0xNehruComprehensive Guide to Identifying and Mitigating Security Vulnerabilitieshere’s a detailed explanation of various types of vulnerabilities, including their descriptions, risks, and mitigation strategies:Jun 17Jun 17
0xNehruCVE-2024–24919: Critical Vulnerability in Check Point Quantum Security GatewaysVulnerability DescriptionJun 5Jun 5
0xNehruComprehensive Guide: Installing and Configuring SonarQube on WindowsIn the realm of software development, ensuring code quality is paramount for delivering reliable and maintainable applications. SonarQube…Apr 3Apr 3
0xNehruStep-by-Step Guide to Installing and Setting Up SonarQube on Kali LinuxAre you a developer striving for impeccable code quality and consistency? SonarQube is here to help! SonarQube is an open-source static…Mar 26Mar 26
0xNehruCVE-2023–0126: SonicWall SMA1000 Pre-auth Path Traversal — Vulnerability and RemediationIn the realm of cybersecurity, identifying and addressing vulnerabilities is paramount to safeguarding our digital infrastructure. This…Oct 19, 2023Oct 19, 2023
0xNehruJuniper Networks Vulnerability (CVE-2023–36845): Remote Code Execution Exploit and ProtectionIn the world of cybersecurity, staying ahead of vulnerabilities is critical. One such recent threat is CVE-2023–36845, a Remote Code…Oct 19, 2023Oct 19, 2023
0xNehruCritical CVE-2023–22515 — Confluence Data Center & Server Privilege Escalation VulnerabilityIntroductionOct 19, 2023Oct 19, 2023
0xNehruWindows Reversing Intro-TryHackMethis is enough! if you want full task. just command here!!Nov 23, 2022Nov 23, 2022
0xNehruIntro PoC Scripting -TryHackMeTask 1 IntroductionWhat are PoC scripts?Nov 23, 2022Nov 23, 2022