Open in app
Home
Notifications
Lists
Stories

Write
Chamo Wijetunga
Chamo Wijetunga

Home

Jun 24, 2020

Automate LinkedIn Login with Selenium

In our previous post we understood what web automation is. So here, I am going to demonstrate how to automate LinkedIn login and go to notification page by using selenium web automation and Firefox browser. First step, Download and install Python Before start automating we must have to download python current version to our computer. First…

Automation

4 min read

Automate LinkedIn Login with Selenium
Automate LinkedIn Login with Selenium

Jun 22, 2020

Web Automation with Selenium

This is the basic knowledge that I gathers from self learning about selenium suite. What is web Automation and testing? Automated website testing is a process in which various software tools are used to evaluate the performance of a website. The process streamlines and standardizes website testing parameters for configuration changes that occur during the development…

Web Development

6 min read

Web Automation with Selenium
Web Automation with Selenium

May 12, 2020

Augmented Reality With Unity3D

Step by step guide to create your own AR application with Unity3D — What is Augmented Reality means? Augmented reality, cool name. Isn’t it? Augmented Reality is an interactive experience of a real-world environment where the objects that reside in the real world are enhanced by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, somatosensory and olfactory. AR can be defined as a system…

Unity 3 D

8 min read

Augmented Reality With Unity3D
Augmented Reality With Unity3D

May 3, 2020

Access Dark Web [Part 1].

This is only for Educational Purposes. First of all we have do download and install tor browser. Windows users, it is very easy. They just need to download the .exe file and install it. Things going same to the mac users. but Linux users have to do few source code…

Darkweb

4 min read

Access Dark Web [Part 1].
Access Dark Web [Part 1].

May 3, 2020

What is the Deep/Dark web ?

This is only for Educational Purposes. What Is the Deep Web? First of all, the deep web and the dark web are not one and the same thing, though they can overlap significantly. The deep web refers to all the pages which are not indexed, which means that most search engines won’t return them to…

Deep Web

5 min read

What is the Deep/Dark web ?
What is the Deep/Dark web ?

Apr 29, 2020

Exploiting Vulnerabilities in Windows 2000 (Server)

What is Windows 2000 Server? Microsoft Windows 2000 Server is a multipurpose network operating system. It is available in three versions, each geared toward variously sized organizations and applications: Windows 2000 Server — an entry level server designed for use in small and midsize businesses as a file, print, intranet and infrastructure server. Windows 2000…

Hacking

7 min read

Exploiting Vulnerabilities in Windows 2000 (Server)
Exploiting Vulnerabilities in Windows 2000 (Server)

Apr 29, 2020

Get Tor Browser to Kali Linux easily. [Get ready for Deep Web.]

This is only for Educational Purposes. What is Tor Browser ? / Tor Project ? Tor is free and open-source software for enabling anonymous communication. The name is derived from the acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays…

Hacking

7 min read

Get Tor Browser to Kali Linux easily. [Be ready for access Deep Web.]
Get Tor Browser to Kali Linux easily. [Be ready for access Deep Web.]

Apr 27, 2020

How to Clone a website and use it for Credential Harvesting outside the Network.

This is only for Educational Purposes. What is Website Cloning? Website replication applies to copying or changing an current website or script template to create a new website. Cloning the website helps programmers to build templates without needing to compose scripts from scratch. A designer will change the style and construct a new website…

Hacking

6 min read

How to Clone a website and use it for Credential Harvesting outside the Network.
How to Clone a website and use it for Credential Harvesting outside the Network.

Apr 25, 2020

Few things to do with your Android Victim.

This is only for Educational Purposes. Previously, We did some malicious payload injection to an android application using Kali Linux and Evil-Droid toolkit. In this article we are going to find out how that malicious app works and what are the things as a hacker can do for the victims mobile…

Hacking

5 min read

Few things to do with your Android Victim.
Few things to do with your Android Victim.

Apr 25, 2020

How to hack into Android with an Injected Malicious Application.

This is only for Educational Purposes. Where to begin with, hmmm… Here we are using Kali Linux 2020 distribution with updated tools and Evil-Droid is downloaded from GitHub and installed as requested. M4sc3r4n0/Evil-Droid Contribute to M4sc3r4n0/Evil-Droid development by creating an account on GitHub.github.com This method that I am using here works with the same network, but if we try to tune some knobs, maybe we can…

Hacking

6 min read

How to hack into Android with an Injected Malicious Application.
How to hack into Android with an Injected Malicious Application.
Chamo Wijetunga

Chamo Wijetunga

Im a Noob when it comes to writing..

Following
  • SLIIT CS2

    SLIIT CS2

  • Gihan Siriwardhana

    Gihan Siriwardhana

  • Anne Deshani

    Anne Deshani

  • Cyber Crunch

    Cyber Crunch

  • Madura Rajapakshe

    Madura Rajapakshe

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable