-->

Welcome to Hacking Truth

When You Think About Hacking Definately Hackers Will Think About You - Kumar Atul Jaiswal.

About Us

WE ARE CREATIVE

We are creative we do things a bit differently, and that's the way we like it! .

Hacking is about ingenuity in any walk of life. ... “Creative solution” or “being entrepreneurial” have replaced hacking in the vocabulary of most because of the distancing people want to make from the computer hackers. We don't want to be tainted by the malicious intent that the word hacker has become associated with. A few thoughts on brain hacks for driving creative thinking forward..

Services

What We Do?

Ethical Hacker

In computer networking, Hacking is any technical effort to manipulate behaviour of network Hacking is historically referred to constructive, clever technical work that was not necessarilyrelated to computer systems.

Web App Penetration Testing

A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities.

Bug Bounty

Achieve Continuous, Results-Driven, Hacker-Powered Security Testing at Scale. Run a private or public Bug Bounty Program, fully managed by Hacking Truth experts or own security team.

CLEAN CODE

The result is a knowledge base that describes the way we think when we write, read and clean code. Readers will come away from this book understanding. • How to write good code and how to transform bad code into good code.

PROGRESS AND ACCORDIANS

Stop learning then stop winning, so I try to take myself to a new level every single day and I must learn something new every single day so that I can update myself well.

24/7 Support

24/7 Customer Support By Our team, Our team will contribute in every way to help you. contact on email phone number or every where.

1254

HAPPY CLIENTS

1424

COMPLETE PROJECT

2136

CUP OF COFFIE

15

AWARDS

TEAM

MEET OUR AWESOME TEAM

We are a team, this is your point of view , but we are not just a team, we are puzzles, if one of the people has left this team, then unfortunately we will not be a team because the puzzle never becomes from one single..

Ethical Hacking95%
Web Pentesting 85%
Bug Bounty 75%
Illustrator 60%
image
Kumar Atul jaiswal
Ethical Hacker
image
HackerBoY
Web Penetester
image
Kumar Atul Jaiswal
Ethical Hacker
image
HackerBoY
Web Penetester
Ethical Hacking Course

Choose the perfect Course

Cryptography Video Course

One-Time-purchase
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon

Footprinting N Reconnaissance

One-Time-purchase
  • Unique Content
  • Valuable Price
  • Beginer To Advance
  • Therotical content
  • Practical Videos
  • Full Support

Hacking In Termux

One-Time-Purchase
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
img

Kumar Atul Jaiswal

Founder, Hacking Truth

Hi, my self kumar atul jaiswal. I am self taught White Hat Hacker, Programmer, Web Developer, Web Penetester by profession but I am a YouTuber by passion and a Computer science student from India. Nice to meet You.

img

HackerBoY

CEO, Hacking Truth

Hi, my self kumar atul jaiswal. I am self taught White Hat Hacker, Programmer, Web Developer, Web Penetester by profession but I am a YouTuber by passion and a Computer science student from India. Nice to meet You.

img

Kumar Atul Jaiswal

Founder, Hacking Truth

Hi, my self kumar atul jaiswal. I am self taught White Hat Hacker, Programmer, Web Developer, Web Penetester by profession but I am a YouTuber by passion and a Computer science student from India. Nice to meet You.

Blog

LATEST FORM Blog

Bash Scripting with Delete a file

Bash Scripting with make directory



Bash Scripting

 
In Linux, all tasks from execution of services to loading and unloading of modules are carried out by programs and all programs need to be executed. You use the commands to access all the basic features of kernel. Shell scripting is a way to automate such tasks, and bash is one of the language, that has capabilities enough to be called as scripting as well as a language that can be used for programming on the POSIX platform, for small tasks.  Bash Scripting

 

Delete a File:

‘rm’ command is used in bash to remove any file. Create a file named ‘del.sh’ with the following code to take the filename from the user and remove. Here, ‘-i’ option is used to get permission from the user before removing the file. Bash Scripting with Delete a file




#!/bin/bash
echo "Enter filename to remove"
read fn
rm -i $fn




Run the file with bash command.
 



Bash Scripting with Add Numbers via Expr and let cmd

 

 



I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)

 

Disclaimer


This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!

All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



  - Hacking Truth by Kumar Atul Jaiswal


Bash Scripting with read file line by line

Bash Scripting with make directory



Bash Scripting

 
In Linux, all tasks from execution of services to loading and unloading of modules are carried out by programs and all programs need to be executed. You use the commands to access all the basic features of kernel. Shell scripting is a way to automate such tasks, and bash is one of the language, that has capabilities enough to be called as scripting as well as a language that can be used for programming on the POSIX platform, for small tasks.  Bash Scripting with read file line by line

 

Read a File:

You can read any file line by line in bash by using loop. Create a file named, ‘readfile1.sh’ and add the following code to read an existing file named, ‘bookbash.txt’. Bash Scripting with Make directory




#!/bin/bash
file='bookbash.txt'
while read line; do
echo $line
done < $file




Run the file with bash command.
 



Bash Scripting with Add Numbers via Expr and let cmd

 

 

Example -2: Reading file content from command line:

Suppose, you want to read the file, company.txt, line by line from the command line without ‘cat’ command. Run the following command to do the task. while loop will read each line from the file bookbash2.txt in each step and store the content of the line in $line variable which will be printed later.



while read line; do echo $line; done < bookbash2.txt"
fi




Run the file with bash command.
 



Bash Scripting

 



 

Example -3: Reading file content using script:

Create a bash file and add the following code to read the content of a particular file. Here, an existing filename is stored in $filename variable and $n variable is used to keep the value of the line number of that file. Like previous example, while loop is used to read this file with line number.



#!/bin/bash
filename='bookbash2.txt'
n=2 do
while read line; do
# reading each line
echo "Line No. $n : $line"
n=$((n+1))
done < $filename




Run the file with bash command.
 



Bash Scripting

 





 

Example -4: Passing filename from the command line and reading the file:

Create a bash file and add the following script. This script will take the filename from the command line argument. First argument value is read by the variable $1 which will contain the filename for reading. If the file exists in the current location then while loop will read the file line by line like previous example and print the file content.



#!/bin/bash
filename=$1
while read line; do
# reading each line
echo $line
done < $filename




Run the file with bash command.
 



Bash Scripting

 



I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)

 

Disclaimer


This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!

All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



  - Hacking Truth by Kumar Atul Jaiswal


Bash Scripting with Make directory

Bash Scripting with make directory



Bash Scripting

 
In Linux, all tasks from execution of services to loading and unloading of modules are carried out by programs and all programs need to be executed. You use the commands to access all the basic features of kernel. Shell scripting is a way to automate such tasks, and bash is one of the language, that has capabilities enough to be called as scripting as well as a language that can be used for programming on the POSIX platform, for small tasks.  Bash Scripting else if statement

 

Make Directory:

Bash uses ‘mkdir’ command to create a new directory. Create a file named ‘directory1.sh’ and add the following code to take a new directory name from the user. If the directory name is not exist in the current location then it will create the directory, otherwise the program will display error. Bash Scripting with Make directory




#!/bin/bash
echo "Enter directory name"
{
read newdir
}
`mkdir $newdir`




Run the file with bash command.
 



Bash Scripting with Add Numbers via Expr and let cmd

 

 

Make directory by checking existence:

If you want to check the existence of directory in the current location before executing the ‘mkdir’ command then you can use the following code. ‘-d’ option is used to test a particular directory is exist or not. Create a file named, ‘directory2.sh’ and add the following code to create a directory by checking existence.



#!/bin/bash
echo "Enter directory name"
read ndir
if [ -d "$ndir" ]
then
echo "Directory exist"

else
`mkdir $ndir`
echo "Directory created"
fi




Run the file with bash command.
 



Bash Scripting

 



I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)

 

Disclaimer


This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!

All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



  - Hacking Truth by Kumar Atul Jaiswal


Bash Scripting with Create a Function

Bash Scripting with Add Numbers via Expr and let cmd



Bash Scripting

 
In Linux, all tasks from execution of services to loading and unloading of modules are carried out by programs and all programs need to be executed. You use the commands to access all the basic features of kernel. Shell scripting is a way to automate such tasks, and bash is one of the language, that has capabilities enough to be called as scripting as well as a language that can be used for programming on the POSIX platform, for small tasks.  Bash Scripting else if statement

 

Create Function:

How you can create a simple function and call the function is shown in the following script. Create a file named ‘function1.sh’ and add the following code. You can call any function by name only without using any bracket in bash script. Bash Scripting with Create a Function




#!/bin/bash
function F1()
{
echo 'I like bash programming'
}
F1




Run the file with bash command.
 



Bash Scripting with Add Numbers via Expr and let cmd

 

 

Create function with Parameters:

Bash can’t declare function parameter or arguments at the time of function declaration. But you can use parameters in function by using other variable. If two values are passed at the time of function calling then $1 and $2 variable are used for reading the values. Create a file named ‘function2.sh’ and add the following code. Here, the function, ‘Rectangle_Area’ will calculate the area of a rectangle based on the parameter values.



#!/bin/bash
Rectangle_Area() {
area=$(($1 * $2))
echo "Area is : $area"
}
Rectangle_Area 10 20




Run the file with bash command.
 



Bash Scripting with Add Numbers via Expr and let cmd

 

 


 

Pass Return Value from Function:

Bash function can pass both numeric and string values. How you can pass a string value from the function is shown in the following example. Create a file named, ‘function3.sh’ and add the following code. The function, greeting() returns a string value into the variable, val which prints later by combining with other string.



#!/bin/bash
function greeting() {
str="Hello, $name"
echo $str
}
echo "Enter your name"
read name
val=$(greeting)
echo "Return value of the function is $val"





Run the file with bash command.
 



Bash Scripting with Add Numbers via Expr and let cmd

 


I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)

 

Disclaimer


This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!

All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



  - Hacking Truth by Kumar Atul Jaiswal


Python E Books Download

 


 

Free PDF E-Books of Python

 

This is a collection of the most useful free ebooks to learn Python programming for both beginner and advanced users.

Python is an amazing language with a strong and friendly community of programmers.



However, there is a lack of documentation on what to learn after getting the basics of Python down your throat.

Hopefully, you’ll find this curation useful and use it as a reference that you can come back whenever you’re learning to program with Python. Python E Books Download

 

 

1) Black Hat Python: Python Programming for Hackers and Pentesters

Justin Seitz is a senior security researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python. He is the author of Gray Hat Python, the first book to cover Python for security analysis.

 


 

Black Hat Python is a clear winner in the field of books for security professionals. Written for people who want to move into the hacking and penetration testing fields and fully understand what they're doing, this book will challenge readers to quickly come up to speed not just on how hackers work, but how to build their own tools. It contains plenty of examples that show exactly what one needs to do with code that builds on itself as you grow in skill, plus plenty of introductory material. Most chapters also include a "Kicking the Tires" section on putting the new tools to use. If you read this book cover-to-cover, you won't come to the end of it without a deep understanding of how your systems work, why hacking is possible, and how you can build your own hacking and security testing tools with Python and add-on tools.

Just imagine yourself using Python for ...























  •     doing network analysis
  •     writing your own sniffer
  •     manipulating packets
  •     infecting virtual machines
  •     going against application-layer targets
  •     writing stealthy trojans
  •     extending the popular Burp (security testing of web applications) Suite
  •     detecting sandboxing and automating keylogging screenshotting
  •     stealing email credentials and password hashes
  •     injecting shellcode into a virtual machines
  •     escalating your privileges on a Windows system
  •     performing ARP poisoning
  •     exfiltrating data





The book contains enough explanatory material and comments within the code that you will gain tremendous insight into what you can do with everything you will learn and some solid Python scripting know-how. I am definitely surprised at the level of expertise that has been provided in this book's less than 200 pages. Even if you get to the end without building tools of your own, you'll at least understand how others do that. And, if you work hard at following along, you're bound to find that your skills and insight have improved dramatically.

