Search results

  1. C

    access server via SSH

    yes, nice recommendation bro you can see more of that on the kali page too: https://www.kali.org/tools/hydra/
  2. C

    analyzes links in a secure browser

    https://browser.lol/create https://www.browserling.com/ Hi! here are a couple of tools with which you can view the content of suspicious links, without risk of malware...
  3. C

    quickly query Google, Bing, Brave, DuckDuckGo, Yahoo and Yandex with dorks

    Zarcolio's SiteDorks is a tool that allows users to query multiple websites on various search engines such as Google, Bing, Brave, DuckDuckGo, Yahoo and Yandex. It uses predefined lists of “dorkable” websites, i.e. websites that can be searched using specific advanced search queries (dorks)...
  4. C

    CVE-2024-22120 ToolKit

    From the Zabbix admin panel, the user can execute pre-created scripts (by default, ping and traceroute). After the script is executed, the event is recorded in the Audit Log. The event has a field with the client IP. Because it is not sanitized, it results in SQL injection...
  5. C

    HACKING ANDROID SMART PHONE

    nice tutorial bro, it's detailed, unfortunately I can't see the images I don't know why, but thanks for info
  6. C

    CryptoChat | Beyond Secure Messaging

    1. End-to-end encryption: Every message is protected from sender to receiver, ensuring maximum privacy. 2. User-friendly interface: browsing and sending messages is intuitive and simple, facilitating secure conversations. Cross-platform support: Whether on a desktop computer or mobile device...
  7. C

    20 FORENSIC TOOLS

    Hi guys, here are some useful tools that you may find useful... 1. Autopsy: https://autopsy.com 2. EnCase: https://www.guidancesoftware.com/encase-forensic 3. AccessData Forensic Toolkit (FTK): https://accessdata.com/products-services/forensic-toolkit-ftk/ 4. X-Ways Forensics...
  8. C

    A useful tip for car owners !!!

    This is an interesting tip for those who cannot afford car insurance or a tracking system. The idea of using an active, hidden cell phone in the car as a security measure is ingenious. While it is not a substitute for car insurance or a tracking system, it could be useful in situations where the...
  9. C

    what do you think of tryhackme?

    Do you prefer it to hackthebox or does it depend on your comfort and way of working?
  10. C

    OSINT tools and helpers

    nice dude, thanks for sharing, you have to take into account that not all the tools of this framework work, it's outdated as far as I see, but it is good to know the categories of which each one is deployed :)
  11. C

    Article Darknet forums

    you are right, very interesting topic, my experience in this forum has been very good so far :) so I am calm on that side.
  12. C

    Burpsuite Guide

    I found this Burpsuite guide, I think its very comprehensive and user friendly. Good day 1. Introduction and Installation: https://hacklido.com/blog/621-burpsuite-101-introduction-and-installation 2. Understanding Navigation, Dashboard, Configuration...
  13. C

    hackergpt.chat

    Hi community, sure you already heard about this but just in case, I've been using hackergpt for a while now, it's good, it's not that powerful and from what I saw you do have some limitations of "ethics", "moral", "legal" and all that, but it's more flexible than chatgpt, if you don't want to...
  14. C

    leaked hacking courses

    nice bro! thanks for sharing this for free, it's good content, covers interesting topics.
  15. C

    hackergpt.chat, did you know this AI?

    Hi community, did you know this AI? https://www.hackergpt.chat/ I thought there would not be an AI like this that was free, I have been testing it and it works fine for the moment, it asks to log in, so I do not recommend that you log in with your main email, use temporary emails like...
  16. C

    Burner Google Accounts

    How do you perform the DDoS attack with Google Colab/Cloud?
  17. C

    e-Whoring PACK

    What is the method you use for E-whoring, is there some kind of process already established, how do you choose those people?
  18. C

    Collection Of Source Codes

    woww , it's a great list, let me see it, thanks for sharing. :)
  19. C

    Exploit search

    Exploit-DB : https://www.exploit-db.com/ Sploitus : https://sploitus.com/ Rapid7 : https://www.rapid7.com/db/ Vulmon : https://vulmon.com/ packetstormsecurity.com : https://packetstormsecurity.com/ 0day.today : https://0day.today/ LOLBAS : https://lolbas-project.github.io/ Payloads All...
  20. C

    WiGLE - information on wireless networks (tool)

    WiGLE (Wireless Geographic Logging Engine) is a web-based tool that allows users to collect and visualize information about wireless networks. It provides information about the location, name, security type and other information about wireless networks. It is free but also offers paid options...
Top Bottom