TeamsUserEnum - User enumeration with Microsoft Teams API
#Microsoft #Enumeration #Teams #TeamsUserEnum
https://reconshell.com/teamsuserenum-user-enumeration-with-microsoft-teams-api/
#Microsoft #Enumeration #Teams #TeamsUserEnum
https://reconshell.com/teamsuserenum-user-enumeration-with-microsoft-teams-api/
Penetration Testing Tools, ML and Linux Tutorials
TeamsUserEnum - User enumeration with Microsoft Teams API - Penetration Testing Tools, ML and Linux Tutorials
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email is registered on teams
Common Vulnerabilities and Exposures
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Dystopia - Low to medium multi threaded Ubuntu Core honeypot coded in Python
#Ubuntu #honeypot #Python #Dystopia
https://reconshell.com/dystopia-low-to-medium-multi-threaded-ubuntu-core-honeypot-coded-in-python/
#Ubuntu #honeypot #Python #Dystopia
https://reconshell.com/dystopia-low-to-medium-multi-threaded-ubuntu-core-honeypot-coded-in-python/
Penetration Testing Tools, ML and Linux Tutorials
dystopia - Low to medium multi threaded Ubuntu Core honeypot coded in Python - Penetration Testing Tools, ML and Linux Tutorials
You can add support to new commands by editing the file "commands.json". The format is command:outputfor eg
Nebula - Cloud C2 Framework
#PenetrationTesting #DevOps #C2 #AWS #Kubernetes #Azure
#Cloud #Enumeration #Exploit #ReverseShell
https://reconshell.com/nebula-cloud-c2-framework/
#PenetrationTesting #DevOps #C2 #AWS #Kubernetes #Azure
#Cloud #Enumeration #Exploit #ReverseShell
https://reconshell.com/nebula-cloud-c2-framework/
Penetration Testing Tools, ML and Linux Tutorials
Nebula - Cloud C2 Framework - Penetration Testing Tools, ML and Linux Tutorials
Cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other
ppmap - scanner/exploitation tool written in GO
#ExploitationTool #XSS #Scanner #ppmap #Golang
https://reconshell.com/ppmap-scanner-exploitation-tool-written-in-go/
#ExploitationTool #XSS #Scanner #ppmap #Golang
https://reconshell.com/ppmap-scanner-exploitation-tool-written-in-go/
Penetration Testing Tools, ML and Linux Tutorials
ppmap - scanner/exploitation tool written in GO - Penetration Testing Tools, ML and Linux Tutorials
For mass scanning:cat url.txt | ./ppmap where url.txt contains all url(s) in column.
hive-metasploit Connector between Hive and Metasploit
#vulnerabilities #MetasploitFramework #msf #Hive #Metasploit
https://reconshell.com/hive-metasploit-connector-between-hive-and-metasploit/
#vulnerabilities #MetasploitFramework #msf #Hive #Metasploit
https://reconshell.com/hive-metasploit-connector-between-hive-and-metasploit/
Penetration Testing Tools, ML and Linux Tutorials
hive-metasploit Connector between Hive and Metasploit - Penetration Testing Tools, ML and Linux Tutorials
hive-metasploit is a python library for:
kube-bench is tool that checks whether Kubernetes is deployed securely
#k8s #YAML #KubeBench #KubernetesSecurity #cisSecurity #Kubernetes
https://reconshell.com/kube-bench-is-tool-that-checks-whether-kubernetes-is-deployed-securely/
#k8s #YAML #KubeBench #KubernetesSecurity #cisSecurity #Kubernetes
https://reconshell.com/kube-bench-is-tool-that-checks-whether-kubernetes-is-deployed-securely/
Penetration Testing Tools, ML and Linux Tutorials
kube-bench is tool that checks whether Kubernetes is deployed securely - Penetration Testing Tools, ML and Linux Tutorials
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
IGopher : Golang smart bot for Instagram DM
#IGopher #Golang #InstagramBot
https://reconshell.com/igopher-golang-smart-bot-for-instagram-dm/
#IGopher #Golang #InstagramBot
https://reconshell.com/igopher-golang-smart-bot-for-instagram-dm/
Penetration Testing Tools, ML and Linux Tutorials
IGopher : Golang smart bot for Instagram DM - Penetration Testing Tools, ML and Linux Tutorials
This project is under active development, there may be bugs or missing features. If you have any problem or would like to see a feature implemented, please,
TokenTactics - Azure JWT Token Manipulation Toolset
#AzureHound #Azure #JWT #TokenTactics
https://reconshell.com/tokentactics-azure-jwt-token-manipulation-toolset/
#AzureHound #Azure #JWT #TokenTactics
https://reconshell.com/tokentactics-azure-jwt-token-manipulation-toolset/
Penetration Testing Tools, ML and Linux Tutorials
TokenTactics - Azure JWT Token Manipulation Toolset - Penetration Testing Tools, ML and Linux Tutorials
Azure access tokens allow you to authenticate to certain endpoints as a user who signs in with a device code. Even if they used multi-factor authentication.
In0ri - Defacement detection with deep learning
#DeepLearning #Defacement #In0ri
https://reconshell.com/in0ri-defacement-detection-with-deep-learning/
#DeepLearning #Defacement #In0ri
https://reconshell.com/in0ri-defacement-detection-with-deep-learning/
Penetration Testing Tools, ML and Linux Tutorials
In0ri - Defacement detection with deep learning - Penetration Testing Tools, ML and Linux Tutorials
In0ri is a defacement detection system utilizing a image-classification convolutional neural network.
reconmap - VAPT automation and reporting platform
#VAPT #VulnerabilityAssessment #PenetrationTesting #infosec
https://reconshell.com/reconmap-vapt-automation-and-reporting-platform/
#VAPT #VulnerabilityAssessment #PenetrationTesting #infosec
https://reconshell.com/reconmap-vapt-automation-and-reporting-platform/
Penetration Testing Tools, ML and Linux Tutorials
reconmap - VAPT automation and reporting platform - Penetration Testing Tools, ML and Linux Tutorials
Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security projects,
purpleteam - CLI component of OWASP PurpleTeam
#PurpleTeam #OWASP
https://reconshell.com/purpleteam-cli-component-of-owasp-purpleteam/
#PurpleTeam #OWASP
https://reconshell.com/purpleteam-cli-component-of-owasp-purpleteam/
Penetration Testing Tools, ML and Linux Tutorials
purpleteam - CLI component of OWASP PurpleTeam - Penetration Testing Tools, ML and Linux Tutorials
CLI component of purpleteam - Currently in alpha
Joi security - Detect security flaws in Joi validation schemas
#SQLInjection #XSS #SSRF #RCE #LFI #SecurityFlaws
https://reconshell.com/joi-security-detect-security-flaws-in-joi-validation-schemas/
#SQLInjection #XSS #SSRF #RCE #LFI #SecurityFlaws
https://reconshell.com/joi-security-detect-security-flaws-in-joi-validation-schemas/
CredPhish - PowerShell script designed to invoke legitimate credential prompts
#CredPhish #PowerShell #DNSexfiltration #Phishing #Windows
https://reconshell.com/credphish-powershell-script-designed-to-invoke-legitimate-credential-prompts/
#CredPhish #PowerShell #DNSexfiltration #Phishing #Windows
https://reconshell.com/credphish-powershell-script-designed-to-invoke-legitimate-credential-prompts/
Penetration Testing Tools, ML and Linux Tutorials
CredPhish - PowerShell script designed to invoke legitimate credential prompts - Penetration Testing Tools, ML and Linux Tutorials
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user
Damn Vulnerable GraphQL Application
#GraphQL #CodeExecution #Injection #DoS #SSRF
https://reconshell.com/damn-vulnerable-graphql-application/
#GraphQL #CodeExecution #Injection #DoS #SSRF
https://reconshell.com/damn-vulnerable-graphql-application/
Penetration Testing Tools, ML and Linux Tutorials
Damn Vulnerable GraphQL Application - Penetration Testing Tools, ML and Linux Tutorials
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Top 10 Most Exciting Cloud Computing Trends
#Data1Security #HybridCloud #DisasterRecovery
#BigData #CloudComputing #Cloud
https://reconshell.com/cloud-computing-trends/
#Data1Security #HybridCloud #DisasterRecovery
#BigData #CloudComputing #Cloud
https://reconshell.com/cloud-computing-trends/
Penetration Testing Tools, ML and Linux Tutorials
Cloud Computing Trends - Penetration Testing Tools, ML and Linux Tutorials
You can consider cloud computing as the backbone of today’s data-driven industries and app-based tech ecosystem. It acts as a bridge between AI and Machine
SuperLink - Social engineering tool
#SuperLink #SocialEngineeringTool #Ngrok
https://reconshell.com/superlink-social-engineering-tool/
#SuperLink #SocialEngineeringTool #Ngrok
https://reconshell.com/superlink-social-engineering-tool/
Penetration Testing Tools, ML and Linux Tutorials
SuperLink - Social engineering tool - Penetration Testing Tools, ML and Linux Tutorials
Social engineering tool for multiple purposes such as locating target's location, webcam access, OS Password grabber