When facing API endpoints, older tools for directory busting tend to be very ineffective. The days where a webserver is just a directory tree are behind us. The more modern ‘routes’ have taken over and wildly bruteforcing filenames isn’t effective anymore. We need to be smarter and scan based on...
Jun 21, 2023
Foreign affairs ministries in the Americas have been targeted by a Chinese state-sponsored actor named Flea as part of a recent campaign that spanned from late 2022 to early 2023.
The cyber attacks, per Broadcom's Symantec, involved a new backdoor codenamed Graphican. Some of...
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Greetings, esteemed forum members!
Today, let's delve into the vast array of potential targets that hackers may pursue in their quest to exploit vulnerabilities. By recognizing the scope of vulnerability, we can heighten our awareness and take proactive steps to protect ourselves and our...
If you follow this roadmap, I fucking guarantee it'll turn you into a goddamn hacking genius.
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:https://mega.nz/folder/R3xmlJoL#sAsqy9CWvJ9JvyB2Hy01sg
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
To become a real hacker, you need to reach the level where you can learn a programming language in a few days, you can combine the information in the documentation with the knowledge you already have, and you can quickly learn a programming language. This means you need to learn several skills...
Link: https://mega.nz/file/IUkURLLJ#njI8JCT09EMijm7YOH3RxPJyM7yff8WBBI-9Ia2zXYU
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
To become a real hacker, you need to reach the level where you can learn a programming language in a few days, you can combine the information in the documentation with the knowledge you already have, and you can quickly learn a programming language. This means you need to learn several skills...
Start with “site:<domain>”. Then, exclude boring pages with “-www” or other terms until you get to the juicy stuff:
site:tesla.com -www -shop -share -ir -mfa
Pastebin Leaks.
Check out sites like pastebin, jsfiddle, and codebeautify for code left over from developers:
site:pastebin.com...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Getting started
So, The patience has gone, many of you probably seeking to have something like this or something like that, let me put it straight, this is not this or that, it’s actually everything that you ever wonder to know to get started, Become a hacker my OneHacker I’m sure you will...
Toolset - Session Highjacking - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - DOS - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - Social Engieering - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - Sniffing - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - Malware Threats - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - System hacking - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - Vulnerable - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - Enumeration - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - Scanning Network - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
https://mega.nz/folder/Su43Vb4A#E79BXexhOD1YjzOqw0HQCg
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Purple Hat Hacker is a Hacker who tests himself/herself on their own PCs. They can buy a PC or they can use an old PC to hack thier another PC to see that how they are good at cyber security and hacking. This is really a very good cyber security practice for anyone.
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Getting started
So, The patience has gone, many of you probably seeking to have something like this or something like that, let me put it straight, this is not this or that, it’s actually everything that you ever wonder to know to get started, Become a hacker my OneHacker I’m sure you will...
A hacker is someone who uses their technical skills to gain unauthorized access to computer systems or networks. However, the term "hacker" is often used to refer to different groups of people, and it can have different meanings depending on the context.
In the media, the term "hacker" is often...
One of the best platforms for hacker learning is tryhackme, that's where I started my first pentest tests on websites.
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
This simple text file contains thousands of resources and tools for hacking, OSINT and threat intelligence. It has forums and links to other lists as well.
Compiled by @hackermaderas on twitter. USE WISELY!!
IT IS AN ARSENAL, ARMORY AND A LIBRARY for hacking ANYTHING and EVERYTHING YOU CAN...
https://mega.nz/folder/BzwF0bjB#B1jGfyh8U7xImtHW2uYnbg
course
If anyone is interested, they can access this course on ethical hacking by clicking the link above.
[/REPLY]