Blog

XSS Mitigation

Cross site scripting attack and types. How to prevent web apps from XSS?

What is Cross Site Scripting(XSS)? XSS attacks are a type of code injection attack in which an attacker injects malicious code onto a trusted website. The script is sent via a web application, a browser-side script, or an injected link. When the user clicks on the link, the script is executed by the browser. However, if the attack is successful, the attacker will be notified and will be able to… Read More »Cross site scripting attack and types. How to prevent web apps from XSS?

Future of artificial intelligence

A career in Artificial Intelligence, Future & Scope

Artificial Intelligence, one of the most progressive fields of technology in recent years. The idea of making intelligent machinery to optimize the performance of all types of operations in any sector or domain has become really popular and also has shown some excellent results. From Google to Facebook to Amazon, all the leading companies are using Artificial Intelligence in almost everything including marketing, human resource, finance, medicine, healthcare, education, etc.… Read More »A career in Artificial Intelligence, Future & Scope

start an SEO agency in India

How to start SEO Agency in less than Rs. 999 a month

What if I tell you, you can start your own SEO Agency for less than Rs.999 a month? Yes, bro, this is not a joke. You wished to start a business with lowest capital? So, here is the blueprint for you in this article below. What are the essentials to start an SEO agency? Build your Skills and acquire knowledge of SEO The first step in any business is knowing… Read More »How to start SEO Agency in less than Rs. 999 a month

How to create spyware to hack android phones in 30 minutes

How to create your own spyware to hack android phones in less than 30 minutes

What if I tell you, your messages, chats, webcam recordings can be forwarded to a third party without your consent for any malicious purpose? Yes, you have to believe it, buddy, it is easy. ‘Spyware’ makes it possible. In this article, we will discuss spyware and how you can create your own spyware to monitor any android phone using Kali Linux in less than 30 minutes. Pre Requisites What is… Read More »How to create your own spyware to hack android phones in less than 30 minutes

Artificial Intelligence & Machine Learning to automate quantification of mental health analysis

Quantification of mental health analysis using Artificial Intelligence

Why? (The problem of mental health) The rapid increase in cases for mental health issues during and post lockdown period clearly shows an urgency to find a permanent solution for this problem. Cases of depression, stress, anxiety and panic attacks suddenly witnessed a huge rise from 3-5% before 2020 to 21-27% in 2021.  Loneliness, lack of communication with family and friends can be some of the reasons but according to… Read More »Quantification of mental health analysis using Artificial Intelligence

SEO BOOKS FOR FREE

Get Free SEO book covering Advanced technical SEO & Onpage SEO

Get Free SEO book covering Advanced technical SEO & Basic Onpage SEO for wordpress. This SEO Book covers all major aspect of technical SEO & gives you a glimpses of Onpage SEO as well for all wordpress websites with examples and screenshots. Topic covered in Free SEO book Technical SEO Main performance issues and few technical requirements needed to be fulfilled in this. Indexing with Search console Google Analytics linking… Read More »Get Free SEO book covering Advanced technical SEO & Onpage SEO

WINDOWS 7 HACK SMB PENTESTING PORT 445

SMB Pentesting with Metasploit to hack windows 7 Complete Tutorial

Microsoft Windows, An operating system loved by more than 80% of computer users in the world. What if I tell you that you love highly vulnerable operating systems? Yes, you heard it right, Your favorite OS i.e. Microsoft windows is a highly vulnerable OS. In this article, we will try to explore and exploit one of the most common vulnerabilities of windows. Fun Fact: Fascinated with the term “hack”? Hacking… Read More »SMB Pentesting with Metasploit to hack windows 7 Complete Tutorial

Writig an effective blog

Writing an effective blog | Everything you need to know

What is a Blog? Blog (conventionally known as a ‘weblog’) refers to a web publication. This publication can serve many purposes like informative articles, diary entries, news, etc. Blogs can have any genre. How to write an effective blog? More than 6 Billion blogs exist on the World Wide Web. Still only 2% of them attract readers regularly. Do you know the reason? Because only those 2% blogs create the… Read More »Writing an effective blog | Everything you need to know

SSH protocol Everything you need to know

SSH Protocol | Complete Process, Attack, and Security. Everything you need to know

Secure Shell (SSH) runs on port number 22 and used for the purpose of secure data communication over an unsecured or less secure network. With SSH, Remote code execution became easy with SSH. Running on the top of TCP/IP for securing the data over the network makes it a transport layer protocol. But when used for the remote login purpose, we call it an application layer protocol. Secure socket sell… Read More »SSH Protocol | Complete Process, Attack, and Security. Everything you need to know