thatCoding_Yogi's profile picture. Software Developer | DevOps Engineer | Cyber Security Engineer.

Programm.r

@thatCoding_Yogi

Software Developer | DevOps Engineer | Cyber Security Engineer.

Programm.r reposted

🔎 𝗢𝗦𝗜𝗡𝗧-𝗦𝗔𝗡 Herramienta desarrollada por investigadores rusos para realizar OSINT (Open Source Intelligence). Compatible con Kali Linux 🐉 y Parrot OS 🦜. - En este repositorio encuentras la versión gratuita, aunque también existe una opción premium que puedes…

HackingTeam777's tweet image. 🔎 𝗢𝗦𝗜𝗡𝗧-𝗦𝗔𝗡

Herramienta desarrollada por investigadores rusos para realizar OSINT (Open Source Intelligence).
Compatible con Kali Linux 🐉 y Parrot OS 🦜.

- En este repositorio encuentras la versión gratuita, aunque también existe una opción premium que puedes…

Programm.r reposted

Reverse engineering and security analysis of an ESP32 based IoT device jmswrnr.com/blog/hacking-a… Great blog post by @jmswrnr #esp32 #cybersecurity

0xor0ne's tweet image. Reverse engineering and security analysis of an ESP32 based IoT device

jmswrnr.com/blog/hacking-a…

Great blog post by @jmswrnr

#esp32 #cybersecurity
0xor0ne's tweet image. Reverse engineering and security analysis of an ESP32 based IoT device

jmswrnr.com/blog/hacking-a…

Great blog post by @jmswrnr

#esp32 #cybersecurity

Programm.r reposted

SatIntel: An OSINT tool for satellite reconnaissance made with Golang. The tool can extract satellite telemetry, receive orbital predictions, and parse TLEs. GitHub: github.com/ANG13T/SatIntel Features: • Satellite Catalog Retrieval from NORAD ID or Selection Menu • Display…

DarkWebInformer's tweet image. SatIntel: An OSINT tool for satellite reconnaissance made with Golang. The tool can extract satellite telemetry, receive orbital predictions, and parse TLEs.

GitHub: github.com/ANG13T/SatIntel

Features:

• Satellite Catalog Retrieval from NORAD ID or Selection Menu
• Display…

Programm.r reposted

Sherlock: Hunt down social media accounts by username across social networks📝 🔗github.com/sherlock-proje…

harshleenchawl2's tweet image. Sherlock: Hunt down social media accounts by username across social networks📝
🔗github.com/sherlock-proje…

Programm.r reposted

Why I use Mosh over SSH when traveling 👇 SSH dies on flaky networks. Mosh doesn’t. You can switch networks, go offline briefly, and still maintain a live session. Built for travel, trusted by remote developers, and essential for all you digital nomads.


Programm.r reposted

Llama.cpp exploitation (heap buffer overflow) retr0.blog/blog/llama-rpc… #cybersecurity #llama

0xor0ne's tweet image. Llama.cpp exploitation (heap buffer overflow)

retr0.blog/blog/llama-rpc…

#cybersecurity #llama
0xor0ne's tweet image. Llama.cpp exploitation (heap buffer overflow)

retr0.blog/blog/llama-rpc…

#cybersecurity #llama

Programm.r reposted

dnstwist: A domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation GitHub: github.com/elceef/dnstwist

DarkWebInformer's tweet image. dnstwist: A domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation

GitHub: github.com/elceef/dnstwist

Programm.r reposted

Email2Phonenumber: A OSINT tool to obtain a target's phone number just by having their email address GitHub: github.com/martinvigo/ema…

DarkWebInformer's tweet image. Email2Phonenumber: A OSINT tool to obtain a target's phone number just by having their email address

GitHub: github.com/martinvigo/ema…
DarkWebInformer's tweet image. Email2Phonenumber: A OSINT tool to obtain a target's phone number just by having their email address

GitHub: github.com/martinvigo/ema…

Programm.r reposted

A recent #malware bypassed almost every public sandbox and antivirus, except Threat.Zone, and even evaded EDR/XDR in real-world incidents. Many banks, ISPs, and organizations were impacted. #ThreatIntelligence #onpatrol4malware malwation.com/blog/technical…


Programm.r reposted

⚔️ ADVANCED CHAIN: Web Vuln ➝ RCE ➝ PrivEsc ➝ Root ➝ Persist ⸻ 🔍 STAGE 1 — Recon and Target Selection # Discover live hosts naabu -host scope.txt -p 80,443,8080,8000 | httpx -silent -title -tech -web-server -status-code -ports > alive.txt # Enumerate files/paths cat…

TheMsterDoctor1's tweet image. ⚔️ ADVANCED CHAIN: Web Vuln ➝ RCE ➝ PrivEsc ➝ Root ➝ Persist

⸻

🔍 STAGE 1 — Recon and Target Selection

# Discover live hosts
naabu -host scope.txt -p 80,443,8080,8000 | httpx -silent -title -tech -web-server -status-code -ports > alive.txt

# Enumerate files/paths
cat…

Programm.r reposted

🛡️ cf-hero – Technical Overview cf-hero is an open-source CLI tool that reveals the real IP addresses of websites hidden behind Cloudflare’s reverse proxy protection. GITHUB Link 🔗 ⤵️⤵️

_0b1d1's tweet image. 🛡️ cf-hero – Technical Overview

cf-hero is an open-source CLI tool that reveals the real IP addresses of websites hidden behind Cloudflare’s reverse proxy protection.

GITHUB Link 🔗 ⤵️⤵️

Programm.r reposted

Linux kernel rootkits: beginners introduction inferi.club/post/the-art-o… #Linux #infosec

0xor0ne's tweet image. Linux kernel rootkits: beginners introduction

inferi.club/post/the-art-o…

#Linux #infosec

Programm.r reposted

Cloud Privilege Escalation Awesome Script Suite github.com/carlospolop/Cl…


Programm.r reposted

𝗠𝗮𝗹𝘄𝗮𝗿𝗲 𝗗𝗲𝘃𝗲𝗹𝗼𝗽𝗺𝗲𝗻𝘁, 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 𝗮𝗻𝗱 𝗗𝗙𝗜𝗥 𝗦𝗲𝗿𝗶𝗲𝘀 👾 🔗 Parte 1: - azr43lkn1ght.github.io/Malware%20Deve… 🔗 Parte 2: - azr43lkn1ght.github.io/Malware%20Deve… 🔗 Parte 3: - azr43lkn1ght.github.io/Malware%20Deve… 🔗 Parte 4: - azr43lkn1ght.github.io/Malware%20Deve… #maldev


Programm.r reposted

🚨Writing Exploits for IoT N-Days The amazing @_stigward has blessed our channel with another excellent video, this time exploiting a Zyxel NAS. 🥇Analyzing CVE-2023-35138 🥈Reversing the Firmware 🥉Developing the Exploit 👉youtube.com/watch?v=3Z7qXc…

GuidedHacking's tweet image. 🚨Writing Exploits for IoT N-Days

The amazing @_stigward has blessed our channel with another excellent video, this time exploiting a Zyxel NAS.

🥇Analyzing CVE-2023-35138
🥈Reversing the Firmware
🥉Developing the Exploit

👉youtube.com/watch?v=3Z7qXc…

Loading...

Something went wrong.


Something went wrong.