Scavenger - Crawler searching for credential leaks on paste sites
#Scavenger #OSINT #Crawler #SQLdumps
https://reconshell.com/scavenger-crawler-searching-for-credential-leaks-on-paste-sites/
#Scavenger #OSINT #Crawler #SQLdumps
https://reconshell.com/scavenger-crawler-searching-for-credential-leaks-on-paste-sites/
Penetration Testing Tools, ML and Linux Tutorials
Scavenger - Crawler searching for credential leaks on paste sites - Penetration Testing Tools, ML and Linux Tutorials
Just the code of my OSINT bot searching for sensitive data leaks on paste sites.
Difference between Full stack developer and Software developer
#FullStackDeveloper #StackDeveloper #Developer
https://reconshell.com/difference-between-full-stack-developer-and-software-developer/
#FullStackDeveloper #StackDeveloper #Developer
https://reconshell.com/difference-between-full-stack-developer-and-software-developer/
Penetration Testing Tools, ML and Linux Tutorials
Difference between Full stack developer and Software developer - Penetration Testing Tools, ML and Linux Tutorials
Should I become a software developer or a full stack developer? This is the most frequent question that comes to the mind of every student? To know the
CVE-2021-33514
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application
https://cve.reconshell.com/cve/CVE-2021-33514
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application
https://cve.reconshell.com/cve/CVE-2021-33514
msldap - LDAP library for auditing MS AD
#kerberos #LDAP #AD #KERBEROS #SOCKS5
https://reconshell.com/msldap-ldap-library-for-auditing-ms-ad/
#kerberos #LDAP #AD #KERBEROS #SOCKS5
https://reconshell.com/msldap-ldap-library-for-auditing-ms-ad/
Penetration Testing Tools, ML and Linux Tutorials
msldap - LDAP library for auditing MS AD - Penetration Testing Tools, ML and Linux Tutorials
LDAP library for MS AD
OffensivePH - Post Exploitation Tool
#PostExploitation #OffensivePH #Exploitation
#Hacking #shellcode #Hacker
https://reconshell.com/offensiveph-post-exploitation-tool/
#PostExploitation #OffensivePH #Exploitation
#Hacking #shellcode #Hacker
https://reconshell.com/offensiveph-post-exploitation-tool/
Important Docker Commands for Software Developers
#Docker #virtualization #Commands #SoftwareDevelopers #DevOps
https://reconshell.com/important-docker-commands-for-software-developers/
#Docker #virtualization #Commands #SoftwareDevelopers #DevOps
https://reconshell.com/important-docker-commands-for-software-developers/
Penetration Testing Tools, ML and Linux Tutorials
Important Docker Commands for Software Developers - Penetration Testing Tools, ML and Linux Tutorials
Docker has taken the world by storm since its inception in 2013. If you’re an experienced programmer crafting innovation using modern-day stacks, chance are
IPED Digital Forensic Tool
#Forensic #ForensicTool #IPED #DigitalForensic
https://reconshell.com/iped-digital-forensic-tool/
#Forensic #ForensicTool #IPED #DigitalForensic
https://reconshell.com/iped-digital-forensic-tool/
Penetration Testing Tools, ML and Linux Tutorials
IPED Digital Forensic Tool - Penetration Testing Tools, ML and Linux Tutorials
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law
Best Linux Commands Cheat Sheet For Linux Admin
#Linux #Bash #Shell #Unix #LinuxCheatSheet
https://reconshell.com/best-linux-commands-cheat-sheet-for-linux-admin/
#Linux #Bash #Shell #Unix #LinuxCheatSheet
https://reconshell.com/best-linux-commands-cheat-sheet-for-linux-admin/
Penetration Testing Tools, ML and Linux Tutorials
Best Linux Commands Cheat Sheet For Linux Admin - Penetration Testing Tools, ML and Linux Tutorials
There are thousands of Linux commands available for performing any task via the command-line interface. It’s challenging for Linux users to remember or
PwnLnX - Advanced python reverse shell for hacking
#Python #ReverseShell #Hacking #Payload #backdoor
https://reconshell.com/pwnlnx-advanced-python-reverse-shell-for-hacking/
#Python #ReverseShell #Hacking #Payload #backdoor
https://reconshell.com/pwnlnx-advanced-python-reverse-shell-for-hacking/
Common Vulnerabilities and Exposures
Start your journey With free Vulnerability Search engine
See More : https://cve.reconshell.com/
Start your journey With free Vulnerability Search engine
See More : https://cve.reconshell.com/
PoisonApple – macOS persistence tool
#CyberThreat #macOSsecurity #ThreatHunters #macOS
https://reconshell.com/poisonapple-macos-persistence-tool/
#CyberThreat #macOSsecurity #ThreatHunters #macOS
https://reconshell.com/poisonapple-macos-persistence-tool/
HostOnion - Host A Hidden Service on TOR
#HostOnion #TOR #Darkweb #Termux #Shell
https://reconshell.com/hostonion-host-a-hidden-service-on-tor/
#HostOnion #TOR #Darkweb #Termux #Shell
https://reconshell.com/hostonion-host-a-hidden-service-on-tor/
Common Vulnerabilities and Exposures
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Best PHP Frameworks for Modern Developers
#PHP #PHPframeworks #Developers #Laravel #Symfony #YII
https://reconshell.com/best-php-frameworks-for-modern-developers/
#PHP #PHPframeworks #Developers #Laravel #Symfony #YII
https://reconshell.com/best-php-frameworks-for-modern-developers/
Penetration Testing Tools, ML and Linux Tutorials
Best PHP Frameworks for Modern Developers - Penetration Testing Tools, ML and Linux Tutorials
Programming languages encompass the tech world, and we, living in the 21st century, are seeing a historical change. As we all know, these languages are widely
SYNwall – A zero-configuration (IoT) firewall
#Firewall #IoT #Linux #SYNwall
https://reconshell.com/synwall-a-zero-configuration-iot-firewall/
#Firewall #IoT #Linux #SYNwall
https://reconshell.com/synwall-a-zero-configuration-iot-firewall/
Penetration Testing Tools, ML and Linux Tutorials
SYNwall - A zero-configuration (IoT) firewall - Penetration Testing Tools, ML and Linux Tutorials
SYNwall is a project built (for the time being) as a Linux Kernel Module, to implement a transparent and no-config/no-maintenance firewall.
pwn Jenkins - attacking Jenkins servers
#Jenkins #RCE #ReverseShell #Deserialization #CVE
https://reconshell.com/pwn-jenkins-attacking-jenkins-servers/
#Jenkins #RCE #ReverseShell #Deserialization #CVE
https://reconshell.com/pwn-jenkins-attacking-jenkins-servers/
Penetration Testing Tools, ML and Linux Tutorials
pwn Jenkins - attacking Jenkins servers - Penetration Testing Tools, ML and Linux Tutorials
Jenkins Advisory
Best NodeJS Frameworks For Developers
#NodeJS #JS #JavaScript #Developers #Java
https://reconshell.com/best-nodejs-frameworks-for-developers/
#NodeJS #JS #JavaScript #Developers #Java
https://reconshell.com/best-nodejs-frameworks-for-developers/
Penetration Testing Tools, ML and Linux Tutorials
Best NodeJS Frameworks For Developers - Penetration Testing Tools, ML and Linux Tutorials
Over the past few years, the use of web applications has increased to a vast extent. Developers have been looking for such a platform that is both advanced
BadOutlook - Malicious Outlook Reader
#Shellcode #C2 #Microsoft #Outlook
https://reconshell.com/badoutlook-malicious-outlook-reader/
#Shellcode #C2 #Microsoft #Outlook
https://reconshell.com/badoutlook-malicious-outlook-reader/
Penetration Testing Tools, ML and Linux Tutorials
BadOutlook - Malicious Outlook Reader - Penetration Testing Tools, ML and Linux Tutorials
A simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based on a specific trigger subject line.
Best Raspberry Pi 4 Projects For Pi Enthusiasts
#Raspberry #Pi #Pi-Hole #NASserver #PiHacking
https://reconshell.com/best-raspberry-pi-4-projects-for-pi-enthusiasts/
#Raspberry #Pi #Pi-Hole #NASserver #PiHacking
https://reconshell.com/best-raspberry-pi-4-projects-for-pi-enthusiasts/
Penetration Testing Tools, ML and Linux Tutorials
Best Raspberry Pi 4 Projects For Pi Enthusiasts - Penetration Testing Tools, ML and Linux Tutorials
Since its release, the Raspberry Pi 4 has been getting a lot of attention from hobbyists because of the noteworthy changes it came with. The CPU got more
PostgreSQL CREATE TRIGGER
#PostgreSQL #SQL #PLSQL #PGSQL #Database
https://reconshell.com/postgresql-create-trigger/
#PostgreSQL #SQL #PLSQL #PGSQL #Database
https://reconshell.com/postgresql-create-trigger/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL CREATE TRIGGER - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to use the PostgreSQL CREATE TRIGGER statement to create a trigger.