Search Results

Your searched for “amp”

Sample Page

This is an example page. It’s different from a blog post because it will stay in one place and will show up in your site navigation (in most themes). Most people start with an About page that introduces them to potential site visitors. It might say something like this: Hi there! I’m a bike messenger […]

Continue reading »

  • Red Team Adversary Emulation: Mimicking a real-world cyber attack
  • The Churned Number Exploit: How to hack accounts using mobile number

    Disclaimer: All the information provided on this Site is for educational and awareness purposes only. The Site Owner is no way responsible for any misuse of the information. Hacking with malicious intent or Cracking is the illegal thing we not suggest any one to do. It is illegal in cyber world & you can also […]

    View Resource »

  • Immunity Debugger for Exploit Devs – YCSC Lab Essentials
  • Hands-on Exploit Development (Advanced)
  • Hands-on Exploit Development
  • What does Yaksas mean?

    Yakshas (Sanskrit: यक्ष Yakṣas), were believed to be benevolent nature-spirits as per the Hindu, Jain and Buddhist Literature. The folklore portrays them as the care takers of the natural treasures hidden in the earth and tree roots. In Indian art, they are mostly depicted as fearsome warriors. The texts also speak of their dark side […]

    Continue reading »