The_Hacker_Playbook_2_Practical_Guide_To_Penetration_Testing_Peter.pdf
23.2 MB
The Hacker Playbook 2
Peter Kim, 2015
Peter Kim, 2015
The_Hacker_Playbook_3_Practical_Guide_to_Penetration_Testing_Peter.pdf
8.7 MB
The Hacker Playbook 3
Peter Kim, 2018
Peter Kim, 2018
❤5
Cybersecurity_for_Small_Networks_A_No_Nonsense_Guide_for_the_Reasonably.pdf
4.6 MB
Cybersecurity for Small Networks
Seth Enoka, 2023
Seth Enoka, 2023
👍4❤2
gordon-fyodor-lyon-nmap-network-scanning-the-official.pdf
120.1 MB
Nmap Network Scanning
Gordon Fyodor Lyon, 2009
(scanned pdf)
Gordon Fyodor Lyon, 2009
(scanned pdf)
Recommendation Engines - Michael Schrage - 2020.pdf
8.6 MB
Recommendation Engines
Michael Schrage, 2020
Michael Schrage, 2020
👍1
Bug Bounty tool List
dnscan https://github.com/rbsec/dnscan
Knockpy https://github.com/guelfoweb/knock
Sublist3r https://github.com/aboul3la/Sublist3r
massdns https://github.com/blechschmidt/massdns
Nmap https://nmap.org
Masscan https://github.com/robertdavidgraham/masscan
EyeWitness https://github.com/ChrisTruncer/EyeWitness
DirBuster https://sourceforge.net/projects/dirbuster/
dirsearch https://github.com/maurosoria/dirsearch
Gitrob https://github.com/michenriksen/gitrob
git-secrets https://github.com/awslabs/git-secrets
sandcastle https://github.com/yasinS/sandcastle
bucket_finder https://digi.ninja/projects/bucket_finder.php
GoogD0rker https://github.com/ZephrFish/GoogD0rker/
Wayback Machine https://web.archive.org
waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050
Sn1per https://github.com/1N3/Sn1per/
XRay https://github.com/evilsocket/xray
wfuzz https://github.com/xmendez/wfuzz/
patator https://github.com/lanjelot/patator
datasploit https://github.com/DataSploit/datasploit
hydra https://github.com/vanhauser-thc/thc-hydra
changeme https://github.com/ztgrace/changeme
MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/
Apktool https://github.com/iBotPeaches/Apktool
dex2jar https://sourceforge.net/projects/dex2jar/
sqlmap http://sqlmap.org/…
dnscan https://github.com/rbsec/dnscan
Knockpy https://github.com/guelfoweb/knock
Sublist3r https://github.com/aboul3la/Sublist3r
massdns https://github.com/blechschmidt/massdns
Nmap https://nmap.org
Masscan https://github.com/robertdavidgraham/masscan
EyeWitness https://github.com/ChrisTruncer/EyeWitness
DirBuster https://sourceforge.net/projects/dirbuster/
dirsearch https://github.com/maurosoria/dirsearch
Gitrob https://github.com/michenriksen/gitrob
git-secrets https://github.com/awslabs/git-secrets
sandcastle https://github.com/yasinS/sandcastle
bucket_finder https://digi.ninja/projects/bucket_finder.php
GoogD0rker https://github.com/ZephrFish/GoogD0rker/
Wayback Machine https://web.archive.org
waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050
Sn1per https://github.com/1N3/Sn1per/
XRay https://github.com/evilsocket/xray
wfuzz https://github.com/xmendez/wfuzz/
patator https://github.com/lanjelot/patator
datasploit https://github.com/DataSploit/datasploit
hydra https://github.com/vanhauser-thc/thc-hydra
changeme https://github.com/ztgrace/changeme
MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/
Apktool https://github.com/iBotPeaches/Apktool
dex2jar https://sourceforge.net/projects/dex2jar/
sqlmap http://sqlmap.org/…
GitHub
GitHub - rbsec/dnscan
Contribute to rbsec/dnscan development by creating an account on GitHub.
👍10❤3
Hacking_APIs_Breaking_Web_Application_Programming_Interfaces_Corey.pdf
10.8 MB
Hacking APIs: Breaking Web Application Programming Interfaces PDF
👍6
Computer Language Engineering (SMA 5502)
It is a course within the department’s “Computer Systems and Architecture” concentration. This course analyzes issues associated with the implementation of high-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, basic program optimization techniques, the interaction of theory and practice, and using tools in building software. The course features a multi-person project on design and implementation of a compiler that is written in Java® and generates MIPS executable machine code. This course is worth 8 Engineering Design Points.
🆓 Free Online Course
💻 Lecture Videos
📶 Readings
☢️ Projects
🏃♂️ Self paced
Teacher 👨🏫 : Prof. Martin Rinard, Prof. Saman Amarasinghe
Source: MIT
🔗 Course Link
It is a course within the department’s “Computer Systems and Architecture” concentration. This course analyzes issues associated with the implementation of high-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, basic program optimization techniques, the interaction of theory and practice, and using tools in building software. The course features a multi-person project on design and implementation of a compiler that is written in Java® and generates MIPS executable machine code. This course is worth 8 Engineering Design Points.
