CVE-2021-22347
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS.
https://cve.reconshell.com/cve/CVE-2021-22347
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS.
https://cve.reconshell.com/cve/CVE-2021-22347
Wconsole - Script for Windows Penetration Testing
#Windows #PenetrationTesting #Enumeration #VAPT
https://reconshell.com/wconsole-script-for-windows-penetration-testing/
#Windows #PenetrationTesting #Enumeration #VAPT
https://reconshell.com/wconsole-script-for-windows-penetration-testing/
Penetration Testing Tools, ML and Linux Tutorials
Wconsole - Script for Windows Penetration Testing - Penetration Testing Tools, ML and Linux Tutorials
it's in simbaly words its collection of commands for check OS Version,Configuration and Enumeration it's not knife swiss army but it's Hand-Script for
JSA - Javascript security analysis
#JS #Javascript #AttackSurface #Exploit #vulnerabilities
https://reconshell.com/jsa-javascript-security-analysis/
#JS #Javascript #AttackSurface #Exploit #vulnerabilities
https://reconshell.com/jsa-javascript-security-analysis/
Penetration Testing Tools, ML and Linux Tutorials
JSA - Javascript security analysis - Penetration Testing Tools, ML and Linux Tutorials
Example for pulling out js files and processing:
RomBuster - router exploitation tool
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
Twitter OSiNT investigation using twint
#CyberSecurity #Twitter #OSINT #Hacking #InformationSecurity
https://reconshell.com/tw1tter0s1nt-twitter-osint-investigation-using-twint/
#CyberSecurity #Twitter #OSINT #Hacking #InformationSecurity
https://reconshell.com/tw1tter0s1nt-twitter-osint-investigation-using-twint/
Penetration Testing Tools, ML and Linux Tutorials
tw1tter0s1nt - Twitter OSiNT investigation using twint - Penetration Testing Tools, ML and Linux Tutorials
CURRENT VERSION --> twosint 2.0.3
Best Arch-based Linux Distros
#ArchLinux #Linux #BlackArch #ManjaroLinux
https://reconshell.com/best-arch-based-linux-distros/
#ArchLinux #Linux #BlackArch #ManjaroLinux
https://reconshell.com/best-arch-based-linux-distros/
Penetration Testing Tools, ML and Linux Tutorials
Best Arch-based Linux Distros - Penetration Testing Tools, ML and Linux Tutorials
Finally, I’ve decided to make a list of the best Arch-based Linux distros I’ve used and tried so far. I was a full-time Debian user. And, because I am a
Best Voice Changer Apps for Android
#VoiceChange #Android #AndroidApps
https://reconshell.com/best-voice-changer-apps-for-android/
#VoiceChange #Android #AndroidApps
https://reconshell.com/best-voice-changer-apps-for-android/
Penetration Testing Tools, ML and Linux Tutorials
Best Voice Changer Apps for Android - Penetration Testing Tools, ML and Linux Tutorials
To call your friends without revealing your identity for a prank, the only thing that will come to your mind is to have an unknown phone number. But that’s
FisherMan – extract information from Facebook profiles
#InformationGathering #OSINT #Facebook
https://reconshell.com/fisherman-extract-information-from-facebook-profiles/
#InformationGathering #OSINT #Facebook
https://reconshell.com/fisherman-extract-information-from-facebook-profiles/
Penetration Testing Tools, ML and Linux Tutorials
FisherMan - extract information from Facebook profiles - Penetration Testing Tools, ML and Linux Tutorials
A tool to extract information from Facebook profiles
Genisys - Telegram Members Scraping
#Telegram #Genisys #Scraping
https://reconshell.com/genisys-telegram-members-scraping/
#Telegram #Genisys #Scraping
https://reconshell.com/genisys-telegram-members-scraping/
Penetration Testing Tools, ML and Linux Tutorials
Genisys - Telegram Members Scraping - Penetration Testing Tools, ML and Linux Tutorials
Suggestion: It is better to add by ID because if you add by username only users having usernames will be added. Moreover, it is slow
Best Rust Programming Books
#RustProgramming #ProgrammingBooks #Books #Ebooks #Rust
https://reconshell.com/best-rust-programming-books/
#RustProgramming #ProgrammingBooks #Books #Ebooks #Rust
https://reconshell.com/best-rust-programming-books/
Penetration Testing Tools, ML and Linux Tutorials
Best Rust Programming Books - Penetration Testing Tools, ML and Linux Tutorials
Rust is a language that engages everybody to construct dependable and productive software. Rust is an open-source framework programming language. What Rust
red shadow - Lightspin AWS Vulnerability Scanner
#PrivilegeEscalation #exploit #Exploitation #AWS
#Vulnerability #Scanner
https://reconshell.com/red-shadow-lightspin-aws-vulnerability-scanner/
#PrivilegeEscalation #exploit #Exploitation #AWS
#Vulnerability #Scanner
https://reconshell.com/red-shadow-lightspin-aws-vulnerability-scanner/
IPDump - python utility to generate a report for any hostname
#IPDump #Portscanning #Geolocation #WHOIS
https://reconshell.com/ipdump-python-utility-to-generate-a-report-for-any-hostname/
#IPDump #Portscanning #Geolocation #WHOIS
https://reconshell.com/ipdump-python-utility-to-generate-a-report-for-any-hostname/
Penetration Testing Tools, ML and Linux Tutorials
IPDump - python utility to generate a report for any hostname - Penetration Testing Tools, ML and Linux Tutorials
To use IPDump, you will need Python 3.
