Computer security

Collection by Jaan T • Last updated 2 weeks ago

671 
Pins
 • 
55 
Followers
Jaan T

The Hacker’s Briefcase (Hacker Magazine Book 1)

Amazon.com: The Hacker’s Briefcase (Hacker Magazine Book 1) eBook: Zhukov, Anton, Ilyin, Stepan: Kindle Store

PeekABoo - Tool To Enable Remote Desktop On The Targeted Machine

PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses...

Nmap 6 Cookbook: The Fat Free Guide to Network Security Scanning

Nmap 6 Cookbook: The Fat Free Guide to Network Security Scanning: 9781507781388: Computer Science Books @ Amazon.com

Windows PowerShell Commands Cheat Sheet - Commands + PDF

We explain what PowerShell is and give you the critical commands in the downloadable PowerShell Cheat Sheet (PDF) - that you just can't live without.

ShodanHat - Search For Hosts Info With Shodan

Search For Hosts Info With Shodan. Dependencies You need to install shodan with pip install shodan or easy_install shodan. You need t...

ipv4Bypass - Using IPv6 To Bypass Security

Using IPv6 to Bypass Security Dependences (tested on Kali Linux) python2.7 nmap python-nmap ( https://pypi.org/project/python-nmap/...

Legitimate And Helpful Advice For Your Web Marketing

How To Configure Honeypot using PentBox in Kali Linux

How To Configure Honeypot using PentBox in Kali Linux,Setup honeypot in Kali Linux,Setup Honeypot in Kali Linux with Pentbox, How to set up a HoneyPot in Kali Linux,How to Install Honeypot on Kali Linux,How To Configure Honeypot Kali Linux:- Well with the help of honeypot, you can easily monitor your own OS and can track every activity of the hacker or you can say that, its the best way to hack the hacker. Every big company is already using smart…

Weeman + Ngrok: Hackear Facebook con Phishing | EsGeeks

Weeman y Ngrok son las mejores herramienta para realizar ataques de phishing actualmente. Crea tu propio servidor de phishing para hackear cuentas de Facebook u otra red social. ✅

Dr0p1t Framework 1.3 - A Framework That Creates An Advanced FUD Dropper With Some Tricks

Have you ever heard about trojan droppers ? In short dropper is type of trojans that downloads other malwares and Dr0p1t gives you the chanc...

Meterpreter Paranoid Mode - Meterpreter over SSL/TLS connections

Meterpreter_Paranoid_Mode.sh allows users to secure your staged/stageless connection for Meterpreter by having it check the certificate...

Shellphish - Phishing Tool For 18 Social Media (Instagram, Facebook, Snapchat, Github, Twitter...)

Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpr...

GitBackdorizer - Is A Proof Of Concept That Uses The Lack Of User Attention To Steal Git Access Credentials

GitBackdorizer is a proof of concept, fully inspired in Ulisses Castro's 50 ton of backdoors talk, that abuses the lack of user atte...

Shodan-Eye - Tool That Collects All The Information About All Devices Directly Connected To The Internet Using The Specified Keywords That You Enter

This tool collects all information about all devices that are directly connected to the internet with the specified keywords that you en...

EvilDLL - Malicious DLL (Reverse Shell) Generator For DLL Hijacking

Read the license before using any part from this code :) Malicious DLL (Win Reverse Shell) generator for DLL Hijacking