Protocol Warfare: TCP and UDP in the Hacker’s Arsenal of NetworkingHello there! It’s been awhile i know, now I’m back to teach you about networking and how it’s important to know this as a “Hacker”. I’ll…Dec 1, 2023Dec 1, 2023
Google Dorking for HackersAm back and ready to walk you through this tutorial, and yes you did read the title right. It’s gonna be about Google Dorking, we are going…Aug 6, 2023Aug 6, 2023
Web Crawl Like a ProWelcome back! Let’s talk about web crawling, there’s one thing hackers love and it is to crawl websites to find security holes for them to…Aug 1, 2023Aug 1, 2023
Mastering Subdomain EnumerationHello, hello! It’s me your weird security researcher here lol. We’re going to be talking about subdomain enumeration, and how to master it…Jul 30, 2023Jul 30, 2023
Unveiling Software Vulnerabilities: A Comprehensive Exploration of the Different Types of Security…Hi there! Lets talk about the different types of vulnerabilities out there in cyberspace. In order to become a hacker its crucial to…Jul 30, 2023Jul 30, 2023
Introduction: How to become a Hacker?Hello there! Welcome to this exciting journey into the world of hacking. Now, before you dismiss it as just another typical hacker guide…Jul 30, 2023Jul 30, 2023