Best Arch-based Linux Distros
#ArchLinux #Linux #BlackArch #ManjaroLinux
https://reconshell.com/best-arch-based-linux-distros/
#ArchLinux #Linux #BlackArch #ManjaroLinux
https://reconshell.com/best-arch-based-linux-distros/
Penetration Testing Tools, ML and Linux Tutorials
Best Arch-based Linux Distros - Penetration Testing Tools, ML and Linux Tutorials
Finally, I’ve decided to make a list of the best Arch-based Linux distros I’ve used and tried so far. I was a full-time Debian user. And, because I am a
Best Voice Changer Apps for Android
#VoiceChange #Android #AndroidApps
https://reconshell.com/best-voice-changer-apps-for-android/
#VoiceChange #Android #AndroidApps
https://reconshell.com/best-voice-changer-apps-for-android/
Penetration Testing Tools, ML and Linux Tutorials
Best Voice Changer Apps for Android - Penetration Testing Tools, ML and Linux Tutorials
To call your friends without revealing your identity for a prank, the only thing that will come to your mind is to have an unknown phone number. But that’s
FisherMan – extract information from Facebook profiles
#InformationGathering #OSINT #Facebook
https://reconshell.com/fisherman-extract-information-from-facebook-profiles/
#InformationGathering #OSINT #Facebook
https://reconshell.com/fisherman-extract-information-from-facebook-profiles/
Penetration Testing Tools, ML and Linux Tutorials
FisherMan - extract information from Facebook profiles - Penetration Testing Tools, ML and Linux Tutorials
A tool to extract information from Facebook profiles
Genisys - Telegram Members Scraping
#Telegram #Genisys #Scraping
https://reconshell.com/genisys-telegram-members-scraping/
#Telegram #Genisys #Scraping
https://reconshell.com/genisys-telegram-members-scraping/
Penetration Testing Tools, ML and Linux Tutorials
Genisys - Telegram Members Scraping - Penetration Testing Tools, ML and Linux Tutorials
Suggestion: It is better to add by ID because if you add by username only users having usernames will be added. Moreover, it is slow
Best Rust Programming Books
#RustProgramming #ProgrammingBooks #Books #Ebooks #Rust
https://reconshell.com/best-rust-programming-books/
#RustProgramming #ProgrammingBooks #Books #Ebooks #Rust
https://reconshell.com/best-rust-programming-books/
Penetration Testing Tools, ML and Linux Tutorials
Best Rust Programming Books - Penetration Testing Tools, ML and Linux Tutorials
Rust is a language that engages everybody to construct dependable and productive software. Rust is an open-source framework programming language. What Rust
red shadow - Lightspin AWS Vulnerability Scanner
#PrivilegeEscalation #exploit #Exploitation #AWS
#Vulnerability #Scanner
https://reconshell.com/red-shadow-lightspin-aws-vulnerability-scanner/
#PrivilegeEscalation #exploit #Exploitation #AWS
#Vulnerability #Scanner
https://reconshell.com/red-shadow-lightspin-aws-vulnerability-scanner/
IPDump - python utility to generate a report for any hostname
#IPDump #Portscanning #Geolocation #WHOIS
https://reconshell.com/ipdump-python-utility-to-generate-a-report-for-any-hostname/
#IPDump #Portscanning #Geolocation #WHOIS
https://reconshell.com/ipdump-python-utility-to-generate-a-report-for-any-hostname/
Penetration Testing Tools, ML and Linux Tutorials
IPDump - python utility to generate a report for any hostname - Penetration Testing Tools, ML and Linux Tutorials
To use IPDump, you will need Python 3.
Linux Post Exploitation Framework
#Shellode #RCE #ReverseProxy #metasploit #NetworkScanner #C2
https://reconshell.com/emp3r0r-linux-post-exploitation-framework/
#Shellode #RCE #ReverseProxy #metasploit #NetworkScanner #C2
https://reconshell.com/emp3r0r-linux-post-exploitation-framework/
powerHub - post exploitation tool based on a web application
#PowerHub #PowerSploit #PowerView #Kerberos #LPE #PowerShell
https://reconshell.com/powerhub-post-exploitation-tool-based-on-a-web-application/
#PowerHub #PowerSploit #PowerView #Kerberos #LPE #PowerShell
https://reconshell.com/powerhub-post-exploitation-tool-based-on-a-web-application/
venom - C2 shellcode generator,compiler and handler
#Metasploit #PAYLOADS #crypter #Hacker #MSFvenom #powersploit #C2
https://reconshell.com/venom-c2-shellcode-generatorcompiler-and-handler/
#Metasploit #PAYLOADS #crypter #Hacker #MSFvenom #powersploit #C2
https://reconshell.com/venom-c2-shellcode-generatorcompiler-and-handler/
Best Network Security Courses
#Network #Security #Cybersecurity #VMware #ThreatDetection
#SecuritySpecialization #EthicalHacking
https://reconshell.com/best-network-security-courses/
#Network #Security #Cybersecurity #VMware #ThreatDetection
#SecuritySpecialization #EthicalHacking
https://reconshell.com/best-network-security-courses/
Penetration Testing Tools, ML and Linux Tutorials
Best Network Security Courses - Penetration Testing Tools, ML and Linux Tutorials
We live in an era of technology where data has become the most influential key factor that can change the game anytime. But networking plays the most
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
Penetration Testing Tools, ML and Linux Tutorials
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode - Penetration Testing Tools, ML and Linux Tutorials
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass
Ghost - Android Post Exploitation Framework
#Android #PostExploitation #Exploits
https://reconshell.com/ghost-android-post-exploitation-framework/
#Android #PostExploitation #Exploits
https://reconshell.com/ghost-android-post-exploitation-framework/
Penetration Testing Tools, ML and Linux Tutorials
Ghost - Android Post Exploitation Framework - Penetration Testing Tools, ML and Linux Tutorials
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
YAPS - PHP reverse shell
#YAPS #PHP #ReverseShell #Netcat #Shell
https://reconshell.com/yaps-php-reverse-shell/
#YAPS #PHP #ReverseShell #Netcat #Shell
https://reconshell.com/yaps-php-reverse-shell/
Huntkit - Docker Image For Pentesting, Bug Bounty, CTF and Red Teaming
#Metasploit #masscan #Exploitation #BugBounty #RedTeaming #CTF
https://reconshell.com/huntkit-docker-image-for-pentesting-bug-bounty-ctf-and-red-teaming/
#Metasploit #masscan #Exploitation #BugBounty #RedTeaming #CTF
https://reconshell.com/huntkit-docker-image-for-pentesting-bug-bounty-ctf-and-red-teaming/
Penetration Testing Tools, ML and Linux Tutorials
Huntkit - Docker Image For Pentesting, Bug Bounty, CTF and Red Teaming - Penetration Testing Tools, ML and Linux Tutorials
HuntKit is a collection of penetration testing, bug bounty hunting, capture the flag, red teaming tools in a single Docker image. Simply run the image and
Best Kubernetes Tools For Managing DevOps Projects
#Kubernetes #DevOps #DevSecOps #K8b
https://reconshell.com/best-kubernetes-tools-for-managing-devops-projects/
#Kubernetes #DevOps #DevSecOps #K8b
https://reconshell.com/best-kubernetes-tools-for-managing-devops-projects/
Penetration Testing Tools, ML and Linux Tutorials
Best Kubernetes Tools For Managing DevOps Projects - Penetration Testing Tools, ML and Linux Tutorials
Writing applications for multiple operating environments is one of the major requirements for a developer nowadays. Kubernetes has got the attention as it
How to Install XBian on Raspberry Pi
#RaspberryPi #XBian #KODI
https://reconshell.com/how-to-install-xbian-on-raspberry-pi/
#RaspberryPi #XBian #KODI
https://reconshell.com/how-to-install-xbian-on-raspberry-pi/
Penetration Testing Tools, ML and Linux Tutorials
How to Install XBian on Raspberry Pi - Penetration Testing Tools, ML and Linux Tutorials
If you are thinking about owning a personal or commercial media server with a dedicated hardware configuration in a very efficient way, then you are in the
WFH - Windows Feature Hunter
#COMhijacking #Windows #WFH #hijacking #vulnerabilities
https://reconshell.com/wfh-windows-feature-hunter/
#COMhijacking #Windows #WFH #hijacking #vulnerabilities
https://reconshell.com/wfh-windows-feature-hunter/
Penetration Testing Tools, ML and Linux Tutorials
WFH - Windows Feature Hunter - Penetration Testing Tools, ML and Linux Tutorials
Windows Feature Hunter (WFH) is a proof of concept python script that uses Frida, a dynamic instrumentation toolkit, to assist in potentially identifying
CVE-2021-3630
An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault.
https://cve.reconshell.com/cve/CVE-2021-3630
An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault.
https://cve.reconshell.com/cve/CVE-2021-3630
PostgreSQL CREATE PROCEDURE
#PostgreSQL #SQL #MySQL #noSQL #PGSQL #PSQL
https://reconshell.com/postgresql-create-procedure/
#PostgreSQL #SQL #MySQL #noSQL #PGSQL #PSQL
https://reconshell.com/postgresql-create-procedure/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL CREATE PROCEDURE - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to use the PostgreSQL CREATE PROCEDURE statement to create new stored procedures.