Results 71 to 80 of about 1,899 (129)

Pentesting automation platform

open access: yes
With the development of society, informatics is gaining more relevance every day. All businesses need databases and programs to track everything that happens. Everyone uses their cellphones every day at all times, and they also have computers at home for personal use.
openaire   +1 more source

PTHelper: An open source tool to support the Penetration Testing process

open access: yes
Offensive security is one of the state of the art measures to protect enterprises and organizations. Penetration testing, broadly called pentesting, is a branch of offensive security designed to find, rate and exploit these vulnerabilities, in order to ...
de Gracia, Jacobo Casado   +1 more
core  

Metodologia de pentesting

open access: yes
Aquest treball de final de grau consisteix en dues parts; La primera part és teorica i té la intenció d'exposar de manera superficial el panorama actual de la ciberseguretat començant per la definició de Bug passant per la categorització de vulnerabilitats que es van descobrint i aprofundint en la introducció al Pentesting des del punt de vista del ...
openaire   +1 more source

A Preliminary Study on Using Large Language Models in Software Pentesting

open access: yes
Large language models (LLM) are perceived to offer promising potentials for automating security tasks, such as those found in security operation centers (SOCs).
Goldgof, Dmitry   +7 more
core  

Module development in Metasploit for pentesting

open access: yes, 2019
Vista sobre que es un test de penetracion con la herramienta Metasploit i el desarollo de algunos modulos en la ...
openaire   +1 more source

PENTesting za Windows okruženje

open access: yes, 2019
This final essay discussed the pentesting process and described the necessary steps when it comes to testing Windows systems. The pentesting process ranged from phase of setting up a virtual lab, information gathering phase, evaluation, exploitation, and ended with the post exploitation phase.
openaire   +2 more sources

Containerization of a Pentesting platform

open access: yes
In today's technology-driven landscape, organizations increasingly store vast amounts of sensitive personal and confidential data, making them vulnerable targets for cybercriminals seeking to exploit system security weaknesses. Simply complying with security standards and regulations is not enough, as we cannot guarantee absolute immunity from ...
openaire   +1 more source

Why Johnny Can't Pentest

open access: yes, 2010
Cova, Marco   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy