Mastering_Blockchain_Unlocking_the_Power_of_Crypto.pdf
16.6 MB
Mastering Blockchain
Lorne Lantz, 2020
Lorne Lantz, 2020
Vulkan_Programming_Guide_The_Official_Guide_to.pdf
17.2 MB
Vulkan Programming Guide
Graham Sellers, 2016
Graham Sellers, 2016
❤2
Mastering_Go_Network_Automation.pdf
4.3 MB
Mastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter (2023)
👍6
Top 10 Hacking And CyberSecurity Course For FREE
Link 1 :https://www.udemy.com/course/burp-suite/
link 2 :https://www.udemy.com/course/sql-injection-ethical-hacking/
link 3 :https://www.udemy.com/course/computer-hacking-fundamentals/
link 4 :https://www.udemy.com/course/ethical-hacking-basics-kali-20211/
link 5 :https://www.udemy.com/course/foundations-of-hacking-and-pentesting-android-apps/
link 6 :https://www.udemy.com/course/ethical-hacking-for-beginners-in-hindi/
link 7 :https://www.udemy.com/course/lees-web-hacking-cross-site-noscripting-sql-injection/
link 8:https://www.udemy.com/course/ethical-hacking-with-parrot-security-os/
link 9 :https://www.udemy.com/course/ethical-hacking-for-beginners-beginner-to-advance/
link 10 : https://www.udemy.com/course/introduction-to-dark-web-anonymity-and-cryptocurrency/
Link 1 :https://www.udemy.com/course/burp-suite/
link 2 :https://www.udemy.com/course/sql-injection-ethical-hacking/
link 3 :https://www.udemy.com/course/computer-hacking-fundamentals/
link 4 :https://www.udemy.com/course/ethical-hacking-basics-kali-20211/
link 5 :https://www.udemy.com/course/foundations-of-hacking-and-pentesting-android-apps/
link 6 :https://www.udemy.com/course/ethical-hacking-for-beginners-in-hindi/
link 7 :https://www.udemy.com/course/lees-web-hacking-cross-site-noscripting-sql-injection/
link 8:https://www.udemy.com/course/ethical-hacking-with-parrot-security-os/
link 9 :https://www.udemy.com/course/ethical-hacking-for-beginners-beginner-to-advance/
link 10 : https://www.udemy.com/course/introduction-to-dark-web-anonymity-and-cryptocurrency/
❤4😁4👍3👎1🔥1
➡️ Scanning Techniques ➡️
Scanning refers to the process of actively searching for vulnerabilities in a target system or network in order to identify potential points of entry for an attacker. There are various scanning techniques that ethical hackers use to accomplish this task.
📌Port Scanning: Port scanning involves scanning all the open ports on a target system or network. This technique is used to identify potential entry points for attackers.
📌Network Scanning: This scanning technique involves identifying all the devices that are connected to a network. It helps in identifying the potential vulnerabilities that can be exploited by hackers to gain unauthorized access.
📌Vulnerability Scanning: Vulnerability scanning helps in identifying the vulnerabilities in the system or network. This technique involves scanning the entire system or network to identify potential vulnerabilities that could be exploited by attackers.
📌Web Application Scanning: This technique is used to identify vulnerabilities in web applications. It involves scanning the web application to identify vulnerabilities such as SQL injection, cross-site noscripting, etc.
📌Wireless Scanning: Wireless scanning is used to identify wireless networks and connected devices that could be potential entry points for attackers. It includes identifying the security protocols used by the wireless network, strength of the Wi-Fi signal, etc.
📌Malware Scanning: Malware scanning involves scanning the system or network for malware infections. It helps in identifying potential threats and protecting the system from malicious attacks.
Scanning refers to the process of actively searching for vulnerabilities in a target system or network in order to identify potential points of entry for an attacker. There are various scanning techniques that ethical hackers use to accomplish this task.
📌Port Scanning: Port scanning involves scanning all the open ports on a target system or network. This technique is used to identify potential entry points for attackers.
📌Network Scanning: This scanning technique involves identifying all the devices that are connected to a network. It helps in identifying the potential vulnerabilities that can be exploited by hackers to gain unauthorized access.
📌Vulnerability Scanning: Vulnerability scanning helps in identifying the vulnerabilities in the system or network. This technique involves scanning the entire system or network to identify potential vulnerabilities that could be exploited by attackers.
📌Web Application Scanning: This technique is used to identify vulnerabilities in web applications. It involves scanning the web application to identify vulnerabilities such as SQL injection, cross-site noscripting, etc.
📌Wireless Scanning: Wireless scanning is used to identify wireless networks and connected devices that could be potential entry points for attackers. It includes identifying the security protocols used by the wireless network, strength of the Wi-Fi signal, etc.
📌Malware Scanning: Malware scanning involves scanning the system or network for malware infections. It helps in identifying potential threats and protecting the system from malicious attacks.
❤8👍2
The_Hacker_Playbook_2_Practical_Guide_To_Penetration_Testing_Peter.pdf
23.2 MB
The Hacker Playbook 2
Peter Kim, 2015
Peter Kim, 2015
The_Hacker_Playbook_3_Practical_Guide_to_Penetration_Testing_Peter.pdf
8.7 MB
The Hacker Playbook 3
Peter Kim, 2018
Peter Kim, 2018
❤5
Cybersecurity_for_Small_Networks_A_No_Nonsense_Guide_for_the_Reasonably.pdf
4.6 MB
Cybersecurity for Small Networks
Seth Enoka, 2023
Seth Enoka, 2023
👍4❤2
gordon-fyodor-lyon-nmap-network-scanning-the-official.pdf
120.1 MB
Nmap Network Scanning
Gordon Fyodor Lyon, 2009
(scanned pdf)
Gordon Fyodor Lyon, 2009
(scanned pdf)
Recommendation Engines - Michael Schrage - 2020.pdf
8.6 MB
Recommendation Engines
Michael Schrage, 2020
Michael Schrage, 2020
👍1
Bug Bounty tool List
dnscan https://github.com/rbsec/dnscan
Knockpy https://github.com/guelfoweb/knock
Sublist3r https://github.com/aboul3la/Sublist3r
massdns https://github.com/blechschmidt/massdns
Nmap https://nmap.org
Masscan https://github.com/robertdavidgraham/masscan
EyeWitness https://github.com/ChrisTruncer/EyeWitness
DirBuster https://sourceforge.net/projects/dirbuster/
dirsearch https://github.com/maurosoria/dirsearch
Gitrob https://github.com/michenriksen/gitrob
git-secrets https://github.com/awslabs/git-secrets
sandcastle https://github.com/yasinS/sandcastle
bucket_finder https://digi.ninja/projects/bucket_finder.php
GoogD0rker https://github.com/ZephrFish/GoogD0rker/
Wayback Machine https://web.archive.org
waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050
Sn1per https://github.com/1N3/Sn1per/
XRay https://github.com/evilsocket/xray
wfuzz https://github.com/xmendez/wfuzz/
patator https://github.com/lanjelot/patator
datasploit https://github.com/DataSploit/datasploit
hydra https://github.com/vanhauser-thc/thc-hydra
changeme https://github.com/ztgrace/changeme
MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/
Apktool https://github.com/iBotPeaches/Apktool
dex2jar https://sourceforge.net/projects/dex2jar/
sqlmap http://sqlmap.org/…
dnscan https://github.com/rbsec/dnscan
Knockpy https://github.com/guelfoweb/knock
Sublist3r https://github.com/aboul3la/Sublist3r
massdns https://github.com/blechschmidt/massdns
Nmap https://nmap.org
Masscan https://github.com/robertdavidgraham/masscan
EyeWitness https://github.com/ChrisTruncer/EyeWitness
DirBuster https://sourceforge.net/projects/dirbuster/
dirsearch https://github.com/maurosoria/dirsearch
Gitrob https://github.com/michenriksen/gitrob
git-secrets https://github.com/awslabs/git-secrets
sandcastle https://github.com/yasinS/sandcastle
bucket_finder https://digi.ninja/projects/bucket_finder.php
GoogD0rker https://github.com/ZephrFish/GoogD0rker/
Wayback Machine https://web.archive.org
waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050
Sn1per https://github.com/1N3/Sn1per/
XRay https://github.com/evilsocket/xray
wfuzz https://github.com/xmendez/wfuzz/
patator https://github.com/lanjelot/patator
datasploit https://github.com/DataSploit/datasploit
hydra https://github.com/vanhauser-thc/thc-hydra
changeme https://github.com/ztgrace/changeme
MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/
Apktool https://github.com/iBotPeaches/Apktool
dex2jar https://sourceforge.net/projects/dex2jar/
sqlmap http://sqlmap.org/…
GitHub
GitHub - rbsec/dnscan
Contribute to rbsec/dnscan development by creating an account on GitHub.
👍10❤3
Hacking_APIs_Breaking_Web_Application_Programming_Interfaces_Corey.pdf
10.8 MB
Hacking APIs: Breaking Web Application Programming Interfaces PDF
👍6