venom - C2 shellcode generator,compiler and handler
#Metasploit #PAYLOADS #crypter #Hacker #MSFvenom #powersploit #C2
https://reconshell.com/venom-c2-shellcode-generatorcompiler-and-handler/
#Metasploit #PAYLOADS #crypter #Hacker #MSFvenom #powersploit #C2
https://reconshell.com/venom-c2-shellcode-generatorcompiler-and-handler/
Best Network Security Courses
#Network #Security #Cybersecurity #VMware #ThreatDetection
#SecuritySpecialization #EthicalHacking
https://reconshell.com/best-network-security-courses/
#Network #Security #Cybersecurity #VMware #ThreatDetection
#SecuritySpecialization #EthicalHacking
https://reconshell.com/best-network-security-courses/
Penetration Testing Tools, ML and Linux Tutorials
Best Network Security Courses - Penetration Testing Tools, ML and Linux Tutorials
We live in an era of technology where data has become the most influential key factor that can change the game anytime. But networking plays the most
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
Penetration Testing Tools, ML and Linux Tutorials
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode - Penetration Testing Tools, ML and Linux Tutorials
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass
Ghost - Android Post Exploitation Framework
#Android #PostExploitation #Exploits
https://reconshell.com/ghost-android-post-exploitation-framework/
#Android #PostExploitation #Exploits
https://reconshell.com/ghost-android-post-exploitation-framework/
Penetration Testing Tools, ML and Linux Tutorials
Ghost - Android Post Exploitation Framework - Penetration Testing Tools, ML and Linux Tutorials
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
YAPS - PHP reverse shell
#YAPS #PHP #ReverseShell #Netcat #Shell
https://reconshell.com/yaps-php-reverse-shell/
#YAPS #PHP #ReverseShell #Netcat #Shell
https://reconshell.com/yaps-php-reverse-shell/
Huntkit - Docker Image For Pentesting, Bug Bounty, CTF and Red Teaming
#Metasploit #masscan #Exploitation #BugBounty #RedTeaming #CTF
https://reconshell.com/huntkit-docker-image-for-pentesting-bug-bounty-ctf-and-red-teaming/
#Metasploit #masscan #Exploitation #BugBounty #RedTeaming #CTF
https://reconshell.com/huntkit-docker-image-for-pentesting-bug-bounty-ctf-and-red-teaming/
Penetration Testing Tools, ML and Linux Tutorials
Huntkit - Docker Image For Pentesting, Bug Bounty, CTF and Red Teaming - Penetration Testing Tools, ML and Linux Tutorials
HuntKit is a collection of penetration testing, bug bounty hunting, capture the flag, red teaming tools in a single Docker image. Simply run the image and
Best Kubernetes Tools For Managing DevOps Projects
#Kubernetes #DevOps #DevSecOps #K8b
https://reconshell.com/best-kubernetes-tools-for-managing-devops-projects/
#Kubernetes #DevOps #DevSecOps #K8b
https://reconshell.com/best-kubernetes-tools-for-managing-devops-projects/
Penetration Testing Tools, ML and Linux Tutorials
Best Kubernetes Tools For Managing DevOps Projects - Penetration Testing Tools, ML and Linux Tutorials
Writing applications for multiple operating environments is one of the major requirements for a developer nowadays. Kubernetes has got the attention as it
How to Install XBian on Raspberry Pi
#RaspberryPi #XBian #KODI
https://reconshell.com/how-to-install-xbian-on-raspberry-pi/
#RaspberryPi #XBian #KODI
https://reconshell.com/how-to-install-xbian-on-raspberry-pi/
Penetration Testing Tools, ML and Linux Tutorials
How to Install XBian on Raspberry Pi - Penetration Testing Tools, ML and Linux Tutorials
If you are thinking about owning a personal or commercial media server with a dedicated hardware configuration in a very efficient way, then you are in the
WFH - Windows Feature Hunter
#COMhijacking #Windows #WFH #hijacking #vulnerabilities
https://reconshell.com/wfh-windows-feature-hunter/
#COMhijacking #Windows #WFH #hijacking #vulnerabilities
https://reconshell.com/wfh-windows-feature-hunter/
Penetration Testing Tools, ML and Linux Tutorials
WFH - Windows Feature Hunter - Penetration Testing Tools, ML and Linux Tutorials
Windows Feature Hunter (WFH) is a proof of concept python script that uses Frida, a dynamic instrumentation toolkit, to assist in potentially identifying
CVE-2021-3630
An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault.
https://cve.reconshell.com/cve/CVE-2021-3630
An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault.
https://cve.reconshell.com/cve/CVE-2021-3630
PostgreSQL CREATE PROCEDURE
#PostgreSQL #SQL #MySQL #noSQL #PGSQL #PSQL
https://reconshell.com/postgresql-create-procedure/
#PostgreSQL #SQL #MySQL #noSQL #PGSQL #PSQL
https://reconshell.com/postgresql-create-procedure/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL CREATE PROCEDURE - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to use the PostgreSQL CREATE PROCEDURE statement to create new stored procedures.
