techyrick

  • Facebook
  • Twitter
  • Google Plus
  • Hacking tools
    • Information gathering
    • Network mapping
    • Vulnerability analysis
    • Web application vulnerability
    • Password cracking
    • Wireless attack
    • Sniffing & Spoofing
    • Exploitation tools
    • Reverse Engineering
    • Social Engineering
  • Home
  • Blog
  • Contact
  • CTF
    • OTW
    • VulnHub
    • HTB
    • PicoCTF
  • Others
    • Linux
    • Malware
    • Bug Bounty Writeups
    • Programming
      • Python Hackers
    • Windows Privilege Escalation
    • Network Service Pentesting

Author - moulik

elif in python

Elif in python full tutorial for beginners| Python Bootcamp

18 October 2021
by moulik
2 min read

Introduction Elif in python: In this post, you will learn what is elif statement, how does it work and what is the use of elif statement and also we will see some examples. Below is the video format of the post, check it out...

Continue reading

fixed error

Error while opening the virtual machine: VMX file is corrupt. Fixed 2024

18 October 2021
by moulik
2 min read

Introduction In this post, we will see a VMware error occurring while opening any vmdk file. By end of this post, you will be able to solve this error, Error while opening the virtual machine: VMX file is corrupt. Video:...

Continue reading

dirbuster

Dirbuster: Full command tutorial for beginners | Updated 2024

18 October 2021
by moulik
3 min read

Table of ContentsIntroductionVideo: What is dirbuster ❓Downloading dirbuster WindowsLinux systemFeatures in dirbusterHow to use dirbuster tool Example 1, Default scan Example 2, Get request onlyExample 3, Pure brute forcing...

Continue reading

nested if in python

Nested if statement in python | Full tutorial

16 October 2021
by moulik
2 min read

Introduction In this post, you will learn what is nested if the statement is in python and there is no else or elif nested statement. You will learn some nested examples also and below is the video format of the post, check it...

Continue reading

if else in python

If else in python | Full tutorial for beginners

15 October 2021
by moulik
2 min read

Introduction In this post, you will learn the if and else statement in python and how does it work and we will see some examples using the if / else statement and below is the video format of the post, check it out...

Continue reading

dirb

Dirb full tutorial for beginners from noob to pro | 2024

14 October 2021
by moulik
3 min read

Table of ContentsIntroductionVideo: What is dirbuster ❓Downloading dirbuster WindowsLinux systemFeatures in dirbusterHow to use dirbuster tool Example 1, Default scan Example 2, Get request onlyExample 3, Pure brute forcing...

Continue reading

burpsuite

Burpsuite Full tutorial from noob to pro | Updated 2024

13 October 2021
by moulik
11 min read

Table of ContentsIntroductionVideo: What is dirbuster ❓Downloading dirbuster WindowsLinux systemFeatures in dirbusterHow to use dirbuster tool Example 1, Default scan Example 2, Get request onlyExample 3, Pure brute forcing...

Continue reading

F-string in python

F-String in python, What it does | Python Bootcamp

10 October 2021
by moulik
1 min read

Introduction In this post, you will learn what is the f-string doing and how does it work and also we will be seeing some example of F-string and if you are still confused. Below is the video format of the post, check it out...

Continue reading

number manipulation in python

Number manipulation in python full tutorial | Python Bootcamp

9 October 2021
by moulik
2 min read

Introduction In this number manipulation post, Let’s see how to manipulate or round any numbers. And also we will be seeing some examples related to number manipulation. Below is the video format of the post, check it...

Continue reading

Previous 1 … 28 29 30 31 32 … 44 Next

Contact Us

Need help or have a question?
Contact us at: techyrick.com@gmail.com

Copyright © 2025. Created by Meks. Powered by WordPress.
  • Hacking tools
    • Information gathering
    • Network mapping
    • Vulnerability analysis
    • Web application vulnerability
    • Password cracking
    • Wireless attack
    • Sniffing & Spoofing
    • Exploitation tools
    • Reverse Engineering
    • Social Engineering
  • Home
  • Blog
  • Contact
  • CTF
    • OTW
    • VulnHub
    • HTB
    • PicoCTF
  • Others
    • Linux
    • Malware
    • Bug Bounty Writeups
    • Programming
      • Python Hackers
    • Windows Privilege Escalation
    • Network Service Pentesting
  • Facebook
  • Twitter
  • Google Plus