Oluwatimilehin Alabicyberbishop.hashnode.dev·4 hours agoBuilding a Cybersecurity LabIn this series, I will document the process of setting up a virtual lab environment as part of a technical assessment I received from [Redacted Company]. While the assessment outlined specific tasks, it did not provide clear instructions on how to im...Building a Cybersecurity Lab: A Technical Assessment#cybersecurity
bst04cybersources.hashnode.dev·Feb 8, 2025BrowserLeaks: Your Go-To Tool for Browser Security TestingIn today's digital age, understanding how your browser handles sensitive information is crucial for maintaining privacy and security. BrowserLeaks is a powerful online platform designed to help users test and analyze their browser's behavior when han...10 likesToolscybersources
Aditya Tripathilearnedtech.hashnode.dev·Feb 8, 2025GANs vs. Other AI Models: What Makes Them Unique?Artificial intelligence has been at the forefront of technological advancements, transforming industries and redefining possibilities. While a significant chunk of AI models focus on prediction, classification, or reinforcement learning, GANs create ...#cybersecurity
JENISH PAGHADALffuf.hashnode.dev·Feb 7, 2025Basic FuzzingDirectory Fuzzing As we can see from the example above, the main two options are -w for wordlists and -u for the URL. We can assign a wordlist to a keyword to refer to it where we want to fuzz. For example, we can pick our wordlist and assign the key...#cybersecurity
bst04cybersources.hashnode.dev·Feb 6, 2025Autopsy: The Ultimate Digital Forensics PlatformIn the field of digital forensics, tools play a critical role in uncovering evidence, analyzing data, and solving crimes. One such tool that stands out is Autopsy, an open-source digital forensics platform developed by The Sleuth Kit (TSK) team. This...10 likes·73 readsToolscybersources
bst04cybersources.hashnode.dev·Feb 6, 2025SQLMap: Your Ultimate Tool for Automating SQL Injection TestingIn the realm of web application security, identifying vulnerabilities like SQL injection is critical to protecting sensitive data. One of the most powerful tools in a pentester's arsenal is SQLMap, an open-source penetration testing tool designed to ...10 likes·34 readsToolssqlmap
bst04cybersources.hashnode.dev·Feb 6, 2025PentesterGPT: Your AI-Powered Sidekick for Ethical HackingIn the ever-evolving world of cybersecurity, tools are constantly being developed to help ethical hackers stay ahead of potential threats. One such innovation is PentesterGPT, an AI-driven assistant designed specifically for penetration testers and s...10 likes·27 readsResourcescybersources
bst04cybersources.hashnode.dev·Feb 6, 2025Understanding cap2hashcat: A Comprehensive GuideIn the world of cybersecurity, tools like cap2hashcat play a crucial role in helping security professionals analyze and crack wireless network passwords. This article will provide an in-depth look at what cap2hashcat is, how it works, its importance ...Toolshashcat
Victor Ukohatpscript.hashnode.dev·Feb 3, 2025CTF Solution: EMPIRE:LupinOneHello fellas, in this write-up, we'll provide the solution to the CTF, Empire:LupinOne. This is an easy-medium CTF. Although, a few hints were gotten from the discord channel to solve this. Let's dive straight into it. As usual, after importing the C...CTF SolutionsCTF Writeup
Vaishali Rawatmaveraw.hashnode.dev·Feb 3, 202510 Secure Coding Practices Every Developer Must FollowSecurity should be a top priority for every developer, regardless of the project size or industry. With cyber threats evolving daily, secure coding practices are essential to prevent vulnerabilities that attackers can exploit. Here are 10 secure codi... #SecureDevelopment