Skip to content
Security
Elites
Home
Trending
My Dashboard
How to Earn XP
My Missions
Daily Challenge
Challenge a Friend
My Skill Tree
My Rank
My Lab
Attack Simulator(CTF Labs)
My Badge
Squad
Squad Leaderboard
Streak Shield
Courses
My Tools
Referrals
Rewards
Leaderboard
Hacking
Ethical Hacking Basics
Android Hacking
Cheat Sheets
Cloud Hacking
Hacking Phases
Footprinting & Reconnaissance
OSINT
Enumeration
Network Scanning
Exploitation
Session Hijacking
Privilege Escalation
Mobile Hacking
Password Cracking
Social Media Hacking
Website Hacking
Dark Web and Privacy
Tools
Breach Detection
Email Breach Checker
Password Breach Checker
Dark Web Scanner
Password Strength Calculator
SecurityElites Arsenal
How Hackable Are You?
Hacker Salary Calculator
Google Dork Generator
CVE Explorer Hub
Kali Linux Commands Tool
Kali Issues
Hacker Scorecard
Default Passwords
Security Tools Status
HTTP Status Codes
Port Encyclopedia
Domain Tools
WHOIS Lookup Tool
IP Address Lookup Tool
Online Port Scanner Tool
DNS Lookup Tool
Domain Age Checker
Security Tools
Password Strength Checker
Phishing URL Scanner
Email Header Analyzer
SSL Certificate Checker
Kali Linux
Kali Linux Tools
Kali Linux Commands
Kali Linux Installation
OSINT Tools
Reconnaissance Tools
Password Cracking Tools
Exploitation Tools
Web Application Hacking Tools
Courses
Career Paths
Bug Bounty Course
Ethical Hacking Course
Kali Linux Course
Free CEH Practice Exam
Cheat Sheets
Glossary
Labs
DVWA Labs
HackTheBox Labs
Metasploitable Labs
TryHackMe Walkthroughs
Pentesting
AI for Hackers
AI Hacking
Prompt Injection
LLM Hacking
Bug Bounty Hunting
Bug Bounty Reconnaissance
Bug Bounty Reports
Google Dorking
Zero-Day Vulnerability
Cyber Security Career
Cyber Security Career Roadmap
Cyber Security Certifications
Cyber Security Courses & Training
Cyber Security Salary & Jobs
Malware Analysis
Ransomware Analysis
Static Malware Analysis
Dynamic Malware Analysis
Malware Reverse Engineering
Network Security
Packet Analysis
Firewall Security
MITM Attacks
Wireless Attacks
Web Application Security
SQL Injection
Cross-Site Scripting (XSS)
File Upload Vulnerabilities
Search for:
Log In
Join Free
Home
Trending
My Dashboard
How to Earn XP
My Missions
Daily Challenge
Challenge a Friend
My Skill Tree
My Rank
My Lab
Attack Simulator(CTF Labs)
My Badge
Squad
Squad Leaderboard
Streak Shield
Courses
My Tools
Referrals
Rewards
Leaderboard
Hacking
Ethical Hacking Basics
Android Hacking
Cheat Sheets
Cloud Hacking
Hacking Phases
Footprinting & Reconnaissance
OSINT
Enumeration
Network Scanning
Exploitation
Session Hijacking
Privilege Escalation
Mobile Hacking
Password Cracking
Social Media Hacking
Website Hacking
Dark Web and Privacy
Tools
Breach Detection
Email Breach Checker
Password Breach Checker
Dark Web Scanner
Password Strength Calculator
SecurityElites Arsenal
How Hackable Are You?
Hacker Salary Calculator
Google Dork Generator
CVE Explorer Hub
Kali Linux Commands Tool
Kali Issues
Hacker Scorecard
Default Passwords
Security Tools Status
HTTP Status Codes
Port Encyclopedia
Domain Tools
WHOIS Lookup Tool
IP Address Lookup Tool
Online Port Scanner Tool
DNS Lookup Tool
Domain Age Checker
Security Tools
Password Strength Checker
Phishing URL Scanner
Email Header Analyzer
SSL Certificate Checker
Kali Linux
Kali Linux Tools
Kali Linux Commands
Kali Linux Installation
OSINT Tools
Reconnaissance Tools
Password Cracking Tools
Exploitation Tools
Web Application Hacking Tools
Courses
Career Paths
Bug Bounty Course
Ethical Hacking Course
Kali Linux Course
Free CEH Practice Exam
Cheat Sheets
Glossary
Labs
DVWA Labs
HackTheBox Labs
Metasploitable Labs
TryHackMe Walkthroughs
Pentesting
AI for Hackers
AI Hacking
Prompt Injection
LLM Hacking
Bug Bounty Hunting
Bug Bounty Reconnaissance
Bug Bounty Reports
Google Dorking
Zero-Day Vulnerability
Cyber Security Career
Cyber Security Career Roadmap
Cyber Security Certifications
Cyber Security Courses & Training
Cyber Security Salary & Jobs
Malware Analysis
Ransomware Analysis
Static Malware Analysis
Dynamic Malware Analysis
Malware Reverse Engineering
Network Security
Packet Analysis
Firewall Security
MITM Attacks
Wireless Attacks
Web Application Security
SQL Injection
Cross-Site Scripting (XSS)
File Upload Vulnerabilities
Log In
Join Free
Cybersecurity Glossary
1506 essential cybersecurity terms explained. Your reference guide from A to Z.
1506
Terms
A–Z
Indexed
All Categories (1506)
Application Security (58)
Authentication & Access Control (58)
Certifications & Careers (39)
Cloud Security (65)
Compliance & Standards (70)
Cryptography (72)
Data Security (51)
Email Security (36)
Emerging Threats & AI (77)
Forensics (10)
General Cybersecurity (62)
Identity & Privacy (60)
Incident Response & Forensics (66)
IoT & Hardware Security (48)
Malware & Threats (105)
Mobile Security (44)
Network Security (137)
Networking Protocols (39)
Offensive Security (37)
Penetration Testing (91)
Physical Security (39)
Security Operations (86)
Web Application Security (120)
Wireless Security (36)
All
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Y
YARA Rules
A tool for identifying and classifying malware samples by creating rules that describe patterns found in malicious files.
YARA
A tool for identifying and classifying malware by creating rules that describe textual or binary patterns found in malicious samples.
×