Posts by Tag

2FA

ARM

Using Ropper to find ROP Gadgets

5 minute read

To exploit using ret-to-libc or ROP, we need approprate gadgets and their addresses. In this post, we will learn how to use it to extract these gadget inform...

AWS

Adsense

Algorithm

Amazon Web Service

Analytics

Android

Article writing

Artificial Intelligence

Arxiv

Austin

Awareness

Backdoor

Write a Backdoor in Python

4 minute read

Backdoors are a typical way of accessing a computers resources through command line without any sort of authentication. This type of remote access is difficu...

Balena Cloud

Balena OS

Bangladesh

Bangladeshi Students Abroad

Best Practices

Bibtex

Biking

Blog

Bruteforcing

Buffer Overflow

Using Ropper to find ROP Gadgets

5 minute read

To exploit using ret-to-libc or ROP, we need approprate gadgets and their addresses. In this post, we will learn how to use it to extract these gadget inform...

CV

Camping

Canva

Cashback

Cent OS

Charts

Line Plotting using Latex PGFPlots

2 minute read

In this post I have added example codes and a short explanation on how to draw line plots using latex. All codes and outputs are available in the Overleaf Do...

Creating Bar Charts using Python Matplotlib

3 minute read

Python Bar Plots Matplotlib is the most usual package for creating graphs using python language. Here, in this tutorial we will see a few examples of python ...

Classification

Climbing

Codes

Collection

Computer Network

Computer Nework

Conda

Convolutional Neural Network

CoronaVirus

Covid-19

Cyber Security

Cyber Threat

Data Science

Data Structure

Deep Neural Network

Deep-learning

DevOps

Introduction to the DevOps Concept

2 minute read

Devops is a set of practices that combine both software development and IT operations by automating all processes in a optimized manner. Devops includes the ...

DevSecOps

Introduction to the DevOps Concept

2 minute read

Devops is a set of practices that combine both software development and IT operations by automating all processes in a optimized manner. Devops includes the ...

Dictionary

Dictionary Attack

Django

Documentaries

Documentation

Mathematics Documentation in Latex

1 minute read

Writing mathematics in Latex seems to be a bit difficult at first. However, here I compiled a short summary on how you can write good mathematical expression...

Line Plotting using Latex PGFPlots

2 minute read

In this post I have added example codes and a short explanation on how to draw line plots using latex. All codes and outputs are available in the Overleaf Do...

Latex Resources in a Nutshell

1 minute read

Latex Editors Online There are several latex editors available online. However, none of the other ones are as powerful and trusted as Overleaf. Overleaf come...

EC2

EDR

Evernote

Exploitation

Using Ropper to find ROP Gadgets

5 minute read

To exploit using ret-to-libc or ROP, we need approprate gadgets and their addresses. In this post, we will learn how to use it to extract these gadget inform...

Facebook-Comments-Plugin

File Infection

Write a Simple Virus in Python

6 minute read

Sometimes we find our files being infected with a computer virus. In this tutorial, we will get introduced to the concept of a virus by writing a simple one ...

Fingerprinting

Flask

Framework

Galveston

A few hours in the Galveston Beach

less than 1 minute read

It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...

Game Theory

Git

Git Commands

Github

Github-Pages

Grad Student

Graphs

Line Plotting using Latex PGFPlots

2 minute read

In this post I have added example codes and a short explanation on how to draw line plots using latex. All codes and outputs are available in the Overleaf Do...

Creating Bar Charts using Python Matplotlib

3 minute read

Python Bar Plots Matplotlib is the most usual package for creating graphs using python language. Here, in this tutorial we will see a few examples of python ...

Hangout

Hardware

Hashtable

Higher Study

Houston

A few hours in the Galveston Beach

less than 1 minute read

It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...

IEEE Access

IEEE Template

Incident Response

Installation

Instance

Intelligent Agent

Itertools

Useful Functions of Python Itertools Module

4 minute read

Python itertools module provide memory-efficient solutions for producing complex iterators. It is quite useful in different situations where it provides func...

Javascript

Jekyll

Julia

Keylogger

A Basic Keylogger in Python

2 minute read

Keylogger is a simple yet effective program that can monitor a person’s keyboard activities. It can be used to spy on a person’s data (browsing activities, u...

Keylogging

A Basic Keylogger in Python

2 minute read

Keylogger is a simple yet effective program that can monitor a person’s keyboard activities. It can be used to spy on a person’s data (browsing activities, u...

Kivy

Latex

Mathematics Documentation in Latex

1 minute read

Writing mathematics in Latex seems to be a bit difficult at first. However, here I compiled a short summary on how you can write good mathematical expression...

