top of page
Dr. Afsaneh Javadi
6 min read
Indicators Of Compromise
Indicators of compromise are very important to find our system is in danger and can help us either prevent an eventual breach from...
Dr. Afsaneh Javadi
7 min read
Kali Linux tools
Dr.Afsaneh Javadi, Anirban Poul, Lovepreet Kaur Kali Linux is an Operating System designed for Penetration Testing, Security Auditing,...
Dr. Afsaneh Javadi
8 min read
NMAP (Network Mapper)
Dr. Afsaneh Javadi, Karan Jindal 1.1 Introduction Nmap stands for Network Mapper. It is an open source tool used to find out...
Dr. Afsaneh Javadi
5 min read
netcat: A computer networking utility for reading from and writing to network connection
Dr. Afsaneh Javadi Anu Thakur Netcat is a network utility tool which is used to read and write data across the network by using...
Dr. Afsaneh Javadi
3 min read
Iximager - Ilook Investigator
ILook is a very powerful forensics tool. It is designed for ease of use. During the recent years it is developped greatly. It can work...
bottom of page