OSINT

Open Source Intelligence (OSINT)

OSINT (Open Source Intelligence) is the practice of collecting information from published or otherwise publicly available sources. In the context of OSINT, intelligence refers to the extraction and …

Google Hacking Database

Google Hacking Database (GHDB)

Using Google, an SQL injection on a random website can be performed within 0.2 Google seconds. Specially crafted words given as input to Google are named as dorks, …

SQL Injection

SQL Injection

Finds SQL Injection SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. SQL …

Globe

Recon-ng v5 Tutorial

In this recon-ng v5 tutorial you will discover open source intelligence and easily pivot to new results. Find targets and move to discovering vulnerabilities. What is recon-ng? Recon-ng …

Browser Privacy

Browser Privacy, Security and Tracking test sites

A list of sites to test your browser privacy, security and tracking SSL/TLS Capabilities of Your Browser (Qualys SSL Labs) WebRTC Leak Test https://panopticlick.eff.org/ https://browserleaks.com/ https://2ip.io/ https://tenta.com/test/ https://ipleak.net/ https://proxy6.net/en/privacy …

MASSCAN

MASSCAN – Mass IP port scanner

Mass IP port scanner This is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, from a …

Security Books

Books to Help Cybersecurity Pros Be Better

Constant learning is a requirement for cybersecurity professionals.Here are books and links recommended by professionals to continue a professional’s education. The Codebreakers: The Comprehensive History of Secret Communication …

Commands

Command Hacking Database (CHDB)

The goal of the CHDB project is to document every binary, script, and library that can be helpful for penetration testing (Red Team). Windows Microsoft-signed (native to the …