DEV Community

Mohana Vamsi profile picture

Mohana Vamsi

404 bio not found

Joined Joined on  github website
Artificial Intelligence and Ethical Hacking

Artificial Intelligence and Ethical Hacking

2
Comments
1 min read

Want to connect with Mohana Vamsi?

Create an account to connect with Mohana Vamsi. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
AI in Fighting Phishing

AI in Fighting Phishing

Comments
1 min read
AI in Cybersecurity - The Double-Edged Sword

AI in Cybersecurity - The Double-Edged Sword

Comments
1 min read
Password Hashing in Python

Password Hashing in Python

Comments 1
1 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
Basic Network Scanner

Basic Network Scanner

Comments
1 min read
SQL Injection Tester

SQL Injection Tester

Comments
1 min read
Brute Force Web Login Tester

Brute Force Web Login Tester

Comments
1 min read
Simple Wap Scraper for Sensitive Information

Simple Wap Scraper for Sensitive Information

Comments
1 min read
Keylogger

Keylogger

Comments
1 min read
HTTP Request Header Analyzer

HTTP Request Header Analyzer

Comments
1 min read
Network Packet Sniffer

Network Packet Sniffer

Comments
1 min read
Basic Encryption/Decryption Tool

Basic Encryption/Decryption Tool

Comments
1 min read
Simple Port Scanner

Simple Port Scanner

Comments
1 min read
Password Strength Checker

Password Strength Checker

Comments
1 min read
Social Engineering Toolkit (SET): Testing Human Vulnerabilities

Social Engineering Toolkit (SET): Testing Human Vulnerabilities

Comments
1 min read
OWASP ZAP: Securing Web Applications

OWASP ZAP: Securing Web Applications

Comments
1 min read
Aircrack-ng: Assessing Wi-Fi Security

Aircrack-ng: Assessing Wi-Fi Security

Comments
1 min read
Hydra: Password Cracking with Ethical Purpose

Hydra: Password Cracking with Ethical Purpose

Comments
1 min read
Nessus: Mastering Vulnerability Assessment

Nessus: Mastering Vulnerability Assessment

Comments
1 min read
Kali Linux: The Ultimate Security Toolkit

Kali Linux: The Ultimate Security Toolkit

1
Comments
1 min read
Burp Suite: The Web Application Security Powerhouse

Burp Suite: The Web Application Security Powerhouse

Comments
1 min read
Wireshark: A Window into Your Network Traffic

Wireshark: A Window into Your Network Traffic

Comments
1 min read
Nmap: Mapping Your Network Like a Pro

Nmap: Mapping Your Network Like a Pro

Comments
1 min read
Introduction to Metasploit: A Hacker's Toolkit

Introduction to Metasploit: A Hacker's Toolkit

Comments
1 min read
Protecting Against Distributed Denial-of-Service (DDoS) Attacks

Protecting Against Distributed Denial-of-Service (DDoS) Attacks

Comments
1 min read
The Importance of Secure Passwords

The Importance of Secure Passwords

Comments
2 min read
What Is Ethical Hacking?

What Is Ethical Hacking?

Comments
1 min read
Social Engineering: Manipulating the Human Element

Social Engineering: Manipulating the Human Element

Comments
1 min read
Ransomware: Pay or Fight Back?

Ransomware: Pay or Fight Back?

Comments
1 min read
The Role of Firewalls in Cybersecurity

The Role of Firewalls in Cybersecurity

Comments
1 min read
What Are Zero-Day Exploits?

What Are Zero-Day Exploits?

Comments
1 min read
Why Multi-Factor Authentication Matters

Why Multi-Factor Authentication Matters

Comments
1 min read
Understanding Phishing Attacks

Understanding Phishing Attacks

2
Comments
1 min read
SQL Injections

SQL Injections

3
Comments
2 min read
Intro to firewalls🔥

Intro to firewalls🔥

3
Comments
2 min read
Understanding Password Cracking

Understanding Password Cracking

Comments
2 min read
Nmap

Nmap

4
Comments
2 min read
Malware

Malware

3
Comments
2 min read
Gobuster

Gobuster

2
Comments
2 min read
Creating Malware in Python

Creating Malware in Python

3
Comments
1 min read
WireShark and Scapy

WireShark and Scapy

4
Comments
2 min read
Cryptography

Cryptography

1
Comments
2 min read
Python,SQL and Linux

Python,SQL and Linux

1
Comments
2 min read
Security Information and Event Management (SIEM) And Playbook

Security Information and Event Management (SIEM) And Playbook

4
Comments
2 min read
Ethical concepts that guide cybersecurity decisions

Ethical concepts that guide cybersecurity decisions

3
Comments
2 min read
Common cybersecurity terminologys

Common cybersecurity terminologys

Comments
2 min read
Common cybersecurity terminologys

Common cybersecurity terminologys

Comments
2 min read
SQL-Injections💉

SQL-Injections💉

5
Comments
2 min read
Man-In-The-Middle-Attack (MITM)

Man-In-The-Middle-Attack (MITM)

1
Comments
2 min read
Enumeration

Enumeration

1
Comments
2 min read
WireShark

WireShark

1
Comments
2 min read
Social Engineering Attack

Social Engineering Attack

Comments
1 min read
Linux

Linux

3
Comments
3 min read
Networking Step-by-Step 👣

Networking Step-by-Step 👣

Comments
2 min read
Networking Step-by-Step 👣

Networking Step-by-Step 👣

3
Comments
1 min read
Understand the terminologies of in CS

Understand the terminologies of in CS

3
Comments
3 min read
Understanding IP Address Types, Subnets, and Loopback

Understanding IP Address Types, Subnets, and Loopback

2
Comments
2 min read
My Day-1 in kalvium simulation work

My Day-1 in kalvium simulation work

6
Comments
2 min read
loading...