Pinned0xdomhow to open a hidden directory in MI file manager without a passwordI stumbled upon this bug or this trick you may call it. when I was searching through some log files I was being just curious about the…3 min read·Mar 1, 2021----
0xdominNerd For TechHack anyone with just an “Image”So a few days ago my friend showed me the script he made which he was calling ransomware malware but was a batch script that will just…4 min read·Aug 11, 2022--5--5
0xdominNerd For TechThe Best cybersecurity youtube channels of 2021These are the top cybersecurity channel list not based on subscribers or the amount of content they produce but on talent and value…4 min read·May 30, 2021----
0xdominNerd For TechThe biggest regret of professional hackers when they were beginners and their advice.I was surfing Reddit and stumbled on this post which I found very interesting and thought it might be helpful for beginners who’re starting…5 min read·May 29, 2021--1--1
0xdominNerd For TechHow hackers perform SQL injection attack using sqlmapSQL (Structured Query Language) is a programming language used in the management of the data stored in the database. Which is often misused…5 min read·May 23, 2021----
0xdominNerd For TechHash cracking using GPU 101if you are reading this article then you must be known about the craze of GPU cracking, well what is actually GPU cracking and why is it…6 min read·May 4, 2021----
0xdominNerd For TechCommand execution: OWASP top vulnerabilitywhat is command execution?4 min read·Apr 25, 2021----
0xdominNerd For Techhow to contribute to Github open source projectsHave you ever wondered your favorite tool should work the way you wanted or you found a bug or spelling mistake and wished someone could…8 min read·Apr 19, 2021----
0xdomhow to make an ultra-long-range wifi antennaIf you’re the red team pentester it's always useful to carry an ultra-long-range wifi antenna. which has high gain as well as high…4 min read·Mar 20, 2021----
0xdomhow to hack a layer 2 network- DTP and VTP attackIn today's networks, there are many different types of networking protocols exist today. but there always comes a risk of attackers who…5 min read·Mar 7, 2021--1--1