Home > First in the world
Cyber Security Ethical Hacker-Q & A - gkaim

Certified Ethical Hacker Examination-Questions & Answers- #7

All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 7th part Click here to Read Part-6 1- What tool should you use when you need to analyze extracted metadata from files you collected when you were in the initial stage of penetration test (information gathering)? A. Armitage (GUI that visualizes targets and recommends exploits) B. Dimitry (Deepmagic Information Gathering Tool) C.

Read More
Remote Phishing Tool - Vikas Chaudhary

Remote Phishing Tool (RPT) 45 Website Pages – Vikas chaudhary

Hello Reader , Myself Vikas Chaudhary , I have coded This RPT tool which means Remote Phishing Tool. Remote Phishing tool (RPT) is coded in Bash script which mostly used in Linux (Kali,parrot...etc). By using this Tool you can get full credential of your Target just by send a link generated by RPT.. Using interface is very simple , you have to just choose the number according to your Target

Read More
New_Vega- Vikas Chaudhary Tool

New-Vega- Website Scanning Tool Created by Vikas Chaudhary

Hello Reader , Myself Vikas Chaudhary , I have coded This New-Vega tool which finally Leads to Website Vulnerability Scanning . New-Vega is coded in Bash script which mostly used in Linux (Kali,parrot...etc). By using this Tool you scan your website, blog and can find vulnerability easily . Using interface is very simple , you have to just run the tool and chose the correct option according to

Read More
gkaim.com

Aptitude Questions and Answers # 2

1- The average between a two digit number and the number obtained by interchanging the digits is 9. What is the difference between the two digits of the number? 1. 8 2. 2 3. 5 4. Cannot be determined #one{ width: 70%; padding: 25px 0; text-align: center; background-color: lightgreen; margin-top: 10px; display:none; } VIEW

Read More