DNSTake - Tool To Check subdomain takeover vulnerability
#DNS #Vulnerabilities #BugBounty #SubdomainTakeover
https://reconshell.com/dnstake-tool-to-check-subdomain-takeover-vulnerability/
#DNS #Vulnerabilities #BugBounty #SubdomainTakeover
https://reconshell.com/dnstake-tool-to-check-subdomain-takeover-vulnerability/
Penetration Testing Tools, ML and Linux Tutorials
DNSTake - Tool To Check subdomain takeover vulnerability - Penetration Testing Tools, ML and Linux Tutorials
A fast tool to check missing hosted DNS zones that can lead to subdomain takeover.
Poiana - Meterpreter Reverse shell over TOR network
#Tor2Web #msfconsole #Meterpreter #Reverseshell #TOR #Network
https://reconshell.com/poiana-meterpreter-reverse-shell-over-tor-network/
#Tor2Web #msfconsole #Meterpreter #Reverseshell #TOR #Network
https://reconshell.com/poiana-meterpreter-reverse-shell-over-tor-network/
PostgreSQL Python Create Tables
#PostgreSQL #Python #SQL #DBMS #PSQL #pgSQL #MySQL
https://reconshell.com/postgresql-python-create-tables/
#PostgreSQL #Python #SQL #DBMS #PSQL #pgSQL #MySQL
https://reconshell.com/postgresql-python-create-tables/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL Python Create Tables - Penetration Testing Tools, ML and Linux Tutorials
This tutorial assumes that you know how to write the CREATE TABLE statement. If this is not the case, you should check out the CREATE TABLE tutorial.
Azure Red Team -Azure Security Resources and Notes
#Azure #RedTeam #Enumeration #AzureAD #Powershell #AD
#Phishing #Microsoft #Pentesting #VAPT #shell #PowerZure
https://reconshell.com/azure-red-team-azure-security-resources-and-notes/
#Azure #RedTeam #Enumeration #AzureAD #Powershell #AD
#Phishing #Microsoft #Pentesting #VAPT #shell #PowerZure
https://reconshell.com/azure-red-team-azure-security-resources-and-notes/
Penetration Testing Tools, ML and Linux Tutorials
Azure Red Team -Azure Security Resources and Notes - Penetration Testing Tools, ML and Linux Tutorials
EDITED EDITION — Getting Started in Pentesting The Cloud–Azure | Beau Bullock | 1-Hour
Gososerial - Dynamically Generates Ysoserial’s Payload
#JavaDeserialization #Gososerial #Payload #Ysoserial
#SecurityTools #Pentesting
https://reconshell.com/gososerial-dynamically-generates-ysoserials-payload/
#JavaDeserialization #Gososerial #Payload #Ysoserial
#SecurityTools #Pentesting
https://reconshell.com/gososerial-dynamically-generates-ysoserials-payload/
SharpSpray - Active Directory password spraying tool
#DomainPasswordSpray #ActiveDirectory #password #AD #SharpSpray
https://reconshell.com/sharpspray-active-directory-password-spraying-tool/
#DomainPasswordSpray #ActiveDirectory #password #AD #SharpSpray
https://reconshell.com/sharpspray-active-directory-password-spraying-tool/
Penetration Testing Tools, ML and Linux Tutorials
SharpSpray - Active Directory password spraying tool - Penetration Testing Tools, ML and Linux Tutorials
SharpSpray is a Windows domain password spraying tool written in .NET C#.
Bypass Cisco Umbrella DNS Proxy Firewall Restrictions
#Firewall #Proxy #CiscoUmbrella #Cisco #DNS #network
https://reconshell.com/bypass-cisco-umbrella-dns-proxy-firewall-restrictions/
#Firewall #Proxy #CiscoUmbrella #Cisco #DNS #network
https://reconshell.com/bypass-cisco-umbrella-dns-proxy-firewall-restrictions/
ligolo-ng – An advanced tunneling and pivoting tool
#Meterpreter #SOCKS #proxy #tunneling #pivoting
https://reconshell.com/ligolo-ng-an-advanced-tunneling-and-pivoting-tool/
#Meterpreter #SOCKS #proxy #tunneling #pivoting
https://reconshell.com/ligolo-ng-an-advanced-tunneling-and-pivoting-tool/
Penetration Testing Tools, ML and Linux Tutorials
ligolo-ng - An advanced tunneling and pivoting tool - Penetration Testing Tools, ML and Linux Tutorials
Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection
QueenSono – ICMP Data Exfiltration
#ICMP #DataExfiltration #QueenSono
https://reconshell.com/queensono-icmp-data-exfiltration/
#ICMP #DataExfiltration #QueenSono
https://reconshell.com/queensono-icmp-data-exfiltration/
Penetration Testing Tools, ML and Linux Tutorials
QueenSono - ICMP Data Exfiltration - Penetration Testing Tools, ML and Linux Tutorials
QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common. It could also been used within a system with basic ICMP
100 Red Team Projects for Pentesters and Network Managers
#RedTeam #EthicalHacking #OffensiveSecurity #pentester
#NetworkAttacks #Dataanalysis #PostExploitation
https://reconshell.com/100-red-team-projects-for-pentesters-and-network-managers/
#RedTeam #EthicalHacking #OffensiveSecurity #pentester
#NetworkAttacks #Dataanalysis #PostExploitation
https://reconshell.com/100-red-team-projects-for-pentesters-and-network-managers/
Free Cyber Intelligence Session by Deepak Kumar
#CyberSecurity #CyberIntelligence #cybercrime
#hacking #CyberForensics #DataTheft #EmailHacking
https://reconshell.com/free-cyber-intelligence-session-by-deepak-kumar/
#CyberSecurity #CyberIntelligence #cybercrime
#hacking #CyberForensics #DataTheft #EmailHacking
https://reconshell.com/free-cyber-intelligence-session-by-deepak-kumar/
Penetration Testing Tools, ML and Linux Tutorials
Free Cyber Intelligence Session by Deepak Kumar - Penetration Testing Tools, ML and Linux Tutorials
IEMLabs brings you the opportunity to register for this Cyber Intelligence Session by Deepak Kumar (D3) for FREE Perks:
Goblyn - tool for Enumeration and capture of website files metadata
#Enumeration #Goblyn #metadata
https://reconshell.com/goblyn-tool-for-enumeration-and-capture-of-website-files-metadata/
#Enumeration #Goblyn #metadata
https://reconshell.com/goblyn-tool-for-enumeration-and-capture-of-website-files-metadata/
Penetration Testing Tools, ML and Linux Tutorials
Goblyn - tool for Enumeration and capture of website files metadata - Penetration Testing Tools, ML and Linux Tutorials
Metadata Enumeration
Khepri - Cross platform agent and Post exploitation tool
#PostExploitation #C2 #Golang #RemoteShell #network
https://reconshell.com/khepri-cross-platform-agent-and-post-exploitation-tool/
#PostExploitation #C2 #Golang #RemoteShell #network
https://reconshell.com/khepri-cross-platform-agent-and-post-exploitation-tool/
azureOutlookC2 - Azure Outlook Command & Control
#Azure #Outlook #APT37 #CobaltStrike #Microsoft #DataExfiltration #C2
https://reconshell.com/azureoutlookc2-azure-outlook-command-control/
#Azure #Outlook #APT37 #CobaltStrike #Microsoft #DataExfiltration #C2
https://reconshell.com/azureoutlookc2-azure-outlook-command-control/
Penetration Testing Tools, ML and Linux Tutorials
azureOutlookC2 - Azure Outlook Command & Control - Penetration Testing Tools, ML and Linux Tutorials
Azure Outlook Command & Control. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP = Abuse Microsoft Graph API for C2
gotor – OSINT analysis on Tor sites
#OSINT #Tor #TorBrowser #Socks5 #Proxy #TorBot
https://reconshell.com/gotor-osint-analysis-on-tor-sites/
#OSINT #Tor #TorBrowser #Socks5 #Proxy #TorBot
https://reconshell.com/gotor-osint-analysis-on-tor-sites/
Penetration Testing Tools, ML and Linux Tutorials
gotor - OSINT analysis on Tor sites - Penetration Testing Tools, ML and Linux Tutorials
This is TorBot ported to Golang.
How to Install Cockpit Web Console on Linux System
#CockpitWebConsole #Ubuntu #RedHat #Fedora #ArchLinux #OpenSuse #Linux #Cockpit
https://reconshell.com/how-to-install-cockpit-web-console-on-linux-system/
#CockpitWebConsole #Ubuntu #RedHat #Fedora #ArchLinux #OpenSuse #Linux #Cockpit
https://reconshell.com/how-to-install-cockpit-web-console-on-linux-system/
Penetration Testing Tools, ML and Linux Tutorials
How to Install Cockpit Web Console on Linux System - Penetration Testing Tools, ML and Linux Tutorials
The Cockpit web console is a tool to monitor the server’s overall status, performance, and health. You can install the Cockpit web console on your local
PowerShell for Pentesters
#Pentesters #Enumeration #PowerView
#OffensivePowerShellScript #exploitation #Mimikatz
https://reconshell.com/powershell-for-pentesters/
#Pentesters #Enumeration #PowerView
#OffensivePowerShellScript #exploitation #Mimikatz
https://reconshell.com/powershell-for-pentesters/
Penetration Testing Tools, ML and Linux Tutorials
PowerShell for Pentesters - Penetration Testing Tools, ML and Linux Tutorials
PowerShell for Pentesters is a basic introduction to using PowerShell on internal penetration tests. This course is essentially the PowerShell module from my