Here are 30 cybersecurity search engines:
1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.
➡️ Give 100+ Reactions 🙌
1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.
➡️ Give 100+ Reactions 🙌
❤18👍11👏2
Become A Pro Ethical Hacker 🤝
1. Root Me- Challenges.
2. Stok's YouTube - Videos.
3. Hacker101 Videos-Videos.
4. InsiderPhD YouTube- Videos.
5. EchoCTF -Interactive Learning.
6. Vuln Machines - Videos and Labs.
7. Try2Hack - Interactive Learning.
8. Pentester Land- Written Content.
9. Checkmarx- Interactive Learning.
10. Cybrary-Written Content and Labs.
11. RangeForce- Interactive Exercises.
12. Vuln Hub-Written Content and Labs.
13. TCM Security - Interactive Learning.
14. HackXpert-Written Content and Labs.
15. Try Hack Me- Written Content and Labs.
16. OverTheWire - Written Content and Labs.
17. Hack The Box-Written Content and Labs.
18. CyberSecLabs- Written Content and Labs.
19. Pentester Academy-Written Content and Labs.
20. Bug Bounty Reports Explained YouTube - Videos.
21. Web Security Academy- Written Content and Labs.
22. Securibee's Infosec Resources - Written Content.
Bonus: Zseano's Free Bug Bounty Methodology- Free Ebook.- Interactive Learning.
Google the above keyword
👍10🤩10❤4
Hidden Code for Android ⭐️
❌*#06#-IMEI number
the
❌*#0*#-Enter the service menu
❌*#*#4636#*#*-Phone information, usage statistics and battery
❌*#*#34971539#*#*-Detailed camera information
🌟*#*#273282*255*663282*#*#*-Immediate backup of all media files
❌*#*#197328640#*#*-Enable test mode for service
❌*#*#232339#*#*-Wireless LAN tests
❌*#*#0842#*#*-Backlight/vibration test
❌*#*#2664#*#*-Test the touch screen
❌*#*#1111#*#*-FTA software version (1234 in the same code will give PDA and Firmware version)
❌*#12580*369#-Software and hardware info
❌*#9090#-Diagnostic configuration
❌*#872564#-USB logging control
❌*#9900#-System dump mode
❌*#301279#-HSDPA/HSUPA Control Menu
❌*#7465625#-View phone lock status
❌*#*#7780#*#*-Reset the/data partition to factory state
❌*2767*3855#-Format device to factory state (will delete everything on the phone)
❌##7764726-Hidden service
⭐️ Give Reactions 🙌
❌*#06#-IMEI number
the
❌*#0*#-Enter the service menu
❌*#*#4636#*#*-Phone information, usage statistics and battery
❌*#*#34971539#*#*-Detailed camera information
🌟*#*#273282*255*663282*#*#*-Immediate backup of all media files
❌*#*#197328640#*#*-Enable test mode for service
❌*#*#232339#*#*-Wireless LAN tests
❌*#*#0842#*#*-Backlight/vibration test
❌*#*#2664#*#*-Test the touch screen
❌*#*#1111#*#*-FTA software version (1234 in the same code will give PDA and Firmware version)
❌*#12580*369#-Software and hardware info
❌*#9090#-Diagnostic configuration
❌*#872564#-USB logging control
❌*#9900#-System dump mode
❌*#301279#-HSDPA/HSUPA Control Menu
❌*#7465625#-View phone lock status
❌*#*#7780#*#*-Reset the/data partition to factory state
❌*2767*3855#-Format device to factory state (will delete everything on the phone)
❌##7764726-Hidden service
⭐️ Give Reactions 🙌
❤24👍13
30 Days Roadmap to learn Ethical Hacking 👇👇
Day 1-3: Introduction to Ethical Hacking
- Understand the basics of ethical hacking and its importance
- Learn about different types of hackers and their motivations
- Explore the legal and ethical considerations of ethical hacking
Day 4-7: Networking Fundamentals
- Learn about networking protocols, IP addresses, and subnets
- Understand how data is transmitted over networks
- Explore common network vulnerabilities and how to secure them
Day 8-10: Information Gathering and Footprinting
- Learn how to gather information about a target system or network
- Explore techniques such as passive information gathering and footprinting
- Understand the importance of reconnaissance in ethical hacking
Day 11-14: Scanning and Enumeration
- Learn how to scan for open ports and services on a target system
- Understand the concept of enumeration and its role in ethical hacking
- Explore tools such as Nmap for scanning and enumeration
Day 15-17: Vulnerability Assessment and Exploitation
- Learn how to identify and assess vulnerabilities in a target system
- Understand common exploitation techniques and tools used in ethical hacking
- Explore how to exploit vulnerabilities responsibly and ethically
Day 18-21: Web Application Security
- Learn about common web application vulnerabilities (e.g., SQL injection, XSS)
- Understand how to secure web applications against attacks
- Explore tools such as Burp Suite for web application testing
Day 22-24: Wireless Network Security
- Learn about common wireless network vulnerabilities and attacks
- Understand how to secure wireless networks against intruders
- Explore tools such as Aircrack-ng for wireless network penetration testing
Day 25-27: Social Engineering and Physical Security
- Learn about social engineering techniques used in ethical hacking
- Understand the importance of physical security in cybersecurity
- Explore ways to protect against social engineering attacks
Day 28-30: Penetration Testing and Reporting
- Learn how to conduct penetration tests on systems and networks
- Understand the methodology of penetration testing (e.g., reconnaissance, scanning, exploitation, reporting)
- Practice conducting penetration tests on virtual environments and create detailed reports on findings
Remember to practice your skills in a controlled environment and always seek permission before performing any ethical hacking activities. Additionally, consider obtaining relevant certifications such as Certified Ethical Hacker (CEH) to validate your skills in ethical hacking.
