rustcat – Netcat Alternative
#Netcat #rustcat #PortListener
https://reconshell.com/rustcat-netcat-alternative/
#Netcat #rustcat #PortListener
https://reconshell.com/rustcat-netcat-alternative/
Best Cloud Computing Books
#Cloud #CloudSecurity #Books #CloudComputing
https://reconshell.com/best-cloud-computing-books/
#Cloud #CloudSecurity #Books #CloudComputing
https://reconshell.com/best-cloud-computing-books/
charlotte – fully undetected shellcode launcher
#shellcode #msfvenom #XOR #ShellcodeLauncher #CobaltStrike #Payload
https://reconshell.com/charlotte-fully-undetected-shellcode-launcher/
#shellcode #msfvenom #XOR #ShellcodeLauncher #CobaltStrike #Payload
https://reconshell.com/charlotte-fully-undetected-shellcode-launcher/
CVE-2021-32823
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability.
https://cve.reconshell.com/cve/CVE-2021-32823
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability.
https://cve.reconshell.com/cve/CVE-2021-32823
PostgreSQL Drop Procedure
#PostgreSQL #SQL #PGSQL #PSQL #MySQL
https://reconshell.com/postgresql-drop-procedure/
#PostgreSQL #SQL #PGSQL #PSQL #MySQL
https://reconshell.com/postgresql-drop-procedure/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL Drop Procedure - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to use the PostgreSQL drop procedure statement to remove a procedure.
Lockdoor Framework - A Penetration Testing framework
#VAPT #WebHacking #PrivilegeEscalation #Exploitation
#ReverseEngineering #SocialEngineering #InformationGathering
https://reconshell.com/lockdoor-framework-a-penetration-testing-framework/
#VAPT #WebHacking #PrivilegeEscalation #Exploitation
#ReverseEngineering #SocialEngineering #InformationGathering
https://reconshell.com/lockdoor-framework-a-penetration-testing-framework/
CVE-2021-22347
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS.
https://cve.reconshell.com/cve/CVE-2021-22347
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS.
https://cve.reconshell.com/cve/CVE-2021-22347
Wconsole - Script for Windows Penetration Testing
#Windows #PenetrationTesting #Enumeration #VAPT
https://reconshell.com/wconsole-script-for-windows-penetration-testing/
#Windows #PenetrationTesting #Enumeration #VAPT
https://reconshell.com/wconsole-script-for-windows-penetration-testing/
Penetration Testing Tools, ML and Linux Tutorials
Wconsole - Script for Windows Penetration Testing - Penetration Testing Tools, ML and Linux Tutorials
it's in simbaly words its collection of commands for check OS Version,Configuration and Enumeration it's not knife swiss army but it's Hand-Script for
JSA - Javascript security analysis
#JS #Javascript #AttackSurface #Exploit #vulnerabilities
https://reconshell.com/jsa-javascript-security-analysis/
#JS #Javascript #AttackSurface #Exploit #vulnerabilities
https://reconshell.com/jsa-javascript-security-analysis/
Penetration Testing Tools, ML and Linux Tutorials
JSA - Javascript security analysis - Penetration Testing Tools, ML and Linux Tutorials
Example for pulling out js files and processing:
RomBuster - router exploitation tool
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
Twitter OSiNT investigation using twint
#CyberSecurity #Twitter #OSINT #Hacking #InformationSecurity
https://reconshell.com/tw1tter0s1nt-twitter-osint-investigation-using-twint/
#CyberSecurity #Twitter #OSINT #Hacking #InformationSecurity
https://reconshell.com/tw1tter0s1nt-twitter-osint-investigation-using-twint/
Penetration Testing Tools, ML and Linux Tutorials
tw1tter0s1nt - Twitter OSiNT investigation using twint - Penetration Testing Tools, ML and Linux Tutorials
CURRENT VERSION --> twosint 2.0.3
Best Arch-based Linux Distros
#ArchLinux #Linux #BlackArch #ManjaroLinux
https://reconshell.com/best-arch-based-linux-distros/
#ArchLinux #Linux #BlackArch #ManjaroLinux
