Open Source Intelligence Tool
#OSINT #InformationGathering #Collector
https://reconshell.com/open-source-intelligence-tool/
#OSINT #InformationGathering #Collector
https://reconshell.com/open-source-intelligence-tool/
Penetration Testing Tools, ML and Linux Tutorials
Open Source Intelligence Tool - Penetration Testing Tools, ML and Linux Tutorials
Collector is a tool for osint (open source intelligence) i build this tool for myself and for you if you want use this tool. Collector has been updated but i
Automatic Reverse Shell Generator
#ReverseShell #Powershell #Shelly #Shell #Netcat
#Hacking #Bugbounty #VAPT #Bughunter #Pentesting
https://reconshell.com/automatic-reverse-shell-generator/
#ReverseShell #Powershell #Shelly #Shell #Netcat
#Hacking #Bugbounty #VAPT #Bughunter #Pentesting
https://reconshell.com/automatic-reverse-shell-generator/
Penetration Testing Tools, ML and Linux Tutorials
Automatic Reverse Shell Generator - Penetration Testing Tools, ML and Linux Tutorials
CVE-2022-0847 DirtyPipe Root Exploit
#Exploit #DirtyPipe #CVE-2022-0847 #shell #VAPT
#Hacking #Bugbounty #vulnerability #DirtyCow
https://reconshell.com/cve-2022-0847-dirtypipe-root-exploit/
#Exploit #DirtyPipe #CVE-2022-0847 #shell #VAPT
#Hacking #Bugbounty #vulnerability #DirtyCow
https://reconshell.com/cve-2022-0847-dirtypipe-root-exploit/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2022-0847 DirtyPipe Root Exploit - Penetration Testing Tools, ML and Linux Tutorials
The CVE-2022-0847 is a github repository by Aaron Esau
GhostRecon OSINT Framework
#OSINT #GhostRecon #Cyber #scanning
#Hacking #Bugbounty #Bughunter #VAPT
https://reconshell.com/ghostrecon-osint-framework/
#OSINT #GhostRecon #Cyber #scanning
#Hacking #Bugbounty #Bughunter #VAPT
https://reconshell.com/ghostrecon-osint-framework/
Penetration Testing Tools, ML and Linux Tutorials
GhostRecon OSINT Framework - Penetration Testing Tools, ML and Linux Tutorials
An OSINT framework updated weekly, wich with you can search on precise targets, with a lot of features like person search, criminal search, or social media
Automatic Linux privesc exploitation
#CVE-2021-3560 #CVE-2021-4034 #CVE-2022-0847
#Linux #privesc #exploitation #PrivilegeEscalation
#vulnerabilities #root #shell #Exploit #Hacking
https://reconshell.com/automatic-linux-privesc-exploitation/
#CVE-2021-3560 #CVE-2021-4034 #CVE-2022-0847
#Linux #privesc #exploitation #PrivilegeEscalation
#vulnerabilities #root #shell #Exploit #Hacking
https://reconshell.com/automatic-linux-privesc-exploitation/
Linux Administration Best Practices
#Administration #Linux #Unix #InformationTechnology
#DevOps #DatabaseManagement #Scripting #Bash #IT
https://reconshell.com/linux-administration-best-practices/
#Administration #Linux #Unix #InformationTechnology
#DevOps #DatabaseManagement #Scripting #Bash #IT
https://reconshell.com/linux-administration-best-practices/
Penetration Testing Tools, ML and Linux Tutorials
Linux Administration Best Practices - Penetration Testing Tools, ML and Linux Tutorials
Scott Alan Miller is an information technology and software engineering industry veteran of 30+ years, with more than a quarter of a century on UNIX and
FREE Reverse Engineering Tutorial
#Hacking #BOF #CTF #NetworkSecurity #ASMHacking
#Debugging #Cyber #ReverseEngineering #VAPT #ASM
https://reconshell.com/free-reverse-engineering-tutorial/
#Hacking #BOF #CTF #NetworkSecurity #ASMHacking
#Debugging #Cyber #ReverseEngineering #VAPT #ASM
https://reconshell.com/free-reverse-engineering-tutorial/
Penetration Testing Tools, ML and Linux Tutorials
FREE Reverse Engineering Tutorial - Penetration Testing Tools, ML and Linux Tutorials
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Cybersecurity Threat Detection and Hunting
#Hunting #Cybersecurity #ThreatDetection #MITRE #DFIR
#Malware #BlueTeam #ThreatHunting #Cyber #ATT&CK #NIST
#Mimikatz #Fingerprinting #Hacking #Bugbounty #BlackHat
https://reconshell.com/cybersecurity-threat-detection-and-hunting/
#Hunting #Cybersecurity #ThreatDetection #MITRE #DFIR
#Malware #BlueTeam #ThreatHunting #Cyber #ATT&CK #NIST
#Mimikatz #Fingerprinting #Hacking #Bugbounty #BlackHat
https://reconshell.com/cybersecurity-threat-detection-and-hunting/
Penetration Testing Tools, ML and Linux Tutorials
Cybersecurity Threat Detection and Hunting - Penetration Testing Tools, ML and Linux Tutorials
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical
DevSecOps Roadmap
#DevSecOps #Roadmap #Devops #OWASP #Security
https://reconshell.com/devsecops-roadmap/
#DevSecOps #Roadmap #Devops #OWASP #Security
https://reconshell.com/devsecops-roadmap/
JavaScript Design Patterns
#JavaScript #JS #Design #Software #Engineering
https://reconshell.com/javascript-design-patterns/
#JavaScript #JS #Design #Software #Engineering
https://reconshell.com/javascript-design-patterns/
Penetration Testing Tools, ML and Linux Tutorials
JavaScript Design Patterns - Penetration Testing Tools, ML and Linux Tutorials
Design patterns are solutions to recurring problems guidelines on how to tackle certain problems. They are not classes, packages or libraries that you can
CVE-2021-35587 Oracle Access Manager Vulnerability
#CVE-2021-35587 #Vulnerability #exploit #BugBounty
#CVE #Hacking #Bughunter #Oracle #Malware #Nuclei
https://reconshell.com/cve-2021-35587-oracle-access-manager-vulnerability/
#CVE-2021-35587 #Vulnerability #exploit #BugBounty
#CVE #Hacking #Bughunter #Oracle #Malware #Nuclei
https://reconshell.com/cve-2021-35587-oracle-access-manager-vulnerability/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2021-35587 Oracle Access Manager Vulnerability - Penetration Testing Tools, ML and Linux Tutorials
The CVE-2021-35587 Guide Patterns is a github repository by antx
Graph Visualization for windows event logs
#windows #security #Microsoft #docker #EventLogs
https://reconshell.com/graph-visualization-for-windows-event-logs/
#windows #security #Microsoft #docker #EventLogs
https://reconshell.com/graph-visualization-for-windows-event-logs/
Penetration Testing Tools, ML and Linux Tutorials
Graph Visualization for windows event logs - Penetration Testing Tools, ML and Linux Tutorials
Requires docker and docker-compose to be installed.
Tracking history of USB events on Linux
#usbrip #USB #Linux #forensics #Hacking #D3
https://reconshell.com/tracking-history-of-usb-events-on-linux/
#usbrip #USB #Linux #forensics #Hacking #D3
https://reconshell.com/tracking-history-of-usb-events-on-linux/
Penetration Testing Tools, ML and Linux Tutorials
Tracking history of USB events on Linux - Penetration Testing Tools, ML and Linux Tutorials
Firstly, usbrip will check if there is a chance to dump system events using journalctl as the most portable option. If not – it will search for and