JagSkap

Tuesday, October 5, 2021

Facebook, Instagram and Whatsapp were all down | 4th Oct 2021

Facebook, Instagram and Whatsapp would never go down, can it?

Read more »
Posted by JagSkap at 9:26 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Latest Post

Input Manipulation Attacks on ML Models : Using FGSM

Overview of OWASP Top 10 ML & LLM Security Checklist Understanding   Attack Surfaces in   AI Systems Adversarial Attacks ML01:2023 - Inp...

Search Blog

Jagskap Blog List

  • Input Manipulation Attack on ML Models
  • Adversarial Attack on ML:Explained
  • Understanding Attack Surface in AI Lifecycle
  • Overview of OWASP Top 10 ML & LLM Security Checklist
  • DeepSeek vs. ChatGPT: A Clash of AI Titans
  • Understanding Large Language Models
  • Understanding Natural Language Processing (NLP) for Beginners
  • From Pager to Bomb: Examining the Feasibility of Remote Explosions
  • Approach to Crack OSCP Examination
  • Facebook, Instagram and Whatsapp were all down | 4th Oct 2021
  • Buffer Overflow - Overview - Part I
  • Knife | HackTheBox | Walkthrough
  • Shocker | HackTheBox | Walkthrough
  • Cross-Site WebSocket Hijacking
  • Privilege Escalation in Linux using SUID Executables
  • Insecure Deserialization in PHP
  • SMTP Injection
  • BRAINPAN - Buffer Overflow
  • Portable Executable File
  • An Overview of Windows Registry
  • Malware Analysis - Part I - Basics
  • Malware Analysis - Part II - Setting up Lab
  • Malware Analysis - Part III(A) - Basic Static Analysis
  • XML External Entity - Overview - Part I
  • XML External Entities - Inband - Part II
  • XML External Entities - Out of band - Part III
  • XML External Entities - Billion Laughter Attack - Part IV
  • XML External Entities - SSRF - Part V
  • XML External Entities - DNS Resolution - Part VI
  • Cap | Hack The Box (HTB) | CTF Walkthrough
  • Buffer Overflow - Creating Vulnerable Server - Part II
  • Stack Based Buffer Overflow Exploit - Part III
  • SEH Based Buffer Overflow Exploit - Part IV
  • Buffer Overflow Mitigation & Recommendation Technique - Part V
  • Love | Hack The Box (HTB) | CTF Walkthrough
Show 10 Show All

Blog Archive

  • ▼  2025 (5)
    • ▼  February (4)
      • Input Manipulation Attacks on ML Models : Using FGSM
      • Adversarial Attack in ML Explained | Jagskap
      • Understanding Attack Surface in AI Lifecycle | Jag...
      • Overview of OWASP Top 10 ML & LLM Security Checkli...
    • ►  January (1)
  • ►  2024 (3)
    • ►  September (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2021 (13)
    • ►  December (1)
    • ►  October (8)
    • ►  August (2)
    • ►  June (2)
  • ►  2020 (1)
    • ►  June (1)
  • ►  2019 (16)
    • ►  October (3)
    • ►  September (1)
    • ►  August (6)
    • ►  July (2)
    • ►  June (4)

Contributors

  • Jagskap
  • Priyanka Kumari
Copywrite Jagskap.blogspot.com. Awesome Inc. theme. Theme images by Dizzo. Powered by Blogger.