PinnedJohn D CyberDecoding Zero-Shot Learning: A Bridge between Machine Learning and Human-like IntelligenceSummary:Zero-shot learning acts as a bridge between machine learning and human-like intelligence by simulating humans’ ability to learn.9 min read·Jul 7, 2023----
PinnedJohn D CyberResilient Cyber Podcast — Offensive Security & Purple TeamingS2E8: John D’Abruzzo — Offensive Security & Purple Teaming17 min read·Nov 26, 2021----
PinnedJohn D CyberHow to Create a Reverse TCP Shell Windows Executable Using MetasploitIn this exploit demonstration, I will be creating a malicious payload in the form of windows executable to create a reverse TCP shell.4 min read·Jan 12, 2021--1--1
John D CyberStreamlining SSL Certificate Enumeration with Johndcyber Cert Log Enumerator ToolStreamline SSL cert analysis with Johndcyber Cert Log Enumerator: Save time, boost security insights.3 min read·Apr 4, 2024----
John D CyberThe Most Commonly Exploited Windows APIs: A Security Professional’s GuideDiscover key Windows API security strategies to counter cyber threats, ensuring robust protection for your systems and sensitive data.16 min read·Mar 27, 2024----
John D CyberWindows CMD cheat sheet for Windows Administration and SecurityWindows Command Prompt (CMD) cheat sheet tailored for both new users and administrators. This guide covers basic navigation commands, file…3 min read·Feb 28, 2024----
John D CyberWindows .cpl & .msc Commands Cheat sheetWindows includes a variety of Control Panel (.cpl) and Microsoft Management Console (.msc) shortcuts that allow users to quickly access…2 min read·Feb 27, 2024----
John D CyberSocial Media is Your New MailboxIn the digital era, social media platforms have transcended their initial role as mere channels of social interaction, morphing into the…5 min read·Feb 25, 2024----
John D CyberLet’s Talk about Machine Learning…This comprehensive article about machine learning discusses machine learning tools, training models, deep learning, neural networks &…17 min read·Oct 17, 2023----