🐉 neospace ~
Search
Search
Dark mode
Light mode
Explorer
CYBVU 23.2
References
Man-in-the-Middle Attack MITM
Monoalphabetic Substitution Cipher - A Detailed Explanation
XSS vs HTML
Spring 24' Y1S2
Computer Architecture
🔗 Computer Architecture - CYBVU 23.2
Computer Organization
Introduction to Computer Architecture
Data Communications and Network
🔗 Data Communications and Networks
Lecture 1 - Introduction
Lecture 2 - Email Services
Lecture 3 - Data and Signals
Lecture 4 - Communication Medium
Lecture 5 - Wireless Medium
OOP with JAVA
🔗 Java - CYBVU 23.2
22 Aug Lecture Note
30th Aug Assignment Submission
Arithmetic Expressions
Data Types
Hello World, Escape Sequences, Comments
Introduction to Java
Java Full RECAP
String args
User input (Scanner)
Variables
Operating Systems
🔗 Operating Systems
Introduction to Operating Systems
Lec 2 Process Management
Lec 3 Process Control Management
Lec 4 Memory Management
Lec 5 Virtual Memory Management
Web Application Development
🔗 Web Application Development - CYBVU 23.2
All CSS Concepts at once (module related)
Client-Server Model
Essential JavaScript Concepts for This Module Pt.1
HTTP vs HTTPS
Introduction to HTML Part A
Introduction to HTML Part B
JavaScript Form Validation Pt. 3
JavaScript Pt. 2
PHP Pt. 1
PHP Pt. 2
Static vs Dynamic Pages
Website vs WebApp
What is the INTERNET?
World Wide Web (WWW)
Spring 24' Y1S2
Summer 25' Y2S2
NIT2201 Profession and ethics
🔗 NIT2201 Profession and ethic
Week 2 - Security, Privacy & Ethics
Week 2 Tutorial 02 NIT2201
Week 3 Tutorial 03 NIT2201
NIT2242 Data privacy and cyber physical systems security
🔗(NIT2242) Data privacy and cyber physical systems security - 7K
Week 1 - Introduction to the Module
Week 2 - Cyber Physical Systems
Winter 24' Y2S1
NIT2102 Cybersec Essesntials
🔗 Cybersec Essentials
Lab 1 CSES
Lab 2 CSES
Lab 3 CSES
Lab 4 CSES
Lab 5 CSES
Lab 6 CSES
Lab 7 CSES
Lab 8 CSES
Week 1 - Introduction to Security
Week 2 - Malware and Social Engineering Attacks
Week 3 - Application and Networking-Based Attacks
Week 4 - Cryptography
Week 5 - Cryptography Part-II
Week 6 - PKI and Steganography
Week 7 - Network Security Fundamentals
Week 8 - Administering a Secure Network
NIT2122 Server Administration and Management
🔗 Server Administration and Management
Lab 1 SAAM
Lab 3 SAAM
Presentation Case Study
SAAM Summarise
Week 1 Introduction to Windows Server
NIT2141 Digital Forensics and Ethical Hacking
🔗 Digital Forensics and Ethical Hacking
Lab 1 DFEH
Lab 10 DFEH
Lab 2 DFEH
Lab 3 DFEH
Lab 4 DFEH
Lab 6 DFEH
Lab 7 DFEH
Lab 8 DFEH
Lab 9 DFEH
Research About Hashing
Untitled
Week 1 - Intro to Digital Forensics and its Processes
Week 1 DFEH Before Class Activities
Week 2 - Computer Forensics
Week 3 - Mobile Forensics
Week 3 DFEH Before Class
Week 5 - Investigative Reports and Legal Acceptance
XYZ School Investigation
NIT2171 Introduction to Ict Management
🔗 Introduction to Ict Management
NIT2171 ICT Management Test 1
Week 1 - ICT trends and challengers
Winter 24' Y2S1
Events
CodeSprint X WorkShop 1
Excalidraw
Drawing 2024-08-28 03.41.15.excalidraw
Drawing 2024-10-28 23.43.44.excalidraw
Drawing 2024-11-15 04.16.45.excalidraw
Drawing 2025-01-16 17.14.38_0.excalidraw
Drawing 2025-01-20 02.41.36.excalidraw
Drawing 2025-01-21 13.19.31.excalidraw
Drawing 2025-01-21 22.40.14.excalidraw
Drawing 2025-01-23 15.43.32.excalidraw
Drawing 2025-02-06 12.06.44.excalidraw
Drawing 2025-02-06 12.27.58.excalidraw
Drawing 2025-02-14 20.57.33.excalidraw
Drawing 2025-02-19 04.06.05.excalidraw
Drawing 2025-02-24 10.48.03.excalidraw
Drawing 2025-02-24 22.40.51.excalidraw
Drawing 2025-05-16 21.03.20.excalidraw
Drawing 2025-05-22 09.54.57.excalidraw
Inotroduction to Java 2024-08-20 15.15.43.excalidraw
Inotroduction to Java 2024-08-21 00.54.38.excalidraw
Inotroduction to Java 2024-08-21 01.02.20.excalidraw
