ahmed@home:~$

    Create your own OpenAI API expenditure dashboard

    Introduction In the dynamic landscape of artificial intelligence (AI), developers often find themselves working on multiple projects simultaneously, each utilizing the powerful capabilities of OpenAI’s API. However, in many enterprise settings, access to the OpenAI account might be restricted, leaving developers with only the API key and no direct visibility...

    From Keywords to Meanings- Developing a Semantic Search Engine for Ecommerce Websites (Part 1)

    Introduction In today’s digital age, ecommerce has become a vital part of our daily lives. With the rise of online shopping, customers now have access to an unprecedented amount of products from around the world. However, finding the right product can be a daunting task, especially when faced with a...

    Monitor your network using Telegram

    This script uses Telegram to notify you about the devices connected to your network. When you run the script, it starts a Telegram bot that you can interact with. The bot allows you to start the network scan and get a list of all currently connected devices on your network....

    Capture keystrokes from target machine with python

    In this article, we will explore the concept of a keylogger and how it can be implemented using the Python programming language. A keylogger is a type of surveillance software that tracks and records the keys struck on a keyboard, typically in covert manner. This information can then be used...

    Pwn The Network - How to perform an ARP spoof attack

    A MITM ( Man-in-the-middle) attack is a type of cyber attack where the attacker secretly intercepts and alters communication between two parties who believe they are communicating directly with each other. This allows the attacker to essentially “sit in the middle” of the communication and listen in on, or even...

    Pwn The Network - Discover devices in the network using ARP scan

    Once connected to a network, a hacker/penetration tester starts by discovering devices connected to the same network. This is the first part of the information gathering phase in every network pentesting assessment. There several ways to scan a network, for example, a technique like ping sweep is used to send...

    Pwn The Network - How to spoof your MAC address

    What is a MAC address? MAC stands for Media Access Control, and also known as Physical address, hardware address which uniquely identifies each device on a given network. If a LAN network has two or more devices with the same MAC address, that network will not work. Architecture of MAC...

    Reverse TCP shell with traffic encryption

    To gain control over a target system, a reverse shell is an integral part of a hacking/pentesting process, it enables the attacker to execute system commands on the target machine. In this article we are going to code a reverse TCP shell in python. We will make sure our shell...

    Remote control your Windows computer using Telegram

    Updated on 23/01/2023 If you work in an office, you are probably told to always lock your computer before you go AFK as a measure of security. In my case, my colleagues will not hesitate to prank whoever forgets his screen unlocked as a punishment. I am a very caring...