Kubernetes Cluster – Interactive Architecture Diagram
OWASP TOP 10 – Flashcards. Learn OWASP Top 10 using flashcards
Cybersecurity and ethical hacking terminologies Flashcards
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.
log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
What is log4shell ? “Log4Shell” got its name by researchers at LunaSec and credited to Chen Zhaojun of Alibaba. It is an remote code execution… Read More »log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
Quickly Find Dom-Based XSS Vulnerabilities with Burp Suite’s Dom Invader.
Nmap Cheatsheet – Network Mapper tool used to scan networks and devices.
EyeWitness is an open-source tool that is used to take screenshots of the website RDP services, and open VNC servers, provide some server header info and identify default credentials if known.
There is a significant increase in cybersecurity requirements with the exponential growth of job postings over 94% in just seven years. As opposed to this surge, other IT jobs have just grown over 30% in general. So, that leaves a 300% increase in the demand encompassing all IT job profiles. Cybersecurity happens to account for about 13% of all IT jobs.