Results 71 to 80 of about 1,899 (129)
Pentesting automation platform
With the development of society, informatics is gaining more relevance every day. All businesses need databases and programs to track everything that happens. Everyone uses their cellphones every day at all times, and they also have computers at home for personal use.
openaire +1 more source
PTHelper: An open source tool to support the Penetration Testing process
Offensive security is one of the state of the art measures to protect enterprises and organizations. Penetration testing, broadly called pentesting, is a branch of offensive security designed to find, rate and exploit these vulnerabilities, in order to ...
de Gracia, Jacobo Casado +1 more
core
Aquest treball de final de grau consisteix en dues parts; La primera part és teorica i té la intenció d'exposar de manera superficial el panorama actual de la ciberseguretat començant per la definició de Bug passant per la categorització de vulnerabilitats que es van descobrint i aprofundint en la introducció al Pentesting des del punt de vista del ...
openaire +1 more source
A Preliminary Study on Using Large Language Models in Software Pentesting
Large language models (LLM) are perceived to offer promising potentials for automating security tasks, such as those found in security operation centers (SOCs).
Goldgof, Dmitry +7 more
core
Module development in Metasploit for pentesting
Vista sobre que es un test de penetracion con la herramienta Metasploit i el desarollo de algunos modulos en la ...
openaire +1 more source
PENTesting za Windows okruženje
This final essay discussed the pentesting process and described the necessary steps when it comes to testing Windows systems. The pentesting process ranged from phase of setting up a virtual lab, information gathering phase, evaluation, exploitation, and ended with the post exploitation phase.
openaire +2 more sources
Containerization of a Pentesting platform
In today's technology-driven landscape, organizations increasingly store vast amounts of sensitive personal and confidential data, making them vulnerable targets for cybercriminals seeking to exploit system security weaknesses. Simply complying with security standards and regulations is not enough, as we cannot guarantee absolute immunity from ...
openaire +1 more source
PenTest2.0: Towards Autonomous Privilege Escalation Using GenAI [PDF]
Al-Sinani, Haitham S, Mitchell, Chris J
core +1 more source