AllHackingTools – All-in-One Hacking Tools For Hackers
#Hacking #SQLinjection #DDOS #AndroidHacking #XSS #Sniffing
https://reconshell.com/allhackingtools-all-in-one-hacking-tools-for-hackers/
#Hacking #SQLinjection #DDOS #AndroidHacking #XSS #Sniffing
https://reconshell.com/allhackingtools-all-in-one-hacking-tools-for-hackers/
pyhtools - A collection of python written hacking tools
#Malware #DNSspoofing #Keylogger #Trojans #Payloads #VulnerablityScanner
https://reconshell.com/pyhtools-a-collection-of-python-written-hacking-tools/
#Malware #DNSspoofing #Keylogger #Trojans #Payloads #VulnerablityScanner
https://reconshell.com/pyhtools-a-collection-of-python-written-hacking-tools/
Penetration Testing Tools, ML and Linux Tutorials
pyhtools - A collection of python written hacking tools - Penetration Testing Tools, ML and Linux Tutorials
There may be chances that pyfiglet or kamene will not be installed through requirements.txt, you can install manually using pip3 install pyfiglet kamene.
RATwurst - Remote Access Tool with anti-debugging and anti-sandbox checks
#RAT #Malware #Trojan #RATwurst #debugging #AntiSandbox
https://reconshell.com/ratwurst-remote-access-tool-with-anti-debugging-and-anti-sandbox-checks/
#RAT #Malware #Trojan #RATwurst #debugging #AntiSandbox
https://reconshell.com/ratwurst-remote-access-tool-with-anti-debugging-and-anti-sandbox-checks/
Penetration Testing Tools, ML and Linux Tutorials
RATwurst - Remote Access Tool with anti-debugging and anti-sandbox checks - Penetration Testing Tools, ML and Linux Tutorials
Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.
PhishMailer - Generate Professional Phishing Emails
#Phishing #Emails #PhishMailer #Mailer
https://reconshell.com/phishmailer-generate-professional-phishing-emails/
#Phishing #Emails #PhishMailer #Mailer
https://reconshell.com/phishmailer-generate-professional-phishing-emails/
Penetration Testing Tools, ML and Linux Tutorials
PhishMailer - Generate Professional Phishing Emails - Penetration Testing Tools, ML and Linux Tutorials
PhishMailer Will Help You To Create Professional Phishing Emails Fast And Easy
Bughound - Static code analysis tool based on Elasticsearch
#Elasticsearch #Bughound #CodeAnalysis #CommandInjection #XXE #Deserialization
https://reconshell.com/bughound-static-code-analysis-tool-based-on-elasticsearch/
#Elasticsearch #Bughound #CodeAnalysis #CommandInjection #XXE #Deserialization
https://reconshell.com/bughound-static-code-analysis-tool-based-on-elasticsearch/
Penetration Testing Tools, ML and Linux Tutorials
Bughound - Static code analysis tool based on Elasticsearch - Penetration Testing Tools, ML and Linux Tutorials
Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana to get useful insights about
meterpeter - C2 Powershell Command & Control Framework
#Keylogger #C2 #PostExploit #Dnspoof #Powershell #meterpeter #PostExploitation
https://reconshell.com/meterpeter-c2-powershell-command-control-framework/
#Keylogger #C2 #PostExploit #Dnspoof #Powershell #meterpeter #PostExploitation
https://reconshell.com/meterpeter-c2-powershell-command-control-framework/
DIGITAL FORENSICS SKILLSETS
#SecurityIncidents #DataAnalysis #DigitalForensics
#MalwareAnalysi #cyberForensics #cyberattacks
https://reconshell.com/digital-forensics-skillsets/
#SecurityIncidents #DataAnalysis #DigitalForensics
#MalwareAnalysi #cyberForensics #cyberattacks
https://reconshell.com/digital-forensics-skillsets/
Penetration Testing Tools, ML and Linux Tutorials
DIGITAL FORENSICS SKILLSETS - Penetration Testing Tools, ML and Linux Tutorials
Thanks for reaching out.
CVE-2021-34473
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.
https://cve.reconshell.com/cve/CVE-2021-34473
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.
https://cve.reconshell.com/cve/CVE-2021-34473
CVE-2021-34469
Microsoft Office Security Feature Bypass Vulnerability
https://cve.reconshell.com/cve/CVE-2021-34469
Microsoft Office Security Feature Bypass Vulnerability
https://cve.reconshell.com/cve/CVE-2021-34469