CTFTOOL – Interactive CTF Exploration Tool
#CTFTOOL #CTF #Exploit
https://reconshell.com/ctftool-interactive-ctf-exploration-tool/
#CTFTOOL #CTF #Exploit
https://reconshell.com/ctftool-interactive-ctf-exploration-tool/
Penetration Testing Tools, ML and Linux Tutorials
CTFTOOL - Interactive CTF Exploration Tool - Penetration Testing Tools, ML and Linux Tutorials
This is ctftool, an interactive command line tool to experiment with CTF, a little-known protocol used on Windows to implement Text Services. This might be
Python Cheat sheet for hackers and developers
#Python #hackers #developers #artificialintelligence #machinelearning
https://upurl.me/c10d9
#Python #hackers #developers #artificialintelligence #machinelearning
https://upurl.me/c10d9
Penetration Testing Tools, ML and Linux Tutorials
Python Cheat sheet for hackers and developers - Penetration Testing Tools, ML and Linux Tutorials
This cheat sheet is about Python. It is one of the most used high-level programming languages. Most coders prefer using Python for developing
XSS-Freak – Cross Site Scripting scanner
#XSS #XSSFreak #XSSscanner #XSSPayloads
https://reconshell.com/xss-freak-cross-site-scripting-scanner/
#XSS #XSSFreak #XSSscanner #XSSPayloads
https://reconshell.com/xss-freak-cross-site-scripting-scanner/
Penetration Testing Tools, ML and Linux Tutorials
XSS-Freak - Cross Site Scripting scanner - Penetration Testing Tools, ML and Linux Tutorials
XSS-Freak is one of its kind since it crawls the website for all possible links and directories to expand its attack scope. Then it searches them for input
CVE-2021-3007: Zend Framework Remote Code Execution Vulnerability
#RCE #ZendFramework #CVE-2021-3007 #Vulnerability
https://reconshell.com/cve-2021-3007-zend-framework-remote-code-execution-vulnerability/
#RCE #ZendFramework #CVE-2021-3007 #Vulnerability
https://reconshell.com/cve-2021-3007-zend-framework-remote-code-execution-vulnerability/
Penetration Testing Tools, ML and Linux Tutorials
CVE-2021-3007: Zend Framework Remote Code Execution Vulnerability - Penetration Testing Tools, ML and Linux Tutorials
“Zend Framework 3.0.0 has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to
hashcracker – python hash cracker
#hashcracker #hash #bruteforce #hashlist
https://reconshell.com/hashcracker-python-hash-cracker/
#hashcracker #hash #bruteforce #hashlist
https://reconshell.com/hashcracker-python-hash-cracker/
Penetration Testing Tools, ML and Linux Tutorials
hashcracker - python hash cracker - Penetration Testing Tools, ML and Linux Tutorials
Cracking a single hash with a password list:hashcracker.py SHA256 11a1162b984fef626ecc27c659a8b0eead5248ca867a6a87bea72f8a8706109d -mode list -pwlist
pytm A Pythonic framework for threat modelling
#pytm #ThreatModelling
https://reconshell.com/pytm-a-pythonic-framework-for-threat-modelling/
#pytm #ThreatModelling
https://reconshell.com/pytm-a-pythonic-framework-for-threat-modelling/
misp – A dashboard for a real-time overview of threat intelligence
#ThreatIntelligence #ThreatIntel #misp #Hacking
https://reconshell.com/misp-a-dashboard-for-a-real-time-overview-of-threat-intelligence/
#ThreatIntelligence #ThreatIntel #misp #Hacking
https://reconshell.com/misp-a-dashboard-for-a-real-time-overview-of-threat-intelligence/
Penetration Testing Tools, ML and Linux Tutorials
misp - A dashboard for a real-time overview of threat intelligence - Penetration Testing Tools, ML and Linux Tutorials
A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can be used as a real-time situational awareness
Raven – Linkedin Information Gathering Tool
#Raven #Linkedin #InformationGathering
https://reconshell.com/raven-linkedin-information-gathering-tool/
#Raven #Linkedin #InformationGathering
https://reconshell.com/raven-linkedin-information-gathering-tool/
Penetration Testing Tools, ML and Linux Tutorials
Raven - Linkedin Information Gathering Tool - Penetration Testing Tools, ML and Linux Tutorials
Raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.
Amazing Linux Crontab Commands For SysAdmins
#Linux #Crontab #SysAdmins #CronJob
https://reconshell.com/amazing-linux-crontab-commands-for-sysadmins/
#Linux #Crontab #SysAdmins #CronJob
https://reconshell.com/amazing-linux-crontab-commands-for-sysadmins/
Tunic – Install Linux from a running Windows system
#Tunic #Linux #Windows #BIOS
https://reconshell.com/tunic-install-linux-from-a-running-windows-system/
#Tunic #Linux #Windows #BIOS
https://reconshell.com/tunic-install-linux-from-a-running-windows-system/
Penetration Testing Tools, ML and Linux Tutorials
Tunic - Install Linux from a running Windows system - Penetration Testing Tools, ML and Linux Tutorials
Before you start, make sure to backup up an image of your entire disk(s). Tunic does not assist with full disk backup. Read disclaimer for more information.
Legion open source network penetration testing tool
#Legion #NetwordPentesting #NMAP #recon #nikto #Hydra
https://reconshell.com/legion-open-source-network-penetration-testing-tool/
#Legion #NetwordPentesting #NMAP #recon #nikto #Hydra
https://reconshell.com/legion-open-source-network-penetration-testing-tool/
Penetration Testing Tools, ML and Linux Tutorials
Legion - open source network penetration testing tool - Penetration Testing Tools, ML and Linux Tutorials
Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and
Machine Learning Course by Udacity
#MachineLearning #ML #Udacity #DataScience
https://reconshell.com/machine-learning-course-by-udacity/
#MachineLearning #ML #Udacity #DataScience
https://reconshell.com/machine-learning-course-by-udacity/
Penetration Testing Tools, ML and Linux Tutorials
Machine Learning Course by Udacity - Penetration Testing Tools, ML and Linux Tutorials
Machine Learning is one of the most popular and trending topics globally, and students are indulging themselves more and more in this field. To give you an
How to recognize and protect yourself against phishing scams
#SpearPhishing #Phishing #EmailPhishing
https://reconshell.com/how-to-recognize-and-protect-yourself-against-phishing-scams/
#SpearPhishing #Phishing #EmailPhishing
https://reconshell.com/how-to-recognize-and-protect-yourself-against-phishing-scams/
Penetration Testing Tools, ML and Linux Tutorials
How to recognize and protect yourself against phishing scams - Penetration Testing Tools, ML and Linux Tutorials
Cybercriminals use increasingly sophisticated methods to steal data and commit fraud. Yet, it’s often the most straightforward scams that prove most
Subrake A powerful Subdomain Scanner
#Subrake #SubdomainScanner
https://reconshell.com/subrake-a-powerful-subdomain-scanner/
#Subrake #SubdomainScanner
https://reconshell.com/subrake-a-powerful-subdomain-scanner/
Penetration Testing Tools, ML and Linux Tutorials
Subrake - A powerful Subdomain Scanner - Penetration Testing Tools, ML and Linux Tutorials
Subrake - A Powerful Subdomain Scanner & Validator Written in sockets and requests which makes it a lot more faster and easier to manage. It works by
CVE-2020-0688 Microsoft Exchange Remote Code Execution With POC
#CVE-2020-0688 #RCE #RemoteCodeExecution #Vulnerability #YSoSerial
https://reconshell.com/cve-2020-0688-microsoft-exchange-remote-code-execution-with-poc/
#CVE-2020-0688 #RCE #RemoteCodeExecution #Vulnerability #YSoSerial
https://reconshell.com/cve-2020-0688-microsoft-exchange-remote-code-execution-with-poc/
Obfuscapk – black-box obfuscation tool for Android apps
#Obfuscapk #Android #black-box #AndroidObfuscationTool
https://reconshell.com/obfuscapk-black-box-obfuscation-tool-for-android-apps/
#Obfuscapk #Android #black-box #AndroidObfuscationTool
https://reconshell.com/obfuscapk-black-box-obfuscation-tool-for-android-apps/
Penetration Testing Tools, ML and Linux Tutorials
Obfuscapk - black-box obfuscation tool for Android apps - Penetration Testing Tools, ML and Linux Tutorials
Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file
Jok3r v3 Network and Web Pentest Automation Framework
#Pentest #VulnerabilityScanning #ServerExploitation #CVE #CyberSecurity
https://reconshell.com/jok3r-v3-network-and-web-pentest-automation-framework/
#Pentest #VulnerabilityScanning #ServerExploitation #CVE #CyberSecurity
https://reconshell.com/jok3r-v3-network-and-web-pentest-automation-framework/
Penetration Testing Tools, ML and Linux Tutorials
Jok3r v3 - Network and Web Pentest Automation Framework - Penetration Testing Tools, ML and Linux Tutorials
Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests.
Memhunter Live Hunting Of Code Injection Techniques
#Memhunter #CodeInjection #Malware
https://reconshell.com/memhunter-live-hunting-of-code-injection-techniques/
#Memhunter #CodeInjection #Malware
https://reconshell.com/memhunter-live-hunting-of-code-injection-techniques/
Penetration Testing Tools, ML and Linux Tutorials
Memhunter - Live Hunting Of Code Injection Techniques - Penetration Testing Tools, ML and Linux Tutorials
Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and remediation times. The
Passer python sniffer that identifies servers, clients, names
#sniffer #ettercap #Nmap #wireshark #ArpScan
https://reconshell.com/passer-python-sniffer-that-identifies-servers-clients-names/
#sniffer #ettercap #Nmap #wireshark #ArpScan
https://reconshell.com/passer-python-sniffer-that-identifies-servers-clients-names/
Penetration Testing Tools, ML and Linux Tutorials
Passer - python sniffer that identifies servers, clients, names - Penetration Testing Tools, ML and Linux Tutorials
Passer can work off a live packet capture or from a pcap file (command line parameter, see examples below). It reports live services and clients, ethernet