lakshay aroraAutomating Online Privacy with Macchanger: A Step-by-Step Guide for Kali Linux and Ethical Hacking…In today’s digitally connected world, privacy and security are more important than ever. Every time you connect to the internet, your…Oct 24, 20231Oct 24, 20231
lakshay aroraRFID Hacking: An overviewRadio-frequency identification (RFID) is a technology that is commonly used in our daily lives. Most of our College ID Cards, Employee ID…Jan 21, 2021Jan 21, 2021
lakshay aroraComplete OSINT list 2020OSINT or Open Source Intelligence is an awesome technique used by security researchers where information and sensitive data is collected…Nov 12, 2020Nov 12, 2020
lakshay aroraTelegram : A new dark webI have been using telegram from a past few months and found this cloud-based messaging application far better than whatsapp in terms of…Nov 12, 20201Nov 12, 20201
lakshay aroraA complete guide to Ethical HackingThis article will firstly discuss the types of hackers and then will further discuss learning path that a aspiring student can take to…Oct 10, 20201Oct 10, 20201
lakshay aroraHow to Bypass BIOS PasswordsBIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing…Sep 21, 2020Sep 21, 2020
lakshay aroraCrack any zip file by Batch scriptingCracking zip file is a tedious and time consuming task, there are several free utilities like fcrackzip in linux( beware it might hang…Aug 31, 2020Aug 31, 2020
lakshay aroraSimple batch script virusesBatch Scripts are stored in simple text files containing lines with commands that get executed in sequence, one after the other. Batch…Aug 28, 20203Aug 28, 20203
lakshay aroraDefeat any keylogger in 5 steps!!Today I’ll discuss about a cool tool named KeyScrambler, that claims to defeat any keylogger by obfuscating the input given by the user…Aug 9, 2020Aug 9, 2020