Some good resources to learn Ethical Hacking
1. Tutorials & Courses
- Informarion Security Free Course
- Ethical Hacking Bootcamp
- Network Hacking Course
2. Telegram Channels
- Cyber Security and Ethical Hacking
- Ethical Hacking Books
3. Books
- Ultimate Linux Free Book
- Python for Ethical Hacking
4. Ethical Hacking Forums
Join @free4unow_backup for more free resources
ENJOY LEARNING 👨💻🔒
Day 1-3: Introduction to Ethical Hacking
- Understand the basics of ethical hacking and its importance
- Learn about different types of hackers and their motivations
- Explore the legal and ethical considerations of ethical hacking
Day 4-7: Networking Fundamentals
- Learn about networking protocols, IP addresses, and subnets
- Understand how data is transmitted over networks
- Explore common network vulnerabilities and how to secure them
Day 8-10: Information Gathering and Footprinting
- Learn how to gather information about a target system or network
- Explore techniques such as passive information gathering and footprinting
- Understand the importance of reconnaissance in ethical hacking
Day 11-14: Scanning and Enumeration
- Learn how to scan for open ports and services on a target system
- Understand the concept of enumeration and its role in ethical hacking
- Explore tools such as Nmap for scanning and enumeration
Day 15-17: Vulnerability Assessment and Exploitation
- Learn how to identify and assess vulnerabilities in a target system
- Understand common exploitation techniques and tools used in ethical hacking
- Explore how to exploit vulnerabilities responsibly and ethically
Day 18-21: Web Application Security
- Learn about common web application vulnerabilities (e.g., SQL injection, XSS)
- Understand how to secure web applications against attacks
- Explore tools such as Burp Suite for web application testing
Day 22-24: Wireless Network Security
- Learn about common wireless network vulnerabilities and attacks
- Understand how to secure wireless networks against intruders
- Explore tools such as Aircrack-ng for wireless network penetration testing
Day 25-27: Social Engineering and Physical Security
- Learn about social engineering techniques used in ethical hacking
- Understand the importance of physical security in cybersecurity
- Explore ways to protect against social engineering attacks
Day 28-30: Penetration Testing and Reporting
- Learn how to conduct penetration tests on systems and networks
- Understand the methodology of penetration testing (e.g., reconnaissance, scanning, exploitation, reporting)
- Practice conducting penetration tests on virtual environments and create detailed reports on findings
Remember to practice your skills in a controlled environment and always seek permission before performing any ethical hacking activities. Additionally, consider obtaining relevant certifications such as Certified Ethical Hacker (CEH) to validate your skills in ethical hacking.
Some good resources to learn Ethical Hacking
1. Tutorials & Courses
- Informarion Security Free Course
- Ethical Hacking Bootcamp
- Network Hacking Course
2. Telegram Channels
- Cyber Security and Ethical Hacking
- Ethical Hacking Books
3. Books
- Ultimate Linux Free Book
- Python for Ethical Hacking
4. Ethical Hacking Forums
Join @free4unow_backup for more free resources
ENJOY LEARNING 👨💻🔒
❤8👍6
Here are 30 cybersecurity search engines:
1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.
➡️ Give 100+ Reactions 🙌
1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.
➡️ Give 100+ Reactions 🙌
👍23❤2
TYPES OF INTELLIGENCE
4 types of Intelligence:
1) Intelligence Quotient (IQ)
2) Emotional Quotient (EQ)
3) Social Quotient (SQ)
4) Adversity Quotient (AQ)
1. Intelligence Quotient (IQ): this is the measure of your level of comprehension. You need IQ to solve maths, memorize things, and recall lessons.
2. Emotional Quotient (EQ): this is the measure of your ability to maintain peace with others, keep to time, be responsible, be honest, respect boundaries, be humble, genuine and considerate.
3. Social Quotient (SQ): this is the measure of your ability to build a network of friends and maintain it over a long period of time.
People that have higher EQ and SQ tend to go further in life than those with a high IQ but low EQ and SQ. Most schools capitalize on improving IQ levels while EQ and SQ are played down.
Develop their IQ, as well as their EQ, SQ and AQ. They should become multifaceted human beings able to do things independently of their parents.
4. The Adversity Quotient (AQ): The measure of your ability to go through a rough patch in life, and come out of it without losing your mind.
When faced with troubles, AQ determines who will give up, who will abandon their family, and who will consider suicide.
Parents please expose your children to other areas of life than just Academics. They should adore manual labour (never use work as a form of punishment), Sports and Arts.
4 types of Intelligence:
1) Intelligence Quotient (IQ)
2) Emotional Quotient (EQ)
3) Social Quotient (SQ)
4) Adversity Quotient (AQ)
1. Intelligence Quotient (IQ): this is the measure of your level of comprehension. You need IQ to solve maths, memorize things, and recall lessons.
2. Emotional Quotient (EQ): this is the measure of your ability to maintain peace with others, keep to time, be responsible, be honest, respect boundaries, be humble, genuine and considerate.
3. Social Quotient (SQ): this is the measure of your ability to build a network of friends and maintain it over a long period of time.
People that have higher EQ and SQ tend to go further in life than those with a high IQ but low EQ and SQ. Most schools capitalize on improving IQ levels while EQ and SQ are played down.
Develop their IQ, as well as their EQ, SQ and AQ. They should become multifaceted human beings able to do things independently of their parents.
4. The Adversity Quotient (AQ): The measure of your ability to go through a rough patch in life, and come out of it without losing your mind.
When faced with troubles, AQ determines who will give up, who will abandon their family, and who will consider suicide.
Parents please expose your children to other areas of life than just Academics. They should adore manual labour (never use work as a form of punishment), Sports and Arts.
👍17
Useful Run Commands Every Windows User Should Know
Press Win + R on your ⌨️ to open the Run dialog box and enter any of 👇 commands to access the respective tool.
🔹 "." - the user's folder.
🔹 ".." - user folder.
🔹 "control" - control panel.
🔹 "msconfig" - system configuration parameters.
🔹 "appwiz.cpl" - programs and components.
🔹 "cleanmgr" - a disk cleaning utility.
🔹 "resmon" - resource monitor.
🔹 "calc", "notepad", "mspaint" - calculator, notepad and paint.
🔹 "main.cpl" - mouse parameters.
🔹 "mstsc" - remote desktop.
🔹 "msinfo32" - system information.
🔹 wab - Contacts.
🔹 dccw - Display Color Calibration.
🔹 desk.cpl - Display Settings.
➡️ Give Reactions 🤟
Press Win + R on your ⌨️ to open the Run dialog box and enter any of 👇 commands to access the respective tool.
🔹 "." - the user's folder.
🔹 ".." - user folder.
🔹 "control" - control panel.
🔹 "msconfig" - system configuration parameters.
🔹 "appwiz.cpl" - programs and components.
🔹 "cleanmgr" - a disk cleaning utility.
🔹 "resmon" - resource monitor.
🔹 "calc", "notepad", "mspaint" - calculator, notepad and paint.
🔹 "main.cpl" - mouse parameters.
🔹 "mstsc" - remote desktop.
🔹 "msinfo32" - system information.
🔹 wab - Contacts.
🔹 dccw - Display Color Calibration.
🔹 desk.cpl - Display Settings.
