• Community
    • Join Discord
    • Industry News
    • Discussions
    • Contact & Support
  • Training
    • Categories
      • App & Data Security
      • IT Ops Security
    • All Courses
  • Resources
    • Blog
    • Ebooks
    • Podcasts
  • About Cybr
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Community
      • Join Discord
      • Industry News
      • Discussions
      • Contact & Support
    • Training
      • Categories
        • App & Data Security
        • IT Ops Security
      • All Courses
    • Resources
      • Blog
      • Ebooks
      • Podcasts
    • About Cybr
    Sign in Sign up

    Category: App & Data Security

    Content and resources related to Application and Data Security.

    FireEye & SolarWinds incidents: What happened?

    A report that FireEye had been breached by nation-state hackers made the headlines. Shortly after, CISA issued an emergency directive about SolarWind'…
    Christophe December 14, 2020
    2 Comments

    Building a Python data exfiltration tool

    This tutorial explains how I created a hard drive crawler and extraction tool. This Python data exfiltration tool uses regex for matching desired data patterns…

    Nick December 9, 2020
    0 Comments

    What is Cross-Site Scripting (XSS)?

    According to both OWASP and CWE, Cross-Site Scripting is one of the top 10 most dangerous web application security risks, and for good reason: OWASP’s…

    Christophe December 7, 2020
    0 Comments

    Python For Beginners – FREE Resources!

    This post is for those of you looking for resources about “Python for beginners” and “learning Python for free”! I talk to a lot of…

    Shawna November 5, 2020
    3 Comments
    SQLMap banner

    Get Started Using SQLMap for SQL Injection Pentesting

    SQLMap is a popular open-source penetration testing tool used to detect and exploit SQL injection vulnerabilities. In prior posts, we looked at general concepts of…

    Christophe October 9, 2020
    0 Comments
    People discussing getting started securing applications

    4 steps to getting started securing applications

    A lot of times, especially when you join smaller organizations, there are no (or very few) formal processes in place. The approach taken to secure…

    Christophe September 26, 2020
    0 Comments
    Backdoor with Weevely and Commix

    Uploading Backdoor Shells with Weevely and Commix

    Now that we’ve reviewed OS Command injection concepts like how they work, the impact they can have, and techniques that can be used to exploit…

    Christophe September 22, 2020
    0 Comments
    What are OS Command Injections banner

    OS Command Injections: How they work, and example techniques

    When I first heard the term OS Command injections, or “Shell injection” as some people refer to it, I don’t know why but I assumed…

    Christophe September 16, 2020
    0 Comments

    Cybr Lesson #1: Mistakes Made & Lessons Learned the EASY Way!

    I love quotes! I mean… really love them. In just one or two lines I can get or give the inspiration or motivation I need…

    Shawna September 14, 2020
    0 Comments

    How I made an advanced Python Keylogger that sends emails

    I made a Python keylogger that sends emails containing recorded data from the target machine, and this post explains how it works! This program is…

    Nick September 2, 2020
    2 Comments
    Load More

    Recent Posts

    • Cybr’s New XSS Course Badge Gets Added to NYU Cyber Fellows Program
    • How to become CIO: A Cybr Mini-Series
    • FireEye & SolarWinds incidents: What happened?
    • Building a Python data exfiltration tool
    • What is Cross-Site Scripting (XSS)?

    Categories

    • Announcements
    • App & Data Security
    • Career
    • Community
    • Cybersecurity
    • IT & Ops

    Recent Comments

    • Olisa hillary on How I made an advanced Python Keylogger that sends emails
    • wOOpxdOOm on How I made an advanced Python Keylogger that sends emails
    • Christophe on Set up the OWASP Juice Shop on Kali with Docker [Quickest Method]
    • cipherlord on Set up the OWASP Juice Shop on Kali with Docker [Quickest Method]
    • Christophe on Project: Using Cisco Packet Tracer to learn networking
    Cybr logo badge
    © 2021 - Cybr, Inc
    • Contact
    • Teach at Cybr
    • Courses
    • Forums
    • Terms of Service
    • Privacy Policy