3. Python for Hackers – Victim Machine
Youtube Channel : www.youtube.com/priyankgada
Facebook : www.facebook.com/webmaster.pg
Blog : www.priyankgada.blogspot.com
All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers
2. Python for Hackers – Attackers Machine
Youtube Channel : www.youtube.com/priyankgada
Facebook : www.facebook.com/webmaster.pg
Blog : www.priyankgada.blogspot.com
All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers
1. Python For Hackers – Introduction
Youtube Channel : www.youtube.com/priyankgada
Facebook : www.facebook.com/webmaster.pg
Blog : www.priyankgada.blogspot.com
All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers
Facebook Bomb using VB-script
Script :
' InputBoxes
Message = InputBox("What Is The Message?","WhatsApp DDos")
MsgBox "VBScript Written By Priyank Gada"
T = InputBox("How Many Times Needs It To Be Send?","WhatsApp DDos")
If...
Whatsapp Bomb using VB-Script
Today , we are going to learn how to bomb messages on web whatsapp using VB-Script.
Explanation of the script.
' InputBoxes
This section is the data...
Credit Card 101 – Part 1
Hello guys , we are back with another awesome article. In this series of articles ( credit card 101 ) we are going to...
Hacking CCTV Camera System in 30 Seconds!
Security researcher Zayed Aljaberi, the founder of wesecure.ae has demonstrated the process to hack into the CCTV camera system in just 30 seconds. Here is what he...
Hack Any Android Device
Android devices are widely used around the world; applications are making this platform preferable by millions of users. As these devices are used by...
Facebook Hack: How To Modify Chats
As we all are familiar with the popular social networking site Facebook, which is used by millions of people around the world every day....
Change IMEI – MEUI META 3G
Note :
Please read this post before proceeding - All About IMEI . It is important that you know what is database file , etc.
Pre-requests...
Hack any website | Brute Force Attack Using Firefox
What is Brute Forcing ?
Brute force is a technique in which a hacker tries random passwords ( which are generated by application or via...
How to Deny TOR user Access your Website
Tor users become risk for our servers as they can implement unethical practice into your website, server wihtout tracing as they are using tor...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...