PinnedAyush BagdeMalware Testing — Ethical HackingRansomware Malware Testing: Secure Strategies6 min read·Mar 9, 2024----
Ayush BagdeThe Ultimate Ethical Hacking Roadmap: A Comprehensive GuideEthical hacking, also known as penetration testing or white-hat hacking, plays a crucial role in securing digital systems and networks. As…4 min read·Dec 3, 2023----
Ayush BagdeAPK Dissection: MOBSF, Java Extraction, and Janus Vulnerability DetectionHello World !!8 min read·Oct 4, 2023----
Ayush Bagdee-JPT Exam Review and Study GuideHello, My name is Ayush Bagde, and I recently completed my e-JPT test. In this post, I’ll tell you about my experience taking the e-JPT…3 min read·Apr 16, 2022----
Ayush BagdeDVWA Vulnerability: File UploadHey Guys Fourth Vulnerability which is File Upload.3 min read·May 14, 2021----
Ayush BagdeDVWA vulnerability: Command InjectionHey Guys, Our Second Vulnerability is Command Injection on low level of Security. So Let’s Start.4 min read·May 13, 2021----
Ayush BagdeDVWA Vulnerability: Brute ForceHello I am ayush bagde aka Overide and in this writeup. I’m gonna start a series of DVWA virtual Lab.2 min read·May 13, 2021----
Ayush BagdeTShark TryHackMe WriteupLearn how to use TShark to accelerate your pcap analysis!5 min read·May 5, 2021----
Ayush Bagdeh4cked TryHackMe writeupFind out what happened by analysing a .pcap file and hack your way back into the machine7 min read·Mar 14, 2021--1--1