top of page
Articles
![](https://static.wixstatic.com/media/5b813d_b83bd704cdc04d0e9a27f896bba3f758~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5b813d_b83bd704cdc04d0e9a27f896bba3f758~mv2.webp)
![Pentesting: Essential Techniques for Effective Security Testing](https://static.wixstatic.com/media/5b813d_b83bd704cdc04d0e9a27f896bba3f758~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_auto/5b813d_b83bd704cdc04d0e9a27f896bba3f758~mv2.webp)
Oct 1, 20244 min read
Pentesting: Essential Techniques for Effective Security Testing
A comprehensive overview of pentesting, its phases, and commonly used tools to help you get started.
59
![Security Analyst Tools](https://static.wixstatic.com/media/5b813d_5d6811b973d041aaa8ee134a2afcdce9~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_5d6811b973d041aaa8ee134a2afcdce9~mv2.webp)
Jun 9, 20244 min read
Security Analyst Tools
A Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
147
![](https://static.wixstatic.com/media/5b813d_94c887f7a49e4ec6b89bee9ced319888~mv2.jpg/v1/fill/w_245,h_245,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/5b813d_94c887f7a49e4ec6b89bee9ced319888~mv2.webp)
![Google Dorks - Advanced Search](https://static.wixstatic.com/media/5b813d_94c887f7a49e4ec6b89bee9ced319888~mv2.jpg/v1/fill/w_288,h_175,fp_0.50_0.50,q_90,enc_auto/5b813d_94c887f7a49e4ec6b89bee9ced319888~mv2.webp)
Apr 22, 20233 min read
Google Dorks - Advanced Search
Explore what Google dorks are, how to use them effectively, and provide real-world examples for practical use.
4,538
![VulnHub Mr Robot Hacking Walkthrough 2](https://static.wixstatic.com/media/5b813d_fd6d235d297b4f9e89c9b6e90e4c1fe9~mv2.webp)
Mar 22, 20233 min read
VulnHub Mr Robot Hacking Walkthrough 2
Vulnhub is an online platform that provides a variety of virtual machines designed to test and enhance your hacking skills.
306
![](https://static.wixstatic.com/media/5b813d_f9f38c94213a4844926979f9200ac207~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5b813d_f9f38c94213a4844926979f9200ac207~mv2.webp)
![VulnHub Mr Robot Hacking Walkthrough 1](https://static.wixstatic.com/media/5b813d_f9f38c94213a4844926979f9200ac207~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_auto/5b813d_f9f38c94213a4844926979f9200ac207~mv2.webp)
Feb 28, 20233 min read
VulnHub Mr Robot Hacking Walkthrough 1
Vulnhub is an online platform that provides a variety of virtual machines designed to test and enhance your hacking skills.
638
![](https://static.wixstatic.com/media/5b813d_520c793532884a5bae2c46dc289a34d4~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5b813d_520c793532884a5bae2c46dc289a34d4~mv2.webp)
![Nmap Guide (network mapper)](https://static.wixstatic.com/media/5b813d_520c793532884a5bae2c46dc289a34d4~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_auto/5b813d_520c793532884a5bae2c46dc289a34d4~mv2.webp)
Jan 16, 20233 min read
Nmap Guide (network mapper)
Nmap (Network Mapper) is a free and open-source tool for network exploration and security auditing. It can be used to discover hosts and...
73
bottom of page