Category Cybersecurity

Vulnerability Assessment Tools for PC

List of vulnerability assessment tools: One of the most popular are Nikto, N-Stalker or Burp Suite. The Open Web Application Security Project (OWASP) maintains a comprehensive list of vulnerability assessment tools: List of vulnerability assessment tools Nessus Web-based. Commercial.…

IT Vulnerability Databases

This post includes a list of  public resources (e.g., databases) for vulnerability research. It also features some well-known sites that are no longer available. Exploit Database (Exploit DB) is an archive of exploits for the purpose of public security, and it…

LDAP Enumeration Tools

This post summarizes some enumeration tools for lightweight directory access protocol (LDAP). To read more about LDAP and Directory Services, please read this post. List of LDAP Enumeration Tools LDAP Enumeration Tools: Softerra LDAP Administrator LDAP Admin Tool LDAP…

Cloud Deployment Models

This post features different types of clouds. This post is part of the introduction to cloud computing. Virtual Private Cloud (VPC) Featured Cloud Deployment Models Cloud Deployment Models: Private Cloud: A private cloud, also known as internal or corporate cloud,…

Security Testing Methodologies

Security Testing Methodologies: List of Security Testing Methodologies Open Web Application Security Project (OWASP) Open Web Application Security Project (OWASP) is the Open Web Application Security Project, which is an open-source application security project that assists the organizations to purchase,…