Forwarded from ๅฉro ็ชCracker
geeMail User Finder
A simple tool to check the validity of a Gmail account. You can check a single email or a list of emails.
https://github.com/dievus/geeMailUserFinder
Creator
twitter.com/joehelle
#python #opensource #gmail #enumeration
A simple tool to check the validity of a Gmail account. You can check a single email or a list of emails.
https://github.com/dievus/geeMailUserFinder
Creator
twitter.com/joehelle
#python #opensource #gmail #enumeration
EyeRat: A tool for building remote access trojan
Whenever the user has an instruction to send to RAT, the user's application sends a special command to RAT such as: Tpict (to take a photo from the camera).
๐ Read
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #opensource #linux #rat #trojan #tools #kali
@YourJiniNews
Whenever the user has an instruction to send to RAT, the user's application sends a special command to RAT such as: Tpict (to take a photo from the camera).
๐ Read
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #opensource #linux #rat #trojan #tools #kali
@YourJiniNews
GitHub
GitHub - AdolfMacro/eyeRat: A tool for building remote access trojan.
A tool for building remote access trojan. Contribute to AdolfMacro/eyeRat development by creating an account on GitHub.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐
๐ฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ฏ 13. Kali: https://www.kali.org/ Security OS
๐ฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ฏ 24. OpenEDR: https://openedr.com/ EDR
๐ฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi
#cybersecurity #cybersecuritytools #opensource
๐ฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ฏ 13. Kali: https://www.kali.org/ Security OS
๐ฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ฏ 24. OpenEDR: https://openedr.com/ EDR
๐ฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi
#cybersecurity #cybersecuritytools #opensource
Zeek
The Zeek Network Security Monitor
Zeek (formerly Bro) is the worldโs leading platform for network security monitoring. Flexible, open source, and powered by defenders.
Forwarded from Jeetendra Joshi
## Test For SQL Injection
[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL
Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r
#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL
Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r
#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
X (formerly Twitter)
Jeetendra Joshi ๐ฎ๐ณ (@SH3lLH4CK3R) on X
๐๐Bug Hunter | Smart Contract Security | CTF Player | Exploit Developer | Python Developer | Web Application Security | Solidity Developer |