Aryan AhirwarFeb 26, 20195 min readPENETRATION TESTINGPost Exploitation on Saved Password with LaZagne
Aryan AhirwarFeb 1, 20193 min readPENETRATION TESTINGExploiting Windows PC using Malicious Contact VCF file
Aryan AhirwarFeb 1, 20192 min readPENETRATION TESTINGExploiting Windows using Contact File HTML Injection/RCE
Aryan AhirwarJan 6, 20192 min readPENETRATION TESTINGSMTP Log Poisoning through LFI to Remote Code Execution
Aryan AhirwarDec 21, 20186 min readPENETRATION TESTINGMultiple Ways To Exploiting HTTP Authentication
Aryan AhirwarDec 8, 20186 min readPENETRATION TESTINGComprehensive Guide on Ncrack – A Brute Forcing Tool
Aryan AhirwarNov 27, 20185 min readPENETRATION TESTINGComprehensive Guide on Pydictor – A wordlist Generating Tool
Aryan AhirwarNov 26, 20183 min readPENETRATION TESTINGComprehensive Guide on Cupp– A wordlist Generating Tool