CanonminibeastHOW TO PERFORM DOS ATTACK IN WINDOWS USING SINGLE LINE COMMANDThis kind of attack is know as ping of death.to initiates the attack one sends the malicious data packet to the target. When the data are…May 16May 16
CanonminibeastThings should do after sublister(sublist3r)Sublist3r is tool which is used by pentester which shows unique subdomains as I showed belowJan 18Jan 18
CanonminibeastCreate a linux instances inAWS EC2 VIA PuttyHey guys, its been a while am writing a blog coz, My blog mail id was hacked and I struggled to get this id once more.Jan 13Jan 13
CanonminibeastAUTOMATED SCRIPT FOR FINDING XSSAn example of a web security vulnerability is cross-site scripting (XSS), which enables attackers to insert malicious executable scripts…Oct 25, 2023Oct 25, 2023
CanonminibeastBeginner BUG BOUNTY Tools part-3Here is our third part. I’ve got good response for bug bounty tools for part 1&2 . So, I’ve managed to write this third blogOct 3, 2023Oct 3, 2023
CanonminibeastNGROK(How to host our website using Ngrok)Smrithi P ,one of my follower has requested me to write this blog ,sorry for the delay atlast i made it for youSep 24, 20231Sep 24, 20231
CanonminibeastBEGINNER BUG BOUNTY TOOLS PART 2Port scanning is the process of systematically scanning a network or a host to discover open ports and services that are available for…Sep 11, 20231Sep 11, 20231
CanonminibeastBEGINNER BUG BOUNTY TOOLS PART-1Subdomain enumeration, also known as subdomain discovery or subdomain reconnaissance, is the process of finding subdomains associated with…Sep 8, 20231Sep 8, 20231
CanonminibeastPlayItSafe google cyber security professional course 2 answers(COURSERA)Hey guys sorry for the disappointment i`ve written this answers in another blog website unfortunately due to some technical isuses,I cant…Sep 8, 2023Sep 8, 2023