AnonHacks

‎‎‎‎‎‎‎‎‎‎‎Hello Freaks,Anonymous here welcome to the blog 'ANONHACKS' ‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎

  • Home
  • About me
facebook Instagram Linkedin twitter

 



Every decade brings a new programming language that sweeps developers off their feet. One of the most popular and in-demand programming languages is Python. Stack Overflow recently ranked Python ahead of Java, C, and C++. Certification in Python is becoming increasingly popular among programmers. In this blog, I'll list my top 10 reasons Why Python is So Popular?


The right time to dive into Python is now when the technology is at its nascent stage and you can learn the skills. Here are some reasons why people choose Python as their first programming language:


1. Simple & Easy To Learn


Python is very simple and easy to learn. The language is versatile and it is similar to English!


What makes it simple? The language Python


Open-source & free

High-level

Interpreted

Work with Large Community

Furthermore, Python does not require complex syntax.


You have to write the above three lines to print 'hello world' in C, but just one line is necessary for Python.


The best thing about the code is its simplicity, which makes it suitable for beginners.


2. Portable and expandable            


Python is portable and extensible, enabling seamless cross-language operations. The majority of platforms are compatible with Python, including Windows, Linux, Macintosh, Solaris, Playstation, and others.


You can integrate Java and .NET components with Python's extensibility features. You can also use C and C++ libraries.


3. Development of Web Sites


The Python programming language has several frameworks for building websites. Django, Flask, Pylons, etc., are popular frameworks. Python's ability to write fast and stable code is the primary reason behind these frameworks. 


 Alternatively, you can perform web scraping to retrieve information from any other website. It is also surprising that many websites such as Instagram, BitBucket, and Pinterest are built only on these frameworks.


4. Artificial Intelligence


Artificial intelligence is the next revolution in technology. Machines that can analyze, think and make decisions can mimic the human brain.


Those libraries include Keras and Tensor Flow. They let you learn without explicitly programming. Additionally, libraries such as opens can assist with computer vision and image recognition.


5. Computer Graphics


It is popular for small, large, online, and offline projects. You can use it to build GUI and desktop applications. It uses the Tkinter library to create applications quickly and easily.


A module 'pyramid' is also used in game development, and this module runs on Android as well.


6. Testing Framework


Python is a valuable tool for validating ideas and products for established companies. Several built-in Python testing frameworks cover debugging & fastest workflows. Selenium and Splinter are just two of the many tools and modules that make things easier.


This tool supports cross-platform and cross-browser testing with frameworks like PyTest and Robot Framework. Python is the booster for testing, so every tester should use it.


7. Big Data


Python handles a lot of data hassles. You can also use Python for Hadoop using parallel computing. The Python library Pydoop allows you to write Map Reduce programs and process data from HDFS by writing a MapReduce program in Python.


Other data processing libraries include Dask and Pyspark. As a result, Python is popular for processing Big Data!


8. Scripting & Automation


It's common knowledge that Python is a programming language, but you can also use it as a scripting language. Scripting involves:


Scripts are written to execute code

using a machine that reads and translates the code

Runtime error checking

Once the code passes verification, you can use it again and again. This way, you can automate certain tasks in a program. 


9. Data Science


The leading language of many data scientists is Python. It was once common practice for academic scholars and private researchers to use MATLAB, but all that changed after Python numerical engines such as Numpy and Pandas were released. Python can also handle tabular, matrices, as well as statistical data, and it even visualizes them with libraries like Matplotlib and Seaborn.


10. Popularity of Python & High Salary


Python engineers earn one of the highest salaries in the industry. Python Developer salaries in the United States average $116,028 annually. In recent years, Python has become more popular. Here you come across Why You Should Learn Python in 2022.

0
Share

 




Hello freaks! Anonymous here in today's post We’ll learn how to draw Doraemon & Superman Logo using the Python Turtle module in this tutorial. This python turtle tutorial will mostly target beginners and intermediate coders.


Code to draw doraemon :-


from turtle import *



# Doraemon with Python Turtle

def ram(x, y):

    penup()

    goto(x, y)

    pendown()



def devil():

    fillcolor("#ffffff")

    begin_fill()


    tracer(False)

    a = 2.5

    for i in range(120):

        if 0 <= i < 30 or 60 <= i < 90:

            a -= 0.05

            lt(3)

            fd(a)

        else:

            a += 0.05

            lt(3)

            fd(a)

    tracer(True)

    end_fill()



def daari():

    ram(-32, 135)

    seth(165)

    fd(60)


    ram(-32, 125)

    seth(180)

    fd(60)


    ram(-32, 115)

    seth(193)

    fd(60)


    ram(37, 135)

    seth(15)

    fd(60)


    ram(37, 125)

    seth(0)

    fd(60)


    ram(37, 115)

    seth(-13)

    fd(60)



def mukh():

    ram(5, 148)

    seth(270)

    fd(100)

    seth(0)

    circle(120, 50)

    seth(230)

    circle(-120, 100)



def muflar():

    fillcolor('#e70010')

    begin_fill()

    seth(0)

    fd(200)

    circle(-5, 90)

    fd(10)

    circle(-5, 90)

    fd(207)

    circle(-5, 90)

    fd(10)

    circle(-5, 90)

    end_fill()



def nak():

    ram(-10, 158)

    seth(315)

    fillcolor('#e70010')

    begin_fill()

    circle(20)

    end_fill()



def black_devil():

    seth(0)

    ram(-20, 195)

    fillcolor('#000000')

    begin_fill()

    circle(13)

    end_fill()


    pensize(6)

    ram(20, 205)

seth(75)

    circle(-10, 150)

    pensize(3)


    ram(-17, 200)

    seth(0)

    fillcolor('#ffffff')

    begin_fill()

    circle(5)

    end_fill()

    ram(0, 0)



def face():

    fd(183)

    lt(45)

    fillcolor('#ffffff')

    begin_fill()

    circle(120, 100)

    seth(180)

    # print(pos())

    fd(121)

    pendown()

    seth(215)

    circle(120, 100)

    end_fill()

    ram(63.56, 218.24)

    seth(90)

    devil()

    seth(180)

    penup()

    fd(60)

    pendown()

    seth(90)

    devil()

    penup()

    seth(180)

    fd(64)



def taauko():

    penup()

    circle(150, 40)

    pendown()

    fillcolor('#00a0de')

    begin_fill()

    circle(150, 280)

    end_fill()



def Doraemon():

    taauko()


    muflar()


    face()


    nak()


    mukh()


    daari()


    ram(0, 0)


    seth(0)

    penup()

    circle(150, 50)

    pendown()

    seth(30)

    fd(40)

    seth(70)

    circle(-30, 270)


    fillcolor('#00a0de')

    begin_fill()


    seth(230)

    fd(80)

    seth(90)

    circle(1000, 1)

    seth(-89)

    circle(-1000, 10)


    # print(pos())


    seth(180)

    fd(70)

    seth(90)

    circle(30, 180)

    seth(180)

    fd(70)


    # print(pos())

    seth(100)

    circle(-1000, 9)


    seth(-86)

    circle(1000, 2)

    seth(230)

fd(40)


    # print(pos())


    circle(-30, 230)

    seth(45)

    fd(81)

    seth(0)

    fd(203)

    circle(5, 90)

    fd(10)

    circle(5, 90)

    fd(7)

    seth(40)

    circle(150, 10)

    seth(30)

    fd(40)

    end_fill()


    seth(70)

    fillcolor('#ffffff')

    begin_fill()

    circle(-30)

    end_fill()


    ram(103.74, -182.59)

    seth(0)

    fillcolor('#ffffff')

    begin_fill()

    fd(15)

    circle(-15, 180)

    fd(90)

    circle(-15, 180)

    fd(10)

    end_fill()


    ram(-96.26, -182.59)

    seth(180)

    fillcolor('#ffffff')

    begin_fill()

    fd(15)

    circle(15, 180)

    fd(90)

    circle(15, 180)

    fd(10)

    end_fill()


    ram(-133.97, -91.81)

    seth(50)

    fillcolor('#ffffff')

    begin_fill()

    circle(30)

    end_fill()

    # Doraemon with Python Turtle


    ram(-103.42, 15.09)

    seth(0)

    fd(38)

    seth(230)

    begin_fill()

    circle(90, 260)

    end_fill()


    ram(5, -40)

    seth(0)

    fd(70)

    seth(-90)

    circle(-70, 180)

    seth(0)

    fd(70)


    ram(-103.42, 15.09)

    fd(90)

    seth(70)

    fillcolor('#ffd200')

