784 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 39 / 40
Newer►
  • thumbnail
    https://pinkysplanet.net/
    January 27, 2019 at 11:02:56 AM UTC - permalink -
    QRCode
    - https://pinkysplanet.net/
    blog secu hacking oscp pinky vm writeup read
  • thumbnail
    DNSdumpster.com - dns recon and research, find and lookup dns records
    January 27, 2019 at 11:02:02 AM UTC - permalink -
    QRCode
    - https://dnsdumpster.com/
    dns osint hacking host graphs recon passive intelligence gathering
  • thumbnail
    www.sparrowslockpicks.com
    January 26, 2019 at 5:00:25 PM UTC - permalink -
    QRCode
    - https://www.sparrowslockpicks.com/
    lockpicking pins picking lock locks
  • thumbnail
    GTFOBins

    GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.

    January 25, 2019 at 4:33:34 PM UTC - permalink -
    QRCode
    - https://gtfobins.github.io/
    shell escape sequences rbash jailbreak jail bypass
  • thumbnail
    Ressources Hacking
    January 25, 2019 at 11:18:25 AM UTC - permalink -
    QRCode
    - http://index-of.es/
    tutoriel resources tutorials howto learn hacking
  • thumbnail
    MEGA : Pentest Academy - Courses

    Big repo for Pentest Academy courses.

    January 22, 2019 at 3:48:04 PM UTC - permalink -
    QRCode
    - https://mega.nz/#F!bCgTkYhA!haaINPhu_CPjkcl1ZBBOSw
    courses pentestacademy pentest hacking formation support pdf mega
  • thumbnail
    Building A Red Team WiFi Attack Car

    Component reference
    Wifi cards

    AC1200

    AWUS1900, 50€ https://www.amazon.de/Network-AWUS1900-802-11ac-Ultra-adapter/dp/B01MZD7Z76/ref=sr_1_1?s=computers&ie=UTF8&qid=1547331669&sr=1-1&keywords=AWUS+1900 or the https://www.amazon.de/Alfa-AWUS036ACH-Dual-Adapter-AC1200/dp/B00VEEBOPG/ref=sr_1_1?s=computers&ie=UTF8&qid=1547331743&sr=1-1&keywords=alfa+ac1200
    Raspberry PI 3B+

    https://www.amazon.de/Raspberry-1373331-Pi-Modell-Mainboard/dp/B07BDR5PDW/ref=sr_1_5?s=computers&ie=UTF8&qid=1547331633&sr=1-5&keywords=raspberry+pi+3+b%2B
    Adafruit UBEC

    https://www.adafruit.com/product/1385

    January 21, 2019 at 1:36:24 PM UTC - permalink -
    QRCode
    - https://www.secjuice.com/red-team-wifi-attack-wardrive-car/
    wifi hacking car pineapple redteam rasperry ac1200 awus1900 3b+ adafruit
  • thumbnail
    Using Burp to Test Session Token Generation | Burp Suite Support Center

    Burp Decoder : Send the token to the Decoder and try to decode the string

    Burp Sequencer : Send request to sequencer and "Start Live Capture"
    "Burp Sequencer will repeatedly issue the request and extract the relevant token from the application's responses."

    Burp Intruder : Send request to Intruder, and select either "Character frobber" or "Bit flipper" payload type and then start attack.
    The "Character frobber" payload type operates on a string input and modifies the value of each character position in turn.

