This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Category: Articles
How to use MITRE ATT&CK in SOC
Using MITRE ATT&CK in a Security Operations Center (SOC) can greatly enhance threat detection and response capabilities. Here are ...
How to Apply MITRE ATT&CK to Your Organization
Discover all the ways MITRE ATT&CK can help you defend your organization. Build your security strategy and policies by making the ...
How to Use SQLMap to Find SQL Injection Vulnerabil...
SQLMap is an open-source tool that automatically finds and exploits SQL injection vulnerabilities. You can use it to test web appl...
Web Application Penetration Checklist
This checklist is a high level checklist that contains a high level guide what approach we shall follow while testing a web applic...
100+ Top OSINT Tools
Here is a list of tools and resources for all things sourcing and #OSINT. Most of them are easy-to-use and make our lives more con...
ChatGPT Prompts for Bug Bounty
A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting.
Top 10 web hacking techniques of 2022
Check the Top 10 Web Hacking Techniques of 2022, the 16th edition of Portswigger community powered effort to identify the most imp...
How Hackers Can Become Persistent Threats
An academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can take in fu...
3 Ways ChatGPT Will Change Infosec in 2023
OpenAI's chatbot has the promise to revolutionize how security practitioners work.
XSS Methodology for Beginners
what is XSS (Cross-site scripting)?
Advanced Phishing Methods
Phishing attacks are becoming increasingly sophisticated. Adversaries are using advanced techniques to evade detection and trick i...
Recommended Tools for CTF
In addition a knowledge of basic Linux commands, access to the following tools (or equivalent tools) are recommended as preparatio...