 













While this is an amazing book with extremely valuable insights, I would not suggest it for anyone who has never programmed/scripted before. It's also not one of those books that you can pick up and read a few pages when you want to find an answer to a troubling issue. Instead, it will take some amount of determined attention. To get the full benefit, you should jump in, set up your Kali Linux system as the book suggests, and follow the examples step by step. Even if you've been working in the information security field for years, you are likely to find that the experience will leave you with a deeper understanding than you ever imagined possible.



 

















 

2) Cracking Codes wit Python

If you'd like to receive a free print copy of Cracking Codes with Python, please fill out the form at https://goo.gl/forms/vylfjeQLRdioOQ3C2. Please specify you want "Cracking Codes with Python". You'll receive a free ebook to read, and upon posting a review to Amazon, you will receive a complementary print review copy of the book. (UPDATE: There's been a large amount of interest, and I can't guarantee you'll get a print book. However, I can definitely send you an ebook to review.)

 


 

 Introduction

    

    

  •     Chapter 1 - Making Paper Cryptography Tools
  •     Chapter 2 -Programming in the Interactive Shell
  •     Chapter 3 - Strings and Writing Programs
  •     Chapter 4 - The Reverse Cipher
  •     Chapter 5 - The Caesar Cipher
  •     Chapter 6 - Hacking the Caesar Cipher with Brute-Force
  •     Chapter 7 - Encrypting with the Transposition Cipher
  •     Chapter 8 - Decrypting with the Transposition Cipher
  •     Chapter 9 - Programming a Program to Test Your Program
  •     Chapter 10 - Encrypting and Decrypting Files
  •     Chapter 11 - Detecting English Programmatically
  •     Chapter 12 - Hacking the Transposition Cipher
  •     Chapter 13 - A Modular Arithmetic Module for the Affine Cipher
  •     Chapter 14 - Programming the Affine Cipher
  •     Chapter 15 - Hacking the Affine Cipher
  •     Chapter 16 - Programming the Simple Substitution Cipher
  •     Chapter 17 - Hacking the Simple Substitution Cipher
  •     Chapter 18 - Programming the Vigenere Cipher
  •     Chapter 19 - Frequency Analysis
  •     Chapter 20 - Hacking the Vigenere Cipher
  •     Chapter 21 - The One-Time Pad Cipher
  •     Chapter 22 - Finding and Generating Prime Numbers
  •     Chapter 23 - Generating Keys for the Public Key Cipher
  •     Chapter 24 - Programming the Public Key Cipher


 

 


 

3)  Python Crash Course

Python Crash Course is the world’s best-selling guide to the Python programming language. This fast-paced, thorough introduction to programming with Python will have you writing programs, solving problems, and making things that work in no time.

In the first half of the book, you’ll learn basic programming concepts, such as variables, lists, classes, and loops, and practice writing clean code with exercises for each topic. You’ll also learn how to make your programs interactive and test your code safely before adding it to a project. In the second half, you’ll put your new knowledge into practice with three substantial projects: a Space Invaders–inspired arcade game, a set of data visualizations with Python’s handy libraries, and a simple web app you can deploy online.













 

 




As you work through the book, you’ll learn how to:


  • Use powerful Python libraries and tools, including Pygame, Matplotlib, Plotly, and Django
  •  
  • Make 2D games that respond to keypresses and mouse clicks, and that increasehttps://drive.google.com/uc?export=download&id=1GqX7cAi3Cimwl08lox5O70GKwDu_jPaY/view?usp=sharing in difficulty
     
  • Use data to generate interactive visualizations
     
  • Create and customize web apps and deploy them safely online
     
  • Deal with mistakes and errors so you can solve your own programming problems


This updated second edition has been thoroughly revised to reflect the latest in Python code and practices. The first half of the book includes improved coverage of topics like f-strings, constants, and managing data. In the second half, the code for the projects has been updated with better structure, cleaner syntax, and more popular and up-to-date libraries and tools, like Plotly and the latest version of Django. 









