shashi bhushan mettu

Monday, April 20, 2020

Hackable - Secret Hacker | Vulnerable Web Application Server

Related news
  • Hacking Tools Online
  • Hack Rom Tools
  • Hacking Apps
  • Computer Hacker
  • Hack Tools Download
  • Hacking Tools Kit
  • Hacker Tools Windows
  • Pentest Tools
  • Hack Tools For Ubuntu
  • Hack Tools For Games
  • How To Hack
  • Hacker Tools Hardware
  • Hack Website Online Tool
  • Hacking Tools For Windows Free Download
  • Hacking Tools For Windows 7
Posted by shashi bhushan mettu at 4:27 PM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

CALL ME AT

About Me

shashi bhushan mettu
Atlanta, Georgia, United States
About me ? i am Shashi Bhushan Mettu, wish to be called Shashi and i hail from ntpc,karimnagar(dist0 of Andhra Pradesh, im 30 years old and working as SAP Consultant in Atlanta,GA. I am married and living with my wife Pavitra and son Abhay Nihal Bharadwaj. I have done my schooling in different schools in different towns.L.K.G to 5th class at sacred heart School,Godavarikhani, 6th class till 8th at St Claire convent school(im from 2nd batch of this school),9th in Vijayawada, 10th in Guntur and Intermediate( +2) in Hyderabad from Triveni Residential College and Finally graduated from S.R.R Govt College, karimanagar durinng 93-96, i could not hardly belive that its more than 10 years i have graduated and could really experience by phrase "Time flys....". Career... I have started as System administrator in 1997 and worked till 2000 with Future Focus Infotech,Chennai and then went to England, South Africa....Started working as Basis Consultant with SAP INDIA,Bangalore from 2004 till 2005, moved to USA in march 2005 and from that time have been travelling to different states and now in Atlanta, Working with COKE.
View my complete profile

Blog Archive

  • ►  2025 (43)
    • ►  May (1)
    • ►  April (2)
    • ►  March (6)
    • ►  February (6)
    • ►  January (28)
  • ►  2024 (53)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  May (3)
    • ►  April (1)
    • ►  February (4)
    • ►  January (39)
  • ►  2023 (57)
    • ►  November (1)
    • ►  October (2)
    • ►  August (7)
    • ►  July (4)
    • ►  June (18)
    • ►  May (25)
  • ►  2022 (1)
    • ►  August (1)
  • ▼  2020 (363)
    • ►  September (5)
    • ►  August (97)
    • ►  July (101)
    • ►  June (32)
    • ►  May (50)
    • ▼  April (55)
      • Setting Up A Burp Development Environment
      • OSIF: An Open Source Facebook Information Gatherin...
      • How To Hack Facebook By Social Engineering Attack
      • Amnesia / Radiation Linux Botnet Targeting Remote ...
      • Blockchain Exploitation Labs - Part 1 Smart Contra...
      • Hacking All The Cars - Part 2
      • IoT-Implant-Toolkit: A Framework For Implantation ...
      • ShellForge
      • Networking | Routing And Switching | Tutorial 4 | ...
      • goGetBucket - A Penetration Testing Tool To Enumer...
      • Bypass Hardware Firewalls
      • WHY WE DO HACKING?
      • How To Connect Database With PHP | Cool Interface ...
      • Bit Banging Your Database
      • WPSeku V0.4 - Wordpress Security Scanner
      • Change Passwords Regularly - A Myth And A Lie, Don...
      • Advanced Penetration Testing • Hacking The World'S...
      • iCloudBrutter - AppleID Bruteforce
      • Linux Command Line Hackery Series: Part 1
      • Hackable - Secret Hacker | Vulnerable Web Applicat...
      • DEFINATION OF HACKING
      • How To Start | How To Become An Ethical Hacker
      • What Is Cybercrime? What Are The Types Of Cybercri...
      • How Do I Get Started With Bug Bounty ?
      • Sslmerge - Tool To Help You Build A Valid SSL Cert...
      • Workshop And Presentation Slides And Materials
      • CLOUDKiLL3R - Bypasses Cloudflare Protection Servi...
      • Top 5 Best TV Series Based On Hacking & Technology...
      • New Printers Vulnerable To Old Languages
      • Linux Command Line Hackery Series: Part 2
      • wpCrack - Wordpress Hash Cracker
      • Reversing Pascal String Object
      • What Is Cybercrime? What Are The Types Of Cybercri...
      • CEH: Fundamentals Of Social Engineering
      • Evil Limiter: Taking Control Of Your Network Bandw...
      • Equation Samples - From The Kaspersky Report And A...
      • Scaling The NetScaler
      • USE OF CRYPTOGRAPHY IN HACKING
      • CORS Misconfigurations On A Large Scale
      • Encuentros Virtuales Con "Hackers" En @0xWord Y Mi...
      • How To Start | How To Become An Ethical Hacker
      • PHoss: A Password Sniffer
      • LSASS Dumping Methods ( For Mimikatz )
      • Hacking Windows 95, Part 2
      • HTML5 Games On Android
      • Top 5 Best TV Series Based On Hacking & Technology...
      • Conversations With Cyber Security Professionals
      • Wafw00F: The Web Application Firewall Fingerprinti...
      • Blockchain Exploitation Labs - Part 2 Hacking Bloc...
      • Top Linux Commands Related To Hardware With Descri...
      • Vsftpd Backdoor - Ekoparty Prectf - Amn3S1A Team
      • Thank You To Volunteers And Board Members That Wor...
      • August Connector
      • Detroit: Become Human Review (PC/Epic Store)
      • Reminder: Western Cape Online Provincial Champions...
    • ►  March (15)
    • ►  February (8)
  • ►  2019 (1085)
    • ►  December (15)
    • ►  November (55)
    • ►  September (181)
    • ►  August (315)
    • ►  July (269)
    • ►  June (183)
    • ►  May (52)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2016 (1)
    • ►  August (1)
  • ►  2010 (1)
    • ►  March (1)
Picture Window theme. Powered by Blogger.