    # print(pos())

    begin_fill()

    circle(-20)

    end_fill()

    seth(170)

    fillcolor('#ffd200')

    begin_fill()

    circle(-2, 180)

    seth(10)

    circle(-100, 22)

    circle(-2, 180)

    seth(180 - 10)

    circle(100, 22)

    end_fill()

    goto(-13.42, 15.09)

    seth(250)

    circle(20, 110)

    seth(90)

    fd(15)

    dot(10)

    ram(0, -150)


    black_devil()


if __name__ == '__main__':

    screensize(800, 600, "#f0f0f0")

    pensize(3)

    speed(9)

    Doraemon()

    ram(100, -300)

    write('by professor', font=("Bradley Hand ITC", 30, "bold"))

    mainloop()


Output :


Code To Draw Superman Logo :-


import turtle #import the required package to draw the logo


t=turtle.Turtle() #set the variable ‘t’ to the function turtle.Turtle() to shorten the code throughout

turtle.Screen().bgcolor('navy') #set the color of the screen to navy to match Superman’s costume


def curve(value): #create a function to generate curves in turtle

    for i in range(value): #for loop to repeat the inputted value number of times 

        t.right(1) #step by step curve

        t.forward(1)


t.penup() #pen is in the up position so it will not draw

t.setposition(0,43) #move the pen to these x and y coordinates

t.pendown() #pen is in the down position so it will draw

t.begin_fill() #start filling in the shape

t.pencolor('black') #change the pen color to black

t.fillcolor('maroon') #change the shape fill color to maroon to match the Superman logo

t.pensize(3) #use a pen size of 3 to create a black border

t.forward(81.5) #the pen will move forward this number to start the shield of the logo

t.right(49.4) #rotate the pen right 49.4 degrees

t.forward(58) #move the pen forward by 58 

t.right(81.42) #rotate right by 81.42 degrees

t.forward(182) #move the pen forward by 182

t.right(98.36) #rotate the pen right by 98.36 degrees

t.forward(182) #move the pen forward by 182 

t.right(81.42) #rotate the pen by 81.42 degrees to the right

t.forward(58) #move the pen forward 58 

t.right(49.4) #rotate the pen to the right by 49.4

t.forward(81.5) #move the pen forward by 81.5 to meet the start at the top of the shield

t.end_fill() #complete the fill of the shield so the shape is closed off

t.penup() #pen will not draw 


t.setposition(38,32) #now to create the yellow parts of the Superman logo

t.pendown() #the pen is now poised to draw

t.begin_fill() #start a new shape 

t.fillcolor('gold') #change the fill color to gold to match the Superman logo

t.forward(13) #move the pen forward by 13

t.right(120) #rotate the pen right by 120 degrees

t.forward(13) #move the pen forward by 13

t.right(120) #rotate the pen right by 120 degrees

t.forward(13) #move the pen forward by 13

t.end_fill() #the small triangle on the right is now complete

t.penup() #stop the pen from drawing


t.setposition(81.5,25) #now to create the larger yellow part of the Superman logo, change the position of the pen

t.pendown() #the pen will now draw again

t.begin_fill() #the fill is still the same color set before

t.right(210) #rotate the pen right by 210 degrees

t.forward(25) #move the pen forward by 25

t.right(90) #rotate the pen right by 90 degrees

t.forward(38) #move the pen forward by 38

t.right(45) #rotate the pen right by 45 degrees

t.circle(82,90) #this function is used to draw a circle in turtle, the first integer is the radius and the second is the number of degrees of the circle drawn

t.left(90) #rotate the pen left by 90 degrees

t.circle(82,60) #create a circle of radius 82 and only complete 60 degrees of the circle 

curve(61) #call the curve function that was previously defined, pass an integer value equal to the length of the curve desired 

t.left(90) #rotate the pen left by 90 degrees

t.forward(57) #move the pen forward by 57

t.left(90) #rotate the pen left by 90 degrees

t.forward(32) #move the pen forward by 32

t.end_fill() #fill in the larger yellow part of the logo

t.penup() #stop drawing 

t.home() #reset the pen location to the origin so the orientation is also reset


t.setposition(-69,-38) #finish the major parts of the S superimposition on the shield

t.pendown()

t.begin_fill()

curve(20)

t.forward(33)

t.left(10)

t.circle(82,20)

curve(30)

t.forward(10)

t.right(110)

curve(40)

t.right(10)

t.circle(50,10)

curve(45)

t.right(5)

t.forward(45)

t.end_fill()

t.penup()

t.home()


t.setposition(20,-100)

t.pendown()

t.begin_fill()

t.right(135)

t.forward(27)

t.right(90)

t.forward(27)

t.right(135)

t.forward(38.18)

t.end_fill()

t.penup()

t.home()


t.setposition(-57,32)

t.pendown()

t.begin_fill()

t.right(180)

t.forward(18)

t.left(45)

t.forward(44)

t.left(80)

t.forward(15)

t.left(130)

curve(40)

t.forward(20)

t.end_fill()


t.hideturtle() #use this command to hide the turtle so it is not visible in the final image

turtle.exitonclick() #this command will leave the window open until it is clicked


Output :



For more join on telegram channel and follow on instagram. 

0
Share

 




Hack whatsapp user's sessions ( chat, camera, audio whatsapp sandbox storage, chat database) by Whatsapp Remote Code Execution exploit without touching victims phone just by sending a GIF image 🖼

👨‍🏫 PDF Tutoral Link -
📥 https://t.me/anonhacks/1453

Whatsapp GIF Attack Vectors


WhatsApp GIF hack can be executed by two ways
1. Local privilege escaltion (from a user app to WhatsApp): A malicious app is installed on
the Android device. The app collects addresses of zygote libraries and creates a
malicious GIF file that results in code execution in WhatsApp. This allows the malware
app to steal files from WhatsApp sandbox including message database.

2. Remote code execution: Pairing with an application that has a remote memory
information disclosure vulnerability, The attacker can collect the addresses of zygote
libraries and craft a malicious GIF file to send it to the user via WhatsApp (must be as an
attachment, not as an image through Gallery Picker as WhatsApp tries to convert media
files into MP4 and that would make your malicious GIF useless). As soon as the user
opens the Gallery view in WhatsApp, the GIF file will trigger a remote shell in WhatsApp
context.

Enjoy freaks👍

If you have any enquiries ping me on telegram or instagram. 
1
Share


Hello Freaks Anonymous here welcome to Anonhacks. Today I'm going to explain how to work with IP address during offline. So let's get into the topic. 

There is a module and lost file called GeoIP.dat. Usually Linux operating systems have this file pre-installed. In my case, Kali hasn't it pre-installed so i will tell you how to get this file and how to work with IPs offline.


1. Download The IP Database


Depending what you want to do you can download the database from here : https://www.miyuru.lk/geoiplegacy


I choose ipv4 db-ip-city.


sudo mkdir /usr/share/GeoIP/


sudo wget -N https://dl.miyuru.lk/geoip/dbip/city/dbip4.dat.gz -O /usr/share/GeoIP/GeoLite.dat.gz


sudo gunzip /usr/share/GeoIP/GeoLite.dat.gz


2. Install Python Module 


pip3 install pygeoip


3. Working with geoip


python3 # To start python3


import pygeoip

g = pygeoip.GeoIP("/usr/share/GeoIP/GeoLite.dat")

g.country_name_by_addr("205.185.223.142")


You can use different method to get information about an IP address.


Region Lookup 


g.region_by_addr("205.185.223.142")

g.region_by_name("google.com")


City Lookup 


g.record_by_addr("205.185.223.142")


Organization Lookup


g.org_by_name("dell.com")


Timezone Lookup


g.time_zone_by_addr("205.185.223.142")

g.time_zone_by_name("dell.com")


ISP Lookup


g.isp_by_name("dell.com")


ASN Lookup 


g.asn_by_name("dell.com")


Please note that if you get an error like : pygeoip.GeoIPError, then go for another geoip.dat from their website.


That's it, if you have any enquiries ping me on Telegram or Instagram. 

0
Share


MAC - It stands for Media Access Control and it is an identification number assigned to the Wi-Fi and network adapter.

 

A good thing is the fact this 12-digit number can be used for Whatsapp account hack. Obviously, you will need to find the number first. (U can get this by directly seeing victims phone or u can even hack that)

 

Anyway, if you want to know how to hack Whatsapp with this method, follow the steps we will mention below:

 

 

Step 1: Uninstall Whatsapp. It is a mandatory step but the app will be restored afterwards 

 

Step 2: Gain the MAC number. It is located in about the phone in settings of all operating systems. Go to about phone and write down the mac number.

 

Step 3: Change the mac address on your phone so Whatsapp "thinks’" it is being installed on an original device. This process is known as spoofing.

 

Step 4: Install a corresponding app. For iPhone, it is MacDaddy X and for Android, it is Terminal Emulator. All apps are free.

 

Step 5: Reinstall Whatsapp.

 

Step 6: Obtain confirmation code from the targeted device (the last time you need to use it).

 

Step 7: Restore the MAC number on your device.

 

Thats it..!

1
Share
Hey freaks! Anonhacks here. lets’s straight jump into the topic .There is a hole in WhatsApp that allows attackers with zero hacking and programming skills to permanently block any user’s account. They only need to know his phone number, and nothing else, and it is impossible to protect against potential blocking. The WhatsApp developers have been slow to fix the problem.WARNING All further steps were performed for educational and research purposes only. The author does not intend to harm any individuals privacy.All information is provided for informational and educational purposes only. The author is not responsible for any possible harm caused by the materials of this article.New flaw in WhatsAppEvery WhatsApp user can lose their profile at any second with a minimal chance of recovery. As Forbes writes, it is simply impossible to protect against this, and an attacker will not even need to hack the gadget — he just needs to know the user’s phone number, after which he can initiate the blocking procedure without the possibility of re-authorization in the system.Possibility to deprive any person to use WhatsApp — this is a consequence giant vulnerability discovered in the messenger information security specialists Luis Kartintero (Luis Carpintero) and Ernesto Perrin (Ernesto Canales Pereña). They notified the WhatsApp developers of their find, but they have not yet released a patch to fix the breach, leaving 2 billion users at risk of losing their account.WhatsApp does not protect users from blocking their profile in any way.WhatsApp is the most popular messenger in the world. According to Statista.com, in terms of the number of monthly active users in January 2021, it was ahead of Facebook Messenger (1.3 billion) and Chinese WeChat (1.21 billion) with its more than 2 billion, along with QQ (617 million) … Since February 2014, WhatsApp has been owned by Facebook.How the vulnerability worksThe vulnerability in WhatsApp allows a complete blocking of the victim’s account and is carried out in two very simple steps, at each of which the performer does not even need hacking or social engineering skills — he will not contact the owner of the profile at all.
At the first stage, the attacker just needs to install WhatsApp on the smartphone and try to log in with the desired phone number. The messenger will send an SMS with a confirmation code to him, and here it is calculated that the owner of the number will ignore them. After several such attempts, the application on the attacker’s device will report too frequent authorization attempts and will allow the next one only after 12 hours. At the same time, WhatsApp on the victim’s device will continue to work as before.

Notification about impossibility of authorization due to excessive number of attempts
At the second stage, the attacker registers a new email address and writes a letter to WhatsApp technical support, in which he says that his account has been lost or stolen. He asks to turn it off and indicates the victim’s number. WhatsApp can send an automatic email asking you to rewrite the number, and the attacker will do it.

Letter to WhatsApp technical support with a request to block
Further, WhatsApp, without making sure that the real owner of the account wrote to technical support, initiates the blocking procedure. After about an hour, the messenger will suddenly stop working on the victim’s device — she will see a message that her number is no longer registered in the system. “It could have happened because you registered it on another phone. If you have not done so, please confirm your phone number to log in to your account again, ”the notification will say.

WhatsApp reply with confirmation of the request
All of this will work even if the user has activated two-factor authentication. An attempt to request a new code will fail — WhatsApp will only allow you to do this after 12 hours.
Bonus stage and complete blocking
If the attacker decides to stop at the second stage, then everything will end with just the inability of the user to connect to WhatsApp with his number for several hours. After a maximum of 12 hours, the user will be able to regain control over his account and continue working in the messenger exactly as long as someone does not want to repeat the “trick” with blocking.
But in fact, there is an additional, third stage, leading to a complete blocking of the account.
This stage can actually become the second — the attacker does not have to send a letter in support of WhatsApp, he can simply wait 12 hours, and then again make several attempts to register someone else’s number on his phone. After the third 12-hour blocking, WhatsApp will break down, and instead of a timer counting down the time until the next authorization attempt, it will show “-1 second”, moreover, constantly. This is a glitch in the messenger that cannot be bypassed.

Hanging timer on the phones of the victim (left) and the attacker
This picture will be observed both on the hacker’s device and on the victim’s smartphone, and as a result, no one else will be able to log in to the messenger using this phone number. The only thing left is to try to contact WhatsApp technical support and look for solutions to the problem.
WhatsApp does not solve the problem
An article in Forbes shedding light on a new issue in WhatsApp was published on April 10, 2021. By April 13, 2021, the developers had not released an update that fixes it and did not set a timeline for its release.
Instead, they are preparing for the implementation of a new privacy policy, according to which the messenger will automatically transfer huge amounts of personal data of users to Facebook for better ad targeting.
WhatsApp intended to introduce this policy on February 8, 2021, but was forced to temporarily abandon this idea due to a barrage of criticism. The new date of its entry into force is May 15, 2021, and all those who are not going to agree with it will face a very serious punishment.
In February 2021, CNews wrote that those who disagree with the new WhatsApp privacy policy will no longer be able to send and receive text messages. The developers will leave them with only voice calls. Moreover, the profiles of those users who stop using WhatsApp and switch to other messengers are guaranteed to be completely deleted.
Other WhatsApp problems
WhatsApp is known not only for the fact that it is used by billions of people, but also for the fact that it does not always value its users. For example, in June 2020, it became known that some phone numbers associated with user profiles in WhatsApp had been in the public domain for a long time and even got into Google search results. In total, with the help of Google, it was possible to find up to the number of about 300 thousand messenger users, and this problem was of a global nature.

WhatsApp is still in first place in terms of the number of users
In November 2019, CNews reported that WhatsApp users were automatically permanently blocked for participating in harmless group chats. It turned out to be possible to fall under the sanctions for changing the name of the chat to something that would seem to the moderators of the service to be something sinister, illegal or malicious.
At the same time, WhatsApp was in no hurry to fix this failure. To all inquiries from victims about the reasons for the blocking, the messenger employees answered that the users themselves violated the rules of the service, and the blame for the blocking lies solely with them. As a result, people had to either change their phone number to register a new profile, or go to other services — Telegram, Viber, Signal and others.

Thanks for attention!
0
Share

 

College Name - > Tyler Junior College


STEP 1: This College Edu gives Github Student Pack without Student ID Card Verification


STEP 2: Use USA IP to Apply to College


STEP 3: College Reply time varies between 24 hours and 72 hours


STEP 4: So You need to be patient and wait for the Edu Email to come


STEP 5:After you receive the confirmation letter from the college then in the confirmation letter you will find something called the A-Number.

STEP 6:Then open the website(https://myapacheaccess.tjc.edu/) in any browser and enter your A-Number in username.


STEP 7:For the password you need to enter TJC followed by MMDDYY.


Here MM = Birth Month DD = Birth Date YY= Last Two Digits of Birth Year


STEP 8: Once you login to the website you will find a opton called 'Email' .


STEP 9: Click on that option and then you will be redirected to Gmail where you can see that you have been logged into the Edu Email.


STEP 10: For getting Github go to github.com and click create account.


STEP 11: In the email section enter the edu emails username(find it in gmail tab) followed by @Email.tjc.edu.Then put your preferred username and password.


STEP 12: Now go to education.github.com/offers and click 'I am a student' and you will find student application page.


STEP 13:You will find Green Tick next to College Name and when you click Continue/Apply.


STEP 14: You will find that Github Student Pack is directly activated and you can easily use all the benefits of the Pack.


Video tutorial : https://youtu.be/P39JKfxnvtc

0
Share
Older Posts Home

Follow On

  • facebook
  • instagram
  • Telegram

Search This Blog

  • February 2022 (2)
  • January 2022 (2)
  • June 2021 (2)
  • May 2021 (7)
  • April 2021 (12)
  • March 2021 (6)
  • February 2021 (4)
  • January 2021 (4)
  • December 2020 (2)
  • August 2020 (17)

Hidden WIKI

Search results

Translate

About Me

My photo
Admin
View my complete profile

Top 10 Reasons Why Python is So Popular and Why You Should Learn Python

  Every decade brings a new programming language that sweeps developers off their feet. One of the most popular and in-demand programming la...

Link List

  • instagram
  • Telegram

Popular Posts

  • [100% Worked] The easiest way to get Ultimate Express VPN for 30Days 1Month Trial
     Step 1:Go to this url Click this One and take one email something like begin with @email.edu.pl and copy it. Step 2:You have to go this u...
  • ⚜What is an ORM?
     ⚜What is an ORM?  🛡ORM stands for Object Relational Mapper. It allows you to create and manage your databases easily using models. 🔱A typ...
  • Hack WhatsApp By Sending a Link
     INTRODUCTION WhatsApp has become an important part of billions of people’s life. Many of us woke up or go to bed, by checking our WhatsApp ...
Copyright © 2019 AnonHacks

Created By Anonymous Shared By Ramkishore