top of page
Vishwanath Akuthota
Oct 11, 20237 min read
WiFi Deauthentication Attacks Using Kali Linux
Deauthentication Attack
8270
Vishwanath Akuthota
Oct 9, 20234 min read
What is NMap and Cheat Sheet
In the ever-evolving world of cybersecurity and network management, having the right tools in your arsenal is crucial.
50
Vishwanath Akuthota
Sep 26, 20233 min read
Adversarial Attacks in Machine Learning: Understanding Impact and Mitigation Strategies
Adversarial Attacks in Machine Learning
100
Vishwanath Akuthota
Sep 5, 20233 min read
How Intrusion Detection Systems (IDS) Can Help Your Organisation
Intrusion detection systems (IDSs) are an essential part of any organisations cybersecurity arsenal. They can help to detect and prevent...
140
Vishwanath Akuthota
Jul 21, 20232 min read
Safeguarding Large Language Models: Understanding and Mitigating Potential Attacks
Large language models have revolutionized the field of Natural Language Processing (NLP) and Artificial Intelligence (AI), empowering us...
70
Vishwanath Akuthota
Jun 14, 20221 min read
An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro,...
2450
Drpinnacle
Jun 30, 20203 min read
Investigating client view of erasure in versatile texting applications
Contemporary portable informing gives rich content and sight and sound usefulness leaving detailed trails of touchy client data that can...
510
bottom of page