➡️ Give Reactions 🤟
👍23👏4
Here's a List Of 50 Different Cybersecurity Careers
1. Security Analyst
2. Penetration Tester
3. Security Consultant
4. Incident Responder
5. Security Engineer
6. Ethical Hacker
7. Security Architect
8. Malware Analyst
9. Cryptographer
10. Security Administrator
11. Network Security Engineer
12. Security Auditor
13. Security Operations Center (SOC) Analyst
14. Threat Intelligence Analyst
15. Security Compliance Analyst
16. Security Researcher
17. Security Awareness Trainer
18. Forensic Analyst
19. Risk Analyst
20. Application Security Engineer
21. Data Privacy Officer
22. Identity and Access Management (IAM) Specialist
23. Cloud Security Engineer
24. IoT Security Specialist
25. Industrial Control System (ICS) Security Analyst
26. Mobile Security Analyst
27. Wireless Security Engineer
28. Blockchain Security Specialist
29. Embedded Systems Security Analyst
30. Incident Handler
31. Security Information and Event Management (SIEM) Engineer
32. Network Forensics Analyst
33. Threat Hunter
34. Disaster Recovery Specialist
35. Business Continuity Planner
36. Security Software Developer
37. DevSecOps Engineer
38. Cybersecurity Sales Engineer
39. Security Program Manager
40. Security Policy Analyst
41. Cyber Insurance Analyst
42. Security Education Specialist
43. Security Risk Manager
44. Security Compliance Manager
45. Cloud Security Architect
46. Red Team Operator
47. Blue Team Operator
48. Security Tool Developer
49. Security Awareness Manager
50. Cybersecurity Trainer
1. Security Analyst
2. Penetration Tester
3. Security Consultant
4. Incident Responder
5. Security Engineer
6. Ethical Hacker
7. Security Architect
8. Malware Analyst
9. Cryptographer
10. Security Administrator
11. Network Security Engineer
12. Security Auditor
13. Security Operations Center (SOC) Analyst
14. Threat Intelligence Analyst
15. Security Compliance Analyst
16. Security Researcher
17. Security Awareness Trainer
18. Forensic Analyst
19. Risk Analyst
20. Application Security Engineer
21. Data Privacy Officer
22. Identity and Access Management (IAM) Specialist
23. Cloud Security Engineer
24. IoT Security Specialist
25. Industrial Control System (ICS) Security Analyst
26. Mobile Security Analyst
27. Wireless Security Engineer
28. Blockchain Security Specialist
29. Embedded Systems Security Analyst
30. Incident Handler
31. Security Information and Event Management (SIEM) Engineer
32. Network Forensics Analyst
33. Threat Hunter
34. Disaster Recovery Specialist
35. Business Continuity Planner
36. Security Software Developer
37. DevSecOps Engineer
38. Cybersecurity Sales Engineer
39. Security Program Manager
40. Security Policy Analyst
41. Cyber Insurance Analyst
42. Security Education Specialist
43. Security Risk Manager
44. Security Compliance Manager
45. Cloud Security Architect
46. Red Team Operator
47. Blue Team Operator
48. Security Tool Developer
49. Security Awareness Manager
50. Cybersecurity Trainer
👍17👏2❤1
⚡️ TOP 20 PHISHING TOOLS TO USE IN 2024 ⚡️
1. Setoolkit
