lakshay aroraAutomating Online Privacy with Macchanger: A Step-by-Step Guide for Kali Linux and Ethical Hacking…In today’s digitally connected world, privacy and security are more important than ever. Every time you connect to the internet, your…4 min read·Oct 24, 2023--1--1
lakshay aroraRFID Hacking: An overviewRadio-frequency identification (RFID) is a technology that is commonly used in our daily lives. Most of our College ID Cards, Employee ID…4 min read·Jan 21, 2021----
lakshay aroraComplete OSINT list 2020OSINT or Open Source Intelligence is an awesome technique used by security researchers where information and sensitive data is collected…3 min read·Nov 12, 2020----
lakshay aroraTelegram : A new dark webI have been using telegram from a past few months and found this cloud-based messaging application far better than whatsapp in terms of…5 min read·Nov 12, 2020--1--1
lakshay aroraA complete guide to Ethical HackingThis article will firstly discuss the types of hackers and then will further discuss learning path that a aspiring student can take to…8 min read·Oct 10, 2020--1--1
lakshay aroraHow to Bypass BIOS PasswordsBIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing…6 min read·Sep 21, 2020----
lakshay aroraCrack any zip file by Batch scriptingCracking zip file is a tedious and time consuming task, there are several free utilities like fcrackzip in linux( beware it might hang…4 min read·Aug 31, 2020----
lakshay aroraSimple batch script virusesBatch Scripts are stored in simple text files containing lines with commands that get executed in sequence, one after the other. Batch…3 min read·Aug 28, 2020--3--3
lakshay aroraDefeat any keylogger in 5 steps!!Today I’ll discuss about a cool tool named KeyScrambler, that claims to defeat any keylogger by obfuscating the input given by the user…2 min read·Aug 9, 2020----