pentest

  1. Tomcat

    Топ-10 важнейших результатов Pentest 2024: что вам нужно знать

    Один из наиболее эффективных способов для специалистов в области информационных технологий выявить слабые места компании до того, как это сделают плохие парни, - это тестирование на проникновение. Имитируя реальные кибератаки, тестирование на проникновение, иногда называемое pentests, дает...
  2. Father

    Pentest from scratch: how to prepare and choose a contractor

    While some hackers attack Russian companies outside the law, others work legally and even receive money from victims. Such "intruders" are engaged in a pentest – a penetration test. Recently, the service has become particularly popular among businesses in Russia. Read in this article: what is a...
  3. Brother

    PolarDNS: a new free DNS server for vulnerability research and pentest

    Will the tool play on the hackers side? Oryxlabs has developed a new free Python 3.x DNS server for cybersecurity and pentesting research, called PolarDNS. The server allows you to generate fully customizable DNS responses for testing various aspects of the DNS protocol, including server-side...
  4. Lord777

    How to make a hacker iPhone or iPad (Pentest on iOS)

    Content 1 How to make a hacker iPhone or iPad 1.1 iOS Jailbreak 1.2 Cydia 1.3 MobSF 1.4 Frida 1.5 Objection 1.6 Runtime Mobile Security (RMS) 1.7 Grapefruit 2 Conclusion We told you how to make a hacker smartphone using Termux and Kali Linux. That article was about Android. Today I'll show...
  5. Carding 4 Carders

    What is a pentest?

    What is a pentest? Pentest - penetration testing, analysis of network infrastructure, company servers, or applications for vulnerabilities. The purpose of this analysis is to find vulnerabilities and create possible attack vectors, simulating the actions of a real attacker. After testing, a...
  6. Carder

    Combat Linux. Overview of the most powerful distributions for pentests and OSINT.

    Building your own collection of hacker tools is great, but now it's customary to use one of the specialized distributions as a basis. This is usually Kali, but we will look at not only it, but also other distras for pentest, sometimes no less effective, and in some areas even more useful. There...
  7. Carder

    ? The Pentester BluePrint: Starting a Career as an Ethical Hacker 2020-12-29

    ? The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. W. and cybersecurity researcher Kim C. walk you through the basic and advanced topics necessary to...
  8. Carder

    Hands-On Penetration Testing with Kali NetHunter 2020-12-28

    February 28, 2019 ? Detailed description of the book https://www.amazon.com/Hands-Penetration-Testing-Kali-NetHunter/dp/1788995171 ? VT https://www.virustotal.com/gui/file/087aa6aa0baeb9eb06a70cff4f3ac28eb1ea85257ed56a249d1a708b06590c96/detection
  9. Carding

    Awesome hacking. Exploiting.

    Сегодня перед тобой будет представлен большой список инструментов. Инструменты которые будут представлены в подборке, активно используются на практике при проведении пентестов: Exploiting: • AttackSurfaceAnalyzer (https://github.com/microsoft/AttackSurfaceAnalyzer) • Bashfuscator...
  10. Carding

    Awesome hacking. Fuzzing, MITM.

    Fuzzing: • AFL++ (https://github.com/vanhauser-thc/AFLplusplus) • AndroFuzz (https://github.com/jonmetz/AndroFuzz) • Boofuz (https://github.com/jtpereyda/boofuzz) • Construct (http://construct.readthedocs.org/) • Deepstate (https://github.com/trailofbits/deepstate) • Driller...
  11. Carding

    Awesome hacking. Info Gathering. Port Scanning. Password Cracking. Wireless.

    Info Gathering: • ATSCAN (https://github.com/AlisamTechnology/ATSCAN) • Bluto (https://github.com/darryllane/Bluto) • Bundler-audit (https://github.com/rubysec/bundler-audit) • Cloudflare_enum (https://github.com/mandatoryprogrammer/cloudflare_enum) • Commando-vm...
  12. Carding

    Awesome hacking. Post Exploitation.

    Post Exploitation: • 3snake (https://github.com/blendin/3snake) • Apfell (https://github.com/its-a-feature/Apfell) • Backdoorme (https://github.com/Kkevsterrr/backdoorme) • CatTails (https://github.com/oneNutW0nder/CatTails) • Cloudy-kraken...
Top