Template.excalidraw
自学
Brilliant
Programming & CS
How AI Works
🔗 How Ai Works
Prediction and probability
Coursera
Google Cybersecurity Professional Certificate
1 - Foundations of Cybersecurity
Module 1
🔗 Module 1 Foundations of Cybersecurity
Common CyberSec Terminology
Core skills for cybersec professionals
Course 1 Overview
Google Cybersecurity Certificate Overview
Helpful resources and tips
Importance of CyberSecurity
Introduction to Cybersecurity
My Path to CyberSecurity
Nikki A day in the life of a security engineer
Responsibilities of an entry-level cybersecurity analyst
Transferable and technical cybersecurity skills
Veronica My path to working in cybersecurity
Welcome to the Google Cybersecurity Certificate
Wrap-up Module 01
Module 2
🔗 Module 2 Foundations of Cybersecurity
Attacks in the digital age
Common attacks and their effectiveness
Determine the type of attack
Glossary terms from module 2
Introduction to the eight CISSP security domains Part 1
Introduction to the eight CISSP security domains Part 2
Keep Your Cool during a data breach
Past CyberSecurity Attacks
Understand attackers
Welcome to module 2
Wrap-up Module 02
Module 3
🔗 Module 3 Foundations of Cybersecurity
Controls, frameworks, and compliance
Ethical concepts that guide cybersecurity decisions
Ethics in Cybersecurity
Glossary terms from module 3
Heather Protect sensitive data and information
Holly The importance of ethics as a cybersecurity professional
Introduction to security frameworks and controls
Secure Design
Welcome to module 3
Foundations of Cybersecurity
🔗 Google Cybersecurity Professional Certificate
Google IT Automation with Python Professional Certificate
1 - Crash Course on Python
Module 1
🔗 Module 1 Crash Course on Python
Course Introduction
Crash Course on Python
Specialization Introduction
🔗 Google IT Automation with Python Professional Certificate
DevOps & CS
100+ Docker Concepts you Need to Know
Docker in 100 Seconds
Kerberos Authentication
Kubernetes 101
EdX
CS50's Introduction to Computer Science
🔗 CS50's Introduction to Computer Science
Week 0 - Scratch
HackTheBox CTF
🔗 HackTheBox CTF
Checker
Loggy
Low Logic
OnlyHacks
HTB Academy
Introduction to Active Directory
🔗 Introduction to Active Directory
Active Directory Research Over the Years
Active Directory Structure
Why Active Directory?
Learning Process
🔗 Learning Process
Ways of Thinking
🔗 HTB Academy
Linkedin Learning
Career Essentials in GitHub Professional Certificate
1. Read YAML data - Python to process YAML with Codespaces
Career Essentials in GitHub Professional Certificate
Docker
How Actions Works
Python to process YAML with Codespaces
Docker Foundations Professional Certificate
1 - Learn Docker
1 - Docker Explained
2 - Install Docker
3 - Using Docker
Microservices Foundations Professional Certificate by Kong
1 - Microservices Foundations
History of service-based architectures
Microservices - Solver of problems but not the silver bullet
Microservices - The new kid on the block
Service-oriented architecture
The monolithic application
What you need to know
🔗Microservices Foundations Professional Certificate byKong
Prepare for the GitHub Foundations Certification
🔗 Prepare for the GitHub Foundations Certification
Branches
Changing History
Deleting and renaming files
git diff
Git stash and clean
Github Options
Ignore Files - gitignore
Manage Conflicts
Pushing to Github
Setting up Git
Understanding Environments
What is Git
What is Github
What is Version Control
Misc
Bypassing Filters
Data Link Layer Header
IP Addressing and Subnetting
More about -sV and -sC
More About Alternate Data Stream
More About JQ
Predictable Randomness and Weak Seeding in PHP
Understanding `$0` in awk
Understanding 2>&1 in Unix-like Shells
Unix Epoch
Why We used seed range as constant range?
O'Reilly
Ethereum Fundamentals
🔐 Ethereum Fundamentals
Blockchain and Hashing
Blockchain Benefits and Disadvantages
Blockchain Operations
Ethereum Basics
The New Blockchain - Blockchain 2.0
PicoCTF
🔗 PicoGym
ASCII Numbers
Based
Big Zip
Binhexa
Blame Game
Bookmarklet
CanYouSee
Collaborative Development
Commitment Issues
Cookies
dont-you-love-banners
endianness
First Find
Glory of the garden
Includes
Information
Inspect HTML
Inspector
interencdec
Local Authority
runme.py
SansAlpha
Scan Surprise
Scavenger Hunt
Secret of the Polyglot
Special
Super SSH
Time Machine
Unminify
Useless
Verify
WebDecode
Where are the robots
Programming
CSS
🔗 CSS
1 - CSS Introduction
10 - Box Model
11 - The Border Box
12 - The Padding Box
13 - The Margin Box
14 - Lines and Blocks
15 - Position Property
16 - Position Relative and Z index
17 - Box Sizing
18 - Fixed Position
19 - Sticky Position
2 - Syntax
20 - Float
21 - Pseudo Classes
3 - Selectors
4 - CSS Colors
5 - Measurements
6 - CSS Fonts
7 - Text Alignment and Decoration
8 - CSS Backgrounds
9 - Shorthands
HTML
🔗 HTML
1 - What is HTML?
10 - HTML Colors
11 - Span & Div
12 - Meta Tags
13 - iFrames
14 - HTML Buttons
15 - HTML Forms
2 - HTML Syntaxes
3 - HyperLinks
4 - HTML Images
5 - HTML Audio
6 - HTML Videos
7 - Text Formatting
8 - HTML Lists
9 - HTML Tables
NextJs
🔗 NextJs 101
Fireship beyond 100 seconds NextJs
NextJs in 100 Seconds (Full beginners Tutorial)
Programming 101
🔗 Programming 101 (Fundamentals)
before you code, learn how computers work
JavaScript 101
JSON 101
TypeScript 101
React
Udemy - The Ultimate React Course 2024 React, Next.js, Redux & More
🔗 Udemy - The Ultimate React Course 2024 React, Next.js, Redux & More
Pure React
React Vs Vanilla JavaScript
What is REACT?
Why do FrontEnd Frameworks Exists
🔗 React
All The JavaScript You Need To Know For React
All The JavaScript You Need To Know For React (More JS To Know)
React Introduction - Bro Code
SQL
🔗 SQL
1 - SQL Introduction
2 - Setup MySQL
3 - MySQL How to create a DATABASE
4 - MySQL How to Create Table
5 - MySQL How to INSERT rows into a TABLE
6 - How to Select Data from a TABLE
Supabase
🔗 Supabase 101
🔗 Programming
Raspberry Pi
Pi Metasploitable
Raspberry Pi Kali-Linux Headless Setup
TryHackMe
Advent of Cyber 2024
Advent of Cyber 2024 ⛄️❄️
Day 1 Maybe SOC-mas music, he thought, doesn't come from a store?
Day 2 One man's false positive is another man's potpourri
Day 3 Even if I wanted to go, their vulnerabilities wouldn't allow it
Day 4 I'm all atomic inside!
Day 5 SOC-mas XX-what-ee
Day 6 If I can't find a nice malware to use, I'm not going
Day 7 Oh, no. I'M SPEAKING IN CLOUDTRAIL!
CTFs
Blue
Decryptify
Epoch
IDE
Light
RootMe
Simple CTF
TryHack3M Bricks Heist
W1seGuy
Modules
Command Line
Cryptography
Networking
Networking Fundamentals
Windows and AD Fundamentals
Paths
CyberSecurity 101
Walkthroughs
Active Directory Basics
Bypass Really Simple Security
Command Injection
Cryptography Basics
Defensive Security Intro
Intro to LAN
Linux Shells
Metasploit Introduction
Networking Concepts
Networking Core Protocols
Networking Essentials
Offensive Security Intro
Public Key Cryptography Basics
Search Skills
SOC L1 Alert Triage
Summary - Active Directory Basics
Walking An Application
What is Networking
Windows Command Line
Windows Fundamentals 1
Windows Fundamentals 2
Windows Fundamentals 3
Windows PowerShell
🐧 TryHackMe
Content Discovery
Networking Secure Protocols
TryHackMe TODO List
About Me
Blog Posts 📚
📝 Latest Posts
Raspberry Pi Kali-Linux Headless Setup
Jun 08, 2025
RaspberryPi
Blog
before you code, learn how computers work
Jun 08, 2025
programming
LowLevel
Assembly
Blog
programming101
Home
❯
自学
❯
PicoCTF
❯
Includes
Includes
Jun 08, 2025
1 min read
CTF
PicoCTF
WebExploit
Just go through the web files, U WILL SEE IT
Graph View
Backlinks
🔗 PicoGym