Firing Range
Hacking
What is a backdoor? Let's build one with Node.js | Snyk
A backdoor in our code that can perform OS injection is one of the most scary scenarios ever. Currently, npm has more than 1.2M of public packages available.
Why attackers try to take over user accounts - Sqreen Blog
Attackers try to take over user accounts for several reasons and through several different methods. Learn why ATOs occur and what you can do about them.
The Pen Testing Tools We’re Thankful for in 2020
Recap of Bishop Fox's favorite penetration testing tools for 2020 including, Nuclei, Spyse Search Engine, Dufflebag, GadgetProbe, RMIScout and more.
Web skimmer hides within EXIF metadata, exfiltrates credit cards via image files
This credit card skimmer hides in plain sight, quite literally, as it resides inside the metadata of image files. We analyze the threat.
How a badly-coded computer virus caused billions in damage
Wearing a striped shirt and Matrix-style dark glasses, Onel de Guzman stared at the floor as he made his way through a crowd of photographers into a hastily arranged press conference in Quezon City, a suburb of the Philippines capital Manila.
The Cuckoo’s Egg Decompiled Course
In the 1980’s, Cliff Stoll discovered a $0.75 accounting error on the computer systems he managed at Lawrence Berkeley Laboratory. This small discovery would eventually lead him on the year-l…
ZonesPirates.com
Sécurité/Surveillance/Hacktualité
That time the US Secret Service mistook a cyberpunk RPG for a hacker's handbook
How GURPS Cyberpunk triggered a Secret Service raid of RPG publisher Steve Jackson Games' offices.
Bienvenue [Root Me : plateforme d'apprentissage dédiée au Hacking et à la Sécurité de l'Information]
Root Me est une plateforme permettant à chacun de tester et d'améliorer ses connaissances dans le domaine de la sécurité informatique et du hacking à travers la publication de challenges, de solutions, d'articles.
sundowndev/hacker-roadmap
:pushpin: Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security. - sundownd...
The Motherboard Guide to Not Getting Hacked
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers - Hack-with-Github/Awesome-Hacking
Quitten/doser.py
DoS tool for HTTP requests (inspired by hulk but has more functionalities) - Quitten/doser.py
Company shuts down because of ransomware, leaves 300 without jobs just before holidays | ZDNet
Company tells employees to seek new employment after suspending all operations right before Christmas.
OSForensics - Download
Download a free, fully functional evaluation of PassMark OSForensics from this page, or download a sample hash set for use with OSForensics. 32-bit and 64-bit versions of OSForensics are available.
Undocumented Admin
Friendly white-hat hackers who gently access your vulnerable systems and patch them when you are not allowed to.
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.
write-ups-ctfs-pocs-tutos-articles-infosec-sites-pour-s-entrainer
Venez jouer et apprendre de nouvelles techniques!
trustedsec/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
CSRF in Action 🎭
Demonstration of Cross Site Request Forgery(CSRF) with a simple todo app.
yadox666/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers. - yadox666/The-Hackers-Hardware-Toolkit
How I Hacked DePauw University Using Hidden InputsAnd how not to handle reported vulnerabilitieshackernoon.com
And how not to handle reported vulnerabilities
How I Socially Engineer Myself Into High Security Facilities - Motherboard
A pentester shares a story that shows how social engineering can get you anywhere.
vitalysim/Awesome-Hacking-ResourcesAwesome-Hacking-Resources - A collection of hacking / pentetration testing resources to make you better!github.com
A collection of hacking / penetration testing resources to make you better! - vitalysim/Awesome-Hacking-Resources
Wi-Fi hacking is nothing new
Earlier this month, a researcher discovered Wi-Fi has a fundamental security flaw. Again.
How to make a simple computer virus in Python — Coding Security0https://codingsec.net/2016/11/make-simple-computer-virus-python/20Follow A computer virus is a type of malicious…codingsec.net
How to become a professional hacker (Step by Step Guide) — Coding Security0https://codingsec.net/2016/08/become-professional-hacker-step-step-guide/20Follow If you want to become a hacker or…codingsec
Operation Luigi: How I hacked my friend without her noticingHello and welcome to a blog post. I am writing it and you are reading it. It’s amazing what we can do with…defaultnamehere.tumblr.com
This blog has moved! This post and other mistakes are now at https://mango.pdf.zone
Cross-site scripting for dummies – Hacker Noon
First of all, I would like to state that my intentions with this are article are entirely dishonourable. I want to help hackers to break…