Yash | calc1f4r

Writeups? 📝

Uploading files to Arweave using arweave.js

Uploading files to Arweave using arweave.js

The Ultimate Guide to Port Scanning using Nmap | Nmap Notes

The Ultimate Guide to Port Scanning using Nmap | Nmap Notes

Linux for hackers - Part #1 | Introduction to Linux and basics for hackers

Linux for hackers - Part #1 | Introduction to Linux and basics for hackers

Linux for hackers - Part #2 | Linux Process and Storage Management

Linux for hackers - Part #2 | Linux Process and Storage Management

Linux for hackers - Part #3 | Logical Volume Management and Managing Basic Hardware devices

Linux for hackers - Part #3 | Logical Volume Management and Managing Basic Hardware devices

Linux for hackers - Part #4 | Network Scanning and Enumeration with Linux

Linux for hackers - Part #4 | Network Scanning and Enumeration with Linux

Linux for hackers - Part #6 | Digital Forensics with Linux

Linux for hackers - Part #6 | Digital Forensics with Linux

Burpsuite 101: Introduction and Installation

Burpsuite 101: Introduction and Installation

Burp Suite 101: Exploring Burp Proxy and Target Specification

Burp Suite 101: Exploring Burp Proxy and Target Specification

Burpsuite 101: Exploring Burp Repeater and Burp Comparer

Burpsuite 101: Exploring Burp Repeater and Burp Comparer

Burpsuite 101 : Going deep Into intruder

Burpsuite 101 : Going deep Into intruder

Beginner's Guide to Wireless Hacking #1 | From Signals to Secrets

Beginner's Guide to Wireless Hacking #1 | From Signals to Secrets

A Beginner's Guide to Wireless Hacking #2 | Spoofing

A Beginner's Guide to Wireless Hacking #2 | Spoofing

A Beginner's Guide to Wireless Hacking #3| Hacking WEP Protocol

A Beginner's Guide to Wireless Hacking #3| Hacking WEP Protocol

A Beginner's Guide to Wireless Hacking #4 | Hacking WPA

A Beginner's Guide to Wireless Hacking #4 | Hacking WPA

Beginner's Guide to Wireless Hacking #5 | Exploring Evil Twin Attacks

Beginner's Guide to Wireless Hacking #5 | Exploring Evil Twin Attacks

Python for Hackers #1 | SSH Bruteforcer using Asynchronous Programming

Python for Hackers #1 | SSH Bruteforcer using Asynchronous Programming

Python for Hackers #2 | FTP Bruteforcer using asynchronous Programming

Python for Hackers #2 | FTP Bruteforcer using asynchronous Programming

Python for Hackers #3 | Building Directory Buster using asynchronous programming

Python for Hackers #3 | Building Directory Buster using asynchronous programming

Python for hackers #4 | Building Arp Spoofing/Posioning Script

Python for hackers #4 | Building Arp Spoofing/Posioning Script

Python For Hacker #5 | Building A Mutlithreaded Network Scanner

Python For Hacker #5 | Building A Mutlithreaded Network Scanner

Python For Hackers #6 | Building A Recursive Web Crawler

Python For Hackers #6 | Building A Recursive Web Crawler

Python for Hackers #7 | Building a multithreaded Subdomain Bruteforcer

Python for Hackers #7 | Building a multithreaded Subdomain Bruteforcer

Python For Hackers #8 | Building A PDF Password Brute Forcer

Python For Hackers #8 | Building A PDF Password Brute Forcer

Python For Hackers #9 | Building a Hash Cracker

Python For Hackers #9 | Building a Hash Cracker

Python For hackers #10 | Building a reverse shell

Python For hackers #10 | Building a reverse shell