β£ Ethical Hacking Complete Course β£
π°Original Price:- upto 15,000 INR
π For You - Free of cost β
What will you learn in this course :
πΈImportant Terms Used In Ethical Hacking
πΈIntroduction To Footprinting
πΈGet Information From Website Name
πΈHow To Collect Information Using E-mail
πΈInformation Collection Using Network
πΈInformation Gathering Using Search Engine
πΈDeep learn Of Footprinting (conclusion)
πΈHow To Disable Httrack & Web Mirroring
πΈCompletely Hide Your Personl Details From Internet
πΈPractical Of Ip Address And Local Host
πΈIntroduction To Ip Addres
πΈVirtual Lab Setting
πΈIntroduction To Proxy
πΈHow To Use Tor Browser
πΈHow To Use Multiple Proxies
πΈHow To Use Free Proxy Server
πΈWhat Is Scanning
πΈLive Network, Port And Ip Scanning
πΈHow To Check Target Basic Details
πΈBanner Grabbing Explained With Practical
πΈVulnerability Scanning Explained
πΈMask Your Banner To Confuse Hackers
πΈClose Open Ports And Secure Your Data
πΈWhat Is Enumeration
πΈWeb Enumeration Explained
πΈNetbios Enumeration Practical
πΈSystem Hacking Explained
πΈHow To Work In Computer Without Login
πΈHow To Recover Windows Password
πΈWhat Is Virus, Malware And Worms Explained
πΈWhat Is Trojan Explained
πΈVirus Maker Explained
πΈThe Working Of Trojan
πΈWhat Is Sniffing Explained
πΈWhat Is Man In The Middle Attack Explained
πΈWhat Is Mac Flooding Attack
πΈPenetst Sniffing
πΈWhat Is Spoofing Explained
πΈWhat Is Arp Spoofing Explained With Practical
πΈMac Address Spoofing Explained
πΈEmail Spoofing Explained With Practical
πΈWhat Is Social Engineering
πΈWhat Is Phishing Explained
πΈonline phishing
πΈHow To Setup A Lab For Online Hacking
πΈHow To Create A Page In Phishing
πΈHow To Detect And Prevent Phishing
πΈWhat Is Dos & Ddos Attack Explaind
πΈDos Attack A Small Demo
πΈDifferent Ways Of Dos & Ddos
πΈA Unique Method Of Dos Using Google
πΈways To protect Dos & ddos
πΈWhat Is Cookie Stealing Demo
πΈSidejacking Explained With Practical
πΈSession Hijacking Explained
πΈSession Hijacking Explained With Practical
πΈWeb Application And Server Explained
πΈHow To Install Dvwa And Mutillide On Virtual Box
πΈHow To Collect Server Information Of Any Website Live
πΈWhat Is Buffer Overflow Explained
πΈPractical Of Buffer Overflow On Website
πΈLab Setting For Buffer Overflow
πΈBuffer Overflow Explained With Practical
πΈCross Site Scripting Attack Explained
πΈCross Site Scripting Attack Demo
πΈWhat Is Sql Injetion Explained
πΈLive Sql Vulnerability Testing
πΈLive Advance Sql Injection Practical
πΈBest Way To Be Safe From Sql Injection
πΈHow To Catch Hackers Using Fake Info
πΈWhat Is Steganography
πΈImage & Text Steganography Practical
πΈVideo & Audio Steganography Practical
πΈRedirect User Authentication Using Csrf
πΈPentesting With Formula Injection
πΈPenetesting With Css Injection
πΈPath Traversal Attack Detection & Prevention
πΈCommand Injection Explained With Demo
πΈWeb Hacking Using Repeater
πΈWeb Application Pentesting Bypass Website Info
πΈSensitive Infromation Stored In Target Tab Burp Suit
πΈScan Vulnerabilities In A Web Application
πΈWhat Is Cryptography
πΈHow To Encrypt Or Decrypt Messages
πΈChat Anonymously With Anyone
πΈBasic Terms Related To Wi-Fi
πΈBest Mobile Security Tips
πΈLatest Banking Security Tips
And Allots of more things except above.....
