Twitter | Search | |
Search Refresh
Hakin9 22h
Reply Retweet Like
Ammar Amer🇸🇾 Dec 13
-Captive Portal:The Definitive Guide.pdf: -Injecting Metasploit Payloads into Android Applications – Manually.pdf: -Tips for Reverse-Engineering Malicious Code.pdf:
Reply Retweet Like
Hakin9 17h
Reply Retweet Like
Hakin9 16m
Reply Retweet Like
Florian Hansemann Dec 14
Reply Retweet Like
Gray Hats 6h
[BlackHat Europe tool] Automatic API Attack Tool
Reply Retweet Like
Vulcan Cyber 40m
Do you know the difference between a and a scan? Find out how they differ and how they can work together to optimize your security strategy
Reply Retweet Like
ghostlulz Dec 14
If you are serious about making a living doing bug bounties or working as a penetration tester you may want to get a copy of my latest book. đź’°HUGE KNOWLEDGE DROP đź’°
Reply Retweet Like
ForkNerds Dec 14
DNS enumeration is considered one of the most important information-gathering techniques. Check out the review of the best subdomain finder tools !
Reply Retweet Like
Hacking & PenTest Videos 7h
New To Linux? Need Help Understanding Shell Commands?
Reply Retweet Like
Gray Hats 15h
Expliot v0.7.2 releases: Internet Of Things Exploitation Framework
Reply Retweet Like
Hacking & PenTest Videos 10h
Zigbee Meshes With IKEA, XIAOMI, Philips And zigbee2MQTT Tested And Explained
Reply Retweet Like
Simon Juhel Dec 13
Want tricks and tips for your pentests and bug bounties ? Check it out
Reply Retweet Like
Gray Hats 11h
PSDecode v5.0 releases: deobfuscating encoded PowerShell scripts
Reply Retweet Like
chiheb chebbi Dec 13
Tool: - Automated Tactics Techniques & Procedures. Re-running complex sequences manually for regression tests, product evaluations, generate data for researchers & so on can be tedious
Reply Retweet Like
ó €€ó €€ ó €€ó €€ Dec 8
Red Teaming Mind Map from The Hacker Playbook 3
Reply Retweet Like
Gray Hats Dec 13
sherlock v0.9.15 releases: Find usernames across social networks
Reply Retweet Like
yaap Dec 13
A image embedding most modern tools to avoid dependencies wreckage on your system. impacket, pypykatz, lsassy, ntlmrecon, enum4linuxpy, ldapsearch-ad, etc. on his way. What's missing? Anything to add or fix?
Reply Retweet Like
chiheb chebbi Dec 13
PTR records can be used by a crafty - shows how
Reply Retweet Like
chaignc Dec 11
Reply Retweet Like