Under Utilized Tools/Resources #1

Many resources, especially web apps/sites used for OSINT come and go as I've mentioned before. However there is one resource I discovered a few years ago and still exists. It is a unique resource but still useful. It's useful for OSINT or just to monitor trends in blackhat circles, but rarely will you find something … Continue reading Under Utilized Tools/Resources #1

Best Tool for Pentesting Android Applications

This is just a love post for Drozer It is metasploit console-ish CLI framework to hack Android Applications. Attach this with Qark, Frida and Burp Suite and you're well on your way to having a good toolset to attack Android Apps. I'll make an upcoming post with a more complete list of tools I use … Continue reading Best Tool for Pentesting Android Applications

Best Android Apps for Pentesting and Hacking

There are many apps that run on Android so I'll probably make a few of these posts. That said, the first and best resource isn't actually one app but an overlay to the Android OS. This is Kali NetHunter. I suggest buying a play edition phone (bootloader unlocked and open to be rooted) then you … Continue reading Best Android Apps for Pentesting and Hacking

Daily Read #4

Part 4 ALREADY! BOOKMARK THESE LINKS! And don't forget to check out the other entries and bookmark those too : ] BlackRoomSec  Noise  ToolsWatch HackingVision Hashes.Org  Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Daily Read #3

Part 3! Don't forget to check the other entries and bookmark those resources too!! Darknet.Org.UK  HackerSploit  FireBounty  Hacking Articles  SC Magazine  Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Daily Read #2

Part 2 of the daily reads! Don't forget to check the other parts and bookmark those links as well! The Hacker News TheHackToday Cyber Forensics Blog  InfoSec Writers  Schneier on Security Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Daily Read #1

This post is going to kick off an extensive and constantly updated list of links to all kinds of resources that I check every single day. I'll post five resources per post, in no particular order, but I suggest checking every single one every day!   HackRead DarkReading CyberCrime & Doing Time Security List Network … Continue reading Daily Read #1

Technique, Tool and Lecture #8

Technique: One line dash loop for running CLI tools on Kali for IP in $(cat ~/Desktop/target); do nikto -host $IP >> ~/Desktop/nitko-output; done; Tool: Nikto Lecture: Drinking from the caffeine firehose we know as shodan   https://www.youtube.com/watch?v=5cWck_xcH64   Check out all the entries of this series! Technique Tool and Lecture #14 Technique Tool and Lecture … Continue reading Technique, Tool and Lecture #8

So you want to be a penetration tester, security consultant, ethical hacker, red teamer or any other offensive cyber security professional? #3

It's Story time 🙂 For a few summers before I got into the industry I worked at a retail store. On my first day they locked me in the managers office (who was away on vacation) to do some online training. One of the big trainings was about cyber security. This was the funniest thing … Continue reading So you want to be a penetration tester, security consultant, ethical hacker, red teamer or any other offensive cyber security professional? #3

So you want to be a penetration tester, security consultant, ethical hacker, red teamer or any other offensive cyber security professional? #1

This one is going to be quick, that is because I'm just linking my lecture where I go over where higher education and academia as a whole should move towards as well as provide a general overview of what it means to work professionally within offensive cyber security. Consider this my kick-off post for further … Continue reading So you want to be a penetration tester, security consultant, ethical hacker, red teamer or any other offensive cyber security professional? #1