Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
GitGuardian 2025 Report

Twitter: Link

🔐 23.8M new secrets leaked (+25% YoY)
🔄 58% generic secrets (passwords, DB strings)
🏢 35% private repos leak (8x public repos)
🐳 100K+ valid keys in Docker images
🤖 40% more leaks with Copilot
🚨 70% of 2022 leaks still active
🔥 CISSP Training Program (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join Ignite Technologies CISSP live sessions with core practicals at Lowest Price.
BOOK YOUR Seat NOW ………….

🔐 Security and Risk Management
📦 Asset Security
🏗️ Security Architecture and Engineering
🌐 Communication and Network Security
🧑‍💻 Identity and Access Management (IAM)
🧪 Security Assessment and Testing
⚙️ Security Operations
💻 Software Development Security
1
A Detailed Guide on Medusa

Twitter: https://lnkd.in/e7yRpDpY

Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, parallel and modular, login brute force.

🔶 Features of Medusa
🔶Password Cracking for specific Username
🔶Username Cracking for specific Password
🔶To crack login credentials
🔶Brute Force on Multiple Host
🔶To attack a specific port rather than the default
🔶Additional password checks (Null/Same)
🔶To Save Logs in a File
🔶Stop on Success.
🔶To suppress start-up Banner
🔶Verbose Mode
🔶Error Debug level
🔶Using Combo Entries
🔶Concurrent testing on multiple logins
🔶Display Module Usage Information
👍1
Wordlists for Pentester

 Twitter: https://lnkd.in/e7yRpDpY

A Pentester is as good as their tools and when it comes to cracking the password, stressing authentication panels or even a simple directory Bruteforce it all drills down to the wordlists that you use. Today we are going to understand word lists.

🔳 CeWL
🔳Crunch
🔳Cupp
🔳Pydictor
🔳Bopscrk
🔳BEWCor
🔳Dymerge
🔳Mentalist
Docker Components
3
20 Chatgpt propmt for Cyber Security
Benefits of Penetration Testing
🚀 Join Ignite Technologies' Red Team Operation Course Online! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Enroll now in our exclusive "Red Teaming" Training Program and explore the following modules:

Introduction to Red Team
📩 Initial Access & Delivery
⚙️ Weaponization
🌐 Command and Control (C2)
🔼 Escalate Privileges
🔐 Credential Dumping
🖧 Active Directory Exploitation
🔀 Lateral Movement
🔄 Persistence
📤 Data Exfiltration
🛡️ Defense Evasion
📝 Reporting

Join us for a comprehensive learning experience! 🔒💻🔍
Active Directory Certificate Attack

🔗🔗https://github.com/Ignitetechnologies/ADCS-Attack
👍2
👍4
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡 Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing
Cyber Security Certifications
👍2
OSINT Browser Extensions