Microsoft Office Word Exploit
#MSHTML #RCE #Exploit #Microsoft
#CVE-2021-40444 #RemoteCodeExecution
https://reconshell.com/microsoft-word-exploit/
#MSHTML #RCE #Exploit #Microsoft
#CVE-2021-40444 #RemoteCodeExecution
https://reconshell.com/microsoft-word-exploit/
Penetration Testing Tools, ML and Linux Tutorials
Microsoft Office Word Exploit - Penetration Testing Tools, ML and Linux Tutorials
EXPLOIT TO USE IN METASPLOIT, ALLOWS ATTACKERS TO GET AN REMOTE CODE EXECUTION THROUGH MICROSOFT OFFICE WORD BY INJECTING MALICIOUS CODE IN THE FILE
vCenter Server arbitrary file upload vulnerability
#vCenter #VMware #FileUpload #CVE-2021-22005
#security #CVSSv3 #CVEs #Hacking #infosec
#vulnerability #AppSec #zeroday #0-day
https://reconshell.com/vcenter-server-arbitrary-file-upload-vulnerability/
#vCenter #VMware #FileUpload #CVE-2021-22005
#security #CVSSv3 #CVEs #Hacking #infosec
#vulnerability #AppSec #zeroday #0-day
https://reconshell.com/vcenter-server-arbitrary-file-upload-vulnerability/
Penetration Testing Tools, ML and Linux Tutorials
vCenter Server arbitrary file upload vulnerability - Penetration Testing Tools, ML and Linux Tutorials
Among them, the most serious vulnerability is the arbitrary file upload vulnerability in vCenter Server (CVE-2021-22005), which exists in the analysis service
JNDI Exploit Kit
#JNDI #Exploit #Injection #ExploitKit
#Hacking #Payloads #BugBounty #InfoSec
https://reconshell.com/jndi-exploit-kit/
#JNDI #Exploit #Injection #ExploitKit
#Hacking #Payloads #BugBounty #InfoSec
https://reconshell.com/jndi-exploit-kit/
Penetration Testing Tools, ML and Linux Tutorials
JNDI Exploit Kit - Penetration Testing Tools, ML and Linux Tutorials
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and
Incident Response
#IncidentResponse #RedTeam #EvidenceCollection
#forensic #DigitalForensics #DFIR #IR #Security
https://reconshell.com/incident-response/
#IncidentResponse #RedTeam #EvidenceCollection
#forensic #DigitalForensics #DFIR #IR #Security
https://reconshell.com/incident-response/
Penetration Testing Tools, ML and Linux Tutorials
Incident Response - Penetration Testing Tools, ML and Linux Tutorials
A curated list of tools and resources for security incident response, aimed to help security analysts and DFIR teams.
Best Artificial intelligence papers
#ArtificialIntelligence #AI #MachineLearning
#DataScience #ML #DeepLearning #DataAnalyst
https://reconshell.com/best-artificial-intelligence-papers/
#ArtificialIntelligence #AI #MachineLearning
#DataScience #ML #DeepLearning #DataAnalyst
https://reconshell.com/best-artificial-intelligence-papers/
Penetration Testing Tools, ML and Linux Tutorials
Best Artificial intelligence papers - Penetration Testing Tools, ML and Linux Tutorials
While the world is still recovering, research hasn't slowed its frenetic pace, especially in the field of artificial intelligence. More, many important
Active Directory certificate abuse
#ActiveDirectory #Microsoft #PrivilegeEscalation
#vulnerability #Hacking #Infosec #Appsec #AD
https://reconshell.com/active-directory-certificate-abuse/
#ActiveDirectory #Microsoft #PrivilegeEscalation
#vulnerability #Hacking #Infosec #Appsec #AD
https://reconshell.com/active-directory-certificate-abuse/
Penetration Testing Tools, ML and Linux Tutorials
Active Directory certificate abuse - Penetration Testing Tools, ML and Linux Tutorials
Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).
Cross Platform C2
#Medusa #C2 #Malware #SOCKS5 #shellcode #RAT
https://reconshell.com/medusa-cross-platform-c2/
#Medusa #C2 #Malware #SOCKS5 #shellcode #RAT
https://reconshell.com/medusa-cross-platform-c2/
Penetration Testing Tools, ML and Linux Tutorials
Medusa - Cross Platform C2 - Penetration Testing Tools, ML and Linux Tutorials
To install Medusa, you'll need Mythic installed on a remote computer. You can find installation instructions for Mythic at the Mythic project page.
DevOps metrics for kubernetes
#DevOps #Docker #k8s #Hacking
#topokube #kubernetes #Kube
https://reconshell.com/devops-metrics-for-kubernetes/
#DevOps #Docker #k8s #Hacking
#topokube #kubernetes #Kube
https://reconshell.com/devops-metrics-for-kubernetes/
Penetration Testing Tools, ML and Linux Tutorials
DevOps metrics for kubernetes - Penetration Testing Tools, ML and Linux Tutorials
Tracking deployment metrics for applications deployed to kubernetes.
Awesome Metasploit Collection
#Metasploit #msf #exploits #MetasploitFramework
https://reconshell.com/awesome-metasploit-collection/
#Metasploit #msf #exploits #MetasploitFramework
https://reconshell.com/awesome-metasploit-collection/
AWS Amplify Resources
#AWS #Amplify #Amazon #Hosting #Cloud
https://reconshell.com/aws-amplify-resources/
#AWS #Amplify #Amazon #Hosting #Cloud
https://reconshell.com/aws-amplify-resources/
Penetration Testing Tools, ML and Linux Tutorials
AWS Amplify Resources - Penetration Testing Tools, ML and Linux Tutorials
Awesome AWS Amplify curates the best AWS Amplify, tools, tutorials, articles and more. PRs are welcome! Workshops Serverless GraphQL API with AppSync and
Blockchain Security CTF and Writeups
#DeFi #Security #Hacking #Blockchain #CTF #Wargames
https://reconshell.com/blockchain-security-ctf-and-writeups/
#DeFi #Security #Hacking #Blockchain #CTF #Wargames
https://reconshell.com/blockchain-security-ctf-and-writeups/
Penetration Testing Tools, ML and Linux Tutorials
Blockchain Security CTF and Writeups - Penetration Testing Tools, ML and Linux Tutorials
A curated list of blockchain security Wargames, Challenges, and Capture the Flag (CTF) competitions and solution writeups.
Universal Command Line interface for SQL databases
#SQL #PostgreSQL #MySQL #SQLite3 #MicrosoftSQL
#psql #NoSQL #Database #usql #SQLdrivers
https://reconshell.com/universal-command-line-interface-for-sql-databases/
#SQL #PostgreSQL #MySQL #SQLite3 #MicrosoftSQL
#psql #NoSQL #Database #usql #SQLdrivers
https://reconshell.com/universal-command-line-interface-for-sql-databases/
Penetration Testing Tools, ML and Linux Tutorials
Universal Command Line interface for SQL databases - Penetration Testing Tools, ML and Linux Tutorials
usql is a universal command-line interface for PostgreSQL, MySQL, Oracle Database, SQLite3, Microsoft SQL Server, and many other databases including NoSQL and
Purple Team Framework and Lifecycle
#InformationSecurity #security #RedTeam
#Defensive #BlueTeam #C2 #Attack #Hack #APT
https://reconshell.com/purple-team-framework-and-lifecycle/
#InformationSecurity #security #RedTeam
#Defensive #BlueTeam #C2 #Attack #Hack #APT
https://reconshell.com/purple-team-framework-and-lifecycle/
Active Directory Exploitation Cheat Sheet
#Powersploit #Impacket #Mimikatz #BloodHound #AD
#Exploitation #ActiveDirectory #Enumeration #Hacking
#AppSec #Infosec #RemoteCodeExecution #Kerberoast
https://reconshell.com/active-directory-exploitation-cheat-sheet/
#Powersploit #Impacket #Mimikatz #BloodHound #AD
#Exploitation #ActiveDirectory #Enumeration #Hacking
#AppSec #Infosec #RemoteCodeExecution #Kerberoast
https://reconshell.com/active-directory-exploitation-cheat-sheet/
Efficient Linux at the Command Line
#Linux #CommandLine #Shell #Bash
https://reconshell.com/efficient-linux-at-the-command-line-ebook-free-download/
#Linux #CommandLine #Shell #Bash
https://reconshell.com/efficient-linux-at-the-command-line-ebook-free-download/
Incident Response Investigation System
#ReverseProxy #IncidentResponse #IR #IRIS
https://reconshell.com/incident-response-investigation-system/
#ReverseProxy #IncidentResponse #IR #IRIS
https://reconshell.com/incident-response-investigation-system/
Penetration Testing Tools, ML and Linux Tutorials
Incident Response Investigation System - Penetration Testing Tools, ML and Linux Tutorials
IRIS is a web collaborative platform for incident response analysts allowing to share investigations at a technical level.