Best PHP Frameworks for Modern Developers
#PHP #PHPframeworks #Developers #Laravel #Symfony #YII
https://reconshell.com/best-php-frameworks-for-modern-developers/
#PHP #PHPframeworks #Developers #Laravel #Symfony #YII
https://reconshell.com/best-php-frameworks-for-modern-developers/
Penetration Testing Tools, ML and Linux Tutorials
Best PHP Frameworks for Modern Developers - Penetration Testing Tools, ML and Linux Tutorials
Programming languages encompass the tech world, and we, living in the 21st century, are seeing a historical change. As we all know, these languages are widely
SYNwall – A zero-configuration (IoT) firewall
#Firewall #IoT #Linux #SYNwall
https://reconshell.com/synwall-a-zero-configuration-iot-firewall/
#Firewall #IoT #Linux #SYNwall
https://reconshell.com/synwall-a-zero-configuration-iot-firewall/
Penetration Testing Tools, ML and Linux Tutorials
SYNwall - A zero-configuration (IoT) firewall - Penetration Testing Tools, ML and Linux Tutorials
SYNwall is a project built (for the time being) as a Linux Kernel Module, to implement a transparent and no-config/no-maintenance firewall.
pwn Jenkins - attacking Jenkins servers
#Jenkins #RCE #ReverseShell #Deserialization #CVE
https://reconshell.com/pwn-jenkins-attacking-jenkins-servers/
#Jenkins #RCE #ReverseShell #Deserialization #CVE
https://reconshell.com/pwn-jenkins-attacking-jenkins-servers/
Penetration Testing Tools, ML and Linux Tutorials
pwn Jenkins - attacking Jenkins servers - Penetration Testing Tools, ML and Linux Tutorials
Jenkins Advisory
Best NodeJS Frameworks For Developers
#NodeJS #JS #JavaScript #Developers #Java
https://reconshell.com/best-nodejs-frameworks-for-developers/
#NodeJS #JS #JavaScript #Developers #Java
https://reconshell.com/best-nodejs-frameworks-for-developers/
Penetration Testing Tools, ML and Linux Tutorials
Best NodeJS Frameworks For Developers - Penetration Testing Tools, ML and Linux Tutorials
Over the past few years, the use of web applications has increased to a vast extent. Developers have been looking for such a platform that is both advanced
BadOutlook - Malicious Outlook Reader
#Shellcode #C2 #Microsoft #Outlook
https://reconshell.com/badoutlook-malicious-outlook-reader/
#Shellcode #C2 #Microsoft #Outlook
https://reconshell.com/badoutlook-malicious-outlook-reader/
Penetration Testing Tools, ML and Linux Tutorials
BadOutlook - Malicious Outlook Reader - Penetration Testing Tools, ML and Linux Tutorials
A simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based on a specific trigger subject line.
Best Raspberry Pi 4 Projects For Pi Enthusiasts
#Raspberry #Pi #Pi-Hole #NASserver #PiHacking
https://reconshell.com/best-raspberry-pi-4-projects-for-pi-enthusiasts/
#Raspberry #Pi #Pi-Hole #NASserver #PiHacking
https://reconshell.com/best-raspberry-pi-4-projects-for-pi-enthusiasts/
Penetration Testing Tools, ML and Linux Tutorials
Best Raspberry Pi 4 Projects For Pi Enthusiasts - Penetration Testing Tools, ML and Linux Tutorials
Since its release, the Raspberry Pi 4 has been getting a lot of attention from hobbyists because of the noteworthy changes it came with. The CPU got more
PostgreSQL CREATE TRIGGER
#PostgreSQL #SQL #PLSQL #PGSQL #Database
https://reconshell.com/postgresql-create-trigger/
#PostgreSQL #SQL #PLSQL #PGSQL #Database
https://reconshell.com/postgresql-create-trigger/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL CREATE TRIGGER - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to use the PostgreSQL CREATE TRIGGER statement to create a trigger.
Common Vulnerabilities and Exposures
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
How to Install Dotnet Core on Linux Distributions
#Dotnet #DotnetCore #Linux #Microsoft
https://reconshell.com/how-to-install-dotnet-core-on-linux-distributions/
#Dotnet #DotnetCore #Linux #Microsoft
https://reconshell.com/how-to-install-dotnet-core-on-linux-distributions/
Penetration Testing Tools, ML and Linux Tutorials
How to Install Dotnet Core on Linux Distributions - Penetration Testing Tools, ML and Linux Tutorials
Software developers often need to use the Dotnet core framework on the Linux system to test, run, and build the packages. The notion of using Dotnet on Linux
AnalyticsRelationships - Get related domains and subdomains
#DomainRelationShips #subdomains #GoogleAnalytics
https://reconshell.com/analyticsrelationships-get-related-domains-and-subdomains/
#DomainRelationShips #subdomains #GoogleAnalytics
https://reconshell.com/analyticsrelationships-get-related-domains-and-subdomains/
Penetration Testing Tools, ML and Linux Tutorials
AnalyticsRelationships - Get related domains and subdomains - Penetration Testing Tools, ML and Linux Tutorials
This script try to get related domains / subdomains by looking at Google Analytics IDs from a URL. First search for ID of Google Analytics in the webpage and
CheeseTools – Tools for Lateral Movement and Code Execution
#PowerShellInjector #CodeExecution #PsExec
https://reconshell.com/cheesetools-tools-for-lateral-movement-and-code-execution/
#PowerShellInjector #CodeExecution #PsExec
https://reconshell.com/cheesetools-tools-for-lateral-movement-and-code-execution/
Penetration Testing Tools, ML and Linux Tutorials
CheeseTools - Tools for Lateral Movement and Code Execution - Penetration Testing Tools, ML and Linux Tutorials
This repository has been made basing onto the already existing MiscTool, so big shout-out to rasta-mouse for releasing them and for giving me the right
Best Network Inventory Software for Linux
#DNS #Servers #Linux #Network #NetworkInventorySoftware
https://reconshell.com/best-network-inventory-software-for-linux/
#DNS #Servers #Linux #Network #NetworkInventorySoftware
https://reconshell.com/best-network-inventory-software-for-linux/
Penetration Testing Tools, ML and Linux Tutorials
Best Network Inventory Software for Linux - Penetration Testing Tools, ML and Linux Tutorials
Network inventory software refers to the online tools, which deal with the hardware and software resources of a network, including the operational issues.
Red-Kube – Red Team K8S Adversary Emulation Based on kubectl
#Exfiltration #PrivilegeEscalation #kubectl #RedTeam #Kubernetes
https://reconshell.com/red-kube-red-team-k8s-adversary-emulation-based-on-kubectl/
#Exfiltration #PrivilegeEscalation #kubectl #RedTeam #Kubernetes
https://reconshell.com/red-kube-red-team-k8s-adversary-emulation-based-on-kubectl/
Penetration Testing Tools, ML and Linux Tutorials
Red-Kube - Red Team K8S Adversary Emulation Based on kubectl - Penetration Testing Tools, ML and Linux Tutorials
Red Kube is a collection of kubectl commands written to evaluate the security posture of Kubernetes clusters from the attacker's perspective.
Squalr - Game Hacking Tool Written in C#
#scanning #Debugging #Hacking #Game #Squalr
https://reconshell.com/squalr-game-hacking-tool-written-in-c/
#scanning #Debugging #Hacking #Game #Squalr
https://reconshell.com/squalr-game-hacking-tool-written-in-c/
CVE-2020-36007
AppCMS 2.0.101 in /admin/template/tpl_app.php has a cross site scripting attack vulnerability which allows the attacker to obtain sensitive information of other users.
https://cve.reconshell.com/cve/CVE-2020-36007
AppCMS 2.0.101 in /admin/template/tpl_app.php has a cross site scripting attack vulnerability which allows the attacker to obtain sensitive information of other users.
https://cve.reconshell.com/cve/CVE-2020-36007
Useful Docker Volume Command Examples for Modern Developers
#DockerVolume #Developers #Docker #DockerCommands
https://reconshell.com/useful-docker-volume-command-examples-for-modern-developers
#DockerVolume #Developers #Docker #DockerCommands
https://reconshell.com/useful-docker-volume-command-examples-for-modern-developers
Penetration Testing Tools, ML and Linux Tutorials
Useful Docker Volume Command Examples for Modern Developers - Penetration Testing Tools, ML and Linux Tutorials
Docker has changed the way we package our programs since its emergence in 2013. It allows developers to build cutting edge software with minimal dependencies
SECMON - Automation Tool For Infosec And Vulnerability Management
#vulnerabilities #cybersecurity #CVE #Infosec #SECMON
https://reconshell.com/secmon-automation-tool-for-infosec-and-vulnerability-management/
#vulnerabilities #cybersecurity #CVE #Infosec #SECMON
https://reconshell.com/secmon-automation-tool-for-infosec-and-vulnerability-management/
xsshunter-express find blind cross-site scripting vulnerabilities
#XSS #XSSpayload #XSSHunter #payload #Vulnerabilities
https://reconshell.com/xsshunter-express-find-blind-cross-site-scripting-vulnerabilities/
#XSS #XSSpayload #XSSHunter #payload #Vulnerabilities
https://reconshell.com/xsshunter-express-find-blind-cross-site-scripting-vulnerabilities/
Cursor in PostgreSQL
#PostgreSQL #SQL #plSQL #MySQL #pgSQL #Cursor
https://reconshell.com/cursor-in-postgresql/
#PostgreSQL #SQL #plSQL #MySQL #pgSQL #Cursor
https://reconshell.com/cursor-in-postgresql/
Penetration Testing Tools, ML and Linux Tutorials
Cursor in PostgreSQL - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn about the PL/pgSQL Cursors and how to use them to process a result set, row by row.