β€œAn Analysis of Tools and Techniques Employed In A Cyber Security Penetration Testing ” (2025) Sebha University Conference Proceedings, 4(1), pp. 29–33. doi:10.51984/sucp.v4i1.3852.