Search results

  1. C

    Security reports

    This is a repository with annual cybersecurity reports from the largest IT companies. This repository is constantly kept updated, which will help us learn many new and useful things (options for exploiting various vulnerabilities, attack vectors, etc.). ➡️...
  2. C

    RED HAWK

    All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers https://github.com/Tuhinshubhra/RED_HAWK
  3. C

    interesting blog to follow

    :)) http://obscuresecurity.blogspot.com http://carnal0wnage.attackresearch.com https://www.netspi.com/blog http://itsecops.blogspot.com http://www.labofapenetrationtester.com http://www.harmj0y.net/ http://passing-the-hash.blogspot.com/ https://clymb3r.wordpress.com...
  4. C

    GIFTCARD CODE GENERATOR BY AMBOSS NETFLIX, AMAZON, PSN, SPOTIFY & MORE

    Nice resource, I'll have to try it, thanks bro 🙂
  5. C

    [PH0MBER]: An open source infomation grathering & reconnaissance framework!

    PH0MBER is an osint framework, which is one-stop tool for your information gathering and reconnaissance needs It can help you gather information (such as phone numbers, ip address, domain name info, etc.) from various publicly available sources about the target 😉 https://github.com/s41r4j/phomber
  6. C

    Sql Dork list

    it's a good list to have fun for a while searching in google, thanks for sharing bro
  7. C

    programming languages for hacking

    I think it differs a lot from the type of work or project you want to do, so which language do you prefer for hacking and why?
  8. C

    Kali Linux | Worldlist/Passwordlist Creation with Crunch

    great bro! thanks, this way the wordlist is more efficient.
  9. C

    Above | Invisible network protocol sniffer

    Invisible protocol sniffer for finding vulnerabilities in the network. Designed for pentesters and security professionals. Above is a invisible network sniffer for finding vulnerabilities in network equipment. It is based entirely on network traffic analysis, so it does not make any noise on the...
  10. C

    New official version of Kali Linux 2023.4 Release

    The summary of the changelog since the 2023.3 release from August is: Cloud ARM64 - Now marketplaces on Amazon AWS and Microsoft Azure have ARM64 option Vagrant Hyper-V - Our Vagrant offering now supports Hyper-V Raspberry Pi 5 - Kali on the latest Raspberry Pi foundation device GNOME 45 - Kali...
  11. C

    BlackHat Cracking Course

    good resource, thanks for sharing
  12. C

    Why Hackers Use Kali Linux

    Specialized Tools: Kali Linux is equipped with a comprehensive set of pre-installed tools specifically designed for ethical hacking, penetration testing, and security assessments. Penetration Testing Frameworks: It supports popular penetration testing frameworks like Metasploit, allowing users...
  13. C

    Bruteforce-Wallet

    Try to find the password of an encrypted Peercoin (or Bitcoin, Litecoin, etc...) wallet file. It can be used in two ways: try all the possible passwords given a charset try all the passwords in a file There is a command line option to specify the number of threads to use. Sending a USR1...
  14. C

    Top File Hosting Services for 2023 - Updated: 05-06-2023

    I didn't know there were so many 😅 , thanks bro for sharing it.
  15. C

    CTF Field Guide

    Hi, I hope this guide helps you, it contains all the information you need to know to capture the flag, for newbies who are just seeing how to get started. For example: - Tutorials and details on previous CTF challenges. - Guidance to help you design and create your own toolkits. - Case studies...
  16. C

    USB key for authentication

    Hi guys lately I have seen that people use a USB key for authentication and access to their passwords, do you know anything about that? is it really good? have you used it?
  17. C

    Article Darknet forums

    I prefer cracking mafia, I feel safer and there is good content 🥹
  18. C

    CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition

    Oh nicee, thnk you, i'm going to see it right now
  19. C

    What are the best websites to identify subdomains?

    Hello guys, what are the best sites you use to identify subdomains? one that I find very useful is securitytrails, but I would like to know which ones do you use based on your experience?
  20. C

    How do I do a visibility analysis of a website?

    Hi community, I have doubts about what is the best way to perform a visibility analysis, what is the process or steps that you follow, sometimes it tends to be a bit complicated for me and I end up taking longer or losing important information, what advice can you give me?
Top Bottom