VishwaCTF is the Flagship event of CyberCell, VIIT. At its inception, it was the first CTF from Maharashtra, India. This 2021 edition is going to be on a global scale. So don’t forget to participate and win huge exciting prizes with other perks
A quick blow before the major VishwaCTF event organised by the CyberCell VIIT from VIIT, Pune Maharashtra. The major CTF is going to be on a global scale with a huge amount of prize pool
The 6 best and the top laptops for any programmer, cybersecurity/hacker, gamer to purchase in 2021. Starting from the lowest to the great budget laptops.Here are all of them
The number of ways to trick an AI in an AI proctored exam. These are the most basic limitations of an AI which can never compete with real intelligence of the students.
Everything wrapped up from the latest event CES 2021 from intel and AMD. The rivalry and the greatest laptop processor battle launch after the desktop processor battle.
The most basic steps and explanation to crack any WPA, WPA2-PSK networks using Airmon-Ng.
This post is a walkthrough of the famous Mr.Robot CTF virtual machine. I used the platform TryHackMe though you can also find this VM on Vulnhub. The goal is to find three hidden flags.
The best budget monitors especially for hackers and programmers with a detailed information for why they are required so much and what to know before buying them!
Ever thought of how hackers steal your critical data or credentials via social engineering or phishing scam? Let’s see in this tutorial how hackers can steal your valuable data via a phishing scam. The first question that pops in mind is, what is phishing?
The second phase of ethical hacking and penetration testing involves two terms that are Vulnerability Scanning and Enumeration. Scanning involves taking the knowledge discovered during reconnaissance and using it to look at the network