Harsh VanasiwalaLeveraging AI for Finding Security Controls on CVEsEfficient and precise identification of security controls is critical in the field of cybersecurity. Automating this process through the…Aug 26Aug 26
Harsh VanasiwalaIntegrating AI with OSINT: Ethical Use and Practical ApplicationsAI technologies are perfect for OSINT operations because they can handle large volumes of data quickly and accurately. Here are a few…Aug 25Aug 25
Harsh VanasiwalaNavigating the Cybersecurity Landscape: Ensuring Game Security in the Age of Advanced Anti-Cheat…Let's Understand, What is Anti-Cheat?Aug 21Aug 21
Harsh VanasiwalaGoogle Dorking: A Powerful Technique for Cybersecurity ProfessionalsGoogle Dorking, may also referred to as Google Hacking. It is a very powerful method that uses search operators to get access to sensitive…Jul 18Jul 18
Harsh VanasiwalaShodan Automation using PythonLink to Shodan: https://www.shodan.io/ Note: Shodan should be used ethically and for educational purposes only. Ethical abuse can lead to…Jul 141Jul 141
Harsh VanasiwalaPython for CybersecurityHello, I am Harsh Vanasiwala a cyber security student with focus on Threat Intelligence, Open-Source Intelligence, Digital Forensics and…Apr 24, 2023Apr 24, 2023