Category: Articles

How to use MITRE ATT&CK in SOC

Using MITRE ATT&CK in a Security Operations Center (SOC) can greatly enhance threat detection and response capabilities. Here are ...

Read More

How to Apply MITRE ATT&CK to Your Organization

Discover all the ways MITRE ATT&CK can help you defend your organization. Build your security strategy and policies by making the ...

Read More

How to Use SQLMap to Find SQL Injection Vulnerabil...

SQLMap is an open-source tool that automatically finds and exploits SQL injection vulnerabilities. You can use it to test web appl...

Read More

Web Application Penetration Checklist

This checklist is a high level checklist that contains a high level guide what approach we shall follow while testing a web applic...

Read More

100+ Top OSINT Tools

Here is a list of tools and resources for all things sourcing and #OSINT. Most of them are easy-to-use and make our lives more con...

Read More

ChatGPT Prompts for Bug Bounty

A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting.

Read More

Top 10 web hacking techniques of 2022

Check the Top 10 Web Hacking Techniques of 2022, the 16th edition of Portswigger community powered effort to identify the most imp...

Read More

How Hackers Can Become Persistent Threats

An academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can take in fu...

Read More

3 Ways ChatGPT Will Change Infosec in 2023

OpenAI's chatbot has the promise to revolutionize how security practitioners work.

Read More

XSS Methodology for Beginners

what is XSS (Cross-site scripting)?

Read More

Advanced Phishing Methods

Phishing attacks are becoming increasingly sophisticated. Adversaries are using advanced techniques to evade detection and trick i...

Read More

Recommended Tools for CTF

In addition a knowledge of basic Linux commands, access to the following tools (or equivalent tools) are recommended as preparatio...

Read More

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here