30 days of JavaScript programming challenge
#30DaysOfJavaScript #JS #NodeJS #programming
https://reconshell.com/30-days-of-javascript/
#30DaysOfJavaScript #JS #NodeJS #programming
https://reconshell.com/30-days-of-javascript/
ViperVenom - Open Source Cyber Offensive Tool
#PenetrationTesting #CyberOffensiveTool #payload #ReverseShell
#Hacking #VAPT #AppSec #InfoSec #Malware #Spyware
https://reconshell.com/vipervenom-open-source-cyber-offensive-tool/
#PenetrationTesting #CyberOffensiveTool #payload #ReverseShell
#Hacking #VAPT #AppSec #InfoSec #Malware #Spyware
https://reconshell.com/vipervenom-open-source-cyber-offensive-tool/
Penetration Testing Tools, ML and Linux Tutorials
ViperVenom - Open Source Cyber Offensive Tool - Penetration Testing Tools, ML and Linux Tutorials
ViperVenom is an open-source cyber offensive tool developed by Revise7 Security for pentesters. ViperVenom is a great tool when it comes to pentesting
CobaltStrike BOF - Inject ETW Bypass
#CobaltStrike #ETWBypass #ProcessInjection #BOF
#OSEP #malware #Shellcode #RedTeam #BlueTeam
https://reconshell.com/cobaltstrike-bof-inject-etw-bypass/
#CobaltStrike #ETWBypass #ProcessInjection #BOF
#OSEP #malware #Shellcode #RedTeam #BlueTeam
https://reconshell.com/cobaltstrike-bof-inject-etw-bypass/
Penetration Testing Tools, ML and Linux Tutorials
CobaltStrike BOF - Inject ETW Bypass - Penetration Testing Tools, ML and Linux Tutorials
Running InjectEtwBypass BOF from CobaltStrike to Bypass ETW in Notepad.exe
Generate More Leads With These 12 SEO Tips
#SEO #SearchEngines #MetaTag #SEOTips
https://reconshell.com/generate-more-leads-with-these-12-seo-tips/
#SEO #SearchEngines #MetaTag #SEOTips
https://reconshell.com/generate-more-leads-with-these-12-seo-tips/
Penetration Testing Tools, ML and Linux Tutorials
Generate More Leads With These 12 SEO Tips - ReconShell
In this article, we'll provide information about generate more leads with these 12 SEO tips. Google is king when it comes to search engines.
Jir Thief – A Red Team tool for exfiltrating sensitive data from Jira tickets
#Jira #RedTeam #SensitiveData #Hacking #InfoSec #DataExfiltration #RedTeamTools
https://reconshell.com/jir-thief-a-red-team-tool-for-exfiltrating-sensitive-data-from-jira-tickets/
#Jira #RedTeam #SensitiveData #Hacking #InfoSec #DataExfiltration #RedTeamTools
https://reconshell.com/jir-thief-a-red-team-tool-for-exfiltrating-sensitive-data-from-jira-tickets/
Penetration Testing Tools, ML and Linux Tutorials
Jir Thief - A Red Team tool for exfiltrating sensitive data from Jira tickets - Penetration Testing Tools, ML and Linux Tutorials
This Module will connect to Jira's API using an access token, export to a word .doc, and download the Jira issues that the target has access to. It allows you
PostgreSQL PHP - Connect to PostgreSQL Database Using PDO
#PostgreSQL #PHP #PDO #SQL #MySQL PSQL
https://reconshell.com/postgresql-php-connect-to-postgresql-database-using-pdo/
#PostgreSQL #PHP #PDO #SQL #MySQL PSQL
https://reconshell.com/postgresql-php-connect-to-postgresql-database-using-pdo/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL PHP - Connect to PostgreSQL Database Using PDO - Penetration Testing Tools, ML and Linux Tutorials
Most PHP distributions include the PostgreSQL extension PDO_PGSQL by default so you don’t need to do any further configuration in PHP.
PowerShx - Run Powershell without software restrictions
#PowerShell #Payload #PowerShx #AMSI #Bypass #Microsoft #Cmdlets
https://reconshell.com/powershx-run-powershell-without-software-restrictions/
#PowerShell #Payload #PowerShx #AMSI #Bypass #Microsoft #Cmdlets
https://reconshell.com/powershx-run-powershell-without-software-restrictions/
Penetration Testing Tools, ML and Linux Tutorials
PowerShx - Run Powershell without software restrictions. - Penetration Testing Tools, ML and Linux Tutorials
Unmanaged PowerShell execution using DLLs or a standalone executable.
gitoops - A tool to help attackers and defenders identify lateral movement
#PrivilegeEscalation #Attackers #Defenders #LateralMovement #GitHub #Bloodhound
https://reconshell.com/gitoops-a-tool-to-help-attackers-and-defenders-identify-lateral-movement/
#PrivilegeEscalation #Attackers #Defenders #LateralMovement #GitHub #Bloodhound
https://reconshell.com/gitoops-a-tool-to-help-attackers-and-defenders-identify-lateral-movement/
Penetration Testing Tools, ML and Linux Tutorials
gitoops - A tool to help attackers and defenders identify lateral movement - Penetration Testing Tools, ML and Linux Tutorials
GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by abusing CI/CD pipelines
WAF bypass xss payloads
#WAF #XSS #Payloads #Cloudflare #BugBounty #BugHunter
https://reconshell.com/waf-bypass-xss-payloads/
#WAF #XSS #Payloads #Cloudflare #BugBounty #BugHunter
https://reconshell.com/waf-bypass-xss-payloads/
Penetration Testing Tools, ML and Linux Tutorials
WAF bypass xss payloads - Penetration Testing Tools, ML and Linux Tutorials
Trying to gather xss payloads from the internet that bypasses WAF. All credit goes to the owners of the payloads.
batchql - GraphQL security auditing script
#SecurityAuditing #GraphQL #CSRFdetection #Enumeration #batchql
https://reconshell.com/batchql-graphql-security-auditing-script/
#SecurityAuditing #GraphQL #CSRFdetection #Enumeration #batchql
https://reconshell.com/batchql-graphql-security-auditing-script/
Penetration Testing Tools, ML and Linux Tutorials
batchql - GraphQL security auditing script - Penetration Testing Tools, ML and Linux Tutorials
BatchQL is a GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations. This script is not complex, and we welcome
CopyCat - Simple rapper for Mimikatz bypass Defender
#Shellcode #CopyCat #Mimikatz #bypass #Defender
https://reconshell.com/copycat-simple-rapper-for-mimikatz-bypass-defender/
#Shellcode #CopyCat #Mimikatz #bypass #Defender
https://reconshell.com/copycat-simple-rapper-for-mimikatz-bypass-defender/
Penetration Testing Tools, ML and Linux Tutorials
CopyCat - Simple rapper for Mimikatz bypass Defender - Penetration Testing Tools, ML and Linux Tutorials
Start a cmd shell (with admin priv.) like this and run CopyCat.exe and enjoy Mimikatz (If you are running 64 bit Windows 10)
Complete Machine Learning Package
#MachineLearning #DataAnalysis #Python #ML #NLP
#Data #Visualization #DeepLearning
https://reconshell.com/complete-machine-learning-package/
#MachineLearning #DataAnalysis #Python #ML #NLP
#Data #Visualization #DeepLearning
https://reconshell.com/complete-machine-learning-package/
Penetration Testing Tools, ML and Linux Tutorials
Complete Machine Learning Package - Penetration Testing Tools, ML and Linux Tutorials
This is a comprehensive repository containing 30+ notebooks on Python programming, data manipulation, data analysis, data visualization, data cleaning,
scilla - Information Gathering tool and Subdomains Enumeration
#SubdomainsEnumeration #InformationGathering #Scilla
#PortsEnumeration #DNSEnumeration #DirectoriesEnumeration
https://reconshell.com/scilla-information-gathering-tool-and-subdomains-enumeration/
#SubdomainsEnumeration #InformationGathering #Scilla
#PortsEnumeration #DNSEnumeration #DirectoriesEnumeration
https://reconshell.com/scilla-information-gathering-tool-and-subdomains-enumeration/
Collection of Event ID resources useful for Digital Forensics and Incident Response
#IncidentResponse #IR #SecurityAuditing #SIEM #D3
#DigitalForensics #EventID #Malware #WindowsSecurity
https://reconshell.com/collection-of-event-id-resources-useful-for-digital-forensics-and-incident-response/
#IncidentResponse #IR #SecurityAuditing #SIEM #D3
#DigitalForensics #EventID #Malware #WindowsSecurity
https://reconshell.com/collection-of-event-id-resources-useful-for-digital-forensics-and-incident-response/
Collection of more than a 140 Penetration Testing Tools
#PenetrationTesting #Exploits #SecurityAudits #RedTeaming
#WebApplicationSecurity #Hacking #AppSec #InfoSec
https://reconshell.com/penetration-testing-tools/
#PenetrationTesting #Exploits #SecurityAudits #RedTeaming
#WebApplicationSecurity #Hacking #AppSec #InfoSec
https://reconshell.com/penetration-testing-tools/
blocksec incidents - DeFi compromises and blockchain attacks
#blockchain #attacks #DeFi #BlockchainSecurity
#CryptIncidents #hacks #SecurityIncidents
https://reconshell.com/blocksec-incidents-defi-compromises-and-blockchain-attacks/
#blockchain #attacks #DeFi #BlockchainSecurity
#CryptIncidents #hacks #SecurityIncidents
https://reconshell.com/blocksec-incidents-defi-compromises-and-blockchain-attacks/
EXOCET - AV-evading undetectable payload delivery tool
#APT41 #Mimikatz #PowerShell #CyberThreat #shellcode
#msfvenom #Malware #Metasploit #crypters
https://reconshell.com/exocet-av-evading-undetectable-payload-delivery-tool/
#APT41 #Mimikatz #PowerShell #CyberThreat #shellcode
#msfvenom #Malware #Metasploit #crypters
https://reconshell.com/exocet-av-evading-undetectable-payload-delivery-tool/
Penetration Testing Tools, ML and Linux Tutorials
EXOCET - AV-evading undetectable payload delivery tool - Penetration Testing Tools, ML and Linux Tutorials
EXOCET is superior to Metasploit's "Evasive Payloads" modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit's Evasion Payloads uses a