All Basic Articles
A recursive lambda expression is the process in which a function calls itself directly or indirectly is called recursion and the corresponding function is called… Read More
In this article, we will discuss how to create a Fun Fact Generator Web App in Python using the PyWebio module. Essentially, it will create… Read More
Spoofcheck is a python based tool that is used to check whether the domain can be spoofed or not. This is the best tool for… Read More
Grim is a free and open-source tool available on GitHub. Grim is used to scanning websites for information gathering and finding vulnerabilities. Grim is written… Read More
In this article, we are going to remove a column(s) in the R programming language using dplyr library. Dataset in use: Remove column using column… Read More
Center of Mass is an important property of any rigid body system. Usually, these systems contain more than one particle. It becomes essential to analyze… Read More
Exploratory data analysis was promoted by John Tukey to encourage statisticians to explore data, and possibly formulate hypotheses that might cause new data collection and… Read More
Storm breaker is a social engineering tool that can be used to access the location, webcam, microphone, and Os Password Grabber Using Ngrok Link. Features:It… Read More
In this article, we will see how to create a web application for tracking the Covid19 using PHP. Our Covid19 Tracker app will give the… Read More
This article will educate you all about Blisk. Blisk is a Chromium-based web browser that improves productivity and code quality by providing a wide array… Read More
One of the primary steps in attacking an internet application is enumerating hidden directories and files. Doing so can often yield valuable information that makes… Read More
BackTrack Linux is a custom distribution that focuses on security testing for all skill levels. It is the largest collection of wireless hacking, server exploiting,… Read More
In this article, we will see how we can create a rock paper and scissor game using Tkinter. Rock paper scissor is a hand game… Read More
In this article, we will show how to spoof SMS messages in Linux using two of the following tools:- fake-smsSocial Engineering Toolkit (SET)1.) Fake-sms It… Read More
According to Oxford Dictionary, a “message” is a concept or information conveyed. The information can either be written or spoken. Suppose there is a family… Read More
Nowadays, people depend upon the internet for different purposes like information, communication, shopping, etc. similarly children are also connected with the internet for educational purposes… Read More
In the last few decades, data privacy and security has become the primary concern to everyone. Due to the rise in technological advancements and the… Read More
Microsoft Word is a software tool that allows us to create document files like articles, office letters, project files, and many more in a very… Read More
Santoku is a bootable Linux distribution that is focused on mobile forensics, analysis, and security. It comes with pre-installed platform drivers SDKs, and utilities and… Read More
Before talking about SYN cookies and how they are used to preventing SYN Flood attack, Let us first take a look at how TCP connections… Read More