Pinned0xdomhow to open a hidden directory in MI file manager without a passwordI stumbled upon this bug or this trick you may call it. when I was searching through some log files I was being just curious about the…Mar 1, 2021Mar 1, 2021
0xdominNerd For TechHack anyone with just an “Image”So a few days ago my friend showed me the script he made which he was calling ransomware malware but was a batch script that will just…Aug 11, 20225Aug 11, 20225
0xdominNerd For TechThe Best cybersecurity youtube channels of 2021These are the top cybersecurity channel list not based on subscribers or the amount of content they produce but on talent and value…May 30, 2021May 30, 2021
0xdominNerd For TechThe biggest regret of professional hackers when they were beginners and their advice.I was surfing Reddit and stumbled on this post which I found very interesting and thought it might be helpful for beginners who’re starting…May 29, 20211May 29, 20211
0xdominNerd For TechHow hackers perform SQL injection attack using sqlmapSQL (Structured Query Language) is a programming language used in the management of the data stored in the database. Which is often misused…May 23, 2021May 23, 2021
0xdominNerd For TechHash cracking using GPU 101if you are reading this article then you must be known about the craze of GPU cracking, well what is actually GPU cracking and why is it…May 4, 2021May 4, 2021
0xdominNerd For TechCommand execution: OWASP top vulnerabilitywhat is command execution?Apr 25, 2021Apr 25, 2021
0xdominNerd For Techhow to contribute to Github open source projectsHave you ever wondered your favorite tool should work the way you wanted or you found a bug or spelling mistake and wished someone could…Apr 19, 2021Apr 19, 2021
0xdomhow to make an ultra-long-range wifi antennaIf you’re the red team pentester it's always useful to carry an ultra-long-range wifi antenna. which has high gain as well as high…Mar 20, 2021Mar 20, 2021
0xdomhow to hack a layer 2 network- DTP and VTP attackIn today's networks, there are many different types of networking protocols exist today. but there always comes a risk of attackers who…Mar 7, 20211Mar 7, 20211