Hacking

70 bookmarks
Custom sorting
DDoS threat report for 2024 Q2
DDoS threat report for 2024 Q2
Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the Cloudflare network. This edition focuses on the second quarter of 2024.
·blog.cloudflare.com·
DDoS threat report for 2024 Q2
Anatomie d'un exercice Red Team - Chapitre 1 - POST
Anatomie d'un exercice Red Team - Chapitre 1 - POST
Un engagement Red Team peut être décrit brièvement comme une simulation d'attaque ciblée en situation réelle. En tant qu'acteur de la menace, il utilise une approche mixte faisant appel à l'ingénierie sociale, aux techniques d'intrusion physique, aux tests d'intrusion ciblant des applications/réseaux, aux campagnes de phishing ciblées... simultanément pour atteindre certains objectifs prédéfinis.
·post.lu·
Anatomie d'un exercice Red Team - Chapitre 1 - POST
Top 10 web hacking techniques of 2021
Top 10 web hacking techniques of 2021
Welcome to the Top 10 (new) Web Hacking Techniques of 2021, the latest iteration of our annual community-powered effort to identify the most significant web security research released in the last year
·portswigger.net·
Top 10 web hacking techniques of 2021
Big Tech is mandating MFA. Hackers have workarounds
Big Tech is mandating MFA. Hackers have workarounds
Multi-factor authentication offers users far more protection than a password alone. But experts warn it’s no panacea against hackers.
·readme.security·
Big Tech is mandating MFA. Hackers have workarounds
Free Rainbow Tables
Free Rainbow Tables
The largest collection of rainbow tables anywhere - completely free to download
·freerainbowtables.com·
Free Rainbow Tables
Hacking Grindr Accounts with Copy and Paste
Hacking Grindr Accounts with Copy and Paste
Sexuality, relationships and online dating are all rather personal things. They're aspects of our lives that many people choose to keep private or at the very least, share only with people of our choosing. Grindr is "The World's Largest Social Networking App for Gay, Bi, Trans, and Queer People" which
·troyhunt.com·
Hacking Grindr Accounts with Copy and Paste
Metasploit Unleashed | Offensive Security
Metasploit Unleashed | Offensive Security
Metasploit Unleashed (MSFU) is a Free Online Ethical Hacking Course by Offensive Security, which benefits Hackers for Charity. Learn how to use Metasploit.
·offensive-security.com·
Metasploit Unleashed | Offensive Security
Des hackers font planter des lecteurs de codes-barres avec un QR code
Des hackers font planter des lecteurs de codes-barres avec un QR code
Ces appareils ne filtrent pas toujours l’information qu’ils reçoivent. Certains petits farceurs ont eu l’idée d’encoder la chaîne EICAR qui est utilisée pour tester les antivirus. Une idée simple, mais efficace.
·01net.com·
Des hackers font planter des lecteurs de codes-barres avec un QR code
Breaking GitHub Private Pages for $35k
Breaking GitHub Private Pages for $35k
Abusing CRLF, cache poisoning, and other misconfigurations for a no-interaction XSS against GitHub Private Pages.
·robertchen.cc·
Breaking GitHub Private Pages for $35k
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
·geeksforgeeks.org·
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
CVEdetails.com is a free CVE security vulnerability database/information source. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
·cvedetails.com·
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
My Javascript Recon Process - BugBounty
My Javascript Recon Process - BugBounty
My Javascript Recon Process - BugBounty. GitHub Gist: instantly share code, notes, and snippets.
·gist.github.com·
My Javascript Recon Process - BugBounty
m4ll0k - Overview
m4ll0k - Overview
🄷 🄰 🄲 🄺 🄴 🅁 🇲🇦 🇮🇹 🇪🇸 . m4ll0k has 13 repositories available. Follow their code on GitHub.
·github.com·
m4ll0k - Overview
CVE - CVE
CVE - CVE
CVE® is a list of records — each containing an identification number, a description, and at least one public reference — for publicly known cybersecurity vulnerabilities. The mission of the CVE Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
·cve.mitre.org·
CVE - CVE