HacksLand
4,050 FOLLOWERS
Dedicated to specific subjects of interest such as Programming, How To Guides, Networking, Exploit development, Cryptography, Web application hacking, Computer Science, Linux, and Reverse Engineering. Authored by Thilan Dissanayaka, An undergraduate Engineering student of the University of Ruhuna, Sri Lanka.
HacksLand
3y ago
The stack is an important concept in computer science. If you are planning to learn reverse engineering, malware analyzing, exploitation, etc this concept is a must to learn. After learning about the ..read more
HacksLand
3y ago
1) Creating an empty file. We can use touch command for make a new file in Linux. Syntax is following. touch [new file name] 2) Deleting a file When deleting a file we use the command rm. rm ..read more
HacksLand
3y ago
In this document, we're going to talk about an important topic in networking. It's internet protocol. Internet and every other network are built on some rules. We call them network protocols. When ..read more
HacksLand
4y ago
In this document, we're going to talk about an important topic in networking. It's internet protocol. Internet and every other network are built on some rules. We call them network protocols. When ..read more
HacksLand
4y ago
So you want to learn Reverse engineering. That's great. RE is used in various topics such as malware analysis, exploit development, software cracking, etc. In this document, we are going to take a ..read more
HacksLand
4y ago
So you want to learn Reverse engineering. That's great. RE is used in various topics such as malware analysis, exploit development, software cracking, etc. In this document, we are going to take a ..read more
HacksLand
4y ago
When it comes to search engine optimization, URL structure plays an important role. If the URL structure of your website is easy to understand and it is readable then you have a good chance of ..read more
HacksLand
4y ago
Remote File Inclusion or RFI is a vulnerability occurs in web applications. We use a Linux distribution called "Web for pen testers". You can download it from hear. Now boot the virtual mashing ..read more
HacksLand
4y ago
Hello there, In this tutorial we are going to learn Linux exploit development. We use protostar Linux mashing for this purpose. Protostar was developed by exploit-exercises.com. Unfortunately, The ..read more
HacksLand
5y ago
Getting user inputs is an essential part of a program. In python we have several ways to get inputs like direct keyboard , arguments, environment variables etc. In this document I'll explain about ..read more