A repository that includes all the important word lists used while brute forcing the directories in bug hunting.
A curated list of awesome reversing resource Books Reverse Engineering Books The IDA Pro Book Radare2 Book Reverse Engineering for Beginners The Art of Assembly Language Practical Reverse Engineering Reversing: Secrets of Reverse Engineering Practical Malware Analysis Malware Analyst’s Cookbook Gray Hat Hacking Access Denied The Art of Memory Forensics Hacking: The Art of Exploitation Fuzzing for Software Security Art […]
We’ve collected some of the most salient points about the upcoming Windows 11, the ones enterprise IT admins will most need to know. So much for that promise. You know, the one Microsoft made six years ago when it told customers that Windows 10 was “the last version of Windows” they’d see. Instead, Windows 10 will end — also as […]
What is SSH Secure Shell or SSH is used to remotely access the server or any computer with SSH enabled. Perfect replacement for telnet protocol. Telnet is not secure like SSH, SSH provides encryption for secure communication. SSH by default uses TCP port 22 to connect with the SSH service. SSH will allow the client to connect the remote system […]
The U.S. government’s National Security Agency (NSA) on June 22, 2021 announced plans to fund the development of a knowledge base of defensive countermeasures for the most common techniques used by malicious hackers. The project, called D3FEND, is available through the non-profit MITRE Corporation as a catalogue of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. The primary goal […]
Naabu is a port scanning tool written in Go that allows you to enumerate valid ports for hosts in a fast and reliable manner. It is a really simple tool that does fast SYN/CONNECT scans on the host/list of hosts and lists all ports that return a reply. Features Fast And Simple SYN/CONNECT probe based scanning. Optimized for ease of […]
Small scope Medium scope Large scope Network Preparation Registration Authentication Session Profile/Account details Forgot/reset password Input handling Error handling Application Logic Other checksInfrastructure CAPTCHA Security Headers