Hacking

67 bookmarks
Custom sorting
Anatomie d'un exercice Red Team - Chapitre 1 - POST
Anatomie d'un exercice Red Team - Chapitre 1 - POST
Un engagement Red Team peut être décrit brièvement comme une simulation d'attaque ciblée en situation réelle. En tant qu'acteur de la menace, il utilise une approche mixte faisant appel à l'ingénierie sociale, aux techniques d'intrusion physique, aux tests d'intrusion ciblant des applications/réseaux, aux campagnes de phishing ciblées... simultanément pour atteindre certains objectifs prédéfinis.
·post.lu·
Anatomie d'un exercice Red Team - Chapitre 1 - POST
Top 10 web hacking techniques of 2021
Top 10 web hacking techniques of 2021
Welcome to the Top 10 (new) Web Hacking Techniques of 2021, the latest iteration of our annual community-powered effort to identify the most significant web security research released in the last year
·portswigger.net·
Top 10 web hacking techniques of 2021
Big Tech is mandating MFA. Hackers have workarounds
Big Tech is mandating MFA. Hackers have workarounds
Multi-factor authentication offers users far more protection than a password alone. But experts warn it’s no panacea against hackers.
·readme.security·
Big Tech is mandating MFA. Hackers have workarounds
Free Rainbow Tables
Free Rainbow Tables
The largest collection of rainbow tables anywhere - completely free to download
·freerainbowtables.com·
Free Rainbow Tables
Hacking Grindr Accounts with Copy and Paste
Hacking Grindr Accounts with Copy and Paste
Sexuality, relationships and online dating are all rather personal things. They're aspects of our lives that many people choose to keep private or at the very least, share only with people of our choosing. Grindr is "The World's Largest Social Networking App for Gay, Bi, Trans, and Queer People" which
·troyhunt.com·
Hacking Grindr Accounts with Copy and Paste
Metasploit Unleashed | Offensive Security
Metasploit Unleashed | Offensive Security
Metasploit Unleashed (MSFU) is a Free Online Ethical Hacking Course by Offensive Security, which benefits Hackers for Charity. Learn how to use Metasploit.
·offensive-security.com·
Metasploit Unleashed | Offensive Security
Des hackers font planter des lecteurs de codes-barres avec un QR code
Des hackers font planter des lecteurs de codes-barres avec un QR code
Ces appareils ne filtrent pas toujours l’information qu’ils reçoivent. Certains petits farceurs ont eu l’idée d’encoder la chaîne EICAR qui est utilisée pour tester les antivirus. Une idée simple, mais efficace.
·01net.com·
Des hackers font planter des lecteurs de codes-barres avec un QR code
Breaking GitHub Private Pages for $35k
Breaking GitHub Private Pages for $35k
Abusing CRLF, cache poisoning, and other misconfigurations for a no-interaction XSS against GitHub Private Pages.
·robertchen.cc·
Breaking GitHub Private Pages for $35k
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
·geeksforgeeks.org·
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
CVEdetails.com is a free CVE security vulnerability database/information source. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
·cvedetails.com·
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
My Javascript Recon Process - BugBounty
My Javascript Recon Process - BugBounty
My Javascript Recon Process - BugBounty. GitHub Gist: instantly share code, notes, and snippets.
·gist.github.com·
My Javascript Recon Process - BugBounty
m4ll0k - Overview
m4ll0k - Overview
🄷 🄰 🄲 🄺 🄴 🅁 🇲🇦 🇮🇹 🇪🇸 . m4ll0k has 13 repositories available. Follow their code on GitHub.
·github.com·
m4ll0k - Overview
CVE - CVE
CVE - CVE
CVE® is a list of records — each containing an identification number, a description, and at least one public reference — for publicly known cybersecurity vulnerabilities. The mission of the CVE Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
·cve.mitre.org·
CVE - CVE
Firing Range
Firing Range
·public-firing-range.appspot.com·
Firing Range
What is a backdoor? Let's build one with Node.js | Snyk
What is a backdoor? Let's build one with Node.js | Snyk
A backdoor in our code that can perform OS injection is one of the most scary scenarios ever. Currently, npm has more than 1.2M of public packages available.
·snyk.io·
What is a backdoor? Let's build one with Node.js | Snyk
Why attackers try to take over user accounts - Sqreen Blog
Why attackers try to take over user accounts - Sqreen Blog
Attackers try to take over user accounts for several reasons and through several different methods. Learn why ATOs occur and what you can do about them.
·blog.sqreen.com·
Why attackers try to take over user accounts - Sqreen Blog