Linux Post Exploitation Framework
#Shellode #RCE #ReverseProxy #metasploit #NetworkScanner #C2
https://reconshell.com/emp3r0r-linux-post-exploitation-framework/
#Shellode #RCE #ReverseProxy #metasploit #NetworkScanner #C2
https://reconshell.com/emp3r0r-linux-post-exploitation-framework/
powerHub - post exploitation tool based on a web application
#PowerHub #PowerSploit #PowerView #Kerberos #LPE #PowerShell
https://reconshell.com/powerhub-post-exploitation-tool-based-on-a-web-application/
#PowerHub #PowerSploit #PowerView #Kerberos #LPE #PowerShell
https://reconshell.com/powerhub-post-exploitation-tool-based-on-a-web-application/
venom - C2 shellcode generator,compiler and handler
#Metasploit #PAYLOADS #crypter #Hacker #MSFvenom #powersploit #C2
https://reconshell.com/venom-c2-shellcode-generatorcompiler-and-handler/
#Metasploit #PAYLOADS #crypter #Hacker #MSFvenom #powersploit #C2
https://reconshell.com/venom-c2-shellcode-generatorcompiler-and-handler/
Best Network Security Courses
#Network #Security #Cybersecurity #VMware #ThreatDetection
#SecuritySpecialization #EthicalHacking
https://reconshell.com/best-network-security-courses/
#Network #Security #Cybersecurity #VMware #ThreatDetection
#SecuritySpecialization #EthicalHacking
https://reconshell.com/best-network-security-courses/
Penetration Testing Tools, ML and Linux Tutorials
Best Network Security Courses - Penetration Testing Tools, ML and Linux Tutorials
We live in an era of technology where data has become the most influential key factor that can change the game anytime. But networking plays the most
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
Penetration Testing Tools, ML and Linux Tutorials
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode - Penetration Testing Tools, ML and Linux Tutorials
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass
Ghost - Android Post Exploitation Framework
#Android #PostExploitation #Exploits
https://reconshell.com/ghost-android-post-exploitation-framework/
#Android #PostExploitation #Exploits
https://reconshell.com/ghost-android-post-exploitation-framework/
Penetration Testing Tools, ML and Linux Tutorials
Ghost - Android Post Exploitation Framework - Penetration Testing Tools, ML and Linux Tutorials
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
YAPS - PHP reverse shell
#YAPS #PHP #ReverseShell #Netcat #Shell
https://reconshell.com/yaps-php-reverse-shell/
#YAPS #PHP #ReverseShell #Netcat #Shell
https://reconshell.com/yaps-php-reverse-shell/
Huntkit - Docker Image For Pentesting, Bug Bounty, CTF and Red Teaming
#Metasploit #masscan #Exploitation #BugBounty #RedTeaming #CTF
https://reconshell.com/huntkit-docker-image-for-pentesting-bug-bounty-ctf-and-red-teaming/
#Metasploit #masscan #Exploitation #BugBounty #RedTeaming #CTF
https://reconshell.com/huntkit-docker-image-for-pentesting-bug-bounty-ctf-and-red-teaming/
Penetration Testing Tools, ML and Linux Tutorials
Huntkit - Docker Image For Pentesting, Bug Bounty, CTF and Red Teaming - Penetration Testing Tools, ML and Linux Tutorials
HuntKit is a collection of penetration testing, bug bounty hunting, capture the flag, red teaming tools in a single Docker image. Simply run the image and