Hacking

Firing Range
Firing Range
·public-firing-range.appspot.com·
Firing Range
What is a backdoor? Let's build one with Node.js | Snyk
What is a backdoor? Let's build one with Node.js | Snyk
A backdoor in our code that can perform OS injection is one of the most scary scenarios ever. Currently, npm has more than 1.2M of public packages available.
·snyk.io·
What is a backdoor? Let's build one with Node.js | Snyk
Why attackers try to take over user accounts - Sqreen Blog
Why attackers try to take over user accounts - Sqreen Blog
Attackers try to take over user accounts for several reasons and through several different methods. Learn why ATOs occur and what you can do about them.
·blog.sqreen.com·
Why attackers try to take over user accounts - Sqreen Blog
The Pen Testing Tools We’re Thankful for in 2020
The Pen Testing Tools We’re Thankful for in 2020
Recap of Bishop Fox's favorite penetration testing tools for 2020 including, Nuclei, Spyse Search Engine, Dufflebag, GadgetProbe, RMIScout and more.
·labs.bishopfox.com·
The Pen Testing Tools We’re Thankful for in 2020
How a badly-coded computer virus caused billions in damage
How a badly-coded computer virus caused billions in damage
Wearing a striped shirt and Matrix-style dark glasses, Onel de Guzman stared at the floor as he made his way through a crowd of photographers into a hastily arranged press conference in Quezon City, a suburb of the Philippines capital Manila.
·edition.cnn.com·
How a badly-coded computer virus caused billions in damage
The Cuckoo’s Egg Decompiled Course
The Cuckoo’s Egg Decompiled Course
In the 1980’s, Cliff Stoll discovered a $0.75 accounting error on the computer systems he managed at Lawrence Berkeley Laboratory. This small discovery would eventually lead him on the year-l…
·chrissanders.org·
The Cuckoo’s Egg Decompiled Course
ZonesPirates.com
ZonesPirates.com
Sécurité/Surveillance/Hacktualité
·zonespirates.com·
ZonesPirates.com
sundowndev/hacker-roadmap
sundowndev/hacker-roadmap
:pushpin: Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security. - sundownd...
·github.com·
sundowndev/hacker-roadmap
The Motherboard Guide to Not Getting Hacked
The Motherboard Guide to Not Getting Hacked
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.
·vice.com·
The Motherboard Guide to Not Getting Hacked
Hack-with-Github/Awesome-Hacking
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers - Hack-with-Github/Awesome-Hacking
·github.com·
Hack-with-Github/Awesome-Hacking
Quitten/doser.py
Quitten/doser.py
DoS tool for HTTP requests (inspired by hulk but has more functionalities) - Quitten/doser.py
·github.com·
Quitten/doser.py
OSForensics - Download
OSForensics - Download
Download a free, fully functional evaluation of PassMark OSForensics from this page, or download a sample hash set for use with OSForensics. 32-bit and 64-bit versions of OSForensics are available.
·osforensics.com·
OSForensics - Download
Undocumented Admin
Undocumented Admin
Friendly white-hat hackers who gently access your vulnerable systems and patch them when you are not allowed to.
·undocumentedadm.in·
Undocumented Admin
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.
·wired.com·
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
trustedsec/physical-docs
trustedsec/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
·github.com·
trustedsec/physical-docs
CSRF in Action 🎭
CSRF in Action 🎭
Demonstration of Cross Site Request Forgery(CSRF) with a simple todo app.
·smellycode.com·
CSRF in Action 🎭
yadox666/The-Hackers-Hardware-Toolkit
yadox666/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers. - yadox666/The-Hackers-Hardware-Toolkit
·github.com·
yadox666/The-Hackers-Hardware-Toolkit
Learn to Hack
Learn to Hack
The best defense against hackers is a well-informed development team. Our interactive exercises can teach your team about today's most common security vulnerabilities. %>
·hacksplaining.com·
Learn to Hack
What is Hacking? Introduction & Types
What is Hacking? Introduction & Types
Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. Ethical hacking is about improving the security of computer systems.
·guru99.com·
What is Hacking? Introduction & Types
Cross-site scripting for dummies – Hacker Noon
Cross-site scripting for dummies – Hacker Noon
First of all, I would like to state that my intentions with this are article are entirely dishonourable. I want to help hackers to break…
·hackernoon.com·
Cross-site scripting for dummies – Hacker Noon
Les gardiens du nouveau monde, doc 55', VF - YouTube
Les gardiens du nouveau monde, doc 55', VF - YouTube
Docu 55' / Hackers, hacktivistes, militants pour un Internet libre et neutre. LICENCE CREATIVE COMMONS : CC-BY-NC-SA "Vous qui surfez sur le web, vous qui pa...
·youtube.com·
Les gardiens du nouveau monde, doc 55', VF - YouTube