Published on October 29, 2024Build a Gradio App with Auth0 & Dify for Secure AI IntegrationComprehensive Guide to Auth0, Dify and Gradio for AI Solutions AI Dify Auth0 Python-App-Development Secure-Login
Published on October 29, 2024How to Launch Your First Email Phishing Drill for Effective Cybersecurity TrainingComprehensive Guide to Implementing Gophish and SMTP Email Services for Phishing Simulations Pentest Social-Engineering Email-Phishing Cybersecurity-Training Gophish SMTP-Services
Published on July 21, 2024How to Deploy Local Dify for a Secure and Fast LLM Agentic WorkflowComplete Guide to Running Local Dify with Troubleshooting Tips LLM AI Dify
Published on May 6, 2024Install Kind (Kubernetes in Docker) on WSL2Step-by-Step Guide to Setting Up Kubernetes with Kind on WSL2 k8s kind docker wsl2
Published on April 26, 2024Software Composition Analysis Tool Cheat SheetGuide to Efficiently Identifying Vulnerabilities in Software Components software-composition-analysis cybersecurity
Published on February 16, 2024Recap of Machine Learning FoundationEssential Concepts and Techniques in Machine Learning and Deep Learning machine-learning deep-learning linear-regression
Published on November 26, 2023neo4j Vectors & Semantic SearchEnhancing LLM with Vector Search and Semantic Understanding LLM AI neo4j semantic-search vector-search
Published on March 15, 2023Access New Bing in ChromeHow to Bypass Browser Restrictions for New Bing web-access bing chrome user-agent
Published on March 10, 2023Edit Anything in MS Word using Python docxEdit MS Word documents with Python: w:ins, w:del, and more. Python xml ms-word python-docx document-editing
Published on February 15, 2023What is SSDLC and what isn't [WIP]Secured Software Development Life Cycle S-SDLC software-engineering
Published on February 15, 2023Overview of Web Crawler [WIP]Usage Limitation, Anti-Crawler and Risk crawler web
Published on August 8, 2022Threat Modeling using Neo4j Graph DatabaseEnhance Cybersecurity with Graph-Based Threat Analysis neo4j threat-modeling cybersecurity
Published on November 25, 2021nmap Cheat Sheet All in OneComprehensive Guide to nmap Commands and Usage cheat-sheet nmap