Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ
If you need to discover technologies used by websites,
Try Webanalyze, a port of Wappalyzer in Go that allows you to test a large list of hosts at once.
https://github.com/rverton/webanalyze
@RobinVerton
#OSINT #intelligence #investigation #infosec #CTI #cybersecurity #tool #reconnaissance
Try Webanalyze, a port of Wappalyzer in Go that allows you to test a large list of hosts at once.
https://github.com/rverton/webanalyze
@RobinVerton
#OSINT #intelligence #investigation #infosec #CTI #cybersecurity #tool #reconnaissance
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
How to analyze and Decrypt hash values? | Hashing tutorial in cyber security | Educational Purposes
video link : https://youtu.be/LBStRFbiXOI
like share subscribe support our channel
credits : @cybertrickzone
video link : https://youtu.be/LBStRFbiXOI
like share subscribe support our channel
credits : @cybertrickzone
YouTube
How to analyze and Decrypt hash values? | Hashing tutorial in cyber security | Educational Purposes
How to analyze and Decrypt hash values? | Hashing tutorial in cyber security | Educational Purposes??
In this video i m going to teach how to decrypt a hash values online with using pc or smartphone. If you have any suggestions query regarding to this video.โฆ
In this video i m going to teach how to decrypt a hash values online with using pc or smartphone. If you have any suggestions query regarding to this video.โฆ
Forwarded from OSINT AMBITION (Dheeraj Yadav)
New Blog in OSINT Ambition Publication
How to find unprotected databases with Netlas.io?
https://publication.osintambition.org/how-to-find-unprotected-databases-with-netlas-io-2bf186e9fc2d
Join @osintambition for more.
#osint #cybersec #infosec #cybersecurity #database #dorking #pentest #bugbounty #penetrationtesting
How to find unprotected databases with Netlas.io?
https://publication.osintambition.org/how-to-find-unprotected-databases-with-netlas-io-2bf186e9fc2d
Join @osintambition for more.
#osint #cybersec #infosec #cybersecurity #database #dorking #pentest #bugbounty #penetrationtesting
Medium
How to find unprotected databases with Netlas.io?
Databases accessible from the Internet are an attractive target for attackers. How to make sure you are invulnerable?
Forwarded from Cybertix
๐๐ฒ๐ฎ๐ฟ๐ป๐๐๐ฟ๐ฝ๐๐๐ถ๐๐ฒ ๐๐ฎ๐บ๐ฑ๐ฎ ๐ฅ๐
๐๐ถ๐ป๐ธ: https://youtu.be/-EPQwO7xunQ?si=A3TDQHt34rJCq9FJ
Make sure your Like & Subscribe to our YouTube Channelโบ๏ธโจ
๐๐ถ๐ป๐ธ: https://youtu.be/-EPQwO7xunQ?si=A3TDQHt34rJCq9FJ
Make sure your Like & Subscribe to our YouTube Channelโบ๏ธโจ
YouTube
04 Understanding Burpsuite Bamda ๐คฏ๐ฅ #cybersecurity #bounty #money #freelancing #technology #hacker
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
https://www.linkedin.com/posts/shashankmaurya_nasa-bugbounty-halloffame-activity-7150151229027868677-R6RX?utm_source=share&utm_medium=member_android
Show Love & Support Brother's On LinkedIn โค๏ธ
Show Love & Support Brother's On LinkedIn โค๏ธ
Linkedin
Shashank Maurya on LinkedIn: #nasa #bugbounty #halloffame #linkedinlearning #bounty #cybersecurityโฆ
Hall Of Fame in NASA
NASA - National Aeronautics and Space Administration , Bugcrowd LinkedIn CyberDost
#nasa #bugbounty #halloffame #linkedinlearningโฆ
NASA - National Aeronautics and Space Administration , Bugcrowd LinkedIn CyberDost
#nasa #bugbounty #halloffame #linkedinlearningโฆ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐
๐ฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ฏ 13. Kali: https://www.kali.org/ Security OS
๐ฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ฏ 24. OpenEDR: https://openedr.com/ EDR
๐ฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi
#cybersecurity #cybersecuritytools #opensource
๐ฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ฏ 13. Kali: https://www.kali.org/ Security OS
๐ฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ฏ 24. OpenEDR: https://openedr.com/ EDR
๐ฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi
#cybersecurity #cybersecuritytools #opensource
Zeek
The Zeek Network Security Monitor
Zeek (formerly Bro) is the worldโs leading platform for network security monitoring. Flexible, open source, and powered by defenders.