✣ https://github.com/trustedsec/social-engineer-toolkit
2. Evilginx2
❂ https://github.com/kgretzky/evilginx
3. HiddenEye
❉ https://github.com/DarkSecDevelopers/HiddenEye-Legacy
4. SocialFish
✦ https://github.com/UndeadSec/SocialFish
5. SeeYou (Get Location using phishing attack)
❋ https://github.com/Viralmaniar/I-See-You
6. SayCheese (Grab target's Webcam Shots)
✵ https://github.com/hangetzzu/saycheese
7. QR Code Jacking
✿ https://github.com/cryptedwolf/ohmyqr
8. ShellPhish
✸ https://github.com/An0nUD4Y/shellphish
9. BlackPhish
✤ https://github.com/iinc0gnit0/BlackPhish
10. Zphisher
✧ https://github.com/htr-tech/zphisher
❁ 11. PhishX
✺ https://github.com/thelinuxchoice/PhishX
12. Gophish
✢ https://github.com/gophish/gophish
13. Wifiphisher
❖ https://github.com/wifiphisher/wifiphisher
14. Phishing Frenzy
✯ https://github.com/pentestgeek/phishing-frenzy
15. Ghost Phisher
❃ https://github.com/savio-code/ghost-phisher
16. BlackEye
❀ https://github.com/thelinuxchoice/blackeye
17. King-Phisher
✶ https://github.com/rsmusllp/king-phisher
18. SpookPhish
✹ https://github.com/technowlogy/spookphish
19. PyPhisher
✥ https://github.com/KasRoudra/PyPhisher
20. HiddenPhish
❁ https://github.com/HiddenPhish/HiddenPhish
1. Setoolkit
✣ https://github.com/trustedsec/social-engineer-toolkit
2. Evilginx2
❂ https://github.com/kgretzky/evilginx
3. HiddenEye
❉ https://github.com/DarkSecDevelopers/HiddenEye-Legacy
4. SocialFish
✦ https://github.com/UndeadSec/SocialFish
5. SeeYou (Get Location using phishing attack)
❋ https://github.com/Viralmaniar/I-See-You
6. SayCheese (Grab target's Webcam Shots)
✵ https://github.com/hangetzzu/saycheese
7. QR Code Jacking
✿ https://github.com/cryptedwolf/ohmyqr
8. ShellPhish
✸ https://github.com/An0nUD4Y/shellphish
9. BlackPhish
✤ https://github.com/iinc0gnit0/BlackPhish
10. Zphisher
✧ https://github.com/htr-tech/zphisher
❁ 11. PhishX
✺ https://github.com/thelinuxchoice/PhishX
12. Gophish
✢ https://github.com/gophish/gophish
13. Wifiphisher
❖ https://github.com/wifiphisher/wifiphisher
14. Phishing Frenzy
✯ https://github.com/pentestgeek/phishing-frenzy
15. Ghost Phisher
❃ https://github.com/savio-code/ghost-phisher
16. BlackEye
❀ https://github.com/thelinuxchoice/blackeye
17. King-Phisher
✶ https://github.com/rsmusllp/king-phisher
18. SpookPhish
✹ https://github.com/technowlogy/spookphish
19. PyPhisher
✥ https://github.com/KasRoudra/PyPhisher
20. HiddenPhish
❁ https://github.com/HiddenPhish/HiddenPhish
❤3👍3
Linux System Administrator Roadmap🐧💻
├── 🔹 Foundations
│ ├── 🔸 Basic Linux Concepts
│ │ ├── 📂 File System Hierarchy
│ │ ├── 🔑 Permissions and Ownership
│ │ ├── 🔄 Processes and Daemons
│ │ └── 🖥️ Basic Commands (ls, cd, cp, mv, rm, etc.)
│ ├── 🔸 Shell and Scripting
│ │ ├── 📝 Bash Scripting
│ │ ├── 🔧 Basic Automation
│ │ └── 🛠️ Common Shell Commands (grep, awk, sed)
│ ├── 🔸 Networking Fundamentals
│ │ ├── 🌐 TCP/IP Stack
│ │ ├── 🌍 DNS Configuration
│ │ ├── 🔌 Network Interfaces
│ │ └── 🛠️ Basic Network Troubleshooting (ping, traceroute, netstat)
│ └── 🔸 System Installation and Configuration
│ ├── 💿 Installation Methods (ISO, PXE)
│ ├── 🗂️ Disk Partitioning and File Systems
│ └── 🔒 Initial Configuration and Hardening
├── 🔹 System Administration
│ ├── 🔸 User and Group Management
│ │ ├── 👤 User Accounts
│ │ ├── 👥 Group Policies
│ │ └── 🔑 sudo Configuration
│ ├── 🔸 Package Management
│ │ ├── 📦 RPM and YUM (RHEL/CentOS)
│ │ ├── 📦 APT (Debian/Ubuntu)
│ │ └── 🔧 Compiling from Source
│ ├── 🔸 Process Management
│ │ ├── 🔄 Systemd and Init
│ │ ├── 👀 Monitoring and Controlling Processes
│ │ └── 🕒 Crontab and Scheduled Tasks
│ ├── 🔸 Filesystem Management
│ │ ├── 🗂️ Mounting and Unmounting File Systems
│ │ ├── 📁 NFS and Samba
│ │ └── 📊 Disk Quotas
│ └── 🔸 Security
│ ├── 🔥 Firewalls (iptables, firewalld)
│ ├── 🛡️ SELinux and AppArmor
│ ├── 🔒 SSH Configuration and Hardening
│ └── 📝 Auditing and Logging
├── 🔹 Networking and Services
│ ├── 🔸 Network Configuration
│ │ ├── 🌐 Static and Dynamic IP Addressing
│ │ ├── 🔌 Network Bonding and Bridging
│ │ └── 📶 VLANs
│ ├── 🔸 Web Services
│ │ ├── 🌐 Apache and Nginx
│ │ ├── 🔐 HTTPS and SSL/TLS
│ │ ├── ↔️ Reverse Proxies
│ │ └── 🛡️ Web Application Firewalls (WAF)
│ ├── 🔸 Database Management
│ │ ├── 💾 MySQL/MariaDB
│ │ ├── 💾 PostgreSQL
│ │ ├── 📂 NoSQL Databases (e.g., MongoDB)
│ │ └── 🔄 Backup and Restore
│ ├── 🔸 Email Services
│ │ ├── ✉️ Postfix and Sendmail
│ │ └── 🚫 Spam Filtering
│ └── 🔸 File and Print Services
│ ├── 📁 Samba
│ ├── 📁 NFS
│ └── 🖨️ CUPS
├── 🔹 Advanced Administration
│ ├── 🔸 Virtualization
│ │ ├── 💻 KVM and QEMU
│ │ ├── 📦 VirtualBox
│ │ └── 🔧 Libvirt
│ ├── 🔸 Containerization
│ │ ├── 🐳 Docker
│ │ ├── ☸️ Kubernetes
│ │ └── 🔧 Podman
│ ├── 🔸 Cloud Computing
│ │ ├── ☁️ AWS
│ │ ├── ☁️ Azure
│ │ ├── ☁️ OpenStack
│ │ └── ☁️ GCP (Google Cloud Platform)
│ ├── 🔸 Configuration Management
│ │ ├── 🤖 Ansible
│ │ ├── 🎭 Puppet
│ │ ├── 🍴 Chef
│ │ └── 🧂 SaltStack
│ └── 🔸 High Availability
│ ├── 🔗 Clustering (Pacemaker, Corosync)
│ ├── ⚖️ Load Balancing (HAProxy, Nginx)
│ └── 🔄 Backup and Disaster Recovery
├── 🔹 Monitoring and Performance
│ ├── 🔸 System Monitoring
│ │ ├── 🔧 Tools (Nagios, Zabbix, Prometheus, Grafana)
│ │ └── 📝 Log Management (ELK Stack, Graylog)
│ ├── 🔸 Performance Tuning
│ │ ├── 🧠 CPU and Memory Optimization
│ │ ├── 💾 Disk I/O Performance
│ │ └── 🌐 Network Performance
│ └── 🔸 Troubleshooting
│ ├── 📝 Log Analysis
│ ├── 🔍 Common Issues and Solutions
│ ├── 🚧 Performance Bottlenecks
│ └── 🔧 Kernel Tuning
├── 🔹 Scripting and Automation
│ ├── 🔸 Advanced Scripting
│ │ ├── 📜 Shell Scripting (Advanced)
│ │ ├── 🐍 Python Scripting
│ │ └── 🤖 Task Automation
│ └── 🔸 Infrastructure as Code (IaC)
│ ├── 🌍 Terraform
│ ├── ☁️ CloudFormation
│ └── 🔄 CI/CD Pipelines (Jenkins, GitLab CI)
└── 🔹 Security and Compliance
├── 🔸 Security Best Practices
│ ├── 🔒 System Hardening
│ └──🔄 Regular Updates and Patching
└── 🔍 Security Auditing Tools (e.g., Lynis, OpenVAS)
├── 🔹 Foundations
│ ├── 🔸 Basic Linux Concepts
│ │ ├── 📂 File System Hierarchy
│ │ ├── 🔑 Permissions and Ownership
│ │ ├── 🔄 Processes and Daemons
│ │ └── 🖥️ Basic Commands (ls, cd, cp, mv, rm, etc.)
