DEV Community

Trix Cyrus profile picture

Trix Cyrus

Cybersecurity/Gray Hat

Location Your System Joined Joined on  github website

Pronouns

trix/was/here

Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

6
Comments
3 min read

Want to connect with Trix Cyrus?

Create an account to connect with Trix Cyrus. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Introduction to Ethical Hacking: A Beginner's Guide

Introduction to Ethical Hacking: A Beginner's Guide

6
Comments 1
4 min read
Automate DevOps Workflows with GitHub Actions

Automate DevOps Workflows with GitHub Actions

7
Comments
3 min read
Introducing IPVulnScout: Tool for IP Vulnerability Assessment

Introducing IPVulnScout: Tool for IP Vulnerability Assessment

5
Comments
2 min read
Automating software installations on Linux using Python.

Automating software installations on Linux using Python.

6
Comments 1
3 min read
Introducing Hash-Hammer 🔨: A Multi-Threaded Hash-Cracking Tool

Introducing Hash-Hammer 🔨: A Multi-Threaded Hash-Cracking Tool

5
Comments
3 min read
Build a Python Bot to Automate Social Media Engagement

Build a Python Bot to Automate Social Media Engagement

5
Comments
3 min read
How to Automate Everyday Tasks with Python (Part 2)

How to Automate Everyday Tasks with Python (Part 2)

11
Comments
4 min read
How to Automate Everyday Tasks with Python

How to Automate Everyday Tasks with Python

20
Comments 2
3 min read
How to Set Up a Honeypot for Cyber Attacks

How to Set Up a Honeypot for Cyber Attacks

9
Comments 2
2 min read
Scheduling Your Posts: A Guide to Automating Social Media with Python

Scheduling Your Posts: A Guide to Automating Social Media with Python

10
Comments 1
3 min read
Scheduling Your Posts: A Guide to Automating Social Media with Python

Scheduling Your Posts: A Guide to Automating Social Media with Python

Comments
3 min read
How to Automate Social Media Posting with Python

How to Automate Social Media Posting with Python

6
Comments 3
3 min read
Building a Simple Python-Based Firewall for Home Networks

Building a Simple Python-Based Firewall for Home Networks

9
Comments
2 min read
50 Linux Networking Commands Every DevOps Engineer Should Master

50 Linux Networking Commands Every DevOps Engineer Should Master

5
Comments
2 min read
New Vulnerability Scanner (Must Try)

New Vulnerability Scanner (Must Try)

6
Comments
1 min read
Top 100 Linux Troubleshooting Commands (Must Know)

Top 100 Linux Troubleshooting Commands (Must Know)

6
Comments
4 min read
A Complete Guide to Social Engineering Attacks.

A Complete Guide to Social Engineering Attacks.

5
Comments
4 min read
50 Essential Bash Script Commands Every Linux User Should Know(MUST READ)

50 Essential Bash Script Commands Every Linux User Should Know(MUST READ)

25
Comments 3
2 min read
Top 5 Cybersecurity Certifications to Boost Your Career

Top 5 Cybersecurity Certifications to Boost Your Career

5
Comments
2 min read
List of 100 different Linux commands (Part-2) [Must Read]

List of 100 different Linux commands (Part-2) [Must Read]

12
Comments
3 min read
A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

11
Comments
3 min read
List of 100 basic to advanced Linux commands that are essential for users(Must Read)

List of 100 basic to advanced Linux commands that are essential for users(Must Read)

31
Comments 4
3 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

11
Comments
1 min read
SQLMap Cheat Sheet: A Quick Guide for Automated SQL Injection

SQLMap Cheat Sheet: A Quick Guide for Automated SQL Injection

7
Comments
3 min read
How To Get 224 Cpu(s) And 2 TB Storage For FREE!

How To Get 224 Cpu(s) And 2 TB Storage For FREE!

5
Comments
1 min read
How to Turn Your Device Into a Simple Server Using Node.js

How to Turn Your Device Into a Simple Server Using Node.js

6
Comments
3 min read
Making Spotify Song Downloader Using Python(mp3)

Making Spotify Song Downloader Using Python(mp3)

9
Comments
1 min read
How i got 1k+ followers on dev.to in just 2 days.

How i got 1k+ followers on dev.to in just 2 days.

5
Comments
1 min read
Making YouTube Videos Downloader Using Python(mp3 and mp4)

Making YouTube Videos Downloader Using Python(mp3 and mp4)

5
Comments
2 min read
How to Turn Your Device Into a Simple Server Using Python.

How to Turn Your Device Into a Simple Server Using Python.

5
Comments
3 min read
5 Tools Every Penetration Tester Should Know.

5 Tools Every Penetration Tester Should Know.

5
Comments
2 min read
How to deface a website!! Easiest Method -

How to deface a website!! Easiest Method -

6
Comments
3 min read
Trix Framework: Your Comprehensive Security Toolkit

Trix Framework: Your Comprehensive Security Toolkit

5
Comments
2 min read
How To Make A Password Cracker Using Python..

How To Make A Password Cracker Using Python..

6
Comments
2 min read
AI against Daunting Security: The Future of Self-Rule Hacking

AI against Daunting Security: The Future of Self-Rule Hacking

5
Comments
1 min read
Waymap v1.0.3 - Web Vulnerability Scanner

Waymap v1.0.3 - Web Vulnerability Scanner

5
Comments
1 min read
loading...