Web Crawlers & Directory Brute Force ⚡
🔹Dirbrute
🔗https://github.com/Xyntax/DirBrute
🔹Dirb
🔗https://dirb.sourceforge.net/
🔹ffuf
🔗https://github.com/ffuf/ffuf
🔹Dirbuster
🔗https://sourceforge.net/projects/dirbuster/
🔹Dirsearch
🔗https://github.com/maurosoria/dirsearch
🔹Gobuster
🔗https://github.com/OJ/gobuster
🔹WebPathBrute
🔗https://github.com/7kbstorm/7kbscan-WebPathBrute
🔹wfuzz
🔗https://github.com/xmendez/wfuzz
🔹Dirmap
🔗https://github.com/H4ckForJob/dirmap
🔹YJdirscan
🔗https://github.com/foryujian/yjdirscan
Join:🟢@hacker_habesha🇪🇹
🔹Dirbrute
🔗https://github.com/Xyntax/DirBrute
🔹Dirb
🔗https://dirb.sourceforge.net/
🔹ffuf
🔗https://github.com/ffuf/ffuf
🔹Dirbuster
🔗https://sourceforge.net/projects/dirbuster/
🔹Dirsearch
🔗https://github.com/maurosoria/dirsearch
🔹Gobuster
🔗https://github.com/OJ/gobuster
🔹WebPathBrute
🔗https://github.com/7kbstorm/7kbscan-WebPathBrute
🔹wfuzz
🔗https://github.com/xmendez/wfuzz
🔹Dirmap
🔗https://github.com/H4ckForJob/dirmap
🔹YJdirscan
🔗https://github.com/foryujian/yjdirscan
Join:🟢@hacker_habesha🇪🇹
👍3❤🔥1
Sql Injection 💉
🔹 Sqlmap
🔗https://github.com/sqlmapproject/sqlmap
🔹 SSQLInjection
🔗https://github.com/shack2/SuperSQLInjectionV1
🔹Jsql-injection
🔗https://github.com/ron190/jsql-injection
🔹NoSQLMap
🔗https://github.com/codingo/NoSQLMap
🔹Sqlmate
🔗https://github.com/s0md3v/sqlmate
🔹SQLiScanner
🔗https://github.com/0xbug/SQLiScanner
🔹sql-injection-payload-list
🔗https://github.com/payloadbox/sql-injection-payload-list
🔹Advanced-SQL-Injection-Cheatsheet
🔗https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet
Join:🟢@hacker_habesha🇪🇹
🔹 Sqlmap
🔗https://github.com/sqlmapproject/sqlmap
🔹 SSQLInjection
🔗https://github.com/shack2/SuperSQLInjectionV1
🔹Jsql-injection
🔗https://github.com/ron190/jsql-injection
🔹NoSQLMap
🔗https://github.com/codingo/NoSQLMap
🔹Sqlmate
🔗https://github.com/s0md3v/sqlmate
🔹SQLiScanner
🔗https://github.com/0xbug/SQLiScanner
🔹sql-injection-payload-list
🔗https://github.com/payloadbox/sql-injection-payload-list
🔹Advanced-SQL-Injection-Cheatsheet
🔗https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet
Join:🟢@hacker_habesha🇪🇹
👍3🙏1
Wordlists 📄
🔹 wordlists - Real-world infosec wordlists, updated regularly.
🔗https://github.com/trickest/wordlists/
🔹psudohash - Password list generator that focuses on keywords mutated by commonly used password creation patterns.
🔗https://github.com/t3l3machus/psudohash
🔹wister - A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.
🔗https://github.com/cycurity/wister
🔹Rockyou - wordlists packaging for Kali Linux.
🔗https://gitlab.com/kalilinux/packages/wordlists
🔹Weakpass - For any kind of bruteforce find wordlists.
🔗https://weakpass.com/
Join:🟢@hacker_habesha🇪🇹
🔹 wordlists - Real-world infosec wordlists, updated regularly.
🔗https://github.com/trickest/wordlists/
🔹psudohash - Password list generator that focuses on keywords mutated by commonly used password creation patterns.
🔗https://github.com/t3l3machus/psudohash
🔹wister - A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.
🔗https://github.com/cycurity/wister
🔹Rockyou - wordlists packaging for Kali Linux.