│ ├── 🔸 Shell and Scripting
│ │ ├── 📝 Bash Scripting
│ │ ├── 🔧 Basic Automation
│ │ └── 🛠️ Common Shell Commands (grep, awk, sed)
│ ├── 🔸 Networking Fundamentals
│ │ ├── 🌐 TCP/IP Stack
│ │ ├── 🌍 DNS Configuration
│ │ ├── 🔌 Network Interfaces
│ │ └── 🛠️ Basic Network Troubleshooting (ping, traceroute, netstat)
│ └── 🔸 System Installation and Configuration
│ ├── 💿 Installation Methods (ISO, PXE)
│ ├── 🗂️ Disk Partitioning and File Systems
│ └── 🔒 Initial Configuration and Hardening
├── 🔹 System Administration
│ ├── 🔸 User and Group Management
│ │ ├── 👤 User Accounts
│ │ ├── 👥 Group Policies
│ │ └── 🔑 sudo Configuration
│ ├── 🔸 Package Management
│ │ ├── 📦 RPM and YUM (RHEL/CentOS)
│ │ ├── 📦 APT (Debian/Ubuntu)
│ │ └── 🔧 Compiling from Source
│ ├── 🔸 Process Management
│ │ ├── 🔄 Systemd and Init
│ │ ├── 👀 Monitoring and Controlling Processes
│ │ └── 🕒 Crontab and Scheduled Tasks
│ ├── 🔸 Filesystem Management
│ │ ├── 🗂️ Mounting and Unmounting File Systems
│ │ ├── 📁 NFS and Samba
│ │ └── 📊 Disk Quotas
│ └── 🔸 Security
│ ├── 🔥 Firewalls (iptables, firewalld)
│ ├── 🛡️ SELinux and AppArmor
│ ├── 🔒 SSH Configuration and Hardening
│ └── 📝 Auditing and Logging
├── 🔹 Networking and Services
│ ├── 🔸 Network Configuration
│ │ ├── 🌐 Static and Dynamic IP Addressing
│ │ ├── 🔌 Network Bonding and Bridging
│ │ └── 📶 VLANs
│ ├── 🔸 Web Services
│ │ ├── 🌐 Apache and Nginx
│ │ ├── 🔐 HTTPS and SSL/TLS
│ │ ├── ↔️ Reverse Proxies
│ │ └── 🛡️ Web Application Firewalls (WAF)
│ ├── 🔸 Database Management
│ │ ├── 💾 MySQL/MariaDB
│ │ ├── 💾 PostgreSQL
│ │ ├── 📂 NoSQL Databases (e.g., MongoDB)
│ │ └── 🔄 Backup and Restore
│ ├── 🔸 Email Services
│ │ ├── ✉️ Postfix and Sendmail
│ │ └── 🚫 Spam Filtering
│ └── 🔸 File and Print Services
│ ├── 📁 Samba
│ ├── 📁 NFS
│ └── 🖨️ CUPS
├── 🔹 Advanced Administration
│ ├── 🔸 Virtualization
│ │ ├── 💻 KVM and QEMU
│ │ ├── 📦 VirtualBox
│ │ └── 🔧 Libvirt
│ ├── 🔸 Containerization
│ │ ├── 🐳 Docker
│ │ ├── ☸️ Kubernetes
│ │ └── 🔧 Podman
│ ├── 🔸 Cloud Computing
│ │ ├── ☁️ AWS
│ │ ├── ☁️ Azure
│ │ ├── ☁️ OpenStack
│ │ └── ☁️ GCP (Google Cloud Platform)
│ ├── 🔸 Configuration Management
│ │ ├── 🤖 Ansible
│ │ ├── 🎭 Puppet
│ │ ├── 🍴 Chef
│ │ └── 🧂 SaltStack
│ └── 🔸 High Availability
│ ├── 🔗 Clustering (Pacemaker, Corosync)
│ ├── ⚖️ Load Balancing (HAProxy, Nginx)
│ └── 🔄 Backup and Disaster Recovery
├── 🔹 Monitoring and Performance
│ ├── 🔸 System Monitoring
│ │ ├── 🔧 Tools (Nagios, Zabbix, Prometheus, Grafana)
│ │ └── 📝 Log Management (ELK Stack, Graylog)
│ ├── 🔸 Performance Tuning
│ │ ├── 🧠 CPU and Memory Optimization
│ │ ├── 💾 Disk I/O Performance
│ │ └── 🌐 Network Performance
│ └── 🔸 Troubleshooting
│ ├── 📝 Log Analysis
│ ├── 🔍 Common Issues and Solutions
│ ├── 🚧 Performance Bottlenecks
│ └── 🔧 Kernel Tuning
├── 🔹 Scripting and Automation
│ ├── 🔸 Advanced Scripting
│ │ ├── 📜 Shell Scripting (Advanced)
│ │ ├── 🐍 Python Scripting
│ │ └── 🤖 Task Automation
│ └── 🔸 Infrastructure as Code (IaC)
│ ├── 🌍 Terraform
│ ├── ☁️ CloudFormation
│ └── 🔄 CI/CD Pipelines (Jenkins, GitLab CI)
└── 🔹 Security and Compliance
├── 🔸 Security Best Practices
│ ├── 🔒 System Hardening
│ └──🔄 Regular Updates and Patching
└── 🔍 Security Auditing Tools (e.g., Lynis, OpenVAS)
👍20❤1
Bug bounty Cheatsheet🚬
XSS
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list
SQLi
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md
SSRF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery
CRLF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection
CSV-Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection
Command Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
Directory Traversal
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal
LFI
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion
XXE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md
Open-Redirect
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md
RCE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md
Crypto
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md
Template Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection
XSLT
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md
Content Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md
LDAP Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection
NoSQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection
CSRF Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection
GraphQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection
IDOR
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References
ISCM
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management
LaTex Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection
OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth
XPATH Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection
Bypass Upload Tricky
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files
XSS
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list
SQLi
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md
SSRF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery
CRLF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection
CSV-Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection
Command Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
Directory Traversal
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal
LFI
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion
XXE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md
Open-Redirect
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md
RCE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md
Crypto
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md
Template Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection
XSLT
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md
Content Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md
LDAP Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection
NoSQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection
CSRF Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection
GraphQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection
IDOR
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References
ISCM
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management
LaTex Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection
OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth
XPATH Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection
Bypass Upload Tricky
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files
❤2
🕯 All in one Awesome Cybersecurity Resources - [Part 1]
•Awesome Red Team Ops :-
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
•Awesome Red Teaming :-
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
•Awesome Red Team ToolKit :-
https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/
•Awesome Blue Team Ops :-
https://github.com/fabacab/awesome-cybersecurity-blueteam
•Awesome OSINT :-
https://github.com/jivoi/awesome-osint
•Awesome Red Team Ops :-
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
•Awesome Red Teaming :-
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
•Awesome Red Team ToolKit :-
https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/
•Awesome Blue Team Ops :-
https://github.com/fabacab/awesome-cybersecurity-blueteam
•Awesome OSINT :-
https://github.com/jivoi/awesome-osint
🌟 𝗠𝗮𝘀𝘁𝗲𝗿 𝗧𝗵𝗲𝘀𝗲 𝗘𝘀𝘀𝗲𝗻𝘁𝗶𝗮𝗹 𝗟𝗶𝗻𝘂𝘅 𝗖𝗼𝗺𝗺𝗮𝗻𝗱𝘀 𝗳𝗼𝗿 𝗮 𝗦𝗺𝗼𝗼𝘁𝗵𝗲𝗿 𝗧𝗲𝗰𝗵 𝗝𝗼𝘂𝗿𝗻𝗲𝘆! 🚀
In the world of tech, knowing Linux commands can be a GAME-CHANGER. Whether you’re a Data Engineer, Developer, or Analyst, these are the commands that will save you time and make you look like a pro:
🛠️ File Management:
1️⃣ ls - List files in a directory
2️⃣ mkdir - Create directories
3️⃣ rm - Remove files or directories
💻 System Monitoring:
4️⃣ top - Display active processes
5️⃣ df -h - Check disk space usage
6️⃣ free -m - Monitor RAM usage
📁 Text Processing:
7️⃣ cat - View contents of a file
8️⃣ grep - Search for specific text in files
9️⃣ awk - Pattern scanning and text processing
🔑 Permissions & Ownership:
🔟 chmod - Change file permissions
1️⃣1️⃣ chown - Change file ownership
🔌 Networking:
1️⃣2️⃣ ping - Test connectivity
1️⃣3️⃣ curl - Transfer data from/to servers
🔹 Pro Tip: Save time by mastering shortcuts like Ctrl+C (stop process) and Tab (autocomplete).
Join for more Linux resources: https://whatsapp.com/channel/0029Vaz9t4s2P59gEo9n7b3I
In the world of tech, knowing Linux commands can be a GAME-CHANGER. Whether you’re a Data Engineer, Developer, or Analyst, these are the commands that will save you time and make you look like a pro:
🛠️ File Management:
1️⃣ ls - List files in a directory
2️⃣ mkdir - Create directories
3️⃣ rm - Remove files or directories
💻 System Monitoring:
4️⃣ top - Display active processes
5️⃣ df -h - Check disk space usage
6️⃣ free -m - Monitor RAM usage
📁 Text Processing:
7️⃣ cat - View contents of a file
8️⃣ grep - Search for specific text in files
9️⃣ awk - Pattern scanning and text processing
🔑 Permissions & Ownership:
🔟 chmod - Change file permissions
1️⃣1️⃣ chown - Change file ownership
🔌 Networking:
1️⃣2️⃣ ping - Test connectivity
1️⃣3️⃣ curl - Transfer data from/to servers
🔹 Pro Tip: Save time by mastering shortcuts like Ctrl+C (stop process) and Tab (autocomplete).
Join for more Linux resources: https://whatsapp.com/channel/0029Vaz9t4s2P59gEo9n7b3I
👍8❤1