top of page
![](https://static.wixstatic.com/media/a06cfa_ad15e75216854dacaeb631c437a033dd~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_ad15e75216854dacaeb631c437a033dd~mv2.webp)
![Indicators Of Compromise](https://static.wixstatic.com/media/a06cfa_ad15e75216854dacaeb631c437a033dd~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_ad15e75216854dacaeb631c437a033dd~mv2.webp)
Dr. Afsaneh Javadi
6 min read
Indicators Of Compromise
Indicators of compromise are very important to find our system is in danger and can help us either prevent an eventual breach from...
![](https://static.wixstatic.com/media/a06cfa_80740047464a439db575e27b763fd300~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_80740047464a439db575e27b763fd300~mv2.webp)
![Kali Linux tools](https://static.wixstatic.com/media/a06cfa_80740047464a439db575e27b763fd300~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_80740047464a439db575e27b763fd300~mv2.webp)
Dr. Afsaneh Javadi
7 min read
Kali Linux tools
Dr.Afsaneh Javadi, Anirban Poul, Lovepreet Kaur Kali Linux is an Operating System designed for Penetration Testing, Security Auditing,...
![](https://static.wixstatic.com/media/a06cfa_139238d85c9f4940bcc922447152dc01~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_139238d85c9f4940bcc922447152dc01~mv2.webp)
![NMAP (Network Mapper)](https://static.wixstatic.com/media/a06cfa_139238d85c9f4940bcc922447152dc01~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_139238d85c9f4940bcc922447152dc01~mv2.webp)
Dr. Afsaneh Javadi
8 min read
NMAP (Network Mapper)
Dr. Afsaneh Javadi, Karan Jindal 1.1 Introduction Nmap stands for Network Mapper. It is an open source tool used to find out...
![](https://static.wixstatic.com/media/a06cfa_b5a858597d194cd2947a475e59a2d680~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_b5a858597d194cd2947a475e59a2d680~mv2.webp)
![netcat: A computer networking utility for reading from and writing to network connection](https://static.wixstatic.com/media/a06cfa_b5a858597d194cd2947a475e59a2d680~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_b5a858597d194cd2947a475e59a2d680~mv2.webp)
Dr. Afsaneh Javadi
5 min read
netcat: A computer networking utility for reading from and writing to network connection
Dr. Afsaneh Javadi Anu Thakur Netcat is a network utility tool which is used to read and write data across the network by using...
![Iximager - Ilook Investigator](https://static.wixstatic.com/media/a06cfa_4c92889c7d394cc4ab0e1c09f9e18128~mv2.webp)
Dr. Afsaneh Javadi
3 min read
Iximager - Ilook Investigator
ILook is a very powerful forensics tool. It is designed for ease of use. During the recent years it is developped greatly. It can work...
bottom of page