DEV Community

Hafiz Muhammad Attaullah profile picture

Hafiz Muhammad Attaullah

I'm a Telecommunication Engineer, SecOps and Multi-Cloud Enthusiast, MATLAB and Python Cody.

Education

NED University of Engineering and Technology

Work

Cyber Security Consultant

Integrate DEV.to blogs to WordPress site

Integrate DEV.to blogs to WordPress site

Comments
2 min read

Want to connect with Hafiz Muhammad Attaullah?

Create an account to connect with Hafiz Muhammad Attaullah. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Delay-Based Attack Payload

Delay-Based Attack Payload

Comments
2 min read
Deletion of Data = Integrity Impact, Deletion of Data Availability Impact

Deletion of Data = Integrity Impact, Deletion of Data Availability Impact

Comments
2 min read
Cybersecurity Budget Analysis

Cybersecurity Budget Analysis

Comments
2 min read
Incident Response For Common Attack Types

Incident Response For Common Attack Types

1
Comments
2 min read
Don't go straight into cyber

Don't go straight into cyber

Comments
2 min read
Can You Trust AES Encryption?

Can You Trust AES Encryption?

Comments
3 min read
How does SecOps work with DevOps?

How does SecOps work with DevOps?

Comments
2 min read
Going Beyond the Certification

Going Beyond the Certification

1
Comments
1 min read
Post-Quantum Market Sizing and Transition Costs: Fact Vs Fiction

Post-Quantum Market Sizing and Transition Costs: Fact Vs Fiction

1
Comments
2 min read
You do not need a certification or a degree to work in CyberSecurity

You do not need a certification or a degree to work in CyberSecurity

Comments
2 min read
Please STOP with “fix all high and critical” CVEs

Please STOP with “fix all high and critical” CVEs

1
Comments 6
2 min read
Phishing using Google Ads - An awareness

Phishing using Google Ads - An awareness

2
Comments 2
2 min read
Noisy Intermediate Scale Quantum Computer (NISQ)

Noisy Intermediate Scale Quantum Computer (NISQ)

1
Comments
2 min read
Cyber Security – “Are we Secure”

Cyber Security – “Are we Secure”

5
Comments
2 min read
Machine Learning for Cybersecurity 101

Machine Learning for Cybersecurity 101

4
Comments
13 min read
My 1 Year Youtube Anniversary: Key Takeaways to Growing a YouTube Channel

My 1 Year Youtube Anniversary: Key Takeaways to Growing a YouTube Channel

1
Comments
6 min read
Attacking Application Tips

Attacking Application Tips

4
Comments
1 min read
Tips for Tech Enthusiast Students

Tips for Tech Enthusiast Students

2
Comments
4 min read
My 2021 - Things that I learnt during the course of the year

My 2021 - Things that I learnt during the course of the year

4
Comments
3 min read
All about OSCP - Material

All about OSCP - Material

2
Comments
1 min read
To find company admin panels

To find company admin panels

3
Comments 2
1 min read
DEV-OPS

DEV-OPS

25
Comments
2 min read
AWS Community Builder

AWS Community Builder

3
Comments
3 min read
Hack WiFi Passwords using Kali

Hack WiFi Passwords using Kali

6
Comments
2 min read
What is your image on dimensions?

What is your image on dimensions?

2
Comments
2 min read
My Personal IT Learning Journey

My Personal IT Learning Journey

13
Comments 2
5 min read
Ethical Hacker's Operating Systems

Ethical Hacker's Operating Systems

Comments 4
2 min read
Why Certifications Matter - Reasons

Why Certifications Matter - Reasons

1
Comments
5 min read
Getting started with data science and machine learning

Getting started with data science and machine learning

4
Comments
2 min read
Python list and a NumPy Array

Python list and a NumPy Array

1
Comments
1 min read
Application Layer DDoS Attacks

Application Layer DDoS Attacks

6
Comments
2 min read
IP / Phone Number Dox Method

IP / Phone Number Dox Method

Comments
2 min read
Ethical Tools

Ethical Tools

5
Comments
3 min read
Exploit Website Databases Using SQLmap

Exploit Website Databases Using SQLmap

3
Comments
2 min read
GitHub-101

GitHub-101

1
Comments
4 min read
Who am I | Hafiz Muhammad Attaullah

Who am I | Hafiz Muhammad Attaullah

1
Comments
2 min read
Web Threats

Web Threats

Comments
2 min read
Web server attack tools

Web server attack tools

Comments
1 min read
My Machine Learning Workflow

My Machine Learning Workflow

2
Comments
1 min read
RDP Cracking Method

RDP Cracking Method

5
Comments 3
1 min read
XSS BYPASS HARD CLOUDFLARE WAF SOLUTION

XSS BYPASS HARD CLOUDFLARE WAF SOLUTION

Comments
1 min read
Awesome CV Master

Awesome CV Master

3
Comments
2 min read
Intellingence-Resources

Intellingence-Resources

5
Comments 7
3 min read
Skills for Hacking

Skills for Hacking

Comments
1 min read
VS Code Extensions for Python

VS Code Extensions for Python

1
Comments 1
1 min read
Industry 4.0 Buzzword

Industry 4.0 Buzzword

2
Comments
2 min read
Python libraries

Python libraries

Comments 1
2 min read
5 Steps to Create Face Emotion Recognition Project

5 Steps to Create Face Emotion Recognition Project

Comments
1 min read
Matlab for Academic Researchers

Matlab for Academic Researchers

Comments 1
2 min read
Hacking with HTML/CSS

Hacking with HTML/CSS

4
Comments
11 min read
Tips for Writing Your Research Proposal

Tips for Writing Your Research Proposal

Comments
3 min read
Machine Learning FYP Ideas

Machine Learning FYP Ideas

30
Comments 1
66 min read
Free Hosting Providers

Free Hosting Providers

10
Comments 5
2 min read
Risks Of Using A Public Wi-Fi

Risks Of Using A Public Wi-Fi

1
Comments
2 min read
Artificial Intelligence - An Overview

Artificial Intelligence - An Overview

7
Comments
18 min read
loading...