Have you ever given any thought as to how your Android Application works? Requirements: java in your system apktool dex2jar jd-gui Download all from here. Step 1:-Change extension of apk to zip Step 2:-Open that zip and copy classes.dex in dex2jar folder-Open CMD in dex2jar folder type command “dex2jar classes.dex” without dual quote-It will convert […]
[vc_row][vc_column][vc_column_text] OSINT – Open-source intelligence is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources. – Wikipedia You guys can find a alot of osint tools at https://osintframework.com/ […]
“Absence of evidence is not evidence of absence- Carl Sagan” With the growing years, unimagined advances in technology has taken place and with growing technology fraudsters are finding new ways to commit crime with new techniques of avoiding detection. With the increasing cyber-criminal activities across the globe, digital forensics and digital evidence has become the […]
Aarogya Setu is a mobile application which is developed by the Government of India (GOI) and is intended to connect COVID-19 health services with the people of India(2). The application is build-up to inform the people about their potential risks of the infection and for contact tracing to identify the source of the infection and […]
Dark web …whoa pretty mysterious name huh ? Before I start answering the above question have you ever thought …why do we need dark web in the first place ? what even is dark web ? do the surface browsers we commonly use like Google Chrome , Firefox do not provide with all the information […]
Using OXT to track bitcoin transactions It’s a very common misconception that bitcoin is the perfect tool for criminals because bitcoin is an anonymous currency that they can use to do their nefarious deeds without getting caught. Very few people know that bitcoin is the most open currency in the world. All transactions are written […]
What is the Dark Net? The “dark net,” also known as the “dark web,” is part of the greater “deep web,” a network of secret websites that exist on an encrypted network. Dark net websites are separated out from the surface net through encryption. Most dark net websites use the Tor encryption tool to help […]
Human beings are very privileged organisms. The process of evolution over millions of years has brought us to a stage, where it’s safe to say that we are the most intelligent life form to have ever existed on this planet. Our quest for knowledge has led us to the understanding of various things in our […]
Cyber Crime Cyber crime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cyber crime may threaten a person or a nation’s security and financial health. According to ‘Information Technology Act 2000’ which […]
India is on its way to digital civilization. When the moto of upgrading India into Digital India turns to be the prime focus, Cyber Security becomes an integral part of Nation Security. In this world of machines people are more connected to each other through networks and webs than socially and do communicate through data […]
At Hackershala, we provide the best cyber security training to empower your business enterprise’s digital infrastructure. We bring with us, years of experience of working with various Governmental and private organizations on sensitive information.
Something isn’t Clear?
Feel free to contact us, and we will be more than happy to answer all of your questions.