Forwarded from Cybertix
๐๐๐ ๐๐ค๐จ๐ฉ ๐ผ๐๐ซ. ๐ฟ๐ค๐ข๐๐๐ฃ ๐๐ฃ๐ช๐ข๐๐ง๐๐ฉ๐๐ค๐ฃ ๐๐ค๐ค๐ก ๐ฑ๐ฅ
๐๐ค๐ค๐ก ๐๐ฎ: Sanjai Kumar
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ.Efficiency Test with other Tools. โก
๐ฎ.Configuring with API Keys๐
๐ฏ. Notifying the Domain Enumeration ๐
๐๐๐ฉ๐๐ ๐๐ค๐ฌ, ๐ฉ๐ค ๐๐๐ฉ ๐ข๐ค๐ง๐ ๐๐๐ง๐๐๐ฉ๐จ๐ค๐๐ป
๐๐๐ฃ๐ : https://youtu.be/lWPukbNMl70?si=k6_j6byPCrZDG8Zc
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐นโบ๏ธ
๐๐ค๐ค๐ก ๐๐ฎ: Sanjai Kumar
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ.Efficiency Test with other Tools. โก
๐ฎ.Configuring with API Keys๐
๐ฏ. Notifying the Domain Enumeration ๐
๐๐๐ฉ๐๐ ๐๐ค๐ฌ, ๐ฉ๐ค ๐๐๐ฉ ๐ข๐ค๐ง๐ ๐๐๐ง๐๐๐ฉ๐จ๐ค๐๐ป
๐๐๐ฃ๐ : https://youtu.be/lWPukbNMl70?si=k6_j6byPCrZDG8Zc
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐นโบ๏ธ
YouTube
The Most Advance Domain Enumeration ๐ฑ#bugbounty #bugbountytips #cybersecurity #automation #hacking
๐๐๐๐๐
๐ค๐๐๐๐๐๐ค๐:
https://github.com/sanjai-AK47/Subdominator
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
https://github.com/sanjai-AK47/Subdominator
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
Forwarded from Cybertix
๐๐บ๐ฝ๐ฟ๐ผ๐ฝ๐ฒ๐ฟ ๐๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ๐ป๐๐ฟ๐ผ๐น ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ ๐
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฌ๐ฌ๐ฌ$
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/PRwUK00Uhsk?si=ifCw2dnJhBD3QgOr
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฌ๐ฌ๐ฌ$
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/PRwUK00Uhsk?si=ifCw2dnJhBD3QgOr
YouTube
Improper Access Control in Gitlab | Got Bounty of $ 3,000 ๐ฑ#bugbounty #bugbountytips #cybersecurity
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:
https://hackerone.com/reports/819821
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
https://hackerone.com/reports/819821
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
Forwarded from Cybertix
๐๐
๐ฝ๐น๐ผ๐ถ๐๐ถ๐ป๐ด ๐จ๐ป๐ธ๐ป๐ผ๐๐ป ๐๐ฉ๐'๐
Tool Link given in Description
Please Like & Subscribe to our YouTube Channel.
๐๐ถ๐ป๐ธ: https://youtu.be/Z-OBQWbqIoM?si=eph9sSISKRGy2XGk
Tool Link given in Description
Please Like & Subscribe to our YouTube Channel.
๐๐ถ๐ป๐ธ: https://youtu.be/Z-OBQWbqIoM?si=eph9sSISKRGy2XGk
YouTube
Exploiting Unknown CVE's with PoC Bomber๐ฒ#bugbounty #bugbountytips #cybersecurity #bollywood #hacker
๐๐๐๐พ ๐ฉ๐ค๐๐๐๐ง ๐๐๐ค๐:
https://github.com/tr0uble-mAker/POC-bomber
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
https://github.com/tr0uble-mAker/POC-bomber
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
Forwarded from Cybertix
๐๐๐๐ผ๐บ๐ฎ๐๐ถ๐ป๐ด ๐ซ๐ฆ๐ฆ ๐๐ต๐ฟ๐ผ๐๐ด๐ต ๐ข๐ป๐ฒ ๐๐ถ๐ป๐ฒ๐ฟ ๐ฆ๐ฐ๐ฟ๐ถ๐ฝ๐ - ๐๐๐ฏ๐ฒ๐ฟ๐ซ๐ฆ
๐โจ
๐๐ถ๐ป๐ธ: https://youtu.be/p4V-4N1oSaA?si=tSBhZ3ijzChRd0wP
๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น๐
๐โจ
๐๐ถ๐ป๐ธ: https://youtu.be/p4V-4N1oSaA?si=tSBhZ3ijzChRd0wP
๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น๐
YouTube
XSS Automation ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker #short
๐๐ช๐ฎ๐๐๐๐๐บ ๐ฎ๐๐๐๐๐ ๐๐๐ฃ๐:
https://github.com/thecybertix/CyberXS
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
https://github.com/thecybertix/CyberXS
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