Tutorials

All the articles under tutorials.

Machine Learning Tutorials Repository – Unlocking The Power Of AI Learning

Welcome to the Machine Learning Tutorials Repository! This is the go-to spot for all the code associated with my Twitter tutorials.…

3 weeks ago

Ghidra Script Mastery – Managing And Automating With GhidraScripts For Golang

Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known…

7 months ago

Burp Suite Tutorial – A Web Application Penetration Testing Tool – Beginners Guide

In this Burp Suite Tutorial, we are going to elaborately describe the Burp Suite tool and its features that are…

1 year ago

Metasploit Framework – A Beginner’s Guide for Penetration Testing & Exploit Development

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a…

1 year ago

Whatweb – A Scanning Tool to Find Security Vulnerabilities in Web App

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify…

1 year ago

Fantastic Storage Solutions for Tech Companies

Running a tech company can leave you with a lot of clutter. Trailing wires, old devices, paperwork, and filing cabinets…

4 years ago

What to Look for in the Right SOC Program – A Complete Guide

SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter…

5 years ago

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in…

6 years ago

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…

6 years ago

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used…

6 years ago