APT & CyberCriminal Campaign Collection
#APT #CyberCriminal #Malware #Vulnerabilities #CyberSecurity
#Ransomware #Backdoor #Hacking #0day #Exploit #Botnet #RootKit
https://reconshell.com/apt-cybercriminal-campaign-collection/
#APT #CyberCriminal #Malware #Vulnerabilities #CyberSecurity
#Ransomware #Backdoor #Hacking #0day #Exploit #Botnet #RootKit
https://reconshell.com/apt-cybercriminal-campaign-collection/
Penetration Testing Tools, ML and Linux Tutorials
APT & CyberCriminal Campaign Collection - Penetration Testing Tools, ML and Linux Tutorials
🔸 Jul 29 2021 - APT trends report Q2 2021🔸 Apr 27 2021 - APT trends report Q1 2021🔸 Nov 04 2020 - APT trends report Q3
AD Pentesting Notes
#AD #Exploit #Vulnerabilities #Enumeration #NMAP
#Cracking #Bloodhound #Mimikatz #VAPT #BugBounty
#EthicalHacking #RedTeam #Pentesting #CyberSecurity
https://reconshell.com/ad-pentesting-notes/
#AD #Exploit #Vulnerabilities #Enumeration #NMAP
#Cracking #Bloodhound #Mimikatz #VAPT #BugBounty
#EthicalHacking #RedTeam #Pentesting #CyberSecurity
https://reconshell.com/ad-pentesting-notes/
Penetration Testing Tools, ML and Linux Tutorials
AD Pentesting Notes - Penetration Testing Tools, ML and Linux Tutorials
If you just have access to an AD environment but you don't have any credentials/sessions you could: Pentest the network: Scan the network, find machines and
DevSecOps Playbook
#DevSecOps #DevOps #Security #Vulnerability #BugBounty
#PenetrationTesting #ThreatModeling #SecurityResearchers
https://reconshell.com/devsecops-playbook/
#DevSecOps #DevOps #Security #Vulnerability #BugBounty
#PenetrationTesting #ThreatModeling #SecurityResearchers
https://reconshell.com/devsecops-playbook/
Penetration Testing Tools, ML and Linux Tutorials
DevSecOps Playbook - Penetration Testing Tools, ML and Linux Tutorials
This playbook will help you introduce effective DevSecOps practices in your company, regardless of size. We provide explicit guidance and actionable steps to
Burp Suite Extension for AWS Signing
#AWSSigner #AWS #BurpSuite #Hacking #BugBounty
#VAPT #Pentesting #Exploit #Malware #Bughunter
https://reconshell.com/burp-suite-extension-for-aws-signing/
#AWSSigner #AWS #BurpSuite #Hacking #BugBounty
#VAPT #Pentesting #Exploit #Malware #Bughunter
https://reconshell.com/burp-suite-extension-for-aws-signing/
Online Tools For OSINT
#OSINT #Hacking #recon #Bugbounty #SocialMedia
#Vulnerabilities #Pentest #SearchEngines #Leaks
https://reconshell.com/online-tools-for-osint/
#OSINT #Hacking #recon #Bugbounty #SocialMedia
#Vulnerabilities #Pentest #SearchEngines #Leaks
https://reconshell.com/online-tools-for-osint/
Penetration Testing Tools, ML and Linux Tutorials
Online Tools For OSINT - Penetration Testing Tools, ML and Linux Tutorials
Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the links
Maltego Transforms List
#Maltego #OSINT #NMAP #MITRE #ATT&CK #Hacking
#Bugbounty #InformationGathering #Scanner #Recon
https://reconshell.com/maltego-transforms-list/
#Maltego #OSINT #NMAP #MITRE #ATT&CK #Hacking
#Bugbounty #InformationGathering #Scanner #Recon
https://reconshell.com/maltego-transforms-list/
Penetration Testing Tools, ML and Linux Tutorials
Maltego Transforms List - Penetration Testing Tools, ML and Linux Tutorials
Maltego - one of most famous graphical analyze tool for OSINT. There is list of tools that handle different data and make it usable in Maltego:
CVE-2022-25262 JetBrains SAML response takeover
#CVE-2022-25262 #Vulnerability #JetBrains #CVE
#Exploit #Hacking #Malware #Bugbounty #VAPT
https://reconshell.com/cve-2022-25262-jetbrains-hub-saml-response-takeover/
#CVE-2022-25262 #Vulnerability #JetBrains #CVE
#Exploit #Hacking #Malware #Bugbounty #VAPT
https://reconshell.com/cve-2022-25262-jetbrains-hub-saml-response-takeover/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2022-25262 JetBrains Hub SAML response takeover - Penetration Testing Tools, ML and Linux Tutorials
PoC + vulnerability details for CVE-2022-25262 | JetBrains Hub single-click SAML response takeover
Azure Architecture
#Microsoft #Azure #AzureSecurity #DevOps #Cloud
#SQL #Database #PowerShell #Architecture #Linux
https://reconshell.com/azure-architecture/
#Microsoft #Azure #AzureSecurity #DevOps #Cloud
#SQL #Database #PowerShell #Architecture #Linux
https://reconshell.com/azure-architecture/
Penetration Testing Tools, ML and Linux Tutorials
