AWS Amplify Resources
#AWS #Amplify #Amazon #Hosting #Cloud
https://reconshell.com/aws-amplify-resources/
#AWS #Amplify #Amazon #Hosting #Cloud
https://reconshell.com/aws-amplify-resources/
Penetration Testing Tools, ML and Linux Tutorials
AWS Amplify Resources - Penetration Testing Tools, ML and Linux Tutorials
Awesome AWS Amplify curates the best AWS Amplify, tools, tutorials, articles and more. PRs are welcome! Workshops Serverless GraphQL API with AppSync and
Blockchain Security CTF and Writeups
#DeFi #Security #Hacking #Blockchain #CTF #Wargames
https://reconshell.com/blockchain-security-ctf-and-writeups/
#DeFi #Security #Hacking #Blockchain #CTF #Wargames
https://reconshell.com/blockchain-security-ctf-and-writeups/
Penetration Testing Tools, ML and Linux Tutorials
Blockchain Security CTF and Writeups - Penetration Testing Tools, ML and Linux Tutorials
A curated list of blockchain security Wargames, Challenges, and Capture the Flag (CTF) competitions and solution writeups.
Universal Command Line interface for SQL databases
#SQL #PostgreSQL #MySQL #SQLite3 #MicrosoftSQL
#psql #NoSQL #Database #usql #SQLdrivers
https://reconshell.com/universal-command-line-interface-for-sql-databases/
#SQL #PostgreSQL #MySQL #SQLite3 #MicrosoftSQL
#psql #NoSQL #Database #usql #SQLdrivers
https://reconshell.com/universal-command-line-interface-for-sql-databases/
Penetration Testing Tools, ML and Linux Tutorials
Universal Command Line interface for SQL databases - Penetration Testing Tools, ML and Linux Tutorials
usql is a universal command-line interface for PostgreSQL, MySQL, Oracle Database, SQLite3, Microsoft SQL Server, and many other databases including NoSQL and
Purple Team Framework and Lifecycle
#InformationSecurity #security #RedTeam
#Defensive #BlueTeam #C2 #Attack #Hack #APT
https://reconshell.com/purple-team-framework-and-lifecycle/
#InformationSecurity #security #RedTeam
#Defensive #BlueTeam #C2 #Attack #Hack #APT
https://reconshell.com/purple-team-framework-and-lifecycle/
Active Directory Exploitation Cheat Sheet
#Powersploit #Impacket #Mimikatz #BloodHound #AD
#Exploitation #ActiveDirectory #Enumeration #Hacking
#AppSec #Infosec #RemoteCodeExecution #Kerberoast
https://reconshell.com/active-directory-exploitation-cheat-sheet/
#Powersploit #Impacket #Mimikatz #BloodHound #AD
#Exploitation #ActiveDirectory #Enumeration #Hacking
#AppSec #Infosec #RemoteCodeExecution #Kerberoast
https://reconshell.com/active-directory-exploitation-cheat-sheet/
Efficient Linux at the Command Line
#Linux #CommandLine #Shell #Bash
https://reconshell.com/efficient-linux-at-the-command-line-ebook-free-download/
#Linux #CommandLine #Shell #Bash
https://reconshell.com/efficient-linux-at-the-command-line-ebook-free-download/
Incident Response Investigation System
#ReverseProxy #IncidentResponse #IR #IRIS
https://reconshell.com/incident-response-investigation-system/
#ReverseProxy #IncidentResponse #IR #IRIS
https://reconshell.com/incident-response-investigation-system/
Penetration Testing Tools, ML and Linux Tutorials
Incident Response Investigation System - Penetration Testing Tools, ML and Linux Tutorials
IRIS is a web collaborative platform for incident response analysts allowing to share investigations at a technical level.
