Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Comprehensive Guide on Autopsy Tool (Windows)

Twitter: https://lnkd.in/e7yRpDpY

Autopsy is an open-source tool that is used to perform forensic operations on the disk image of the evidence. The forensic investigation that is carried out on the disk image is displayed here.

File Type
MIME-type
Deleted Files
MB File size
Results
Extracted Content
Keyword Hits
Timeline
Discovery
Images/Videos
Add File Tags
Generate Reports
1
20 Chrome Extensions
3
Linuxverse
GitGuardian 2025 Report

Twitter: Link

🔐 23.8M new secrets leaked (+25% YoY)
🔄 58% generic secrets (passwords, DB strings)
🏢 35% private repos leak (8x public repos)
🐳 100K+ valid keys in Docker images
🤖 40% more leaks with Copilot
🚨 70% of 2022 leaks still active
🔥 CISSP Training Program (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join Ignite Technologies CISSP live sessions with core practicals at Lowest Price.
BOOK YOUR Seat NOW ………….

🔐 Security and Risk Management
📦 Asset Security
🏗️ Security Architecture and Engineering
🌐 Communication and Network Security
🧑‍💻 Identity and Access Management (IAM)
🧪 Security Assessment and Testing
⚙️ Security Operations
💻 Software Development Security
1
A Detailed Guide on Medusa

Twitter: https://lnkd.in/e7yRpDpY

Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, parallel and modular, login brute force.

🔶 Features of Medusa
🔶Password Cracking for specific Username
🔶Username Cracking for specific Password
🔶To crack login credentials
🔶Brute Force on Multiple Host
🔶To attack a specific port rather than the default
🔶Additional password checks (Null/Same)
🔶To Save Logs in a File
🔶Stop on Success.
🔶To suppress start-up Banner
🔶Verbose Mode
🔶Error Debug level
🔶Using Combo Entries
🔶Concurrent testing on multiple logins
🔶Display Module Usage Information
👍1
Wordlists for Pentester

 Twitter: https://lnkd.in/e7yRpDpY

A Pentester is as good as their tools and when it comes to cracking the password, stressing authentication panels or even a simple directory Bruteforce it all drills down to the wordlists that you use. Today we are going to understand word lists.

🔳 CeWL
🔳Crunch
🔳Cupp
🔳Pydictor
🔳Bopscrk
🔳BEWCor
🔳Dymerge
🔳Mentalist
Docker Components
3
20 Chatgpt propmt for Cyber Security
Benefits of Penetration Testing