Latest — Jul 4, 2022 A Guide to Mocking in Rust using Mockall Mockall is a fantastic library that provides all the required tools for mocking in Rust.
A Complete Guide To Regular Expressions Regular expression is a powerful tool that helps extract data from text including documents, system logs, and code. In this article, we will look at working with regular expressions in detail.
PanDas in Depth— Building Flexible DataFrames Pandas is a Python package that helps you to easily work with large datasets while building a machine learning model.
A Complete Walkthrough Of AWS DynamoDB Introducing Amazon DynamoDB, the fully managed, scalable, and secure NoSQL database from Amazon Web Services.
Web Server Scanning With Nikto - An Introduction Nikto is an open-source scanner that helps find vulnerabilities in web servers. You can scan your web apps for vulnerabilities like misconfigured services, dangerous files, and thousands of other potential security issues using Nikto.
Social Engineering — The Art Of Hacking Humans Social engineering is the technique by which an attacker can make a person do something that is not usually in their best interest. In this article, we will look at a few common ways Social Engineers try to manipulate you.
Numpy Crash Course — Building Powerful n-Dimensional Arrays with NumPy Numpy is a python library for performing large scale numerical computations. It is extremely useful, especially in machine learning. Let's look at what Numpy has to offer.
WiFi Hacking — Securing Wifi Networks With Aircrack-NG Aircrack comprises of a suite of tools that help you attack as well as defend wireless networks. Let's look at what Aircrack has to offer.
Penetration Testing — All The Terms You Need To Know Cybersecurity has its fair share of jargon. This article will help you understand some of the common terms you will come across as a security engineer.
Ethical Hacking Lifecycle —Five Stages Of A Penetration Test Penetration testing is the process of exploiting an organization’s network to help defend it better. Here are five steps involved in a successful penetration test.