top of page
Nitin Yadav
Apr 30, 20242 min read
Subdomain Enumeration -Recursive Internet Scanner for Hacking
Hello everyone, We are back again with another writeup. So first let’s talk about our recon process. If you know about scope based Recon...
9 views0 comments
Nitin Yadav
Nov 8, 20222 min read
Mobile App Scanner to Find Security Vulnerabilities
The usage of mobile phones is increasing so are the apps for mobile phones. But with these comes a big problem or putting your data at...
955 views0 comments
Nitin Yadav
Sep 30, 20222 min read
Source code scanner for Finding Critical Vulnerabilities
Source code analysis is one of the most thorough methods available for auditing software. It is also one of the most expensive, but it...
898 views0 comments
Nitin Yadav
Aug 27, 20221 min read
Nuclei for Bug Bounties Hunters
Nuclei is used to send requests across targets based on a template, providing fast scanning on a large number of hosts. Nuclei offers...
267 views0 comments
Nitin Yadav
Jul 21, 20224 min read
Intro to Metasploit - Learn about Metasploit in 2022 (Part 1)
Want to learn how to use Metasploit? This article is going to teach you everything you need. However, before we get started, you might...
382 views0 comments
Nitin Yadav
Jun 15, 20223 min read
Tool for performing OSINT for dark web investigations
Hello everyone, I am Nitin yadav(KD) back again with another write-up Introduction to OSINT OSINT can be summarized as open-source...
989 views0 comments
Nitin Yadav
Jun 12, 20222 min read
This tool can help you find broken social media links
Hello everyone, I am Nitin yadav(KD) back again with another write-up The tool Socialhunter is a great resource for pentesters, bug...
65 views0 comments
Nitin Yadav
May 31, 20221 min read
A Fancy Way To Bypass Cloud WAFs: Resolving The Host Behind A Reverse Proxy
Ever wondered what's behind a proxy? Now you too can know the origin host behind a reverse proxy! This tool will allow you to dig up a...
102 views0 comments
bottom of page