Profile cover photo
Profile photo
Shashwat Chaudhary
991 followers -
2nd year CSE @ IIIT Delhi
2nd year CSE @ IIIT Delhi

991 followers
About
Shashwat's posts

Post has attachment
Compiling Linux Kernel (on Ubuntu)
This guide may not exactly be relevant to this blog, but as an exercise in getting familiar with Linux, I'll post it anyways. Here are a few disclaimers- Don't follow this guide for compiling linux kernel, there are much better guides out there for that pur...

Post has attachment
Compiling Linux Kernel
This guide may not exactly be relevant to this blog, but as an exercise in getting familiar with Linux, I'll post it anyways. Here are a few disclaimers- Don't follow this guide for compiling linux kernel, there are much better guides out there for that pur...

Post has attachment
Use Python To Detect And Bypass Web Application Firewall
Web application firewalls are usually placed in front of the web
server to filter the malicious traffic coming towards server. If you are
hired as a penetration tester for some company and they forgot to tell
you that they are using web application firew...

Post has attachment
Use Python To Detect And Bypass Web Application Firewall
Web application firewalls are usually placed in front of the web
server to filter the malicious traffic coming towards server. If you are
hired as a penetration tester for some company and they forgot to tell
you that they are using web application firew...

Post has attachment
Kali Installation : Dual Boot VS Live Boot VS Virtual Machine
If you are yet to have a Kali instance running on your machine, then you have quite a dilemma ahead of you. There are three ways to go about running Kali, each with their own advantages and disadvantages. In this article, I'll tell you what exactly the term...

Post has attachment
What and Why : Dual Boot, Live Boot, Virtual Machine
If you are yet to have a Kali instance running on your machine, then you have quite a dilemma ahead of you. There are three ways to go about running Kali, each with their own advantages and disadvantages. In this article, I'll tell you what exactly the term...

Post has attachment
Bettercap : MITM for sniffing traffic and passwords
Contents Installation Sniffing Traffic Getting password We will be installing Bettercap, doing a quick sniffing exercise, and then a more detailed section on grabbing the password. Will demonstrate the password grabbing on outlook.com, which seems to be par...

Post has attachment
The Dark Web And How To Access It
Contents What's the dark web Installation of TOR browser - Windows and Kali How to access the dark web Dark Web What is the dark web In short, dark web is part of the web which requires special software to browse, and isn't indexed by search engines. More t...

Post has attachment
The Dark Web And How To Access It
Contents What's the dark web Installation of TOR browser - Windows and Kali How to access the dark web Dark Web What is the dark web In short, dark web is part of the web which requires special software to browse, and isn't indexed by search engines. More t...

Post has attachment
Best 5 Website to Master Hacking With Kali Linux : For Beginners
Despite writing so many tutorials on hacking with Kali Linux, I often get stuck and have to consult other resources. My blog has a lot of things but since I myself don't know everything, there's no way I can provide all the resources that you guys need. Her...
Wait while more posts are being loaded