white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Maltego Handbook for Social Media Investigations.pdf
3.7 MB
HANDBOOK FOR SOCIAL MEDIA INVESTIGATIONS by Maltego
👍4🤔1
The Hitchhiker’s Guideto Online Anonymity, Version 1.1.5, June 2022 by Anonymous Planet

GitHub
Russian version of The Hitchhiker’s Guide to Online Anonymity

#book #privacy
👍4
The Hitchhiker’s Guide to Online Anonymity.pdf
11.1 MB
The Hitchhiker’s Guideto Online Anonymity, Version 1.1.5, June 2022 by Anonymous Planet
👍6
Perform a web penetration test by by Moïse Mopepe, Thibaut Bonnetain, 2023

Through real-world scenarios and hands-on exercises, you'll acquire the skills necessary to protect your applications from prevalent risks like SQL injection, cross-site noscripting, and insecure server configurations. Stay one step ahead in the ever-evolving cyber landscape and emerge as the guardian of robust and resilient web systems.

Whether you're a beginner or an experienced professional, this book is your ultimate companion on the journey to becoming a web security virtuoso. Equip yourself with the knowledge and expertise to thwart cyber threats and ensure the integrity of your applications.

#book #web
👍4🔥1
Perform.a.web.penetration.test.epub
7.8 MB
Perform a web penetration test by by Moïse Mopepe, Thibaut Bonnetain, 2023
8
Сборник мини гайдов, шпаргалок, читшитов, темплейтов к различный тулам

Источник

#pentest #useful
👍4🔥1
SQLMAP For Dummies v2 by The AnonMatrix, 2012

This tutorial is made for explaining the usage of SQLMAP for beginners. I do know there is something called documentation (you know that -h option?), but honestly: How much wouldn't you pay to have a nice tutorial explaining how the different options relate to one another for every program there is? People will argue that skids read this to do fucked up things on the Internet and help on their epeen-ego, i am just going to state that if skids manage to run sqlmap in a cmd (windows) or terminal (linux) they should be capable of learning this no matter what, which it why i am not explaining how to run Backtrack or any other linux distro, and tell them what to write in the CMD/Terminal

#web #docs
🤔2👍1
SQLMAP For Dummies v2 By TheAnonMatrix.pdf
2.9 MB
SQLMAP For Dummies v2 by TheAnonMatrix, 2012
👍5🔥1
Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking, Ric Messier, 2018

Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You'll discover different techniques for extending Kali tools and creating your own toolset.

(+) Learn tools for stress testing network stacks and applications
(+) Perform network reconnaissance to determine what's available to attackers
(+) Execute penetration tests using automated exploit tools such as Metasploit
(+) Use cracking tools to see if passwords meet complexity requirements
(+) Test wireless capabilities by injecting frames and cracking passwords
(+) Assess web application vulnerabilities with automated or proxy-based tools
(+) Create advanced attack techniques by extending Kali tools or developing your own

Русский вольный перевод

#book #web #kali
👍3
learningkalilinux.pdf
22.6 MB
Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking, Ric Messier, 2018
👍5
The Hacker Playbook 3: Practical Guide To Penetration Testing, Peter Kim, 2018

THP3 will take your offensive hacking skills, thought processes, and attack paths to the next level. This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement--all without getting caught! This heavily lab-based book will include multiple Virtual Machines, testing environments, and custom THP tools.

#book #pentest
🔥4👍1
The-Hacker-Playbook-3-by-Peter-kim.pdf
4.3 MB
The Hacker Playbook 3: Practical Guide To Penetration Testing, Peter Kim, 2018
👍5
w3af: Web Application attack and Audit Framework Documentation, Hong M Lei, 2021

This BOOK is the user's guide for the Web Application Attack and Audit Framework (w3af), its goal is to provide a basic overview of what the framework is, how it works and what you can do with it.

w3af is a complete environment for auditing and exploiting Web applications. This environment provides a solid platform for web vulnerability assessments and penetration tests.

Extra:
Official doc

#book #web
👍6