manikanta-suru
I am passionate about Windows and VMware environments, alongside hybrid operations, expanding my proficiency in cloud technology and infrastructure management.I
Hyderabad
Pinned Repositories
-
These will help you increase your productivity 10X and you will regret not using them.
-WEB-APPLICATION-PENTESTING-CHECKLIST
π₯Exciting Discovery!π₯ Curious minds and cybersecurity enthusiasts know all too well the critical nature of thorough web application testing. In this light, I've stumbled upon a treasure that I must share with you, the "WEB APPLICATION PENTESTING CHECKLIST," an incredible resource based on OWASP principles!
100-web-vulnerabilities-names-
categorized into various types:
AWS-Amazon-Web-Services-100-days-Challenge-
Manikanta Suru
Basic-Interview-Questions-for-Windows-S-erver-L1-L2-Profile-and-Vmware
Bug-Bounty-GPT---Tips-and-Tricks-using-CHATGPT
mani.github.io
manikanta-suru.github.io
Mastering-the-Linux-Command-Line
Top 50 Linux Commands Every User Should Know " Explained with Real-World Examples"
VMWare-Workstation-PRO-17
VMWare Workstation PRO 17 keys
manikanta-suru's Repositories
manikanta-suru/TOP-250-Interviews-Questions-on-AWS
TOP 250+ Interviews Questions on AWS
manikanta-suru/VAPT-Interview-Questions
manikanta-suru/SAST-vs-DAST
SAST vs DAST in Application Security: A Quick Comparison
manikanta-suru/aws-cloudformation-templates
manikanta-suru/Cloud-Security-The-Shared-Responsibility-Model
Cloud Security & The Shared Responsibility Model
manikanta-suru/Types-of-Privileged-Accounts
manikanta-suru/Networking-for-DevSecOps
manikanta-suru/Credential-Dumping-Phishing-Windows-Credentials
Credential Dumping: Phishing Windows Credentials
manikanta-suru/Active-Directory-Attacks
Explore the depths of Active Directory vulnerabilities and attack vectors in this comprehensive guide, essential for every IT professional navigating the ever-evolving landscape of cybersecurit
manikanta-suru/Nmap-Cheat-Sheet
map Cheat-Sheet that's a goldmine for anyone looking to sharpen their network scanning skills
manikanta-suru/RDP-Penetration-Testing-Guide-
π Unlock the Secrets of RDP Penetration Testing! ππ Excited to share "RDP Penetration Testing" - a detailed guide exploring the intricacies of Remote Desktop Protocol (RDP) security and penetration testing techniques. This booklet is a goldmine for cybersecurity professionals,
manikanta-suru/Credential-Dumping-Cheat-Sheet
This guide is a treasure trove for cybersecurity professionals, ethical hackers, and IT administrators, providing a thorough exploration of credential dumping techniques and defenses
manikanta-suru/Demystifying-Ransomware-Attacks
Unmasking the Role of RDP and Strengthening Your Defenses π‘οΈ
manikanta-suru/Opensource-and-Freeware-Threat-Modeling-Softwares
The global Threat Modeling Software Market is expected to reach $1.8 billion by 2028. Here is a list of Opensource, and Freeware Threat Modeling Softwares. If you need help figuring out where to start, the Threat Modeling Manifesto is the right place https://lnkd.in/gV4K_VPq.
manikanta-suru/OSI-Layers-vs.-Possible-Cyber-Attacks-Controls
πππ π₯ππ²ππ«π¬ ππ¬. π©π¨π¬π¬π’ππ₯π ππ²πππ« ππππππ€π¬ ππ¬. ππππππ€ ππ¨π§ππ«π¨π₯π¬
manikanta-suru/CWLW-Server
System hacking is defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a computer system or network to gain unauthorized access to its data or take illegal advantage.
manikanta-suru/Bug-Bounty-GPT---Tips-and-Tricks-using-CHATGPT
manikanta-suru/100-web-vulnerabilities-names-
categorized into various types:
manikanta-suru/Web-Penetration-Testing-2023
manikanta-suru/Hands-on-AWS-Penetration-Testing
Hands on AWS Penetration Testing
manikanta-suru/AWS-Cloud-Security-Check-list
You know, Cloud Security is one of the most important topics of today and the future.πΈ Today I have a great checklist suggestion on AWS Cloud SecurityβοΈπ€© You should definitely add it to your bookmarks.π€π»π
manikanta-suru/SSH-Penetration-Testing
"SSH Penetration Testing" - a comprehensive guide for cybersecurity enthusiasts and professionals. This resource dives deep into the world of Secure Shell (SSH) and its vulnerabilities, offering practical insights for enhancing your network's security.
manikanta-suru/cybersecurity-container-security
manikanta-suru/GradleVulnerableApp-Maikanta
manikanta-suru/Iac
manikanta-suru/Awesome-Azure-Penetration-Testing
π I've come across an exceptional document titled "Awesome Azure Penetration Testing" and it's packed with insights that cybersecurity professionals will find invaluable.
manikanta-suru/10-Best-Hacker-Friendly-Search-Engines-Of-2023
The search engines allow users to find any content via the world wide web.
manikanta-suru/100-tools-every-self-respecting-web-app-hacker-should-know
tools every self respecting web app hacker should kno
manikanta-suru/-WEB-APPLICATION-PENTESTING-CHECKLIST
π₯Exciting Discovery!π₯ Curious minds and cybersecurity enthusiasts know all too well the critical nature of thorough web application testing. In this light, I've stumbled upon a treasure that I must share with you, the "WEB APPLICATION PENTESTING CHECKLIST," an incredible resource based on OWASP principles!
manikanta-suru/-.