I Hacked
@NASA
(again) and reported some vulnerabilities to them. Just today, I received this appreciation letter from them after they patched the loopholes!
Hey, hackers! 👋🏻
I hope this note is bookmarked on your belt!
It contains awesome pdfs including:
- Red team Operations
- Reverse engineering content
- Red Team x Blue team
- Practical social engineering
- Windows Privilege escalation
- AD, & Road to OSCP
- JR to
100 Days of Hacking! Day 75
#Special
⬇
~# How to Crack an Entry Level Job in Cybersecurity🔒
1️⃣ Learn Computer Network Fundamentals:
A strong understanding of networking basics is crucial for any cybersecurity professional.
2️⃣ Basic Web Development (optional):
While not
I'm getting messages from folks seeking favors for learning exploit development. I'm posting this thread for those who wanna explore the art of binary exploitation.
NB: There's no specific path, practice makes perfect 💯
#infosec
#exploitdevelopment
#ReverseEngineering
🧵🧵
XSS to Exfiltrate Data from PDFs 🚨‼️
<script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};(‘GET’,’file:///etc/hosts’);x.send();</script><script>x=new
Hey, Hackers 👋
Here's the 𝐀𝐰𝐞𝐬𝐨𝐦𝐞 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐨𝐥𝐥𝐞𝐜𝐭𝐢𝐨𝐧𝐬 you must bookmark!! 🧵⬇️⬇️
Thanks to:
@C0d3Cr4zy
- Red Team
- PenTest
- Blue Team
- SOC
- Malware Analysis
- Cloud Security and Others
1. Awesome Red Team Ops:
100 Days of Hacking! Day 86
#Special
⬇
~# Windows Exploitation 🥷🖥️
(Free Labs for beginners -
@RealTryHackMe
)
Windows Fundamentals 1
Windows Fundamentals 2
Windows Fundamentals 3
Windows PrivEsc
SubCerts 📍
This tool allows Hackers and Developers to identify subdomains of a target domain by leveraging publicly available certificates.
Author :
@0xJin
(Thanks bro)
Source:
Here are 24 websites to learn Linux for free:
Credit:
@danielmakelley
Thread 🧵 ↓
#infosec
#Linux
1. Tecmint
2. Linuxize
3. nixCraft
4. It's FOSS
5. Linux Hint
6. FOSS Linux
7. LinuxOPsys
8. Linux Journey
9. Linux Command
10. Linux Academy
SubOwner 📍
This tool is designed to check for subdomain takeovers by resolving the CNAME records and verifying them against known vulnerable services.
Author:
@nav1n0x
Source:
You can analyze the ELF layout (such as sections, segments, symbols, and relocations) and navigate through them to get an in-depth understanding of the binary.
Author: Orhun
Source:
100 Days of Hacking!
Day 31
#SpeciaL
⬇
~# Red-Team Resources 📢
1. Red-Team-Resources-collection
-
2. Getting started with the Red Team Guides
- (
@Hadess_security
)
3. Awesome Red Teaming
- (No Longer
100 Days of Hacking! Day 40
#Special
⬇
~# Exploit Development 🔥📢
- Learn Assembly Language
- Lectures on Operating Systems
- PWN college is organized as a set of modules covering different topics. Each module has a set of