Forem

Giorgi Akhobadze profile picture

Giorgi Akhobadze

I have experience in developing control and automation systems, internal corporate systems, creating databases and creating control and monitoring programs.

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Cover image for Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Comments
6 min read

Want to connect with Giorgi Akhobadze?

Create an account to connect with Giorgi Akhobadze. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
The Psychology of Social Engineering: A Deep Dive into Modern Manipulation Tactics
Cover image for The Psychology of Social Engineering: A Deep Dive into Modern Manipulation Tactics

The Psychology of Social Engineering: A Deep Dive into Modern Manipulation Tactics

Comments
6 min read
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance
Cover image for The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

5
Comments
8 min read
Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move
Cover image for Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move

Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move

2
Comments
9 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network
Cover image for Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
The Evolution of Malware: An In-Depth Look at Polymorphic and Metamorphic Threats
Cover image for The Evolution of Malware: An In-Depth Look at Polymorphic and Metamorphic Threats

The Evolution of Malware: An In-Depth Look at Polymorphic and Metamorphic Threats

Comments
7 min read
Beyond Passwords: A Comprehensive Guide to Modern Multi-Factor Authentication Methods
Cover image for Beyond Passwords: A Comprehensive Guide to Modern Multi-Factor Authentication Methods

Beyond Passwords: A Comprehensive Guide to Modern Multi-Factor Authentication Methods

Comments
5 min read
A Complete Guide to Network Forensics: Investigating and Analyzing Network Traffic for Intrusions
Cover image for A Complete Guide to Network Forensics: Investigating and Analyzing Network Traffic for Intrusions

A Complete Guide to Network Forensics: Investigating and Analyzing Network Traffic for Intrusions

Comments
6 min read
Wi-Fi Deauthentication attack
Cover image for Wi-Fi Deauthentication attack

Wi-Fi Deauthentication attack

Comments
3 min read
SQL Injection attack
Cover image for SQL Injection attack

SQL Injection attack

Comments
2 min read
MITM attack
Cover image for MITM attack

MITM attack

Comments
3 min read
Cloud cyber attacks
Cover image for Cloud cyber attacks

Cloud cyber attacks

Comments
2 min read
EXIFViewer

EXIFViewer

Comments
1 min read
Employees Management System (EMS)
Cover image for Employees Management System (EMS)

Employees Management System (EMS)

1
Comments
4 min read
Password Generator

Password Generator

Comments
1 min read
QR Code Generator

QR Code Generator

Comments
2 min read
SecureText App

SecureText App

Comments
2 min read
SecureFile App

SecureFile App

Comments
2 min read
loading...