PinnedGourav DharinInfoSec Write-upsFinding Vulnerable Info Using Google Dorks — Ethical HackingGoogle Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet.Apr 3, 20223Apr 3, 20223
PinnedGourav DharAPIs and How to design them — All you need to know !Have you created a service and want others to use it? Well!!! Apis are the way to do it.Jun 27, 2021Jun 27, 2021
Gourav DharinLevel Up CodingWhat are Crypto-wallets — Exploring Web3Crypto wallets provide the tools needed to communicate with the blockchain network. These wallets generate all the info for using crypto.May 24, 20221May 24, 20221
Gourav DharinLevel Up CodingWeb3 is our opportunity for a better and safer Internet — Evolution of WebWeb3 has the potential to provide a platform that no single entity can control, yet can be trusted by everybodyMay 16, 20221May 16, 20221
Gourav DharinLevel Up CodingSo how do blockchains and cryptocurrencies actually work! — Exploring Web3A blockchain is a system of recording transactions in a way that is not controlled by any single entity or organization, thereby reducing…May 8, 20222May 8, 20222
Gourav DharinAWS in Plain EnglishHow to add a Python library as an AWS layerNot all libraries are present in the environment provided by AWS lambda (Obviously! It’s not possible). If you want to use a common libraryMay 5, 20221May 5, 20221
Gourav DharinInfoSec Write-upsHow to perform a basic SQL Injection Attack? — Ethical HackingI will be demonstrating how to perform a basic SQL Injection Attack on a website, and at the end, I will talk about a tool SQLmapApr 24, 20222Apr 24, 20222
Gourav DharinInfoSec Write-upsHow hackers impersonate email-id’s : Email Spoofing and Phishing AttacksEmail Spoofing is a cyberattack where the attacker impersonates emails. It is a common tactic for carrying phishing attacks and spamming.Apr 13, 20221Apr 13, 20221
Gourav DharinLevel Up CodingI created an automated WhatsApp reply bot!By the end of this blog, your program will be able to reply to Whatsapp messages as and when they are receivedMar 27, 2022Mar 27, 2022
Gourav DharinInfoSec Write-upsHow I created an undetectable Backdoor for Windows — Ethical HackingIn this blog I have created an undetectable backdoor for windows machine to secretly gain remote access to a computer using the Veil fw.Mar 22, 20224Mar 22, 20224