VISHRANT KHANNAinStudents in InfoSecBest Colleges/Universities for Cyber Security in India [2021]DISCLAIMER: I’m not endorsing any university in this article. The selection of these universities is based on my own experience and…12 min read·Dec 22, 2020----
VISHRANT KHANNAinStudents in InfoSecInjecting Payload into an Android Application | Msfvenom (TheFatRat) TutorialMsfvenom is a command-line instance of Metasploit that is used to generate and output all of the various types of shellcode that are…3 min read·Sep 25, 2020----
VISHRANT KHANNAinStudents in InfoSecHow to Perform a Deauthentication Attack | MDK4 TutorialMDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.2 min read·Sep 7, 2020----
VISHRANT KHANNAinStudents in InfoSecHow to Create a Wordlist for a Dictionary Attack | Crunch TutorialCrunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all…1 min read·Aug 31, 2020----
VISHRANT KHANNAinStudents in InfoSecInstalling Postman on Kali Linux [2020]Postman is a tool popular among developers for testing APIs.1 min read·Aug 25, 2020----
VISHRANT KHANNAinStudents in InfoSecHow to Find the Password of a WiFi Network | AirCrack-ng TutorialAircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP, and WPA/WPA2-PSK cracker and analysis tool for…4 min read·Aug 24, 2020----
VISHRANT KHANNAinStudents in InfoSecHow to extract GPS coordinates of an Image | Exif Tool TutorialThe world collectively takes 14 trillion photos annually.2 min read·Apr 14, 2019----