Forwarded from Hack Hive
Hack Hive
Misconfiguration.pdf
hard level =
https://www.hackthebox.com/blog/active-directory-misconfigurations
And
https://olivierkonate.medium.com/hackthebox-usage-f9c7e12818cd
And
https://portswigger.net/web-security/all-labs
And
https://portswigger.net/web-security/api-testing/top-10-api-vulnerabilities
And
https://arxiv.org/abs/2107.12566
And
https://4geeks.com/interactive-coding-tutorial/exposed-code-analysis-ctf-lab
And
https://xploitlab.me/labs/ins
#owasp_series
#misconfiguration
@hackhive_channel🐝
https://www.hackthebox.com/blog/active-directory-misconfigurations
And
https://olivierkonate.medium.com/hackthebox-usage-f9c7e12818cd
And
https://portswigger.net/web-security/all-labs
And
https://portswigger.net/web-security/api-testing/top-10-api-vulnerabilities
And
https://arxiv.org/abs/2107.12566
And
https://4geeks.com/interactive-coding-tutorial/exposed-code-analysis-ctf-lab
And
https://xploitlab.me/labs/ins
#owasp_series
#misconfiguration
@hackhive_channel🐝
Hack The Box
5 Active Directory misconfigurations (& how they're exploited)
Audit your AD environment for misconfigurations (and attacks) that can lead to severe consequences when exploited by malicious actors.
🔥6
@PasswordSearchBot
Password Search Bot
A Telegram bot (10 free searches/day) that provides passwords associated with any email address found in data breaches.
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
Password Search Bot
A Telegram bot (10 free searches/day) that provides passwords associated with any email address found in data breaches.
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
Telegram
NSEs
Where Network meets Red Team 🎯
If you're into PenTesting, Hacking, and Cyber Shenanigans — you're home!
🧠 Learn • 🚀 Hack • 🧩 Quiz • 📚 Books • 😁 Memes
If you're into PenTesting, Hacking, and Cyber Shenanigans — you're home!
🧠 Learn • 🚀 Hack • 🧩 Quiz • 📚 Books • 😁 Memes
❤🔥8❤1🔥1
A Hacker's Notebook: Real Techniques from the World of Bug Bounty
https://snapdragon-copper-dd1.notion.site/A-Hacker-s-Notebook-Real-Techniques-from-the-World-of-Bug-Bounty-20ea797be4c680e6b542c20a943782d6?pvs=73
By: @bugbountyhints
https://snapdragon-copper-dd1.notion.site/A-Hacker-s-Notebook-Real-Techniques-from-the-World-of-Bug-Bounty-20ea797be4c680e6b542c20a943782d6?pvs=73
By: @bugbountyhints
snapdragon-copper-dd1 on Notion
A Hacker's Notebook: Real Techniques from the World of Bug Bounty | Notion
This document is a collection of practical tips and techniques gathered from various bug bounty write-ups. The goal is to share these real-world scenarios to get a better perspective on finding vulnerabilities and developing a hacker's mindset.
❤13🔥1🤣1
FREE reverse engineering module now available!
Learn assembly fundamentals - perfect for beginners.
• Hands-on debugging with real examples
• Web based: no downloads, installs, or VMs
Start reversing here 👇
https://www.aceresponder.com/learn/rem-intro
Learn assembly fundamentals - perfect for beginners.
• Hands-on debugging with real examples
• Web based: no downloads, installs, or VMs
Start reversing here 👇
https://www.aceresponder.com/learn/rem-intro
Aceresponder
Reverse Engineering and Malware Analysis Intro
A free introduction to reverse engineering malware with an emphasis on interpreting assembly language.
🔥10❤4
NSEs
FREE reverse engineering module now available! Learn assembly fundamentals - perfect for beginners. • Hands-on debugging with real examples • Web based: no downloads, installs, or VMs Start reversing here 👇 https://www.aceresponder.com/learn/rem-intro
چند تا اموزش رایگان دیگه مثل ویندوز API ... داره خواستید بهش یه سر بزنید
⚡9❤3
Forwarded from GO-TO CVE
CVE-2025-24893-week-73.docx
330.2 KB
🎯 Week 73 — CVE-2025-24893 Review — xwiki rce
🔹 Week: 73
🔹 CVE: CVE-2025-24893
🔹 Type: rce
🔹 Target: xwiki
#week_73
🔹 Week: 73
🔹 CVE: CVE-2025-24893
🔹 Type: rce
🔹 Target: xwiki
#week_73
⚡9❤2