🔗https://gitlab.com/kalilinux/packages/wordlists
🔹Weakpass - For any kind of bruteforce find wordlists.
🔗https://weakpass.com/
Join:🟢@hacker_habesha🇪🇹
👍3👌1
Cross-Site Scripting (XSS)
🔹Data Theft
🔹Session Hijacking
🔹Phishing
🔹Defacement
🔹Keylogging
🔹Remote Code Execution
🔹Bypass Security Measures
🟢@hacker_habesha🇪🇹
🔹Data Theft
🔹Session Hijacking
🔹Phishing
🔹Defacement
🔹Keylogging
🔹Remote Code Execution
🔹Bypass Security Measures
🟢@hacker_habesha🇪🇹
⚡2🙏2
🩸Domain Takeover with PetitPotam Exploit
📝Petitpotam is a vulnerability that allows a domain user to take over domain controllers through triggering authentications using the MS-EFSRPC protocol.
🔗https://en.hacks.gr/2023/12/27/domain-takeover-with-petitpotam-exploit/
JOIN:🟢@hacker_habesha🇪🇹
📝Petitpotam is a vulnerability that allows a domain user to take over domain controllers through triggering authentications using the MS-EFSRPC protocol.
🔗https://en.hacks.gr/2023/12/27/domain-takeover-with-petitpotam-exploit/
JOIN:🟢@hacker_habesha🇪🇹
👌3🔥1
🧬Networking Essentials
🔖#infosec #cybersecurity #hacking #pentesting #security
JOIN:🟢@hacker_habesha🇪🇹
🔖#infosec #cybersecurity #hacking #pentesting #security
JOIN:🟢@hacker_habesha🇪🇹
👍3👏1
🛠Red Team Toolkit
🔴Privilege Escalation
🔴Phishing
🔴OSINT
🔴Exfiltration
🔖#infosec #cybersecurity #hacking #pentesting #security
JOIN:🟢@hacker_habesha🇪🇹
🔴Privilege Escalation
🔴Phishing
🔴OSINT
🔴Exfiltration
🔖#infosec #cybersecurity #hacking #pentesting #security
JOIN:🟢@hacker_habesha🇪🇹
❤🔥2⚡1🙏1
🛠Blue Team Toolkit
🔵Network Analysis
🔵EDR
🔵OS Analysis
🔵Honeypots
🔵SIEM
🔖#infosec #cybersecurity #hacking #pentesting #security
JOIN:🟢@hacker_habesha🇪🇹
🔵Network Analysis
🔵EDR
🔵OS Analysis
🔵Honeypots
🔵SIEM
🔖#infosec #cybersecurity #hacking #pentesting #security
JOIN:🟢@hacker_habesha🇪🇹
👍2⚡1🎉1
✔️Metasploit Pro version 4.22 Tool ✔️
➡️Features➡️
Manual Exploitation
Anti-virus Evasion
IPS/IDS Evasion
Proxy Pivot
Post-Exploration Modules
Session Clean Up
Credentials Reuse
Social Engineering
Payload Generator
Quick Pen Testing
VPN Pivoting
Vulnerability Validation
Phishing Wizard
Web App Testing
Persistent Sessions
🖱Note🖱, must use it in rdp or virtual machines .
➖➖➖➖➖➖➖➖➖➖
⛏ Download Here - Rar/zip Password: - zer0daylab
Download Link 1 : - https://link-target.net/886759/metasploit-pro-version-4 (Linvertise Link)
Download Link 2: - https://onotepad.com/tgArD1 (GP Link)
➖➖➖➖➖➖➖➖➖➖
1- How To Download File From Linkvertise Links
Video Tutorials For Linkvertise Links
https://t.me/ZerodayExploitware/1680
Step1:- Visit Linkvertise website
Step2:- Scroll Down
Step3:- Click on the "Free Access"
2- How to Open GP Links
https://t.me/ZerodayExploitware/1484
➡️Features➡️
Manual Exploitation
Anti-virus Evasion
IPS/IDS Evasion
Proxy Pivot
Post-Exploration Modules
Session Clean Up
Credentials Reuse
Social Engineering
Payload Generator
Quick Pen Testing
VPN Pivoting
Vulnerability Validation
Phishing Wizard
Web App Testing
Persistent Sessions
🖱Note🖱, must use it in rdp or virtual machines .
➖➖➖➖➖➖➖➖➖➖
⛏ Download Here - Rar/zip Password: - zer0daylab
Download Link 1 : - https://link-target.net/886759/metasploit-pro-version-4 (Linvertise Link)
Download Link 2: - https://onotepad.com/tgArD1 (GP Link)
➖➖➖➖➖➖➖➖➖➖
1- How To Download File From Linkvertise Links
Video Tutorials For Linkvertise Links
https://t.me/ZerodayExploitware/1680
Step1:- Visit Linkvertise website
Step2:- Scroll Down
Step3:- Click on the "Free Access"
2- How to Open GP Links
https://t.me/ZerodayExploitware/1484
🤩3🙏1👌1
Offensive Security Bookmarks
My security bookmarks collection.
All that things I need to pass OSCP, i think =)
Security Blogs
My Security OPML
Security Forums
http://securityoverride.org/forum/index.php
https://www.hackthissite.org/forums/index.php
https://www.ethicalhacker.net/forums/index.php
https://evilzone.org/
http://forum.antichat.ru/
https://forum.xeksec.com/
https://rdot.org/forum/
https://forum.zloy.bz/
https://forum.reverse4you.org/
https://rstforums.com/forum/
http://www.truehackers.ru/forum/index.php
http://garage4hackers.com/forum.php
https://www.hellboundhackers.org/
http://www.lockpicking101.com/
https://www.xploitworld.com/index.php
👉Join: @hacker_habesha🇪🇹
👉Join: @hacker_habesha🇪🇹
My security bookmarks collection.
All that things I need to pass OSCP, i think =)
Security Blogs
My Security OPML
Security Forums
http://securityoverride.org/forum/index.php
https://www.hackthissite.org/forums/index.php
https://www.ethicalhacker.net/forums/index.php
https://evilzone.org/
http://forum.antichat.ru/
https://forum.xeksec.com/
https://rdot.org/forum/
https://forum.zloy.bz/
https://forum.reverse4you.org/
https://rstforums.com/forum/
http://www.truehackers.ru/forum/index.php
http://garage4hackers.com/forum.php
https://www.hellboundhackers.org/
http://www.lockpicking101.com/
https://www.xploitworld.com/index.php
👉Join: @hacker_habesha🇪🇹
👉Join: @hacker_habesha🇪🇹
🤩3🙏1
🐧Linux Privileges Escalation Techniques (Basic to Advanced) Series
🔹Part 1: http://hacklido.com/blog/158
🔹Part 2: http://hacklido.com/blog/162
🔹Part 3: http://hacklido.com/blog/210
🔹Part 4: http://hacklido.com/blog/224
🔹Part 5: https://hacklido.com/blog/286
Join 👉@hacker_habesha
🔹Part 1: http://hacklido.com/blog/158
🔹Part 2: http://hacklido.com/blog/162
🔹Part 3: http://hacklido.com/blog/210
🔹Part 4: http://hacklido.com/blog/224
🔹Part 5: https://hacklido.com/blog/286
Join 👉@hacker_habesha
❤🔥2🎉1👌1
This media is not supported in your browser
VIEW IN TELEGRAM
**🚀 Exciting News! PicoCTF-Africa Online Training Series**
Hey everyone! 🌟
Hope you're all doing well! 🚀 I've got some exciting news - the PicoCTF-Africa online training series is kicking off on Jan 27! 🖥️ It's a fantastic opportunity for university undergrads & high schoolers interested in diving into the world of cybersecurity.
🔗 Register here: https://forms.gle/JhgPHzCVPWEx4uPNA
📅 Training starts: Jan 27
🌐 About:
🖥️Introduction to the cyber-Security concepts focusing on practical skills using a Capture The Flag (CTF) approach.
🖥️ Familiarizing with PicoCTF platform and getting ready for PicoCTF2024 competition.
📌 Poster Attached: Check out the poster and feel free to share this amazing opportunity with your friends and peers!
📢 Kindly share with your undergrad and high school colleagues! Let's make sure everyone gets a chance to join this cybersecurity adventure.
Got questions or need more info? Drop them here, and let's get ready for an awesome learning experience together! 🛡️✨
Hey everyone! 🌟
Hope you're all doing well! 🚀 I've got some exciting news - the PicoCTF-Africa online training series is kicking off on Jan 27! 🖥️ It's a fantastic opportunity for university undergrads & high schoolers interested in diving into the world of cybersecurity.