🆓 Free Online Course
💻 Lecture Videos
📶 Readings
☢️ Projects
🏃♂️ Self paced
Teacher 👨🏫 : Prof. Martin Rinard, Prof. Saman Amarasinghe
Source: MIT
🔗 Course Link
MIT OpenCourseWare
Computer Language Engineering (SMA 5502) | Electrical Engineering and Computer Science | MIT OpenCourseWare
6.035 is a course within the department's "Computer Systems and Architecture" concentration. This course analyzes issues associated with the implementation of high-level programming languages. Topics covered include: fundamental concepts, functions, and structures…
👍6🥰1👏1
💀 How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC 💀
Follow the steps for running any software in your Computer.
🔺Download "Runasdate" Software - https://runasdate.en.softonic.com/
🔺Install Runasdate.
🔺Now run any trial software on your computer and write down the date of installation on your PC.
🔺When your trial version gets over just Right Click on your software and select Runasdate.
Now Runasdate will extend the trial period of your software by changing trial period. With the help of this software, you can use any software on your PC for a lifetime, without spending money. Make sure to use the correct date of installation on Runasdate.
Follow the steps for running any software in your Computer.
🔺Download "Runasdate" Software - https://runasdate.en.softonic.com/
🔺Install Runasdate.
🔺Now run any trial software on your computer and write down the date of installation on your PC.
🔺When your trial version gets over just Right Click on your software and select Runasdate.
Now Runasdate will extend the trial period of your software by changing trial period. With the help of this software, you can use any software on your PC for a lifetime, without spending money. Make sure to use the correct date of installation on Runasdate.
Softonic
RunAsDate - Download
RunAsDate, free and safe download. RunAsDate latest version: RunAsDate: Simulate Date and Time for Applications. RunAsDate is a free utility for Windo
👍4
💻30 Tips how to use OSINT for bug hunting💻 :
1. Use Google Dorks to find vulnerabilities in web applications.
2. Use Shodan to find vulnerable IoT devices.
3. Use Whois to find information about domain names.
4. Use Maltego to visualize relationships between entities.
5. Use the Wayback Machine to find old versions of websites.
6. Use social media to gather information about targets.
7. Use LinkedIn to gather information about employees.
8. Use GitHub to find sensitive information in code repositories.
9. Use Google Alerts to monitor for mentions of your target.
10. Use DNSDumpster to map out a target's infrastructure.
11. Use Recon-ng to automate OSINT tasks.
12. Use theHarvester to gather email addresses and other information.
13. Use SpiderFoot to automate OSINT tasks and gather intelligence.
14. Use FOCA (Fingerprinting Organizations with Collected Archives) to gather metadata from documents.
15. Use VirusTotal to scan files for malware.
16. Use Censys to find vulnerable systems on the internet.
17. Use Foca Pro to extract metadata from documents and analyze it.
18. Use FOCA Online to extract metadata from documents and analyze it in the cloud.
19. Use FOCA Free Edition for basic metadata extraction from documents.
20. Use Metagoofil to extract metadata from documents and analyze it.
21. Use Datasploit for automated OSINT tasks and data mining.
22. Use Google Hacking Database (GHDB) for advanced Google searches.
23. Use Google Custom Search Engine (CSE) for targeted searches on specific websites or domains.
24. Use Google Advanced Search for advanced searches on Google.
25. Use Google Trends to monitor trends related to your target or industry.
26. Use Google Analytics to gather information about website traffic and user behavior.
27. Use Google AdWords Keyword Planner for keyword research related to your target or industry.
28. Use Google PageSpeed Insights to analyze website performance and identify vulnerabilities.
29. Use Google Search Console (formerly Webmaster Tools) for website analytics and vulnerability identification.
30. Use Google My Business for local SEO optimization.
1. Use Google Dorks to find vulnerabilities in web applications.
2. Use Shodan to find vulnerable IoT devices.
3. Use Whois to find information about domain names.
4. Use Maltego to visualize relationships between entities.
5. Use the Wayback Machine to find old versions of websites.
6. Use social media to gather information about targets.
7. Use LinkedIn to gather information about employees.
8. Use GitHub to find sensitive information in code repositories.
9. Use Google Alerts to monitor for mentions of your target.
10. Use DNSDumpster to map out a target's infrastructure.
11. Use Recon-ng to automate OSINT tasks.
12. Use theHarvester to gather email addresses and other information.
13. Use SpiderFoot to automate OSINT tasks and gather intelligence.
14. Use FOCA (Fingerprinting Organizations with Collected Archives) to gather metadata from documents.
15. Use VirusTotal to scan files for malware.
16. Use Censys to find vulnerable systems on the internet.
17. Use Foca Pro to extract metadata from documents and analyze it.
18. Use FOCA Online to extract metadata from documents and analyze it in the cloud.
19. Use FOCA Free Edition for basic metadata extraction from documents.
20. Use Metagoofil to extract metadata from documents and analyze it.
21. Use Datasploit for automated OSINT tasks and data mining.
22. Use Google Hacking Database (GHDB) for advanced Google searches.
23. Use Google Custom Search Engine (CSE) for targeted searches on specific websites or domains.
24. Use Google Advanced Search for advanced searches on Google.
25. Use Google Trends to monitor trends related to your target or industry.
26. Use Google Analytics to gather information about website traffic and user behavior.
27. Use Google AdWords Keyword Planner for keyword research related to your target or industry.
28. Use Google PageSpeed Insights to analyze website performance and identify vulnerabilities.
29. Use Google Search Console (formerly Webmaster Tools) for website analytics and vulnerability identification.
30. Use Google My Business for local SEO optimization.
👍9❤2