Skip to content
  • Home
  • Cybersecurity In A Nutshell
  • Power Squad Selection
  • Shakti Squad Selection
Menu
Indian Cyber Troops Indian Cyber Troops

Let's Have Something Unique

  • Home
  • Cyber Security
    • Cyber Safety
  • Technology
    • Development
    • Interested Articles
    • These Android Apps Caught Stealing Users Facebook Passwords
    • Who are Indian Cyber Troops
    • Cyclone Tracker
  • Hinduism
  • Contact Us
  • News
    • Internal Investigation
    • Current Affairs
    • Health And Lifestyles
    • VPN Ban in India: Parliamentary Committee wants to ban VPN services in the Country
    • Who are Indian Cyber Troops
  • Squad Slection
    • Power Squad Selection
    • Shakti Squad Selection
    • Volunteer Squad Selection
  • About Us
  • Cyber Consultancy And Help Portal
  • Volunteer Squad Selection
  • Verification
  • Responsible Disclosure Policy
Thursday, Aug 11, 2022

Tag: web

  • Home
  • web

Burp Suite: The installati0n ( Linux )

Indian Cyber TroopsMay 15, 2021October 1, 2021
Cyber Security

Burp Suite: The installati0n ( Linux ) Burp Suite is a Java based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals. Burp Suite helps you identify vulnerabilities and verify attack vectors that are affecting web […]

Continue Reading

Ngrok :”The insta11ation Guide”

Indian Cyber TroopsMay 11, 2021October 1, 2021
Cyber Security

Ngrok :”The insta11ation Guide” Ngrok is a cross-platform application that enables developers to expose a local development server to the Internet with minimal effort. The software makes your locally-hosted web server appear to be hosted on a subdomain of Ngrok.com, meaning that […]

Continue Reading

Vulnerability Analysis With OpenVAS

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security

Introduction  If you take a broad view of penetration testing, the first step is information gathering, and after that, every step is closely related to the next one. In fact, all the steps fall into one broad category: exploitation. Vulnerability […]

Continue Reading

OSI MODEL (Open Systems Interconnection Model)

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security

The OSI reference model was developed by the International Organization for Standardization (ISO), and it has seven layers in all. The layers are as follows • Application (layer 7) • Presentation (layer 6) • Session (layer 5) • Transport (layer […]

Continue Reading

For You

  • Cyber (79)
    • Cyber Safety (12)
    • Cyber Security (73)
  • Hinduism/Bhakti (6)
  • Interested Articles (8)
  • Kali Linux (11)
  • law & order (15)
  • News (64)
    • Current Affairs (18)
    • Health And Lifestyles (10)
    • politics (4)
  • Programming (3)
  • Technology (11)
    • Development (4)

Something For You

  • How to Become a Bug Bounty Hunter From Scratch
  • How to Make Money on Fansly
  • Pros and Cons of Using Multiple Clouds
  • Kali Linux Commands Cheat Sheet
  • How To Install A VPN In Kali Linux

Latest

  • How to Become a Bug Bounty Hunter From Scratch
  • How to Make Money on Fansly
  • Pros and Cons of Using Multiple Clouds
  • Kali Linux Commands Cheat Sheet
  • How To Install A VPN In Kali Linux
Search
Menu
  • Home
  • Cyber Security
    • Cyber Safety
  • Technology
    • Development
    • Interested Articles
    • These Android Apps Caught Stealing Users Facebook Passwords
    • Who are Indian Cyber Troops
    • Cyclone Tracker
  • Hinduism
  • Contact Us
  • News
    • Internal Investigation
    • Current Affairs
    • Health And Lifestyles
    • VPN Ban in India: Parliamentary Committee wants to ban VPN services in the Country
    • Who are Indian Cyber Troops
  • Squad Slection
    • Power Squad Selection
    • Shakti Squad Selection
    • Volunteer Squad Selection
  • About Us
  • Cyber Consultancy And Help Portal
  • Volunteer Squad Selection
  • Verification
  • Responsible Disclosure Policy
Copyright © Indian Cyber Troops 2022 Theme: Insights by Themeinwp
×