Apache Log4j2 vulnerability Patch
#vulnerability #Apache #Log4j2 #RCE #0day #0-Day
#Log4jPatch #CVE-2021-44228 #Hacking #ZeroDay
https://reconshell.com/apache-log4j2-vulnerability-patch/
#vulnerability #Apache #Log4j2 #RCE #0day #0-Day
#Log4jPatch #CVE-2021-44228 #Hacking #ZeroDay
https://reconshell.com/apache-log4j2-vulnerability-patch/
Best Docker Resources
#Docker #DockerHub #DockerResources #containers
https://reconshell.com/best-docker-resources/
#Docker #DockerHub #DockerResources #containers
https://reconshell.com/best-docker-resources/
Penetration Testing Tools, ML and Linux Tutorials
Best Docker Resources - Penetration Testing Tools, ML and Linux Tutorials
Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. Consisting of Docker Engine, a portable, lightweight
Cloud DevSecOps Learning
#CloudSecurity #Cloud #AWS #DevOps #DevSecOps
https://reconshell.com/cloud-devsecops-learning/
#CloudSecurity #Cloud #AWS #DevOps #DevSecOps
https://reconshell.com/cloud-devsecops-learning/
Cyber security Blue Team
#Cyber #Security #BlueTeam #ThreatIntelligence
#Phishing #Honeypots #Threathunting #Hacking
https://reconshell.com/cyber-security-blue-team/
#Cyber #Security #BlueTeam #ThreatIntelligence
#Phishing #Honeypots #Threathunting #Hacking
https://reconshell.com/cyber-security-blue-team/
Penetration Testing Tools, ML and Linux Tutorials
Cyber security Blue Team - Penetration Testing Tools, ML and Linux Tutorials
Cybersecurity blue teams are groups of individuals who identify security flaws in information technology systems, verify the effectiveness of security
FREE Artificial Intelligence Resources
#ArtificialIntelligence #DataScience #AI
#MachineLearning #ML #DeepLearning
https://reconshell.com/free-artificial-intelligence-resources/
#ArtificialIntelligence #DataScience #AI
#MachineLearning #ML #DeepLearning
https://reconshell.com/free-artificial-intelligence-resources/
Penetration Testing Tools, ML and Linux Tutorials
FREE Artificial Intelligence Resources - Penetration Testing Tools, ML and Linux Tutorials
Artificial Intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. The
Computer Forensics Resources
#DockerForensics #Steganography #ComputerForensics #DFIR
#MemoryForensics #NetworkForensics #MobileForensics
https://reconshell.com/computer-forensics-resources/
#DockerForensics #Steganography #ComputerForensics #DFIR
#MemoryForensics #NetworkForensics #MobileForensics
https://reconshell.com/computer-forensics-resources/
Penetration Testing Tools, ML and Linux Tutorials
Computer Forensics Resources - Penetration Testing Tools, ML and Linux Tutorials
The best tools and resources for forensic analysis. Curated list of awesome free forensic analysis tools and resources. Distributions Name Descriptions
Awesome Linux Rootkits
#Linux #Rootkit #BootKit #Kernel
https://reconshell.com/awesome-linux-rootkits/
#Linux #Rootkit #BootKit #Kernel
https://reconshell.com/awesome-linux-rootkits/
Penetration Testing Tools, ML and Linux Tutorials
Awesome Linux Rootkits - Penetration Testing Tools, ML and Linux Tutorials
Best Linux Rootkits Resources user mode rootkits https://github.com/mempodippy/vlanyLinux LD_PRELOAD rootkit (x86 and x86_64 architectures)
Blockchain Papers
#Blockchain #Papers #CRYPTO #Network
#EUROCRYPT #Cryptography #Security
https://reconshell.com/blockchain-papers/
#Blockchain #Papers #CRYPTO #Network
#EUROCRYPT #Cryptography #Security
https://reconshell.com/blockchain-papers/
Penetration Testing Tools, ML and Linux Tutorials
Blockchain Papers - Penetration Testing Tools, ML and Linux Tutorials
The existing blockchain-related academic papers. All papers are sorted according to the conference and published year. Welcome developers or researchers to
Security Hardening Resources
#Virtualization #Kerberos #DNS #NetworSecurity
#CloudComputingSecurity #SecurityHardening
#CyberSecurity #Hacking #AppSec #InfoSec
https://reconshell.com/security-hardening-resources/
#Virtualization #Kerberos #DNS #NetworSecurity
#CloudComputingSecurity #SecurityHardening
#CyberSecurity #Hacking #AppSec #InfoSec
https://reconshell.com/security-hardening-resources/
Penetration Testing Tools, ML and Linux Tutorials
Security Hardening Resources - Penetration Testing Tools, ML and Linux Tutorials
A collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources. This is work in progress: please
Windows AD privilege escalation
#PrivilegeEscalation #CVE-2021-42278 #Scanning
#Exploitation #Windows #Hacking #AD #RedTeam
https://reconshell.com/windows-ad-privilege-escalation/
#PrivilegeEscalation #CVE-2021-42278 #Scanning
#Exploitation #Windows #Hacking #AD #RedTeam
https://reconshell.com/windows-ad-privilege-escalation/
Microsoft Office Word Exploit
#MSHTML #RCE #Exploit #Microsoft
#CVE-2021-40444 #RemoteCodeExecution
https://reconshell.com/microsoft-word-exploit/
#MSHTML #RCE #Exploit #Microsoft
#CVE-2021-40444 #RemoteCodeExecution
https://reconshell.com/microsoft-word-exploit/
Penetration Testing Tools, ML and Linux Tutorials
Microsoft Office Word Exploit - Penetration Testing Tools, ML and Linux Tutorials
EXPLOIT TO USE IN METASPLOIT, ALLOWS ATTACKERS TO GET AN REMOTE CODE EXECUTION THROUGH MICROSOFT OFFICE WORD BY INJECTING MALICIOUS CODE IN THE FILE
vCenter Server arbitrary file upload vulnerability
#vCenter #VMware #FileUpload #CVE-2021-22005
#security #CVSSv3 #CVEs #Hacking #infosec
#vulnerability #AppSec #zeroday #0-day
https://reconshell.com/vcenter-server-arbitrary-file-upload-vulnerability/
#vCenter #VMware #FileUpload #CVE-2021-22005
#security #CVSSv3 #CVEs #Hacking #infosec
#vulnerability #AppSec #zeroday #0-day
https://reconshell.com/vcenter-server-arbitrary-file-upload-vulnerability/
Penetration Testing Tools, ML and Linux Tutorials
vCenter Server arbitrary file upload vulnerability - Penetration Testing Tools, ML and Linux Tutorials
Among them, the most serious vulnerability is the arbitrary file upload vulnerability in vCenter Server (CVE-2021-22005), which exists in the analysis service