Open in app

Sign in

Write

Sign in

Yashwant Singh 🐧

2.1K Followers

Home

Lists

About

Pinned

How to get started in cyber?

To get started in cyber, one needs to know the basics of computers. Like what is windows, what is OS, start learning from the start, start with learning about what you’re using now. Learn about the various programs, software and hardware you’re using in your computer, how to connect to…

Cybersecurity

3 min read

How to get started in cyber?
How to get started in cyber?
Cybersecurity

3 min read


Jul 1

Hello Worldā€Š- Status Update.

Hello everyone, I hope everyone is doing okay. I know it has been quite some time since I published an article. I just want to tell everyone that I am taking a long sabbatical from cybersecurity, since I have to focus on my studies for now, but not to worry! IĀ willĀ beĀ backĀ soon. Be safe, be secure and happy hackingĀ :)

Cybersecurity

1 min read

Hello World ā€Š- Status Update.
Hello World ā€Š- Status Update.
Cybersecurity

1 min read


Published in

System Weakness

Ā·Mar 8

Instagram OSINT & Hacking — Phishing at its best.

Instagram hacking is one of the most notoriously question asked on the internet. I have received so many personal messages and DMs regarding this, that I can’t even remember. It’s only obvious that I am writing an article about this. Anyways, let’s begin! Before getting access to Instagram, you must know the username…

Cybersecurity

4 min read

Instagram OSINT & Hackingā€Šā€”ā€ŠPhishing at its best.
Instagram OSINT & Hackingā€Šā€”ā€ŠPhishing at its best.
Cybersecurity

4 min read


Published in

System Weakness

Ā·Feb 8

Customizing operating system for Dummies.

In this article, we are going to cover, customizing as well as optimizing your operating system according to user needs. In short we’ll make our OS look good as well as optimized for our daily use. A great man once said: With cars you have to customize. It’s a bond…

Linux

6 min read

Customizing operating system for Dummies.
Customizing operating system for Dummies.
Linux

6 min read


Published in

System Weakness

Ā·Feb 3

How to hack phones? Understanding Metasploit Framework: Part 1

Metasploit Framework (MSF) is one of the most famous penetration testing tools suite available in the market which is free to everybody (an opensource tool), and is used by hackers as well as defenders alike. The Metasploit Framework includes thousands of tools and modules for a wide array of penetration…

Cybersecurity

11 min read

How to hack phones? Understanding Metasploit FrameworkĀ : Part 1
How to hack phones? Understanding Metasploit FrameworkĀ : Part 1
Cybersecurity

11 min read


Published in

System Weakness

Ā·Jan 30

Arch Linux: My Journey and Insights

In this article, we will cover one of the most famous Linux distributions available on the web called Arch-Linux. It is believed among the tech community, that Arch Linux users are considered to be smug with their anime girl profile picture. …

Linux

4 min read

Arch Linux: My Journey and Insights
Arch Linux: My Journey and Insights
Linux

4 min read


Published in

System Weakness

Ā·Jan 10

SQL injections šŸ’‰- Injecting to hacking

SQL stands for Structured Query Language. SQL Injection, mostly referred to as SQLi, is an attack on a web application database server that causes malicious queries/code to be executed. When a web application communicates with a database using input from a user that hasn’t been properly validated, there runs the…

Cybersecurity

5 min read

SQL injections šŸ’‰- Injecting to hacking
SQL injections šŸ’‰- Injecting to hacking
Cybersecurity

5 min read


Published in

System Weakness

Ā·Jan 4

Beginners guide to AI in cybersec. Hacking with ChatGPT.

AI which stands for Artificial Intelligence has come a long way, since the era of the World Wide Web. Today, we can see the integration of Artificial Intelligence into almost every technology. Whether it’s your Google Assistant in the Androids, Alexa in Amazon Devices, or Siri in Apple Devices. There…

Cybersecurity

9 min read

Beginners guide to AI in cybersec. Hacking with ChatGPT.
Beginners guide to AI in cybersec. Hacking with ChatGPT.
Cybersecurity

9 min read


Published in

System Weakness

Ā·Dec 31, 2022

Password Cracking —Understanding basics and tools used.

Password cracking is the process of using an program/software to identify an unknown or forgotten password of a file/network/device, etc. In other words, it’s a science of obtaining the correct password that gives access to a system protected by an authentication method. There are various ways to crack a password…

Cybersecurity

35 min read

Password Cracking —Understanding basics and tools used.
Password Cracking —Understanding basics and tools used.
Cybersecurity

35 min read


Dec 30, 2022

Happy New Year everyone (2023) šŸŽ‰šŸŽ‰

I would like to wish you all happy new year in advance for 2023. I hope all your wishes come true. Many good things and bad things happened. Twitter was bought by Elon Musk. ChatGPT was released. Great movies like Avatar 2 and Black Panther 2 were also released. We…

Happy New Year

1 min read

Happy New Year everyone (2023) šŸŽ‰šŸŽ‰
Happy New Year everyone (2023) šŸŽ‰šŸŽ‰
Happy New Year

1 min read

Yashwant Singh 🐧

Yashwant Singh 🐧

2.1K Followers

Cybersecurity analyst with humor. twitter.com/earthtoyash

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams