From Human to Machine Language, and coming back…


⨀ I write stories and code, not in the same order always.

⨀ Besides writing stories, Scientific study of languages – human and machine – both, is my hobby.

⨀ If you want to read my blog please use this…






I’m working on a thriller currently.


I have written few books – mainly on technology – so far. It covers a wide range of subjects that include Ethical hacking, PHP, Laravel – one of the most popular PHP framework, and Python.

Here are some glimpses of those books.


Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.
Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.

What You Will Learn

    Discover the legal constraints of ethical hacking
    Work with virtual machines and virtualization
    Develop skills in Python 3
    See the importance of networking in ethical hacking
    Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more

Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.



Beginning Laravel

Learn about dependency injection, interfaces, service providers, SOLID design, and more with practical and real-world code examples. This book covers everything you need to get started in application development with Laravel 5.3. Beginning Laravel covers features such as method injection, contracts, and authentication.

After reading this book, you can develop any application using Laravel 5. It details all you need to know, including the model-view-controller pattern, SQLite databases, routing, authorization, and building CRUD applications.

What You Will Learn

    Work with the new Laravel framework and its new features
    Develop web applications with Laravel
    Absorb the concepts of authentication and database migration
    Manage databases with Eloquent ORM
    Use middleware, contracts, and facades



PHP 7 : Object Oriented Study of Design Patterns

PHP 7 – is kind of a revolution in the way that delivers enormous power to everything from websites and mobile to enterprises and the cloud. This is the most important change for PHP since the release of PHP 5 in 2004. It has brought explosive performance improvements, drastically reduced memory consumption, and a host of brand-new language features to make your applications soar. This book makes you ready to take that revolution under your wing by explaining the design patterns in an object oriented way.


Hacking Python 3: A Guide to Scanning, Networking, Information Gathering

Have you seen the film “The Matrix Reloaded”? Well, if you had seen you would have probably recalled the scene where the character Trinity was seen using NMAP to hack the system of a power plant.

This book is all about Scanning, Networking and Information Gathering with the help of Python programming language and by the way teaches you major steps of Ethical Hacking.


Hacking: Reconnaissance

Reconnaissance or Footprinting covers almost ninety percent of hacking activity! Although it’s passive, it’s the key factor in any attack on a specific target. Without knowing the finer nuances of reconnaissance you cannot make the next move. In most cases search engines are your best friends. For that there is a separate chapter on ‘Google Hacking’.
The reconnaissance tool NMAP has been covered in the book in detail. The design of this book stands as a gateway to the world of Ethical Hacking. Contents: Prologue Part One: True Hacking What Hackers Want to Do? Hacking Conceptions Protect Anonymity on Internet How can you solve this problem? Dark Web and TOR Hidden Wikipedia Examples of Hacking Snooping RansomWare Hostage situation Tactics employed by Ransomware RansomWare, Part Two How can I save my SOUL? What Next? Secure Network Design The Back-Stabber What about amputation? Beginner’s FAQ on Hacking Hacker versus Cracker Role of Ethical Hackers Legal Side of Hacking Color of Hats White Hat Black Hat Gray Hat Does the Color Matter?
Virtual Box Anonymity on Internet How you solve this problem? Part Two Reconnaissance Basic Reconnaissance Our First Knowledge Google Hacking Other Tools Domain and Hostname Email Tracking Internet Archive Passive Information Web Spiders NMAP and Footprinting Scanning Footprinting NMAP and Linux Commands Finding Location.

Amazon Page

Leanpub Page