PinnedGourav DharinInfoSec Write-upsFinding Vulnerable Info Using Google Dorks — Ethical HackingGoogle Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet.5 min read·Apr 3, 2022--3--3
PinnedGourav DharAPIs and How to design them — All you need to know !Have you created a service and want others to use it? Well!!! Apis are the way to do it.7 min read·Jun 27, 2021----
Gourav DharinLevel Up CodingWhat are Crypto-wallets — Exploring Web3Crypto wallets provide the tools needed to communicate with the blockchain network. These wallets generate all the info for using crypto.4 min read·May 24, 2022--1--1
Gourav DharinLevel Up CodingWeb3 is our opportunity for a better and safer Internet — Evolution of WebWeb3 has the potential to provide a platform that no single entity can control, yet can be trusted by everybody5 min read·May 16, 2022--1--1
Gourav DharinLevel Up CodingSo how do blockchains and cryptocurrencies actually work! — Exploring Web3A blockchain is a system of recording transactions in a way that is not controlled by any single entity or organization, thereby reducing…6 min read·May 8, 2022--2--2
Gourav DharinAWS in Plain EnglishHow to add a Python library as an AWS layerNot all libraries are present in the environment provided by AWS lambda (Obviously! It’s not possible). If you want to use a common library3 min read·May 5, 2022--1--1
Gourav DharinInfoSec Write-upsHow to perform a basic SQL Injection Attack? — Ethical HackingI will be demonstrating how to perform a basic SQL Injection Attack on a website, and at the end, I will talk about a tool SQLmap6 min read·Apr 24, 2022--2--2
Gourav DharinInfoSec Write-upsHow hackers impersonate email-id’s : Email Spoofing and Phishing AttacksEmail Spoofing is a cyberattack where the attacker impersonates emails. It is a common tactic for carrying phishing attacks and spamming.6 min read·Apr 13, 2022--1--1
Gourav DharinLevel Up CodingI created an automated WhatsApp reply bot!By the end of this blog, your program will be able to reply to Whatsapp messages as and when they are received7 min read·Mar 27, 2022----
Gourav DharinInfoSec Write-upsHow I created an undetectable Backdoor for Windows — Ethical HackingIn this blog I have created an undetectable backdoor for windows machine to secretly gain remote access to a computer using the Veil fw.7 min read·Mar 22, 2022--4--4