APT Lab Terraform
#APT #PurpleTeaming #Azure #Cloud #Defensive
#Attack #ActiveDirectory #Exploit #Hacking
https://reconshell.com/apt-lab-terraform/
#APT #PurpleTeaming #Azure #Cloud #Defensive
#Attack #ActiveDirectory #Exploit #Hacking
https://reconshell.com/apt-lab-terraform/
Penetration Testing Tools, ML and Linux Tutorials
APT Lab Terraform - Penetration Testing Tools, ML and Linux Tutorials
Purple Teaming Attack & Hunt Lab - TerraForm
Stop Lateral Movement via the RPC Firewall
#Firewall #LateralMovement #exploit #ZeroLogon
#DCSync #PsExec #Hacking #InfoSec #AppSec
https://reconshell.com/stop-lateral-movement-via-rpc-firewall/
#Firewall #LateralMovement #exploit #ZeroLogon
#DCSync #PsExec #Hacking #InfoSec #AppSec
https://reconshell.com/stop-lateral-movement-via-rpc-firewall/
Penetration Testing Tools, ML and Linux Tutorials
Stop Lateral Movement via the RPC Firewall - Penetration Testing Tools, ML and Linux Tutorials
Check out our RPC Firewall blog post to gain better understanding of RPC, RPC attacks and the solution: the RPC Firewall. For any questions, issues,
Mobile Security Framework
#MalwareAnalysis #Pentesting #Android #iOS
#MobileSecurity #MobileHacking #StaticAnalysis
https://reconshell.com/mobile-security-framework/
#MalwareAnalysis #Pentesting #Android #iOS
#MobileSecurity #MobileHacking #StaticAnalysis
https://reconshell.com/mobile-security-framework/
Penetration Testing Tools, ML and Linux Tutorials
Mobile Security Framework - Penetration Testing Tools, ML and Linux Tutorials
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pentesting, malware analysis and security assessment
Active Directory Kill Chain Attack & Defense
#ActiveDirectory #AD #PostExploitation #Zerologon
#RCE #PassTheHash #Malware #vulnerability #Hacking
https://reconshell.com/active-directory-kill-chain-attack-defense/
#ActiveDirectory #AD #PostExploitation #Zerologon
#RCE #PassTheHash #Malware #vulnerability #Hacking
https://reconshell.com/active-directory-kill-chain-attack-defense/
Penetration Testing Tools, ML and Linux Tutorials
Active Directory Kill Chain Attack & Defense - Penetration Testing Tools, ML and Linux Tutorials
This document was designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs)
OWASP DevSecOps Guideline
#DevOps #OWASP #DevSecOps #SecOps
https://reconshell.com/owasp-devsecops-guideline/
#DevOps #OWASP #DevSecOps #SecOps
https://reconshell.com/owasp-devsecops-guideline/
Penetration Testing Tools, ML and Linux Tutorials
OWASP DevSecOps Guideline - Penetration Testing Tools, ML and Linux Tutorials
The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.
Blind SSRF Chains
#SSRF #BlindSSRF #vulnerability #RCE
#exploit #XXE #BugBounty #BugHunter
https://reconshell.com/blind-ssrf-chains/
#SSRF #BlindSSRF #vulnerability #RCE
#exploit #XXE #BugBounty #BugHunter
https://reconshell.com/blind-ssrf-chains/
Penetration Testing Tools, ML and Linux Tutorials
Blind SSRF Chains - Penetration Testing Tools, ML and Linux Tutorials
Server Side Request Forgery occurs when you can coerce a server to make arbitrary requests on your behalf. As the requests are being made by the server, it
Data Science Resources
#DataScience #MachineLearning #ML
#DeepLearning #DataAnalysis #AI
https://reconshell.com/data-science-resources/
#DataScience #MachineLearning #ML
#DeepLearning #DataAnalysis #AI
https://reconshell.com/data-science-resources/
Penetration Testing Tools, ML and Linux Tutorials
Data Science Resources - Penetration Testing Tools, ML and Linux Tutorials
Hello and welcome to the Data Science Resources repo. I originally built this repo so that I could have a location to host resources that are helpful to me.
Cyber security Internships
#CyberIntelligence #Vulnerability #Security
#Researcher #Hacking #AppSec #InfoSec #Cybersec
https://reconshell.com/cyber-security-internships/
#CyberIntelligence #Vulnerability #Security
#Researcher #Hacking #AppSec #InfoSec #Cybersec
https://reconshell.com/cyber-security-internships/
Penetration Testing Tools, ML and Linux Tutorials
Cyber security Internships - Penetration Testing Tools, ML and Linux Tutorials
a list of cybersecurity internships, designed to help students identify teams and opportunities.
reFlutter Reverse Engineering Framework
#ReverseEngineering #BurpSuite #Proxy #Flutter
https://reconshell.com/reflutter-reverse-engineering-framework/
#ReverseEngineering #BurpSuite #Proxy #Flutter
https://reconshell.com/reflutter-reverse-engineering-framework/
Penetration Testing Tools, ML and Linux Tutorials
reFlutter Reverse Engineering Framework - Penetration Testing Tools, ML and Linux Tutorials
This framework helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled and ready for app