Hack

Hack

232 bookmarks
Newest
Burp Suite Playlist
Burp Suite Playlist
Hacker101 is a free class for web security. Whether you’re a programmer with an interest in bug bounties or a seasoned security professional, Hacker101 has something to teach you.
·hacker101.com·
Burp Suite Playlist
How to Write a Good Report and Use the CVSS Calculator
How to Write a Good Report and Use the CVSS Calculator
Hacker101 is a free class for web security. Whether you’re a programmer with an interest in bug bounties or a seasoned security professional, Hacker101 has something to teach you.
·hacker101.com·
How to Write a Good Report and Use the CVSS Calculator
GitHub - center-for-threat-informed-defense/insider-threat-ttp-kb: The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
GitHub - center-for-threat-informed-defense/insider-threat-ttp-kb: The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat ...
·github.com·
GitHub - center-for-threat-informed-defense/insider-threat-ttp-kb: The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
Insider Threat TTP Knowledge Base
Insider Threat TTP Knowledge Base
The Insider Threat TTP Knowledge Base hosts tactics, techniques, and procedures that defenders can use to guard against insider actions on IT systems.
·mitre-engenuity.org·
Insider Threat TTP Knowledge Base
Chameleon Mini: Mifare Cracking via the Reader Attack
Chameleon Mini: Mifare Cracking via the Reader Attack
Learn how to crack a MIFARE card via the Reader Attack with our Chameleon Mini, Proxmark 3 and SCL-3711. Discount code for these tools also available!
·lab401.com·
Chameleon Mini: Mifare Cracking via the Reader Attack
Post | hackers-arise
Post | hackers-arise
Welcome back, my budding hackers! One of the most popular areas for those starting out in this discipline is hacking Wi-Fi. Wi-Fi has been rife with vulnerabilities and insecurities over the years and nearly everyone wants to take advantage of this. When Wi-Fi was first developed in the late 90's, the original encryption/security standard, Wired Equivalent privacy or WEP, was easily cracked in minutes by statistical methods. When it was improved with WPA, Wi-Fi hacking became more difficult, bu
·hackers-arise.com·
Post | hackers-arise
Chameleon Lite BUY THIS good price!!!! the makers increased the price!!1
Chameleon Lite BUY THIS good price!!!! the makers increased the price!!1
Introduction The ChameleonLite is a low-cost, high-precision RFID emulator, optimised for 13.56MHz emulation, specifically MIFARE® and 14A Chipsets. While the ChameleonUltra has evolved into a powerful multi-frequency tool, the ChameleonLite is essentually an updated version of the ChameleonMini - with several useful i
·lab401.com·
Chameleon Lite BUY THIS good price!!!! the makers increased the price!!1
Wear OS | Android Developers
Wear OS | Android Developers
Learn about Wear OS, an Android-based operating system optimized for the wrist.
·developer.android.com·
Wear OS | Android Developers
Hack Solidity: Reentrancy Attack
Hack Solidity: Reentrancy Attack
Reentrancy attack is one of the most destructive attacks in Solidity smart contract. It occurs when a function makes an external call to another
The attack function calls the withdraw function in the victim’s contract. When the token is received, the fallback function calls back the withdraw
·hackernoon.com·
Hack Solidity: Reentrancy Attack
[PATCH] Payload Library for Web UI & SSH - SharkJack Firmware 1.1.0+
[PATCH] Payload Library for Web UI & SSH - SharkJack Firmware 1.1.0+
Payload Library for Web UI/SSH(Unofficial Patch) This (unofficial) Patch provides the Official SharkJack Web UI with a additional Tab on the Web UI (http://172.16.24.1/) to maintain your payloads on the Device itself rather than relying on a PC to switch to your prior used payloads. I personally ...
·forums.hak5.org·
[PATCH] Payload Library for Web UI & SSH - SharkJack Firmware 1.1.0+