• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

attack

  1. itsMe

    Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources

    Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus―it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least...
  2. itsMe

    Zed Attack Proxy Cookbook

    Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBook Key Features     Master ZAP to protect your systems from different cyber attacks     Learn cybersecurity best practices using this...
  3. itsMe

    Github Attack Toolkit: GitHub Self-Hosted Runner Enumeration and Attack Tool

    Gato, or GitHub Attack Toolkit, is an enumeration and attack tool that allows both blue teamers and offensive security practitioners to evaluate the blast radius of a compromised personal access token within a GitHub organization. The tool also allows searching for and thoroughly enumerating...
  4. dEEpEst

    Remote Desktop (RDP)- Brute Force Attack - And how to protect against this RPD brute force attack

    What is RDP? Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP...
  5. itsMe

    .NET bhash - bHash is a simple hash cracking tool and and NTLM attack dictionary converter

    bHash is a simple hash cracking tool and and NTLM attack dictionary converter Windows Supported note: ntlm hash conversion can produce very large file sizes, its best to split dictionaries [Hashtypes as of now] -sha1 -sha256 -md5 [Commands Examples]     bhash [hashtype] hash -d [chosen...
  6. Exploits Zip Slip Attack on Archives

      Hidden content
  7. dEEpEst

    Cracking Brute Force Attack

    Brute Force Attack  [01] Instagram Brute Force [02] Facebook Brute Force [03] E-mail Brute Force Note Please use tor in background while you're trying to hack instagram account Information Gathering [01] Track IP Location [02] Get Phone Number Information [03] get E-mail Information...
  8. dEEpEst

    What is an image replay attack ?

    What is an image replay attack ? An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to a system protected by less-than-secure biometric authentication technology implementations. The...
  9. dEEpEst

    Phyton MHDDoS - DDoS Attack Script With 56 Methods

    MHDDoS - DDoS Attack Script With 56 Methods (Programming Language - Python 3) Please Don't Attack websites without the owners consent. Features And Methods 💣 Layer7  GET | GET Flood  POST | POST Flood  OVH | Bypass OVH...
  10. itsMe

    SCMKit: attack SCM systems

    Source Code Management Attack Toolkit – SCMKit is a toolkit that can be used to attack SCM systems. SCMKit allows the user to specify the SCM system and attack module to use, along with specifying valid credentials (username/password or API key) to the respective SCM system. Currently, the SCM...
  11. itsMe

    wifipumpkin3 v1.1.3R1 - Powerful framework for rogue access point attack

    Wifipumpkin3 wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Main Features     Rogue access point attack...
  12. 0x1

    Puwr - SSH attack surface on local network

    Puwr - SSH attack surface on local network SSH pivoting script for expanding attack surfaces on local networks Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a SSH service, Puwr uses a given subnet range to scope out IP’s...
  13. itsMe

    Go365 v2.0 - Office365 User Attack Tool

    Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365). Go365 uses a unique SOAP API endpoint on login.microsoftonline.com that most other tools do not use. When queried with an email address and password...
  14. itsMe

    Anatomy of a Cyber Attack – Beginner Hacking with Metasploit Course Site

    Learn the attacker’s methodology and start your career in cybersecurity, penetration testing, and ethical hacking! What you’ll learn Anatomy of a Cyber Attack – Beginner Hacking with Metasploit Course Site     Understand the steps of a cyber attack     Understand the basic methodology, tools...
  15. itsMe

    Phyton D.DDOSv2 - DDoS Attack Script Made By DYL4N#0552

    I clearly designed this tool for education purposes and only to understand how sockets and DDOS attacks are performed. You are accountable for your own actions! WARNING     Please Do Not Attack .Gov or .Irs :) Hidden content
  16. itsMe

    EvilSelenium: weaponizes Selenium to attack Chrome

    EvilSelenium is a new project that weaponizes Selenium to abuse Chrome. The current features right now are:     Steal stored credentials (via autofill)     Steal cookies     Take screenshots of websites     Dump Gmail/O365 emails     Dump WhatsApp messages     Download & exfiltrate files...
  17. itsMe

    Phyton Best DDoS Attack Script With 36 Plus Methods

    Features : [+] Best DDoS Tool in the market ! [+] Based On Proxies ! [+] Easy for Beginners ! Features And Method     💣 Layer7         get GET | GET Flood         post POST | POST Flood         ovh OVH | Bypass OVH         stress STRESS | Send HTTP Packet With High Byte         ostress...
  18. itsMe

    wifipumpkin3 v1.1.2R2 - Powerful framework for rogue access point attack

    Wifipumpkin3 wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Main Features     Rogue access point attack...
  19. dEEpEst

    What is an image replay attack ?

    ✓ What is an image replay attack ? An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to a system protected by less-than-secure biometric authentication technology implementations. The...
  20. dEEpEst

    How can you prevent a cyber attack ?

    How can you prevent a cyber attack ? - There is no guaranteed way for any organization to prevent a cyber attack, but there are numerous cybersecurity best practices that organizations can follow to reduce the risk. - Reducing the risk of a cyber attack relies on using a combination of skilled...
Back
Top