Sapling – Node.js framework for light web development
#Zerocode #MongoDB #Sapling #WebDevelopment #NodeJS #JavaScript #JS
https://reconshell.com/sapling-node-js-framework-for-light-web-development/
#Zerocode #MongoDB #Sapling #WebDevelopment #NodeJS #JavaScript #JS
https://reconshell.com/sapling-node-js-framework-for-light-web-development/
Penetration Testing Tools, ML and Linux Tutorials
Sapling - Node.js framework for light web development - Penetration Testing Tools, ML and Linux Tutorials
Sapling is a Node.js framework for building websites, web apps and APIs as fast as you can imagine them. With unrivalled speed of development, you can
ReoSploit - A Tool Enumerates and Exploits Reolink Cameras
#Scanning #Network #Exploits #Reolink #Cameras
https://reconshell.com/reosploit-a-tool-enumerates-and-exploits-reolink-cameras/
#Scanning #Network #Exploits #Reolink #Cameras
https://reconshell.com/reosploit-a-tool-enumerates-and-exploits-reolink-cameras/
Penetration Testing Tools, ML and Linux Tutorials
ReoSploit - A Tool Enumerates and Exploits Reolink Cameras - Penetration Testing Tools, ML and Linux Tutorials
THIS IS FOR STRICTLY EDUCATIONAL PURPOSES, I AM NOT RESPONSIBLE FOR YOUR USE OF THIS
pyWhat - Identify anything
#pcap #Hacking #MalwareAnalysis #CyberSecurity
https://reconshell.com/pywhat-identify-anything/
#pcap #Hacking #MalwareAnalysis #CyberSecurity
https://reconshell.com/pywhat-identify-anything/
Penetration Testing Tools, ML and Linux Tutorials
pyWhat - Identify anything - Penetration Testing Tools, ML and Linux Tutorials
Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is!
ADCSPwn - A tool to escalate privileges in active directory network
#PrivilegeEscalation #AD #ADCSPwn #ActiveDirectory #Network
https://reconshell.com/adcspwn-a-tool-to-escalate-privileges-in-active-directory-network/
#PrivilegeEscalation #AD #ADCSPwn #ActiveDirectory #Network
https://reconshell.com/adcspwn-a-tool-to-escalate-privileges-in-active-directory-network/
Black Tool - Install the tools and start Attacking
#WebHacking #Phishing #Hacking #DDos #SocialEngineer
https://reconshell.com/black-tool-install-the-tools-and-start-attacking/
#WebHacking #Phishing #Hacking #DDos #SocialEngineer
https://reconshell.com/black-tool-install-the-tools-and-start-attacking/
Penetration Testing Tools, ML and Linux Tutorials
Black Tool - Install the tools and start Attacking - Penetration Testing Tools, ML and Linux Tutorials
Install the tools and start hacking Attacking !
PostgreSQL JSON data type
#PostgreSQL #SQL #Javascsript #JSON #MySQL
https://reconshell.com/postgresql-json-data-type/
#PostgreSQL #SQL #Javascsript #JSON #MySQL
https://reconshell.com/postgresql-json-data-type/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL JSON data type - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to how to work with PostgreSQL JSON data type and some useful operators and functions for handling JSON data.
What is Vishing and How Can You Avoid Phone Call Scams
#SocialEngineering #Phishing #PhoneCallScams #Vishing
https://reconshell.com/what-is-vishing-and-how-can-you-avoid-phone-call-scams/
#SocialEngineering #Phishing #PhoneCallScams #Vishing
https://reconshell.com/what-is-vishing-and-how-can-you-avoid-phone-call-scams/
Penetration Testing Tools, ML and Linux Tutorials
What is Vishing and How Can You Avoid Phone Call Scams - Penetration Testing Tools, ML and Linux Tutorials
If you are familiar with the term Phishing, you might think of it as the social engineering attack in which the victims are psychologically manipulated to
Machine Learning roadmap
#DataAnalysis #ML #MachineLearning
https://reconshell.com/machine-learning-roadmap/
#DataAnalysis #ML #MachineLearning
https://reconshell.com/machine-learning-roadmap/
Penetration Testing Tools, ML and Linux Tutorials
Machine Learning roadmap - Penetration Testing Tools, ML and Linux Tutorials
This guide will give you an idea of how to become a Machine Learning Engineer. Note that Machine Learning Engineer positions tend to change from company to
Hanoman - GUI antivirus engine singature based detection
#Antivirus #Virus #SingatureDetection #Malware
https://reconshell.com/hanoman-gui-antivirus-engine-singature-based-detection/
#Antivirus #Virus #SingatureDetection #Malware
https://reconshell.com/hanoman-gui-antivirus-engine-singature-based-detection/
Penetration Testing Tools, ML and Linux Tutorials
Hanoman - GUI antivirus engine singature based detection - Penetration Testing Tools, ML and Linux Tutorials
Hanoman is an GUI antivirus engine singature based. The signatures that the Hanoman uses come from VirusShare
AutoRoot - Android rootkit and adb shell
#AutoRoot #Android #rootkit #adb #shell
https://reconshell.com/autoroot-android-rootkit-and-adb-shell/
#AutoRoot #Android #rootkit #adb #shell
https://reconshell.com/autoroot-android-rootkit-and-adb-shell/
Penetration Testing Tools, ML and Linux Tutorials
AutoRoot - Android rootkit and adb shell - Penetration Testing Tools, ML and Linux Tutorials
~ ADB shell~ Device connection~ Backup data~ Restore data~ Remove passcode (emergency purposes only)~ Unlock bootlander~ Flash recoveryTodo: apk reverse
sigurlfind3r - passive reconnaissance tool for known URLs discovery
#sigurlfind3r #URLScan #URLsdiscovery
https://reconshell.com/sigurlfind3r-passive-reconnaissance-tool-for-known-urls-discovery/
#sigurlfind3r #URLScan #URLsdiscovery
https://reconshell.com/sigurlfind3r-passive-reconnaissance-tool-for-known-urls-discovery/
Penetration Testing Tools, ML and Linux Tutorials
sigurlfind3r - passive reconnaissance tool for known URLs discovery - Penetration Testing Tools, ML and Linux Tutorials
sigurlfind3r requires go1.14+ to install successfully. Run the following command to get the repo
open source post exploitation framework
Build Your Own Botnet.
#Botnet #PostExploitation #Payload #Keylogger
#PortScanner #Miner #C2 #Hacking #AppSec #InfoSec
https://reconshell.com/byob-open-source-post-exploitation-framework/
Build Your Own Botnet.
#Botnet #PostExploitation #Payload #Keylogger
#PortScanner #Miner #C2 #Hacking #AppSec #InfoSec
https://reconshell.com/byob-open-source-post-exploitation-framework/
EarlyBird - injecting cobalt strike shellcode to powershell
#CobaltStrike #shellcode #powershell #EarlyBird
https://reconshell.com/earlybird-injecting-cobalt-strike-shellcode-to-powershell/
#CobaltStrike #shellcode #powershell #EarlyBird
https://reconshell.com/earlybird-injecting-cobalt-strike-shellcode-to-powershell/
Penetration Testing Tools, ML and Linux Tutorials
EarlyBird - injecting cobalt strike shellcode to powershell - Penetration Testing Tools, ML and Linux Tutorials
EarlyBird: a poc of using the tech with syscalls on powershell.exe injecting cobalt strike shellcode to powershell.exe using EarlyBird Tech USAGE: first get
NinjaDroid – Ninja Reverse Engineering on Android APK
#ReverseEngineering #APKTool #Android #NinjaDroid #Hacking #AppSec #InfoSec
https://reconshell.com/ninjadroid-ninja-reverse-engineering-on-android-apk/
#ReverseEngineering #APKTool #Android #NinjaDroid #Hacking #AppSec #InfoSec
https://reconshell.com/ninjadroid-ninja-reverse-engineering-on-android-apk/
Penetration Testing Tools, ML and Linux Tutorials
NinjaDroid - Ninja Reverse Engineering on Android APK - Penetration Testing Tools, ML and Linux Tutorials
Optionally, if you have the Android SDK installed locally, you can use the SDK version of aapt instead of the included one. In order to do so, you
phaser – Automated attack surface mapper and vulnerability scanner
#AttackSurface #VulnerabilityScanner #VAPT #Hacker #InfoSec #AppSec
https://reconshell.com/phaser-automated-attack-surface-mapper-and-vulnerability-scanner/
#AttackSurface #VulnerabilityScanner #VAPT #Hacker #InfoSec #AppSec
https://reconshell.com/phaser-automated-attack-surface-mapper-and-vulnerability-scanner/
Penetration Testing Tools, ML and Linux Tutorials
phaser - Automated attack surface mapper and vulnerability scanner - Penetration Testing Tools, ML and Linux Tutorials
Phaser is a high-performance and automated attack surface mapper and vulnerability scanner. Just point it to a target, and it will autimagically generate a
BrokenSMTP - Python Script for Look Common vulnerabilities on SMTP server
#vulnerabilities #BrokenSMTP #SMTP #BugBounty #Pentesting #Hacking #AppSec
https://reconshell.com/brokensmtp-python-script-for-look-common-vulnerabilities-on-smtp-server/
#vulnerabilities #BrokenSMTP #SMTP #BugBounty #Pentesting #Hacking #AppSec
https://reconshell.com/brokensmtp-python-script-for-look-common-vulnerabilities-on-smtp-server/
How to secure your REST API from attackers
#REST #API #CyberSecurity #InfoSec #AppSec #attackers
https://reconshell.com/how-to-secure-your-rest-api-from-attackers/
#REST #API #CyberSecurity #InfoSec #AppSec #attackers
https://reconshell.com/how-to-secure-your-rest-api-from-attackers/
Penetration Testing Tools, ML and Linux Tutorials
How to secure your REST API from attackers - Penetration Testing Tools, ML and Linux Tutorials
API stands for application programming interface, which basically means that we have an exposed interface that can be addressed programmatically. As the
PickleC2 - post exploitation and lateral movements framework
#PostExploitation #C2 #RedTeaming #PenetrationTesters #Hacking
https://reconshell.com/picklec2-post-exploitation-and-lateral-movements-framework/
#PostExploitation #C2 #RedTeaming #PenetrationTesters #Hacking
https://reconshell.com/picklec2-post-exploitation-and-lateral-movements-framework/
Penetration Testing Tools, ML and Linux Tutorials
PickleC2 - post exploitation and lateral movements framework - Penetration Testing Tools, ML and Linux Tutorials
PickleC2 is a post-exploitation and lateral movements framework