top of page


My Tailscale Setup
Tailscale - Personal Setup In a modern hybrid work environment, ensuring the right level of access between your devices is crucial for...
KevinsinghJ
May 52 min read


PiHole
In this article, we’ll be outlining on how we can perform the setup of PiHole in Ubuntu and a walkthrough on how it works. PiHole is...
KevinsinghJ
May 45 min read


Hosting a Simple Hello World Website on Nginx VM through ProxMox
This article would be about setting up a Nginx server inside a VM on Proxmox. What we’ll need to achieve this would be an up and running...
KevinsinghJ
May 42 min read


Nessus
In this article, I'll be discussing Nessus. It's a widely used vulnerability scanning tool that helps organizations identify and assess...
KevinsinghJ
Feb 247 min read


Qubes OS
Qubes OS is a security-focused operating system that leverages virtualization to isolate various tasks into separate virtual machines...
KevinsinghJ
Feb 154 min read


Manipulation of Data through Burp Suite’s Proxy
Burp Suite is a popular integrated platform used for web application security testing. It is widely employed by security professionals,...
KevinsinghJ
Feb 154 min read


Access Location, Camera & Mic of any Device via StormBreaker
In this article, i’d be explaining how we can be able to achieve as stated in the title above using a tool called Storm Breaker. To...
KevinsinghJ
Feb 154 min read


Shodan
What is Shodan? Shodan (short for "Sentient Hyper-Optimized Data Access Network"), is a search engine that allows users to discover...
KevinsinghJ
Feb 152 min read


Top Commands of Nmap
Top Commands of Nmap Nmap is short for network mapper. It has been the go to tool for network mapping, port scanning and vulnerability...
KevinsinghJ
Feb 152 min read


Wireshark
Wireshark is an open source network analyzer which will capture and display real time network traffic. It provides an in-depth view of...
KevinsinghJ
Feb 154 min read
bottom of page