Search results

  1. J

    Netlas.io - Find vulnerable systems

    Its important to check whether systems, whether your own or others', have vulnerabilities that can be exploited. There are other similar tools, such as Shodan and Censys. Netlas.io is one of the best options available on the web. Netlas.io can be used in a variety of use cases, such as open...
  2. J

    Netlas.io - Find vulnerable systems

    Its important to check whether systems, whether your own or others', have vulnerabilities that can be exploited. There are other similar tools, such as Shodan and Censys. Netlas.io is one of the best options available on the web. Netlas.io can be used in a variety of use cases, such as open...
  3. J

    DorkGPT | Generate Dorks

    Hi guys I bring you a tool that I find very useful, and it is a Google search generator using Artificial Intelligence. What DorkGPT does is to convert natural text into a specific text to enter in the Google search bar, which will allow us to search for exactly what we have specified.🤯...
  4. J

    vuln websites

    some links do not work, but there are many that do, the page enters well, very good contribution, thank you very much! good data
  5. J

    PRIVILEGE ESCALATION TOOLS

    Privilege escalation tools: These tools are used to identify and exploit vulnerabilities in computer systems and obtain higher levels of access to a system or network than should be available initially. + SharpUp ==> https://github.com/GhostPack/SharpUp + MultiPotato ==>...
  6. J

    do you know ninjutsu OS?

    Hi, I use kali normally to do my tests and for hacking is almost always linux, but I'm curious if there's any windows based OS that also serves for hacking, I heard for example of ninjutsu OS, anyone knows it? if so, would you recommend it? I don't know how big are the differences with a linux...
  7. J

    HackerStorm OSVDB Tool

    Aw, too bad bro, hackerstorm is a great tool, in case you are looking for a similar software vulnerability information option could be CVE Details or Exploit-DB. By the way, thanks for the insight!
  8. J

    Anti-Fraud Algorithm

    Impressive explanation, this detection system seems to be quite comprehensive and uses a combination of tools and techniques to analyze and evaluate transactions for possible fraudulent activity, only the website is down. Greetings!
  9. J

    [BlackHat USA 2022] Taking Kerberos To The Next Level

    It really is a masterful talk, kerberos has never been as necessary as it is right now, without a doubt it is not only enough to configure it but to know how it works from implementation to coding, great contribution. Nice BRO!
Top Bottom