π’βοΈMan in the Middle: Network Attacks
πΉSSLStripping
πΉBGP Hijacking
πΉRogue Devices
πΉPacket Sniffing
πΉARP Spoofing & Poisoning
πΉWi-Fi Eaves Dropping
πΉEvil Twin Attacks
πΉSession Hijacking
πΉDNS Spoofing & Poisoning
πΉMalware & Trojans
Joinπ’@hacker_habeshaπͺπΉ
πΉSSLStripping
πΉBGP Hijacking
πΉRogue Devices
πΉPacket Sniffing
πΉARP Spoofing & Poisoning
πΉWi-Fi Eaves Dropping
πΉEvil Twin Attacks
πΉSession Hijacking
πΉDNS Spoofing & Poisoning
πΉMalware & Trojans
Joinπ’@hacker_habeshaπͺπΉ
π2β€1π1
π’Web Applications Proxies π°
πΉ Burpsuite - Burpsuite is a graphical tool for testing Web application security.
πhttps://portswigger.net/
πΉZAP One of the worldβs most popular free security tools.
πhttps://github.com/zaproxy/zaproxy
πΉMitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
πhttps://github.com/mitmproxy/mitmproxy
πΉBroxy - An HTTP/HTTPS intercept proxy written in Go.
πhttps://github.com/rhaidiz/broxy
πΉHetty - An HTTP toolkit for security research.
πhttps://github.com/dstotijn/hetty
πΉProxify - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
πhttps://github.com/projectdiscovery/proxify
Join:π’@hacker_habeshaπͺπΉ
πΉ Burpsuite - Burpsuite is a graphical tool for testing Web application security.
πhttps://portswigger.net/
πΉZAP One of the worldβs most popular free security tools.
πhttps://github.com/zaproxy/zaproxy
πΉMitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
πhttps://github.com/mitmproxy/mitmproxy
πΉBroxy - An HTTP/HTTPS intercept proxy written in Go.
πhttps://github.com/rhaidiz/broxy
πΉHetty - An HTTP toolkit for security research.
πhttps://github.com/dstotijn/hetty
πΉProxify - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
πhttps://github.com/projectdiscovery/proxify
Join:π’@hacker_habeshaπͺπΉ
π3π₯1π₯°1
π§¬Hashing Vs Encryption vs Encoding: A Brief Comparison
πHashing:
This is primarily used for data integrity verification and password storage.
It involves applying the Hash function to data, this generates a fixed-size structure of characters (hash value) that is unique to the input data.
πEncryption:
This is used to protect the confidentiality of data during transmission or storage.
It uses algorithms and a key to transform plaintext into cipher text , making it unreadable without the corresponding decryption key.
π‘οΈEncoding:
Encoding is a method of converting data to a different format for safe and efficient data transmission.
Encoding is typically reversible, meaning the original data can be obtained by reversing the process.
Unlike Hashing and Encryption, Encoding is not designed to keep data secret.
Join:π’@hacker_habeshaπͺπΉ
πHashing:
This is primarily used for data integrity verification and password storage.
It involves applying the Hash function to data, this generates a fixed-size structure of characters (hash value) that is unique to the input data.
πEncryption:
This is used to protect the confidentiality of data during transmission or storage.
It uses algorithms and a key to transform plaintext into cipher text , making it unreadable without the corresponding decryption key.
π‘οΈEncoding:
Encoding is a method of converting data to a different format for safe and efficient data transmission.
Encoding is typically reversible, meaning the original data can be obtained by reversing the process.
Unlike Hashing and Encryption, Encoding is not designed to keep data secret.
Join:π’@hacker_habeshaπͺπΉ
π2π₯1π1
π’Network and Communication Security Cheat sheet
πΉOSI Reference Model
πΉCommon TCP Protocols
πΉAttack in OSI Layers
πΉHardware Devices
πΉIP Addresses
πΉNetwork Types
πΉNetworking Methods & Standards
Join:π’@hacker_habeshaπͺπΉ
πΉOSI Reference Model
πΉCommon TCP Protocols
πΉAttack in OSI Layers
πΉHardware Devices
πΉIP Addresses
πΉNetwork Types
πΉNetworking Methods & Standards
Join:π’@hacker_habeshaπͺπΉ
β€2π₯°1π1
π’βοΈApplication Structure and the Attacks at each Layer
πΉClient-Side Attacks
πΉWeb Application Attacks
πΉDDoS Attacks
Join:π’@hacker_habeshaπͺπΉ
πΉClient-Side Attacks
πΉWeb Application Attacks
πΉDDoS Attacks
Join:π’@hacker_habeshaπͺπΉ
π2π₯1π₯°1π1
π₯Hacking Tools Collection
1. DDoS
2. Forensics
3. Programming
4. Exploitation
5. Phone Hacking
6. Server Hacking
7. Client Hacking
8. Website Hacking
9. Network Hacking
10. Wireless Hacking
11. Reverse Engeenering
12. Information Gathering
#DDoS
1. MDK3
2. LOIC
3. HULK
4. DDOSIM
5. Ufonet
6. Hping3
7. Xerxes
8. Hammer
9. Slowloris
10. Websploit
11. GoldenEye
12. Metasploit
13. Aireplay-ng
14. Slowhttptest
#Forensics
1. COFEE
2. Volafox
3. Autopsy
4. Foremost
5. Hashdeep
6. Binwalk
#Programming
1. Notepad++
2. Visual Studio
3. Text Editor
#Exploitation
1. Metasploit
2. Sqlmap
3. Core Imact
4. W3af
5. BeEF
6. Dradis
#Phone_Hacking
1. Metasploit
2. Apktool
3. Droidjack
4. AndroRAT
5. Spynote
#Server_Hacking
1. SQLmap
2. Jsql
3. Havij
4. Hydra
5. Metasploit
6. Armitage
7. Brupsuite
8. Owasp-ZAP
9. Invicti
10. Acunetix
11. OpenVAS
#Client_Hacking
1. Darkcomet
2. FatRat
3. Veil-Evasion
4. Shallter
5. Unicorn
6. Setoolkit
7. Armitage
8. BeEF-Framework
9. EmPyre
10. FakeImageExploiter
11. Pupy
12. DFU-Programmer
13. Cobalt Strike
14. Exploitpack
15. Gcat
16. Crowbar
#Website_Hacking
1. Sn1per
2. Owasp-ZAP
3. Brupsuite
4. Invicti
5. Acunetix
6. SQLmap
7. Xsser
8. WPScan
9. Joomrra
10. Joomscan
11. WPSeku
12. XSStrike
13. Kadimus
14. jexboss
15. CMSmap
16. brut3k1t
17. 0d1n
18. CloudFail
19. Arachni
20. Nikto
21. Webscarab
22. Nmap
23. Vbscan
24. Sentry MBA
#Network_Hacking
1. MITMf
2. Bettercap
3. Ettercap
4. Tcpdump
5. Wireshark
6. Driftnet
7. SSLstrip
8. Armitage
9. Metasploit
10. Xerosploit
11. Sparta
12. Hydra
#Wireless_Hacking
1. Wifite
2. Airodump-ng
3. Aireplay-ng
4. Wash
5. WiFi Pumpkin
6. Wifiphisher
7. Fluxion
8. Infernal Twin
9. WPSpin
#Reverse_Engeenering
1. OWASP-ZSC
2. OllyDBG
3. Apktool
#OSINT
1. OSINT Framework
2. CheckUserNames
3. HaveIbeenPwned
4. SecurityTrails API
5. Censys
6. Wappalyzer
7. Google Dorks
8. Maltego
9. Recon-Ng
10. theHarvester
11. Shodan
12. Jigsaw
13. SpiderFoot
14. Creepy
15. Nmap
16. WebShag
17. OpenVAS
18. Fierce
19. Unicornscan
20. Foca
21. ZoomEye
22. OWASP Amass
23. IVRE
24. Metagoofil
25. Exiftool
Join:π’@hacker_habeshaπͺπΉ
1. DDoS
2. Forensics
3. Programming
4. Exploitation
5. Phone Hacking
6. Server Hacking
7. Client Hacking
8. Website Hacking
9. Network Hacking
10. Wireless Hacking
11. Reverse Engeenering
12. Information Gathering
#DDoS
1. MDK3
2. LOIC
3. HULK
4. DDOSIM
5. Ufonet
6. Hping3
7. Xerxes
8. Hammer
9. Slowloris
10. Websploit
11. GoldenEye
12. Metasploit
13. Aireplay-ng
14. Slowhttptest
#Forensics
1. COFEE
2. Volafox
3. Autopsy
4. Foremost
5. Hashdeep
6. Binwalk
#Programming
1. Notepad++
2. Visual Studio
3. Text Editor
#Exploitation
1. Metasploit
2. Sqlmap
3. Core Imact
4. W3af
5. BeEF
6. Dradis
#Phone_Hacking
1. Metasploit
2. Apktool
3. Droidjack
4. AndroRAT
5. Spynote
#Server_Hacking
1. SQLmap
2. Jsql
3. Havij
4. Hydra
5. Metasploit
6. Armitage
7. Brupsuite
8. Owasp-ZAP
9. Invicti
10. Acunetix
11. OpenVAS
#Client_Hacking
1. Darkcomet
2. FatRat
3. Veil-Evasion
4. Shallter
5. Unicorn
6. Setoolkit
7. Armitage
8. BeEF-Framework
9. EmPyre
10. FakeImageExploiter
11. Pupy
12. DFU-Programmer
13. Cobalt Strike
14. Exploitpack
15. Gcat
16. Crowbar
#Website_Hacking
1. Sn1per
2. Owasp-ZAP
3. Brupsuite
4. Invicti
5. Acunetix
6. SQLmap
7. Xsser
8. WPScan
9. Joomrra
10. Joomscan
11. WPSeku
12. XSStrike
13. Kadimus
14. jexboss
15. CMSmap
16. brut3k1t
17. 0d1n
18. CloudFail
19. Arachni
20. Nikto
21. Webscarab
22. Nmap
23. Vbscan
24. Sentry MBA
#Network_Hacking
1. MITMf
2. Bettercap
3. Ettercap
4. Tcpdump
5. Wireshark
6. Driftnet
7. SSLstrip
8. Armitage
9. Metasploit
10. Xerosploit
11. Sparta
12. Hydra
#Wireless_Hacking
1. Wifite
2. Airodump-ng
3. Aireplay-ng
4. Wash
5. WiFi Pumpkin
6. Wifiphisher
7. Fluxion
8. Infernal Twin
9. WPSpin
#Reverse_Engeenering
1. OWASP-ZSC
2. OllyDBG
3. Apktool
#OSINT
1. OSINT Framework
2. CheckUserNames
3. HaveIbeenPwned
4. SecurityTrails API
5. Censys
6. Wappalyzer
7. Google Dorks
8. Maltego
9. Recon-Ng
10. theHarvester
11. Shodan
12. Jigsaw
13. SpiderFoot
14. Creepy
15. Nmap
16. WebShag
17. OpenVAS
18. Fierce
19. Unicornscan
20. Foca
21. ZoomEye
22. OWASP Amass
23. IVRE
24. Metagoofil
25. Exiftool
Join:π’@hacker_habeshaπͺπΉ
π3π₯2β€1
π‘οΈCyberSecurity Ecosystem
πΉPeople
πΉHardware
πΉSoftware
πΉNetwork
πΉData Risk & Compliance
Join:π’@hacker_habeshaπͺπΉ
πΉPeople
πΉHardware
πΉSoftware
πΉNetwork
πΉData Risk & Compliance
Join:π’@hacker_habeshaπͺπΉ
π3π₯°1
π‘οΈ7 Subfields of CyberSecurity
πΉDigital Forensic & Incident Response
πΉCyber Defence
πΉOsint
πΉPurple Team
πΉICS/OT Security
πΉCloud
πΉOffensive Security
Join:π’@hacker_habeshaπͺπΉ
πΉDigital Forensic & Incident Response
πΉCyber Defence
πΉOsint
πΉPurple Team
πΉICS/OT Security
πΉCloud
πΉOffensive Security
Join:π’@hacker_habeshaπͺπΉ
π₯°2π1
πHacker Search Engines: Phone Numbers
πΉNumLookup - Free reverse phone lookup
πhttps://www.numlookup.com/
πΉ SpyDialer - Free Reverse Lookup Search
πhttps://spydialer.com/
πΉ WhitePages - Find people, contact info & background checks
πhttps://www.whitepages.com/
πΉ National Cellular Directory - Begin your comprehensive people search now
πhttps://www.nationalcellulardirectory.com/
πΉ Phone Validator - Is it a cell phone or is it a landline or is it a fake?
πhttps://www.phonevalidator.com/
πΉ Free Carrier Lookup - Enter a phone number and we'll return the carrier name
πhttps://freecarrierlookup.com/
πΉ RocketReach - Your first-degree connection to any professional
πhttps://rocketreach.co/
πΉ sync.me - Find out who called
πhttps://sync.me/
πΉ EmobileTracker - Track Mobile Owner Name, Location and Mobile Service Provider
πhttps://www.emobiletracker.com/
πΉ Reverse Phone Lookup - Find Out The Owner Of A Phone Number
πhttps://www.reversephonelookup.com/
πΉ ThatsThem - Reverse phone lookup
πhttps://thatsthem.com/reverse-phone-lookup
πΉ thisnumber.com - International Phone Directories
πhttps://www.thisnumber.com/
πΉ usphonebook.com - Free Reverse Phone Number Lookup
πhttps://www.usphonebook.com/
πΉ truepeoplesearch.com - Get current address, cell phone number, email address, relatives, friends and a lot more
πhttps://www.truepeoplesearch.com/#
πΉ Tellows - Who is calling? The phone number reverse search
πhttps://www.tellows.com/
πΉ SynapsInt - The unified OSINT research tool
πhttps://synapsint.com/
πΉ C99.nl - Over 57 quality API's and growing
πhttps://api.c99.nl/
πΉ ValidNumber.com - Free reverse phone lookup service to let you identify a caller associated with any 10-digit phone number from the US and Canada
πhttps://validnumber.com/
πΉ CellIdFinder - Nonprofit project wich helps you to find GSM BTS by MCC, MNC, LAC and CellID
πhttps://cellidfinder.com/
πΉ OldPhoneBook - Intantly search a large selection from the past 20 years of USA phone listings
πhttp://www.oldphonebook.com/
πΉ Spokeo - Search by name, phone, address, or email to confidentially lookup information about people you know
πhttps://www.spokeo.com/
πΉ Intelius Phone Lookup - Look up a phone number to find owner information, carrier details, and more
πhttps://www.intelius.com/reverse-phone-lookup/
πΉ ZabaSearch Phone Lookup - Reverse Phone Lookup Tool Can Uncover Personal Information, Social Media Data, Online Activity, Photos, and More
πhttps://www.zabasearch.com/reverse-phone-lookup/
πΉ AnyWho Phone Lookup - Find out information associated with a phone number
πhttps://www.anywho.com/reverse-phone-lookup/
πΉ Radaris Phone Lookup - Look up any phone number to see its owner and identify who's calling or texting you
πhttps://radaris.com/#findPhoneH
Join:π’@hacker_habeshaπͺπΉ
πΉNumLookup - Free reverse phone lookup
πhttps://www.numlookup.com/
πΉ SpyDialer - Free Reverse Lookup Search
πhttps://spydialer.com/
πΉ WhitePages - Find people, contact info & background checks
πhttps://www.whitepages.com/
πΉ National Cellular Directory - Begin your comprehensive people search now
πhttps://www.nationalcellulardirectory.com/
πΉ Phone Validator - Is it a cell phone or is it a landline or is it a fake?
πhttps://www.phonevalidator.com/
πΉ Free Carrier Lookup - Enter a phone number and we'll return the carrier name
πhttps://freecarrierlookup.com/
πΉ RocketReach - Your first-degree connection to any professional
πhttps://rocketreach.co/
πΉ sync.me - Find out who called
πhttps://sync.me/
πΉ EmobileTracker - Track Mobile Owner Name, Location and Mobile Service Provider
πhttps://www.emobiletracker.com/
πΉ Reverse Phone Lookup - Find Out The Owner Of A Phone Number
πhttps://www.reversephonelookup.com/
πΉ ThatsThem - Reverse phone lookup
πhttps://thatsthem.com/reverse-phone-lookup
πΉ thisnumber.com - International Phone Directories
πhttps://www.thisnumber.com/
πΉ usphonebook.com - Free Reverse Phone Number Lookup
πhttps://www.usphonebook.com/
πΉ truepeoplesearch.com - Get current address, cell phone number, email address, relatives, friends and a lot more
πhttps://www.truepeoplesearch.com/#
πΉ Tellows - Who is calling? The phone number reverse search
πhttps://www.tellows.com/
πΉ SynapsInt - The unified OSINT research tool
πhttps://synapsint.com/
πΉ C99.nl - Over 57 quality API's and growing
πhttps://api.c99.nl/
πΉ ValidNumber.com - Free reverse phone lookup service to let you identify a caller associated with any 10-digit phone number from the US and Canada
πhttps://validnumber.com/
πΉ CellIdFinder - Nonprofit project wich helps you to find GSM BTS by MCC, MNC, LAC and CellID
πhttps://cellidfinder.com/
πΉ OldPhoneBook - Intantly search a large selection from the past 20 years of USA phone listings
πhttp://www.oldphonebook.com/
πΉ Spokeo - Search by name, phone, address, or email to confidentially lookup information about people you know
πhttps://www.spokeo.com/
πΉ Intelius Phone Lookup - Look up a phone number to find owner information, carrier details, and more
πhttps://www.intelius.com/reverse-phone-lookup/
πΉ ZabaSearch Phone Lookup - Reverse Phone Lookup Tool Can Uncover Personal Information, Social Media Data, Online Activity, Photos, and More
πhttps://www.zabasearch.com/reverse-phone-lookup/
πΉ AnyWho Phone Lookup - Find out information associated with a phone number
πhttps://www.anywho.com/reverse-phone-lookup/
πΉ Radaris Phone Lookup - Look up any phone number to see its owner and identify who's calling or texting you
πhttps://radaris.com/#findPhoneH
Join:π’@hacker_habeshaπͺπΉ
NumLookup
Reverse Phone Lookup
Perform a free reverse phone lookup. Find full name, address, social media and more using a phone number. #1 Phone Number Lookup for US. Find out who called for free.
π4β€1π₯1
π¦ΆFoot Printing
πΉDomain Name
πΉIP Adress
πΉPhone Numbers
πΉEmail Address
πΉEmployees Information
πΉNamespaces
Join:π’@hacker_habeshaπͺπΉ
πΉDomain Name
πΉIP Adress
πΉPhone Numbers
πΉEmail Address
πΉEmployees Information
πΉNamespaces
Join:π’@hacker_habeshaπͺπΉ
β€3π1
Awesome Github Scripts & Tools | Part #1
Article : https://lnkd.in/d-JK8MMn
Join:π’@hacker_habeshaπͺπΉ
Article : https://lnkd.in/d-JK8MMn
Join:π’@hacker_habeshaπͺπΉ
π2β€1π₯1
π’βοΈCommon Types of Password Attacks
πΉBrute Force Attack
πΉDictionary Attack
πΉRainbow Table Attack
πΉSocial Engineering Attacks
πΉCredential Stuffing Attack
Join:π’@hacker_habeshaπͺπΉ
πΉBrute Force Attack
πΉDictionary Attack
πΉRainbow Table Attack
πΉSocial Engineering Attacks
πΉCredential Stuffing Attack
Join:π’@hacker_habeshaπͺπΉ
β€4π₯1π1
π’Common Types Of Wireless Attacks
πΉPacket Sniffing
πΉRogue Access Point
πΉJamming
πΉEvil Twin
πΉWar Driving
πΉBluejacking
πΉBluesnarfing
πΉWar Chalking
πΉWPS Attack
Join:π’@hacker_habeshaπͺπΉ
πΉPacket Sniffing
πΉRogue Access Point
πΉJamming
πΉEvil Twin
πΉWar Driving
πΉBluejacking
πΉBluesnarfing
πΉWar Chalking
πΉWPS Attack
Join:π’@hacker_habeshaπͺπΉ
π3π1
π§¬The DNS System Hierarchy
1οΈβ£Client
2οΈβ£DNS Cache
3οΈβ£DNS Resolver
4οΈβ£Root Server
5οΈβ£TLD Server
6οΈβ£Authoratative Server
Join:π’@hacker_habeshaπͺπΉ
1οΈβ£Client
2οΈβ£DNS Cache
3οΈβ£DNS Resolver
4οΈβ£Root Server
5οΈβ£TLD Server
6οΈβ£Authoratative Server
Join:π’@hacker_habeshaπͺπΉ
π₯°4β€1π₯1
πCreate a fake Access Point
πThink twice before connecting to a free public wireless hotspot at a coffee shop, airport or hotel. Ever wondered if the public Wi-Fi you just connected to is safe or if it could be an Evil Twin hotspot?
πhttps://en.iguru.gr/dimiourgiste-ena-pseftiko-access-point/
Join:π’@hacker_habeshaπͺπΉ
πThink twice before connecting to a free public wireless hotspot at a coffee shop, airport or hotel. Ever wondered if the public Wi-Fi you just connected to is safe or if it could be an Evil Twin hotspot?
πhttps://en.iguru.gr/dimiourgiste-ena-pseftiko-access-point/
Join:π’@hacker_habeshaπͺπΉ
β€2π1π₯°1