Burp Suite Extension for AWS Signing
#AWSSigner #AWS #BurpSuite #Hacking #BugBounty
#VAPT #Pentesting #Exploit #Malware #Bughunter
https://reconshell.com/burp-suite-extension-for-aws-signing/
#AWSSigner #AWS #BurpSuite #Hacking #BugBounty
#VAPT #Pentesting #Exploit #Malware #Bughunter
https://reconshell.com/burp-suite-extension-for-aws-signing/
Online Tools For OSINT
#OSINT #Hacking #recon #Bugbounty #SocialMedia
#Vulnerabilities #Pentest #SearchEngines #Leaks
https://reconshell.com/online-tools-for-osint/
#OSINT #Hacking #recon #Bugbounty #SocialMedia
#Vulnerabilities #Pentest #SearchEngines #Leaks
https://reconshell.com/online-tools-for-osint/
Penetration Testing Tools, ML and Linux Tutorials
Online Tools For OSINT - Penetration Testing Tools, ML and Linux Tutorials
Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the links
Maltego Transforms List
#Maltego #OSINT #NMAP #MITRE #ATT&CK #Hacking
#Bugbounty #InformationGathering #Scanner #Recon
https://reconshell.com/maltego-transforms-list/
#Maltego #OSINT #NMAP #MITRE #ATT&CK #Hacking
#Bugbounty #InformationGathering #Scanner #Recon
https://reconshell.com/maltego-transforms-list/
Penetration Testing Tools, ML and Linux Tutorials
Maltego Transforms List - Penetration Testing Tools, ML and Linux Tutorials
Maltego - one of most famous graphical analyze tool for OSINT. There is list of tools that handle different data and make it usable in Maltego:
CVE-2022-25262 JetBrains SAML response takeover
#CVE-2022-25262 #Vulnerability #JetBrains #CVE
#Exploit #Hacking #Malware #Bugbounty #VAPT
https://reconshell.com/cve-2022-25262-jetbrains-hub-saml-response-takeover/
#CVE-2022-25262 #Vulnerability #JetBrains #CVE
#Exploit #Hacking #Malware #Bugbounty #VAPT
https://reconshell.com/cve-2022-25262-jetbrains-hub-saml-response-takeover/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2022-25262 JetBrains Hub SAML response takeover - Penetration Testing Tools, ML and Linux Tutorials
PoC + vulnerability details for CVE-2022-25262 | JetBrains Hub single-click SAML response takeover
Azure Architecture
#Microsoft #Azure #AzureSecurity #DevOps #Cloud
#SQL #Database #PowerShell #Architecture #Linux
https://reconshell.com/azure-architecture/
#Microsoft #Azure #AzureSecurity #DevOps #Cloud
#SQL #Database #PowerShell #Architecture #Linux
https://reconshell.com/azure-architecture/
Penetration Testing Tools, ML and Linux Tutorials
Azure Architecture - Penetration Testing Tools, ML and Linux Tutorials
This list contains anything that can help with your Microsoft Azure architecture and quickly get you up and running when designing, planning, and implementing
Default Credentials Cheat Sheet
#BlueTeam #RedTeam #Routersploit #OWASP #Pentesting
#Security #Seclists #Hacking #Bugbounty #Router #VAPT
#DefaultPasswordList #changeme #Exploit #Cyber #Malware
https://reconshell.com/default-credentials-cheat-sheet/
#BlueTeam #RedTeam #Routersploit #OWASP #Pentesting
#Security #Seclists #Hacking #Bugbounty #Router #VAPT
#DefaultPasswordList #changeme #Exploit #Cyber #Malware
https://reconshell.com/default-credentials-cheat-sheet/
Penetration Testing Tools, ML and Linux Tutorials
Default Credentials Cheat Sheet - Penetration Testing Tools, ML and Linux Tutorials
noraj created CLI & library to search for default credentials among this database using DefaultCreds-Cheat-Sheet.csv. The tool is
reconDNS Tool For Cybersecurity professionals
#reconDNS #CyberSecurity #XSS #SSRF #SQLi #Fuzzing #DNS
#OSINT #Recon #Hacking #Bugbounty #Vulnerability #VAPT
#Enumeration #Pentesting #Malware #Exploit #Nuclei
https://reconshell.com/recondns-tool-for-cybersecurity-professionals/
#reconDNS #CyberSecurity #XSS #SSRF #SQLi #Fuzzing #DNS
#OSINT #Recon #Hacking #Bugbounty #Vulnerability #VAPT
#Enumeration #Pentesting #Malware #Exploit #Nuclei
https://reconshell.com/recondns-tool-for-cybersecurity-professionals/
Penetration Testing Tools, ML and Linux Tutorials
reconDNS Tool For Cybersecurity professionals - Penetration Testing Tools, ML and Linux Tutorials
reconDNS automates the entire process of reconnaisance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and
Malicious PDF Generator
#MaliciousPDF #PenetrationTesting #RedTeaming
#BurpSuite #BlackHat #Hacking #Malware #VAPT
https://reconshell.com/malicious-pdf-generator/
#MaliciousPDF #PenetrationTesting #RedTeaming
#BurpSuite #BlackHat #Hacking #Malware #VAPT
https://reconshell.com/malicious-pdf-generator/
Penetration Testing Tools, ML and Linux Tutorials
Malicious PDF Generator - Penetration Testing Tools, ML and Linux Tutorials
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
RedTeam and Penetration Testing Checklist
#RedTeam #PenetrationTesting #Recon #BOF #bloodhound
#Enumeration #Hacking #Bugbounty #LateralMovement
#SECURITY #phishing #CobaltStrike #Shell #Exploit
https://reconshell.com/redteam-and-penetration-testing-checklist/
#RedTeam #PenetrationTesting #Recon #BOF #bloodhound
#Enumeration #Hacking #Bugbounty #LateralMovement
#SECURITY #phishing #CobaltStrike #Shell #Exploit
https://reconshell.com/redteam-and-penetration-testing-checklist/
Penetration Testing Tools, ML and Linux Tutorials
RedTeam and Penetration Testing Checklist - Penetration Testing Tools, ML and Linux Tutorials
Not a definitive list, cheatsheet, or opsec safe by any means, just things of note....
