© 2023 Hashnode
#scripting
This blog details how to encrypt and decrypt a string or password via PowerShell. Open a PowerShell ISE Editor as an Administrator and check your PS Version. The full article is tested on 5.X PS versi…
Libraries used in python for ethical hacking and cyber security. As security developers, we need to know the libraries to use when creating hacking tools. There are a number of libraries that can be u…
In this particular article, we will look into the most common questions that are asked on shell scripting in an interview. The article won't be a long one. Also, I will be sharing some of the commands…
Shell script VS other scripting languages The shell script is used to perform operations such as printing (echo), program execution (./) and manipulation (touch). On the other hand, many different scr…
Introduction What is Bash? Bash is a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. Bash is the Bourn Again Shell it …
It’s pertinent to say, I am a beginner in cybersecurity. I have seen many videos on youtube and taken a couple of courses. At first, I didn’t think it was what I will like to do just like many who don…
Docker Installation and important commands ⬤ Create a machine on AWS with Docker installed AMI, and install Docker if not installed. yum install dockeror follow Docker Installation To see all images…
Aliases are a powerful and convenient way to reduce the time that you need to spend typing out long commands. It makes your life easier as a Linux user by essentially reducing lines of complex group o…
If you point to a technology or developer in the bash script, you will be greeted with a nod of approval or an interesting "I'm done with it" warning. This is because bash programs are incredibly usef…
Shell Python Groovy JQ YQ Jinja GO