⚠️ How To Secure A Linux Server. ⚠️
This guides purpose is to teach you how to secure a Linux server.
There are a lot of things you can do to secure a Linux server and this guide will attempt to cover as many of them as possible.
👉 Read more - Here 👈
#info_sec #linux #hardening
This guides purpose is to teach you how to secure a Linux server.
There are a lot of things you can do to secure a Linux server and this guide will attempt to cover as many of them as possible.
👉 Read more - Here 👈
#info_sec #linux #hardening
👍2
Host-Pulse - a fast, lightweight domain liveness probe for pentesters and security engineers.
Scans large domain lists, quickly skips dead targets, detects reachable hosts (including 403/401/5xx), and produces clean
Tool: 👉 https://github.com/xV4nd3Rx/Host-Pulse
⚡ Fast-skip dead targets.
🎯 Alive logic tuned for pentesting
🧩 Randomized User-Agent per request to avoid simple UA-based filtering.
🔁 Parallel workers + controlled delays
🔐 Insecure HTTPS requests are supported (suppressed warnings) so scanning continues even with untrusted certs
#pentest_tools #Red_Team #cybersecurity #Passive_Recon
Scans large domain lists, quickly skips dead targets, detects reachable hosts (including 403/401/5xx), and produces clean
alive.txt and compact results.csv reports.Tool: 👉 https://github.com/xV4nd3Rx/Host-Pulse
⚡ Fast-skip dead targets.
🎯 Alive logic tuned for pentesting
🧩 Randomized User-Agent per request to avoid simple UA-based filtering.
🔁 Parallel workers + controlled delays
🔐 Insecure HTTPS requests are supported (suppressed warnings) so scanning continues even with untrusted certs
#pentest_tools #Red_Team #cybersecurity #Passive_Recon
🔥2
👉 I believe the Telegram channel should bring real value to subscribers. 👈
💥 New column for Monday: Job Offers. 💥
💬 For details, please contact me via direct: @V4nd3R 💬
#cybersecurity_career #job_offers #security
💥 New column for Monday: Job Offers. 💥
As a Senior Security Engineer, become part of a cross-functional development team engineering experiences of tomorrow. We are seeking a highly skilled and motivated Senior Security & Penetration Tester.
In this role, you will be responsible for identifying and mitigating security vulnerabilities in a project in the biomedicine field. You will proactively test our applications, including infrastructure, ensuring our digital assets are secure against emerging threats.
💬 For details, please contact me via direct: @V4nd3R 💬
#cybersecurity_career #job_offers #security
✍2
🔥 SPF Attacks: Quick Overview
1️⃣ Alignment Bypass
SPF checks MAIL FROM, not the visible From - easy spoofing.
2️⃣ SoftFail Abuse
~all / ?all often deliver anyway.
3️⃣ Lookalike Domains
Fake domains with valid SPF look legit.
4️⃣ DNS Poisoning (no DNSSEC)
SPF TXT records can be spoofed.
5️⃣ Macro Abuse
Macros leak info or behave unpredictably.
6️⃣ Oversized SPF
>10 lookups → PermError → sometimes treated as pass.
7️⃣ Subdomain Takeover / Abuse
Forgotten subdomains with weak policies.
8️⃣ Trusted Sender Hijack
Compromised authorized mail services = SPF pass.
💡 Takeaway
SPF alone is weak. Use DKIM + DMARC enforcement.
1️⃣ Alignment Bypass
SPF checks MAIL FROM, not the visible From - easy spoofing.
2️⃣ SoftFail Abuse
~all / ?all often deliver anyway.
3️⃣ Lookalike Domains
Fake domains with valid SPF look legit.
4️⃣ DNS Poisoning (no DNSSEC)
SPF TXT records can be spoofed.
5️⃣ Macro Abuse
Macros leak info or behave unpredictably.
6️⃣ Oversized SPF
>10 lookups → PermError → sometimes treated as pass.
7️⃣ Subdomain Takeover / Abuse
Forgotten subdomains with weak policies.
8️⃣ Trusted Sender Hijack
Compromised authorized mail services = SPF pass.
💡 Takeaway
SPF alone is weak. Use DKIM + DMARC enforcement.
