Search results

  1. M

    WordPress HMS Testimonials 2.0.10 XSS / CSRF

    how can i search for it in shodan ,i want to try it
  2. M

    Red Team Toolkit

    This is a useful list of tools and equipment that will be useful when performing a pentest. Most tools have links to a store and a workaround. The list is divided into categories, where you will find everything used in the Red Team specialists' arsenal (from Wi-Fi hacking tools to drones and...
  3. M

    AngryOxide | 802.11 Attack Tool

    The overall goal of this tool is to provide a single-interface survey capability with advanced automated attacks that result in valid hashlines you can crack with Hashcat. https://github.com/Ragnt/AngryOxide
  4. M

    Malware Analysis Tool

    Hi, I hope this will help you 📌 HashCalc https://www.slavasoft.com/hashcalc/ 📌 UPX https://github.com/upx/upx/releases/tag/v3.96 📌 PE Studio https://www.winitor.com/download2 📌 Trid https://mark0.net/soft-trid-e.html 📌 Exeinfo PE https://exeinfo-pe.en.uptodown.com/windows 📌 DETECT-IT-EASY...
  5. M

    Social Engineering [Hitting Big brands]

    wow bro, nice! how many times do you think it works to do it?
  6. M

    Offensive Security Tool: SessionProbe

    SessionProbe, is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applications by taking a session token and checking access across a list of URLs, highlighting potential authorization issues. https://github.com/dub-flow/sessionprobe
  7. M

    Botnet Tutorial: How to make your own botnet ★

    very informative, I find it good that you give an introduction to the subject of basic concepts, thanks for the information bro
  8. M

    Bug Bounty Tips | Where to hunt for XXE vulnerabilities?

    I'm sharing this information with you, I found it surfing the internet and its very helpful... XXE -> XML External Entity + When it comes to identifying XXE issues, you'll find these vulnerabilities almost everywhere. Here's a list of the top 5 features and areas you should look for when...
  9. M

    Preferred language for hacking?

    I know that lately with artificial intelligence it may not even be necessary to know how to program at an intermediate level, you only need a basic knowledge, since the rest is done by the AI, but based on what you know, what language or languages do you think is essential to start with hacking...
  10. M

    Content Spoofing

    great content, thanks for talking about this topic. The statistics that 86% of the websites surveyed have at least one serious hole that hackers could exploit is interesting. Content spoofing has become a very common attack lately, now that you mention that it has been detected on more than half...
  11. M

    Cardable Site + Method

    it's only for uk right? btw, the price is not bad.
  12. M

    [FOR BEGINNERS] How to crack any account with OpenBullet

    thanks bro, I have not used OpenBullet, it was all theoretical, now I can understand it a little better, thanks for sharing.
  13. M

    Using Sherlock to Collect OSINT on Usernames

    don't forget to put .txt to the requirements file so you don't get errors in the installation. Otherwise the tool works fine, it's very interesting for osint, thank you very much dude, great!
  14. M

    How to use Google as a proxy !

    I recommend using firefox with its FoxyProxy extension which allows you to route your web traffic through configurable proxy servers, which can be useful for maintaining your privacy, accessing geographically restricted content or improving your online security. I've been using it and it works...
  15. M

    FOFA - Cyberspace mapping

    FOFA is a cyberspace mapping tool that allows users to search for data about web servers and applications. The tool uses a variety of methods to collect information, including port scans, DNS lookups and web content analysis. Additional details: The tool is available in two versions: a free...
  16. M

    TcpView: Network Connection Monitoring Tool

    TcpView: Network Connection Monitoring Tool TcpView is a free and open-source tool that allows you to see all active network connections on your system. It is a powerful tool that can be used to diagnose network problems, monitor network traffic, and detect malware. How does TcpView work...
  17. M

    Top 100 Hacking Security Ebooks

    Hacking Security Ebooks Top 100 Hacking & Security E-Books (Free Download) Link: https://github.com/C0MPL3XDEV/Hacking-Security-Ebooks +check this repository, it has a list of top 100 hacking books, all of them are free, you can download them, it's great!
  18. M

    Botnet Info

    Look what I found, it's good to keep it in mind... Botnet Info 🤖 A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform Distributed Denial-of-Service attacks, steal data, send spam, and allow the attacker to access the...
  19. M

    C++ For HackerZ

    Great! C++ is a very good base program, I think that if you know C++, practically you already know C# and java, as they're very similar, it's a good choice of language and more if you are starting, I'll see the info, thanks!
  20. M

    Guide to Physical Penetration Testing

    oh man, that's a great info, it would be great if you uploaded a guide on Cloud Security Testing as well. thanks for sharing!
Top Bottom