OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This repository will grow every time will research, there is a research, science and technology, tutorial. Please use it wisely.
Hidden content
REDEYE
Thread
cybersecurity
intelligence gathering
open source intelligence
osint
research tools
Hidden content
Description:
Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.
Once a foothold is established within a network, the next logical step...
REDEYE
Thread
cybersecurity
kali linux
network security
sniffing
spoofing
Advanced Penetration Testing with Raspberry Pi Full Course Download
What are the topics covered in this course?
Chapter 1: Raspberry Pi and Kali Linux Basics gives you an overview of purchasing a Raspberry Pi, installing Kali Linux, accessing Kali Linux for the first time, and troubleshooting...
REDEYE
Thread
cybersecurity
ethical hacking
online course
penetration testing
raspberry pi
Features:
· Unmask Real IPs: Reveal true IP addresses behind Cloudflare protection.
· OSINT Integration: Use Shodan and Censys data to gather hidden info.
· Concurrent Scanning: Fast scans with proxy and custom User-Agent support.
· Custom JA3 Fingerprint: Mimic TLS fingerprints to evade...
Legion Stealer Source Code
⚠️ RUN in VM or RDP. (just for analysis and educational purpose only).
Hidden content
: https://www.youtube.com/watch?v=eJDGTK9M...4JAYcqIYzv
Code0
Thread
cybersecurity
data breach
hacking
malware
source code
Save file and download on USB flash drive or SD card and load it into the targets computer and it will crash it.
In this payload it is tested on my own equipment and set up on my own testing network so the target machine and the host server are on the same network.
My final Rubber Ducky...
Send email : it will send email that submitted by the victim to prepare yourself to the card or I don't know (you can turn it off)
Show bin : this will send the bin of the credit card sent by the victim (you can turn it off)
Send all informations : this will send all the information's typed by...
RootSec Archive
Ultimate resources for DDoS, scanners, botnets, exploits, and more
Archive includes:
Mirai Edits: Private and Public Versions
QBot Edits: Private and Public Versions
Other botnet variants: Private and Public Versions
Stresser sources
Exploits: Latest Vulnerabilities
Scanners...
Not A Member Yet? Click Me To Sign Up for Free.
Use A Secured Environment When Dealing With Unauthorised Code, The Above Code is Not Mine / Made By Me.
Hidden content
Discord tools and hacks,
Collection link:
Hidden content
Collection is always evolving
Token-Mail-Verifier A tool that verifies email of a discord token using kopeechka's API. Pixens Python URL
ReboundGuardian A discord selfbot which will make you unkickable from any...
Code0
Thread
cybersecurity
discord bots
discord tools
hacking scripts
online community
Lazybee tool is a python based script from which you can generate random wordlist for brutefocre attacks. This tool has a unique features like wordlist generating time calculation and direct .txt saving in current directory. This tool works on both rooted Android device and Non-rooted Android...
Code0
Thread
cybersecurity
python
termux
tool development
wordlist
Code:
import smtplib
from email.mime.text import MIMEText
from email.mime.multipart import MIMEMultipart
# Email content
message = MIMEMultipart()
message['From'] = 'sender@example.com'
message['Subject'] = 'Important message'
body = 'This is the content of the email.'...
WELL THIS WAS ORIGINALLY LEAKED BY THE GRIM REAPER ON GITHUB. HE HAS MADE IT HIS LIFES WORK TO EXPOSE THIS DEVELOPER WHICH I HAVE NO IDEA WHAT HE HAS DONE TO HIM TO PISS HIM OFF BUT EVERY TIME A UPDATE COMES OUT HE RELEASES THE SOURCE CODE. MAYBE GET A HOBBY
Icarus hidden desktop focuses to...
Code0
Thread
cybersecurity
data breach
hacking tools
icarus hvnc
source code leak
This is an extremely basic tool, it is not a finalised tool nor is it perfect. its more of a base for someone building their own nike vm checker, it works though!
Hidden content
Discord QR Token Logger
- Utilises Discord QR Login Feature To Create a Token Logger Scannable QR code
The target information shown includes:
User token informations :
Username
User ID
Mail
Phone
Nitro
Payment info :
Brand (Visa / Mastecard / PayPal)
Last 4 digits / PayPal mail...
Full sources leaked +100:$$
Py, C#, C++, JS, GO, RUST more!
Collection of malware source code for a variety of platforms in an array of different programming languages.
Hidden contentHidden content
.
I coded in py; however, it's fast as shit. I saw some guy selling some Dork Gen for 250, so I'll give yall the SRC to a fast one
Hidden content
Make sure you have a file called "DorkTypes.txt" to generate the dorks. This is like any other standard dork gen (kw) (pp), etc... You can even use...
