CVE-2021-32823
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability.
https://cve.reconshell.com/cve/CVE-2021-32823
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability.
https://cve.reconshell.com/cve/CVE-2021-32823
PostgreSQL Drop Procedure
#PostgreSQL #SQL #PGSQL #PSQL #MySQL
https://reconshell.com/postgresql-drop-procedure/
#PostgreSQL #SQL #PGSQL #PSQL #MySQL
https://reconshell.com/postgresql-drop-procedure/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL Drop Procedure - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to use the PostgreSQL drop procedure statement to remove a procedure.
Lockdoor Framework - A Penetration Testing framework
#VAPT #WebHacking #PrivilegeEscalation #Exploitation
#ReverseEngineering #SocialEngineering #InformationGathering
https://reconshell.com/lockdoor-framework-a-penetration-testing-framework/
#VAPT #WebHacking #PrivilegeEscalation #Exploitation
#ReverseEngineering #SocialEngineering #InformationGathering
https://reconshell.com/lockdoor-framework-a-penetration-testing-framework/
CVE-2021-22347
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS.
https://cve.reconshell.com/cve/CVE-2021-22347
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS.
https://cve.reconshell.com/cve/CVE-2021-22347
Wconsole - Script for Windows Penetration Testing
#Windows #PenetrationTesting #Enumeration #VAPT
https://reconshell.com/wconsole-script-for-windows-penetration-testing/
#Windows #PenetrationTesting #Enumeration #VAPT
https://reconshell.com/wconsole-script-for-windows-penetration-testing/
Penetration Testing Tools, ML and Linux Tutorials
Wconsole - Script for Windows Penetration Testing - Penetration Testing Tools, ML and Linux Tutorials
it's in simbaly words its collection of commands for check OS Version,Configuration and Enumeration it's not knife swiss army but it's Hand-Script for
JSA - Javascript security analysis
#JS #Javascript #AttackSurface #Exploit #vulnerabilities
https://reconshell.com/jsa-javascript-security-analysis/
#JS #Javascript #AttackSurface #Exploit #vulnerabilities
https://reconshell.com/jsa-javascript-security-analysis/
Penetration Testing Tools, ML and Linux Tutorials
JSA - Javascript security analysis - Penetration Testing Tools, ML and Linux Tutorials
Example for pulling out js files and processing:
RomBuster - router exploitation tool
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
Twitter OSiNT investigation using twint
#CyberSecurity #Twitter #OSINT #Hacking #InformationSecurity
https://reconshell.com/tw1tter0s1nt-twitter-osint-investigation-using-twint/
#CyberSecurity #Twitter #OSINT #Hacking #InformationSecurity
https://reconshell.com/tw1tter0s1nt-twitter-osint-investigation-using-twint/
Penetration Testing Tools, ML and Linux Tutorials
tw1tter0s1nt - Twitter OSiNT investigation using twint - Penetration Testing Tools, ML and Linux Tutorials
CURRENT VERSION --> twosint 2.0.3
Best Arch-based Linux Distros
#ArchLinux #Linux #BlackArch #ManjaroLinux
https://reconshell.com/best-arch-based-linux-distros/
#ArchLinux #Linux #BlackArch #ManjaroLinux
https://reconshell.com/best-arch-based-linux-distros/
Penetration Testing Tools, ML and Linux Tutorials
Best Arch-based Linux Distros - Penetration Testing Tools, ML and Linux Tutorials
Finally, I’ve decided to make a list of the best Arch-based Linux distros I’ve used and tried so far. I was a full-time Debian user. And, because I am a
Best Voice Changer Apps for Android
#VoiceChange #Android #AndroidApps
https://reconshell.com/best-voice-changer-apps-for-android/
#VoiceChange #Android #AndroidApps
https://reconshell.com/best-voice-changer-apps-for-android/
Penetration Testing Tools, ML and Linux Tutorials
Best Voice Changer Apps for Android - Penetration Testing Tools, ML and Linux Tutorials
To call your friends without revealing your identity for a prank, the only thing that will come to your mind is to have an unknown phone number. But that’s
FisherMan – extract information from Facebook profiles
#InformationGathering #OSINT #Facebook
https://reconshell.com/fisherman-extract-information-from-facebook-profiles/
