Top 10 books for any hacker, penetration tester, bug bountier or more!
Many resources, especially web apps/sites used for OSINT come and go as I've mentioned before. However there is one resource I discovered a few years ago and still exists. It is a unique resource but still useful. It's useful for OSINT or just to monitor trends in blackhat circles, but rarely will you find something … Continue reading Under Utilized Tools/Resources #1
There are many apps that run on Android so I'll probably make a few of these posts. That said, the first and best resource isn't actually one app but an overlay to the Android OS. This is Kali NetHunter. I suggest buying a play edition phone (bootloader unlocked and open to be rooted) then you … Continue reading Best Android Apps for Pentesting and Hacking
Part 4 ALREADY! BOOKMARK THESE LINKS! And don't forget to check out the other entries and bookmark those too : ] BlackRoomSec Noise ToolsWatch HackingVision Hashes.Org Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION
Part 3! Don't forget to check the other entries and bookmark those resources too!! Darknet.Org.UK HackerSploit FireBounty Hacking Articles SC Magazine Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION
Part 2 of the daily reads! Don't forget to check the other parts and bookmark those links as well! The Hacker News TheHackToday Cyber Forensics Blog InfoSec Writers Schneier on Security Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION
Technique: One line dash loop for running CLI tools on Kali for IP in $(cat ~/Desktop/target); do nikto -host $IP >> ~/Desktop/nitko-output; done; Tool: Nikto Lecture: Drinking from the caffeine firehose we know as shodan https://www.youtube.com/watch?v=5cWck_xcH64 Check out all the entries of this series! Technique Tool and Lecture #14 Technique Tool and Lecture … Continue reading Technique, Tool and Lecture #8
Let me first say that most of these terms are used interchangeability by the majority of outlets (especially media) incorrectly Please note this is VERY incomplete and I will continue to update this as time goes by Types of "Hacker" -- Whitehat Grayhat Blackhat -- Ethical Hacker: Type: Whitehat or Grayhat Someone who actively monitors … Continue reading Difference between Ethical Hacker, Boug Bounty(ier), Penetration Tester, Security Consultant and Security Researcher