Radio-frequency identification (RFID) is a technology that is commonly used in our daily lives. Most of our College ID Cards, Employee ID cards, hotel’s mastercards use RFID as their primary method for authentication. Several technologies like NFC(Near Field Communication) are based on RFID with additional benefits/add-ons like peer-to-peer communication, card…

OSINT or Open Source Intelligence is an awesome technique used by security researchers where information and sensitive data is collected by excavating open source platforms like social media sites, public DNS records, etc. This blog will cover several OSINT sources that you can refer in 2020 to satisfy your aim.

google translate

I have been using telegram from a past few months and found this cloud-based messaging application far better than whatsapp in terms of privacy, anonymity and easy to use features like inbuilt bots{which do almost everything for you}. …

This article will firstly discuss the types of hackers and then will further discuss learning path that a aspiring student can take to become a successful penetration tester.

Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide…

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their…

Cracking zip file is a tedious and time consuming task, there are several free utilities like fcrackzip in linux( beware it might hang your system) and zip_cracker( not optimized to efficiently use system full power) in windows that can perform your task, but they are platform dependent. …

Batch Scripts are stored in simple text files containing lines with commands that get executed in sequence, one after the other. Batch files are often used to help load programs, run multiple processes at a time, and perform common or repetitive tasks. For example, a batch job could be used

Today I’ll discuss about a cool tool named KeyScrambler, that claims to defeat any keylogger by obfuscating the input given by the user before it gets hooked by the Windows MSDN Api’s and then de-obfuscates it whenever any other utility like text editor requires it. …

NOTE: This is for education purpose only

What is a botnet ?

What are botnets made for ?

How does a hacker monetize/profit from them ?

Where do hackers host them ?

Known DDoS Bots ?

How do cyber criminals get away with them ?

How do people get so…

All this commands are used on the “run” windows on windows, you can get this by pressing the windows button and r on your keyboard, the commands you have to type are structured like shell:<command> and the description

shell:AccountPictures Account Pictures

shell:AddNewProgramsFolder The "Get Programs" Control panel item

shell:Administrative Tools…

lakshay arora

Hi! I am a B.Tech student, whose enjoys reverse engineering and digital forensics. I relish reading anything and everything about cybersecurity.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store