#InformationGathering #OSINT #Facebook
https://reconshell.com/fisherman-extract-information-from-facebook-profiles/
Penetration Testing Tools, ML and Linux Tutorials
FisherMan - extract information from Facebook profiles - Penetration Testing Tools, ML and Linux Tutorials
A tool to extract information from Facebook profiles
Genisys - Telegram Members Scraping
#Telegram #Genisys #Scraping
https://reconshell.com/genisys-telegram-members-scraping/
#Telegram #Genisys #Scraping
https://reconshell.com/genisys-telegram-members-scraping/
Penetration Testing Tools, ML and Linux Tutorials
Genisys - Telegram Members Scraping - Penetration Testing Tools, ML and Linux Tutorials
Suggestion: It is better to add by ID because if you add by username only users having usernames will be added. Moreover, it is slow
Best Rust Programming Books
#RustProgramming #ProgrammingBooks #Books #Ebooks #Rust
https://reconshell.com/best-rust-programming-books/
#RustProgramming #ProgrammingBooks #Books #Ebooks #Rust
https://reconshell.com/best-rust-programming-books/
Penetration Testing Tools, ML and Linux Tutorials
Best Rust Programming Books - Penetration Testing Tools, ML and Linux Tutorials
Rust is a language that engages everybody to construct dependable and productive software. Rust is an open-source framework programming language. What Rust
red shadow - Lightspin AWS Vulnerability Scanner
#PrivilegeEscalation #exploit #Exploitation #AWS
#Vulnerability #Scanner
https://reconshell.com/red-shadow-lightspin-aws-vulnerability-scanner/
#PrivilegeEscalation #exploit #Exploitation #AWS
#Vulnerability #Scanner
https://reconshell.com/red-shadow-lightspin-aws-vulnerability-scanner/
IPDump - python utility to generate a report for any hostname
#IPDump #Portscanning #Geolocation #WHOIS
https://reconshell.com/ipdump-python-utility-to-generate-a-report-for-any-hostname/
#IPDump #Portscanning #Geolocation #WHOIS
https://reconshell.com/ipdump-python-utility-to-generate-a-report-for-any-hostname/
Penetration Testing Tools, ML and Linux Tutorials
IPDump - python utility to generate a report for any hostname - Penetration Testing Tools, ML and Linux Tutorials
To use IPDump, you will need Python 3.
Linux Post Exploitation Framework
#Shellode #RCE #ReverseProxy #metasploit #NetworkScanner #C2
https://reconshell.com/emp3r0r-linux-post-exploitation-framework/
#Shellode #RCE #ReverseProxy #metasploit #NetworkScanner #C2
https://reconshell.com/emp3r0r-linux-post-exploitation-framework/
powerHub - post exploitation tool based on a web application
#PowerHub #PowerSploit #PowerView #Kerberos #LPE #PowerShell
https://reconshell.com/powerhub-post-exploitation-tool-based-on-a-web-application/
#PowerHub #PowerSploit #PowerView #Kerberos #LPE #PowerShell
https://reconshell.com/powerhub-post-exploitation-tool-based-on-a-web-application/
venom - C2 shellcode generator,compiler and handler
#Metasploit #PAYLOADS #crypter #Hacker #MSFvenom #powersploit #C2
https://reconshell.com/venom-c2-shellcode-generatorcompiler-and-handler/
#Metasploit #PAYLOADS #crypter #Hacker #MSFvenom #powersploit #C2
https://reconshell.com/venom-c2-shellcode-generatorcompiler-and-handler/
Best Network Security Courses
#Network #Security #Cybersecurity #VMware #ThreatDetection
#SecuritySpecialization #EthicalHacking
https://reconshell.com/best-network-security-courses/
#Network #Security #Cybersecurity #VMware #ThreatDetection
#SecuritySpecialization #EthicalHacking
https://reconshell.com/best-network-security-courses/
Penetration Testing Tools, ML and Linux Tutorials
Best Network Security Courses - Penetration Testing Tools, ML and Linux Tutorials
We live in an era of technology where data has become the most influential key factor that can change the game anytime. But networking plays the most
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
Penetration Testing Tools, ML and Linux Tutorials
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode - Penetration Testing Tools, ML and Linux Tutorials
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass