Web Attack Cheat Sheet
#Enumeration #Bruteforcing #Scanning #XSS
#Vulnerabilities #SQLInjection #Payloads
#Pentest #SSRF #Deserialization #ReverseShell
https://reconshell.com/web-attack-cheat-sheet/
#Enumeration #Bruteforcing #Scanning #XSS
#Vulnerabilities #SQLInjection #Payloads
#Pentest #SSRF #Deserialization #ReverseShell
https://reconshell.com/web-attack-cheat-sheet/
Penetration Testing Tools, ML and Linux Tutorials
Web Attack Cheat Sheet - Penetration Testing Tools, ML and Linux Tutorials
https://github.com/projectdiscovery/subfinder# subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online
Dot NET Core interview questions
#DotNET #.Net #Microsoft #DotNETcore
https://reconshell.com/dot-net-core-interview-questions/
#DotNET #.Net #Microsoft #DotNETcore
https://reconshell.com/dot-net-core-interview-questions/
Penetration Testing Tools, ML and Linux Tutorials
Dot NET Core interview questions - Penetration Testing Tools, ML and Linux Tutorials
The .NET Core platform is a new .NET stack that is optimized for open source development and agile delivery on NuGet.
Introduction to Docker
#Docker #DockerHub #Containers #Linux
#DockerImages #Dockernetworking #Dockerfile
https://reconshell.com/introduction-to-docker/
#Docker #DockerHub #Containers #Linux
#DockerImages #Dockernetworking #Dockerfile
https://reconshell.com/introduction-to-docker/
Penetration Testing Tools, ML and Linux Tutorials
Introduction to Docker - Penetration Testing Tools, ML and Linux Tutorials
It is more likely than not that Docker and containers are going to be part of your IT career in one way or another.
BugBounty Openvpn socks
#proxychains #BBRF #SOCKS5 #BurpSuite
#BugBounty #Openvpn #proxy #InfoSec
https://reconshell.com/bugbounty-openvpn-socks/
#proxychains #BBRF #SOCKS5 #BurpSuite
#BugBounty #Openvpn #proxy #InfoSec
https://reconshell.com/bugbounty-openvpn-socks/
Penetration Testing Tools, ML and Linux Tutorials
BugBounty Openvpn socks - Penetration Testing Tools, ML and Linux Tutorials
This project uses Docker to run multiple VPN tunnels simultaneously from the same machine, and exposes a SOCKS proxy for each separate VPN connection.
Awesome Linux Containers
#Linux #Containers #DevOps #Kubernetes
#Docker #LinuxOS #Hypervisors #OpenVZ
#virtualization
https://reconshell.com/awesome-linux-containers/
#Linux #Containers #DevOps #Kubernetes
#Docker #LinuxOS #Hypervisors #OpenVZ
#virtualization
https://reconshell.com/awesome-linux-containers/
Penetration Testing Tools, ML and Linux Tutorials
Awesome Linux Containers - Penetration Testing Tools, ML and Linux Tutorials
Things are better. For example, most modern container technologies can make use of Linux's built-in security tools such
Awesome PHP
A curated list of amazingly awesome PHP libraries, resources and shiny things.
#PHP #Frameworks #WebDevelopment
#templates #HTML #Programming
#development #Libraries #PHPCode
https://reconshell.com/awesome-php/
A curated list of amazingly awesome PHP libraries, resources and shiny things.
#PHP #Frameworks #WebDevelopment
#templates #HTML #Programming
#development #Libraries #PHPCode
https://reconshell.com/awesome-php/
Penetration Testing Tools, ML and Linux Tutorials
Awesome PHP - Penetration Testing Tools, ML and Linux Tutorials
Libraries for performing static analysis of PHP code.
DNS amplification ddos attack tool
#DDoS #DoS #DDoSattack #DNS
https://reconshell.com/dns-amplification-ddos-attack-tool/
#DDoS #DoS #DDoSattack #DNS
https://reconshell.com/dns-amplification-ddos-attack-tool/
Penetration Testing Tools, ML and Linux Tutorials
DNS amplification ddos attack tool - Penetration Testing Tools, ML and Linux Tutorials
Brutally effective DNS amplification ddos attack tool, will cripple a target machine from a single host.
