Under Utilized Tools/Resources #1

Many resources, especially web apps/sites used for OSINT come and go as I've mentioned before. However there is one resource I discovered a few years ago and still exists. It is a unique resource but still useful. It's useful for OSINT or just to monitor trends in blackhat circles, but rarely will you find something … Continue reading Under Utilized Tools/Resources #1

Best Android Apps for Pentesting and Hacking

There are many apps that run on Android so I'll probably make a few of these posts. That said, the first and best resource isn't actually one app but an overlay to the Android OS. This is Kali NetHunter. I suggest buying a play edition phone (bootloader unlocked and open to be rooted) then you … Continue reading Best Android Apps for Pentesting and Hacking

Daily Read #4

Part 4 ALREADY! BOOKMARK THESE LINKS! And don't forget to check out the other entries and bookmark those too : ] BlackRoomSec  Noise  ToolsWatch HackingVision Hashes.Org  Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Daily Read #3

Part 3! Don't forget to check the other entries and bookmark those resources too!! Darknet.Org.UK  HackerSploit  FireBounty  Hacking Articles  SC Magazine  Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Daily Read #2

Part 2 of the daily reads! Don't forget to check the other parts and bookmark those links as well! The Hacker News TheHackToday Cyber Forensics Blog  InfoSec Writers  Schneier on Security Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Technique, Tool and Lecture #8

Technique: One line dash loop for running CLI tools on Kali for IP in $(cat ~/Desktop/target); do nikto -host $IP >> ~/Desktop/nitko-output; done; Tool: Nikto Lecture: Drinking from the caffeine firehose we know as shodan   https://www.youtube.com/watch?v=5cWck_xcH64   Check out all the entries of this series! Technique Tool and Lecture #14 Technique Tool and Lecture … Continue reading Technique, Tool and Lecture #8

Difference between Ethical Hacker, Boug Bounty(ier), Penetration Tester, Security Consultant and Security Researcher

Let me first say that most of these terms are used interchangeability by the majority of outlets (especially media) incorrectly Please note this is VERY incomplete and I will continue to update this as time goes by Types of "Hacker" -- Whitehat Grayhat Blackhat -- Ethical Hacker: Type: Whitehat or Grayhat Someone who actively monitors … Continue reading Difference between Ethical Hacker, Boug Bounty(ier), Penetration Tester, Security Consultant and Security Researcher

Top 10 Books for Penetration Testers and Hackers

There are so many books that are amazing, useful and/or interesting when it comes to offensive security! That said, I've put some of my favorites into a list. These are not in any particular order but I'd suggest reading the Security+ Book first and going from there. Number 11 is a bonus since it doesn't … Continue reading Top 10 Books for Penetration Testers and Hackers