https://lira.epac.to/DOCS-TECH/Hacking/
https://www.blogger.com/blog/post/edit/5675417914634605051/9040109718471712570
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-web-jacking-attack.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-web-jacking-attack.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-pharming-attack.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-sim-jacking-attack.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-wifi-phisher-attack.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-sim-cloning.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-hacking-through-electricity.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-hacking-through-bio-metric.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-audio-video-surveillance.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-atm-hacking-security.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/hacking-through-cctv.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-hacking-through-network-ports.html
https://careertechnologycybersecurityindia.blogspot.com/2022/05/what-is-phone-jammer.html
https://1drv.ms/w/s!ApVaQavO8wqcgT7spyVxzRMAAKLQ BUG BOUNTY DORKS
https://1drv.ms/w/s!ApVaQavO8wqcgUNQxbD4W0fND0Xp 525 XSS
https://1drv.ms/w/s!ApVaQavO8wqcgUV_vbOM96vJmuFp ANGULAR XSSS
https://1drv.ms/w/s!ApVaQavO8wqcgUvVQKUCIu8iPtrt Directory Traversal
https://1drv.ms/w/s!ApVaQavO8wqcgU0LSuu1aUOg3ss6 AMAZONE BUCKET
https://1drv.ms/w/s!ApVaQavO8wqcgVG2xduyWtx6tk6i CVE EXPLOITE
https://1drv.ms/w/s!ApVaQavO8wqcgU_X21x6BnXcaePd
CRFL INJECTION
https://1drv.ms/w/s!ApVaQavO8wqcgVNkvNxJPhPdY3fC
INSECURE MANAGEMENT
https://1drv.ms/w/s!ApVaQavO8wqcgVYC9Ed0XYOAIsG2
OAUTH
https://1drv.ms/w/s!ApVaQavO8wqcgVji42GYLz3daLzD
OPEN REDIRECTION
https://1drv.ms/w/s!ApVaQavO8wqcgVq2YwqxMXvl-luD RACE CONDITION
https://1drv.ms/w/s!ApVaQavO8wqcgVwovrQZ91bgmn1W XSS INJECTION
https://1drv.ms/w/s!ApVaQavO8wqcgV7rDTcaeskEf-gy XSS INJECTION
https://careertechnologycybersecurityindia.blogspot.com/2022/06/what-is-hacking-through-social.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/what-you-will-learn-in-cyber-security.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/list-of-certification-in-cyber-security.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/career-in-cyber-forensics.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/bvoc-in-cyber-crime.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/what-is-cyber-attack.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/what-is-meant-by-cyber-insurance.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/career-in-cyber-audit.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/va-pt-as-best-cyber-security-career.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/hacking-through-printer.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/va-pt-of-idsips.html
https://careertechnologycybersecurityindia.blogspot.com/2022/06/spring-shell-attack.html
https://1drv.ms/w/s!ApVaQavO8wqcgW_wv9jIcfseP2nD all about Bug Bounty
https://careertechnologycybersecurityindia.blogspot.com/2022/06/hacking-through-cookies.html
https://drive.google.com/drive/u/0/mobile/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU
Name List Of Ebooks
https://careertechnologycybersecurityindia.blogspot.com/2022/06/data-breach-attack.html
https://careertechnologycybersecurityindia.blogspot.com/2022/07/career-in-digital-forencis.html
blog on Career In Digital Forencis
https://careertechnologycybersecurityindia.blogspot.com/2022/07/hard-disk-cloning.html
Hard disk cloning
https://1drv.ms/b/s!AqtJhuPtYxQIhQ82v1ep-BKnGPM7
College Details
https://1drv.ms/u/s!AtGeCh0z8m8RgQncq77i6SUY_QPf?e=vAhuf7 Jwt JSON Web Token file
https://1drv.ms/u/s!AtGeCh0z8m8RgQncq77i6SUY_QPf?e=L2TXNH JWT Json File
https://1drv.ms/u/s!AtGeCh0z8m8RgQd-z3-YCJI96ZnL?e=RnWYVN File Inclusion File .
https://1drv.ms/u/s!AtGeCh0z8m8RgQi1sb8L44QdtHgr?e=7fZGyW DNS Rebinding File
https://1drv.ms/u/s!AtGeCh0z8m8RgQYZNmIKWNpMOOqp?e=h1eGjb CORS Misconfiguration File
https://1drv.ms/u/s!AtGeCh0z8m8RgQtvrZPkPafi4PuI?e=ZGbdX1 API key Leaks File
https://github.com/phlmox/public-reports/blob/main/hackerone-one-million-reports Hackerone-one-million-reports
https://1drv.ms/t/s!AtGeCh0z8m8RgTnCtt1n2z7djp03?e=cDbY0d Responsible Disclosure Hall of Fame
https://cybersecurityindiamiraroad.blogspot.com/2022/09/forensics-acquisition-of-websites-faw.html FORENSIC acquisition-of-websites-faw
https://careertechnologycybersecurityindia.blogspot.com/2022/10/memhunter-automated-memory-resident.html
Memhunter –
Automated Memory Resident Malware Detection
https://careertechnologycybersecurityindia.blogspot.com/2022/10/grr-rapid-response-is-incident-response.html
GRR Rapid Response is an incident response
https://careertechnologycybersecurityindia.blogspot.com/2022/10/fastir-collector-windows-incident.html
FastIR Collector – Windows Incident Response Tool
https://careertechnologycybersecurityindia.blogspot.com/2022/10/rekall-memory-forensic-framework.html
Rekall – Memory Forensic Framework
https://careertechnologycybersecurityindia.blogspot.com/2022/11/damm-differential-analysis-of-malware.html
DAMM – Differential Analysis of Malware in Memory
https://careertechnologycybersecurityindia.blogspot.com/2022/11/sysdig-linux-system-troubleshooting-tool.html
Sysdig – Linux System Troubleshooting Tool
https://careertechnologycybersecurityindia.blogspot.com/2022/11/the-cryptographic-implementations.html
Cryptographic Implementations Analysis Toolkit
https://careertechnologycybersecurityindia.blogspot.com/2022/11/rec-studio-4-reverse-engineering.html
Rec Studio 4 – Reverse Engineering Compiler & Decompiler
https://careertechnologycybersecurityindia.blogspot.com/2022/11/file-disclosure-browser-tool-to-explore.html
File Disclosure Browser – Tool To Explore .DS_Store Files
https://careertechnologycybersecurityindia.blogspot.com/2022/11/networkminer-v11-released-windows.html TWORKMINER-v11-released window
https://careertechnologycybersecurityindia.blogspot.com/2022/11/collar-bomber-gets-owned-by-word.html
Collar Bomber Gets Owned By Word Metadata & USB Drive
https://careertechnologycybersecurityindia.blogspot.com/2022/11/sniffjoke-041-released-anti-sniffing.html
Sniffjoke 0.4.1 Released – Anti-sniffing Framework & Tool For Session Scrambling
https://careertechnologycybersecurityindia.blogspot.com/2022/11/malware-analyser-v30-static-dynamic.html
Malware Analyser v3.0 – A Static & Dynamic Malware Analysis Tool
https://careertechnologycybersecurityindia.blogspot.com/2022/11/peepdf-analyze-modify-pdf-files.html
peepdf – Analyze & Modify PDF Files
https://careertechnologycybersecurityindia.blogspot.com/2022/11/katana-v2-y0jimb0-portable-multi-boot.html
Katana v2 (y0jimb0) – Portable Multi-Boot Security Suite
https://careertechnologycybersecurityindia.blogspot.com/2022/11/blog-post.html
Tcpxtract – Extract Files from Network Traffic AKA Carving
https://careertechnologycybersecurityindia.blogspot.com/2023/01/what-is-chatgpt.html CHAT GPT
https://careertechnologycybersecurityindia.blogspot.com/2023/05/drone-hacking.html
DRONE HACKING
https://careertechnologycybersecurityindia.blogspot.com/2023/05/range-frequency.html
Range Frequency
https://careertechnologycybersecurityindia.blogspot.com/2023/05/bluetooth-hacking.html
Bluetooth Hacking
https://careertechnologycybersecurityindia.blogspot.com/2023/05/radiofrequency-hacking.html
Radio Frequency Hacking
https://careertechnologycybersecurityindia.blogspot.com/2023/05/walkie-talky-hacking.html
Walkie-talky hacking
https://careertechnologycybersecurityindia.blogspot.com/2023/06/camera-lens-forensic.html
Camera lens forensic
https://drive.google.com/file/d/1buokBmvZ-y3ERXMsiH_trHYxABX9Uq8C/view?usp=sharing
List Of Colleges at Prayagraj
https://careertechnologycybersecurityindia.blogspot.com/2023/06/biometric-forensics.html
Biometric forensics
https://careertechnologycybersecurityindia.blogspot.com/2023/06/mouse-and-keyboard-history-forensic.html
Mouse and Keyboard History Forensic
https://careertechnologycybersecurityindia.blogspot.com/2023/06/event-id-forensic.html
Event id forensic
https://careertechnologycybersecurityindia.blogspot.com/2023/06/analysis-computer-file-system.html
Analysis Computer File System
https://careertechnologycybersecurityindia.blogspot.com/2023/06/complaince-audit-for-cyber-security.html
Complaince Audit For Cyber Security Company
https://careertechnologycybersecurityindia.blogspot.com/2023/06/data-acquisition.html
Data Acquisition
https://careertechnologycybersecurityindia.blogspot.com/2023/06/career-in-drone-forensics.html
Career In Drone Forensics
https://careertechnologycybersecurityindia.blogspot.com/2023/06/active-mixed-content.html
Active Mixed Content
https://careertechnologycybersecurityindia.blogspot.com/2023/06/weak-password-reset-implementation.html
Forget Password Link Over Http
https://careertechnologycybersecurityindia.blogspot.com/2023/06/hsts-error-ssl-failure.html
HSTS Error
https://careertechnologycybersecurityindia.blogspot.com/2023/06/account-takeover-csrf-attack.html
Account Take over CSRF Attack
https://careertechnologycybersecurityindia.blogspot.com/2023/06/ssrf-attack-n-chat-engine-what-is-ssrf.html
SSRF Attack
https://careertechnologycybersecurityindia.blogspot.com/2023/06/password-policy-vulnerability.html
No Password Length Verification
https://careertechnologycybersecurityindia.blogspot.com/2023/06/password-policy-vulnerability_8.html
Complex Password Should Be Enable
https://careertechnologycybersecurityindia.blogspot.com/2023/06/same-site-scripting-attack.html
Same Site Scripting
https://careertechnologycybersecurityindia.blogspot.com/2023/06/week-login-panel-over-http.html
Week Login Function(Panel) Over HTTP
https://careertechnologycybersecurityindia.blogspot.com/2023/06/passive-mixed-content-vulnerability.html
Passive Mixed Content
https://careertechnologycybersecurityindia.blogspot.com/2023/06/stored-xss-vulnerability.html
Stored XSS Vulnerability
https://careertechnologycybersecurityindia.blogspot.com/2023/06/exif-geolocation-data-not-stripped-from.html
EXIF Geolocation Data Not Stripped From Uploaded Images (Manual User Enumeration)
https://careertechnologycybersecurityindia.blogspot.com/2023/06/xmlrpc-attack-leads-to-ssrf-ssrf-via.html
- XMLRPC Attack leads to SSRF (SSRF via XMLRPC)
https://careertechnologycybersecurityindia.blogspot.com/2023/06/no-rate-limiting-on-forgot-password.html
- No Rate Limiting on Forgot Password
https://careertechnologycybersecurityindia.blogspot.com/2023/06/reflected-cross-site-scripting.html
- Reflected XSS
https://careertechnologycybersecurityindia.blogspot.com/2023/06/buffer-overflow-attack.html
- Buffer Overflow Attack
https://careertechnologycybersecurityindia.blogspot.com/2023/06/reflected-html-injection.html
- Reflected HTML Injection
https://careertechnologycybersecurityindia.blogspot.com/2023/06/business-logic-attack.html
- Business Logic Attack
https://careertechnologycybersecurityindia.blogspot.com/2023/06/stored-html-injection.html
- Stored HTML Injection