top of page

Here's a chance to power up your professional life as a software developer. Don't miss out on our latest blogs. Subscribe to our Newsletter today!

Gourav Dhar
Aug 10, 20242 min read
Encryption in Typescript
I have coded for encrypting data using the 'aes-256-cbc' algorithm.

Gourav Dhar
Aug 1, 20224 min read
How to perform a basic SQL Injection Attack? — Ethical Hacking
How does a SQL Injection attack work? SQL injection attack is possible when a website exposes inputs to be taken from the user and uses...


Gourav Dhar
Jul 25, 20224 min read
How hackers impersonate email-id’s : Email Spoofing and Phishing Attacks
Email Spoofing Email Spoofing is a type of cyber-attack where the attacker sends fake emails which appear to have been sent by a...


Gourav Dhar
Jul 18, 20223 min read
Finding Vulnerable Info Using Google Dorks — Ethical Hacking
Google Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet. What is...

Gourav Dhar
Jul 4, 20224 min read
How I created an undetectable Backdoor for Windows — Ethical Hacking
What is a Backdoor? Backdoor is a method of secretly gaining remote access to a computer by bypassing the normal authentication and...

Gourav Dhar
Jun 27, 20223 min read
How I created my first Web Crawler!
What is a web crawler? A web crawler is a bot that crawls the internet to index and downloads the contents of websites for scraping. Web...

Gourav Dhar
Jun 20, 20223 min read
How I created a Trojan Malware — Ethical Hacking
A Trojan horse (or Trojan) is one of the most common and dangerous types of threats that can infect your computer or mobile device. What...


Gourav Dhar
Jun 13, 20221 min read
Spoofing file extensions — Ethical Hacking
File extension spoofing is a handy trick when creating trojans. In this blog, I will be spoofing the ‘.exe’ extension to the ‘.jpg’...


Gourav Dhar
Jun 13, 20224 min read
Information Gathering — First Step towards Website Hacking
Hacking a website? Don’t miss out on this important step! Before hacking a website or a resource, it is a good practice to first...


Gourav Dhar
Jun 6, 20222 min read
How to securely browse the Internet | Prevent data leaks while connecting to public WiFi network
Feeling insecure while browsing on public WiFi? This blog is for you. Risk related to Public wifi networks Whenever someone connects to...
bottom of page