Top 10 books for any hacker, penetration tester, bug bountier or more!
Category: Hacker Books
Who are you?!
Security Researcher Security Researcher... I have to say, since the rise of Bug Bounties, The self-proclaimed title of Security Researcher has gotten less and less popular Here is something I realized years ago... A little background, at this time, I had used some tools, I had used BackTrack and then Kali, I have monitored trends … Continue reading Who are you?!
Top Movies/TV Shows/Books For Hackers #8
8th Entry of Movies, TV Shows and Books for/about hackers for your entertainment!
Top Movies/TV Shows/Books For Hackers #7
Seventh entry of Top Movies/TV Shows/Books For Hackers, Penetration testers and red teamers for entertainment!
Under Utilized Tools/Resources #1
Many resources, especially web apps/sites used for OSINT come and go as I've mentioned before. However there is one resource I discovered a few years ago and still exists. It is a unique resource but still useful. It's useful for OSINT or just to monitor trends in blackhat circles, but rarely will you find something … Continue reading Under Utilized Tools/Resources #1
Daily Read #4
Part 4 ALREADY! BOOKMARK THESE LINKS! And don't forget to check out the other entries and bookmark those too : ] BlackRoomSec Noise ToolsWatch HackingVision Hashes.Org Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION
Daily Read #3
Part 3! Don't forget to check the other entries and bookmark those resources too!! Darknet.Org.UK HackerSploit FireBounty Hacking Articles SC Magazine Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION
Daily Read #2
Part 2 of the daily reads! Don't forget to check the other parts and bookmark those links as well! The Hacker News TheHackToday Cyber Forensics Blog InfoSec Writers Schneier on Security Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION
Who are you?!
Security Researcher Security Researcher... I have to say, since the rise of Bug Bounties, The self-proclaimed title of Security Researcher has gotten less and less popular Here is something I realized years ago... A little background, at this time, I had used some tools, I had used BackTrack and then Kali, I have monitored trends … Continue reading Who are you?!
Technique, Tool and Lecture #8
Technique: One line dash loop for running CLI tools on Kali for IP in $(cat ~/Desktop/target); do nikto -host $IP >> ~/Desktop/nitko-output; done; Tool: Nikto Lecture: Drinking from the caffeine firehose we know as shodan https://www.youtube.com/watch?v=5cWck_xcH64 Check out all the entries of this series! Technique Tool and Lecture #14 Technique Tool and Lecture … Continue reading Technique, Tool and Lecture #8