-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

  • How to create a new user in windows 10

     

    How to create a new user in windows 10



     

     

     

    How to create a new user in windows 10


    Lets start with types of user account in windows. Here we are write few types of windows account - 

    • Administrator
    • user_standard / Local / Domain / Microsoft / Network etc
    • Guest 


    The account we create at the time of installation is called as user with administrative rights.

     

    Administrator Account - The account have the full control over the system, can install / uninstall software, change system setting, manage users and modify security, This account will be used by the individual to manage, monitor and troubleshoot the account.  

     

    Standard User Account (Local User) - This account is having limited permission, allows basic task like running application and changing personal settings ,This cannot install software or change system wide settings. This account is allowed for doing its daily basic task, what it is allowed for  


    Guest Account (Deprecated in newer version) - Designed for temporary access with minimal permission.

     

    Local Account - This account which, exist on a specific computer and is not connected to a network domain. This can a administrator or standard user account we also call as a standalone user.

     

    Domain User Account - This is account managed by a domain controller in an active directory environment. This allows users to log in from any computer within the domain using the same credentials. This is generally controlled by IT administrator for security and access management.

     

    How to create a new user in windows 10

     

     -- Open Run ( windows +R)

    -- on the run type "lusrmgr.msc"

     

    How to create a new user in windows 10

     


    -- Right Click on the "Users" > Then click on the option "new user" > After clicking one dialog box will appear where you have to fill the necessary details where you have to fill the necessary details related to user like "Full name", "user name" "Description", "password", "confirm password", you will have the list of options select accordingly" > then click on the bottom "Create"

     

     

    How to create a new user in windows 10

     


    How to create a new user in windows 10




    -- Close that dialog box > logout from the administrative account > try to login with the user that you created.

     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

  • Activate administrator account in windows 10

     

    Activate administrator account in windows 10


    How to activate / enable windows administrative account ?


    Lets start with types of user account in windows. Here we are write few types of windows account - 

    • Administrator
    • user_standard / Local / Domain / Microsoft / Network etc
    • Guest 


    The account we create at the time of installation is called as user with administrative rights.

     

    Administrator Account - The account have the full control over the system, can install / uninstall software, change system setting, manage users and modify security, This account will be used by the individual to manage, monitor and troubleshoot the account.  

     

    Standard User Account (Local User) - This account is having limited permission, allows basic task like running application and changing personal settings ,This cannot install software or change system wide settings. This account is allowed for doing its daily basic task, what it is allowed for  


    Guest Account (Deprecated in newer version) - Designed for temporary access with minimal permission.

     

    Local Account - This account which, exist on a specific computer and is not connected to a network domain. This can a administrator or standard user account we also call as a standalone user.

     

    Domain User Account - This is account managed by a domain controller in an active directory environment. This allows users to log in from any computer within the domain using the same credentials. This is generally controlled by IT administrator for security and access management.

     

    How to activate/enable administrator account ? 

     

    -- Press win + r and type  "lusrmgr.msc" without quotes.

     

     

    Activate administrator account in windows 10

     

     

    -- After open click on "users"

     

    Activate administrator account in windows 10

     

     

     

    -- Then go to "users" > Right click on "Administrator" > Then click on the option "properties" > uncheck the box > account is disable > Click on apply > then  after "OK".

     

     

    Activate administrator account in windows 10

     

     

     

    Activate administrator account in windows 10


     

    -- again right click on "Administrator" > Click on the option > set password > one dialog box will appear where you have to type password > new password > confirm password > Then click on "OK" button.

     

    Activate administrator account in windows 10

     

     

     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     


     

  • NETREAPER – A Modern Offensive Security Toolkit That Simplifies Penetration Testing

     

     


     

     

    NETREAPER – A Modern Offensive Security Toolkit That Simplifies Penetration Testing



    Penetration testing usually involves jumping between dozens of tools, each with different commands, flags, and workflows. NETREAPER is a new offensive security toolkit created to solve this problem by bringing more than 70 essential pentesting utilities into one organized and easy-to-use command-line interface.

    Instead of switching terminals, searching for syntax, or manually launching each tool, NETREAPER provides a structured, menu-driven workflow that streamlines the entire assessment process.



