Skip to content

AppSec, Network Security, Penetration Testing, Bug Bounties, Coding and more..

Menu
  • Home
  • OWASP TOP 10
    • OWASP TOP 10
    • OWASP API TOP 10
    • OWASP MOBILE TOP 10
    • SANS TOP 25
  • PENTESTING
    • WEB SECURITY
    • Web App Pentest
    • API Pentest
    • Android Pentesting
    • 0day
    • Windows Pentesting
    • Linux Pentesting
    • Active Directory Pentest
    • Linux Priv-Escalation
    • Windows Priv-Escalation
  • Coding
    • GoLang
    • Python
    • PowerShell
    • Bash Scripting
    • Batch Scripting
    • Java
  • Network Study
    • Networking Basics
    • TCP-IP/OSI Model
    • Essential Protocols
  • CTF
    • Vuln-Hub
  • Certification
    • CEH
    • OSCP
  • My Tools
  • Portfolio
Posted onSeptember 16, 2021September 16, 2021GENERAL IT, LINUX SYS ADMIN, PROGRAMMING AND SCRIPTING, TOOLS

Install GOLang Binaries in UNIX/LINUX Environment

by AdminLeave a comment on Install GOLang Binaries in UNIX/LINUX Environment

Go is a statically typed, compiled programming language designed at Google by Robert Griesemer, Rob Pike, and Ken Thompson. Follow the below steps to install…

Read More
Posted onSeptember 16, 2021September 16, 2021CAPTURE THE FLAG, SYSTEM SECURITY, TOOLS, WEB SECURITY

What is Banner Grabbing : Guide for Beginners

by AdminLeave a comment on What is Banner Grabbing : Guide for Beginners

Banner grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. An…

Read More
Posted onSeptember 15, 2021September 15, 2021PROGRAMMING AND SCRIPTING

How to use urllib2 Python module

by AdminLeave a comment on How to use urllib2 Python module

urllib2 is a Python module for fetching URLs. It offers a very simple interface, in the form of the urlopen function. The urllib2 is capable…

Read More
Posted onAugust 13, 2021September 15, 2021LINUX SYS ADMIN

How to Install docker on Ubuntu Linux (20 LTS)

by AdminLeave a comment on How to Install docker on Ubuntu Linux (20 LTS)

Docker provides the ability to package and run an application in a loosely isolated environment called a container. The isolation and security allow you to…

Read More

Posts navigation

Previous Page Page 1 … Page 5 Page 6

About Me

Hi, My name is Ajay Kumar Tekam, I am a Cyber Security Enthusiast and currently looking for opportunity to work in cyber security positions. The area of my interests are Web Pentesting, Mobile Application Pentesting and Network Pentesting. Currently i do bog hunting at bugcrowd.com as a freelancer. In my free time i write security automation tools in python, GoLang and Bash. You can find my portfolio, CV and more about me at ajaytekam.github.io

Recent Posts

  • How DNS Works : Guide To DNS Security
  • ANDROID PENTESTING SERIES PART 2 : Overview of Android Components
  • ANDROID PENTESTING SERIES PART 3 : Overview of Android Security
  • ANDROID PENTESTING SERIES PART 9 : SSL Pinning Bypass with Frida Server
  • ANDROID PENTESTING SERIES PART 6 : Setting up Android Pentest Lab

Categories

  • 0day
  • Android Pentesting
  • API Pentest
  • CAPTURE THE FLAG
  • CEH
  • EXPLOIT
  • GENERAL IT
  • LINUX SYS ADMIN
  • OWASP API TOP 10
  • OWASP TOP 10
  • PENTESTING
  • PROGRAMMING AND SCRIPTING
  • SYSTEM SECURITY
  • TOOLS
  • WEB SECURITY

Archives

  • July 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress