DEV Community

Trix Cyrus profile picture

Trix Cyrus

Cybersecurity/Gray Hat 15k+ Followers On Dev.to Doing Paid Promotion on My Profile

Location Your System Joined Joined on  github website

Pronouns

trix/was/here

Top 140+ Unique And Free APIs for Developers to Supercharge Development in 2025 [Must Read]

Top 140+ Unique And Free APIs for Developers to Supercharge Development in 2025 [Must Read]

25
Comments
16 min read

Want to connect with Trix Cyrus?

Create an account to connect with Trix Cyrus. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
How to Accept Cryptocurrency Payments: A Guide for Beginners

How to Accept Cryptocurrency Payments: A Guide for Beginners

24
Comments 2
9 min read
Part 11: Building Your Own AI - Introduction to Generative Models: GANs and VAEs

Part 11: Building Your Own AI - Introduction to Generative Models: GANs and VAEs

25
Comments
3 min read
Unlock Your Creativity with ChatGPT: 1000+ ChatGPT Prompts for 40+ Categories

Unlock Your Creativity with ChatGPT: 1000+ ChatGPT Prompts for 40+ Categories

29
Comments
3 min read
Part 10: Building Your Own AI - Reinforcement Learning: Teaching AI Through Rewards

Part 10: Building Your Own AI - Reinforcement Learning: Teaching AI Through Rewards

10
Comments
3 min read
Part 9: Building Your Own AI - Natural Language Processing (NLP) for Language Understanding

Part 9: Building Your Own AI - Natural Language Processing (NLP) for Language Understanding

18
Comments
3 min read
Part 8: Building Your Own AI -Recurrent Neural Networks (RNNs) for Sequential Data

Part 8: Building Your Own AI -Recurrent Neural Networks (RNNs) for Sequential Data

11
Comments
3 min read
Submission For Bright Data Web Scraping Challenge: Web Scraper Using Bright Data API

Submission For Bright Data Web Scraping Challenge: Web Scraper Using Bright Data API

26
Comments
3 min read
Part 7: Building Your Own AI - Convolutional Neural Networks (CNNs) for Image Processing

Part 7: Building Your Own AI - Convolutional Neural Networks (CNNs) for Image Processing

9
Comments
3 min read
Part 6: Building Your Own AI - Neural Networks and Deep Learning

Part 6: Building Your Own AI - Neural Networks and Deep Learning

11
Comments
3 min read
Follow Trixsec on Instagram for Cybersecurity Updates, Memes, and Tools!

Follow Trixsec on Instagram for Cybersecurity Updates, Memes, and Tools!

5
Comments
1 min read
Mastering SQLMap Tamper Scripts: The Ultimate Guide to Evading WAFs Like a Pro [Must Read Article]

Mastering SQLMap Tamper Scripts: The Ultimate Guide to Evading WAFs Like a Pro [Must Read Article]

5
Comments
3 min read
Part 5: Building Your Own AI - Exploring Unsupervised Learning and Clustering

Part 5: Building Your Own AI - Exploring Unsupervised Learning and Clustering

9
Comments
3 min read
Part 4: Building Your Own AI - Diving Deeper into Supervised Learning

Part 4: Building Your Own AI - Diving Deeper into Supervised Learning

9
Comments
3 min read
Part 3: Building Your Own AI - Understanding the Basics of Machine Learning Algorithms

Part 3: Building Your Own AI - Understanding the Basics of Machine Learning Algorithms

7
Comments
3 min read
Part 2: Building Your Own AI - Setting Up the Environment for AI/ML Development

Part 2: Building Your Own AI - Setting Up the Environment for AI/ML Development

13
Comments
5 min read
Part 1: Building Your Own AI - Introduction to AI and Machine Learning

Part 1: Building Your Own AI - Introduction to AI and Machine Learning

23
Comments
3 min read
🌍 GeoIP Lookup Tool: Easily Get Geolocation Information of Any IP Address.

🌍 GeoIP Lookup Tool: Easily Get Geolocation Information of Any IP Address.

13
Comments 2
1 min read
End Of Series: Mastering Cross-Site Scripting (XSS)

End Of Series: Mastering Cross-Site Scripting (XSS)

8
Comments
1 min read
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

6
Comments
4 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

5
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

5
Comments
5 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

6
Comments
4 min read
Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

5
Comments
4 min read
Mastering Arch Linux: A Guide to Installation, Commands, and Mastery(Part-1)[Must Read]

Mastering Arch Linux: A Guide to Installation, Commands, and Mastery(Part-1)[Must Read]

8
Comments 3
3 min read
Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

5
Comments
5 min read
Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

8
Comments
4 min read
Proxy Checker: The Ultimate Proxy Validation Tool 🕵️‍♂️💻

Proxy Checker: The Ultimate Proxy Validation Tool 🕵️‍♂️💻

12
Comments 1
2 min read
Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

6
Comments
5 min read
Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

13
Comments
4 min read
End Of Series: SQL Injection Detect & Defend

End Of Series: SQL Injection Detect & Defend

5
Comments 1
1 min read
Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

6
Comments 1
3 min read
Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

5
Comments
3 min read
Part 8: SQL Injection Series - Advanced Prevention Techniques and Real-World Applications

Part 8: SQL Injection Series - Advanced Prevention Techniques and Real-World Applications

6
Comments
2 min read
Part 7: SQL Injection Series: Advanced SQL Injection Techniques

Part 7: SQL Injection Series: Advanced SQL Injection Techniques

5
Comments 1
4 min read
Part 6: SQL Injection Series: Case Studies and Lessons Learned

Part 6: SQL Injection Series: Case Studies and Lessons Learned

6
Comments
4 min read
Part 5: SQL Injection Series: Future Trends and Emerging Challenges

Part 5: SQL Injection Series: Future Trends and Emerging Challenges

5
Comments
4 min read
The Ultimate Linux Command Cheat Sheet for 2024

The Ultimate Linux Command Cheat Sheet for 2024

13
Comments 3
2 min read
Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

5
Comments
4 min read
Celebrating 10,000 Followers on DEV.to – A Journey of Learning and Growth[Must Read]

Celebrating 10,000 Followers on DEV.to – A Journey of Learning and Growth[Must Read]

5
Comments
3 min read
How to Detect and Defend Against SQL Injection Attacks - Part 3[Must Read]

How to Detect and Defend Against SQL Injection Attacks - Part 3[Must Read]

5
Comments
4 min read
Submission for the DevCycle Feature Flag Challenge: Feature Flag Funhouse

Submission for the DevCycle Feature Flag Challenge: Feature Flag Funhouse

34
Comments 5
2 min read
How to Detect and Defend Against SQL Injection Attacks - Part 2

How to Detect and Defend Against SQL Injection Attacks - Part 2

7
Comments 1
4 min read
How to Detect and Defend Against SQL Injection Attacks(Part-1)[Must Read]

How to Detect and Defend Against SQL Injection Attacks(Part-1)[Must Read]

6
Comments
4 min read
🚀 AdminProber v1.1: The Ultimate Admin Panel Finder Tool for Penetration Testers and Ethical Hackers

🚀 AdminProber v1.1: The Ultimate Admin Panel Finder Tool for Penetration Testers and Ethical Hackers

7
Comments
3 min read
How to Hack Wi-Fi Networks: A Comprehensive Guide for Advanced Penetration Testing

How to Hack Wi-Fi Networks: A Comprehensive Guide for Advanced Penetration Testing

6
Comments
5 min read
The 10 Most Dangerous Malware Attacks in History

The 10 Most Dangerous Malware Attacks in History

7
Comments 1
3 min read
Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

5
Comments
3 min read
Introduction to Ethical Hacking: A Beginner's Guide

Introduction to Ethical Hacking: A Beginner's Guide

6
Comments 1
4 min read
Automate DevOps Workflows with GitHub Actions

Automate DevOps Workflows with GitHub Actions

7
Comments
3 min read
Introducing IPVulnScout: Tool for IP Vulnerability Assessment

Introducing IPVulnScout: Tool for IP Vulnerability Assessment

5
Comments
2 min read
Automating software installations on Linux using Python.

Automating software installations on Linux using Python.

6
Comments 1
3 min read
Introducing Hash-Hammer 🔨: A Multi-Threaded Hash-Cracking Tool

Introducing Hash-Hammer 🔨: A Multi-Threaded Hash-Cracking Tool

5
Comments
3 min read
Build a Python Bot to Automate Social Media Engagement

Build a Python Bot to Automate Social Media Engagement

5
Comments
3 min read
How to Automate Everyday Tasks with Python (Part 2)

How to Automate Everyday Tasks with Python (Part 2)

11
Comments
4 min read
How to Automate Everyday Tasks with Python

How to Automate Everyday Tasks with Python

21
Comments 2
3 min read
How to Set Up a Honeypot for Cyber Attacks

How to Set Up a Honeypot for Cyber Attacks

10
Comments 2
2 min read
Scheduling Your Posts: A Guide to Automating Social Media with Python

Scheduling Your Posts: A Guide to Automating Social Media with Python

9
Comments 1
3 min read
Scheduling Your Posts: A Guide to Automating Social Media with Python

Scheduling Your Posts: A Guide to Automating Social Media with Python

5
Comments
3 min read
loading...