Azure Architecture - Penetration Testing Tools, ML and Linux Tutorials
This list contains anything that can help with your Microsoft Azure architecture and quickly get you up and running when designing, planning, and implementing
Default Credentials Cheat Sheet
#BlueTeam #RedTeam #Routersploit #OWASP #Pentesting
#Security #Seclists #Hacking #Bugbounty #Router #VAPT
#DefaultPasswordList #changeme #Exploit #Cyber #Malware
https://reconshell.com/default-credentials-cheat-sheet/
#BlueTeam #RedTeam #Routersploit #OWASP #Pentesting
#Security #Seclists #Hacking #Bugbounty #Router #VAPT
#DefaultPasswordList #changeme #Exploit #Cyber #Malware
https://reconshell.com/default-credentials-cheat-sheet/
Penetration Testing Tools, ML and Linux Tutorials
Default Credentials Cheat Sheet - Penetration Testing Tools, ML and Linux Tutorials
noraj created CLI & library to search for default credentials among this database using DefaultCreds-Cheat-Sheet.csv. The tool is
reconDNS Tool For Cybersecurity professionals
#reconDNS #CyberSecurity #XSS #SSRF #SQLi #Fuzzing #DNS
#OSINT #Recon #Hacking #Bugbounty #Vulnerability #VAPT
#Enumeration #Pentesting #Malware #Exploit #Nuclei
https://reconshell.com/recondns-tool-for-cybersecurity-professionals/
#reconDNS #CyberSecurity #XSS #SSRF #SQLi #Fuzzing #DNS
#OSINT #Recon #Hacking #Bugbounty #Vulnerability #VAPT
#Enumeration #Pentesting #Malware #Exploit #Nuclei
https://reconshell.com/recondns-tool-for-cybersecurity-professionals/
Penetration Testing Tools, ML and Linux Tutorials
reconDNS Tool For Cybersecurity professionals - Penetration Testing Tools, ML and Linux Tutorials
reconDNS automates the entire process of reconnaisance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and
Malicious PDF Generator
#MaliciousPDF #PenetrationTesting #RedTeaming
#BurpSuite #BlackHat #Hacking #Malware #VAPT
https://reconshell.com/malicious-pdf-generator/
#MaliciousPDF #PenetrationTesting #RedTeaming
#BurpSuite #BlackHat #Hacking #Malware #VAPT
https://reconshell.com/malicious-pdf-generator/
Penetration Testing Tools, ML and Linux Tutorials
Malicious PDF Generator - Penetration Testing Tools, ML and Linux Tutorials
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
RedTeam and Penetration Testing Checklist
#RedTeam #PenetrationTesting #Recon #BOF #bloodhound
#Enumeration #Hacking #Bugbounty #LateralMovement
#SECURITY #phishing #CobaltStrike #Shell #Exploit
https://reconshell.com/redteam-and-penetration-testing-checklist/
#RedTeam #PenetrationTesting #Recon #BOF #bloodhound
#Enumeration #Hacking #Bugbounty #LateralMovement
#SECURITY #phishing #CobaltStrike #Shell #Exploit
https://reconshell.com/redteam-and-penetration-testing-checklist/
Penetration Testing Tools, ML and Linux Tutorials
RedTeam and Penetration Testing Checklist - Penetration Testing Tools, ML and Linux Tutorials
Not a definitive list, cheatsheet, or opsec safe by any means, just things of note....
SearchMap Information Collection Tool
#seearchmap #Scanning #Hacking #PenetrationTesting
#Bugbounty #InformationGathering #VAPT #Security
https://reconshell.com/searchmap-information-collection-tool/
#seearchmap #Scanning #Hacking #PenetrationTesting
#Bugbounty #InformationGathering #VAPT #Security
https://reconshell.com/searchmap-information-collection-tool/
Python Engineer Roadmap
#Python #Django #DataScience #Programming
#Pentester #Hacking #SQL #Books #Frameworks
https://reconshell.com/python-engineer-roadmap/
#Python #Django #DataScience #Programming
#Pentester #Hacking #SQL #Books #Frameworks
https://reconshell.com/python-engineer-roadmap/
Penetration Testing Tools, ML and Linux Tutorials
Python Engineer Roadmap - Penetration Testing Tools, ML and Linux Tutorials
Python can be used in a lot of computer science fields. In this repository, we have put together resources for each field of computer science that are related
RedTeam Physical Tools
#RedTeam #Security #RFID #RAT #RubberDucky
#Keyloggers #WiFi #Hacking #bugbounty #VAPT
#Malware #Exploit #Pentesting #CyberSecurity
https://reconshell.com/redteam-physical-tools/
#RedTeam #Security #RFID #RAT #RubberDucky
#Keyloggers #WiFi #Hacking #bugbounty #VAPT
#Malware #Exploit #Pentesting #CyberSecurity
https://reconshell.com/redteam-physical-tools/
Penetration Testing Tools, ML and Linux Tutorials
RedTeam Physical Tools - Penetration Testing Tools, ML and Linux Tutorials
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.