https://www.mediafire.com/file/6s6l144339ja2yl/Masters-In-Ethical-Hacking-Course-2-Gib-.7z/file
π°Original Price:- upto 15,000 INR
π For You - Free of cost β
What will you learn in this course :
πΈImportant Terms Used In Ethical Hacking
πΈIntroduction To Footprinting
πΈGet Information From Website Name
πΈHow To Collect Information Using E-mail
πΈInformation Collection Using Network
πΈInformation Gathering Using Search Engine
πΈDeep learn Of Footprinting (conclusion)
πΈHow To Disable Httrack & Web Mirroring
πΈCompletely Hide Your Personl Details From Internet
πΈPractical Of Ip Address And Local Host
πΈIntroduction To Ip Addres
πΈVirtual Lab Setting
πΈIntroduction To Proxy
πΈHow To Use Tor Browser
πΈHow To Use Multiple Proxies
πΈHow To Use Free Proxy Server
πΈWhat Is Scanning
πΈLive Network, Port And Ip Scanning
πΈHow To Check Target Basic Details
πΈBanner Grabbing Explained With Practical
πΈVulnerability Scanning Explained
πΈMask Your Banner To Confuse Hackers
πΈClose Open Ports And Secure Your Data
πΈWhat Is Enumeration
πΈWeb Enumeration Explained
πΈNetbios Enumeration Practical
πΈSystem Hacking Explained
πΈHow To Work In Computer Without Login
πΈHow To Recover Windows Password
πΈWhat Is Virus, Malware And Worms Explained
πΈWhat Is Trojan Explained
πΈVirus Maker Explained
πΈThe Working Of Trojan
πΈWhat Is Sniffing Explained
πΈWhat Is Man In The Middle Attack Explained
πΈWhat Is Mac Flooding Attack
πΈPenetst Sniffing
πΈWhat Is Spoofing Explained
πΈWhat Is Arp Spoofing Explained With Practical
πΈMac Address Spoofing Explained
πΈEmail Spoofing Explained With Practical
πΈWhat Is Social Engineering
πΈWhat Is Phishing Explained
πΈonline phishing
πΈHow To Setup A Lab For Online Hacking
πΈHow To Create A Page In Phishing
πΈHow To Detect And Prevent Phishing
πΈWhat Is Dos & Ddos Attack Explaind
πΈDos Attack A Small Demo
πΈDifferent Ways Of Dos & Ddos
πΈA Unique Method Of Dos Using Google
πΈways To protect Dos & ddos
πΈWhat Is Cookie Stealing Demo
πΈSidejacking Explained With Practical
πΈSession Hijacking Explained
πΈSession Hijacking Explained With Practical
πΈWeb Application And Server Explained
πΈHow To Install Dvwa And Mutillide On Virtual Box
πΈHow To Collect Server Information Of Any Website Live
πΈWhat Is Buffer Overflow Explained
πΈPractical Of Buffer Overflow On Website
πΈLab Setting For Buffer Overflow
πΈBuffer Overflow Explained With Practical
πΈCross Site Scripting Attack Explained
πΈCross Site Scripting Attack Demo
πΈWhat Is Sql Injetion Explained
πΈLive Sql Vulnerability Testing
πΈLive Advance Sql Injection Practical
πΈBest Way To Be Safe From Sql Injection
πΈHow To Catch Hackers Using Fake Info
πΈWhat Is Steganography
πΈImage & Text Steganography Practical
πΈVideo & Audio Steganography Practical
πΈRedirect User Authentication Using Csrf
πΈPentesting With Formula Injection
πΈPenetesting With Css Injection
πΈPath Traversal Attack Detection & Prevention
πΈCommand Injection Explained With Demo
πΈWeb Hacking Using Repeater
πΈWeb Application Pentesting Bypass Website Info
πΈSensitive Infromation Stored In Target Tab Burp Suit
πΈScan Vulnerabilities In A Web Application
πΈWhat Is Cryptography
πΈHow To Encrypt Or Decrypt Messages
πΈChat Anonymously With Anyone
πΈBasic Terms Related To Wi-Fi
πΈBest Mobile Security Tips
πΈLatest Banking Security Tips
And Allots of more things except above.....
https://www.mediafire.com/file/6s6l144339ja2yl/Masters-In-Ethical-Hacking-Course-2-Gib-.7z/file
MediaFire
Masters-In-Ethical-Hacking-Course-2-Gib-
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.
