1. Broken Access Control Broken access control vulnerabilities enable attackers to gain access to user accounts, admin...
Resources
Scan all ports on target host sudo nmap -p- -T4 [target] Scan specific ports on target sudo...
Network penetration testing, or pentesting, is the practice of testing a computer network or web application to...
This document outlines the results of a penetration testing (pentest) exercise conducted on the Application Programming Interface...
To succeed as a cybersecurity analyst, you need to understand the traits, values, and thought processes of...
Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of...
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities...
Web hacking refers to the exploitation of applications via HTTP which can be done by manipulating the...
dnscan https://github.com/rbsec/dnscanKnockpy https://github.com/guelfoweb/knockSublist3r https://github.com/aboul3la/Sublist3rmassdns https://github.com/blechschmidt/massdnsnmap https://nmap.orgmasscan https://github.com/robertdavidgraham/masscanEyeWitness https://github.com/ChrisTruncer/EyeWitnessDirBuster https://sourceforge.net/projects/dirbuster/dirsearch https://github.com/maurosoria/dirsearchGitrob https://github.com/michenriksen/gitrobgit-secrets https://github.com/awslabs/git-secretssandcastle https://github.com/yasinS/sandcastlebucket_finder https://digi.ninja/projects/bucket_finder.phpGoogD0rker https://github.com/ZephrFish/GoogD0rker/Wayback Machine https://web.archive.orgSn1per...
SIEM stands for Security Information and Event Management. SIEM tools provide real-time analysis of security alerts generated...