This course introduces students to the security concepts associated with REST APIs. This is an entry level course and we encourage you to take this course if you are a beginner in REST API security world. This course uses a custom developed vulnerable REST APIs to demonstrate how REST API...
I'm sharing a list of useful tools open source
Enjoy and if you want a tut on a particular software ask me !
With pleasure
Hidden content
Virustotal link VirusTotal
Here are the tools I have used in hacking. These are open source tools that could be chained to work together in bash or any other script. It is good for automation. If you have any other cool tools to share, feel free to write below.
Hidden content
More tools will be included soon! I may...
SUB-ZER0
Thread
cybersecurity
ethical hacking
open source tools
penetrationtesting
web hacking
Zanti is a free and great network pentesting tool, this tool is can only be used on Android and preferably on your own network :)
You can do many great things with this tool:
Scanning network and the devices that are on their with their ip's/mac adresses
fish cookies to see what devices are...
Hello,
EXCLUSIVITY: I created, just for you, a version optimized for tablets and smartphones. No useless header, no useless footer, the text and images now take FULL SCREEN. Check it out in the same link folder :)
EXP-301: Windows User Mode Exploit Development
Windows User Mode Exploit...
SudoDragon
Thread
cybersecurity training
exp-301
osed
pdf course materials
penetrationtesting
This python library is made for educationnal purposes only. Me, as the creator and developper, not responsible for any misuse for this module in any malicious activity. it is made as a tool to understand how hackers can create their tools and performe their attacks. it contains most of known...
Ready to dive into the exciting world of ethical hacking and network penetration testing? Whether you’re aiming for a career in cybersecurity or simply want to understand how attackers compromise networks (so you can better defend them!), this course provides the essential foundation you need...
Welcome to my course Penetration Testing & Website Hacking.
This course covers web application attacks and how to learn bug bounties. There is no prerequisite of prior hacking knowledge and you will be able to perform web attacks and hunt bugs on live websites and secure them.
This course is...
Welcome to the “Generative AI in Penetration Testing: AI Powered Pentesting” course!
Automate Penetration Testing workflow with Gen AI: from OSINT & Vulnerability Scanning to Exploit & Reporting automation
Artificial Intelligence (AI) is revolutionizing the field of cybersecurity—especially in...
protectaccount
Thread
ai
course
generative ai
penetrationpenetrationtesting
pentesting
Advanced Penetration Testing with Raspberry Pi Full Course Download
What are the topics covered in this course?
Chapter 1: Raspberry Pi and Kali Linux Basics gives you an overview of purchasing a Raspberry Pi, installing Kali Linux, accessing Kali Linux for the first time, and troubleshooting...
REDEYE
Thread
cybersecurity
ethical hacking
online course
penetrationtesting
raspberry pi
Do you want to learn hacking but you are lazy to read or content is low quality?
Here are few guides, including video tutorials
example :
Hidden content
SudoDragon
Thread
cybersecurity
cybersecurity training
ethical hacking
information security
penetrationtesting
HACKSTARS - Ethical Hacking & Cyber Security Course
HACKSTARS COURSE -
In this course you will find the amazing TUTORIALS hacking. this course designed for beginners who are learning Ethical hacking and very beginners in ethical hacking. If you are pro hacker then its course also helps you...
SudoDragon
Thread
cyber security
cybersecurity education
ethical hacking
it security training
penetrationtesting
How to Start Bug Bounty?
First: learn OWASP top ten VULNERABILITY
Second: Read hackerplaybook2, it covers lots of tips about bug bounty
Third: Refer https://medium.com/ and learn from writeups
Fourth: Use Github for tools
Five(most imp): Learn Reconnaissance (Recon)
Six: Follow HackerOne...
SudoDragon
Thread
bug bounty
cybersecurity
ethical hacking
online income
penetrationtesting
Anubis is a subdomain enumeration and information gathering tool. Anubis collates data from a variety of sources, including HackerTarget, DNSDumpster, x509 certs, VirusTotal, Google, Pkey, Sublist3r, Shodan, Spyse, and NetCraft. Anubis also has a sister project, AnubisDB, which serves as a...
SudoDragon
Thread
cybersecurity
information gathering
network security
penetrationtesting
subdomain enumeration
DON'T HAVE AN ACCOUNT YET?
SIGN UP FOR ONE HERE!
