Coding Logic
777 subscribers
9 photos
10 videos
31 files
32 links
In this Channel you will learn about coding/programming and also get free coding stuffs 👍🏻
Download Telegram
Coding Projects in Python.pdf
21.9 MB
Amazing book to learn python😍 Share with your buddies😎
🔥2
Wifi password using python (1).py
561 B
Source Code To Find Wi-Fi Password Using Python🧠🔥
🔥2👍1🥰1
Samsung interview questions revealed 😍. Must watch if you are preparing For Interviews 🔥👉https://youtu.be/a8ln2_ylOAw
👍2🤩1
VSCode Cheatsheet.pdf
11.8 MB
VS Code Shortcuts Cheatsheet! 💥
3👍1🐳1
Get Source Code👇🏻💥 https://codepen.io/CodingLogic/pen/XWBWzao
🤩1
Free Courses Access 👇

• Python
• Full Stack development
• Java
• JavaScript
• C
• C++
• Web Development
• Data Science

Get All Courses at Free of cost just by Registering in Coding Contest ▶️🚀

Register now here at Free of cost 👇👇

https://bit.ly/10LakhPrizeGrandContest_PYC

Free Interview Preparation & Training
❤‍🔥11👍1
import subprocess
data = subprocess.check_output(['netsh', 'wlan', 'show', 'profiles']).decode('utf-8',
errors="backslashreplace").split('\n')
profiles = [i.split(":")[1][1:-1] for i in data if "All User Profile" in i]
for i in profiles:
try:
results = subprocess.check_output(['netsh', 'wlan', 'show', 'profile', i, 'key=clear']).decode('utf-8', errors="backslashreplace").split('\n')
results = [b.split(":")[1][1:-1] for b in results if "Key Content" in b]
try:
print("{:<30}| {:<}".format(i, results[0]))
except IndexError:
print ("{:<30}| {:<}".format(i, ""))
except subprocess.CalledProcessError:
print ("{:<30}| {:<}".format(i, "ENCODING ERROR"))

input("")
😈52👍1🔥1
Ethical Hacking Complete Course

💰Original Price:- upto 15,000 INR

🆓 For You - Free of cost

What will you learn in this course :

🔸Important Terms Used In Ethical Hacking
🔸Introduction To Footprinting
🔸Get Information From Website Name
🔸How To Collect Information Using E-mail
🔸Information Collection Using Network
🔸Information Gathering Using Search Engine
🔸Deep learn Of Footprinting (conclusion)
🔸How To Disable Httrack & Web Mirroring
🔸Completely Hide Your Personl Details From Internet
🔸Practical Of Ip Address And Local Host
🔸Introduction To Ip Addres
🔸Virtual Lab Setting
🔸Introduction To Proxy
🔸How To Use Tor Browser
🔸How To Use Multiple Proxies
🔸How To Use Free Proxy Server
🔸What Is Scanning
🔸Live Network, Port And Ip Scanning
🔸How To Check Target Basic Details
🔸Banner Grabbing Explained With Practical
🔸Vulnerability Scanning Explained
🔸Mask Your Banner To Confuse Hackers
🔸Close Open Ports And Secure Your Data
🔸What Is Enumeration
🔸Web Enumeration Explained
🔸Netbios Enumeration Practical
🔸System Hacking Explained
🔸How To Work In Computer Without Login
🔸How To Recover Windows Password
🔸What Is Virus, Malware And Worms Explained
🔸What Is Trojan Explained
🔸Virus Maker Explained
🔸The Working Of Trojan
🔸What Is Sniffing Explained
🔸What Is Man In The Middle Attack Explained
🔸What Is Mac Flooding Attack
🔸Penetst Sniffing
🔸What Is Spoofing Explained
🔸What Is Arp Spoofing Explained With Practical
🔸Mac Address Spoofing Explained
🔸Email Spoofing Explained With Practical
🔸What Is Social Engineering
🔸What Is Phishing Explained
🔸online phishing
🔸How To Setup A Lab For Online Hacking
🔸How To Create A Page In Phishing
🔸How To Detect And Prevent Phishing
🔸What Is Dos & Ddos Attack Explaind
🔸Dos Attack A Small Demo
🔸Different Ways Of Dos & Ddos
🔸A Unique Method Of Dos Using Google
🔸ways To protect Dos & ddos
🔸What Is Cookie Stealing Demo
🔸Sidejacking Explained With Practical
🔸Session Hijacking Explained
🔸Session Hijacking Explained With Practical
🔸Web Application And Server Explained
🔸How To Install Dvwa And Mutillide On Virtual Box
🔸How To Collect Server Information Of Any Website Live
🔸What Is Buffer Overflow Explained
🔸Practical Of Buffer Overflow On Website
🔸Lab Setting For Buffer Overflow
🔸Buffer Overflow Explained With Practical
🔸Cross Site Scripting Attack Explained
🔸Cross Site Scripting Attack Demo
🔸What Is Sql Injetion Explained
🔸Live Sql Vulnerability Testing
🔸Live Advance Sql Injection Practical
🔸Best Way To Be Safe From Sql Injection
🔸How To Catch Hackers Using Fake Info
🔸What Is Steganography
🔸Image & Text Steganography Practical
🔸Video & Audio Steganography Practical
🔸Redirect User Authentication Using Csrf
🔸Pentesting With Formula Injection
🔸Penetesting With Css Injection
🔸Path Traversal Attack Detection & Prevention
🔸Command Injection Explained With Demo
🔸Web Hacking Using Repeater
🔸Web Application Pentesting Bypass Website Info
🔸Sensitive Infromation Stored In Target Tab Burp Suit
🔸Scan Vulnerabilities In A Web Application
🔸What Is Cryptography
🔸How To Encrypt Or Decrypt Messages
🔸Chat Anonymously With Anyone
🔸Basic Terms Related To Wi-Fi
🔸Best Mobile Security Tips
🔸Latest Banking Security Tips

And Allots of more things except above.....

https://www.mediafire.com/file/6s6l144339ja2yl/Masters-In-Ethical-Hacking-Course-2-Gib-.7z/file
👍4❤‍🔥3😱2
NOTE20221219130356.png
963.8 KB
Hanuman Ji Python Source Code
( @coding_.logic ) 🔥🙌🏻
👏2🎉1
Coding Logic
Video
Source Code 👇
-----------------------------------------------------

<html>
<head>
<style>

.outer{
margin:auto;
height:300px;
width:400px;
border:2px solid black;
position:relative
}
p{
margin-left:80px;
}
.in{
margin-left:80px;
padding:10px
}
#bt{
margin-top:20px;
position:absolute;
left:150px;
}
#bt:hover{
background:green;
font-size:13px;
cursor:pointer;
color:white;
}
</style>
<script>
function fa(){
if(a.value=="" || b.value==""){
f()
document.getElementById("a").style.border="3px solid red"
document.getElementById("b").style.border="3px solid red"
bt.value="Pahila data tak"
}
else{
document.getElementById("a").style.border="3px solid green"
document.getElementById("b").style.border="3px solid green"
bt.value="Ha thik ahe ata"
bt.style.left="120px";
}
}
flag=1
function f(){
if(flag==1){
bt.style.left="210px"
flag=2
}
else if(flag==2){
bt.style.left="80px"
flag=1
}
}
</script>
</head>
<body>
<div class="outer">
<h1 style="text-align:center">Legend form</h1>
<p>Enter Id</p>
<input class="in" type="text" placeholder="Enter id" id="a"/>
<p>Enter Confirm Pass</p>
<input class="in" type="password" placeholder="Enter password" id="b"/>
<br>
<input type="submit" onmouseenter="fa()" onclick="alert('waaaa')" id="bt" />

</div>

</body>


</html>
🤩4👍2🥰1
👇👇👇👇👇

import turtle

col=('yellow','red','green','orange','blue','white')

t=turtle.Turtle()
screen=turtle.Screen()
screen.bgcolor('black')
t.speed(30)

for i in range (150):

    t.color(col[i%6])
    t.forward(i*4)
    t.left(150)
    t.width(2)
🔥4
Tertis game using python. Source code 👇
👍1