SysAlbania

SysAlbania

CyberSecurity

This repository contains the best books for both bug hunters and people studying cybersecurity.

15 Articles
Member since Jan 2026

Articles by SysAlbania

15 articles published
What Is Penetration Testing
Latest Tutorials

What Is Penetration Testing

Penetration testing (pen testing) is a legal and authorized simulated cyber-attack on a computer system to evaluate its security. Pen testers act like real hackers: they use the same tools, techniques, and thinking to find and show weaknesses that could hurt the business.

SQL InjectionXSSPenetration
Apr 8, 2026
5 min14
What is Vulnerability Assessment
Hacking Tools

What is Vulnerability Assessment

A vulnerability assessment is the process of checking a system to find security weaknesses. The goal is to know whether a system can be attacked, how dangerous the weakness is, and how to fix it.

MalwareRootkitChkrootkit
Apr 8, 2026
5 min24
Understanding Android Mobile Architecture and Its Security Vulnerabilities
Hacking Tools

Understanding Android Mobile Architecture and Its Security Vulnerabilities

Android is one of the most widely–used mobile operating systems in the world. To run smoothly on millions of devices, Android is built using a layered architecture. Each layer has a specific function that allows applications, system services, and hardware to work together.

AndroidMobileArchitecture
Apr 8, 2026
5 min8
Understanding what Threat, Vulnerability, Risk, Impact, Severity, and assesing Severity based on CVSS
Hacking Tools

Understanding what Threat, Vulnerability, Risk, Impact, Severity, and assesing Severity based on CVSS

A threat is anything that has the potential to do damage, even if the damage has not happened yet. In this case, a thief who walks around looking for houses to break into is the threat. The thief might or might not attack, but the possibility exists, and that possibility itself is the threat.

ThreatVulnerabilityRisk
Apr 8, 2026
5 min14
Understanding What IP, Port, and Protocol Is
Latest Tutorials

Understanding What IP, Port, and Protocol Is

This topic focuses on understanding the definitions of IP addresses, ports, and protocols, the differences between each of them, as well as commonly used standard ports and the network services that operate on those ports.

ipv4ipv6dns
Apr 8, 2026
5 min16
Active Information Gathering in Cybersecurity
Linux

Active Information Gathering in Cybersecurity

In cybersecurity, the first phase of ethical hacking is called Reconnaissance or Information Gathering. This phase focuses on collecting information about a target before attempting any attack or security testing. Information gathering is divided into two main types: Passive Information Gathering Active Information Gathering

NiktoInformationGathering
Apr 8, 2026
5 min12
Captcha Bypass
Exploits

Captcha Bypass

Do not send the parameter related to the captcha. Check if the value of the captcha is in the source code of the page. Change some specific characters of the captcha parameter and see if it is possible to. When a new Captcha code is created, the previous code will expire.

CaptchaBypass
Apr 7, 2026
5 min10
Network Mapping for Beginners: Exploring Networks with Nmap
Latest Tutorials

Network Mapping for Beginners: Exploring Networks with Nmap

Network mapping is an early stage in network analysis, cybersecurity, and penetration testing activities. At this stage, the main objective is not to exploit vulnerabilities, but to understand the structure of the network. We want to know what devices exist, which hosts are active, and how the network is organized.

NetworkMappingExploring
Apr 3, 2026
5 min24
A Beginner’s Guide to Port Scanning Using Nmap
Gathering

A Beginner’s Guide to Port Scanning Using Nmap

After identifying active hosts through network mapping, the next step is port scanning. Port scanning aims to determine which network services are running on each host.

ScanningSpecificPorts
Apr 3, 2026
5 min14