SysAlbania

SysAlbania

CyberSecurity

This repository contains the best books for both bug hunters and people studying cybersecurity.

15 Articles
Member since Jan 2026

Articles by SysAlbania

15 articles published
Understanding Service Enumeration in Cybersecurity
Linux

Understanding Service Enumeration in Cybersecurity

Service enumeration is an essential stage in ethical hacking and penetration testing. It is performed after the initial information gathering and scanning phases.

EnumerationScanninghacking
Apr 3, 2026
5 min16
Information Gathering in Cybersecurity
Gathering

Information Gathering in Cybersecurity

What is Information Gathering Information gathering is an important early step in cybersecurity and ethical hacking. It is the process of collecting and organizing information about a target system before performing deeper security testing.

InformationGatheringkali
Apr 3, 2026
105 min30
EternalBlue Exploit Analysis – Runbook
Exploits

EternalBlue Exploit Analysis – Runbook

This runbook details a hands-on simulation of exploiting the EternalBlue vulnerability (CVE-2017-0144), targeting an unpatched Windows 7 machine in a controlled lab environment using Metasploit.

EternalBlueExploitAnalysis
Feb 4, 2026
5 min88
Brutal
Hacking Tools

Brutal

Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device (HID attacks ).

sysalbaniaethicalhackerpentesting
Jan 27, 2026
5 min82
WEB SECURITY BUG BOUNTY — ROADMAP
Latest Tutorials

WEB SECURITY BUG BOUNTY — ROADMAP

This repository contains a curated collection of books, videos, and tools for learning Web Security Bug Bounty.

CyberSecuritylearningResources
Jan 15, 2026
5 min158
Using Wordlists for Brute Force Attack in Kali Linux
Linux

Using Wordlists for Brute Force Attack in Kali Linux

Kali Linux quietly ships with some of the most practical and battle-tested wordlists you can use as a beginner or professional pentester.

kalilinuxrockyou
Jan 2, 2026
5 min336