    Why NETREAPER Stands Out



    NETREAPER is designed for efficiency. It removes the usual clutter encountered during security testing and gives attackers (and defenders) a single, unified environment. Its interface offers clear menus, guided prompts, and categorized sections that make navigation fast and intuitive—even for beginners.

    The toolkit integrates popular utilities from various domains such as reconnaissance, wireless attacks, exploitation, credential cracking, OSINT, and post-exploitation. Everything is neatly grouped, so a task that typically needs multiple tools can now be performed from one dashboard.



    Key Capabilities of NETREAPER


    1. Unified Interface

    NETREAPER wraps more than 70 industry-standard security tools into a single interface, eliminating the need to memorize complex command options for each tool.

    2. Organized Menu System

    The toolkit separates operations into clearly defined categories, including:

    • Reconnaissance
    • Wireless testing
    • Exploitation
    • Credential attacks
    • Stress testing
    • OSINT/Intel gathering
    • Post-exploitation
    • Utility functions


    This structure makes it easier to perform tasks without getting overwhelmed.



    3. Recon & Network Analysis

    Users can run detailed scans, DNS lookups, ARP discoveries, SSL/TLS analysis, and more through tools such as:

    • Nmap
    • Masscan
    • Dnsenum



    4. Wireless Security Assessment



    NETREAPER supports a wide range of wireless attacks, including:

    • WPA/WPA2 handshake capture
    • Deauthentication
    • Packet sniffing
    • WPS exploitation
    • Evil Twin AP attacks
    • Tools like aircrack-ng, bettercap, and wifite are already integrated.


    5. Exploitation Frameworks

    It provides access to popular exploitation engines:

    • Metasploit
    • SQL injection frameworks
    • Web vulnerability scanners
    • Directory brute-forcing utilities


    6. Credential Attacks


    Various password-cracking and brute-force options are included through:

    • Hashcat
    • Hydra
    • John the Ripper
    • SMB/WinRM attack modules


    7. Stress & Load Testing



    NETREAPER can simulate network pressure through packet flooding, bandwidth testing, or HTTP load generation using tools like hping3 and iperf3.

     

    8. OSINT & Intelligence Gathering

    The toolkit enables reconnaissance across the public internet with utilities for:

    • Passive information gathering
    • Shodan-like scanning
    • Traffic inspection
    • Data harvesting from open sources


     

    9. Post-Exploitation Support



    It includes resources and guidance for:

    • Privilege escalation
    • Lateral movement
    • Persistence mechanisms
    • System enumeration


     

    10. Session Management & Reporting



    One of the standout features in NETREAPER is session tracking.
    Users can:

    • Start and pause assessments
    • Resume previous sessions
    • Generate structured, compliance-ready reports
    • This is especially valuable for professional penetration testers.


     

    Github Link - https://github.com/Nerds489/NETREAPER 

     

    User Experience and Safety Features



    NETREAPER prioritizes usability through guided wizards, progress indicators, helpful reminders, and optional verbose modes.


    To keep operations safe and compliant, it includes:

    • Input validation
    • Target confirmation prompts
    • Privilege escalation checks
    • Logging and audit trails
    • These safeguards help prevent accidental misuse.


    Installation Options

    Users can choose between:

    Essential Install (~500MB): Fast setup with core tools

    Full Arsenal (3–5GB): Complete environment with the entire toolkit

    Setup usually takes between 5 to 30 minutes depending on system resources.

     

    Who Benefits from NETREAPER?



    • Red Teamers: Gain a centralized platform for offensive operations
    • Blue Teamers: Understand attacker workflows in depth
    • Students & Beginners: Learn penetration testing through guided menus
    • Security Firms: Use consistent logs and reporting for audits


     

    NETREAPER offers an efficient, organized, and user-friendly offensive security environment suitable for all skill levels.
     


     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

     

     

  • Best Practices for Handling Local Images in React Applications

     

    Best Practices for Handling Local Images in React Applications

     

    Step-by-Step Guide to Using Images with import.meta.url in React

     

    Hello viewers, i am back again for you and now we will start from reactjs. So, we are ready for implemenation Best Practices for Handling Local Images in React Applications and set result. Actually we are making some project like E-commerce where we can implement react rating start.

     

     

    React


    Certainly, Reactjs is a JavaScript library developed by Facenook for building user interfaces. It allows developers to create reusable UI components and effciently manage the state of their applications. Here are some key aspects of Reactjs.

     

     

    import.meta.url



    When building React applications, working with static assets like images is a common requirement. In this article, we’ll walk through how to efficiently import and display images using import.meta.url, which is especially useful in modern JavaScript and frameworks like Vite.



    What is import.meta.url?



    import.meta.url provides the absolute URL of the current module. It’s a feature introduced in ES modules to handle module-related metadata. In the context of React and tools like Vite, it’s often used for dynamically importing static assets like images.



    Why Use import.meta.url for Images?



    # It ensures proper resolution of local images at runtime.
    # It’s ideal for bundlers like Vite, where traditional require() or relative paths might not work as expected.
    # It provides a clean and scalable way to manage static assets in your project.

     

     

    Step-by-Step Guide



    1. Create the Image Component

    We’ll create a file named Image.jsx to define our static images and use import.meta.url for dynamic URL resolution.

    Image.jsx

     

     

    // Image.jsx
    const IMAGES = {
        image1: new URL('./google-logo.png', import.meta.url).href
    };
    
    export default IMAGES;
    
    

     

     

     

    Here’s what’s happening:


    # The new URL() constructor dynamically resolves the image path relative to the module using import.meta.url.
    # .href provides the URL as a string for use in the src attribute of the <img> tag.



    2. Create the Image Display Component

    Now, we’ll create another component called GetImage.jsx to display the image.

     

     

     

    // GetImage.jsx
    import React from 'react';
    import IMAGES from './images/Image';
    
    function GetImage() {
      return (
        <div/>
          <div/>
            <img src={IMAGES.image1} alt="Google Logo" />
          </div/>
        </div/>
      );
    }
    
    export default GetImage;
    
    
    

     

     

    Here’s what this does:


    # The IMAGES object imported from Image.jsx provides the resolved URL of the image.
    # The <img> tag uses the resolved URL from IMAGES.image1 to display the image.



    3. Add the Image to Your Project


    Make sure the google-logo.png image is placed in the correct folder (./images/ in this case) relative to Image.jsx.


    Best Practices for Handling Local Images in React Applications



    Best Practices for Handling Local Images in React Applications




    # Benefits of This Approach

    # Dynamic Resolution: Using import.meta.url ensures that paths are resolved dynamically, reducing potential errors.
    # Scalability: Centralizing image URLs in one file (Image.jsx) makes it easy to manage and update images.
    # Compatibility: Works seamlessly with modern bundlers like Vite.



    Common Mistakes to Avoid



    # Incorrect Relative Paths: Ensure the image file is located correctly relative to Image.jsx.

     

     

     

     


    # Install redux and saga packages - CLICK HERE

    # Make reducer wrapper - CLICK HERE

    # Action in reducer - CLICK HERE

    # Reducer in redux - CLICK HERE

    # Switch Stmt in redux - CLICK HERE

    # Get data in component from redux - CLICK HERE 

    # Remove from cart - CLICK HERE 

    # Add Redux Toolkit in react redux saga - CLICK HERE  

    # Configure MiddleWare saga - CLICK HERE   

    # Call API with Saga and Set Result in react redux saga - CLICK HERE    

    # Product list ui with API data in react redux saga - CLICK HERE    

    # Remove to Cart with ID react redux saga - CLICK HERE     

    # Add Routing and Make Cart Page - CLICK HERE   

    # Show Added To Cart Product with Price Calculation  - CLICK HERE  

     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     


  • How to Access Your ReactJS Vite App on Another Device Within the Same Network

     

    Access your reactjs app on another device within the same network

     

    Access your reactjs app on another device within the same network


    Certainly, Reactjs is a JavaScript library developed by Facenook for building user interfaces. It allows developers to create reusable UI components and effciently manage the state of their applications. Here are some key aspects of Reactjs.

    Now we will run a ReactJS Vite app hosted on localhost:5173 on another laptop within the same network, but you need to make a few adjustments like this -




    Steps to Access the Vite App on Another Laptop:

     

    1) Ensure Both Devices Are on the Same Network:

    Both laptops should be connected to the same Wi-Fi or local area network (LAN).


