Published inTDS ArchiveIntegrating Tensorflow and Qiskit for Quantum Machine LearningTaking a step towards quantum machine learning…Aug 13, 20201Aug 13, 20201
Published inInfoSec Write-upsPython HTTP Based Trojan for Remote System Forensics and Privilege TransferCompromising system configurations, browser histories, emails, and more.Jul 17, 2020Jul 17, 2020
Published inAnalytics VidhyaSniffing a system from outside a network: TCP reverse shell + ARP poisoning using ScapyUsing Scapy in Python to discover and compromise nodes from outside the target network.Jun 30, 20201Jun 30, 20201
Published inThe StartupPython TCP reverse shell: compromising a Kali machine using a MacGeneral from-scratch guide in Python to compromise any two separate hosts.Jun 21, 2020Jun 21, 2020
Published inTDS ArchiveAnomaly detection in dynamic graphs using MIDASAn interesting approach to modelling network securityMar 8, 2020Mar 8, 2020
Published inThe StartupCreating a simple router simulation using Python and socketsA simple guide to understanding router functionality by simulating one!Dec 10, 20191Dec 10, 20191
Published inTDS ArchiveCreating a Quantum Walk with a Quantum CoinAn intuition behind discrete quantum walks and their roots in classical walksMay 6, 2019May 6, 2019
Published inTDS ArchiveData analytics with MODIS dataDemystifying methods to handle geospatial dataApr 22, 20196Apr 22, 20196
Published inTDS ArchiveUnderstanding basics of measurements in Quantum ComputationAn intuitive explanation of general and projective measurements and POVMsApr 8, 20191Apr 8, 20191
Published inTDS ArchiveProbability Theory for Deep LearningA very quick introduction to building a foundation in probability theory for understanding machine/deep learningMar 3, 2019Mar 3, 2019