In this second part of the tensor with PyTorch, I will guide you through some advanced operations on the tensors and matrices from slicing to matrix multiplication or vector operations
Hey there everyone, I am Gurkirat Singh (aka tbhaxor). I do full-stack development to fund my own learning and experiments. I am a cybersecurity enthusiast and like sharing my knowledge.
Tensors are the building block of neural networks and are used to represent the data in form of numbers. In this post you will learn the basics of tensors like declaring, types and shapes
Learn how to perform command and control under the radar using the encrypted tunnel in such a way the keys are exchanged dynamically over the network leaving no trace on the system. and also bypassing the windows defender and other anti-malware or NIPS/NIDS services like Snort.
No doubt hashcat is a good tool but what if you want to crack the encrypted document files like pdf or archive zip and smartly detect the hash type. John the ripper at your disposal for such things. You will learn about the basics of the JohnTheRipper suite in this post.
Take a step further in hashcat bruteforcing and learn how to perform a mask attack on the password length when provided the minimum and maximum length and charset of the passwords