Huntkit - Docker Image For Pentesting, Bug Bounty, CTF and Red Teaming
#Metasploit #masscan #Exploitation #BugBounty #RedTeaming #CTF
https://reconshell.com/huntkit-docker-image-for-pentesting-bug-bounty-ctf-and-red-teaming/
#Metasploit #masscan #Exploitation #BugBounty #RedTeaming #CTF
https://reconshell.com/huntkit-docker-image-for-pentesting-bug-bounty-ctf-and-red-teaming/
Penetration Testing Tools, ML and Linux Tutorials
Huntkit - Docker Image For Pentesting, Bug Bounty, CTF and Red Teaming - Penetration Testing Tools, ML and Linux Tutorials
HuntKit is a collection of penetration testing, bug bounty hunting, capture the flag, red teaming tools in a single Docker image. Simply run the image and
Best Kubernetes Tools For Managing DevOps Projects
#Kubernetes #DevOps #DevSecOps #K8b
https://reconshell.com/best-kubernetes-tools-for-managing-devops-projects/
#Kubernetes #DevOps #DevSecOps #K8b
https://reconshell.com/best-kubernetes-tools-for-managing-devops-projects/
Penetration Testing Tools, ML and Linux Tutorials
Best Kubernetes Tools For Managing DevOps Projects - Penetration Testing Tools, ML and Linux Tutorials
Writing applications for multiple operating environments is one of the major requirements for a developer nowadays. Kubernetes has got the attention as it
How to Install XBian on Raspberry Pi
#RaspberryPi #XBian #KODI
https://reconshell.com/how-to-install-xbian-on-raspberry-pi/
#RaspberryPi #XBian #KODI
https://reconshell.com/how-to-install-xbian-on-raspberry-pi/
Penetration Testing Tools, ML and Linux Tutorials
How to Install XBian on Raspberry Pi - Penetration Testing Tools, ML and Linux Tutorials
If you are thinking about owning a personal or commercial media server with a dedicated hardware configuration in a very efficient way, then you are in the
WFH - Windows Feature Hunter
#COMhijacking #Windows #WFH #hijacking #vulnerabilities
https://reconshell.com/wfh-windows-feature-hunter/
#COMhijacking #Windows #WFH #hijacking #vulnerabilities
https://reconshell.com/wfh-windows-feature-hunter/
Penetration Testing Tools, ML and Linux Tutorials
WFH - Windows Feature Hunter - Penetration Testing Tools, ML and Linux Tutorials
Windows Feature Hunter (WFH) is a proof of concept python script that uses Frida, a dynamic instrumentation toolkit, to assist in potentially identifying
CVE-2021-3630
An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault.
https://cve.reconshell.com/cve/CVE-2021-3630
An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault.
https://cve.reconshell.com/cve/CVE-2021-3630
PostgreSQL CREATE PROCEDURE
#PostgreSQL #SQL #MySQL #noSQL #PGSQL #PSQL
https://reconshell.com/postgresql-create-procedure/
#PostgreSQL #SQL #MySQL #noSQL #PGSQL #PSQL
https://reconshell.com/postgresql-create-procedure/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL CREATE PROCEDURE - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to use the PostgreSQL CREATE PROCEDURE statement to create new stored procedures.
AllHackingTools – All-in-One Hacking Tools For Hackers
#Hacking #SQLinjection #DDOS #AndroidHacking #XSS #Sniffing
https://reconshell.com/allhackingtools-all-in-one-hacking-tools-for-hackers/
#Hacking #SQLinjection #DDOS #AndroidHacking #XSS #Sniffing
https://reconshell.com/allhackingtools-all-in-one-hacking-tools-for-hackers/
pyhtools - A collection of python written hacking tools
#Malware #DNSspoofing #Keylogger #Trojans #Payloads #VulnerablityScanner
https://reconshell.com/pyhtools-a-collection-of-python-written-hacking-tools/
#Malware #DNSspoofing #Keylogger #Trojans #Payloads #VulnerablityScanner
https://reconshell.com/pyhtools-a-collection-of-python-written-hacking-tools/
Penetration Testing Tools, ML and Linux Tutorials
pyhtools - A collection of python written hacking tools - Penetration Testing Tools, ML and Linux Tutorials
There may be chances that pyfiglet or kamene will not be installed through requirements.txt, you can install manually using pip3 install pyfiglet kamene.
RATwurst - Remote Access Tool with anti-debugging and anti-sandbox checks
#RAT #Malware #Trojan #RATwurst #debugging #AntiSandbox
https://reconshell.com/ratwurst-remote-access-tool-with-anti-debugging-and-anti-sandbox-checks/
#RAT #Malware #Trojan #RATwurst #debugging #AntiSandbox
https://reconshell.com/ratwurst-remote-access-tool-with-anti-debugging-and-anti-sandbox-checks/
Penetration Testing Tools, ML and Linux Tutorials
RATwurst - Remote Access Tool with anti-debugging and anti-sandbox checks - Penetration Testing Tools, ML and Linux Tutorials
Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.
PhishMailer - Generate Professional Phishing Emails
#Phishing #Emails #PhishMailer #Mailer
https://reconshell.com/phishmailer-generate-professional-phishing-emails/
#Phishing #Emails #PhishMailer #Mailer
https://reconshell.com/phishmailer-generate-professional-phishing-emails/
Penetration Testing Tools, ML and Linux Tutorials
PhishMailer - Generate Professional Phishing Emails - Penetration Testing Tools, ML and Linux Tutorials
PhishMailer Will Help You To Create Professional Phishing Emails Fast And Easy
Bughound - Static code analysis tool based on Elasticsearch
#Elasticsearch #Bughound #CodeAnalysis #CommandInjection #XXE #Deserialization
https://reconshell.com/bughound-static-code-analysis-tool-based-on-elasticsearch/
#Elasticsearch #Bughound #CodeAnalysis #CommandInjection #XXE #Deserialization
https://reconshell.com/bughound-static-code-analysis-tool-based-on-elasticsearch/
Penetration Testing Tools, ML and Linux Tutorials
Bughound - Static code analysis tool based on Elasticsearch - Penetration Testing Tools, ML and Linux Tutorials
Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana to get useful insights about
meterpeter - C2 Powershell Command & Control Framework
#Keylogger #C2 #PostExploit #Dnspoof #Powershell #meterpeter #PostExploitation
https://reconshell.com/meterpeter-c2-powershell-command-control-framework/
#Keylogger #C2 #PostExploit #Dnspoof #Powershell #meterpeter #PostExploitation
https://reconshell.com/meterpeter-c2-powershell-command-control-framework/
DIGITAL FORENSICS SKILLSETS
#SecurityIncidents #DataAnalysis #DigitalForensics
#MalwareAnalysi #cyberForensics #cyberattacks
https://reconshell.com/digital-forensics-skillsets/
#SecurityIncidents #DataAnalysis #DigitalForensics
#MalwareAnalysi #cyberForensics #cyberattacks
https://reconshell.com/digital-forensics-skillsets/
Penetration Testing Tools, ML and Linux Tutorials
DIGITAL FORENSICS SKILLSETS - Penetration Testing Tools, ML and Linux Tutorials
Thanks for reaching out.
CVE-2021-34473
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.
https://cve.reconshell.com/cve/CVE-2021-34473
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.
https://cve.reconshell.com/cve/CVE-2021-34473
CVE-2021-34469
Microsoft Office Security Feature Bypass Vulnerability
https://cve.reconshell.com/cve/CVE-2021-34469
Microsoft Office Security Feature Bypass Vulnerability
https://cve.reconshell.com/cve/CVE-2021-34469
cerbrutus - Network brute force tool written in Python
#cerbrutus #Network #python #BruteForce
https://reconshell.com/cerbrutus-network-brute-force-tool-written-in-python/
#cerbrutus #Network #python #BruteForce
https://reconshell.com/cerbrutus-network-brute-force-tool-written-in-python/
PostgreSQL User-defined Data Types
#PostgreSQL #SQL #DataTypes #MySQL #PGSQL #PSQL
https://reconshell.com/postgresql-user-defined-data-types/
#PostgreSQL #SQL #DataTypes #MySQL #PGSQL #PSQL
https://reconshell.com/postgresql-user-defined-data-types/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL User-defined Data Types - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to create PostgreSQL user-defined data type using CREATE DOMAIN and CREATE TYPE statements.
Common Vulnerabilities and Exposures
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
DNSStager - Hide your payload in DNS
#XOR #Shellcode #payload #DNS #DNSStager
https://reconshell.com/dnsstager-hide-your-payload-in-dns/
#XOR #Shellcode #payload #DNS #DNSStager
https://reconshell.com/dnsstager-hide-your-payload-in-dns/
Penetration Testing Tools, ML and Linux Tutorials
DNSStager - Hide your payload in DNS - Penetration Testing Tools, ML and Linux Tutorials
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.
cloudsploit - Cloud Security Posture Management
#cloudsploit #CloudSecurit #AWS #Azure
https://reconshell.com/cloudsploit-cloud-security-posture-management/
#cloudsploit #CloudSecurit #AWS #Azure
https://reconshell.com/cloudsploit-cloud-security-posture-management/
Penetration Testing Tools, ML and Linux Tutorials
cloudsploit - Cloud Security Posture Management - Penetration Testing Tools, ML and Linux Tutorials
CloudSploit by Aqua is an open-source project designed to allow detection of security risks in cloud infrastructure accounts, including: Amazon Web Services
Cannon - post exploitation framework fully developed using python3
#PostExploitation #python3 #ReverseShell
https://reconshell.com/cannon-post-exploitation-framework-fully-developed-using-python3/
#PostExploitation #python3 #ReverseShell
https://reconshell.com/cannon-post-exploitation-framework-fully-developed-using-python3/
Penetration Testing Tools, ML and Linux Tutorials
Cannon - post exploitation framework fully developed using python3 - Penetration Testing Tools, ML and Linux Tutorials
Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modules, harvest reverse