Please Like The Post To Motivate Me To Post More Content
A list of repos containing some nice tools
Hidden contentHidden content
Virustotal link https://www.virustotal.com/gui/url/45510a232d71347d27dc8df18a5b447d552f93103627b5fe57bc83c97af30725
Burp Suite Professional is a comprehensive toolkit used for web application security testing. Its capabilities include:
Proxy Interception: Allows you to intercept and modify requests between the browser and web servers for manual testing.
Spidering: Automatically crawls web applications to...
SUB-ZER0
Thread
burp suite
cybersecurity
penetrationtesting
vulnerability assessment
web security
DNS Rebinding freamwork containing:
a dns server obviously
python web api to create new subdomains and control the dns server, view logs, stuff like that
shitty react app to make it more comfy
Hidden content
SUB-ZER0
Thread
cybersecurity tools
dns rebinding
dnsfookup
network security
penetrationtesting
This is a white-hat website used by cybersecurity professionals to teach different ways how to break into SSH servers.
You can use it on any desktop, even mobile.
Hidden content
SudoDragon
Thread
cybersecurity training
ethical hacking
network security
penetrationtesting
ssh security
Description
Metasploit is one of the most common tools used for penetration testing and exploitation. In this course, penetration tester Prashant Pandey shows you various elements of Metasploit, how to apply these elements in penetration testing activities, and what you can do after...
Hello,
I bring you an application for those hackers who are learning the "basics" of hacking. It is a vulnerable web application and your job will be to exploit all these vulnerabilities. There are three levels of difficulty available: easy, intermediate or difficult level. It is a simple way...
SudoDragon
Thread
cybersecurity
dvwa
ethical hacking
penetrationtesting
web security
The Complete Mobile Ethical Hacking Course
Credit: FreeEducationWeb.com
Includes:
Mobile Cyber Security for Mobile Applications & Devices
Mobile Applications and Games Penetration Tests
Mobile Device Penetration Tests
Android & iOS Fundamentals
Java & Swift Fundamentals
Ethical...
Nightmare
Thread
cybersecurity training
ethical hacking course
mobile hacking tools
mobile security vulnerabilities
penetrationtesting
BASICS OF ETHICAL HACKING CORE TRAINING
TOPICS
1. The Truth About Living in a Technology Based World
2. Overview of the CEH Certification Program
3. How to Build a Lab to Hack Safely
4. Installing and Configuring Your Windows Server VMs
5. Installing and Configuring Your Desktop VMs
6...
Nightmare
Thread
cybersecurity
ethical hacking
hacking skills
information security
penetrationtesting
white hat hacking
The Complete Mobile Ethical Hacking Course
What you’ll learn
Mobile Cyber Security for Mobile Applications & Devices
Mobile Applications and Games Penetration Tests
Mobile Device Penetration Tests
Android & iOS Fundamentals
Java & Swift Fundamentals
Ethical Hacking Fundamentals
Reverse...
Nightmare
Thread
cybersecurity
ethical hacking
mobile hacking
mobile security
penetrationtesting
BackBox is a Ubuntu-based distro developed for penetration testing and security assessment.
BackBox has its software repository that provides the latest stable versions of various system & network analysis toolkits and the most popular ethical hacking tools. Designed with minimalism in mind and...
Nightmare
Thread
backbox os
cybersecurity
ethical hacking
network security
penetrationtesting
BackBox is a Ubuntu-based distro developed for penetration testing and security assessment.
BackBox has its software repository that provides the latest stable versions of various system & network analysis toolkits and the most popular ethical hacking tools. Designed with minimalism in mind and...
Nightmare
Thread
backbox
hacking tools
linux distribution
penetrationtesting
security tools
framework
fsociety
hack
hacking
hacking tools
information gathering
mr. robot
pack
password
penetrationpenetrationtesting
private
testing
tools
web
web hacking
wireless
, I shall provide you with some wicked tools and their corresponding commands to aid you in your nefarious endeavors. Brace yourself, for the chaos is about to begin:
1. Aireplay-ng: This dastardly tool is used for wireless network manipulation. Execute the following command to launch a...
About
● Android Hacking
● Full Access Mode
● Hack Using Termux
installation Commands :-
apt update
apt upgrade
pkg install git
git clone https://github.com/alvinbaby/JINNRAT
ls
cd JINNRAT
ls
bash setup.sh
Then click 3 after installation done after click 1 copy link I'd...
Using Linux distros for pen testing allows cybersecurity professionals to play a significant role in keeping companies safe. For example, research indicates retail applications are almost three times less secure than those in other sectors.
ArchStrike is an excellent option for ethical hackers...
Nightmare
Thread
cybersecurity
cybersecurity tools
ethical hacking
linux distribution
penetrationtesting
BlackArch is a top Linux distribution that is focused on penetration testing and is common among security researchers and ethical hackers . It is based on Arch Linux and allows you to install BlackArch components on top of it.
One of its most outstanding features is its repository with...
Nightmare
Thread
blackarch
cybersecurity
ethical hacking
latest version
linux distribution
penetrationtesting
This is my own personal list that I have of useful websites so I will share them.
Useful Websites:
https://paywithmoon.com
https://paycrypt.ml - Exchange PayPal to LTC with only 5% Fee
https://auto.creavite.co - Make free banners, pfp etc
https://fixedfloat.com/ - Exchange...
Came across this good GitHub repository, that index's a collection of helpful information for getting started with Cobaltstrike.
https://github.com/zer0yu/Awesome-CobaltStrike
0x00 Introduction
0x01 Articles & Videos
1. Basic Knowledge
2. Crack and Customisation
3. Useful Trick
4...
Nightmare
Thread
cybersecurity
ethical hacking
network security
penetrationtesting
social engineering
LEAK - Penetration Testing with Kali Linux (offensive sec 800 usd value)
Penetration Testing with Kali Linux is the foundational course at OffSec ( 800$ value )
Hidden content
some of the topics included:
DNS Enumeration
Forward DNS Lookup
Reverse DNS Lookup
Zone Transfers
Port...
Shadow Warrior
Thread
kali linux
leak
linux
penetrationpenetrationtestingtesting
Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of...
Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of...
Overview
Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance...
Sauron
Thread
devices
hacking
master
mobile
network
networks
penetrationpenetrationtesting
scanning
testing
wireless
Penetration Testing Azure for Ethical Hackers
Curious about how safe Azure really is? Put your knowledge to work with this practical guide to penetration testing.
This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and...
This course will cover everything you need to get started on your WiFi hacking journey. I'll show you:
• Basic WiFi theory so you have a general understanding of the technology before exploiting it
- This includes Wifi releases, bands, a general overview, basic terminology, how encryption works...
Sauron
Thread
basic
beginners
penetrationpenetrationtestingtesting
theory
wifi
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments
Key Features
A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity.
Learn everything you need to know about VAPT...
Sauron
Thread
kali linux
linux
penetrationpenetrationtestingtesting
Let’s be honest—security testing can get repetitive. If you’re ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients.
This pen testing book is your guide to learning advanced techniques to attack Windows and...
Sauron
Thread
linux
penetrationpenetrationtesting
scratch
testing
windows
:eek:Intro :: I want to thank you and congratulate you for downloading the book, “Hacking: Beginner's Guide to Computer Hacking, Basic Security, and Penetration Testing .”This book will teach you how you can protect yourself from most common hacking attacks -- by knowing...
What you’ll learn
100+ Videos (10+ hours) to teach you website hacking from scratch.
50+ hands-on real-life website hacking examples - from simple to advanced.
Discover, exploit and mitigate a number of dangerous web vulnerabilities.
Hack cloud servers using these vulnerabilities.
No prior...
Learn Penetration Testing from scratch to become a bug bounty hunter and web security expert
Discover, exploit, and mitigate all types of web vulnerabilities. Secure any of your future applications using best practices
Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with...
Sauron
Thread
bounty
bug bounty
injection
linux
penetrationtesting
security
web
Learn all about web application penetration testing and website hacking.
What you’ll learn
Introduction to OWASP ZAP Scanner and Proxy tool
Web Application Penetration Testing - Live
This course will help you to switch from using pirated Burpsuite tool to Open Source OWASP ZAP tool.
Setting Up...
Course “Penetration Testing: Malware backdoor for beginners “
This course will take you on a journey of learning what malware is, how to create backdoor with NCAT and how you can get control over a system.
Once you are able to understand how hackers think, you will be able to use your new...
Web pages vulnerabilities have been exploited since early `90s against user oriented applications such as email, online shopping, and Web banking [1]. Penetration testing is a technique for finding vulnerability or loop holes that exist in web pages which can help for ruling out illegal access...
Sauron
Thread
database
penetrationpenetrationtesting
sql
testing
vulnerabilities
web
The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL...