My Static Pages (Projects)
My Static Project links Wartime Wiki - INDIA Focus Time - For ADHD People Focus Kanban Signature Style Studio To get in touch with me or for general discussion please visit ZeroDayMi...
My Static Project links Wartime Wiki - INDIA Focus Time - For ADHD People Focus Kanban Signature Style Studio To get in touch with me or for general discussion please visit ZeroDayMi...
Well I gave the exam CompTIA Security+ exam on 28th May 2025 2nd Try, 1st try was on 24th April 2025 and I passed. I scored 772 out of 900. Preparing for this exam was a hassle, maybe it’s a beginn...
Sample polymorphic code Explanation: Polymorphism Technique: The code uses a unique identifier (hash) combined with random numbers to generate a new signature for each communication. Variabl...
Use it at your own risk. I am not responsible for your action in kind or form. CODE : Crypto Trading Bot Template CODE : Strategy Backtesting CODE : Crypto Price Rule Notification snippet Thi...
Install the dependencies with pip as asked during running the code These are experimental code CODE : NeuroFocus Balance Tracker python dsk_ADHD_domomine_tracker.py CLI Version CODE : NeuroF...
Identity and Access Management (IAM) Solutions Ensure right access for the right people at the right time for the right reason. Topics Identity & Access management (IAM) Multifactor Authe...
Audit & Assessments Critical for identifying vulnerabilities, ensuring compliance, and hardening an organization’s security posture. Audits Systematic evaluations to verify adherence to se...
Asset Management Cybersecurity asset management (CSAM) is the process created to continuously discover, inventory, monitor, manage, and track an organization’s assets to determine what those asset...
CODE : RSS READER GUI Usage pip install feedparser pip install html2text pip install markdown pip install tkinterweb python rss_feeder.py To get in touch with me or for general discuss...
What is CIS Critical Security Controls The CIS Critical Security Controls (CIS Controls) are a prioritized set of best practices designed to mitigate the most common cyber threats. Developed by the...