π4β€βπ₯3π±2
NOTE20221219130356.png
963.8 KB
Hanuman Ji Python Source Code
( @coding_.logic ) π₯ππ»
( @coding_.logic ) π₯ππ»
π2π1
Coding Logic
Video
Source Code π
-----------------------------------------------------
<html>
<head>
<style>
.outer{
margin:auto;
height:300px;
width:400px;
border:2px solid black;
position:relative
}
p{
margin-left:80px;
}
.in{
margin-left:80px;
padding:10px
}
#bt{
margin-top:20px;
position:absolute;
left:150px;
}
#bt:hover{
background:green;
font-size:13px;
cursor:pointer;
color:white;
}
</style>
<script>
function fa(){
if(a.value=="" || b.value==""){
f()
document.getElementById("a").style.border="3px solid red"
document.getElementById("b").style.border="3px solid red"
bt.value="Pahila data tak"
}
else{
document.getElementById("a").style.border="3px solid green"
document.getElementById("b").style.border="3px solid green"
bt.value="Ha thik ahe ata"
bt.style.left="120px";
}
}
flag=1
function f(){
if(flag==1){
bt.style.left="210px"
flag=2
}
else if(flag==2){
bt.style.left="80px"
flag=1
}
}
</script>
</head>
<body>
<div class="outer">
<h1 style="text-align:center">Legend form</h1>
<p>Enter Id</p>
<input class="in" type="text" placeholder="Enter id" id="a"/>
<p>Enter Confirm Pass</p>
<input class="in" type="password" placeholder="Enter password" id="b"/>
<br>
<input type="submit" onmouseenter="fa()" onclick="alert('waaaa')" id="bt" />
</div>
</body>
</html>
-----------------------------------------------------
<html>
<head>
<style>
.outer{
margin:auto;
height:300px;
width:400px;
border:2px solid black;
position:relative
}
p{
margin-left:80px;
}
.in{
margin-left:80px;
padding:10px
}
#bt{
margin-top:20px;
position:absolute;
left:150px;
}
#bt:hover{
background:green;
font-size:13px;
cursor:pointer;
color:white;
}
</style>
<script>
function fa(){
if(a.value=="" || b.value==""){
f()
document.getElementById("a").style.border="3px solid red"
document.getElementById("b").style.border="3px solid red"
bt.value="Pahila data tak"
}
else{
document.getElementById("a").style.border="3px solid green"
document.getElementById("b").style.border="3px solid green"
bt.value="Ha thik ahe ata"
bt.style.left="120px";
}
}
flag=1
function f(){
if(flag==1){
bt.style.left="210px"
flag=2
}
else if(flag==2){
bt.style.left="80px"
flag=1
}
}
</script>
</head>
<body>
<div class="outer">
<h1 style="text-align:center">Legend form</h1>
<p>Enter Id</p>
<input class="in" type="text" placeholder="Enter id" id="a"/>
<p>Enter Confirm Pass</p>
<input class="in" type="password" placeholder="Enter password" id="b"/>
<br>
<input type="submit" onmouseenter="fa()" onclick="alert('waaaa')" id="bt" />
</div>
</body>
</html>
π€©4π2π₯°1
πππππ
import turtle
col=('yellow','red','green','orange','blue','white')
t=turtle.Turtle()
screen=turtle.Screen()
screen.bgcolor('black')
t.speed(30)
for i in range (150):
t.color(col[i%6])
t.forward(i*4)
t.left(150)
t.width(2)
import turtle
col=('yellow','red','green','orange','blue','white')
t=turtle.Turtle()
screen=turtle.Screen()
screen.bgcolor('black')
t.speed(30)
for i in range (150):
t.color(col[i%6])
t.forward(i*4)
t.left(150)
t.width(2)
π₯4
https://drive.google.com/drive/folders/1-xmLdiHEtepyVeam-z2j3KdhZWPfCmL4
Complete Frontend + Server side Resources, Ebooks, Notes, Interview Questions Everything π€©
React with any random emoji, if you can access the resources ππ₯
Hope this helps you!!
Complete Frontend + Server side Resources, Ebooks, Notes, Interview Questions Everything π€©
React with any random emoji, if you can access the resources ππ₯
Hope this helps you!!
β€5π3π2β‘1
PalindromeNumber.java
637 B
Write a Java Program to Check User Entered Number is Palindrome or Not π₯π₯
π₯3π1