🔥2👍1
🚨 110+ Splunk Queries for SOC Analysts ⚡
Collection of real-world detection queries a goldmine for SOC analysts, threat hunters, and blue teamers.
#SOC #Blue_Team #security
Collection of real-world detection queries a goldmine for SOC analysts, threat hunters, and blue teamers.
#SOC #Blue_Team #security
🔥4
☠️ EVADING EDR ☠️
The Definitive Guide to Defeating Endpoint Detection Systems.
#Offensive #Red_Team #penetration_testing
The Definitive Guide to Defeating Endpoint Detection Systems.
#Offensive #Red_Team #penetration_testing
🔥3
🧨 This github repository contains a collection of 150+ tools and resources that can be useful for red teaming activities. 🧨
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.
Get it 👉 Here
#Offensive #Red_Team #penetration_testing
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.
Get it 👉 Here
#Offensive #Red_Team #penetration_testing
👍2
🛠️ Security Operations Centre 🛠️
Exploring this SOC Analyst guide really highlights how critical structured security operations are in today’s evolving threat landscape.
#SOC #Blue_Team #Cyber_Sec
Exploring this SOC Analyst guide really highlights how critical structured security operations are in today’s evolving threat landscape.
#SOC #Blue_Team #Cyber_Sec
🔥3
🧨 JWT Hacking Toolkit: 20 Real Hacker Techniques to Master Authentication Attacks 🧨
Get it 👉 Here
#Offensive #Red_Team #penetration_testing
Get it 👉 Here
#Offensive #Red_Team #penetration_testing
🔥3
🤖 Using Artificial Intelligence (AI) in Cybersecurity: Automate Threat Modeling with STRIDE GPT 🤖
The STRIDE methodology has been the gold standard for systematic threat identification, categorizing threats into Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. However, applying STRIDE effectively requires not just understanding these categories but also having the experience to identify how they manifest in specific application architectures.
To solve this problem, we have 💥 STRIDE GPT 💥 By combining the analytical power of AI with the proven STRIDE methodology, this tool can generate comprehensive threat models, attack trees, and mitigation strategies in minutes rather than hours or days.
In this article, we’ll walk you through how to install STRIDE GPT, check out its features, and get you started using them.
👉 Let’s get rolling!
#SOC #Blue_Team #Cyber_Sec
The STRIDE methodology has been the gold standard for systematic threat identification, categorizing threats into Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. However, applying STRIDE effectively requires not just understanding these categories but also having the experience to identify how they manifest in specific application architectures.
To solve this problem, we have 💥 STRIDE GPT 💥 By combining the analytical power of AI with the proven STRIDE methodology, this tool can generate comprehensive threat models, attack trees, and mitigation strategies in minutes rather than hours or days.
In this article, we’ll walk you through how to install STRIDE GPT, check out its features, and get you started using them.
👉 Let’s get rolling!
#SOC #Blue_Team #Cyber_Sec
🔥3
Nyx (goddess of the night in Greek mythology) is a self-contained noscript for cleaning forensic traces on Linux, macOS, and Windows.
GitHub: 🔗 Here
#Offensive #Red_Team #penetration_testing
GitHub: 🔗 Here
#Offensive #Red_Team #penetration_testing
❤1🔥1
💥 NEW RECENT THREAT: React2Shell: CVE-2025-55182 💥
Learn about CVE-2025-55182 (React2Shell) and understand how the Flight protocol and deserialization work, dissect a working PoC, and exploit a vulnerable server. Furthermore, explore detection and mitigation.
Lear about: 👉 Here
#Offensive #Red_Team #penetration_testing
Learn about CVE-2025-55182 (React2Shell) and understand how the Flight protocol and deserialization work, dissect a working PoC, and exploit a vulnerable server. Furthermore, explore detection and mitigation.
Lear about: 👉 Here
#Offensive #Red_Team #penetration_testing
🔥2
⚡ Kali Linux Wireless Penetration Testing Cookbook ⚡
Identify and assess vulnerabilities present in your wireless
network, Wi-Fi, and Bluetooth enabled devices to improve your
wireless security.
#Offensive #Red_Team #penetration_testing
Identify and assess vulnerabilities present in your wireless
network, Wi-Fi, and Bluetooth enabled devices to improve your
wireless security.
#Offensive #Red_Team #penetration_testing
👍2