import subprocess
data = subprocess.check_output(['netsh', 'wlan', 'show', 'profiles']).decode('utf-8',
errors="backslashreplace").split('\n')
profiles = [i.split(":")[1][1:-1] for i in data if "All User Profile" in i]
for i in profiles:
try:
results = subprocess.check_output(['netsh', 'wlan', 'show', 'profile', i, 'key=clear']).decode('utf-8', errors="backslashreplace").split('\n')
results = [b.split(":")[1][1:-1] for b in results if "Key Content" in b]
try:
print("{:<30}| {:<}".format(i, results[0]))
except IndexError:
print ("{:<30}| {:<}".format(i, ""))
except subprocess.CalledProcessError:
print ("{:<30}| {:<}".format(i, "ENCODING ERROR"))
input("")
data = subprocess.check_output(['netsh', 'wlan', 'show', 'profiles']).decode('utf-8',
errors="backslashreplace").split('\n')
profiles = [i.split(":")[1][1:-1] for i in data if "All User Profile" in i]
for i in profiles:
try:
results = subprocess.check_output(['netsh', 'wlan', 'show', 'profile', i, 'key=clear']).decode('utf-8', errors="backslashreplace").split('\n')
results = [b.split(":")[1][1:-1] for b in results if "Key Content" in b]
try:
print("{:<30}| {:<}".format(i, results[0]))
except IndexError:
print ("{:<30}| {:<}".format(i, ""))
except subprocess.CalledProcessError:
print ("{:<30}| {:<}".format(i, "ENCODING ERROR"))
input("")
😈5❤2👍1🔥1
☣ Ethical Hacking Complete Course ☣
💰Original Price:- upto 15,000 INR
🆓 For You - Free of cost ✅
What will you learn in this course :
🔸Important Terms Used In Ethical Hacking
🔸Introduction To Footprinting
🔸Get Information From Website Name
🔸How To Collect Information Using E-mail
🔸Information Collection Using Network
🔸Information Gathering Using Search Engine
🔸Deep learn Of Footprinting (conclusion)
🔸How To Disable Httrack & Web Mirroring
🔸Completely Hide Your Personl Details From Internet
🔸Practical Of Ip Address And Local Host
🔸Introduction To Ip Addres
🔸Virtual Lab Setting
🔸Introduction To Proxy
🔸How To Use Tor Browser
🔸How To Use Multiple Proxies
🔸How To Use Free Proxy Server
🔸What Is Scanning
🔸Live Network, Port And Ip Scanning
🔸How To Check Target Basic Details
🔸Banner Grabbing Explained With Practical
🔸Vulnerability Scanning Explained
🔸Mask Your Banner To Confuse Hackers
🔸Close Open Ports And Secure Your Data
🔸What Is Enumeration
🔸Web Enumeration Explained
🔸Netbios Enumeration Practical
🔸System Hacking Explained
🔸How To Work In Computer Without Login
🔸How To Recover Windows Password
🔸What Is Virus, Malware And Worms Explained
🔸What Is Trojan Explained
🔸Virus Maker Explained
🔸The Working Of Trojan
🔸What Is Sniffing Explained
🔸What Is Man In The Middle Attack Explained
🔸What Is Mac Flooding Attack
🔸Penetst Sniffing
🔸What Is Spoofing Explained
🔸What Is Arp Spoofing Explained With Practical
🔸Mac Address Spoofing Explained
🔸Email Spoofing Explained With Practical
🔸What Is Social Engineering
🔸What Is Phishing Explained
🔸online phishing
🔸How To Setup A Lab For Online Hacking
🔸How To Create A Page In Phishing
🔸How To Detect And Prevent Phishing
🔸What Is Dos & Ddos Attack Explaind
🔸Dos Attack A Small Demo
🔸Different Ways Of Dos & Ddos
🔸A Unique Method Of Dos Using Google
🔸ways To protect Dos & ddos
🔸What Is Cookie Stealing Demo
🔸Sidejacking Explained With Practical
🔸Session Hijacking Explained
🔸Session Hijacking Explained With Practical
🔸Web Application And Server Explained
🔸How To Install Dvwa And Mutillide On Virtual Box
🔸How To Collect Server Information Of Any Website Live
🔸What Is Buffer Overflow Explained
🔸Practical Of Buffer Overflow On Website
🔸Lab Setting For Buffer Overflow
🔸Buffer Overflow Explained With Practical
🔸Cross Site Scripting Attack Explained
🔸Cross Site Scripting Attack Demo
🔸What Is Sql Injetion Explained
🔸Live Sql Vulnerability Testing
🔸Live Advance Sql Injection Practical
🔸Best Way To Be Safe From Sql Injection
🔸How To Catch Hackers Using Fake Info
🔸What Is Steganography
🔸Image & Text Steganography Practical
🔸Video & Audio Steganography Practical
🔸Redirect User Authentication Using Csrf
🔸Pentesting With Formula Injection
🔸Penetesting With Css Injection
🔸Path Traversal Attack Detection & Prevention
🔸Command Injection Explained With Demo
🔸Web Hacking Using Repeater
🔸Web Application Pentesting Bypass Website Info
🔸Sensitive Infromation Stored In Target Tab Burp Suit
🔸Scan Vulnerabilities In A Web Application
🔸What Is Cryptography
🔸How To Encrypt Or Decrypt Messages
🔸Chat Anonymously With Anyone
🔸Basic Terms Related To Wi-Fi
🔸Best Mobile Security Tips
🔸Latest Banking Security Tips
And Allots of more things except above.....
