URID# 1902121
Author: Syed Ubaid Ali Jafri
A tool is required to perform a remote mirroring function for a client/server machine. A portable agent which will be executed in the server and connects back with its client.
URID# 1245161
Author: Syed Ubaid Ali Jafri
A Web based application is required to be developed using PHP/ASP/JSP/WEBRTC in which Google Dorking and keywords based searching will be used to find any unofficial presence of a company is hosted over the internet. Note: there will be a whitelisting of company official domains, URL, Web Links. a part from them all should be collected and counted in a blacklist
We have customize and added around 200+ domain in this open source tool called "Sherlock" use to populate data on behalf of usernames, email address, domain name.
URID# 3802181
Author: Syed Ubaid Ali Jafri
This project allows a user to setup a domain using WEBRTC services which help to record video of the user using Cell phone, laptop having camera installed in it. Application would have the ability to record the live video of the victim front cam, ability to hide itself from being detected by any EndPoint Protection program.
The Program has been developed using PHP language and WEBRTC Protocol with customize programming.
URID# 2917501
Author: Syed Ubaid Ali Jafri
This project allows a user to setup a vulnerable USB drive for the victim, as soon as the hacker plug in the USB drive in the system, it automatically execute the script and copy all the important files including (pptx, xlsx, docx, pdf, jpg, png, gif, txt, zip) etc. from the system and make a copy of these files in the system by creating a Hidden folder, once the copying process is done it than starts compressing and protecting the copied data in the disk. As soon as the data is copied it finally starts uploading the data to the cloud
The Program has been developed using batch script and assembly language
URID# 9201746
Author: Syed Ubaid Ali Jafri
This project allows a user to setup a vulnerable and fake Office 365 webpage in order to deceive the victim. As soon as the victim clicks on the fake URL, it will popup a page claiming to be an office 365 page. forcing the victim to enter the credentials, as soon as the victim will enter the credentials it will send the credentials to Hackers Cloud
The Program has been developed using PHP Language.
URID# 2278995
Author: Syed Ubaid Ali Jafri
This project allows an intruder to setup an application and installed it in the victim machine. As soon as the victim will open the system it will automatically send public IP information to the hacker
The Program has been developed using C#. Net.
Get your Frequent Queries Answered Here.
To Get candidates aware about Ethical Hacking and its ongoing achievements, the field has a very huge diversification portfolio
These Projects not only allow cyber security organisations to develop technologies that can prevent hackers from accessing devices, websites and networks but can lead businesses in the direction of understanding exactly what data is compromised. Digital forensics experts are able to explore networks and probe security event logs, network traffic, and access credentials to offer closure on a cyber attack.
No, Not all the projects hosted in Ethical Hacking Projects section are open sourced, most of them are self prepared and most of them requires programming and script writing which we did by own own.
For Every project, I found the best workaround and the ease solution which could help investigator to solve the puzzle as quickly as possible.
Yes, invividuals can subscribe over the email to get theirselves registered.
We Appreciate comments which we receive in the form of improvement and modifications. we encourage inviduals to provide their input against any of the project by Refering Project Name, Suggested Area of Improvement to info@ubaidjafri.com
We have scrutinized all the mentioned projects and also assess their communication, project and tools used in the mentioned projects are not vulrable to breach user privacy as of July 2022.
Please Note: User / Individual also need to make sure to double check the statement by their own.