Author: Lohitaksh Nandan
Introduction: As a cybersecurity enthusiast, I KRiPPto99 am always on the lookout for vulnerabilities in web applications and software. Recently,…
Introduction Identity security is more important than ever before. With the proliferation of online activity and the increasing amount of…
TOP 160+ NETWORK SECURITY TOOLS 1. afpfs-ng (0.8.2) – A client for the Apple Filing Protocol (AFP) > https://sites.google.com/site/alexthepuffin/ 2.…
Sessions A session is the total time devoted to an activity. In computer systems, a user session begins when a…
Doxing The term ‘Doxing’ is short for “dropping dox” ‘dox’ being slang for documents. Typically, doxing is a malicious act,…
What is Brute Force Attack? A brute force attack uses trial-and-error to guess login info, encryption keys, or find a…
XSS Cheat Sheet Basics HTML Context – Simple Tag Injection Use when input lands inside an attribute’s value of an…
OSCP Cheat Sheet Commands, Payloads and Resources for the Offensive Security Certified Professional Certification. Image credit: Offensive Security Let’s Get…
Awesome Threat Intelligence A curated list of awesome Threat Intelligence resources A concise definition of Threat Intelligence: evidence-based knowledge, including context,…
What is Server-Side Request Forgery (SSRF) ? SSRF is when you, as an attacker, successfully make the application triggering arbitrary…
Cybersecurity Forensics Welcome to the world of forensics in Cybersecurity. A collection of forensics tools, software, libraries, learning tutorials, frameworks,…
Digital Forensics Guide A guide covering Digital Forensics the applications, libraries and tools that will make you a better and…