    2) Find the Host Laptop's IP Address

     
     

    On Windows:

     

    Open Command Prompt and type: ipconfig
    Look for the IPv4 address under your active network connection.
            
    On macOS/Linux:
    Open the terminal and type: ifconfig or ip addr
    Find the IP address of the active network interface.


    3) Run the Vite App

    Start your Vite development server by running npm run dev (or yarn dev) on the host laptop.



    4) Update the URL

    Instead of localhost:5173, use the host laptop's IP address with port 5173. For example:

        
    http://<HOST_LAPTOP_IP>:5173


    Replace <HOST_LAPTOP_IP> with the actual IP address, like 192.168.1.10:5173.



    5) Allow Connections Through Firewall (If Necessary)

    On Windows:
    Search for "Windows Defender Firewall" > "Allow an app or feature through Windows Defender Firewall."
    Ensure your development environment (e.g., Node.js) is allowed for both private and public networks.


     

    On macOS/Linux:

     

    Ensure the firewall (if enabled) allows incoming connections on port 5173.

    Access the App on Another Laptop
    Open a browser on the second laptop and type the IP-based URL (e.g., http://192.168.1.10:5173).



    Notes:


    If you're using Vite's default configuration, it binds the server to localhost. To make it accessible to other devices, you may need to modify the vite.config.js:


    Restart the server after making this change.

      
      
    
    export default {
      server: {
        host: '0.0.0.0', // Allows connections from other devices
        port: 5173,
      },
    }; 
     





    Access your reactjs app on another device within the same network


    Access your reactjs app on another device within the same network




    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     






  • Understanding push and pop Methods

     

    Understanding push and pop Methods

     

     "Mastering JavaScript Arrays: Understanding push() and pop() Methods"

     

    Arrays are one of the most versatile and commonly used data structures in JavaScript. Two frequently used methods for manipulating arrays are push() and pop(). In this article, we’ll dive deep into these methods, their use cases, and clarify some common misconceptions.

     
    Overview of push() and pop()
     

    # push() Method:


    # Adds one or more elements to the end of an array.
    # Returns the new length of the array.



    Syntax:


    array.push(element1, element2, ..., elementN);




    Example:

     

    const arr = [];
    arr.push(1); // Adds 1 to the array
    arr.push(2); // Adds 2 to the array
    console.log(arr); // Output: [1, 2]
    
    
    
    



    pop() Method:


    # Removes the last element from an array.
    # Returns the removed element. If the array is empty, it returns undefined.

     

    Syntax:

    array.pop();



    Example:

     

    const arr = [1, 2];
    const removed = arr.pop(); // Removes the last element (2)
    console.log(arr); // Output: [1]
    console.log(removed); // Output: 2
    
    
    

     

     

    Breaking Down the Code


    Here’s the code example in question:

     

     

    const arr = [];
    arr.push(1); // Adds 1 to the array
    arr.push(2); // Adds 2 to the array
    arr.pop(2);  // Removes the last element, but the argument (2) is ignored
    console.log(arr);
    
    
    
    

     
    Explanation:


    # arr.push(1) and arr.push(2) add 1 and 2 to the array, resulting in [1, 2].
    # arr.pop(2) removes the last element (2). However, the argument passed to pop() (2) is ignored because pop() does not accept any arguments.
    # After the pop() operation, the array becomes [1].



     

    Understanding push and pop Methods

     

     

     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

  • Understanding JavaScript substring(): Common Pitfalls and Examples

     


     

    Understanding JavaScript substring():

     

    The JavaScript substring() method is a powerful tool for extracting parts of a string. However, its behavior can sometimes be confusing for beginners. This article will help you understand how substring() works, its quirks, and common mistakes you should avoid.




    What is the substring() Method?



    The substring() method in JavaScript extracts a portion of a string and returns it as a new string without modifying the original string. It takes two arguments:

    # Start index: The position where the extraction begins (inclusive).
    # End index: The position where the extraction ends (exclusive).


    string.substring(startIndex, endIndex)


    If the endIndex is omitted, the method extracts the rest of the string starting from startIndex.

     

     

    Example Usage


    Let’s look at some basic examples:

     

    let x = "Learn"
    console.log(x.substring(5, 1))
    
    console.log("kumaratuljaiswal.in");
    

     

     

     


     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.