Skip to content
AmazingTricks

AmazingTricks

  • Home
  • Request for a Trick
  • About
  • Become an Author
  • Categories
    • Tips & Tricks
    • Freebies
    • Hacking Tricks
    • Ethical Hacking
    • Premium Tricks
    • Social Media
    • Recovery
    • Bug Bounty
    • E-Books
  • Contact Us
  • Subscribe!

Ethical Hacking

Excitement of Phishing Attacks

August 11, 2021 by Lokesh Dachepalli

Phishing is an attack where the attacker sends you the link or url to the user and make the user …

Read moreExcitement of Phishing Attacks

BSidesBOS CTF Writeup’s

March 8, 2021September 30, 2020 by Lokesh Dachepalli
12 Free Math Resources For Data Science

Category: Warmups Challenge name: Read The Rules Please follow the rules for this CTF! Connect here: https://bsidesbos.ctf.games/rules Solution: Open the …

Read moreBSidesBOS CTF Writeup’s

All About Proxy Chaining

March 8, 2021August 21, 2020 by Lokesh Dachepalli

What is proxy? A proxy lets you go online under a different IP address identity. Proxy empowers people with a digital identity that …

Read moreAll About Proxy Chaining

How to solve RSA Crypto Challenges in CTF’S..!

March 8, 2021August 20, 2020 by Lokesh Dachepalli
How to solve RSA Crypto Challenges in CTF’S..!

What are CTF Contests..? Capture The Flag (CTF) contest is a special kind of cybersecurity competition designed to challenge its participants to solve computer …

Read moreHow to solve RSA Crypto Challenges in CTF’S..!

How to DDOS an IP using HOIC

March 8, 2021July 9, 2020 by Lokesh Dachepalli
DDOS

Disclaimer : This post is only for the educational purpose. All data and information provided on amazingtricks.in blog are  for …

Read moreHow to DDOS an IP using HOIC

Sniffing Social Account Credentials using Social Engineering Toolkit (SET)

March 8, 2021July 4, 2020 by Lokesh Dachepalli

Sniffing Social Account Credentials using Social Engineering Toolkit (SET): The Social Engineering Toolkit (SET) is an open-source Python-driven tool designed …

Read moreSniffing Social Account Credentials using Social Engineering Toolkit (SET)

No Rate Limit -Bug Hunting

March 8, 2021July 3, 2020 by Satyadev Kalakonda

Summary: No Rate Limit – Bug Hunting: In computer networks, rate limiting is used to control the rate of traffic …

Read moreNo Rate Limit -Bug Hunting

Bypassing kali linux password

March 8, 2021July 1, 2020 by Lokesh Dachepalli

Bypassing kali Linux password: Have you forgotten your kali Linux password ..? No worries we are here to help you..! …

Read moreBypassing kali linux password

Bypassing Windows 10 Passwords

March 8, 2021June 30, 2020 by Lokesh Dachepalli

how to bypass computer password windows 10 – Method 1 : Manual bypassing Here I am performing the bypassing windows …

Read moreBypassing Windows 10 Passwords

How to crack passwords of Linux users!

March 8, 2021June 29, 2020 by Lokesh Dachepalli

How to crack passwords of Linux users!: In Linux, the passwords of the users will be encrypted with an algorithm …

Read moreHow to crack passwords of Linux users!