Kumar Sakshamneuralrealm.hashnode.dev·Nov 6, 20238 Techniques To Condense Your Python Function into ONE LineIntroduction Python is known for its readability and simplicity, but it also provides powerful features that allow developers to express complex operations in just a single line of code. In this article, we'll explore eight techniques to condense you...Discuss·4 likes·35 readsPython
Joel O.joelodey.hashnode.dev·Sep 23, 2023Cybersecurity Techniques UnveiledIn the intricate dance between technology and security, cybersecurity emerges as the sentinel guarding our digital castles. Much like a vigilant guardian, it employs an array of techniques to ward off potential threats and breaches. In this article, ...Discusstechniques
Abid ullahabidullah786.hashnode.dev·Aug 7, 2023Mastering JavaScript Shorthand Part-2 || Unleashing the Power of Default Parameters and MoreThis blog is originally published on my Blog website, where you can find the full version with detailed insights and examples. Click the link below to read the complete article and explore more tech-related content!👉 Click Here Introduction: Writing...DiscussMastering JS Shorthand TechniquesJavaScript
ShaaNmirageazlit.hashnode.dev·Jun 5, 2023The Science of Competitive CodingThe What > Competitive coding is like a fun game for beginners where you solve coding puzzles. It's a way to improve your coding skills and have a blast. You'll join a community of like-minded enthusiasts who love problem-solving. In this adventure, ...Discuss·10 likescoding
FarahanaPronufas.hashnode.dev·Apr 28, 2023Mastering Visualizations for Comprehensive KPIs: A Practical ApproachIntroduction As a BI analyst, your ability to create compelling and interesting visualizations for comprehensive Key Performance Indicators (KPIs) can significantly impact decision-making and drive organizational success. This article will analyze a ...DiscussBI
Rohit Guptadevelopersway.live·Jan 21, 2023Understanding Save a lot of time in developmentWhat we will talk about In this post, we will talk about the way to write clean code that will save you a lot of time and resources. This will make your workflow more seamless and less hectic. I will discuss for the Tips to write clean code. After go...Discuss·42 readssoftware development
Nee4pfsec.com·Apr 17, 2021SMB ~ Manually Enumerating Samba VersionI was recently trying as hard as I could to find out the SAMBA version that a machine was running. I exhausted most of the well known tools out there that were meant for SMB enumeration but I was still unable to uncover the target's samba version. Af...Discuss·29 readstechniques
Nee4pfsec.com·Apr 15, 2021Offensive Windows ~ User Account Control (UAC) BypassIn this 3rd part of "Offensive Windows", I'll be writing about a local privilege escalation possibility that exists in the application fodhelper.exe! This whole vulnerability exists due to a nature of fodhelper.exe which requires administrative privi...Discuss·31 readstechniques
Nee4pfsec.com·Mar 29, 2021Offensive Windows ~ Automated ToolsIn this 2nd part, I'll be exploring automated tools and techniques that I could use to discover vulnerabilities on a windows machine that I have a foothold on. The main focus throughout this writeup would be placed on discovering the vulnerability an...Discuss·173 readstechniques
Nee4pfsec.com·Mar 28, 2021Offensive Windows ~ Manual EnumerationIt's no secret that windows isn't my strong suit. I'm more of a Linux guy. So, here's my shot at getting better at offensive windows techniques! I'll be writing about a couple topics which will also double up as my notes! Here we gouu! Enumeration O...Discuss·114 readstechniques