    January 15, 2019 at 3:13:10 PM UTC - permalink -
    QRCode
    - https://support.portswigger.net/customer/portal/articles/1964169-using-burp-to-test-session-token-generation
    session token generation testing intruder sequencer decoder bit flipping character frobber hacking burp tuto
  • thumbnail
    Finding Bad Characters with Immunity Debugger and Mona.py – Bulb Security
    January 14, 2019 at 5:05:33 PM UTC - permalink -
    QRCode
    - https://bulbsecurity.com/finding-bad-characters-with-immunity-debugger-and-mona-py/
    buffer overflow bof mona immunity badchars tuto hacking
  • thumbnail
    http://www.amanhardikar.com/mindmaps/Practice.html
    January 7, 2019 at 10:16:08 AM UTC - permalink -
    QRCode
    - http://www.amanhardikar.com/mindmaps/Practice.html
    hacking labs vulnerable web applications practice
  • thumbnail
    FBI leaked document by The Dark Overlord
    January 6, 2019 at 12:34:15 AM UTC - permalink -
    QRCode
    - https://steemit.com/thedarkoverlord/@thedarkoverlord/9-11-papers-megaleak-layer-1-checkpoint-03-04-05-06-and-07-cyber-cash-for-cyber-cache
    thedarkoverlord leak leaks fbi 09/11 checkpoint
  • thumbnail
    http://blog.sevagas.com/IMG/pdf/exploiting_capabilities_the_dark_side.pdf

    e: Effective
    This means the capability is “activated”.

    p: Permitted
    This means the capability can be used/is allowed.

    i: Inherited
    The capability is kept by child/subprocesses upon execve() for example.

    https://www.insecure.ws/linux/getcap_setcap.html

    December 28, 2018 at 12:56:28 PM UTC - permalink -
    QRCode
    - http://blog.sevagas.com/IMG/pdf/exploiting_capabilities_the_dark_side.pdf
    linux capabilities hacking setcap getcap pdf
  • thumbnail
    Second Order SQL injection
    December 26, 2018 at 11:29:10 PM UTC - permalink -
    QRCode
    - https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/
    sql injection second order hacking tuto
  • thumbnail
    ASafety » MSSQL Injection Cheat Sheet
    December 26, 2018 at 11:28:46 PM UTC - permalink -
    QRCode
    - https://www.asafety.fr/mssql-injection-cheat-sheet/
    cheatsheet mssql injection sql hacking
  • thumbnail
    Kerberoasting - Part 1 ·
    December 22, 2018 at 9:08:57 PM UTC - permalink -
    QRCode
    - https://malicious.link/post/2016/kerberoast-pt1/
    kerberos kerberoasting windows active directory ad spn impacket hacking
  • thumbnail
    44592-linux-restricted-shell-bypass-guide.pdf

    tar cf /dev/null testfile --checkpoint=1 --checkpoint-action=exec=/bin/bash

    December 19, 2018 at 1:18:32 PM UTC - permalink -
    QRCode
    - https://www.exploit-db.com/docs/english/44592-linux-restricted-shell-bypass-guide.pdf
    escaping rbash shell escape
  • NVISO ApkScan - Scan Android applications for malware

    www.decompileandroid.com
    www.virustotal.com
    https://github.com/pjlantz/droidbox

    December 18, 2018 at 4:36:54 PM UTC * - permalink -
    QRCode
    - https://apkscan.nviso.be/
    android hacking reversing analyzing forensic apk scan decompiling
  • thumbnail
    GitHub - quentinhardy/jndiat: JNDI Attacking Tool
    December 13, 2018 at 5:50:23 PM UTC - permalink -
    QRCode
    - https://github.com/quentinhardy/jndiat
    jndi java hacking t3 jdbc
  • thumbnail
    How to Bypassing Filter to Traversal Attacks ? | Hacking & Tricks

    dot %2e
    forward slash %2f
    backslash %5c

    dot %u002e
    forward slash %u2215
    backslash %u2216

    ....//
    ....\/
    ..../\
    ....\

    December 12, 2018 at 11:12:14 PM UTC - permalink -
    QRCode
    - https://tipstrickshack.blogspot.com/2013/02/how-to-bypassing-filter-to-traversal_8831.html
    bypass transversal filter lfi
  • thumbnail
    Using SSH certificates · Ramblings of a Unix Geek
    December 12, 2018 at 2:10:19 AM UTC - permalink -
    QRCode
    - https://www.sweharris.org/post/2016-10-30-ssh-certs/
    ssh certificates ssh-keygen host ca hacking
Links per page: 20 50 100
◄Older
page 39 / 40
Newer►
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation