Open in app

Sign In

Write

Sign In

Yashwant Singh 🐧

959 Followers

Home

About

Pinned

How to get started in cyber?

To get started in cyber, one needs to know the basics of computers. Like what is windows, what is OS, start learning from the start, start with learning about what you’re using now. Learn about the various programs, software and hardware you’re using in your computer, how to connect…

Cybersecurity

3 min read

How to get started in cyber?
How to get started in cyber?
Cybersecurity

3 min read


Published in System Weakness

Ā·Mar 8

Instagram OSINT & Hacking — Phishing at its best.

Instagram hacking is one of the most notoriously question asked on the internet. I have received so many personal messages and DMs regarding this, that I can’t even remember. It’s only obvious that I am writing an article about this. Anyways, let’s begin! Before getting access to Instagram, you must know the username…

Cybersecurity

4 min read

Instagram OSINT & Hackingā€Šā€”ā€ŠPhishing at its best.
Instagram OSINT & Hackingā€Šā€”ā€ŠPhishing at its best.
Cybersecurity

4 min read


Published in System Weakness

Ā·Feb 8

Customizing operating system for Dummies.

In this article, we are going to cover, customizing as well as optimizing your operating system according to user needs. In short we’ll make our OS look good as well as optimized for our daily use. A great man once said: With cars you have to customize. It’s a bond…

Linux

6 min read

Customizing operating system for Dummies.
Customizing operating system for Dummies.
Linux

6 min read


Published in System Weakness

Ā·Feb 3

How to hack phones? Understanding Metasploit Framework: Part 1

Metasploit Framework (MSF) is one of the most famous penetration testing tools suite available in the market which is free to everybody (an opensource tool), and is used by hackers as well as defenders alike. The Metasploit Framework includes thousands of tools and modules for a wide array of penetration…

Cybersecurity

11 min read

How to hack phones? Understanding Metasploit FrameworkĀ : Part 1
How to hack phones? Understanding Metasploit FrameworkĀ : Part 1
Cybersecurity

11 min read


Published in System Weakness

Ā·Jan 30

Arch Linux: My Journey and Insights

In this article, we will cover one of the most famous Linux distributions available on the web called Arch-Linux. It is believed among the tech community, that Arch Linux users are considered to be smug with their anime girl profile picture. …

Linux

4 min read

Arch Linux: My Journey and Insights
Arch Linux: My Journey and Insights
Linux

4 min read


Published in System Weakness

Ā·Jan 10

SQL injections šŸ’‰- Injecting to hacking

SQL stands for Structured Query Language. SQL Injection, mostly referred to as SQLi, is an attack on a web application database server that causes malicious queries/code to be executed. When a web application communicates with a database using input from a user that hasn’t been properly validated, there runs the…

Cybersecurity

5 min read

SQL injections šŸ’‰- Injecting to hacking
SQL injections šŸ’‰- Injecting to hacking
Cybersecurity

5 min read


Published in System Weakness

Ā·Jan 4

Beginners guide to AI in cybersec. Hacking with ChatGPT.

AI which stands for Artificial Intelligence has come a long way, since the era of the World Wide Web. Today, we can see the integration of Artificial Intelligence into almost every technology. Whether it’s your Google Assistant in the Androids, Alexa in Amazon Devices, or Siri in Apple Devices. There…

Cybersecurity

9 min read

Beginners guide to AI in cybersec. Hacking with ChatGPT.
Beginners guide to AI in cybersec. Hacking with ChatGPT.
Cybersecurity

9 min read


Published in System Weakness

Ā·Dec 31, 2022

Password Cracking —Understanding basics and tools used.

Password cracking is the process of using an program/software to identify an unknown or forgotten password of a file/network/device, etc. In other words, it’s a science of obtaining the correct password that gives access to a system protected by an authentication method. There are various ways to crack a password…

Cybersecurity

35 min read

Password Cracking —Understanding basics and tools used.
Password Cracking —Understanding basics and tools used.
Cybersecurity

35 min read


Dec 30, 2022

Happy New Year everyone (2023) šŸŽ‰šŸŽ‰

I would like to wish you all happy new year in advance for 2023. I hope all your wishes come true. Many good things and bad things happened. Twitter was bought by Elon Musk. ChatGPT was released. Great movies like Avatar 2 and Black Panther 2 were also released. We…

Happy New Year

1 min read

Happy New Year everyone (2023) šŸŽ‰šŸŽ‰
Happy New Year everyone (2023) šŸŽ‰šŸŽ‰
Happy New Year

1 min read


Published in System Weakness

Ā·Dec 23, 2022

Steganography & Cryptography — Keep your data and yourself safe.

Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection is called Steganography. The secret data can be anything from text files to videos. The combination of steganography with encryption as an extra step for hiding or protecting data is often used for handling sensitive…

Cybersecurity

5 min read

Steganography & Cryptographyā€Šā€”ā€ŠKeep your data safe.
Steganography & Cryptographyā€Šā€”ā€ŠKeep your data safe.
Cybersecurity

5 min read

Yashwant Singh 🐧

Yashwant Singh 🐧

959 Followers

Cybersecurity analyst with humor. twitter.com/earthtoyash

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech