DevSecOps Roadmap
#DevSecOps #Roadmap #Devops #OWASP #Security
https://reconshell.com/devsecops-roadmap/
#DevSecOps #Roadmap #Devops #OWASP #Security
https://reconshell.com/devsecops-roadmap/
JavaScript Design Patterns
#JavaScript #JS #Design #Software #Engineering
https://reconshell.com/javascript-design-patterns/
#JavaScript #JS #Design #Software #Engineering
https://reconshell.com/javascript-design-patterns/
Penetration Testing Tools, ML and Linux Tutorials
JavaScript Design Patterns - Penetration Testing Tools, ML and Linux Tutorials
Design patterns are solutions to recurring problems guidelines on how to tackle certain problems. They are not classes, packages or libraries that you can
CVE-2021-35587 Oracle Access Manager Vulnerability
#CVE-2021-35587 #Vulnerability #exploit #BugBounty
#CVE #Hacking #Bughunter #Oracle #Malware #Nuclei
https://reconshell.com/cve-2021-35587-oracle-access-manager-vulnerability/
#CVE-2021-35587 #Vulnerability #exploit #BugBounty
#CVE #Hacking #Bughunter #Oracle #Malware #Nuclei
https://reconshell.com/cve-2021-35587-oracle-access-manager-vulnerability/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2021-35587 Oracle Access Manager Vulnerability - Penetration Testing Tools, ML and Linux Tutorials
The CVE-2021-35587 Guide Patterns is a github repository by antx
Graph Visualization for windows event logs
#windows #security #Microsoft #docker #EventLogs
https://reconshell.com/graph-visualization-for-windows-event-logs/
#windows #security #Microsoft #docker #EventLogs
https://reconshell.com/graph-visualization-for-windows-event-logs/
Penetration Testing Tools, ML and Linux Tutorials
Graph Visualization for windows event logs - Penetration Testing Tools, ML and Linux Tutorials
Requires docker and docker-compose to be installed.
Tracking history of USB events on Linux
#usbrip #USB #Linux #forensics #Hacking #D3
https://reconshell.com/tracking-history-of-usb-events-on-linux/
#usbrip #USB #Linux #forensics #Hacking #D3
https://reconshell.com/tracking-history-of-usb-events-on-linux/
Penetration Testing Tools, ML and Linux Tutorials
Tracking history of USB events on Linux - Penetration Testing Tools, ML and Linux Tutorials
Firstly, usbrip will check if there is a chance to dump system events using journalctl as the most portable option. If not – it will search for and
CVE-2022-0995 exploit for Ubuntu
#CVE-2022-0995 #Ubuntu #Exploit #Linux #RootExploit
#Hacking #Bugbounty #PrivilegeEscalation #Malware
https://reconshell.com/cve-2022-0995-exploit-for-ubuntu/
#CVE-2022-0995 #Ubuntu #Exploit #Linux #RootExploit
#Hacking #Bugbounty #PrivilegeEscalation #Malware
https://reconshell.com/cve-2022-0995-exploit-for-ubuntu/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2022-0995 Exploit for Ubuntu - Penetration Testing Tools, ML and Linux Tutorials
The exploit targets Ubuntu 21.10 with kernel 5.13.0-37.The exploit is not 100% reliable, you may need to run it a couple of times. It may panic
The Rust SQL Toolkit
#Rust #SQL #PostgreSQL #MySQL #MSSQL #SQLite #SQLx
https://reconshell.com/the-rust-sql-toolkit/
#Rust #SQL #PostgreSQL #MySQL #MSSQL #SQLite #SQLx
https://reconshell.com/the-rust-sql-toolkit/
Penetration Testing Tools, ML and Linux Tutorials
The Rust SQL Toolkit - Penetration Testing Tools, ML and Linux Tutorials
The Rust SQL Toolkit. An async, pure Rust SQL crate featuring compile-time checked queries without a DSL. Supports PostgreSQL, MySQL, SQLite, and MSSQL.
Windows Exploitation Resources
#Exploitation #Windows #Microsoft #Shellcode #Rootkits
#zeroday #KernelExploit #Vulnerability #CVE #Pwn2Own
#AttackSurface #Hacking #Bugbounty #Fuzzing #BlackHat
https://reconshell.com/windows-exploitation-resources/
#Exploitation #Windows #Microsoft #Shellcode #Rootkits
#zeroday #KernelExploit #Vulnerability #CVE #Pwn2Own
#AttackSurface #Hacking #Bugbounty #Fuzzing #BlackHat
https://reconshell.com/windows-exploitation-resources/
Penetration Testing Tools, ML and Linux Tutorials
Windows Exploitation Resources - Penetration Testing Tools, ML and Linux Tutorials
The Exploitation Resources is a github repository by FULLSHADE
AI ML and Data Science Books
#ArtificialIntelligence #MachineLearning
#DataScience #Books #AI #ML #eBook
https://reconshell.com/ai-ml-and-data-science-books/
#ArtificialIntelligence #MachineLearning
#DataScience #Books #AI #ML #eBook
https://reconshell.com/ai-ml-and-data-science-books/
Penetration Testing Tools, ML and Linux Tutorials
AI, ML and Data Science Books - Penetration Testing Tools, ML and Linux Tutorials
Awesome Artificial Intelligence Machine Learning and Data Science Books Artificial Intelligence with Python - Tutorialspoint Machine Learning from Scratch
Digital Forensics and Incident Response SOC
#cybersecurity #IncidentResponse #DigitalForensics
#ThreatHunting #ForensicAnalysis #DFIR #Ipsec #D3
https://reconshell.com/digital-forensics-and-incident-response-soc/
#cybersecurity #IncidentResponse #DigitalForensics
#ThreatHunting #ForensicAnalysis #DFIR #Ipsec #D3
https://reconshell.com/digital-forensics-and-incident-response-soc/
Advanced OSINT Framework for Github
#octosuite #Github #OpenSourceIntelligence #OSINT
https://reconshell.com/advanced-osint-framework-for-github/
#octosuite #Github #OpenSourceIntelligence #OSINT
https://reconshell.com/advanced-osint-framework-for-github/
CVE-2022-21907 HTTP Protocol Stack RCE Vulnerability
#RCE #Vulnerability #Metasploit #Nmap #Powershell
#CVE-2022-21907 #CVE-2022-2190 #Exploit #Dos #Ddos
#Hacking #Microsoft #Bugbounty #RemoteCodeExecution
https://reconshell.com/cve-2022-21907-http-protocol-stack-rce-vulnerability/
#RCE #Vulnerability #Metasploit #Nmap #Powershell
#CVE-2022-21907 #CVE-2022-2190 #Exploit #Dos #Ddos
#Hacking #Microsoft #Bugbounty #RemoteCodeExecution
https://reconshell.com/cve-2022-21907-http-protocol-stack-rce-vulnerability/
DirtyPipe for Android
#DirtyPipe #Android #Mobile #Exploit #Malware
#CVE-2022-0847 #security #Hacking #Bugbounty
https://reconshell.com/dirtypipe-for-android/
#DirtyPipe #Android #Mobile #Exploit #Malware
#CVE-2022-0847 #security #Hacking #Bugbounty
https://reconshell.com/dirtypipe-for-android/
Penetration Testing Tools, ML and Linux Tutorials
DirtyPipe for Android - Penetration Testing Tools, ML and Linux Tutorials
The DirtyPipe for Android is a github repository by polygraphene
Hacking Windows eBook
#Windows #Hacking #Microsoft #ReverseEngineering
#Bugbounty #PrivilegeEscalation #Exploit #Malware
https://reconshell.com/hacking-windows-ebook/
#Windows #Hacking #Microsoft #ReverseEngineering
#Bugbounty #PrivilegeEscalation #Exploit #Malware
https://reconshell.com/hacking-windows-ebook/
Penetration Testing Tools, ML and Linux Tutorials
Hacking Windows eBook - Penetration Testing Tools, ML and Linux Tutorials
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Recon tool for bug bounty
#BugBounty #WAF #wafw00f #Nmap #Scanner #Recon
https://reconshell.com/recon-tool-for-bug-bounty/
#BugBounty #WAF #wafw00f #Nmap #Scanner #Recon
https://reconshell.com/recon-tool-for-bug-bounty/
Penetration Testing Tools, ML and Linux Tutorials
Recon tool for bug bounty - Penetration Testing Tools, ML and Linux Tutorials
Layla is a python script that automatically performs recon on a given URL. It combines the outputs of other known tools into a single one.
Personal Security Checklist
#Security #keylogger #malware #Fingerprinting
#CSRF #Rootkit #Exploit #Phishing #Hacking
#Bugbounty #VAPT #Vulnerability #Attack
https://reconshell.com/security-checklist/
#Security #keylogger #malware #Fingerprinting
#CSRF #Rootkit #Exploit #Phishing #Hacking
#Bugbounty #VAPT #Vulnerability #Attack
https://reconshell.com/security-checklist/
Penetration Testing Tools, ML and Linux Tutorials
Personal Security Checklist - Penetration Testing Tools, ML and Linux Tutorials
The Personal Security Checklist is a github repository by Alicia Sykes
Linux cheat sheet
#Linux #CheatSheet #Commands #Shell #Terminal
https://reconshell.com/linux-cheat-sheet/
#Linux #CheatSheet #Commands #Shell #Terminal
https://reconshell.com/linux-cheat-sheet/
Penetration Testing Tools, ML and Linux Tutorials
Linux cheat sheet - Penetration Testing Tools, ML and Linux Tutorials
This may not be available by default in many linux machines. In this case, you need to install it manually.
Optimized DNS and HTTP Log Tool for pentesters
#BugScan #DNSLog #eyes.sh #pentesters #BugBounty
#Hacking #Scanning #VAPT #BugHunters #HTTPLog
https://reconshell.com/optimized-dns-and-http-log-tool-for-pentesters/
#BugScan #DNSLog #eyes.sh #pentesters #BugBounty
#Hacking #Scanning #VAPT #BugHunters #HTTPLog
https://reconshell.com/optimized-dns-and-http-log-tool-for-pentesters/
Penetration Testing Tools, ML and Linux Tutorials
Optimized DNS and HTTP Log Tool for pentesters - Penetration Testing Tools, ML and Linux Tutorials
eyes.sh is a DNS Log / HTTP Log detection tool used to assist security testing and missed scan tools.