Research Core: In-Depth Insights and Academic Exploration
The Research Core combines academic findings, contextual analyses, and curated resources in a structured, research-focused format for continuous learning and exploration.
The Research Core combines academic findings, contextual analyses, and curated resources in a structured, research-focused format for continuous learning and exploration.
Group 3 was contracted to perform a risk assessment of the SplitPay system and its various components.
One of the most high-profile pieces of malware in the current threat landscape—studied here via TCPDUMP of infected traffic.
Perform Nessus scans on OWASP BWA and DVWA, identify vulnerabilities and propose countermeasures.
A practical solution that leverages neural networks, image processing, and AI to reduce crime risk and accurately identify offenders.
Discussing my thoughts on the paper 'Reflections on Trusting Trust', both in terms of the technical aspect, and Thompson's feelings about hackers.
A Google Dork that locates publicly exposed .log files containing password strings for common email services since 2015.
My reflections on Saltzer and Schroeder’s “The Protection of Information in Computer Systems
Attached is a capture file collected from Wi-Fi network. This capture contains information exchanged during authentication. The capture contains the password in hashed format. Use the hashcat tool to recover the Wi-Fi passwords.
© Anurodh Acharya Since @ 2025. All rights reserved.