OSINT CSE — Create Custom Search EngineCreating a custom search engine using Google Custom Search Engine (CSE) allows you to specify a collection of websites to search within…Jul 11, 2023Jul 11, 2023
Digital Forensics 0x5a : Image Forensic Basic | EXIF Data ExtractionHow to read EXIF data while doing image forensics ? EXIF stands for Exchangeable Image File Format, and it contains metadata about a…Jul 11, 2023Jul 11, 2023
Digital Forensics 0x4a : PDF ForensicsPDF (Portable Document Format), being used widely in these days. Simply think, you created DOC file from word, then today we save our DOC…Jul 11, 2023Jul 11, 2023
Digital Forensics 0x3a : Windows Registry Forensics “Wireless Evidence”In this article :Jul 11, 2023Jul 11, 2023
Digital Forensics 0x2a : Write Block using Winhex [Step by Step Guide]Write Blocking ensures contents do not get modified during the period of investigation. Write blocking can be done either software or…Jul 11, 2023Jul 11, 2023
BITB : Browser In The Browser AttackDisclaimer : This article is strongly “only for educational purpose”. Read, learn and share awareness about how anyone can be safe from…May 11, 2022May 11, 2022
Digital Forensics 0x1a : Intro & FTK Imager Lab [Step by Step Guide]Digital Forensics deals with finding out details on who was responsible for cyber crime activity, breach of systems or intrusions. Process…Mar 17, 2021Mar 17, 2021
(Step by Step) WIFITE — WiFi Hacking & Penetration Testing ToolPrepared by : Amit GiriMar 17, 2021Mar 17, 2021
(Step by Step) DoS attack on Router (Wireless Network Wifi)Prepared by : Amit GiriMar 17, 2021Mar 17, 2021