Search results

  1. V

    TotalRecall

    This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots. https://github.com/xaitax/TotalRecall
  2. V

    osgint | search github user

    OSINT tool to find informations about a github user Features Find github username from an email Find email from github username (not working all the time) Find informations about a profile (account creation date, public gists, id, public pgp, public ssh ...) https://github.com/hippiiee/osgint
  3. V

    PingRAT

    PingRAT secretly passes C2 traffic through firewalls using ICMP payloads. Features: Uses ICMP for Command and Control Undetectable by most AV/EDR solutions Written in Go https://github.com/umutcamliyurt/PingRAT
  4. V

    Email header Analysis

    Email header analysis is a critical skill for individuals and organizations to enhance email security, prevent phishing attacks, troubleshoot email delivery issues, and verify the authenticity of incoming messages. It plays a vital role in ensuring the integrity and reliability of the email...
  5. V

    Multi-factor authentication

    thanks for the information bro, in my case I usually use the google authenticator code, it works well for me, but also from time to time I use the others that exist, such as additional mail, a question, a message code. Very informative post.
  6. V

    API Pentesting Articles and Videos

    1.How to do API Pentesting using ZAP and Postman https://pentestguy.com/how-to-do-api-pentesting-using-zap-and-postman/ 2.VAmPI – Vulnerable REST API Walkthrough https://pentestguy.com/vampi-vulnerable-rest-api-walkthrough/ 3.TryHackMe Bookstore – REST API fuzzing and Exploitation...
  7. V

    first attacks of 2024

    Have you come across any noteworthy developments or insights regarding cyber threats and attacks that have emerged in the early months of 2024?
  8. V

    how to protect your privacy when shopping on the deep web

    1. Use a secure shipping address: Do not use your home address to receive the products. You can use a secure shipping address or a post office box. 2. Use a fake name: Do not use your real name on the order. You can use a fake name or have the package sent to a pseudonym. 3. Pay with...
  9. V

    HAKOPS Hacker Tools

    yeah, I would appreciate it if you could please upload it again.
  10. V

    The 6 biggest URL shorteners of 2022

    Bitly is very well-known, personally, it's the one I use the most, not to say the only one. Thanks for sharing more options, bro, I'll keep it in mind
  11. V

    Examples of Shodan Dorks?

    Can you provide examples of Shodan dorks that show pages with vulnerabilities? Is there a particular dork that you use frequently or that has caught your attention because of its effectiveness?
  12. V

    Hacking Tutorials

    Hi everyone, I found this content that is interesting and may be useful to you. CONTENT: Hacking into computer Hacking streams Certified ethical hacker Ethical Hacking student guide 📁FILE PASSWORD: SERVER_Z Files: https://mega.nz/folder/95tRjaTB#3uZKoaAgpE68lzFEo6GRTA
  13. V

    [Tutorial]Deep-Web how to login anonymoity

    as far as I see it is an anonymous operating system, interesting, I had not heard about it, thanks for the info :)
  14. V

    Password Cracking Techniques

    Phishing Phishing is a type of social engineering attack where the attacker sends fraudulent emails or text messages that appear to be from a legitimate source, such as a bank or credit card company. The emails or text messages will often contain a link that, when clicked, will take the user to...
  15. V

    Tool AD Miner

    Many of us likely use BloodHound to get detailed information about the active directory we are auditing. However, from my perspective, BloodHound, while valuable, has its limitations in terms of usability and lacks support. For this reason, I want to introduce you to an alternative called AD...
  16. V

    fsociety | A Penetration Testing Framework

    fsociety Hacking Tools Pack – A Penetration Testing Framework https://github.com/Manisso/fsociety Fsociety Contains All Tools Used in Mr. Robot Series 😁 Information Gathering: Nmap Setoolkit Host To IP WPScan CMS Scanner XSStrike Dork - Google Dorks Passive Vulnerability Auditor Scan A server's...
  17. V

    Shodan Things ( Part 1 )

    wow , thanks for the info , I'm just starting with shodan , nice work , i will be on the lookout for part 2 🙂
  18. V

    DevSecOps Tools List in 2023

    1. Veracode Veracode is an amazing cloud-based security tool created to simplify developer security testing. It provides comprehensive visibility into your application’s security posture and offers remediation tips for any vulnerabilities it detects. 2. Checkmarx Checkmarx provides AI-powered...
  19. V

    Insecam - Live cameras directory

    Insecam: http://www.insecam.org/ The world directory of online surveillance security cameras. -> Select a country to watch live street, traffic, parking, office, road, beach, earth online webcams. You can find Axis, Panasonic, Linksys, Sony, TPLink, Foscam and a lot of other network video...
  20. V

    Guide to Online Anonymity

    Nice bro !! Thanks for sharing the guide, I will review it, it is good to have knowledge of anonymity when surfing the internet.
Top Bottom