PinnedAzhar GhafoorA Practical Approach of Phishing Detection Using Email HeaderWhat is phishing?4 min read·Apr 26, 2022----
Azhar GhafoorCreating a GitHub Profile Readme: Your Introduction to VisitorsCrafting an Impressive GitHub Profile README: Your Gateway to Making a Lasting First Impression2 min read·Aug 13, 2023----
Azhar GhafoorEffective Subdomain Crawling using PythonCrawling to discover subdomains of any domain3 min read·Aug 24, 2022----
Azhar GhafoorInstalling a Virtual Machine (vmdk) on VMware WorkstationCreating a Workstation virtual machine using existing VMDK virtual disks5 min read·Aug 22, 2022----
Azhar GhafoorDeception Systems— An Innovative Honeyed Setup to Catch AdversariesA geotagging-enabled deception system to increase the number of attackers and attacks by challenging attackers’ skills and by motivating…6 min read·Jun 18, 2022----
Azhar GhafoorEmail Stealer — how hackers steal emails from outlookStealing all emails from the victim’s machine without leaving any footprints of the attack3 min read·Jun 4, 2022----
Azhar GhafoorExtraction of Emails & Header Information from Outlook in Order to Detect Phishing AttacksNote: Section-1 of this article described the prerequisites for this topic; please read it before proceeding with this part.4 min read·Apr 27, 2022--1--1