Hacking

70 bookmarks
Custom sorting
Firing Range
Firing Range
·public-firing-range.appspot.com·
Firing Range
What is a backdoor? Let's build one with Node.js | Snyk
What is a backdoor? Let's build one with Node.js | Snyk
A backdoor in our code that can perform OS injection is one of the most scary scenarios ever. Currently, npm has more than 1.2M of public packages available.
·snyk.io·
What is a backdoor? Let's build one with Node.js | Snyk
Why attackers try to take over user accounts - Sqreen Blog
Why attackers try to take over user accounts - Sqreen Blog
Attackers try to take over user accounts for several reasons and through several different methods. Learn why ATOs occur and what you can do about them.
·blog.sqreen.com·
Why attackers try to take over user accounts - Sqreen Blog
The Pen Testing Tools We’re Thankful for in 2020
The Pen Testing Tools We’re Thankful for in 2020
Recap of Bishop Fox's favorite penetration testing tools for 2020 including, Nuclei, Spyse Search Engine, Dufflebag, GadgetProbe, RMIScout and more.
·labs.bishopfox.com·
The Pen Testing Tools We’re Thankful for in 2020
How a badly-coded computer virus caused billions in damage
How a badly-coded computer virus caused billions in damage
Wearing a striped shirt and Matrix-style dark glasses, Onel de Guzman stared at the floor as he made his way through a crowd of photographers into a hastily arranged press conference in Quezon City, a suburb of the Philippines capital Manila.
·edition.cnn.com·
How a badly-coded computer virus caused billions in damage
The Cuckoo’s Egg Decompiled Course
The Cuckoo’s Egg Decompiled Course
In the 1980’s, Cliff Stoll discovered a $0.75 accounting error on the computer systems he managed at Lawrence Berkeley Laboratory. This small discovery would eventually lead him on the year-l…
·chrissanders.org·
The Cuckoo’s Egg Decompiled Course
ZonesPirates.com
ZonesPirates.com
Sécurité/Surveillance/Hacktualité
·zonespirates.com·
ZonesPirates.com
sundowndev/hacker-roadmap
sundowndev/hacker-roadmap
:pushpin: Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security. - sundownd...
·github.com·
sundowndev/hacker-roadmap
The Motherboard Guide to Not Getting Hacked
The Motherboard Guide to Not Getting Hacked
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.
·vice.com·
The Motherboard Guide to Not Getting Hacked
Hack-with-Github/Awesome-Hacking
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers - Hack-with-Github/Awesome-Hacking
·github.com·
Hack-with-Github/Awesome-Hacking
Quitten/doser.py
Quitten/doser.py
DoS tool for HTTP requests (inspired by hulk but has more functionalities) - Quitten/doser.py
·github.com·
Quitten/doser.py
OSForensics - Download
OSForensics - Download
Download a free, fully functional evaluation of PassMark OSForensics from this page, or download a sample hash set for use with OSForensics. 32-bit and 64-bit versions of OSForensics are available.
·osforensics.com·
OSForensics - Download
Undocumented Admin
Undocumented Admin
Friendly white-hat hackers who gently access your vulnerable systems and patch them when you are not allowed to.
·undocumentedadm.in·
Undocumented Admin
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.
·wired.com·
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
trustedsec/physical-docs
trustedsec/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
·github.com·
trustedsec/physical-docs
CSRF in Action 🎭
CSRF in Action 🎭
Demonstration of Cross Site Request Forgery(CSRF) with a simple todo app.
·smellycode.com·
CSRF in Action 🎭
yadox666/The-Hackers-Hardware-Toolkit
yadox666/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers. - yadox666/The-Hackers-Hardware-Toolkit
·github.com·
yadox666/The-Hackers-Hardware-Toolkit
Wi-Fi hacking is nothing new
Wi-Fi hacking is nothing new
Earlier this month, a researcher discovered Wi-Fi has a fundamental security flaw. Again.
·theoutline.com·
Wi-Fi hacking is nothing new
Operation Luigi: How I hacked my friend without her noticingHello and welcome to a blog post. I am writing it and you are reading it. It’s amazing what we can do with…defaultnamehere.tumblr.com
Operation Luigi: How I hacked my friend without her noticingHello and welcome to a blog post. I am writing it and you are reading it. It’s amazing what we can do with…defaultnamehere.tumblr.com
This blog has moved! This post and other mistakes are now at https://mango.pdf.zone
·defaultnamehere.tumblr.com·
Operation Luigi: How I hacked my friend without her noticingHello and welcome to a blog post. I am writing it and you are reading it. It’s amazing what we can do with…defaultnamehere.tumblr.com
Cross-site scripting for dummies – Hacker Noon
Cross-site scripting for dummies – Hacker Noon
First of all, I would like to state that my intentions with this are article are entirely dishonourable. I want to help hackers to break…
·hackernoon.com·
Cross-site scripting for dummies – Hacker Noon