🔗 Register here: https://forms.gle/JhgPHzCVPWEx4uPNA
📅 Training starts: Jan 27
🌐 About:
🖥️Introduction to the cyber-Security concepts focusing on practical skills using a Capture The Flag (CTF) approach.
🖥️ Familiarizing with PicoCTF platform and getting ready for PicoCTF2024 competition.
📌 Poster Attached: Check out the poster and feel free to share this amazing opportunity with your friends and peers!
📢 Kindly share with your undergrad and high school colleagues! Let's make sure everyone gets a chance to join this cybersecurity adventure.
Got questions or need more info? Drop them here, and let's get ready for an awesome learning experience together! 🛡️✨
🙏2👍1👏1👌1
Forwarded from The Hacker News
41% attacks bypass network security.
Defense-in-Depth isn't enough. Use AI-powered Cyber Threat Intelligence (CTI) and Breach & Attack Simulation (BAS) to test defenses against real-world attacks, uncover vulnerabilities.
Read to find the key: https://thehackernews.com/2024/01/perfecting-defense-in-depth-strategy.html
Defense-in-Depth isn't enough. Use AI-powered Cyber Threat Intelligence (CTI) and Breach & Attack Simulation (BAS) to test defenses against real-world attacks, uncover vulnerabilities.
Read to find the key: https://thehackernews.com/2024/01/perfecting-defense-in-depth-strategy.html
❤1
📋Cyber Security Periodic Table
🔖#infosec #cybersecurity #hacking #pentesting #security
👉Join: @hacker_habesha
🔖#infosec #cybersecurity #hacking #pentesting #security
👉Join: @hacker_habesha
❤2🔥1👌1
This media is not supported in your browser
VIEW IN TELEGRAM
🗝Plaintext vs Encoding vs Hashing vs Encryption
🔖#infosec #cybersecurity #hacking #pentesting #security
👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹
🔖#infosec #cybersecurity #hacking #pentesting #security
👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹
🔥2👏1👌1
🧬Popular HTTP Request Methods for Log Analysis
🔖#infosec #cybersecurity #hacking #pentesting #security
👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹
🔖#infosec #cybersecurity #hacking #pentesting #security
👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹
👍2👏1👌1
🎣Social Engineering Attacks
🔖#infosec #cybersecurity #hacking #pentesting #security
👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹
🔖#infosec #cybersecurity #hacking #pentesting #security
👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹
👍2🤩1👌1
🖥 100 Web Vulnerabilities, categorized into various types : 😀
⚡️ Injection Vulnerabilities:
⚡️ Broken Authentication and Session Management:
⚡️ Sensitive Data Exposure:
⚡️ Security Misconfiguration:
⚡️ XML-Related Vulnerabilities:
⚡️ Broken Access Control:
⚡️ Insecure Deserialization:
⚡️ API Security Issues:
⚡️ Insecure Communication:
⚡️ Client-Side Vulnerabilities:
⚡️ Denial of Service (DoS):
⚡️ Other Web Vulnerabilities:
⚡️ Mobile Web Vulnerabilities:
⚡️ IoT Web Vulnerabilities:
⚡️ Web of Things (WoT) Vulnerabilities:
⚡️ Authentication Bypass:
⚡️ Server-Side Request Forgery (SSRF):
⚡️ Content Spoofing:
⚡️ Business Logic Flaws:
⚡️ Zero-Day Vulnerabilities:
👉Join: @hacker_habesha🇪🇹
👉Join: @hacker_habesha🇪🇹
⚡️ Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)
⚡️ Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse
⚡️ Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling
⚡️ Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration
⚡️ XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb
⚡️ Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control
⚡️ Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection
⚡️ API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation
⚡️ Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols
⚡️ Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues
⚡️ Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service
⚡️ Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse
⚡️ Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering
⚡️ IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities
⚡️ Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues
⚡️ Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass
⚡️ Server-Side Request Forgery (SSRF):
87. Blind SSR
88. Time-Based Blind SSRF
⚡️ Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass
⚡️ Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws
⚡️ Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits
👉Join: @hacker_habesha🇪🇹
👉Join: @hacker_habesha🇪🇹
👍6⚡1🔥1👌1