Hyper-Advanced Parameter Tuning Using Machine Learning and PythonIn the world of machine learning, model performance hinges on the selection of hyperparameters. Whether you’re training a simple linear…Oct 4, 2024Oct 4, 2024
Adult Salary Prediction Using Python and Machine LearningPredicting whether an individual’s salary exceeds a certain threshold is a common classification problem in data science. It is widely used…Oct 3, 2024Oct 3, 2024
$70,000 bounty given by google to a hacker who accidentally bypass google pixel screen lockwritten by = anshul vyasNov 10, 2022Nov 10, 2022
Published inInfoSec Write-upsSQL Injection: An Overviewwritten by = anshul vyasOct 22, 2022Oct 22, 2022
Published inCodeXDucktail MalwareDucktail Malware is a malware that recently originated in Vietnam a few years ago. It has been around since 2021 as per the reportsOct 21, 2022Oct 21, 2022
Published inGeek CultureRatMilad Malware: Introduction, Capabilities, Detection and RemovalA new Android spyware called RatMilad has been discovered by researchers at the security company Zimperium Labs.Oct 15, 2022Oct 15, 2022
Published inInfoSec Write-upsCVE-2022–41040: ProxyNotShell Exchange VulnerabilityWritten by: anshul vyasOct 15, 2022Oct 15, 2022
Published inGeek CultureDarknet- Crossing the Virtual LineThe word “Dark Web” just sounds a little ominous because it is ominous. Written by anshul vyasOct 15, 2022Oct 15, 2022
Published inInfoSec Write-upsSSH: Introduction, How to Secure and WorkingIntroduction, How to Secure and working of a secure shellOct 15, 20221Oct 15, 20221
Published inInfoSec Write-upsHarley Malware: New Attack on Android DevicesThere has been a recent surge in Harley malware targeting Android users, which was first found on Samsung, Huawei, and Google phonesOct 10, 2022Oct 10, 2022
Published inInfoSec Write-upsCVE-2022–40684: New Authentication Bypass Affecting FortiGate and FortiProxyFortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access.Oct 8, 2022Oct 8, 2022
Published inNerd For TechBinance blockchain hit: exposing crypto vulnerabilitiesWritten by: anshul vyasOct 8, 2022Oct 8, 2022
Published inInfoSec Write-upsBrowser in the Browser AttackA Browser-in-the-Browser(BiTB) attack simulates a login window with a spoofed domain within a parent browser window to steal credentials.Oct 8, 2022Oct 8, 2022
Published inNerd For TechHacker101: A little Something to get you Started WalkthroughHello everyone, welcome to the SecPy Community. We are onto a series where we share the methodologies of the CTFs from HackerOne. CTFs are…Oct 1, 2022Oct 1, 2022
Published inInfoSec Write-upsCVE-2022–35405: Critical ManageEngine RCEWritten by: anshul vyasOct 1, 2022Oct 1, 2022
Published inGeek CultureSwachhata Platform Data Leak: 1.6 Cr People’s Credentials At RiskWritten by: anshul vyasSep 29, 2022Sep 29, 2022
Published inInfoSec Write-upsCVE-2022–27492: An integer underflow in WhatsApp causing remote code execution when receiving a…Written by: anshul vyasSep 28, 2022Sep 28, 2022
Published inInfoSec Write-upsCVE-2022–36934: An integer overflow in WhatsApp leading to remote code execution in an established…Written by: anshul vyasSep 27, 2022Sep 27, 2022