Dhanjani et al., 2005
| Publication | Publication Date | Title |
|---|---|---|
| US11916933B2 (en) | Malware detector | |
| CN110209583B (en) | Security testing methods, devices, systems, equipment and storage media | |
| Stasinopoulos et al. | Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications | |
| Young et al. | The hacker's handbook: the strategy behind breaking into and defending networks | |
| Seitz et al. | Black Hat Python: Python Programming for Hackers and Pentesters | |
| Forshaw | Attacking network protocols: a hacker's guide to capture, analysis, and exploitation | |
| Grimes | Honeypots for windows | |
| Agarwal et al. | Metasploit penetration testing cookbook | |
| Grenfeldt et al. | Attacking websites using HTTP request smuggling: empirical testing of servers and proxies | |
| Hutchens | Kali Linux network scanning cookbook | |
| Messier | Learning Kali Linux: Security testing, penetration testing & ethical hacking | |
| Dhanjani et al. | Network Security Tools: Writing, Hacking, and Modifying Security Tools | |
| Sinha et al. | Beginning Ethical Hacking with Kali Linux | |
| Lee | Framework for botnet emulation and analysis | |
| Vitale et al. | Inmap-t: Leveraging TTCN-3 to test the security impact of intra network elements | |
| Cisco | Release Notes for Cisco LocalDirector Version 4.1.1 | |
| Bidaj | Security testing SDN controllers | |
| Raj | Python penetration testing essentials: Techniques for ethical hacking with python | |
| Karamanos | Investigation of home router security | |
| Cardwell | Advanced features of wireshark | |
| Caswell et al. | Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications | |
| Rehim | Effective python penetration testing | |
| Madison | Honeyhive-A Network Intrusion Detection System Framework Utilizing Distributed Internet of Things Honeypot Sensors | |
| Koch | On WebSockets in penetration testing | |
| Arboi | The NASL2 reference manual |