adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it...
Hacking
What is GPT, its Structure and Working !!
GPT or GUID Partition Table is a successor of MBR that comes with a lot of amazing features to protect your data's integrity security and safety...
What is HOTP? | HMAC-Based OTP Explained
%%sitename%% HOTP or HMAC-based One-Time Password is a 2FA method that uses a counter and a secret key to create an OTP...
Cyber Security
What is Control-Flow Enforcement Technology (CET) ?
The Intel's Control-Flow Enforcement technology also known as CET is a harware solution proposed by the intel to protect against Control Hijacking....
How To Hide Files using Alternate Data Streams ?
Alternate data streams have been used for decades for hiding data we will see its history and benefits so...
What is Data Execution Prevention (DEP) in OS ?
Data Execution Prevention (DEP) is an essential security feature in modern operating systems to protect computers from harmful attacks....
Hacking Journey
I Changed My Whole Life in 6 Months
Wanted to share my personal update, so here I am with another self blog. It's been 6 months since I wrote an update about my journey,...
The Beginning
This is my first blog of my journey which I am sharing with you.So, till this point, I have started a YouTube channel named Growing HackerAs you can see above...