hackspace
@hackspace
158
subscribers
279
photos
75
videos
23
files
998
links
hackspace
Download Telegram
Join
hackspace
158 subscribers
hackspace
https://github.com/splunk/attack_range?s=35
GitHub
GitHub - splunk/attack_range: A tool that allows you to create vulnerable instrumented local or cloud environments to simulate…
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk - GitHub - splunk/attack_range: A tool that allows...
hackspace
https://github.com/ayadim/Nuclei-bug-hunter?s=35
GitHub
GitHub - ayadim/Nuclei-bug-hunter: i will upload more templates here to share with the comunity.
i will upload more templates here to share with the comunity. - ayadim/Nuclei-bug-hunter
hackspace
https://breakdev.org/evilginx-3-3-go-phish/?s=35
BREAKDEV
Evilginx 3.3 - Go & Phish
Evilginx 3.3 update is here and it comes packing with the special feature everyone has been waiting for.
hackspace
hackspace
https://github.com/DanMcInerney/fast-recon?s=35
GitHub
GitHub - DanMcInerney/fast-recon: Does some google dorks against a domain
Does some google dorks against a domain. Contribute to DanMcInerney/fast-recon development by creating an account on GitHub.
hackspace
https://www.youtube.com/watch?v=wUE8DI61s60
YouTube
The best antenna for HackRF Portapack (and Flipper Zero, Meshtastic, Quansheng, RTLSDR, etc.)
There is an essential gadget that you will want to get, to get the best antenna performance. But first we need to cover a bit of antenna theory, before we can answer the question of what antenna that is the best one for your HackRF Portapack, or Flipper Zero…
hackspace
0:52
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
https://aem1k.com/aurebesh.js/?s=35
Aem1K
aurebesh.js
Translate JavaScript to other writing systems.
hackspace
https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm?s=35
Google Cloud Blog
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm | Google Cloud Blog
APT44 is a threat actor that is actively engaged in the full spectrum of espionage, attack, and influence operations.
hackspace
https://securitytrails.com/blog/google-hacking-techniques
hackspace
🔥
2
hackspace
https://github.com/haizelabs/llama3-jailbreak?s=35
GitHub
GitHub - haizelabs/llama3-jailbreak: A trivial programmatic Llama 3 jailbreak. Sorry Zuck!
A trivial programmatic Llama 3 jailbreak. Sorry Zuck! - haizelabs/llama3-jailbreak
hackspace
https://github.com/dafthack/GraphRunner?s=35
GitHub
GitHub - dafthack/GraphRunner: A Post-exploitation Toolset for Interacting with the Microsoft Graph API
A Post-exploitation Toolset for Interacting with the Microsoft Graph API - dafthack/GraphRunner
hackspace
https://github.com/login-securite/lsassy?s=35
GitHub
GitHub - login-securite/lsassy: Extract credentials from lsass remotely
Extract credentials from lsass remotely. Contribute to login-securite/lsassy development by creating an account on GitHub.
hackspace
hackspace
https://redteamrecipe.com/aslr-exploitation-techniques?s=35
RedTeamRecipe
ASLR Exploitation Techniques
Address Space Layout Randomization (ASLR) is a security technique used in operating systems to protect against certain types of cyber attacks, particularly buffer overflow attacks. Here’s an overview of ASLR:
What is ASLR? ASLR is a feature implement...
hackspace
https://github.com/0xKayala/NucleiScanner?s=35
GitHub
GitHub - 0xKayala/NucleiScanner: NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications
NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications - 0xKayala/NucleiScanner
hackspace
https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9?s=35
Medium
ADCS ESC14 Abuse Technique
The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate mappings. An…
hackspace
https://learnk8s.io/graceful-shutdown?s=35
Learnk8s
Graceful shutdown in Kubernetes
In this article, you will learn how to prevent broken connections when a Pod starts up or shuts down. You will also learn how to shut down long-running tasks gracefully.
hackspace
hackspace
https://github.com/Sh3lldon/FullBypass?s=35
GitHub
GitHub - Sh3lldon/FullBypass: A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language…
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. - Sh3lldon/FullBypass
TWeb.init({scrollToPost:'hackspace/1189'});