Aswajith JACCESS CONTROLAccess Control is like setting rules or limits to decide who can and cannot do certain things or access certain files (even paths). [ Just…Jan 8Jan 8
Aswajith JFILE PATH TRAVERSAL / DIRECTORY TRAVERSALFile path traversal is also known as Directory Traversal. File path traversal is an HTTP exploit allowing hackers to access data in the…Jan 7Jan 7
Aswajith JACCESS LOG ANALYZER REPORThttps://github.com/aswajith14cybersecurity/Streamlit/tree/mainJun 14, 2023Jun 14, 2023
Aswajith JHow to change Kali-Linux lock-screen wallpaper…In this article, we will change our kali linux lock wallpaper. We have two options to change the wallpaper.Apr 3, 2023Apr 3, 2023
Aswajith JNew Golang Ransomware “Agenda”The new ransomware “Agenda” is written in the Go language. while Golang is still a popular programming language for ransomware including…Sep 1, 2022Sep 1, 2022
Aswajith JDogWalk Vulnerability is Finally Patched !!DogWalk was first discovered on December 22, 2019, at that time Microsoft didn’t consider this as a vulnerability. In Jan 2020 DogWalk was…Aug 13, 2022Aug 13, 2022
Aswajith JLinux Fundamentals Part 1 -TryHackMe WriteupEmbark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal.Aug 10, 2022Aug 10, 2022
Aswajith JOpenVAS — Tryhackme WalkthroughLearn the basics of threat and vulnerability management using Open Vulnerability Assessment scanningJul 27, 2022Jul 27, 2022