I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)

 

 

 

Bash Scripting with Add Numbers via Expr and let cmd

Bash Scripting with Add Numbers via Expr and let cmd



Bash Scripting

 
In Linux, all tasks from execution of services to loading and unloading of modules are carried out by programs and all programs need to be executed. You use the commands to access all the basic features of kernel. Shell scripting is a way to automate such tasks, and bash is one of the language, that has capabilities enough to be called as scripting as well as a language that can be used for programming on the POSIX platform, for small tasks.  Bash Scripting else if statement

 

Add Two Numbers

You can do the arithmetical operations in bash in different ways. How you can add two integer numbers in bash using double brackets is shown in the following script. Create a file named ‘add_two_numbers.sh’ with the following code. Two integer values will be taken from the user and printed the result of addition. Bash Scripting with Add Two Numbers via variables



#!/bin/bash
echo "Enter first number"
read x
echo "Enter second number"
read y
(( sum=x+y ))
echo "The result of addition=$sum"




Run the file with bash command.
 



Bash Scripting with Add Numbers via Expr and let cmd

 

 

Example – 1: Using ‘expr’ command

The oldest command for doing arithmetic operations in bash is ‘expr’. This command can work with integer values only and prints the output directly in the terminal. You have to use space with each operand when you want to use ‘expr’ command to do any mathematical operations. Create a bash file and add the various ‘expr’ commands to check how the ‘expr’ command works. Bash Scripting with Add Numbers via Expr and let cmd



#!/bin/bash
# Works as string
expr '10 + 30'
# Works as string
expr 10+30
#Perform the addition
expr 10 + 30
#Find out the remainder value
expr 30 % 9
#Using expr with backtick
myVal1=`expr 30 / 10`
echo $myVal1
#Using expr within command substitute
myVal2=$( expr 30 - 10 )
echo $myVal2




Run the file arithmetic.sh
 



Bash Scripting with Add Numbers via Expr and let cmd

 

 

Explain

The output shows that arithmetic operators worked only when space is used with each numeric value and no single quotation is used with expr command. You can also assign the output of expr command into a variable and print the variable later by using backtick or command substitute. 30/10 is calculated by using backtick and 30-10 is calculated by using command substitute.



 

Example – 2: Using ‘let’ command

‘let’ is another built-in command to do arithmetic operations in bash. ‘let’ command can’t print the output to the terminal without storing the value in a variable. But ‘let’ command can be used to remove the other limitations of the ‘expr’ command. Create a bash file and add the following code for seeing how the ‘let’ command works.



#!/bin/bash
# Multiplying 9 by 8
let val1=9*3
echo $val1
# Dividing 8 by 3y
let "val2 = 8 / 3"
echo $val2
# Subtracting 3 from 9
let val3=9-3
echo $val3
# Applying increment
let val4=7
let val4++
echo $val4
# Using argument value in arithmetic operation
let "val5=50+$1"
echo $val5




Run the file arithmetic2.sh
 



Bash Scripting with Add Numbers via Expr and let cmd

 

Explain

The output shows that arithmetic operators worked only when space is used with each numeric value and no single quotation is used with expr command. You can also assign the output of expr command into a variable and print the variable later by using backtick or command substitute. 30/10 is calculated by using backtick and 30-10 is calculated by using command substitute.



I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)

 

Disclaimer


This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!

All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



  - Hacking Truth by Kumar Atul Jaiswal

Contact

Send Us A Email

Search This Blog

Address

Contact Info

The page name itself is a call-to-action; Treat it with some respect.!

Address:

15, Ranchi, India, 834002

Phone:

404

Email:

kumaratuljaiswal222@gmail.com

atulthehacker222@gmail.com