privacyIDEA | Open-source solution for reliable two-factor authentication
privacyIDEA is an open-source solution for reliable two-factor authentication. By using privacyIDEA, you can enhance your existing applications such as…
Free Ethical Hacking Course
Hi there, young Cyber Guardians! As we know, the cybersecurity field is quickly growing and expanding, a lot of people…
5 Useful Tips for Effective Open Source Intelligence (OSINT) Gathering
Advice #1: Profile Image Search The presence of profile pictures is a common occurrence on social media accounts. Even if…
How to Pass CompTIA Security+ | 2023
Hi there, Cyber Guardians! In this article, we are going to see many available paths to stay fresh on a…
Leakage Of Confidential Information Via .gitignore
Introduction This article discusses Git and demonstrates an example of a typical incorrect configuration. General Information When working with Git,…
SQL-Injection: Analysis of Real Example
SQL injection is an attack that can lead to compromising sensitive data and even complete system takeover. It’s important for…
Depix – Tool for Photo Depixiliation
What is Depix? Depix is a tool that can recover plaintext from pixelized screenshots. It works by using a technique…
How to Protect Your Company Against Squatting
What is Squatting? “Squatting” in cybersecurity often refers to a practice where attackers register domain names that are very similar…
Penetration Testing On a Database Using SQLmap
What is SQLmap? SQLmap is an open-source penetration testing tool designed to automate the process of identifying and exploiting SQL…
BYOB: Building Your Own Botnet with Ease
BYOB (Build Your Own Botnet) is an open-source post-exploitation framework designed for students, researchers, and developers to easily implement their…