Skip to content
Facebook X Instagram YouTube Linkedin Telegram
Cyber Samir
  • Home
  • BlogsExpand
    • Ethical hacking
    • Penetration testing
    • Kali Linux
    • cybersecurity
  • Admin Finder
  • Tools
  • MoreExpand
    • Disclaimer
    • Privacy Policy
    • Contact Us
  • About Us
Services
Cyber Samir
  • Web application penetration testing process illustration
    Penetration testing

    Types of Penetration Testing: Web, Mobile, Network & More

    Welcome back to our guide on cybersecurity! In our last discussion, we covered what penetration…

    Read More Types of Penetration Testing: Web, Mobile, Network & MoreContinue

  • Penetration testing lab setup for beginners
    Penetration testing

    Penetration Testing: Beginner’s Complete Guide

    What is Penetration Testing? A Beginner’s Complete Guide Hello, and welcome If you’ve ever wondered…

    Read More Penetration Testing: Beginner’s Complete GuideContinue

  • Ethical hacker preparing a vulnerability disclosure report
    Penetration testing

    Reporting & Vulnerability Disclosure (Day 7 Hacking)

    Day 7: Reporting, Fix Suggestions & Vulnerability Disclosure Responsible Hacking: Write a Pentest Report Like…

    Read More Reporting & Vulnerability Disclosure (Day 7 Hacking)Continue

  • Password cracking attack demonstration
    Penetration testing

    Password Attacks, OSINT & Social Engineering (Day 6)

    Day 6: Password Attacks, OSINT & Social Engineering Tools Cracking & OSINT: Hydra, Crunch, Sherlock…

    Read More Password Attacks, OSINT & Social Engineering (Day 6)Continue

  • SQL injection attack on vulnerable website
    Penetration testing

    SQL Injection Testing Guide (Day 4 Ethical Hacking)

    Day 4: SQL Injection Testing Extracting Data: SQL Injection with SQLMap & Manual Payloads SQL…

    Read More SQL Injection Testing Guide (Day 4 Ethical Hacking)Continue

  • Web application requests intercepted in Burp Suite
    Penetration testing

    Manual Testing with Burp Suite & OWASP ZAP (Day 3)

    Day 3: Manual Testing with Burp Suite & OWASP ZAP Burp Suite and ZAP: Web…

    Read More Manual Testing with Burp Suite & OWASP ZAP (Day 3)Continue

  • Illustration of ethical hacker performing information gathering on a target website.
    Penetration testing

    Information Gathering & Scanning for Ethical Hacking

    Day 2: Information Gathering & Scanning Scanning the Web: Discovering Hidden Paths & Weak Services…

    Read More Information Gathering & Scanning for Ethical HackingContinue

  • Web shell backdoor attack on a compromised website
    Ethical hacking Penetration testing

    The Hacker’s Backdoor: Web Shell Attacks & Defense

    The Hacker’s Backdoor: How Web Shells Compromise Websites (And How to Stop Them) For any…

    Read More The Hacker’s Backdoor: Web Shell Attacks & DefenseContinue

  • Comparison chart showing vulnerability assessment vs penetration testing
    Penetration testing

    The Difference Between Vulnerability Assessment & Penetration Testing

    In an era where cyber threats are increasingly sophisticated and pervasive, organizations must adopt robust…

    Read More The Difference Between Vulnerability Assessment & Penetration TestingContinue

  • Tutorial on Stored Cross-Site Scripting (XSS)
    Penetration testing

    Tutorial on Stored Cross-Site Scripting (XSS)

    Stored Cross-Site Scripting (XSS) Vulnerabilities: Examples, Payloads, and Exploitation Techniques You wish to learn the…

    Read More Tutorial on Stored Cross-Site Scripting (XSS)Continue

Page navigation

Previous PagePrevious 1 2 3 4 … 9 Next PageNext
CyberSamir Footer
CS

CYBERSAMIR

Explore. Hack. Secure. Learn.

About Us

CyberSamir provides cutting-edge insights into ethical hacking, penetration testing, and cybersecurity defense strategies for professionals and enthusiasts alike.

500+ Articles
15K+ Members
30+ Tools

Resources

  • Tutorials
  • Documentation
  • Tools
  • CTF Walkthroughs
  • Security News

Community

  • Forum
  • Discord Server
  • Telegram Group
  • Upcoming Events
  • Certifications

Follow Us

Cyber Security Events Worldwide

© CyberSamir. All Rights Reserved.

Scroll to top
  • Home
  • Blogs
    • Ethical hacking
    • Penetration testing
    • Kali Linux
    • cybersecurity
  • Admin Finder
  • Tools
  • More
    • Disclaimer
    • Privacy Policy
    • Contact Us
  • About Us

Follow Me

Facebook Instagram YouTube X Telegram Linkedin
Search