https://reconshell.com/best-arch-based-linux-distros/
Penetration Testing Tools, ML and Linux Tutorials
Best Arch-based Linux Distros - Penetration Testing Tools, ML and Linux Tutorials
Finally, I’ve decided to make a list of the best Arch-based Linux distros I’ve used and tried so far. I was a full-time Debian user. And, because I am a
Best Voice Changer Apps for Android
#VoiceChange #Android #AndroidApps
https://reconshell.com/best-voice-changer-apps-for-android/
#VoiceChange #Android #AndroidApps
https://reconshell.com/best-voice-changer-apps-for-android/
Penetration Testing Tools, ML and Linux Tutorials
Best Voice Changer Apps for Android - Penetration Testing Tools, ML and Linux Tutorials
To call your friends without revealing your identity for a prank, the only thing that will come to your mind is to have an unknown phone number. But that’s
FisherMan – extract information from Facebook profiles
#InformationGathering #OSINT #Facebook
https://reconshell.com/fisherman-extract-information-from-facebook-profiles/
#InformationGathering #OSINT #Facebook
https://reconshell.com/fisherman-extract-information-from-facebook-profiles/
Penetration Testing Tools, ML and Linux Tutorials
FisherMan - extract information from Facebook profiles - Penetration Testing Tools, ML and Linux Tutorials
A tool to extract information from Facebook profiles
Genisys - Telegram Members Scraping
#Telegram #Genisys #Scraping
https://reconshell.com/genisys-telegram-members-scraping/
#Telegram #Genisys #Scraping
https://reconshell.com/genisys-telegram-members-scraping/
Penetration Testing Tools, ML and Linux Tutorials
Genisys - Telegram Members Scraping - Penetration Testing Tools, ML and Linux Tutorials
Suggestion: It is better to add by ID because if you add by username only users having usernames will be added. Moreover, it is slow
Best Rust Programming Books
#RustProgramming #ProgrammingBooks #Books #Ebooks #Rust
https://reconshell.com/best-rust-programming-books/
#RustProgramming #ProgrammingBooks #Books #Ebooks #Rust
https://reconshell.com/best-rust-programming-books/
Penetration Testing Tools, ML and Linux Tutorials
Best Rust Programming Books - Penetration Testing Tools, ML and Linux Tutorials
Rust is a language that engages everybody to construct dependable and productive software. Rust is an open-source framework programming language. What Rust
red shadow - Lightspin AWS Vulnerability Scanner
#PrivilegeEscalation #exploit #Exploitation #AWS
#Vulnerability #Scanner
https://reconshell.com/red-shadow-lightspin-aws-vulnerability-scanner/
#PrivilegeEscalation #exploit #Exploitation #AWS
#Vulnerability #Scanner
https://reconshell.com/red-shadow-lightspin-aws-vulnerability-scanner/
IPDump - python utility to generate a report for any hostname
#IPDump #Portscanning #Geolocation #WHOIS
https://reconshell.com/ipdump-python-utility-to-generate-a-report-for-any-hostname/
#IPDump #Portscanning #Geolocation #WHOIS
https://reconshell.com/ipdump-python-utility-to-generate-a-report-for-any-hostname/
Penetration Testing Tools, ML and Linux Tutorials
IPDump - python utility to generate a report for any hostname - Penetration Testing Tools, ML and Linux Tutorials
To use IPDump, you will need Python 3.
Linux Post Exploitation Framework
#Shellode #RCE #ReverseProxy #metasploit #NetworkScanner #C2
https://reconshell.com/emp3r0r-linux-post-exploitation-framework/
#Shellode #RCE #ReverseProxy #metasploit #NetworkScanner #C2
https://reconshell.com/emp3r0r-linux-post-exploitation-framework/
powerHub - post exploitation tool based on a web application
#PowerHub #PowerSploit #PowerView #Kerberos #LPE #PowerShell
https://reconshell.com/powerhub-post-exploitation-tool-based-on-a-web-application/
#PowerHub #PowerSploit #PowerView #Kerberos #LPE #PowerShell
https://reconshell.com/powerhub-post-exploitation-tool-based-on-a-web-application/