwaCTF’22 WriteUps: Cryptography
Cryptography writeups of all the challenges asked in the VishwaCTF 2022 edition
Learn Something New
-
Simple Python Keylogger: Build in Minutes (Under 50 Lines)
What if I told you that one of the most notorious tools in the cybersecurity underworld isn’t some arcane piece of elite code, but something you could build yourself in about 15 minutes with a Python library you can install…
-
Software Dev phase 7: Beans and its configurations
Understanding the scopes of bean , their life and how to configure them
-
Software Dev phase 6: IOC containers
Complete working of how an IoC container is responsible for dependency injection. Its components and modern-day IOC containers.
-
Software Dev phase 5: Introduction to Spring Framework
Introduction to Spring Framework, Dependency injection and inversion of control along with its advantages and examples.
-
Setup Web Server on the Cloud (EC2)
Detailed steps to setup and configure a web server of your own using AWS instance.(EC2)
News
-
The new version of WhatsApp
WhatsApp recently rolled out a new multi-device feature for its beta testers that would work on multiple devices even when the phone is not connected to the internet or does not have battery.
-
The EA Hack: FIFA 2021 and other 780gb approx files stolen
Hackers selling 780gb of stolen data from EA( Electronic Arts) which includes source code of FIFA 2021 and FrostBite matchmaking server codes.
-
The recent Whatsapp and Signal Dispute
The most recent clash between Facebook and Signal due to the ad-campaign run by the latter, led to the deactivation of Signal’s account.
-
The Algorithm behind Spotify
The major working principle and algorithm behind the working of spotify
-
How to cheat in an AI proctored exam? Trick AI with its Limitations
The number of ways to trick an AI in an AI proctored exam. These are the most basic limitations of an AI which can never compete with real intelligence of the students.
Tutorials
-
Simple Python Keylogger: Build in Minutes (Under 50 Lines)
What if I told you that one of the most notorious tools in the cybersecurity underworld isn’t some arcane piece of elite code, but something you could build yourself in about 15 minutes with a Python library you can install…
-
Enabling GUI support in WSL2: Kick off! Vmware
Get the latest tech news and updates, ethical hacking tutorials and cybersecurity tips and tricks. Check out MeuSec for more.
-
How to Dual Boot Ubuntu and Windows 10?
Ubuntu is a great and feature-rich linux distro. In this article, you’ll be guided through the steps of Dual Booting Ubuntu along with Windows 10.
-
How to cheat in an AI proctored exam? Trick AI with its Limitations
The number of ways to trick an AI in an AI proctored exam. These are the most basic limitations of an AI which can never compete with real intelligence of the students.
-
Hack The Box: How to get the invite code?
To even join Hack The Box, you have to hack your way in or treat it like a CTF challenge by finding the invite code. This article will take you through how to achieve the challenge mentioned. However, I highly…
Capture The Flag
-
HackTheBox – PermX Walkthrough
Before starting any HackTheBox machine there are a few rituals that need to be done i.e. let’s add the IP and Host to the /etc/hosts file and start with the Nmap scan.
-
VishwaCTF’22 WriteUps: Cryptography
Cryptography writeups of all the challenges asked in the VishwaCTF 2022 edition
-
VishwaCTF’22 Writeups: Forensics
Forensics writeups of all the challenges asked in the VishwaCTF 2022 edition
-
VishwaCTF’22 writeups: Web
Web writeups of all the challenges asked in the VishwaCTF 2022 edition
-
VishwaCTF’22 Writeups: Steganography
Steganography writeups of all the challenges asked in the VishwaCTF 2022 edition
Tech Market
-
Black Friday Cybersecurity Offers Ultimate 2024 Deals
Black Friday has become the day of fantastic sales not just across markets, but for the whole community of cybersecurity. It provides an opportunity for individuals and businesses to purchase security tools, certifications, and training programs at ridiculously low prices.…
-
The 5 Best Laptops For Any Hacker/Programmer in 2021
The 6 best and the top laptops for any programmer, cybersecurity/hacker, gamer to purchase in 2021. Starting from the lowest to the great budget laptops.Here are all of them
-
CES 2021: AMD & Intel Everything Wrapped up!
Everything wrapped up from the latest event CES 2021 from intel and AMD. The rivalry and the greatest laptop processor battle launch after the desktop processor battle.
-
Nvidia RTX 3000s: Scalping Your Lead Off!
How Nvidia GPUs are purchased using bots to bulk-buy a product, and then put them up for sale on eBay or Amazon for an inflated price which rips off buyer’s eyes out!
-
Best Budget monitors for Coders and Hackers
The best budget monitors especially for hackers and programmers with a detailed information for why they are required so much and what to know before buying them!