top of page

Subdomain Enumeration -Recursive Internet Scanner for Hacking
Hello everyone, We are back again with another writeup. So first let’s talk about our recon process. If you know about scope based Recon...
Nitin Yadav
15

Mobile App Scanner to Find Security Vulnerabilities
The usage of mobile phones is increasing so are the apps for mobile phones. But with these comes a big problem or putting your data at...
Nitin Yadav
957

Source code scanner for Finding Critical Vulnerabilities
Source code analysis is one of the most thorough methods available for auditing software. It is also one of the most expensive, but it...
Nitin Yadav
899


Nuclei for Bug Bounties Hunters
Nuclei is used to send requests across targets based on a template, providing fast scanning on a large number of hosts. Nuclei offers...
Nitin Yadav
268

Intro to Metasploit - Learn about Metasploit in 2022 (Part 1)
Want to learn how to use Metasploit? This article is going to teach you everything you need. However, before we get started, you might...
Nitin Yadav
382


Tool for performing OSINT for dark web investigations
Hello everyone, I am Nitin yadav(KD) back again with another write-up Introduction to OSINT OSINT can be summarized as open-source...
Nitin Yadav
991

This tool can help you find broken social media links
Hello everyone, I am Nitin yadav(KD) back again with another write-up The tool Socialhunter is a great resource for pentesters, bug...
Nitin Yadav
69

A Fancy Way To Bypass Cloud WAFs: Resolving The Host Behind A Reverse Proxy
Ever wondered what's behind a proxy? Now you too can know the origin host behind a reverse proxy! This tool will allow you to dig up a...
Nitin Yadav
106
bottom of page