DevOps tools and resources
#CloudPlatforms #DevSecOps #Linux #AWS
#Virtualization #DevOps #Kubernetes #Docker
https://reconshell.com/devops-tools-and-resources/
#CloudPlatforms #DevSecOps #Linux #AWS
#Virtualization #DevOps #Kubernetes #Docker
https://reconshell.com/devops-tools-and-resources/
Penetration Testing Tools, ML and Linux Tutorials
DevOps tools and resources - Penetration Testing Tools, ML and Linux Tutorials
Books focused on DevOps, DevSecOps and Site Reliability Engineering.
Data science blogs
#Datascience #DataAnalytics #DeepLearning #AI
#DataMining #Visualization #MachineLearning #ML
https://reconshell.com/data-science-blogs/
#Datascience #DataAnalytics #DeepLearning #AI
#DataMining #Visualization #MachineLearning #ML
https://reconshell.com/data-science-blogs/
Penetration Testing Tools, ML and Linux Tutorials
Data science blogs - Penetration Testing Tools, ML and Linux Tutorials
The Data science blogs is a github repository by Artem Golubin
Cyber Security Forensics
#CyberSecurity #Forensics #DFIR #Appsec
#IncidentResponse #DockerForensics #Infosec
#Hacking #SocialEngineering #MobileForensics
https://reconshell.com/cyber-security-forensics/
#CyberSecurity #Forensics #DFIR #Appsec
#IncidentResponse #DockerForensics #Infosec
#Hacking #SocialEngineering #MobileForensics
https://reconshell.com/cyber-security-forensics/
Penetration Testing Tools, ML and Linux Tutorials
Cyber Security Forensics - Penetration Testing Tools, ML and Linux Tutorials
A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity. Thanks to all
Onion addresses for anything
#oniongrok #Tor #OnionAddresses #TorBrowser
https://reconshell.com/onion-addresses-for-anything/
#oniongrok #Tor #OnionAddresses #TorBrowser
https://reconshell.com/onion-addresses-for-anything/
Penetration Testing Tools, ML and Linux Tutorials
Onion addresses for anything - Penetration Testing Tools, ML and Linux Tutorials
oniongrok forwards ports on the local host to remote Onion addresses as Tor hidden services and vice-versa.
CobaltBus – Cobalt Strike External C2
#CobaltBus #C2 #CobaltStrike #Azure #Exploit
#Hacking #RedTeam #bugbounty #DotNetCore
https://reconshell.com/cobaltbus-cobalt-strike-external-c2/
#CobaltBus #C2 #CobaltStrike #Azure #Exploit
#Hacking #RedTeam #bugbounty #DotNetCore
https://reconshell.com/cobaltbus-cobalt-strike-external-c2/
Penetration Testing Tools, ML and Linux Tutorials
CobaltBus - Cobalt Strike External C2 - Penetration Testing Tools, ML and Linux Tutorials
Then CobaltBus DotNetCore binary that integrates with CobaltStrikes ExternalC2, will create a local SqliteDB in order to keep track of multiple beacons. The
Hidden parameters discovery suite
#x8 #Bugbounty #BurpSuite #Hacker
#Injection #RedTeam #BugHunter #RUST
https://reconshell.com/hidden-parameters-discovery-suite/
#x8 #Bugbounty #BurpSuite #Hacker
#Injection #RedTeam #BugHunter #RUST
https://reconshell.com/hidden-parameters-discovery-suite/
Penetration Testing Tools, ML and Linux Tutorials
Hidden parameters discovery suite - Penetration Testing Tools, ML and Linux Tutorials
The tool helps to find hidden parameters that can be vulnerable or can reveal interesting functionality that other hunters miss. Greater accuracy is achieved
Postgres to Elasticsearch sync
#PGSync #Elasticsearch #PostgresSQL #NoSQL
#Database #MySQL #JSON #PGSQL #PSQL #SQL
https://reconshell.com/postgres-to-elasticsearch-sync/
#PGSync #Elasticsearch #PostgresSQL #NoSQL
#Database #MySQL #JSON #PGSQL #PSQL #SQL
https://reconshell.com/postgres-to-elasticsearch-sync/
Penetration Testing Tools, ML and Linux Tutorials
Postgres to Elasticsearch sync - Penetration Testing Tools, ML and Linux Tutorials
PGSync is a middleware for syncing data from Postgres to Elasticsearch effortlessly. It allows you to keep Postgres as your
Container Security Checklist
#Container #Security #Docker #cloud #OWASP
#Azure #MITM #Cyber #forensics #Kubernetes
https://reconshell.com/container-security-checklist/
#Container #Security #Docker #cloud #OWASP
#Azure #MITM #Cyber #forensics #Kubernetes
https://reconshell.com/container-security-checklist/
Active Directory Enumeration and Exploitation
#ActiveDirectory #Enumeration #Exploitation #Vulnerability
#BloodHound #PrivilegeEscalation #zerologon #Hacking #Kerberos
https://reconshell.com/active-directory-enumeration-and-exploitation/
#ActiveDirectory #Enumeration #Exploitation #Vulnerability
#BloodHound #PrivilegeEscalation #zerologon #Hacking #Kerberos
https://reconshell.com/active-directory-enumeration-and-exploitation/
CSS Learning Resources
#JavaScript #CSS #JS #HTML5 #Programming
https://reconshell.com/css-learning-resources/
#JavaScript #CSS #JS #HTML5 #Programming
https://reconshell.com/css-learning-resources/
Penetration Testing Tools, ML and Linux Tutorials
CSS Learning Resources - Penetration Testing Tools, ML and Linux Tutorials
This list is mainly about CSS – the language and the modules. Not about naming conventions, architecture paradigms, frameworks, pre-processors,
Docker security resources
#Docker #Security #Pentesting #RCE #VAPT
#vulnerability #BugBountry #Hacking #Hack
https://reconshell.com/docker-security/
#Docker #Security #Pentesting #RCE #VAPT
#vulnerability #BugBountry #Hacking #Hack
https://reconshell.com/docker-security/
AWS S3 Bucket Weakness Discovery
#DnsRecon #FestIn #BugBounty #AWS #S3 #Amazon
https://reconshell.com/aws-s3-bucket-weakness-discovery/
#DnsRecon #FestIn #BugBounty #AWS #S3 #Amazon
https://reconshell.com/aws-s3-bucket-weakness-discovery/
Penetration Testing Tools, ML and Linux Tutorials
AWS S3 Bucket Weakness Discovery - Penetration Testing Tools, ML and Linux Tutorials
FestIn is a tool for discovering open S3 Buckets starting from a domains.
Useful Data Science Topics
#DataScience #MachineLearning #Visualization #ML
https://reconshell.com/useful-data-science-topics/
#DataScience #MachineLearning #Visualization #ML
https://reconshell.com/useful-data-science-topics/
Penetration Testing Tools, ML and Linux Tutorials
Useful Data Science Topics - Penetration Testing Tools, ML and Linux Tutorials
If you want to received updates of these blogs in your mailbox, you can subscribe to my Medium newsletter. To received bite-sized Python and daily data
CVE-2022-24086 Magento RCE
#vulnerability #RCE #Magento #Hacking #adobe
#CVE-2022-24086 #CodeExecution #Exploitation
https://reconshell.com/cve-2022-24086-magento-rce/
#vulnerability #RCE #Magento #Hacking #adobe
#CVE-2022-24086 #CodeExecution #Exploitation
https://reconshell.com/cve-2022-24086-magento-rce/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2022-24086 Magento RCE - Penetration Testing Tools, ML and Linux Tutorials
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout
API Security Empire
#API #Security #GraphQL #OWASP #PenetrationTesting
#VAPT #Hacking #BugBounty #Recon #assetnote #Hack
https://reconshell.com/api-security-empire/
#API #Security #GraphQL #OWASP #PenetrationTesting
#VAPT #Hacking #BugBounty #Recon #assetnote #Hack
https://reconshell.com/api-security-empire/
Penetration Testing Tools, ML and Linux Tutorials
API Security Empire - Penetration Testing Tools, ML and Linux Tutorials
In this repository you will find: Mindmaps, tips & tricks, resources and every thing related to API Security and API Penetration Testing. Our mindmaps and
CVE-2022-25064 TP-LINK RCE
#vulnerability #RCE #router #TPLink #CVE #BugBounty
#CVE-2022-25064 #Exploit #Hacking #Wifi #WifiHacking
https://reconshell.com/cve-2022-25064-tp-link-rce/
#vulnerability #RCE #router #TPLink #CVE #BugBounty
#CVE-2022-25064 #Exploit #Hacking #Wifi #WifiHacking
https://reconshell.com/cve-2022-25064-tp-link-rce/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2022-25064 TP-LINK RCE - Penetration Testing Tools, ML and Linux Tutorials
The TP-LINK RCE is a github repository by Mr-xn
What is Azure Virtual Desktop
#AVD #Azure #AzureVirtualDesktop #Microsoft
#AzureAD #MicrosoftAzure #Virtualization
https://reconshell.com/what-is-azure-virtual-desktop/
#AVD #Azure #AzureVirtualDesktop #Microsoft
#AzureAD #MicrosoftAzure #Virtualization
https://reconshell.com/what-is-azure-virtual-desktop/
Penetration Testing Tools, ML and Linux Tutorials
What is Azure Virtual Desktop - Penetration Testing Tools, ML and Linux Tutorials
I have tried to consolidate a lot of content available online to learn and to operate Azure Virtual Desktop (AVD) formerly known as Windows Virtual Desktop
CVE-2022-21882 Windows Privilege Escalation
#CVE-2022-21882 #Windows #PrivilegeEscalation
#win32k #Hacking #VAPT #Exploit #Malware
https://reconshell.com/cve-2022-21882-windows-privilege-escalation/
#CVE-2022-21882 #Windows #PrivilegeEscalation
#win32k #Hacking #VAPT #Exploit #Malware
https://reconshell.com/cve-2022-21882-windows-privilege-escalation/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2022-21882 Windows Privilege Escalation - Penetration Testing Tools, ML and Linux Tutorials
only tested on windows 20h2 19042.1415
Android Developer Roadmap
#Android #SDK #Developer #Mobile #APK
https://reconshell.com/android-developer-roadmap/
#Android #SDK #Developer #Mobile #APK
https://reconshell.com/android-developer-roadmap/
Penetration Testing Tools, ML and Linux Tutorials
Android Developer Roadmap - Penetration Testing Tools, ML and Linux Tutorials
Android Developer Roadmap 2022 suggests learning paths to understanding Android development. You can read the roadmap following the line path in the middle of
vulnerability scanner for container
#vulnerability #container #Docker #grype #Scanner
#vulnerabilities #Kubernetes #Hacking #VAPT #Pentest
https://reconshell.com/vulnerability-scanner-for-container/
#vulnerability #container #Docker #grype #Scanner
#vulnerabilities #Kubernetes #Hacking #VAPT #Pentest
https://reconshell.com/vulnerability-scanner-for-container/