Awesome Oneliner Bug Bounty
#BugBounty #BugHunter #XSS #Hacker
#SubdomainBruteforce #SubdomainsTakeOver
https://reconshell.com/awesome-one-liner-bug-bounty/
#BugBounty #BugHunter #XSS #Hacker
#SubdomainBruteforce #SubdomainsTakeOver
https://reconshell.com/awesome-one-liner-bug-bounty/
MySQL – RDBMS Interview Questions
#Database #RDBMS #MySQL #SQL
https://reconshell.com/mysql-rdbms-interview-questions/
#Database #RDBMS #MySQL #SQL
https://reconshell.com/mysql-rdbms-interview-questions/
Penetration Testing Tools, ML and Linux Tutorials
MySQL - RDBMS Interview Questions - Penetration Testing Tools, ML and Linux Tutorials
A database model represents the relationship between one or more databases. The relationship is known as the relational database model. It is an extension of
Awesome Kubernetes Security
#Kubernetes #vulnerable #K8s #Security
#Exploit #CVEs #KubeCon #Linux
https://reconshell.com/awesome-kubernetes-security/
#Kubernetes #vulnerable #K8s #Security
#Exploit #CVEs #KubeCon #Linux
https://reconshell.com/awesome-kubernetes-security/
Penetration Testing Tools, ML and Linux Tutorials
Awesome Kubernetes Security - Penetration Testing Tools, ML and Linux Tutorials
To understand about Kubernetes Security you first need to understand the basics of how Kubernetes works and all the components involved. Here's some links and
Installer File TakeOver
#PrivilegeEscalation #WindowsExploit #Hacking
#AppSec #InfoSec #CVEs #Windows #security #RedTeam
https://reconshell.com/installer-file-takeover/
#PrivilegeEscalation #WindowsExploit #Hacking
#AppSec #InfoSec #CVEs #Windows #security #RedTeam
https://reconshell.com/installer-file-takeover/
Penetration Testing Tools, ML and Linux Tutorials
Installer File TakeOver - Penetration Testing Tools, ML and Linux Tutorials
I have also made sure that the proof of concept is extremely reliable and doesn't require anything, so it works in every attempt. The proof of concept
Awesome Offensive Security Resources
#OffensiveSecurity #ReverseEngineering #PenetrationTesting
#OSCP #OWASP #EthicalHacking #PrivilegeEscalation
#PentestLab #ExploitDevelopment #SocialEngineering #Malware
https://reconshell.com/offensive-resources/
#OffensiveSecurity #ReverseEngineering #PenetrationTesting
#OSCP #OWASP #EthicalHacking #PrivilegeEscalation
#PentestLab #ExploitDevelopment #SocialEngineering #Malware
https://reconshell.com/offensive-resources/
Penetration Testing Tools, ML and Linux Tutorials
Offensive Resources - Penetration Testing Tools, ML and Linux Tutorials
Offensive-Resources V2 A Huge Learning Resources with Labs For Offensive Security Players. What is new in V2 ? New Labs, Courses & Books Have been added
InfoSec Black Friday
#BlackFriday #InfoSec #Hacking #OSINT
#BurpBounty #CyberMonday #Udemy
https://reconshell.com/infosec-black-friday/
#BlackFriday #InfoSec #Hacking #OSINT
#BurpBounty #CyberMonday #Udemy
https://reconshell.com/infosec-black-friday/
Penetration Testing Tools, ML and Linux Tutorials
InfoSec Black Friday - Penetration Testing Tools, ML and Linux Tutorials
All the deals for InfoSec related software/tools this Black Friday / Cyber Monday, for all the hackers that saved $$$ during lockdowns.
Jira Security Auditing Tool
#Jira #Security #BugBounty #BugHunters
#Vulnerability #scanner #Hacking
https://reconshell.com/jira-security-auditing-tool/
#Jira #Security #BugBounty #BugHunters
#Vulnerability #scanner #Hacking
https://reconshell.com/jira-security-auditing-tool/
Penetration Testing Tools, ML and Linux Tutorials
Jira Security Auditing Tool - Penetration Testing Tools, ML and Linux Tutorials
Jira-Lens is a Python Based vulnerability Scanner for JIRA. Jira is a proprietary issue tracking product developed by Atlassian that allows bug
Awesome AWS Security
#AWS #Security #Exploit #Hacking #CTFs
#Exploitation #InfoSec #AppSec
https://reconshell.com/awesome-aws-security/
#AWS #Security #Exploit #Hacking #CTFs
#Exploitation #InfoSec #AppSec
https://reconshell.com/awesome-aws-security/
Installer File TakeOver
#PrivilegeEscalation #WindowsExploit #Hacking
#AppSec #InfoSec #CVEs #Windows #security #RedTeam
https://reconshell.com/installer-file-takeover/
#PrivilegeEscalation #WindowsExploit #Hacking
#AppSec #InfoSec #CVEs #Windows #security #RedTeam
https://reconshell.com/installer-file-takeover/
Penetration Testing Tools, ML and Linux Tutorials
Installer File TakeOver - Penetration Testing Tools, ML and Linux Tutorials
I have also made sure that the proof of concept is extremely reliable and doesn't require anything, so it works in every attempt. The proof of concept