Damn Vulnerable GraphQL Application
#GraphQL #CodeExecution #Injection #DoS #SSRF
https://reconshell.com/damn-vulnerable-graphql-application/
#GraphQL #CodeExecution #Injection #DoS #SSRF
https://reconshell.com/damn-vulnerable-graphql-application/
Penetration Testing Tools, ML and Linux Tutorials
Damn Vulnerable GraphQL Application - Penetration Testing Tools, ML and Linux Tutorials
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Top 10 Most Exciting Cloud Computing Trends
#Data1Security #HybridCloud #DisasterRecovery
#BigData #CloudComputing #Cloud
https://reconshell.com/cloud-computing-trends/
#Data1Security #HybridCloud #DisasterRecovery
#BigData #CloudComputing #Cloud
https://reconshell.com/cloud-computing-trends/
Penetration Testing Tools, ML and Linux Tutorials
Cloud Computing Trends - Penetration Testing Tools, ML and Linux Tutorials
You can consider cloud computing as the backbone of today’s data-driven industries and app-based tech ecosystem. It acts as a bridge between AI and Machine
SuperLink - Social engineering tool
#SuperLink #SocialEngineeringTool #Ngrok
https://reconshell.com/superlink-social-engineering-tool/
#SuperLink #SocialEngineeringTool #Ngrok
https://reconshell.com/superlink-social-engineering-tool/
Penetration Testing Tools, ML and Linux Tutorials
SuperLink - Social engineering tool - Penetration Testing Tools, ML and Linux Tutorials
Social engineering tool for multiple purposes such as locating target's location, webcam access, OS Password grabber
SillyRAT - A Cross Platform multifunctional RAT
#CommandExecution #Payload #RAT #Encryption
https://reconshell.com/sillyrat-a-cross-platform-multifunctional-rat/
#CommandExecution #Payload #RAT #Encryption
https://reconshell.com/sillyrat-a-cross-platform-multifunctional-rat/
Penetration Testing Tools, ML and Linux Tutorials
SillyRAT - A Cross Platform multifunctional RAT - Penetration Testing Tools, ML and Linux Tutorials
A cross platform RAT written in pure Python. The RAT accept commands alongside arguments to either perform as the server who accepts connections or to perform
TmuxRecon - Automate the scanning and enumeration
#TmuxRecon #OSCP #Scanning #Enumeration #Metasploit
https://reconshell.com/tmuxrecon-automate-the-scanning-and-enumeration/
#TmuxRecon #OSCP #Scanning #Enumeration #Metasploit
https://reconshell.com/tmuxrecon-automate-the-scanning-and-enumeration/
Penetration Testing Tools, ML and Linux Tutorials
TmuxRecon - Automate the scanning and enumeration - Penetration Testing Tools, ML and Linux Tutorials
2. C-b w (Move into the TmuxRecon Session).
PowerSnail - PowerShell alternative/restriction bypass
#PowerSnail #PowerShell
https://reconshell.com/powersnail-powershell-alternative-restriction-bypass/
#PowerSnail #PowerShell
https://reconshell.com/powersnail-powershell-alternative-restriction-bypass/
Penetration Testing Tools, ML and Linux Tutorials
PowerSnail - PowerShell alternative/restriction bypass - Penetration Testing Tools, ML and Linux Tutorials
Auto Scan - Automate Auxiliary Module in Metasploit
#Metasploit #AutoScan #Nmap #AuxiliaryModule
https://reconshell.com/auto-scan-automate-auxiliary-module-in-metasploit/
#Metasploit #AutoScan #Nmap #AuxiliaryModule
https://reconshell.com/auto-scan-automate-auxiliary-module-in-metasploit/
PowerShellArmoury – A PowerShell armoury for security
#PowerShell #ps1 #Microsoft #Security
https://reconshell.com/powershellarmoury-a-powershell-armoury-for-security/
#PowerShell #ps1 #Microsoft #Security
https://reconshell.com/powershellarmoury-a-powershell-armoury-for-security/
Penetration Testing Tools, ML and Linux Tutorials
PowerShellArmoury - A PowerShell armoury for security - Penetration Testing Tools, ML and Linux Tutorials
The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their engagements.
pdfcrack - Advanced tool to Crack Any Password Protected PDF file
#pdfcrack #Hacker #Cracker #PasswordCracking #CrackPassword
https://reconshell.com/pdfcrack-advanced-tool-to-crack-any-password-protected-pdf-file/
#pdfcrack #Hacker #Cracker #PasswordCracking #CrackPassword
https://reconshell.com/pdfcrack-advanced-tool-to-crack-any-password-protected-pdf-file/
Penetration Testing Tools, ML and Linux Tutorials
pdfcrack - Advanced tool to Crack Any Password Protected PDF file - Penetration Testing Tools, ML and Linux Tutorials
An Advanced tool to Crack Any Password Protected PDF file. A very user friendly script especially for noob hackers.
Sapling – Node.js framework for light web development
#Zerocode #MongoDB #Sapling #WebDevelopment #NodeJS #JavaScript #JS
https://reconshell.com/sapling-node-js-framework-for-light-web-development/
#Zerocode #MongoDB #Sapling #WebDevelopment #NodeJS #JavaScript #JS
https://reconshell.com/sapling-node-js-framework-for-light-web-development/
Penetration Testing Tools, ML and Linux Tutorials
Sapling - Node.js framework for light web development - Penetration Testing Tools, ML and Linux Tutorials
Sapling is a Node.js framework for building websites, web apps and APIs as fast as you can imagine them. With unrivalled speed of development, you can
ReoSploit - A Tool Enumerates and Exploits Reolink Cameras
#Scanning #Network #Exploits #Reolink #Cameras
https://reconshell.com/reosploit-a-tool-enumerates-and-exploits-reolink-cameras/
#Scanning #Network #Exploits #Reolink #Cameras
https://reconshell.com/reosploit-a-tool-enumerates-and-exploits-reolink-cameras/
Penetration Testing Tools, ML and Linux Tutorials
ReoSploit - A Tool Enumerates and Exploits Reolink Cameras - Penetration Testing Tools, ML and Linux Tutorials
THIS IS FOR STRICTLY EDUCATIONAL PURPOSES, I AM NOT RESPONSIBLE FOR YOUR USE OF THIS
pyWhat - Identify anything
#pcap #Hacking #MalwareAnalysis #CyberSecurity
https://reconshell.com/pywhat-identify-anything/
#pcap #Hacking #MalwareAnalysis #CyberSecurity
https://reconshell.com/pywhat-identify-anything/
Penetration Testing Tools, ML and Linux Tutorials
pyWhat - Identify anything - Penetration Testing Tools, ML and Linux Tutorials
Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is!
ADCSPwn - A tool to escalate privileges in active directory network
#PrivilegeEscalation #AD #ADCSPwn #ActiveDirectory #Network
https://reconshell.com/adcspwn-a-tool-to-escalate-privileges-in-active-directory-network/
#PrivilegeEscalation #AD #ADCSPwn #ActiveDirectory #Network
https://reconshell.com/adcspwn-a-tool-to-escalate-privileges-in-active-directory-network/
Black Tool - Install the tools and start Attacking
#WebHacking #Phishing #Hacking #DDos #SocialEngineer
https://reconshell.com/black-tool-install-the-tools-and-start-attacking/
#WebHacking #Phishing #Hacking #DDos #SocialEngineer
https://reconshell.com/black-tool-install-the-tools-and-start-attacking/
Penetration Testing Tools, ML and Linux Tutorials
Black Tool - Install the tools and start Attacking - Penetration Testing Tools, ML and Linux Tutorials
Install the tools and start hacking Attacking !
PostgreSQL JSON data type
#PostgreSQL #SQL #Javascsript #JSON #MySQL
https://reconshell.com/postgresql-json-data-type/
#PostgreSQL #SQL #Javascsript #JSON #MySQL
https://reconshell.com/postgresql-json-data-type/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL JSON data type - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to how to work with PostgreSQL JSON data type and some useful operators and functions for handling JSON data.
What is Vishing and How Can You Avoid Phone Call Scams
#SocialEngineering #Phishing #PhoneCallScams #Vishing
https://reconshell.com/what-is-vishing-and-how-can-you-avoid-phone-call-scams/
#SocialEngineering #Phishing #PhoneCallScams #Vishing
https://reconshell.com/what-is-vishing-and-how-can-you-avoid-phone-call-scams/
Penetration Testing Tools, ML and Linux Tutorials
What is Vishing and How Can You Avoid Phone Call Scams - Penetration Testing Tools, ML and Linux Tutorials
If you are familiar with the term Phishing, you might think of it as the social engineering attack in which the victims are psychologically manipulated to
Machine Learning roadmap
#DataAnalysis #ML #MachineLearning
https://reconshell.com/machine-learning-roadmap/
#DataAnalysis #ML #MachineLearning
https://reconshell.com/machine-learning-roadmap/
Penetration Testing Tools, ML and Linux Tutorials
Machine Learning roadmap - Penetration Testing Tools, ML and Linux Tutorials
This guide will give you an idea of how to become a Machine Learning Engineer. Note that Machine Learning Engineer positions tend to change from company to