Tag list

Tools for Credential Harvesting

This post lists some pentesting tools for Credential Harvesting. List of Tools for Credential Harvesting Tools for Credential Harvesting featured on this post. Mimikatz Mimikatz is software that performs leverage the Mimikatz exploit to extract passwords stored in memory on…

Resources for Cybersecurity Leaders

This post lists some useful resources for IT security or cybersecurity leaders, like Chief Information Security Officer (CISO). List of Bulletins for Cybersecurity Leaders Articles, insights, blogs or bulletins aims to cybersecurity leaders. Gartner for Cybersecurity Leaders McKinsey Cybersecurity…

Web Back End Frameworks

This post is an introduction to web application or web back end frameworks. Web back end framework ease the tasks for the developer when working on back end scripting with languages like Java, Python or PHP. List of Web Back…

Scheduling Web Apps for Peers

This post lists some apps that aids to agree a date between a group of people or peers. It discards more complex apps that also manage calendars or book appointments for businesses. In the case of business, the scheduling is…

Game Development Engines

A game engine is a software platform that provides a set of features and functionalities for creating and running games. It usually includes graphics, physics, sound, input, networking, scripting, and other components that are essential for game development Do not…