fbpx
Home Video

Video

6. Python for hackers – Reverse TCP Shell Client

You can find all the shells on my github repository . Github : https://goo.gl/FLENRY Ask Questions to instructor : https://goo.gl/zpXK9r About Instructor : Priyank Gada www.youtube.com/priyankgada www.facebook.com/webmaster.pg

5. Python For Hackers – Reverse TCP Shell Server

Github Page : https://goo.gl/FLENRY Reverse TCP Shell Server Source : https://goo.gl/x9aomr Ask Questions to instructor : https://goo.gl/zpXK9r Instructor : priyank Gada www.youtube.com/priyankgada www.facebook.com/webmaster.pg

4. Python For Hackers – Reverse TCP Shell

Youtube Channel : www.youtube.com/priyankgada Facebook  : www.facebook.com/webmaster.pg Blog : www.priyankgada.blogspot.com All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers

3. Python for Hackers – Victim Machine

Youtube Channel : www.youtube.com/priyankgada Facebook  : www.facebook.com/webmaster.pg Blog : www.priyankgada.blogspot.com All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers

2. Python for Hackers – Attackers Machine

Youtube Channel : www.youtube.com/priyankgada Facebook  : www.facebook.com/webmaster.pg Blog : www.priyankgada.blogspot.com All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers

1. Python For Hackers – Introduction

Youtube Channel : www.youtube.com/priyankgada Facebook  : www.facebook.com/webmaster.pg Blog : www.priyankgada.blogspot.com All Files / Download Links / Source codes : github.com/priyankgada/python-for-hackers

Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable

Malware developers are constantly looking for new ways to evade the detection and prevention capabilities of security solutions. In recent years, we have seen...

Facebook Bomb using VB-script

Script : ' InputBoxes Message = InputBox("What Is The Message?","WhatsApp DDos") MsgBox "VBScript Written By Priyank Gada" T = InputBox("How Many Times Needs It To Be Send?","WhatsApp DDos") If...

Whatsapp Bomb using VB-Script

Today , we are going to learn how to bomb messages on web whatsapp using VB-Script. Explanation of the script. ' InputBoxes This section is the data...

Credit Card 101 – Part 1

Hello guys , we are back with another awesome article. In this series of articles ( credit card 101 ) we are going to...

OSTrICa – Open Source Threat Intelligence Collector

OSTrICa stands for Open Source Threat Intelligence Collector and is an Open Source plugin-oriented framework to collect and visualize Threat Intelligence Information. Furthermore, OSTrICa is also the Italian word...

Threats against the next billion devices

The Cyber attacks are not like the natural disaster or other forces of nature nor are they like diseases or other autonomously evolving and...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...