top of page
Grow Your Vision
Learn ethical hacking with our informative write-ups. Whether you're a Python enthusiast or a cybersecurity enthusiast, our articles provide valuable insights and practical knowledge to help you master the art of ethical hacking.
​
![](https://static.wixstatic.com/media/642e54_da00ddca631348fcb2b00e2fce83bbf7~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_da00ddca631348fcb2b00e2fce83bbf7~mv2.webp)
![Website Application Penetration Testing](https://static.wixstatic.com/media/642e54_da00ddca631348fcb2b00e2fce83bbf7~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_da00ddca631348fcb2b00e2fce83bbf7~mv2.webp)
Swift Glitxh
Oct 8, 2023
Website Application Penetration Testing
What is website application pentration testing? Website Application Pentration testing is discovering vulnerabilities and bugs inside of...
2 views0 comments
![](https://static.wixstatic.com/media/642e54_f12e0f5e9be94ab1b1583dee01146d30~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_f12e0f5e9be94ab1b1583dee01146d30~mv2.webp)
![What is ARP Spoofing?](https://static.wixstatic.com/media/642e54_f12e0f5e9be94ab1b1583dee01146d30~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_f12e0f5e9be94ab1b1583dee01146d30~mv2.webp)
Swift Glitxh
Oct 6, 2023
What is ARP Spoofing?
ARP spoofing Arp spoofing or sometimes other known as ARP poisoning is a method used where the hacker will send a ARP (Address Resolution...
6 views0 comments
![](https://static.wixstatic.com/media/642e54_27000fd30f6a421f8f84f2a2556baa13~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_27000fd30f6a421f8f84f2a2556baa13~mv2.webp)
![Gobuster Tool Guide](https://static.wixstatic.com/media/642e54_27000fd30f6a421f8f84f2a2556baa13~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_27000fd30f6a421f8f84f2a2556baa13~mv2.webp)
Swift Glitxh
Oct 1, 2023
Gobuster Tool Guide
Gobuster is a performance analysis and tuning tool that may be utilized for the purposes of application performance troubleshooting and...
2 views0 comments
![](https://static.wixstatic.com/media/642e54_4e8f390f9e2b49eb9d5cc5ee3e72094d~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_4e8f390f9e2b49eb9d5cc5ee3e72094d~mv2.webp)
![VSFTPD 2.3.4 Vulnerabilities: A Hacker's Perspective](https://static.wixstatic.com/media/642e54_4e8f390f9e2b49eb9d5cc5ee3e72094d~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_4e8f390f9e2b49eb9d5cc5ee3e72094d~mv2.webp)
Swift Glitxh
Oct 1, 2023
VSFTPD 2.3.4 Vulnerabilities: A Hacker's Perspective
Some programs come with backdoors embed in them,I am going to show you how to go about exploiting these. Firstly,we will use a tool...
13 views0 comments
![](https://static.wixstatic.com/media/642e54_f69d6b86ee4640e895f8f593537cb242~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_f69d6b86ee4640e895f8f593537cb242~mv2.webp)
![Exploit windows with Eternalblue](https://static.wixstatic.com/media/642e54_f69d6b86ee4640e895f8f593537cb242~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_f69d6b86ee4640e895f8f593537cb242~mv2.webp)
Swift Glitxh
Sep 30, 2023
Exploit windows with Eternalblue
Begining The Scan To begin we will run Metasploit Search for exploit We will the use the search command, to look for eternalblue Once...
17 views0 comments
![](https://static.wixstatic.com/media/642e54_186e2ff171ac409b9c3ade0f62531f30~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_186e2ff171ac409b9c3ade0f62531f30~mv2.webp)
![Brute Force Attacks - Hydra](https://static.wixstatic.com/media/642e54_186e2ff171ac409b9c3ade0f62531f30~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_186e2ff171ac409b9c3ade0f62531f30~mv2.webp)
Swift Glitxh
Sep 29, 2023
Brute Force Attacks - Hydra
Hydra Hydra is a brute-forcing tool that helps ethical hackers crack the passwords and gain access to different network services. Hydra...
12 views0 comments
![](https://static.wixstatic.com/media/642e54_226e5a3e13c9480eaaac75990a2d2e7c~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_226e5a3e13c9480eaaac75990a2d2e7c~mv2.webp)
![DirBuster: A Powerful Directory Bruteforcing Tool](https://static.wixstatic.com/media/642e54_226e5a3e13c9480eaaac75990a2d2e7c~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_226e5a3e13c9480eaaac75990a2d2e7c~mv2.webp)
Swift Glitxh
Sep 24, 2023
DirBuster: A Powerful Directory Bruteforcing Tool
In the world of ethical hacking, one essential skill is the ability to discover hidden directories and files on a web server. This is...
2 views0 comments
![](https://static.wixstatic.com/media/642e54_89249a0a66fd402d9f4ef9d5fa35ab10~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_89249a0a66fd402d9f4ef9d5fa35ab10~mv2.webp)
![What Is Metasploit?](https://static.wixstatic.com/media/642e54_89249a0a66fd402d9f4ef9d5fa35ab10~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_89249a0a66fd402d9f4ef9d5fa35ab10~mv2.webp)
Swift Glitxh
Sep 23, 2023
What Is Metasploit?
What is Metasploit? The Metasploit Project is a computer security initiative that helps with penetration testing and spreads information...
6 views0 comments
![](https://static.wixstatic.com/media/642e54_7fc4d1fbe92141b7a4085736c7fc21c8~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_7fc4d1fbe92141b7a4085736c7fc21c8~mv2.webp)
![Introduction To Trojans](https://static.wixstatic.com/media/642e54_7fc4d1fbe92141b7a4085736c7fc21c8~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_7fc4d1fbe92141b7a4085736c7fc21c8~mv2.webp)
Swift Glitxh
Sep 8, 2023
Introduction To Trojans
What Are Trojans? Trojans are a type of malicious code or software that may look safe to users to open. Trojans as stated are malicious,...
9 views0 comments
![](https://static.wixstatic.com/media/642e54_61ef74085ced494a868b40d6f148673c~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_61ef74085ced494a868b40d6f148673c~mv2.webp)
![What Is Nmap?](https://static.wixstatic.com/media/642e54_61ef74085ced494a868b40d6f148673c~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_61ef74085ced494a868b40d6f148673c~mv2.webp)
Swift Glitxh
Sep 7, 2023
What Is Nmap?
Nmap, which stands for "Network Mapping",is very popular tool that is used to scan networks and gathering information about them. Nmap...
6 views0 comments
![](https://static.wixstatic.com/media/642e54_c83e5888ea7f4959a106a9cccb1420e6~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/642e54_c83e5888ea7f4959a106a9cccb1420e6~mv2.webp)
![Weevly - File Vulnerability](https://static.wixstatic.com/media/642e54_c83e5888ea7f4959a106a9cccb1420e6~mv2.jpeg/v1/fill/w_451,h_339,fp_0.50_0.50,q_90,enc_auto/642e54_c83e5888ea7f4959a106a9cccb1420e6~mv2.webp)
Swift Glitxh
Sep 1, 2023
Weevly - File Vulnerability
How To Exploit File Upload vulnerablilities Using Weevely Steps 1: Generate backdoor 2: Upload File 3: Gain Access Let's talk about File...
14 views0 comments
bottom of page