Kubernetes Cluster – Interactive Architecture Diagram
OWASP TOP 10 – Flashcards. Learn OWASP Top 10 using flashcards
Cybersecurity and ethical hacking terminologies Flashcards
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.
log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
What is log4shell ? “Log4Shell” got its name by researchers at LunaSec and credited to Chen Zhaojun of Alibaba. It is an remote code execution… Read More »log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
Quickly Find Dom-Based XSS Vulnerabilities with Burp Suite’s Dom Invader.
Nmap Cheatsheet – Network Mapper tool used to scan networks and devices.
DNS, or the Domain Name System, resolves human readable domain names (for example, http://www.hacksheets.in) to machine readable IP addresses (for example, 18.104.22.168).
TCP Three way handshake process cheatsheet.