Muriithi Gakurumuriithigakuru.hashnode.dev·Sep 5, 2023API Documentation using Hacker toolsAPI documentation is one of those things that are important in a backend-frontend dynamic that no one really wants to do. Mostly because it's time-consuming and repetitive. The tool I'll be describing is mitmproxy2swagger so if you want to cut to the...Discuss·10 likes·277 readsTool Tip Tuesdaymitm
Stackzerostackzero.hashnode.dev·Jul 7, 2023Subdomain scanner made easy – with Python!Subomain scanner with python? Why? Do you want to build your subdomain scanner with python? But why? There are many reasons why you might want to develop your own subdomain scanner. Maybe you’re a security researcher who wants to find vulnerabilities...Discuss·1 likenetworking
Mostafa Aymanscriptmaker.hashnode.dev·Jul 7, 2023Secure Your Files - Encrypt and Decrypt Your FilesIntroduction: Python script developed that provides an intuitive solution for encrypting and decrypting files using AES encryption. With its user-friendly graphical user interface (GUI) built with tkinter, Secure Your Files allows users to easily sel...Discuss·1 like·50 readsCryptography
Mostafa Aymanscriptmaker.hashnode.dev·Jul 6, 2023Script Maker Hash: A Tool for Generating HashesHello everyone! My name is Script Maker and this is my GitHub, and I'm excited to introduce you to my tool: Script Maker Hash. This tool is designed to generate, decrypt, and encrypt hashes for strings using various algorithms including MD5, SHA1, SH...Discuss·2 likes·34 readsPython
OusH4ckoush4ck.hashnode.dev·Jun 6, 2023Sending Spoofed Emails from Linux: A Step-by-Step TutorialIntroduction In this tutorial, we will explore the intriguing world of email spoofing using Linux. We will guide you through the process of sending emails that appear to come from a different source than they actually do. Learn the techniques and too...Discuss·1 like·231 readshacking
Scofield IdehenforLearnHub Bloglearnhubafrica.hashnode.dev·May 29, 2023Hackers Tools: Must-Have Tools for Every Ethical HackerEthical hacking, also known as penetration testing or white-hat hacking, is a crucial practice in ensuring the security of computer systems and networks. Having the right tools at your disposal is essential to carry out effective, ethical hacking. ...Discuss·1 like#cybersecurity
LoneD3VILunr-c1.eu.org·May 23, 2023How-to Brute-Force FTP Creds & Get Server AccessHackers frequently discover fascinating files in the unlikeliest of locations, FTP servers being one of them. If you're lucky, anonymous logins might occasionally be permitted, allowing anyone to sign in. But you'll almost always need a legitimate us...Discusshacking
LoneD3VILunr-c1.eu.org·May 19, 2023Create Custom Wordlists for Password Cracking Using the MentalistThe restrictions of default wordlists like RockYou based on stolen passwords frequently let down beginners learning brute-forcing attacks against WPA handshakes. By creating personalized wordlists, we can increase our efficiency beyond simply using t...Discuss·39 readscracking
marcos albanoautomateops.hashnode.dev·Apr 21, 2023How To Become A PentesterHi, pentesters! if you are new in this field chances are that you struggle to find a kind of road map to get into this amazing field, but don't worry you came into the right place, I'll show you some of the most basic tools that you need to master to...Discusspentesting
Antoine Maryweatherrmrf.hashnode.dev·Apr 10, 2023Removing the EXIF data from my fake hashnode profile picAs I was setting up my fake Hashnode profile I started wondering if it was possible to read a profile photos' exif data to find out if I downloaded it from https://thispersondoesnotexist.xyz/. Maybe it's stripped off in the upload / optimization proc...Discuss·26 readshacking