Linux, Material de hacking y noticias
@Linux_and_hacking_material
1.47K
subscribers
246
photos
28
videos
3.36K
files
9.66K
links
Canal destinado a diversos contenidos: material de Linux, hacking y seguridad informática
Download Telegram
Join
Linux, Material de hacking y noticias
1.47K subscribers
Linux, Material de hacking y noticias
https://netspooky.medium.com/elf-binary-mangling-part-1-concepts-e00cb1352301
Medium
ELF Binary Mangling Part 1 — Concepts
Okay, so you want to see how small you can make a 64 bit binary. In the age of giant bloated applications full of impossibly convoluted…
Linux, Material de hacking y noticias
https://bruteratel.com/research/feature-update/2021/01/30/OBJEXEC/
Brute Ratel C4
Executing Position Independent Shellcode from Object Files in Memory
Reflective DLL and shellcode injection remain one of the most used techniques for threat actors as well as Red Teamers for post exploitation since the executions happen only in memory and they don’t have to drop anything to disk. However, most of the offsec…
Linux, Material de hacking y noticias
https://adepts.of0x.cc/kerberos-thievery-linux/
The Kerberos Credential Thievery Compendium (GNU/Linux) |
The Kerberos Credential Thievery Compendium (GNU/Linux) | AdeptsOf0xCC
Collection of well-known techniques to steal kerberos credentials in GNU/Linux environments
Linux, Material de hacking y noticias
https://github.com/TheBinitGhimire/NtHiM
GitHub
GitHub - TheBinitGhimire/NtHiM: Now, the Host is Mine! - Super Fast Sub-domain Takeover Detection!
Now, the Host is Mine! - Super Fast Sub-domain Takeover Detection! - TheBinitGhimire/NtHiM
Linux, Material de hacking y noticias
https://www.ivanglinkin.com/my-way-to-the-oscp-certification/
Linux, Material de hacking y noticias
https://github.com/iamthefrogy/frogy-subdomain-enumeration
GitHub
iamthefrogy/frogy-subdomain-enumeration
My subdomain enumeration. Contribute to iamthefrogy/frogy-subdomain-enumeration development by creating an account on GitHub.
Linux, Material de hacking y noticias
https://docs.google.com/presentation/d/1rlnxXUYHY9CHgCMckZsCGH4VopLo4DYMvAcOltma0og/mobilepresent?slide=id.g63e29d5a06_0_0
Google Docs
XSLeaks in redirect flows
Linux, Material de hacking y noticias
https://github.com/HashPals/Name-That-Hash
GitHub
GitHub - bee-san/Name-That-Hash:
🔗
Don't know what type of hash it is? Name That Hash will name that hash type!
🤖
Identify MD5…
🔗
Don't know what type of hash it is? Name That Hash will name that hash type!
🤖
Identify MD5, SHA256 and 300+ other hashes
☄
Comes with a neat web app
🔥
- bee-san/Name-That-Hash
Linux, Material de hacking y noticias
https://github.com/deletehead/pen_300_osep_prep/blob/main/blog.md
GitHub
pen_300_osep_prep/blog.md at main · deletehead/pen_300_osep_prep
Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam - pen_300_osep_prep/blog.md at main · deletehead/pen_300_osep_prep
Linux, Material de hacking y noticias
https://mega.nz/folder/Gag3za6J#HCAxVzR6mrBJYIaM311Feg
mega.nz
File folder on MEGA
Linux, Material de hacking y noticias
https://s3cur3th1ssh1t.github.io/A-tale-of-EDR-bypass-methods/
s3cur3th1ssh1t.github.io
A tale of EDR bypass methods | S3cur3Th1sSh1t
In a time full of ransomware as well as Advanced persistent Thread (APT) incidents the importance of detecting those attacking groups has become increasingly...
Linux, Material de hacking y noticias
https://m.youtube.com/channel/UCWShWXihzurVtYKSz38iBrg/playlists
Linux, Material de hacking y noticias
https://0xbandar.medium.com/detecting-the-leverage-of-inf-sct-fetch-execute-techniques-beca55e24d50
Medium
Detecting the Leverage of INF-SCT Fetch & Execute Techniques
Overview
Linux, Material de hacking y noticias
MobileAudit
https://www.prismacsi.com/mobileaudit/
Brandefense
Homepage – Brandefense
Brandefense platform is a proactive digital risk protection solution for organizations. Our AI-driven technology constantly scans the dark, deep, and surface web.
Linux, Material de hacking y noticias
https://github.com/c0brabaghdad1/Hackers-Hunter
GitHub
GitHub - c0brabaghdad1/Hackers-Hunter: Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username…
Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them :mag_right: :detective: - GitHub - c0brabaghdad1/Hacke...
Linux, Material de hacking y noticias
https://link.medium.com/DNjuCPycsdb
Medium
Detecting and Exploiting XXEs: AppSec Simplified
Finding XXE vulnerabilities in applications via code analysis
Linux, Material de hacking y noticias
https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/
Johnjhacking
The Ultimate OSCP Preparation Guide [DEPRECATED]
An organized guide to highlight some of the smartest techniques and resources for your OSCP journey. DEPRECATED: 12/28/2022
Linux, Material de hacking y noticias
https://github.com/SSLRI/instahack
GitHub
GitHub - SSLRI/instahack: High-performance Instagram penetration testing tool with smart anti-ban, password list, and Tor support.
High-performance Instagram penetration testing tool with smart anti-ban, password list, and Tor support. - SSLRI/instahack
Linux, Material de hacking y noticias
https://gist.github.com/binexisHATT/f070b4688831363877d56711e4741c9d
Gist
Python backdoor injector backdoor server
Python backdoor injector backdoor server. GitHub Gist: instantly share code, notes, and snippets.
Linux, Material de hacking y noticias
https://www.tessian.com/blog/download-how-to-hack-a-human-report/?utm_medium=social&utm_source=twitter
Tessian
6 Reasons to Download "How to Hack a Human" Now | Tessian
Tessian's research report "How to Hack a Human" explores how hackers use social media posts to craft social engineering attacks. Learn more.