Burpsuite Series : Part – 1
In the previous document, we completed the installation and checked and captured some traffic. In this document, we will explore how the Burp Suite tool works and examine all its…
Let's Hack Together
In the previous document, we completed the installation and checked and captured some traffic. In this document, we will explore how the Burp Suite tool works and examine all its…
Qualys is a widely used cloud-based security and compliance software suite that helps organizations assess and manage their IT infrastructure security. It provides a wide range of services including vulnerability…
An Information Security Management Program (ISMP) is a comprehensive framework that organisations implement to protect their information assets and ensure the confidentiality, integrity, and availability of their data. The key…
Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed information security vulnerabilities and exposures. Managed by the MITRE Corporation, CVE aims to provide common identifiers for publicly known…
OWASP – This stands for the Open Web Application Security Project. OWASP is a non-profit organization that, every 3-4 years, publishes a list of the top 10 vulnerabilities and provides…