top of page


Subdomain Enumeration -Recursive Internet Scanner for Hacking
Hello everyone, We are back again with another writeup. So first let’s talk about our recon process. If you know about scope based Recon...
Nitin Yadav
Apr 30, 20242 min read
18 views
0 comments


Mobile App Scanner to Find Security Vulnerabilities
The usage of mobile phones is increasing so are the apps for mobile phones. But with these comes a big problem or putting your data at...
Nitin Yadav
Nov 8, 20222 min read
957 views
0 comments


Source code scanner for Finding Critical Vulnerabilities
Source code analysis is one of the most thorough methods available for auditing software. It is also one of the most expensive, but it...
Nitin Yadav
Sep 30, 20222 min read
900 views
0 comments


Nuclei for Bug Bounties Hunters
Nuclei is used to send requests across targets based on a template, providing fast scanning on a large number of hosts. Nuclei offers...
Nitin Yadav
Aug 27, 20221 min read
269 views
0 comments


Intro to Metasploit - Learn about Metasploit in 2022 (Part 1)
Want to learn how to use Metasploit? This article is going to teach you everything you need. However, before we get started, you might...
Nitin Yadav
Jul 21, 20224 min read
382 views
0 comments


Tool for performing OSINT for dark web investigations
Hello everyone, I am Nitin yadav(KD) back again with another write-up Introduction to OSINT OSINT can be summarized as open-source...
Nitin Yadav
Jun 15, 20223 min read
991 views
0 comments


This tool can help you find broken social media links
Hello everyone, I am Nitin yadav(KD) back again with another write-up The tool Socialhunter is a great resource for pentesters, bug...
Nitin Yadav
Jun 12, 20222 min read
69 views
0 comments


A Fancy Way To Bypass Cloud WAFs: Resolving The Host Behind A Reverse Proxy
Ever wondered what's behind a proxy? Now you too can know the origin host behind a reverse proxy! This tool will allow you to dig up a...
Nitin Yadav
May 31, 20221 min read
106 views
0 comments
bottom of page