Globe

Recon-ng v5 Tutorial

In this recon-ng v5 tutorial you will discover open source intelligence and easily pivot to new results. Find targets and move to discovering vulnerabilities. What is recon-ng? Recon-ng …

Google Hacking Database

Google Hacking Database (GHDB)

Using Google, an SQL injection on a random website can be performed within 0.2 Google seconds. Specially crafted words given as input to Google are named as dorks, …

MASSCAN

MASSCAN – Mass IP port scanner

Mass IP port scanner This is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, from a …

Commands

Command Hacking Database (CHDB)

The goal of the CHDB project is to document every binary, script, and library that can be helpful for penetration testing (Red Team). Windows Microsoft-signed (native to the …

Sensitive Data

Sensitive Data

Finds Sensitive Data Sensitive data is defined as information that is protected against unwarranted disclosure. Access to sensitive data should be safeguarded. Protection of sensitive data may be …

SQL Injection

SQL Injection

Finds SQL Injection SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. SQL …

Google Hacking Database

Google Hacking for Penetration Testers

Google has a worldwide search engine market share of around 89,8%. (karmasnack 06/2017). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever …