Today I am going to explain another cool experiment done by me. Did you guys ever think about Computer Hacking with Arduino? Yes, that is possible. Most people are misunderstanding Arduino with a Rasberry-Pi. There are lots of differences between the Arduino board and the Rasberry-Pi. An Arduino is a Microcontroller motherboard while a Raspberry-Pi is a general-purpose computer. That means an Arduino can only run one program at a time while a Raspberry-Pi usually with an operating system so that can run multiple applications. I think that explains it is enough to understand the difference between the Arduino and the Rasberry-Pi. This is my Arduino UNO (ATmega16U2) In this experiment, I am using an Arduino UNO board because I only have that board at this time. My final target is a sending some preloaded commands in the Arduino board to my computer through a USB Cable. In default, this Arduino UNO board is not supported for this kind an activity, so ...
Today I am going to present you another free time fun project done by me to spend my free time. Actually, this is not a big deal. I am simply automated very known command. All of you know we can view saved WiFi Profiles by using the following command netsh wlan show profile <target-ssid> key=clear So, I make this easier by creating an automated batch file. Someone thinks this is useless, but if you are Batch script lover then you will definitely love my project because I added colours for that and also able to give an option for Run as Administrator. These are my codes: @echo off title WiFi Password Viewer :start cls echo. echo [7mWiFi Password Viewer v1.0 [0m echo -------------------------------- echo Author : [41;93mArea Master [0m echo Website : [44;93mWidane Forums [0m echo Link : https://www.widane.com echo -------------------------------- echo. echo 1 - Run as Administrator [91m(Recommended) [0m echo 2 - View all saved WiFi profiles echo 3 - Vie...
Today I am going to present to you another free time fun project done by me to spend my free time. This is a Spoofed E-Mail Sending tool. Unlike other tools, this tool is using a PHP mail() function to handling E-Mails, so this tool required PHP mail() function enabled hosting service for hosting mail handler. Before using this tool, you must host the two files (index.php and send.php) in the mailhandler folder. This hosting service must have PHP mail() function enabled. Otherwise, this tool won't work. After that, this tool will be asked for the mail handler URL (Only for the first time). So, you have to copy the URL of the hosted send.php file and paste it on the input. How to use this Tool Usage: usage: python3 sems.py [-h] [--sN SN] [--sE SE] [--rE RE] [--sub SUB] [--msg MSG] Simple Port Scanner for scanning TCP ports in target hosts optional arguments: -h, --help show this help message and exit --sN SN Sender Name (Eg: "John Cena") -...
Today I am going to present to you another free time fun project done by me to spend my free time. This is a TCP Port Scanner. I call it TCP Scanner (TCPS). This is a straightforward program created by using Python version Three. I don't expect to compare this tool with Nmap, so don't expect many features. You can perform TCP port scanning against any host within Intranet, Extranet & Internet by this tool. This tool can scan according to a given port range or a custom port(s) list or an inbuilt default port range. How to use this tool 1. Usage: usage: python3 tcps.py [-h] [--host HOST] [--default] [--list] [--pL PL [PL ...]] [--range] [--sP SP] [--eP EP] optional arguments: -h, --help show this help message and exit --host HOST Enter IP address or Hostname --default Use default port range (21, 22, 23, 80, 443) --list Enable port list scanning --pL PL [PL ...] Ports for port list scanning (Eg: --pL 21 22 80) --ran...
Hello, guys today I have news for you. I am pleased to say this blog, "Blog of Chandika", has been selected by Feedspot's panelist as one of the Top 100 Information Security Blogs on the web. Currently, it holds in 54th place on that list. Thank you, Mr. Anuj Agarwal, for bringing this to my attention You can view all Feedspot's Top 100 Information Security blogs from the following link: https://blog.feedspot.com/information_security_blogs/
Comments
Post a Comment