Ronak SharmaTheDork (Google Dorking Tool For Pentesters and Ethical Hackers)In the realm of cybersecurity and information retrieval, Google dorking is a powerful technique used to find sensitive information through…Sep 22Sep 22
Ronak SharmaAnalyzing a DDOS Attack Using WiresharkIn today’s digital landscape, Distributed Denial of Service (DDoS) attacks have become one of the most prevalent forms of cyber threats…Aug 21Aug 21
Ronak SharmaSteganography: Hiding Data In Plain SightSteganography is a fascinating technique used to conceal information within various forms of media, such as images, audio files, and text…Aug 20Aug 20
Ronak SharmaWeb Scraping Using JupyterToday I will be showing you how to scrape a website and organize the information that you have extracted. I was making a machine learning…Mar 9Mar 9
Ronak SharmaSQL Injections With OSINTSQL injection is a type of cyber attack that targets databases by injecting malicious SQL (Structured Query Language) code into input…Mar 5Mar 5
Ronak SharmaUsing OSINT For Phishing AttacksPhishing attacks can already be very effective alone, 83% of organizations suffered at least one successful phishing attack last year but…Feb 20Feb 20
Ronak SharmaThe Best Information Gathering OSINT ToolToday I will be introducing to a very useful OSINT tool that can gather and store information for you. Recon-ng is an open-source…Feb 19Feb 19
Ronak SharmaHow To Scrape Target Email Addresses“theHarvester” is used by hackers to gather email addresses and other information from public sources. This information can then be…Feb 181Feb 181
Ronak SharmaHow To Get Files From Major CompaniesToday I will introduce you to a tool called Metagoofil. Metagoofil is a tool used in cybersecurity for extracting metadata from publicly…Feb 3Feb 3
Ronak SharmaTop 5 OSINT Tools Everyone Should KnowAs a cybersecurity student I have been very interested in OSINT and the many things you can do, today I will tell you all the tools that I…Feb 1Feb 1