Any science tends to break down into smaller topics. Let's find out what classifications forensic science is divided into. At the end you will find links to two useful repositories that contain educational material to study each area:
1️⃣ Computer forensics: This includes everything related to...
Hi everyone, my question is the following, is there any guide to learn doxing, for example what methodology to follow, if you have information do not hesitate to share it, I will be attentive to your response, thank you. :unsure:
hello everyone I would like to know if there is a route for blue team, someone could recommend me, who is preparing in the area or has had experience, I am new to the part of blue team, thanks. 😟
Great, Wireshark is a great tool that helps you understand network protocols by capturing and analyzing network traffic in real time, I already want to see the tutorial.:)
This tool assists in performing reconnaissance using the LinkedIn.com website/API for red team or social engineering engagements. It performs a company specific search to extract a detailed list of employees who work for the target company. Enter the name of the target company and the tool will...
thanks for sharing, its an interesting topic bro, however it seems that the page has had changes and does not redirect well, I would appreciate it if you could update the link please
Python code to get the ip of a set of domains and subdomains from a file and save the results in another file.
It is a small way to automate the process and save everything in one place, you can choose the name of the files according to the parameter you send. Just run it and that's it. I hope...
welcome! here you will find help for your doubts, good resources and an active community, I hope you have a good time. And remember to read the rules to be able to interact peacefully :)
interesting, many people who just know Tor obviously do not know very well how it works, that the nodes, the jumps or the famous onion capable are achieved thanks to volunteers who offer to work within the tor network, I think it's great. You mentioned a lot about the requirements, could you...
You are absolutely right, nothing is "totally anonymous and safe" there is always something visible if you investigate well, the information is there. Thank you very much for sharing your knowledge, I really enjoyed your post.
Based on your experience, as you mention above, what interesting...
Hello everyone , I am sharing with you a repository where it contains bug hunter word lists. This repository serves as a comprehensive collection of essential word lists used by bug hunters, penetration testers and security enthusiasts during their vulnerability recognition and assessment...
In case you are curious about blockchain but have no idea what exactly it is. It's blockchain, which means few simplifications are made when writing this. If you understand what blockchain technology is, then my mission will be accomplished.
What is the blockchain?
-> Blockchain = Block + Chain...