Yash | calc1f4r
Home
About
Projects
Writings
Get in touch
Writeups? 📝
Uploading files to Arweave using arweave.js
The Ultimate Guide to Port Scanning using Nmap | Nmap Notes
Linux for hackers - Part #1 | Introduction to Linux and basics for hackers
Linux for hackers - Part #2 | Linux Process and Storage Management
Linux for hackers - Part #3 | Logical Volume Management and Managing Basic Hardware devices
Linux for hackers - Part #4 | Network Scanning and Enumeration with Linux
Linux for hackers - Part #6 | Digital Forensics with Linux
Burpsuite 101: Introduction and Installation
Burp Suite 101: Exploring Burp Proxy and Target Specification
Burpsuite 101: Exploring Burp Repeater and Burp Comparer
Burpsuite 101 : Going deep Into intruder
Beginner's Guide to Wireless Hacking #1 | From Signals to Secrets
A Beginner's Guide to Wireless Hacking #2 | Spoofing
A Beginner's Guide to Wireless Hacking #3| Hacking WEP Protocol
A Beginner's Guide to Wireless Hacking #4 | Hacking WPA
Beginner's Guide to Wireless Hacking #5 | Exploring Evil Twin Attacks
Python for Hackers #1 | SSH Bruteforcer using Asynchronous Programming
Python for Hackers #2 | FTP Bruteforcer using asynchronous Programming
Python for Hackers #3 | Building Directory Buster using asynchronous programming
Python for hackers #4 | Building Arp Spoofing/Posioning Script
Python For Hacker #5 | Building A Mutlithreaded Network Scanner
Python For Hackers #6 | Building A Recursive Web Crawler
Python for Hackers #7 | Building a multithreaded Subdomain Bruteforcer
Python For Hackers #8 | Building A PDF Password Brute Forcer
Python For Hackers #9 | Building a Hash Cracker
Python For hackers #10 | Building a reverse shell