Line Plotting using Latex PGFPlots

2 minute read

In this post I have added example codes and a short explanation on how to draw line plots using latex. All codes and outputs are available in the Overleaf Do...

Latex Resources in a Nutshell

1 minute read

Latex Editors Online There are several latex editors available online. However, none of the other ones are as powerful and trusted as Overleaf. Overleaf come...

How to write algorithm in Latex

1 minute read

While writing any research article in Latex, so often we demonstrate an algorithm according to our proposed model, workflow or architecture.

How to add subfigure in Latex

1 minute read

In research articles, we need to add subfigures often. To create subfigure in latex, you can use both \begin{minipage}...\end{minipage} and \begin{subfigure}...

Linux

Lstlisting

Machine Learning

Machine-learning

Malware

Write a Worm (Malware) in Python

4 minute read

Worm is type of malware that replicates itself and other files to consume spaces in our hard drives. You may find your drives or partitions get full without ...

Write a Backdoor in Python

4 minute read

Backdoors are a typical way of accessing a computers resources through command line without any sort of authentication. This type of remote access is difficu...

Markdown

Math

Mathematicians

Mathematics

Mathematics Documentation in Latex

1 minute read

Writing mathematics in Latex seems to be a bit difficult at first. However, here I compiled a short summary on how you can write good mathematical expression...

Matplotlib

Minimal Mistakes

Minimal-mistakes

Mininet

Mobile App

Movies

Multi-class Classification

Multi-factor Authentication

Nash Equilibrium

Neural Network

News and Updates

Numpy

OS Fingerprinting

Offer

Open Stack

OpenCV

Overleaf

PGFPlot

Pandas

Pandemic

Passive Reconnaissance

Password

Password Cracking

Personal Security

PhD

PhD Life

Projects

Publication

Publish

Python

Write a Worm (Malware) in Python

4 minute read

Worm is type of malware that replicates itself and other files to consume spaces in our hard drives. You may find your drives or partitions get full without ...

Write a Simple Virus in Python

6 minute read

Sometimes we find our files being infected with a computer virus. In this tutorial, we will get introduced to the concept of a virus by writing a simple one ...

Write a Backdoor in Python

4 minute read

Backdoors are a typical way of accessing a computers resources through command line without any sort of authentication. This type of remote access is difficu...

A Basic Keylogger in Python

2 minute read

Keylogger is a simple yet effective program that can monitor a person’s keyboard activities. It can be used to spy on a person’s data (browsing activities, u...

Useful Functions of Python Itertools Module

4 minute read

Python itertools module provide memory-efficient solutions for producing complex iterators. It is quite useful in different situations where it provides func...

Matrix Operations in Python Numpy

2 minute read

We often perform matrix operations in python. In this post, we will take a look at the simple matrix operations in Python.

Creating Bar Charts using Python Matplotlib

3 minute read

Python Bar Plots Matplotlib is the most usual package for creating graphs using python language. Here, in this tutorial we will see a few examples of python ...

QRCode

R Language

Rakuten

Raspberry Pi

Recurrent Neural Network

Red Hat

Referrel

Reinforcement-learning

Research

ResearchGate

Resources

Mathematics Documentation in Latex

1 minute read

Writing mathematics in Latex seems to be a bit difficult at first. However, here I compiled a short summary on how you can write good mathematical expression...

Latex Resources in a Nutshell

1 minute read

Latex Editors Online There are several latex editors available online. However, none of the other ones are as powerful and trusted as Overleaf. Overleaf come...

Resume

Ret-to-libc

Reverse Proxy

Review

Ryu

SDN

SIEM

SOAR

Scientists

Seaborn

Security

Security Games

Sharelatex

Shell Programming

Shellcode

Using Ropper to find ROP Gadgets

5 minute read

To exploit using ret-to-libc or ROP, we need approprate gadgets and their addresses. In this post, we will learn how to use it to extract these gadget inform...

Simulation

Snippets

Socket Programming

StackEdit

Stackelberg Game

State Park

Static IP

Survey

Syntax

SysAdmin

System Administration

Table

Tables

Taxonomy

Template

Texas

A few hours in the Galveston Beach

less than 1 minute read

It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...

Threat Intelligence

Tikz

Tips and Tricks

To-do list

Traffic Analysis

Travel

A few hours in the Galveston Beach

less than 1 minute read

It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...

Travel Grant

Trojan Horse

Write a Backdoor in Python

4 minute read

Backdoors are a typical way of accessing a computers resources through command line without any sort of authentication. This type of remote access is difficu...

A Basic Keylogger in Python

2 minute read

Keylogger is a simple yet effective program that can monitor a person’s keyboard activities. It can be used to spy on a person’s data (browsing activities, u...

