Using deep learning to identify possible employee attrition with the help of Tensorflow and Keras.
Read more "How to use deep learning to make predictions on Tabular data with Tensorflow Keras"
This step-by-step tutorial attempts to guide rookie chatbot developers on how to send a message using the Telegram chatbot HTTP api
Read more "How to send a notification using your Telegram Chatbot"
This is a tutorial that teaches you how to build chatbots on Telegram using the api.ai platform. This tutorial also covers how to use a webhook for additional bot customisation.
Read more "How to build a Chatbot with Telegram and Dialogflow (previously API.ai) – including a Python Webhook"
Basic tutorial on creating your splunk instance, feeding in unstructured data, extracting fields and creating searches for dashboards or reports or alerts.
Read more "Splunk Enterprise and Machine Data – How to Build your own instance to add and crunch data"
A simple buffer overflow attack on a vulnerable FTP server hosted by Windows 7, 8 and 10. Built using Metasploit, Corelan Team’s Mona script, Immunity Debugger and VMWare. Exploit Code are either Ruby/Python.
Read more "Buffer Overflow attack on PCMan FTP Server 2.07 using the Metasploit Framework and Corelan Team’s Mona Script"
Basic buffer overflow attack example performed on a C program. Exploit and Vulnerable code built on Ubuntu 15.04 with the help of GDB and gedit.
Read more "How to perform a buffer overflow attack on a simple C program (Linux x64)"
A short tutorial on creating a Google Chrome Extension. Example includes Rdirect, a published extension on the Chrome Web Store.
Read more "How to create and publish a Chrome Extension"
A short tutorial on creating and publishing a simple and reusable npm module for nodejs applications.
Read more "How to create and publish npm modules for Nodejs applications"