https://www.mediafire.com/file/6s6l144339ja2yl/Masters-In-Ethical-Hacking-Course-2-Gib-.7z/file
💰Original Price:- upto 15,000 INR
🆓 For You - Free of cost ✅
What will you learn in this course :
🔸Important Terms Used In Ethical Hacking
🔸Introduction To Footprinting
🔸Get Information From Website Name
🔸How To Collect Information Using E-mail
🔸Information Collection Using Network
🔸Information Gathering Using Search Engine
🔸Deep learn Of Footprinting (conclusion)
🔸How To Disable Httrack & Web Mirroring
🔸Completely Hide Your Personl Details From Internet
🔸Practical Of Ip Address And Local Host
🔸Introduction To Ip Addres
🔸Virtual Lab Setting
🔸Introduction To Proxy
🔸How To Use Tor Browser
🔸How To Use Multiple Proxies
🔸How To Use Free Proxy Server
🔸What Is Scanning
🔸Live Network, Port And Ip Scanning
🔸How To Check Target Basic Details
🔸Banner Grabbing Explained With Practical
🔸Vulnerability Scanning Explained
🔸Mask Your Banner To Confuse Hackers
🔸Close Open Ports And Secure Your Data
🔸What Is Enumeration
🔸Web Enumeration Explained
🔸Netbios Enumeration Practical
🔸System Hacking Explained
🔸How To Work In Computer Without Login
🔸How To Recover Windows Password
🔸What Is Virus, Malware And Worms Explained
🔸What Is Trojan Explained
🔸Virus Maker Explained
🔸The Working Of Trojan
🔸What Is Sniffing Explained
🔸What Is Man In The Middle Attack Explained
🔸What Is Mac Flooding Attack
🔸Penetst Sniffing
🔸What Is Spoofing Explained
🔸What Is Arp Spoofing Explained With Practical
🔸Mac Address Spoofing Explained
🔸Email Spoofing Explained With Practical
🔸What Is Social Engineering
🔸What Is Phishing Explained
🔸online phishing
🔸How To Setup A Lab For Online Hacking
🔸How To Create A Page In Phishing
🔸How To Detect And Prevent Phishing
🔸What Is Dos & Ddos Attack Explaind
🔸Dos Attack A Small Demo
🔸Different Ways Of Dos & Ddos
🔸A Unique Method Of Dos Using Google
🔸ways To protect Dos & ddos
🔸What Is Cookie Stealing Demo
🔸Sidejacking Explained With Practical
🔸Session Hijacking Explained
🔸Session Hijacking Explained With Practical
🔸Web Application And Server Explained
🔸How To Install Dvwa And Mutillide On Virtual Box
🔸How To Collect Server Information Of Any Website Live
🔸What Is Buffer Overflow Explained
🔸Practical Of Buffer Overflow On Website
🔸Lab Setting For Buffer Overflow
🔸Buffer Overflow Explained With Practical
🔸Cross Site Scripting Attack Explained
🔸Cross Site Scripting Attack Demo
🔸What Is Sql Injetion Explained
🔸Live Sql Vulnerability Testing
🔸Live Advance Sql Injection Practical
🔸Best Way To Be Safe From Sql Injection
🔸How To Catch Hackers Using Fake Info
🔸What Is Steganography
🔸Image & Text Steganography Practical
🔸Video & Audio Steganography Practical
🔸Redirect User Authentication Using Csrf
🔸Pentesting With Formula Injection
🔸Penetesting With Css Injection
🔸Path Traversal Attack Detection & Prevention
🔸Command Injection Explained With Demo
🔸Web Hacking Using Repeater
🔸Web Application Pentesting Bypass Website Info
🔸Sensitive Infromation Stored In Target Tab Burp Suit
🔸Scan Vulnerabilities In A Web Application
🔸What Is Cryptography
🔸How To Encrypt Or Decrypt Messages
🔸Chat Anonymously With Anyone
🔸Basic Terms Related To Wi-Fi
🔸Best Mobile Security Tips
🔸Latest Banking Security Tips
And Allots of more things except above.....
https://www.mediafire.com/file/6s6l144339ja2yl/Masters-In-Ethical-Hacking-Course-2-Gib-.7z/file
MediaFire
Masters-In-Ethical-Hacking-Course-2-Gib-
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.
