GitHub
Linkedin
Twitter
Home
Offensive
Network
Security
Scripts
Search
Friday, May 9, 2025
Privacy Policy
Content Policy
About Me
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
your email
A password will be e-mailed to you.
CybB0rg – Security Engineer
Home
Offensive
Offensive
Web Common File Vulnerabilities
Offensive
Cyber Kill Chain
Offensive
ORM Vulnerabilities
Offensive
SQL Injection Types
Offensive
What’s Log4j and Log4Shell vulnerability
Network
Network
TCP Flags Guide
Network
LDAP Explained
Network
Wi-Fi Standards and Protocols
Network
Domain Controller
Network
System Failure Behaviours Explained
Security
Network
TCP Flags Guide
Network
LDAP Explained
Network
Wi-Fi Standards and Protocols
Security
Digital Certificate Management
Security
Pyramid of Pain
Scripts
Scripts
Cyb3rNews Telegram Bot
GitHub
Linkedin
Twitter
Home
Tags
Theory
Tag: Theory
Security
Risk, Vulnerability and Threats
Joao Silva
-
June 20, 2024
0
Security
Kernel Explanation
Joao Silva
-
June 20, 2024
0
Offensive
What’s Log4j and Log4Shell vulnerability
Joao Silva
-
June 11, 2024
0
Security
Cyber Threat Intelligence (CTI)
Joao Silva
-
June 11, 2024
0
Security
True Positive vs False Positive vs True Negative vs False Negative
Joao Silva
-
June 11, 2024
0
Security
Detection Engineering and Its Types
Joao Silva
-
June 11, 2024
0
Network
Network Topologies Explained
Joao Silva
-
May 18, 2024
0
1
2
Page 2 of 2
- Advertisement -
RECENT
Network
Wi-Fi Standards and Protocols
Security
Digital Certificate Management
Scripts
Cyb3rNews Telegram Bot
SIMILAR
Different Types of Firewalls Explained (WAF, HBF, NBF, NGFW)
Joao Silva
-
May 18, 2024
0
Web Application Firewall (WAF) It’s a Firewall that operates at the Application Layer (Layer 7 OSI) that’s designed to monitor, filter and block HTTP/HTTPS traffic...
Read more
Network Topologies Explained
Joao Silva
-
May 18, 2024
0
Bus Topology This setup connects all devices (Network Nodes) in a sequence on a single cable or ‘bus’. Data travels back and forth along the...
Read more
Pyramid of Pain
Joao Silva
-
August 20, 2024
0
The Pyramid of Pain is a concept in cybersecurity that helps to visualize and understand the impact of various indicators of compromise (IOCs) on...
Read more