Linux Bash Shell Cheat Sheet
It works with about every distribution, except for apt-get which is Ubuntu/Debian exclusive
#book
It works with about every distribution, except for apt-get which is Ubuntu/Debian exclusive
#book
👍6
Burp Suite Plugin Development Guide by Joas Antonio Dos Santos
Learn Burp Suite Plugin Development from Scratch. This is a short guide with 8 chapters starting with Hello-World Burp Suite plugin to Creating a plugin with Tabbed UI. This book contains chapters which in detail discusses about What Are Extender APIs, how those Extender APIs can be leveraged to create functionality of your choice.
Official page
The book
#web
Learn Burp Suite Plugin Development from Scratch. This is a short guide with 8 chapters starting with Hello-World Burp Suite plugin to Creating a plugin with Tabbed UI. This book contains chapters which in detail discusses about What Are Extender APIs, how those Extender APIs can be leveraged to create functionality of your choice.
Official page
The book
#web
👍5
Burp Suite Plugin Development.pdf
1.3 MB
Burp Suite Plugin Development Guide by Joas Antonio Dos Santos
🔥4👍1
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks by Ettore Galluccio, Edoardo Caselli, Gabriele Lombari, 2020
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacks.
You'll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks.
#book #web
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacks.
You'll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks.
#book #web
🔥7👍2❤1
SQL Injection Strategies.pdf
15.7 MB
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks by Ettore Galluccio, Edoardo Caselli, Gabriele Lombari, 2020
👍7
PhoneSploit Pro - PhoneSploit with Metasploit Integration
An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.
GitHub
#pentest #hacktools #metasploit #mobile
An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.
GitHub
#pentest #hacktools #metasploit #mobile
👍7
OWASP ZAP: Website Hacking & Penetration Testing Course by Sagar Raghuwan, Udemy, 2022
Ripped by Hide01 (Iran)
Learn all about web application penetration testing and website hacking
This course covers web application attacks and how to earn bug bounties. There is no prerequisite of prior hacking knowledge and you will be able to perform web attacks and hunt bugs on live websites and secure them.
This course is not like other hacking or penetration testing course with outdated vulnerabilities and only lab attacks. This contains maximum live websites to make you comfortable with the Live Hunting Environment. This course will start from basic principles of each vulnerability and How to attack them using multiple bypass techniques, In addition to exploitation, you will also learn how to fix them.
This course is completely focused over pen testing web applications with ZAP.
Password: @redbluehit
Official page
#education
Ripped by Hide01 (Iran)
Learn all about web application penetration testing and website hacking
This course covers web application attacks and how to earn bug bounties. There is no prerequisite of prior hacking knowledge and you will be able to perform web attacks and hunt bugs on live websites and secure them.
This course is not like other hacking or penetration testing course with outdated vulnerabilities and only lab attacks. This contains maximum live websites to make you comfortable with the Live Hunting Environment. This course will start from basic principles of each vulnerability and How to attack them using multiple bypass techniques, In addition to exploitation, you will also learn how to fix them.
This course is completely focused over pen testing web applications with ZAP.
Password: @redbluehit
Official page
#education
👍4
OWASP_ZAP_Website_Hacking_&_Penetration_Testing_Course_@RedBlueHit.zip
561 MB
OWASP ZAP: Website Hacking & Penetration Testing Course by Sagar Raghuwan, Udemy, 2022
👏4👍3🔥1
Forwarded from CyberSecBastion
👍5😱1
Forwarded from CyberSecBastion
Cloud Security Practical Guide .pdf
21.5 MB
Practical Guide to AWS Cloud Security by SANS, 2023
🔥4👍2
Forwarded from CyberSecBastion
Hacking and securiting Docker containers by Srinivasarao Kotipalli, Raksha Kannusami, Abhijeth Dugginapeddi, The Offensive Lab, 2023
#book #AttackDefense
#book #AttackDefense
👍4🔥4
Forwarded from CyberSecBastion
Hacking and securiting Docker containers.pdf
59.1 MB
Hacking and securiting Docker containers by Srinivasarao Kotipalli, Raksha Kannusami, Abhijeth Dugginapeddi, The Offensive Lab, 2023
🔥8
Forwarded from CyberSecBastion
👍6
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer by Jean-Philippe Aumasson, 2023
Cryptography from A5/0 to ZRTP
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for fellow experts and novices to the field alike, Crypto Dictionary is rigorous in its definitions, yet easy to read and laced with humor.
#english #book #crypto
Cryptography from A5/0 to ZRTP
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for fellow experts and novices to the field alike, Crypto Dictionary is rigorous in its definitions, yet easy to read and laced with humor.
#english #book #crypto
👍11