Sooty – A SOC Analyst CLI Tool
Sooty is a handy tool to help in Security Operations Center (SOC) operations. This tool help in the automation of...
Sooty is a handy tool to help in Security Operations Center (SOC) operations. This tool help in the automation of...
WiFi Adapter is a device used as an additional backup wifi interface. It is also used for assessing wifi security...
Reverse Engineering is a technique where an engineer tried to identify the design and architecture of a final product. There...
Fuzzing is a software testing methodology in which the hacker injects malformed or malicious inputs into the application. Generally, on...
Scapy is a python-based packet manipulation program used to sniff, send, and tamper network packets. This program is helpful in...
ISO/IEC 27001 is a well-known standard in the industry to secure and manage IT resources from malicious attacks. This blog...
Ghidra is a popular reverse engineering framework tool developed by the National Security Agency (NSA). This blog provides an easy-to-follow...
FRIDA is a Dynamic instrumentation toolkit used by developers, reverse engineers, and security researchers to identify security vulnerabilities in mobile...
This blog explains the CRLF injection and the prevention techniques to mitigate this vulnerability. What is CRLF Injection? CRLF, short...
Path Traversal vulnerability is an easy-to-find vulnerability in the web application. In OWASP Top 10 2021, it comes under A1:...
This blog lists interview questions and answers to Trusted Computing. Q. What is Trusted Computing? Ans: Combination of components and...
Quantum cryptography is a buzzword nowadays. We know that conventional cryptography plays a critical role in securing and protecting data...
ISO/IEC 27400 is a newly released comprehensive standard that provides guidelines on risks, principles, and controls for the security and...
Firefox is the first choice for security professionals and bug hunters. This blog lists out some tips to use firefox...