Home Tutorial

Tutorial

3. Python for Hackers – Victim Machine

Youtube Channel : www.youtube.com/priyankgada Facebook  : www.facebook.com/webmaster.pg Blog : www.priyankgada.blogspot.com All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers

2. Python for Hackers – Attackers Machine

Youtube Channel : www.youtube.com/priyankgada Facebook  : www.facebook.com/webmaster.pg Blog : www.priyankgada.blogspot.com All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers

1. Python For Hackers – Introduction

Youtube Channel : www.youtube.com/priyankgada Facebook  : www.facebook.com/webmaster.pg Blog : www.priyankgada.blogspot.com All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers

Facebook Bomb using VB-script

Script : ' InputBoxes Message = InputBox("What Is The Message?","WhatsApp DDos") MsgBox "VBScript Written By Priyank Gada" T = InputBox("How Many Times Needs It To Be Send?","WhatsApp DDos") If...

Whatsapp Bomb using VB-Script

Today , we are going to learn how to bomb messages on web whatsapp using VB-Script. Explanation of the script. ' InputBoxes This section is the data...

Credit Card 101 – Part 1

Hello guys , we are back with another awesome article. In this series of articles ( credit card 101 ) we are going to...

Hacking CCTV Camera System in 30 Seconds!

Security researcher Zayed Aljaberi, the founder of wesecure.ae has demonstrated the process to hack into the CCTV camera system in just 30 seconds. Here is what he...

Hack Any Android Device

Android devices are widely used around the world; applications are making this platform preferable by millions of users. As these devices are used by...

Facebook Hack: How To Modify Chats

As we all are familiar with the popular social networking site Facebook, which is used by millions of people around the world every day....

Change IMEI – MEUI META 3G

Note : Please read this post before proceeding - All About IMEI . It is important that you know what is database file , etc. Pre-requests...

Hack any website | Brute Force Attack Using Firefox

What is Brute Forcing ? Brute force is a technique in which a hacker tries random passwords ( which are generated by application or via...

How to Deny TOR user Access your Website

Tor users become risk for our servers as they can implement unethical practice into your website, server wihtout tracing as they are using tor...
- Advertisment -

Most Read

How to Reduce Risk with Runtime Application Self Protection

Instead of waning, cyber attacks continue to rise as the years pass. Several reasons contribute to this phenomenon, despite developing and deploying more robust...

Password Cracking Tutorial, Tips & Techniques

This article covers password cracking and hacking topics, including dictionary-based attacks, brute-force attacks, and rainbow table attacks. It also demonstrates various password cracking techniques...

Virtual Reality Technology: A Game Changer for Online Casinos

The online gaming industry has been changing ever since the first online casinos appeared in the late 90s. The industry is also growing every...

List of Educational Websites for Students

Knowledge is the most powerful human tool. With its help, you can build yourself a happy future. Colleges and universities teach students the skills...