How to down any website. Slowloris

What is Dos attack :- A DoS (Denial of Service) attack is a type of cyber attack where the attacker floods a server or website with traffic, overwhelming its capacity and causing it to become unavailable to legitimate users. The attacker achieves this by sending large amounts of traffic or data from multiple sources, orContinue reading “How to down any website. Slowloris”

Impress your crush😍❤. Html

What is HTML :- HTML, which stands for HyperText Markup Language, is a standard markup language used to create web pages. It consists of a set of elements, tags, and attributes that are used to define the structure and content of a web page. HTML code is interpreted by web browsers to render text, images,Continue reading “Impress your crush😍❤. Html”

Hacker Himanshu Kishor

Cyber Tech Zone – admin Welcome to Cyber Tech Zone! We are proud to introduce our esteemed Cyber Security Blog Post Administrator, Himanshu Kishor. Mr. Himanshu Kishor is an experienced cybersecurity professional who is passionate about sharing his knowledge and expertise with the community. As our blog post administrator, he is responsible for overseeing theContinue reading “Hacker Himanshu Kishor”

Parrot OS in Android

What is Parrot OS :- Parrot OS is a Debian-based Linux distribution designed for ethical hacking, penetration testing, digital forensics, and privacy and anonymity. It includes a wide range of security tools and comes with pre-installed anonymity tools to enhance privacy and protect the user’s identity. Parrot OS in Termux is a version of ParrotContinue reading “Parrot OS in Android”

SEToolkit in termux

What is phishing attack :- Phishing is a type of online scam where an attacker sends a fake message or email that appears to be from a legitimate source, like a bank or social media site, to trick individuals into providing sensitive information such as passwords, credit card numbers or other personal data. The attackerContinue reading “SEToolkit in termux”

Truecaller js (find phone numbers details)

What is number information gathering :- Number information gathering refers to the process of collecting and analyzing data related to numerical quantities. This could include things like financial data, statistical information, or other quantitative measurements. The process of number information gathering may involve collecting data from a variety of sources, such as surveys, financial reports,Continue reading “Truecaller js (find phone numbers details)”

SpiderFoot (OSINT tool)

𝙾𝚏𝚏𝚒𝚌𝚒𝚊𝚕 𝚠𝚎𝚋𝚜𝚒𝚝𝚎 – spiderfoot.net 𝚆𝚑𝚊𝚝 𝚒𝚜 𝙾𝚂𝙸𝙽𝚃 – OSINT stands for Open-Source Intelligence. It refers to the practice of collecting, analyzing, and disseminating information that is publicly available and legally obtainable. This can include information from social media, websites, news articles, government reports, and other sources. OSINT is often used by organizations and individuals toContinue reading “SpiderFoot (OSINT tool)”

How to install ngrok (Kali Linux & termux).

What is Ngrok :- Ngrok is a multi-platform application that provides us to forward our local development server to the internet without port forwarding. Ngrok hosts our locally hosted web server in to a subdomain of ngrok.com. That means we can easily show our localhost in the internet without owning domain names/static IP or portContinue reading “How to install ngrok (Kali Linux & termux).”

Holehe Email information gathering tool 📧.

Summary : Efficiently finding registered accounts from emails. Holehe checks if an email is attached to an account on sites like twitter, instagram, imgur and more than 120 others. Installation : ⬇️ With PyPi : pip3 install holehe Git clone : -Help : Output : ┻┳|―-∩┳┻| ヽ┻┳| ● |┳┻|▼) _ノ Thanks for visiting☺┻┳| ̄ )┳ミ( ̄ /┻┳T ̄|Continue reading “Holehe Email information gathering tool 📧.”

UserRecon termux command.

What is information gathering? Information Gathering means gathering different kinds of information about the target. It is basically, the first step or the beginning stage of Ethical Hacking, where the penetration testers or hackers (both black hat or white hat) tries to gather all the information about the target, in order to use it forContinue reading “UserRecon termux command.”

Design a site like this with WordPress.com
Get started