Skip to content
Latest:
  • How to do SMS and Call bombing on scammers?
  • Kali-whoami – Stay Anonymous while hacking
  • How do hackers get your exact location?
  • Understanding Cyber Kill Chain Methodology | Episode #3 |
  • Understanding the CIA triad |Episode #2|
Invent Your Shit

Invent Your Shit

The Home of Creators

  • Home
  • tech news
  • Explained
    • Electronics 101
  • DIY Projects
  • Programming
    • Python
    • Python Projects
  • Cybersecurity
    • Pentesting
    • Android hacking
    • CTF
    • Web Server Hacking
    • Opsec
    • Social Engineering
  • Gaming
  • how to
  • Ques & Ans
  • About us
  • Contact Us
  • Privacy Policy

Author: admin

How to do SMS and Call bombing on scammers
Cybersecurity Social Engineering 

How to do SMS and Call bombing on scammers?

23 November 202123 November 2021 admin 0 Comments how to do Call bombing, How to do SMS bombing, Kali Linux tutorial, SMS & Call bombing, SMS bombing on Kali Linux, social engineering, Tbomb, Tbomb Sctipt

Have you ever encountered those scam calls, where they try to rip you by those shady lottery win announcements? Well,

Read more
Kali-whoami - Stay anonymous while hacking
Cybersecurity Opsec 

Kali-whoami – Stay Anonymous while hacking

21 November 202121 November 2021 admin 0 Comments hacking, how to be anonymous, how to become anonymous while hacking, IP changing, kali linux, kali-whoami, operational security, opsec, tor

Hello and Welcome back, my aspiring hackers. How are you? Today, we will be learning, how we can be anonymous

Read more
How do hackers get your exact location ?
Android hacking Cybersecurity 

How do hackers get your exact location?

19 November 202119 November 2021 admin 0 Comments android hacking, cybersecurity, hacking, how to hack someone location, how to track a smartphone, how to track someone location, location access, location hacking, pen-testing, seeker Github, seeker.py

Hello and welcome back my aspiring hackers, Well, we are back with another hacking tutorial. Today, we will see how

Read more
Cyber Kill Chain
Cybersecurity Pentesting 

Understanding Cyber Kill Chain Methodology | Episode #3 |

7 May 20217 May 2021 admin 0 Comments cyber kill chain, cyber kill chain methodology, cybersecurity, hacking, kill chain, pen-testing

Hello and Welcome back, my aspiring hackers to our Pentesting series, where we learn pentesting and infosec from scratch. In

Read more
The CIA Triad
Cybersecurity Pentesting 

Understanding the CIA triad |Episode #2|

19 April 202119 April 2021 admin 0 Comments cia triad, cia triad in information security, hacking, info sec, pentesing, understanding the CIA triad

Hello and Welcome back, my aspiring hackers to our Pentesting series, where we learn pentesting and infosec from scratch. In

Read more
hacking android pin
Android hacking Cybersecurity 

Hacking Android pin password using Lockphish

19 November 202014 November 2021 admin 0 Comments android hacking, cybersec, cybersecurity, hacking, hacking android pin password, how to bypass android pin password, how to hack android pin password, lockphish, lockphish tool, pentesting

Hello and Welcome my aspiring hackers, How are you? Well, I know, there hasn’t been a lot of hacking tutorials

Read more
pythiofy music player
DIY Projects Programming Python Projects 

I created a Music Player in Python – “Pythiofy”

18 November 202014 November 2021 admin 0 Comments creating a music player in python, Music player in python, playsound, Pythiofy music player, python playsound, Python programming, python projects, python projects for beginners, python3

Music has been there for centuries, We have seen the advancement of music distribution and listening from cassettes, tapes, Radio

Read more
the guess game in python
DIY Projects Programming Python Projects 

Making The Guess Game in Python

17 November 202014 November 2021 admin 0 Comments guess game in python, making a game in python, making a guess game in python, python for beginners, Python programming, python projects, python projects for beginners

What up? My Programming Geeks. So, we have recently completed our Python Course for beginners, in which we have taught

Read more
virtual environments in python
Programming Python 

Virtual Environment in Python and more |Episode #16|

16 November 202014 November 2021 admin 0 Comments coding, filter and reduce in python, join method in python, lambda function in python, map, programming, python course, python for beginners, Python programming, python3, virtual environment in python

Hello and Welcome to Python Tutorial for Beginners, where we teach you python from scratch. We have come a long

Read more
exception handling in python
Programming Python 

Exception Handling in Python |Episode #15|

15 November 202014 November 2021 admin 0 Comments coding, Enumerate function in python, exception handling in python, finally clause, global keyword in python, if __name == 'main', list comprehensions in python, python course, python for beginners, Python programming, python3, try and exception

Hello and Welcome to Python programming for beginners, where we teach you python from scratch. Till now, we have seen,

Read more
  • ← Previous

Recent Posts

  • How to do SMS and Call bombing on scammers?
  • Kali-whoami – Stay Anonymous while hacking
  • How do hackers get your exact location?
  • Understanding Cyber Kill Chain Methodology | Episode #3 |
  • Understanding the CIA triad |Episode #2|

Recent Comments

    Archives

    • November 2021
    • May 2021
    • April 2021
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • August 2019
    • July 2019
    • June 2019

    Categories

    • Android hacking
    • CTF
    • Cybersecurity
    • DIY Projects
    • Electronics 101
    • Explained
    • Gaming
    • Health & Lifestyle
    • how to
    • Opinion-Box
    • Opsec
    • Pentesting
    • Programming
    • Python
    • Python Projects
    • Ques & Ans
    • Social Engineering
    • success story
    • tech news
    • Uncategorised
    • Web Server Hacking

    Invent Your Shit is a place specially designed for creators, artists, innovators, and inventors. A place where knowledge is open source and learning is the goal. With the help of many enthusiastic authors and teachers. We as a community welcomes you.

    Recent Posts

    • How to do SMS and Call bombing on scammers? 23 November 2021
    • Kali-whoami – Stay Anonymous while hacking 21 November 2021
    • How do hackers get your exact location? 19 November 2021
    • Understanding Cyber Kill Chain Methodology | Episode #3 | 7 May 2021
    • Understanding the CIA triad |Episode #2| 19 April 2021

    Categories

    • Android hacking
    • CTF
    • Cybersecurity
    • DIY Projects
    • Electronics 101
    • Explained
    • Gaming
    • Health & Lifestyle
    • how to
    • Opinion-Box
    • Opsec
    • Pentesting
    • Programming
    • Python
    • Python Projects
    • Ques & Ans
    • Social Engineering
    • success story
    • tech news
    • Uncategorised
    • Web Server Hacking
    Copyright © 2022 Invent Your Shit. All rights reserved.
    Theme: ColorMag by ThemeGrill. Powered by WordPress.