shashi bhushan mettu

Thursday, May 14, 2020

How To Bind Payload Any Software Using Shellter

Related articles


  • Curso De Ciberseguridad Y Hacking Ético
  • Hacking School
  • Hacking Cracking
  • Hacking Madrid
  • Hacking Bluetooth Speaker
  • Servicio Hacker
  • Hacking Definition
  • Hacking Tutorials
  • Como Hacer Hacker
Posted by shashi bhushan mettu at 3:58 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

CALL ME AT

About Me

shashi bhushan mettu
Atlanta, Georgia, United States
About me ? i am Shashi Bhushan Mettu, wish to be called Shashi and i hail from ntpc,karimnagar(dist0 of Andhra Pradesh, im 30 years old and working as SAP Consultant in Atlanta,GA. I am married and living with my wife Pavitra and son Abhay Nihal Bharadwaj. I have done my schooling in different schools in different towns.L.K.G to 5th class at sacred heart School,Godavarikhani, 6th class till 8th at St Claire convent school(im from 2nd batch of this school),9th in Vijayawada, 10th in Guntur and Intermediate( +2) in Hyderabad from Triveni Residential College and Finally graduated from S.R.R Govt College, karimanagar durinng 93-96, i could not hardly belive that its more than 10 years i have graduated and could really experience by phrase "Time flys....". Career... I have started as System administrator in 1997 and worked till 2000 with Future Focus Infotech,Chennai and then went to England, South Africa....Started working as Basis Consultant with SAP INDIA,Bangalore from 2004 till 2005, moved to USA in march 2005 and from that time have been travelling to different states and now in Atlanta, Working with COKE.
View my complete profile

Blog Archive

  • ►  2025 (45)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (6)
    • ►  February (6)
    • ►  January (28)
  • ►  2024 (53)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  May (3)
    • ►  April (1)
    • ►  February (4)
    • ►  January (39)
  • ►  2023 (57)
    • ►  November (1)
    • ►  October (2)
    • ►  August (7)
    • ►  July (4)
    • ►  June (18)
    • ►  May (25)
  • ►  2022 (1)
    • ►  August (1)
  • ▼  2020 (363)
    • ►  September (5)
    • ►  August (97)
    • ►  July (101)
    • ►  June (32)
    • ▼  May (50)
      • Learn A-Z Kali_Linux Commands For Beginerrs
      • ShodanEye: Collect Infomation About All Devices Co...
      • OSIF: An Open Source Facebook Information Gatherin...
      • How To Spoof PDF Signatures
      • July 2019 Connector
      • BASICS OF METASPLOIT – BASIC COMMANDS OF METASPLOIT
      • Novell Zenworks MDM: Mobile Device Management For ...
      • Ukrainian Police Arrest Hacker Who Tried Selling B...
      • Linux Command Line Hackery Series: Part 2
      • OWASP ZAP RELEASES V2.8.0 WITH THE HEADS UP DISPLAY
      • Recovering Data From An Old Encrypted Time Machine...
      • The Live HTML Editor
      • Brazil's Biggest Cosmetic Brand Natura Exposes Per...
      • Removing Windows 8/8.1 Password With CHNTPW
      • How To Track Iphone Without Them Knowing
      • How tO Secure Yourself From Evil Twin Attack
      • TOP 10 HACKING MOVIES YOU SHOULD WATCH
      • Structure Part I: The Basics
      • Learning Web Pentesting With DVWA Part 1: Installa...
      • How To Install And Run Backtrack On Android
      • Learning Web Pentesting With DVWA Part 6: File Inc...
      • How Do I Get Started With Bug Bounty ?
      • DOWNLOAD COWPATTY WIFI PASSOWORD CRACKING TOOL
      • PentestBox - Opensource PreConfigured Portable Pen...
      • How To Bind Payload Any Software Using Shellter
      • Swann Song - DVR Insecurity
      • HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSIO...
      • DEFINATION OF HACKING
      • ISPY: Exploiting EternalBlue And BlueKeep Vulnerab...
      • DarkFly Tool V4.0 | 500 Tools | Termux
      • Scanning TLS Server Configurations With Burp Suite
      • WiFiJammer: Amazing Wi-Fi Tool
      • Testing SAML Endpoints For XML Signature Wrapping ...
      • Web-fu - The Ultimate Web Hacking Chrome Extension
      • CTF: FluxFingers4Future - Evil Corp Solution
      • Probing For XML Encryption Weaknesses In SAML With...
      • Memcrashed DDoS Exploit | Install | Github
      • WordPress 5.0.0 Crop-Image Shell Upload Exploit
      • OWASP Web 2.0 Project Update
      • July 2019 Connector
      • Introducing Malware Analysis Professional
      • Networking | Routing And Switching | Tutorial 2 | ...
      • Airba.sh - A POSIX-compliant, Fully Automated WPA ...
      • Hacking Everything With RF And Software Defined Ra...
      • wpCrack - Wordpress Hash Cracker
      • How To Install And Run Backtrack On Android
      • ANNOUNCEMENT: Submitters Of Papers And Training Fo...
      • Administración Remota De Servidores Desde Android
      • July Scrum Rnd2 - Madrak2 Vs. Baldur1
      • Bryce "Ten Foot Pole" Lynch Reviews Cha'alt
    • ►  April (55)
    • ►  March (15)
    • ►  February (8)
  • ►  2019 (1085)
    • ►  December (15)
    • ►  November (55)
    • ►  September (181)
    • ►  August (315)
    • ►  July (269)
    • ►  June (183)
    • ►  May (52)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2016 (1)
    • ►  August (1)
  • ►  2010 (1)
    • ►  March (1)
Picture Window theme. Powered by Blogger.