👍4❤🔥3😱2
Coding Logic
Video
Source Code 👇
-----------------------------------------------------
<html>
<head>
<style>
.outer{
margin:auto;
height:300px;
width:400px;
border:2px solid black;
position:relative
}
p{
margin-left:80px;
}
.in{
margin-left:80px;
padding:10px
}
#bt{
margin-top:20px;
position:absolute;
left:150px;
}
#bt:hover{
background:green;
font-size:13px;
cursor:pointer;
color:white;
}
</style>
<script>
function fa(){
if(a.value=="" || b.value==""){
f()
document.getElementById("a").style.border="3px solid red"
document.getElementById("b").style.border="3px solid red"
bt.value="Pahila data tak"
}
else{
document.getElementById("a").style.border="3px solid green"
document.getElementById("b").style.border="3px solid green"
bt.value="Ha thik ahe ata"
bt.style.left="120px";
}
}
flag=1
function f(){
if(flag==1){
bt.style.left="210px"
flag=2
}
else if(flag==2){
bt.style.left="80px"
flag=1
}
}
</script>
</head>
<body>
<div class="outer">
<h1 style="text-align:center">Legend form</h1>
<p>Enter Id</p>
<input class="in" type="text" placeholder="Enter id" id="a"/>
<p>Enter Confirm Pass</p>
<input class="in" type="password" placeholder="Enter password" id="b"/>
<br>
<input type="submit" onmouseenter="fa()" onclick="alert('waaaa')" id="bt" />
</div>
</body>
</html>
-----------------------------------------------------
<html>
<head>
<style>
.outer{
margin:auto;
height:300px;
width:400px;
border:2px solid black;
position:relative
}
p{
margin-left:80px;
}
.in{
margin-left:80px;
padding:10px
}
#bt{
margin-top:20px;
position:absolute;
left:150px;
}
#bt:hover{
background:green;
font-size:13px;
cursor:pointer;
color:white;
}
</style>
<script>
function fa(){
if(a.value=="" || b.value==""){
f()
document.getElementById("a").style.border="3px solid red"
document.getElementById("b").style.border="3px solid red"
bt.value="Pahila data tak"
}
else{
document.getElementById("a").style.border="3px solid green"
document.getElementById("b").style.border="3px solid green"
bt.value="Ha thik ahe ata"
bt.style.left="120px";
}
}
flag=1
function f(){
if(flag==1){
bt.style.left="210px"
flag=2
}
else if(flag==2){
bt.style.left="80px"
flag=1
}
}
</script>
</head>
<body>
<div class="outer">
<h1 style="text-align:center">Legend form</h1>
<p>Enter Id</p>
<input class="in" type="text" placeholder="Enter id" id="a"/>
<p>Enter Confirm Pass</p>
<input class="in" type="password" placeholder="Enter password" id="b"/>
<br>
<input type="submit" onmouseenter="fa()" onclick="alert('waaaa')" id="bt" />
</div>
</body>
</html>
🤩4👍2🥰1
👇👇👇👇👇
import turtle
col=('yellow','red','green','orange','blue','white')
t=turtle.Turtle()
screen=turtle.Screen()
screen.bgcolor('black')
t.speed(30)
for i in range (150):
t.color(col[i%6])
t.forward(i*4)
t.left(150)
t.width(2)
import turtle
col=('yellow','red','green','orange','blue','white')
t=turtle.Turtle()
screen=turtle.Screen()
screen.bgcolor('black')
t.speed(30)
for i in range (150):
t.color(col[i%6])
t.forward(i*4)
t.left(150)
t.width(2)
🔥4
https://drive.google.com/drive/folders/1-xmLdiHEtepyVeam-z2j3KdhZWPfCmL4
Complete Frontend + Server side Resources, Ebooks, Notes, Interview Questions Everything 🤩
React with any random emoji, if you can access the resources 😄🔥
Hope this helps you!!
Complete Frontend + Server side Resources, Ebooks, Notes, Interview Questions Everything 🤩
React with any random emoji, if you can access the resources 😄🔥
Hope this helps you!!
❤5👍3👏2⚡1
PalindromeNumber.java
637 B
Write a Java Program to Check User Entered Number is Palindrome or Not 🔥🔥
🔥3👌1