Thanks to visit codestin.com
Credit goes to dev.to

DEV Community

Giorgi Akhobadze profile picture

Giorgi Akhobadze

I have experience in developing control and automation systems, internal corporate systems, creating databases and creating control and monitoring programs.

The Assessor's Gambit: A Deep Dive into White, Gray, and Black Box Penetration Testing

The Assessor's Gambit: A Deep Dive into White, Gray, and Black Box Penetration Testing

3
Codestin Search App
8 min read

Want to connect with Giorgi Akhobadze?

Create an account to connect with Giorgi Akhobadze. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Building a Modern Network Observability Stack: Combining Prometheus, Grafana, and Loki for Deep Insight

Building a Modern Network Observability Stack: Combining Prometheus, Grafana, and Loki for Deep Insight

Codestin Search App
6 min read
The Secure Network Automation Playbook: Using Ansible, Python, and GitOps for Security

The Secure Network Automation Playbook: Using Ansible, Python, and GitOps for Security

Codestin Search App
6 min read
The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

Codestin Search App
7 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Codestin Search App
6 min read
The Psychology of Social Engineering: A Deep Dive into Modern Manipulation Tactics

The Psychology of Social Engineering: A Deep Dive into Modern Manipulation Tactics

Codestin Search App
6 min read
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

Codestin Search App
8 min read
Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move

Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move

Codestin Search App
9 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Codestin Search App
7 min read
The Evolution of Malware: An In-Depth Look at Polymorphic and Metamorphic Threats

The Evolution of Malware: An In-Depth Look at Polymorphic and Metamorphic Threats

Codestin Search App
7 min read
Beyond Passwords: A Comprehensive Guide to Modern Multi-Factor Authentication Methods

Beyond Passwords: A Comprehensive Guide to Modern Multi-Factor Authentication Methods

Codestin Search App
5 min read
A Complete Guide to Network Forensics: Investigating and Analyzing Network Traffic for Intrusions

A Complete Guide to Network Forensics: Investigating and Analyzing Network Traffic for Intrusions

Codestin Search App
6 min read
Wi-Fi Deauthentication attack

Wi-Fi Deauthentication attack

Codestin Search App
3 min read
SQL Injection attack

SQL Injection attack

Codestin Search App
2 min read
MITM attack

MITM attack

Codestin Search App
3 min read
Cloud cyber attacks

Cloud cyber attacks

Codestin Search App
2 min read
EXIFViewer

EXIFViewer

Codestin Search App
1 min read
Employees Management System (EMS)

Employees Management System (EMS)

1
Codestin Search App
4 min read
Password Generator

Password Generator

Codestin Search App
1 min read
QR Code Generator

QR Code Generator

Codestin Search App
2 min read
SecureText App

SecureText App

Codestin Search App
2 min read
SecureFile App

SecureFile App

Codestin Search App
2 min read
loading...