OSINT (Open Source Intelligence) is the practice of collecting information from published or otherwise publicly available sources. In the context of OSINT, intelligence refers to the extraction and …
Using Google, an SQL injection on a random website can be performed within 0.2 Google seconds. Specially crafted words given as input to Google are named as dorks, …
Finds PHP-/HTML-/ASP-based Login Panels Login portal can be used in a range of different contexts, from simple user restricted access to resources, through to complex hierarchies of access …
Finds SQL Injection SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. SQL …
In this recon-ng v5 tutorial you will discover open source intelligence and easily pivot to new results. Find targets and move to discovering vulnerabilities. What is recon-ng? Recon-ng …
A list of sites to test your browser privacy, security and tracking SSL/TLS Capabilities of Your Browser (Qualys SSL Labs) WebRTC Leak Test https://panopticlick.eff.org/ https://browserleaks.com/ https://2ip.io/ https://tenta.com/test/ https://ipleak.net/ https://proxy6.net/en/privacy …
Mass IP port scanner This is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, from a …
The DNS over HTTPS (DoH) protocol is currently in the news, and the Firefox browser is the only one that supports it. However, the feature is not enabled …
Constant learning is a requirement for cybersecurity professionals.Here are books and links recommended by professionals to continue a professional’s education. The Codebreakers: The Comprehensive History of Secret Communication …
The goal of the CHDB project is to document every binary, script, and library that can be helpful for penetration testing (Red Team). Windows Microsoft-signed (native to the …