top of page

Here's a chance to power up your professional life as a software developer. Don't miss out on our latest blogs. Subscribe to our Newsletter today!


How I created an undetectable Backdoor for Windows — Ethical Hacking
What is a Backdoor? Backdoor is a method of secretly gaining remote access to a computer by bypassing the normal authentication and...
Gourav Dhar
Jul 4, 20224 min read


How I created my first Web Crawler!
What is a web crawler? A web crawler is a bot that crawls the internet to index and downloads the contents of websites for scraping. Web...
Gourav Dhar
Jun 27, 20223 min read


How I created a Trojan Malware — Ethical Hacking
A Trojan horse (or Trojan) is one of the most common and dangerous types of threats that can infect your computer or mobile device. What...
Gourav Dhar
Jun 20, 20223 min read


Spoofing file extensions — Ethical Hacking
File extension spoofing is a handy trick when creating trojans. In this blog, I will be spoofing the ‘.exe’ extension to the ‘.jpg’...
Gourav Dhar
Jun 13, 20221 min read


Information Gathering — First Step towards Website Hacking
Hacking a website? Don’t miss out on this important step! Before hacking a website or a resource, it is a good practice to first...
Gourav Dhar
Jun 13, 20224 min read


How to securely browse the Internet | Prevent data leaks while connecting to public WiFi network
Feeling insecure while browsing on public WiFi? This blog is for you. Risk related to Public wifi networks Whenever someone connects to...
Gourav Dhar
Jun 6, 20222 min read


Man in the Middle Attack by ARP Spoofing: Tutorial and Examples
What is Man in The Middle (MITM) Attack? A man in the middle (MITM) attack is a general term for when a machine positions itself in...
Gourav Dhar
May 30, 20225 min read


Hack WiFi Passwords
Almost all modern-day wifi routers use WPA2 encryption. The WEP connections or WPS-enabled networks were easier to hack into because of...
Gourav Dhar
May 23, 20224 min read


How to change MAC Address?
MAC Address stands for Media Access Control. It is a unique address specific to a device set by the device manufacturer. No two devices...
Gourav Dhar
May 16, 20221 min read


Create a stunning portfolio website with your own website name from scratch within 1 hour
Hey Guys! Check out my website at www.gourav-dhar.com At the end of this blog you will have a hosted website similar to mine. So let’s...
Gourav Dhar
May 9, 20223 min read
bottom of page