-
FTP and how to Pentest FTP
FTP stands for File Transfer Protocol. It is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. FTP is commonly used…
-
AI Threat Modeling
AI threat modeling is a specialized approach to identifying and mitigating security threats and vulnerabilities in artificial intelligence (AI) systems. It focuses on understanding the unique risks associated with AI technologies, which can…
-
What is OWASP Top10 and How It Works.
The OWASP Top Ten is a widely recognized and regularly updated document that lists the top ten most critical web application security risks. OWASP, which stands for the Open Web Application Security Project,…
-
Secure SDLC
It has always has been the way, when we think of Security after we have been Compromised. Then why not think of Security during the building phase of an application. This is where…
-
Python : SSL Version Scanner
Python package to find SSL/TLS version of a Host. You can modify the script for host, and get the SSL/TLS version number in order to find their vulnerabilities. Follow this below link, to…
-
How to build python package and keep your sanity
Python is a cool language, we can do near to everything, whether to run a Hello World to developing a tool. Here we’ll see how to create your own sample python package in…