Tutorial

Introduction to the DevOps Concept

2 minute read

Devops is a set of practices that combine both software development and IT operations by automating all processes in a optimized manner. Devops includes the ...

Write a Worm (Malware) in Python

4 minute read

Worm is type of malware that replicates itself and other files to consume spaces in our hard drives. You may find your drives or partitions get full without ...

Write a Simple Virus in Python

6 minute read

Sometimes we find our files being infected with a computer virus. In this tutorial, we will get introduced to the concept of a virus by writing a simple one ...

Write a Backdoor in Python

4 minute read

Backdoors are a typical way of accessing a computers resources through command line without any sort of authentication. This type of remote access is difficu...

A Basic Keylogger in Python

2 minute read

Keylogger is a simple yet effective program that can monitor a person’s keyboard activities. It can be used to spy on a person’s data (browsing activities, u...

Useful Functions of Python Itertools Module

4 minute read

Python itertools module provide memory-efficient solutions for producing complex iterators. It is quite useful in different situations where it provides func...

Matrix Operations in Python Numpy

2 minute read

We often perform matrix operations in python. In this post, we will take a look at the simple matrix operations in Python.

Using Ropper to find ROP Gadgets

5 minute read

To exploit using ret-to-libc or ROP, we need approprate gadgets and their addresses. In this post, we will learn how to use it to extract these gadget inform...

Line Plotting using Latex PGFPlots

2 minute read

In this post I have added example codes and a short explanation on how to draw line plots using latex. All codes and outputs are available in the Overleaf Do...

Creating Bar Charts using Python Matplotlib

3 minute read

Python Bar Plots Matplotlib is the most usual package for creating graphs using python language. Here, in this tutorial we will see a few examples of python ...

How to write algorithm in Latex

1 minute read

While writing any research article in Latex, so often we demonstrate an algorithm according to our proposed model, workflow or architecture.

How to add subfigure in Latex

1 minute read

In research articles, we need to add subfigures often. To create subfigure in latex, you can use both \begin{minipage}...\end{minipage} and \begin{subfigure}...

Two-factor Authentication

Two-step Verification

USA

A few hours in the Galveston Beach

less than 1 minute read

It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...

Ubuntu

VSCode

Virus

Write a Worm (Malware) in Python

4 minute read

Worm is type of malware that replicates itself and other files to consume spaces in our hard drives. You may find your drives or partitions get full without ...

Write a Simple Virus in Python

6 minute read

Sometimes we find our files being infected with a computer virus. In this tutorial, we will get introduced to the concept of a virus by writing a simple one ...

Visualization

Web Application

Wireshark

Worm

Write a Worm (Malware) in Python

4 minute read

Worm is type of malware that replicates itself and other files to consume spaces in our hard drives. You may find your drives or partitions get full without ...

YubiKey

agile

Introduction to the DevOps Concept

2 minute read

Devops is a set of practices that combine both software development and IT operations by automating all processes in a optimized manner. Devops includes the ...

aws

Introduction to the DevOps Concept

2 minute read

Devops is a set of practices that combine both software development and IT operations by automating all processes in a optimized manner. Devops includes the ...

career

checklist

collaboration

credit card

credit journey

crypto

cv2

cvlib

directory

education

el capitan

email writing

github-pages

hashlib

image

iterator

Useful Functions of Python Itertools Module

4 minute read

Python itertools module provide memory-efficient solutions for producing complex iterators. It is quite useful in different situations where it provides func...

life hacks

matplotlib

matrix

matrix operations

Matrix Operations in Python Numpy

2 minute read

We often perform matrix operations in python. In this post, we will take a look at the simple matrix operations in Python.

md5

numpy

Matrix Operations in Python Numpy

2 minute read

We often perform matrix operations in python. In this post, we will take a look at the simple matrix operations in Python.

object detection

opencv

p0f

pandas

paper writing

pgfplot

pycrypto

python functions

Useful Functions of Python Itertools Module

4 minute read

Python itertools module provide memory-efficient solutions for producing complex iterators. It is quite useful in different situations where it provides func...

python modules

Useful Functions of Python Itertools Module

4 minute read

Python itertools module provide memory-efficient solutions for producing complex iterators. It is quite useful in different situations where it provides func...

Matrix Operations in Python Numpy

2 minute read

We often perform matrix operations in python. In this post, we will take a look at the simple matrix operations in Python.

remote login

sha256

skill development

solo

ssh

sysadmin

Introduction to the DevOps Concept

2 minute read

Devops is a set of practices that combine both software development and IT operations by automating all processes in a optimized manner. Devops includes the ...

tikz

tips and tricks

tutorial

visualization

yosemite