Hacking Articles – Telegram
Hacking Articles
12.8K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Please Follow us on Twitter
Credential DUmping
Domain Enumeration
Gained Access
Attacking Vagrant.pdf
2.8 MB
Attacking Vagrant
1
Clipboard.pdf
1.4 MB
Credential Dumping: Clipboard

🔥 Telegram: https://news.1rj.ru/str/hackinarticles
Twitter: https://x.com/hackinarticles

In this article, we learn about online password mangers and dumping the credentials from such managers via clipboard.

PowerShell Empire
🎯 Metasploit Framework
🧠 Koadic

#infosec #cybersecurity #cybersecuritytips #microsoft #redteam #informationsecurity #CyberSec #ai #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips
1
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠️ Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
3
Penetration Test vs Vulnerability Scan
1
SMB vs NFS
2
Worm vs Trojan
1
Attacking IaC.pdf
2.1 MB
Attacking IaC
1
KPIs for Cyber Security.pdf
28.2 MB
KPIs for Cyber Security
2
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡️ Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing
4
Docker CLI
1
docker mindmap
3
Docker cheat
3
Mimikatz Comprehensive ‌Book.pdf
7.4 MB
Mimikatz Comprehensive ‌Book
3
System32 Important Files.pdf
33.4 MB
System32 Important Files
1