Code0
Thread
cybersecurity
dork generator
programming tools
software development
source code
LIKE
This is a full fledged tutorial on how to create a Remote Access Trojan (RAT) on discord and being able to run it from there.
Before we begin, note that I would advise this to be run on a VM, but it's your call.
Hidden content
SudoDragon
Thread
cybersecurity
digital security
discord
malware
remote access trojan
Hello guys, so basically in this thread I am gonna show you how break in to ip cams, brute forcing the rtsp protocol.
I`ve made a video about it on my youtube channel, but got removed from youtube like 2 h after uploaded it.
So I want to post here a tutorial on how to do it.
Hidden content
Hidden content
> ? Test it out — you’ll be surprised what you can find on people around you!
? No signup | No credit card | No bullshit!
[/HIDEREPLYREACT]
SudoDragon
Thread
cybersecurity
data breach
digital forensics
osint
privacy protection
Contains every single thing you need to know from zero level to advanced. It's very comprehensive.
Contains more than 500+ practical video
Hidden content
SudoDragon
Thread
cybersecurity
data storage
ethical hacking
masterclass
online education
SocialBox is a shell script made for brute-forcing different social media platforms. Its a really powerful.
..
Tutorial Below:
Hidden contentHidden content
Virus Total Scan Result
Conclusion
Someone tested it on one of their own Facebook accounts legally. And you can see the result...
SudoDragon
Thread
cybersecurity
ethical hacking
kali linux
password cracking
social engineering
Hidden content
Prior advice: ensure you have a basic understanding of social engineering, it will take a little bit of trickery to get them to fall for it.
SudoDragon
Thread
cybersecurity
ethical hacking
ip address tracking
network security
online privacy
Important: this guide is for hackers that are organised and seek big targets not just stolen credit cards numbers or Netflix accounts :fyou: , so be careful and not ruine other's life by using their private wifi network
Hidden content
Was helping someone recently and came across an easier to follow way to achieve the same result with less issues so this is an easy tutorial in a thread.
What can this be useful for?
.
Use legally at your own discretion - this tutorial is strictly for educational purposes.
Hidden contentHidden...
Using Kali lynx you can create this malicious website (DISCLAIMER- I AM NOT RESPONCABLE FOR WHAT YOU DO USING THIS TOOL)
Tools
Hidden content
Enjoy fam
SudoDragon
Thread
cybersecurity
data protection
ethical hacking
privacy issues
website development
Features
✔ - Keylogger
✔ - Take Screenshot
✔ - Webcam Capture
✔ - Persistence
Hidden content
I have used this multiple times and it works great. It is equipped with email-sending tools so you don't have to port-forward to get the information from your victims.
Do you want to learn hacking but you are lazy to read or content is low quality?
Here are few guides, including video tutorials
example :
Hidden content
SudoDragon
Thread
cybersecuritycybersecurity training
ethical hacking
information security
penetration testing
==========
Hello,There!:)
=============================
This are The Contents in The Course!:
====================================
?Information Gathering & Basic Terminologies
?Introduction of Burpsuite
?Comprehensive XSS
?Host Header Injection
?URL Redirection
?Parameter Tampering
?HTML...
Bad opsec is the hamartia of all hackers. Whether you're leaking databases of small companies to running multi-million dollar marketplaces, opsec (Operations Security) is a must. Solid anonymity will make it very hard for people to track you down. Here, I am going to give a breakdown on how to...
SudoDragon
Thread
cybersecurity
data security
online safety
operational security
privacy protection
. .
General information about making profit from hacking
Index
Section A. - Answers
Section B. - Bounty
Section C. - Basic knowledge
Section D. - Courses
Section E. - Resources
Section F. - Blogs and communities
Section G. - Penetration Tools.
Section H. Practice
Section I. - Steps...
SudoDragon
Thread
cybersecurity
ethical hacking
hacking steps
information security
profit from hacking
These courses will cover:
Penetration Testing
Cracking
Android Hacking
Web Hacking
WIFI Hacking
Hacking with Python
Nmap Course
CISSP Course
Bounty Hunting
Data Analytics
Kali Linux Basics
Windows Privilege Escalation
Hidden content
Useful if u wanna perform little hacks and keep ur identity safe lol
You can switch the ip very quickly !
make sure to have admin privileges.
[new version of kali linux may have permission problems to build torghost so sudo if the command don't work]
METHOD :
Hidden content
SudoDragon
Thread
cybersecurity
ip anonymity
kali linux
network security
privacy protection