Back to feeds

Slayer

Stealth • 2m

I am working on a self evolving cyber security network which can fit into any company's network and will keep on attacking itself and learning on it's own on to mitigate attacks and using decentralized sharing of the new attack vectors and solutions possibly finding zero day vulnerabilities before black hats. Would love to collaborate and am open to ideas as well.

0 replies1 like

More like this

Recommendations from Medial

Image Description

Vasvi Seth

Stealth • 8m

Vulnerabilities are the chinks in our armor, waiting to be exploited by threats. Regular inspections are crucial for organizations to identify and mitigate these weaknesses within their systems.

1 replies3 likes
Image Description
Image Description

Payal Manghnani

Stealth • 6m

The Akira ransomware has been identified as a significant threat to the LATAM airline industry, leveraging sophisticated tactics to encrypt valuable data and demand ransoms. This ransomware operation, active since early 2023, employs a blend of adv

See More
3 replies8 likes
1
Anonymous
Image Description
Image Description

🚨 Slow down the Meat consumptions otherwise anyday you will get heart attack because of Cholesterol and High Saturated Fats 💀 Annual Deaths: Around 1.8 million people die from heart attacks annually in India and mostly are young people's. Adopt h

See More
5 replies1 like

Ronak Patel

Stealth • 5m

Here Adani has planned his Adani G-2 There Hindenburg is attacking Adani and SEBI chief Madhabi buch What are your thoughts on tomorrow's market opening?

0 replies1 like

pratikontheblock

Stealth • 8m

Creating a web extension + CLI tool to save entire websites in one HTML file and upload them to a decentralized network. Thinking of adding AI features like summarization! Any ideas?

0 replies1 like

pratikontheblock

Stealth • 8m

Creating a web extension + CLI tool to save entire websites in one HTML file and upload them to a decentralized network. Thinking of adding AI features like summarization! Any ideas?

0 replies1 like
Image Description
Image Description

Sachin Jataw

Stealth • 23d

Creating a self-sustaining network that operates independently of traditional cellular SIM cards or satellite connections is a revolutionary idea. Such a system has the potential to transform communication, enhance connectivity in remote areas, and p

See More
3 replies3 likes
Anonymous
Image Description
Image Description

Once Chanakya Said — “ Be clam and wait for right time then attack on your target with proper strategies ”

2 replies5 likes

Varun Jeph

 • 

The NineHertz • 1m

Satoshi Nakamoto’s final forum post on Dec. 12, 2010, and his disappearance on Dec. 13 transferred Bitcoin’s development responsibility to its decentralized community.

0 replies
1

Vasvi Seth

Stealth • 7m

🚨 Attention, IT Professionals! 🚨 Beware of the latest security threat: PetitPotam! 🛡️ PetitPotam exploits vulnerabilities in Windows New Technology Local Area Network (LAN) Manager (NTLM), posing a significant risk to your network security. 🕵️‍

See More
0 replies6 likes

Download the medial app to read full posts, comements and news.