GeekCode
797 subscribers
452 photos
3 videos
7 files
942 links
๐ŸCyber Security โค๏ธ
๐ŸHacking Resources ๐Ÿ‘จโ€๐Ÿ’ป

Providing knowledge to people's๐Ÿฅ€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...๐Ÿ™‚๐Ÿ™‚

๐Ÿ“ฐPromotion/Query - @geekcodevipbot
Download Telegram
โŒจ Curriculum for Information Security Specialists

A hands-on curriculum to become a successful cybersecurity engineer based on roles such as Pentest, AppSec, Cloud Security, DevSecOps, etc. Includes free and paid resources, tools and concepts.

โบ Link to GitHub

@geekcode ๐Ÿ˜ˆ
This media is not supported in your browser
VIEW IN TELEGRAM
GeekCode pinned a photo
Open Source cyber security tools for professionals ๐ŸŽƒ

1. Zeek: https://zeek.org/
Network Security Monitoring

2. ClamAV:
https://www.clamav.net/
Antivirus

3. OpenVAS:
https://www.openvas.org/
Vulnerability Scanner

4. TheHive:
https://lnkd.in/e7aVCRUZ
Incident Response

5. PFSense:
https://www.pfsense.org/
Security appliance (firewall/VPN/router)

6. Elastic:
https://www.elastic.co/de/
Analytics

7. Osquery:
https://www.osquery.io/
Endpoint visibility

8. Arkime:
https://arkime.com/
Packet capture and search

9. Wazuh:
https://wazuh.com/
XDR and SIEM

10. Alien Vault Ossim:
https://lnkd.in/eShQt29h
SIEM

11. Velociraptor:
https://lnkd.in/eYehEaNa
Forensic and IR

12. MISP project:
https://lnkd.in/emaSrT57
Information sharing and Threat Intelligence

13. Kali:
https://www.kali.org/
Security OS

14. Parrot:
https://www.parrotsec.org/
Security OS

15. OpenIAM:
https://www.openiam.com/
IAM

16. Yara:
https://lnkd.in/eEJegEak
Patterns

17. Wireguard:
https://www.wireguard.com/
VPN

18. OSSEC:
https://www.ossec.net/
HIDS

19. Suricata:
https://suricata.io/
IDS/IPS

20. Shuffler:
https://shuffler.io/
SOAR


21. Phish Report: https://phish.report/
Anti Phishing

22. Graylog: https://lnkd.in/eAFuUmuw
Logmanagement

23. Trivy: https://lnkd.in/e7JxXStY
DevOps/IaC Scanning

24. OpenEDR: https://openedr.com/
EDR

25. Metasploit: https://lnkd.in/e4ECX-py
Pentest

26. NMAP: https://nmap.org/

Share & Support Us โค๏ธ

@geekcode ๐Ÿ˜ˆ
๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Roadmap for Cybersecurity ๐Ÿ‘พ

@geekcode ๐Ÿ˜ˆ
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
โŒจ๏ธ Google CTF: Skills Repository

Job sets along with Google CTF solutions between 2017 and 2023
.

โบ Link to CTF

#CTF #geeks

@geekcode ๐Ÿ˜ˆ
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿค“WhatWeb - WhatWeb's next generation web scanner identifies websites.
Its purpose is to answer the question: โ€œWhat kind of website is this?โ€

WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistical/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1,800 plugins, each of which recognizes something different .


WhatWeb also identifies version numbers, email addresses, account IDs, web platform modules, SQL errors, and more.

๐Ÿ”—GitHub

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
๐Ÿ˜ˆ Hacker IntelBroker claims to have stolen Apple source codes

IntelBroker on BreachForums claimed to have stolen the source code for several internal tools from Apple.

๐Ÿ” According to the report, โ€œApple.com suffered a data breach in June 2024,โ€ which led to the disclosure of information. IntelBroker claims that as a result it has obtained the source code for the following internal company tools: AppleConnect-SSO, Apple-HWE-Confluence-Advanced and AppleMacroPlugin.

Little is known about Apple-HWE-Confluence-Advanced and AppleMacroPlugin. But AppleConnect-SSO is an authentication system that allows you to access certain applications on the Apple network. This system is known to be integrated with the Directory Services database to provide secure access to internal resources.


@cyberagents
This media is not supported in your browser
VIEW IN TELEGRAM
Monitor file system changes using fsmon
โ–ช๏ธsupports Linux, iOS, OS X, Android
โ–ช๏ธidentify when are binaries loaded (root)
โ–ช๏ธget dropped payloads (root)
โ–ช๏ธidentify when are which files opened at app's runtime (db, txt, log, temp...) (non-root)

https://www.mobile-hacker.com/2024/06/24/monitoring-android-file-system-with-fsmon/

@geekcode