Skip to the content
  • TheTechCrime

Primary Menu
  • HOME
  • Java Script
    • Introduction of JS
    • Array And Object
    • Conditionals and Type Conversion
    • Functions in JavaScript
    • Scope & Closures
    • DOM Manipulation
    • Asynchronous JavaScript
    • ES6+ Features
    • Advanced Concepts
    • Tooling & Ecosystem
    • Frameworks & Libraries
  • Hacking Blog
    • Ethical Hacking
    • Penetration Testing
  • About Us
    • Privacy Policy
    • Contact

Tag #hacking

  • Home
  • directory path traversal
Jun 9, 2025 By ighacker33221@gmail.com Penetration Testing #hacking, #Penetration Testing, cuber security, directory path traversal

directory path traversal

directory path traversal

1. What is Directory Path Traversal? Directory Path Traversal, often called simply path traversal, is a type of web security vulnerability that allows attackers to access files and directories stored

Continue Readingdirectory path traversal

Jun 5, 2025 By ighacker33221@gmail.com Penetration Testing #hacking, #Penetration Testing, cuber security, ssl pinning android

ssl pinning android

ssl pinning android

🛡️ 1. Introduction to SSL Pinning When building secure mobile applications, one term that frequently surfaces is SSL Pinning Android. This technique is essential in protecting apps from Man-in-the-Middle (MITM)

Continue Readingssl pinning android

Jun 3, 2025 By ighacker33221@gmail.com Penetration Testing #hacking, #Penetration Testing, cuber security, web forensics

web forensics

web forensics

1️⃣ 🔍 Introduction In today’s hyperconnected world, cybercrimes are not just increasing—they’re evolving. From data breaches to phishing scams, attackers leave behind digital footprints. That’s where web forensics comes into

Continue Readingweb forensics

May 19, 2025 By ighacker33221@gmail.com Ethical Hacking #hacking, #Penetration Testing, cuber security, make your own vpn

Make Your Own VPN

make your own vpn

🛡️ 1. What is a VPN and Why Should You Create Your Own? A VPN (Virtual Private Network) is a secure tunnel between your device and the internet, ensuring encrypted

Continue ReadingMake Your Own VPN

May 17, 2025 By ighacker33221@gmail.com Penetration Testing #hacking, #Penetration Testing, cuber security, login bypass using sql injection

login bypass using sql injection

login bypass using sql injection

1️⃣ 🔐 Introduction to SQL Injection Attacks In the world of cybersecurity, few threats are as notorious and dangerous as SQL Injection. This classic attack vector targets databases through poorly

Continue Readinglogin bypass using sql injection

May 14, 2025 By ighacker33221@gmail.com Ethical Hacking #hacking, #Penetration Testing, cuber security, sqlmap tutorial

sqlmap tutorial

sqlmap tutorial

1️⃣ 🔍 What is SQLMap? SQLMap is an open-source penetration testing tool used to automate the process of detecting and exploiting SQL injection vulnerabilities in web applications. In this sqlmap

Continue Readingsqlmap tutorial

May 13, 2025 By ighacker33221@gmail.com Ethical Hacking #hacking, #Penetration Testing, cuber security, Facebook SOCMINT Investigation

Facebook SOCMINT Investigation

Facebook SOCMINT Investigation

1. 🔍 What is SOCMINT? A Quick Introduction to Social Media Intelligence Social Media Intelligence (SOCMINT) refers to the process of collecting and analyzing data from social media platforms to

Continue ReadingFacebook SOCMINT Investigation

May 8, 2025 By ighacker33221@gmail.com Uncategorized #hacking, #Penetration Testing, cuber security, Twitter OSINT Tools

Twitter OSINT Tools

Twitter OSINT Tools

🧠 1. What is Twitter OSINT? Twitter OSINT tools are digital resources used to gather and analyze public data from Twitter for investigative purposes. OSINT stands for Open Source Intelligence

Continue ReadingTwitter OSINT Tools

May 7, 2025 By ighacker33221@gmail.com Penetration Testing #hacking, #Penetration Testing, cuber security, Deanonymizing

Deanonymizing

Deanonymizing

1️⃣ 🔍 What is Deanonymizing? Deanonymizing refers to the act of tracing and identifying individuals who deliberately hide their identity online. It involves analyzing data, network activity, or digital behavior

Continue ReadingDeanonymizing

May 6, 2025 By ighacker33221@gmail.com Penetration Testing #hacking, #Penetration Testing, cuber security, google maps scrapper

google maps scrapper

google maps scrapper

1️⃣ 🔍 What is a Google Maps Scraper? A Google Maps scrapper is a tool or script designed to extract business-related data directly from Google Maps. This data typically includes

Continue Readinggoogle maps scrapper

Posts pagination

1 2 … 8
Copyright © 2025 | Powered by TheTechCrime