PinnedAzhar GhafoorA Practical Approach of Phishing Detection Using Email HeaderWhat is phishing?Apr 26, 2022Apr 26, 2022
Azhar GhafoorCreating a GitHub Profile Readme: Your Introduction to VisitorsCrafting an Impressive GitHub Profile README: Your Gateway to Making a Lasting First ImpressionAug 13, 2023Aug 13, 2023
Azhar GhafoorEffective Subdomain Crawling using PythonCrawling to discover subdomains of any domainAug 24, 2022Aug 24, 2022
Azhar GhafoorInstalling a Virtual Machine (vmdk) on VMware WorkstationCreating a Workstation virtual machine using existing VMDK virtual disksAug 22, 2022Aug 22, 2022
Azhar GhafoorDeception Systems— An Innovative Honeyed Setup to Catch AdversariesA geotagging-enabled deception system to increase the number of attackers and attacks by challenging attackers’ skills and by motivating…Jun 18, 2022Jun 18, 2022
Azhar GhafoorEmail Stealer — how hackers steal emails from outlookStealing all emails from the victim’s machine without leaving any footprints of the attackJun 4, 2022Jun 4, 2022
Azhar GhafoorExtraction of Emails & Header Information from Outlook in Order to Detect Phishing AttacksNote: Section-1 of this article described the prerequisites for this topic; please read it before proceeding with this part.Apr 27, 20221Apr 27, 20221