Open in app

Sign in

Write

Sign in

Azhar Ghafoor
Azhar Ghafoor

9 Followers

Home

About

Pinned

A Practical Approach of Phishing Detection Using Email Header

What is phishing? One of the most common attack vectors used by cybercriminals is phishing emails. They might be used to deliver a malicious payload or steal account information from their target. It happens when an attacker poses as a reliable source and convinces the victim to engage with a spoofed email, instant…

Phishing

4 min read

A Practical Approach of Phishing Detection Using Email Header
A Practical Approach of Phishing Detection Using Email Header
Phishing

4 min read


Aug 13

Creating a GitHub Profile Readme: Your Introduction to Visitors

Crafting an Impressive GitHub Profile README: Your Gateway to Making a Lasting First Impression — Your GitHub profile isn’t just a place to store code — it’s your professional identity in the digital world. One of the most powerful ways to stand out is by adding a customized README to your profile. In this article, we’ll explore the steps to create an engaging GitHub Profile…

Readme

2 min read

Creating a GitHub Profile Readme: Your Introduction to Visitors
Creating a GitHub Profile Readme: Your Introduction to Visitors
Readme

2 min read


Aug 24, 2022

Effective Subdomain Crawling using Python

Crawling to discover subdomains of any domain If you want to test a website’s security and hack into it, you must be able to examine the whole web application as well as all of the provided capabilities and technologies in order to find a flaw that will allow you to…

Crawling

3 min read

Effective Subdomain Crawling using Python
Effective Subdomain Crawling using Python
Crawling

3 min read


Aug 22, 2022

Installing a Virtual Machine (vmdk) on VMware Workstation

Creating a Workstation virtual machine using existing VMDK virtual disks — The base of this article is very common questions that are what is a virtual machine? why do we use it? how to use it? do we need new hardware resources such as a new laptop, pc or other computer systems to use it? and so on. …

Vmware

5 min read

Installing a Virtual Machine (vmdk) on VMware Workstation
Installing a Virtual Machine (vmdk) on VMware Workstation
Vmware

5 min read


Jun 18, 2022

Deception Systems— An Innovative Honeyed Setup to Catch Adversaries

A geotagging-enabled deception system to increase the number of attackers and attacks by challenging attackers’ skills and by motivating them to come up with new and advanced techniques to bypass decoyed security barriers to seize critical (honeyed) documents, ultimately helping us to understand those new attacks. — According to Attivo Networks, “Deception gives defenders the ability to learn about attackers in the same way attackers try to learn about their targets. Once an organization knows an attacker is in the network, it can observe the attacker’s behaviors and patterns. …

Honeypot

6 min read

Deception Systems— An Innovative Honeyed Setup to Catch Adversaries
Deception Systems— An Innovative Honeyed Setup to Catch Adversaries
Honeypot

6 min read


Jun 4, 2022

Email Stealer — how hackers steal emails from outlook

Stealing all emails from the victim’s machine without leaving any footprints of the attack — AAccording to one projection [1], approximately 3.8 billion email accounts were in use in 2019. The number is expected to exceed half of the global population by 2022, with almost 300 billion emails being transmitted daily. You’ve probably heard of Gmail, Outlook, and Apple Mail. These are all email applications…

Email

3 min read

Email Stealer — how hackers steal emails from outlook
Email Stealer — how hackers steal emails from outlook
Email

3 min read


Apr 27, 2022

Extraction of Emails & Header Information from Outlook in Order to Detect Phishing Attacks

Note: Section-1 of this article described the prerequisites for this topic; please read it before proceeding with this part. Before delving into the practical demonstration of the work, it is necessary to examine the modules that I utilized in this project. This whole procedure is done out on Windows-10 using…

Phishing

4 min read

Extraction of Emails & Header Information from Outlook in Order to Detect Phishing Attacks
Extraction of Emails & Header Information from Outlook in Order to Detect Phishing Attacks
Phishing

4 min read

Azhar Ghafoor

Azhar Ghafoor

9 Followers

Cybersecurity Researcher | Ethical Hacking | Data Analyst

Following
  • Neh Patel

    Neh Patel

  • Adam Geitgey

    Adam Geitgey

  • Mybridge

    Mybridge

  • >>> import python

    >>> import python

See all (14)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams