SharpSpray - Active Directory password spraying tool
#DomainPasswordSpray #ActiveDirectory #password #AD #SharpSpray
https://reconshell.com/sharpspray-active-directory-password-spraying-tool/
#DomainPasswordSpray #ActiveDirectory #password #AD #SharpSpray
https://reconshell.com/sharpspray-active-directory-password-spraying-tool/
Penetration Testing Tools, ML and Linux Tutorials
SharpSpray - Active Directory password spraying tool - Penetration Testing Tools, ML and Linux Tutorials
SharpSpray is a Windows domain password spraying tool written in .NET C#.
Bypass Cisco Umbrella DNS Proxy Firewall Restrictions
#Firewall #Proxy #CiscoUmbrella #Cisco #DNS #network
https://reconshell.com/bypass-cisco-umbrella-dns-proxy-firewall-restrictions/
#Firewall #Proxy #CiscoUmbrella #Cisco #DNS #network
https://reconshell.com/bypass-cisco-umbrella-dns-proxy-firewall-restrictions/
ligolo-ng – An advanced tunneling and pivoting tool
#Meterpreter #SOCKS #proxy #tunneling #pivoting
https://reconshell.com/ligolo-ng-an-advanced-tunneling-and-pivoting-tool/
#Meterpreter #SOCKS #proxy #tunneling #pivoting
https://reconshell.com/ligolo-ng-an-advanced-tunneling-and-pivoting-tool/
Penetration Testing Tools, ML and Linux Tutorials
ligolo-ng - An advanced tunneling and pivoting tool - Penetration Testing Tools, ML and Linux Tutorials
Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection
QueenSono – ICMP Data Exfiltration
#ICMP #DataExfiltration #QueenSono
https://reconshell.com/queensono-icmp-data-exfiltration/
#ICMP #DataExfiltration #QueenSono
https://reconshell.com/queensono-icmp-data-exfiltration/
Penetration Testing Tools, ML and Linux Tutorials
QueenSono - ICMP Data Exfiltration - Penetration Testing Tools, ML and Linux Tutorials
QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common. It could also been used within a system with basic ICMP
100 Red Team Projects for Pentesters and Network Managers
#RedTeam #EthicalHacking #OffensiveSecurity #pentester
#NetworkAttacks #Dataanalysis #PostExploitation
https://reconshell.com/100-red-team-projects-for-pentesters-and-network-managers/
#RedTeam #EthicalHacking #OffensiveSecurity #pentester
#NetworkAttacks #Dataanalysis #PostExploitation
https://reconshell.com/100-red-team-projects-for-pentesters-and-network-managers/
Free Cyber Intelligence Session by Deepak Kumar
#CyberSecurity #CyberIntelligence #cybercrime
#hacking #CyberForensics #DataTheft #EmailHacking
https://reconshell.com/free-cyber-intelligence-session-by-deepak-kumar/
#CyberSecurity #CyberIntelligence #cybercrime
#hacking #CyberForensics #DataTheft #EmailHacking
https://reconshell.com/free-cyber-intelligence-session-by-deepak-kumar/
Penetration Testing Tools, ML and Linux Tutorials
Free Cyber Intelligence Session by Deepak Kumar - Penetration Testing Tools, ML and Linux Tutorials
IEMLabs brings you the opportunity to register for this Cyber Intelligence Session by Deepak Kumar (D3) for FREE Perks:
Goblyn - tool for Enumeration and capture of website files metadata
#Enumeration #Goblyn #metadata
https://reconshell.com/goblyn-tool-for-enumeration-and-capture-of-website-files-metadata/
#Enumeration #Goblyn #metadata
https://reconshell.com/goblyn-tool-for-enumeration-and-capture-of-website-files-metadata/
Penetration Testing Tools, ML and Linux Tutorials
Goblyn - tool for Enumeration and capture of website files metadata - Penetration Testing Tools, ML and Linux Tutorials
Metadata Enumeration
Khepri - Cross platform agent and Post exploitation tool
#PostExploitation #C2 #Golang #RemoteShell #network
https://reconshell.com/khepri-cross-platform-agent-and-post-exploitation-tool/
#PostExploitation #C2 #Golang #RemoteShell #network
https://reconshell.com/khepri-cross-platform-agent-and-post-exploitation-tool/
azureOutlookC2 - Azure Outlook Command & Control
#Azure #Outlook #APT37 #CobaltStrike #Microsoft #DataExfiltration #C2
https://reconshell.com/azureoutlookc2-azure-outlook-command-control/
#Azure #Outlook #APT37 #CobaltStrike #Microsoft #DataExfiltration #C2
https://reconshell.com/azureoutlookc2-azure-outlook-command-control/
Penetration Testing Tools, ML and Linux Tutorials
azureOutlookC2 - Azure Outlook Command & Control - Penetration Testing Tools, ML and Linux Tutorials
Azure Outlook Command & Control. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP = Abuse Microsoft Graph API for C2
gotor – OSINT analysis on Tor sites
#OSINT #Tor #TorBrowser #Socks5 #Proxy #TorBot
https://reconshell.com/gotor-osint-analysis-on-tor-sites/
#OSINT #Tor #TorBrowser #Socks5 #Proxy #TorBot
https://reconshell.com/gotor-osint-analysis-on-tor-sites/
Penetration Testing Tools, ML and Linux Tutorials
gotor - OSINT analysis on Tor sites - Penetration Testing Tools, ML and Linux Tutorials
This is TorBot ported to Golang.
How to Install Cockpit Web Console on Linux System
#CockpitWebConsole #Ubuntu #RedHat #Fedora #ArchLinux #OpenSuse #Linux #Cockpit
https://reconshell.com/how-to-install-cockpit-web-console-on-linux-system/
#CockpitWebConsole #Ubuntu #RedHat #Fedora #ArchLinux #OpenSuse #Linux #Cockpit
https://reconshell.com/how-to-install-cockpit-web-console-on-linux-system/
Penetration Testing Tools, ML and Linux Tutorials
How to Install Cockpit Web Console on Linux System - Penetration Testing Tools, ML and Linux Tutorials
The Cockpit web console is a tool to monitor the server’s overall status, performance, and health. You can install the Cockpit web console on your local
PowerShell for Pentesters
#Pentesters #Enumeration #PowerView
#OffensivePowerShellScript #exploitation #Mimikatz
https://reconshell.com/powershell-for-pentesters/
#Pentesters #Enumeration #PowerView
#OffensivePowerShellScript #exploitation #Mimikatz
https://reconshell.com/powershell-for-pentesters/
Penetration Testing Tools, ML and Linux Tutorials
PowerShell for Pentesters - Penetration Testing Tools, ML and Linux Tutorials
PowerShell for Pentesters is a basic introduction to using PowerShell on internal penetration tests. This course is essentially the PowerShell module from my
PostgreSQL Python – Insert Data Into a Table
#SQL #MySQL #Python #PostgreSQL #PSql #pgSQL
https://reconshell.com/postgresql-python-insert-data-into-a-table/
#SQL #MySQL #Python #PostgreSQL #PSql #pgSQL
https://reconshell.com/postgresql-python-insert-data-into-a-table/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL Python - Insert Data Into a Table - Penetration Testing Tools, ML and Linux Tutorials
Summary: this tutorial shows you the step by step how to insert one or more rows into a PostgreSQL table in Python.
adbwebkit - Access ADB On Browsers
#ADB #Shell #Payload #Network #Root #RootKit
#Android #Netcat
https://reconshell.com/adbwebkit-access-adb-on-browsers/
#ADB #Shell #Payload #Network #Root #RootKit
#Android #Netcat
https://reconshell.com/adbwebkit-access-adb-on-browsers/
Penetration Testing Tools, ML and Linux Tutorials
adbwebkit - Access ADB On Browsers - Penetration Testing Tools, ML and Linux Tutorials
3- Add ADB To Environment
vulnerability disclosure - just subscribe and in one click on any vendors/products, and you’ll receive email alerts as soon as a CVE is published or updated.
CVE formats the notifications in such a way that you can quickly see what are the affected vendors and products.
https://cve.reconshell.com
CVE formats the notifications in such a way that you can quickly see what are the affected vendors and products.
https://cve.reconshell.com
Node graph data from MITRE’s ATTACK framework
#MITRE #ATTACK #Framework #DataVisualization
https://reconshell.com/node-graph-data-from-mitres-attack-framework/
#MITRE #ATTACK #Framework #DataVisualization
https://reconshell.com/node-graph-data-from-mitres-attack-framework/
Penetration Testing Tools, ML and Linux Tutorials
Node graph data from MITRE's ATTACK framework - Penetration Testing Tools, ML and Linux Tutorials
View Demo (GitHub Pages)
nzyme - WiFi Defense System
#WiFi #Network #Kismet #FingerPrinting
#wireless #Malicious #WiFiHacking
https://reconshell.com/nzyme-wifi-defense-system/
#WiFi #Network #Kismet #FingerPrinting
#wireless #Malicious #WiFiHacking
https://reconshell.com/nzyme-wifi-defense-system/
Penetration Testing Tools, ML and Linux Tutorials
nzyme - WiFi Defense System - Penetration Testing Tools, ML and Linux Tutorials
The nzyme project uses WiFi adapters in monitor mode to scan the frequencies for suspicious behavior, specifically rogue access points and known WiFi attack
Watcher - Open Source Cybersecurity Threat Hunting Platform
#Cybersecurity #ThreatHunting #DataLeaks #SocialNetworks
#DataVisualization #analysis
https://reconshell.com/watcher-open-source-cybersecurity-threat-hunting-platform/
#Cybersecurity #ThreatHunting #DataLeaks #SocialNetworks
#DataVisualization #analysis
https://reconshell.com/watcher-open-source-cybersecurity-threat-hunting-platform/
Penetration Testing Tools, ML and Linux Tutorials
Watcher - Open Source Cybersecurity Threat Hunting Platform - Penetration Testing Tools, ML and Linux Tutorials
Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation.
ScareCrow - Payload creation framework designed around EDR bypass
#Windows #ScareCrow #Payload #EDR #EDRbypass
https://reconshell.com/scarecrow-payload-creation-framework-designed-around-edr-bypass/
#Windows #ScareCrow #Payload #EDR #EDRbypass
https://reconshell.com/scarecrow-payload-creation-framework-designed-around-edr-bypass/
Penetration Testing Tools, ML and Linux Tutorials
ScareCrow - Payload creation framework designed around EDR bypass. - Penetration Testing Tools, ML and Linux Tutorials
If you want to learn more about the techniques utilized in this framework please take a look at Part 1 and Part 2