SearchMap Information Collection Tool
#seearchmap #Scanning #Hacking #PenetrationTesting
#Bugbounty #InformationGathering #VAPT #Security
https://reconshell.com/searchmap-information-collection-tool/
#seearchmap #Scanning #Hacking #PenetrationTesting
#Bugbounty #InformationGathering #VAPT #Security
https://reconshell.com/searchmap-information-collection-tool/
Python Engineer Roadmap
#Python #Django #DataScience #Programming
#Pentester #Hacking #SQL #Books #Frameworks
https://reconshell.com/python-engineer-roadmap/
#Python #Django #DataScience #Programming
#Pentester #Hacking #SQL #Books #Frameworks
https://reconshell.com/python-engineer-roadmap/
Penetration Testing Tools, ML and Linux Tutorials
Python Engineer Roadmap - Penetration Testing Tools, ML and Linux Tutorials
Python can be used in a lot of computer science fields. In this repository, we have put together resources for each field of computer science that are related
RedTeam Physical Tools
#RedTeam #Security #RFID #RAT #RubberDucky
#Keyloggers #WiFi #Hacking #bugbounty #VAPT
#Malware #Exploit #Pentesting #CyberSecurity
https://reconshell.com/redteam-physical-tools/
#RedTeam #Security #RFID #RAT #RubberDucky
#Keyloggers #WiFi #Hacking #bugbounty #VAPT
#Malware #Exploit #Pentesting #CyberSecurity
https://reconshell.com/redteam-physical-tools/
Penetration Testing Tools, ML and Linux Tutorials
RedTeam Physical Tools - Penetration Testing Tools, ML and Linux Tutorials
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
The Firmware Security Analyzer
#PenetrationTesting #vulnerabilities #Security #VAPT
#Firmware #Bugbounty #Hacking #Exploit #Malware #EMBA
#CyberSecurity #Scanner #ReverseEngineering #Analyzer
https://reconshell.com/the-firmware-security-analyzer/
#PenetrationTesting #vulnerabilities #Security #VAPT
#Firmware #Bugbounty #Hacking #Exploit #Malware #EMBA
#CyberSecurity #Scanner #ReverseEngineering #Analyzer
https://reconshell.com/the-firmware-security-analyzer/
Penetration Testing Tools, ML and Linux Tutorials
The Firmware Security Analyzer - Penetration Testing Tools, ML and Linux Tutorials
EMBA is designed as the central firmware analysis tool for penetration testers. It supports the complete security analysis process starting with the firmware
XLL Phishing
#XLL #Phishing #Excel #macros #payload #Microsoft
#keylogger #Hacking #Malware #virus #APT #Security
https://reconshell.com/xll-phishing/
#XLL #Phishing #Excel #macros #payload #Microsoft
#keylogger #Hacking #Malware #virus #APT #Security
https://reconshell.com/xll-phishing/
Penetration Testing Tools, ML and Linux Tutorials
XLL Phishing - Penetration Testing Tools, ML and Linux Tutorials
XLL's are DLL's, specifically crafted for Microsoft Excel. To the untrained eye they look a lot like normal excel documents.
All Defense Tool
#vulnerability #AssetDiscovery #ThreatHunting #Exploit
#Scanner #Hacking #OSINT #Bugbounty #APT #AttackSurface
#PenetrationTesting #BountyHunters #Lateralmovement #VAPT
https://reconshell.com/all-defense-tool/
#vulnerability #AssetDiscovery #ThreatHunting #Exploit
#Scanner #Hacking #OSINT #Bugbounty #APT #AttackSurface
#PenetrationTesting #BountyHunters #Lateralmovement #VAPT
https://reconshell.com/all-defense-tool/
Penetration Testing Tools, ML and Linux Tutorials
All Defense Tool - Penetration Testing Tools, ML and Linux Tutorials
First of all congratulations on finding the treasure. This project integrates excellent offensive and defensive weapons projects in the whole network,