CyberspecsSecuring Deeplinks in AndroidHello folks, I’m back with another write-up, and today I have something even more interesting for you guys as I have linked my short on the…3 min read·Jun 5, 2024----
CyberspecsSecurity Implementations at different layers of the OSI ModelSecuring real-world applications and software involves implementing various security measures at different layers of the OSI (Open Systems…3 min read·Apr 1, 2024----
CyberspecsPractical RegEx Cheat SheetI like keeping notes. Making a publicly accessible repository of handy notes. Help yourselves!3 min read·Sep 15, 2023----
CyberspecsDebunking RegEx — Part 2aHope you enjoyed the 1st part and practiced a few RegEx yourself. If not, maybe this might help!6 min read·Aug 28, 2023----
CyberspecsFine-Tuning Memory Allocation on Virtual MachinesI often end up using Virtual Machines as a part of my research. Every operating system has some pros and cons. Working on different…7 min read·Aug 27, 2023----
CyberspecsDebunking RegEx — Part 1Catching up on the concepts I need in my hacking arsenal, I came across regEx. There have been quite a few mentions regarding the…4 min read·Aug 13, 2023----