• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

environment

  1. itsMe

    Exegol v4.1.1 - Fully featured and community-driven hacking environment

    The Exegol project     Exegol is a community-driven hacking environment, powerful and yet simple enough to be used by anyone in day to day engagements. Script kiddies use Kali Linux, real pentesters use Exegol, megachads maintain it 👀 Exegol is two things in one. Try it, and you’ll stop using...
  2. itsMe

    Cybersecurity Lab Environment in EVE NG

    Description Introduction: This Course will teach you how to set up an environment to practice your Cybersecurity, Ethical Hacking and Pen testing skills such as Launching a cyberattack, verifying vulnerabilities, Conducting research projects and Much more. After this Course I am sure you will...
  3. itsMe

    Cracking Setting up environment to run selenium configs. OpenBullet/SilverBullet

    NOTE: THIS VIDEO IS ONLY FOR EDUCATIONAL ACTIVITIES, AND DOES NOT PROMOTE ANY ILLEGAL STUFFS. Hidden content
  4. itsMe

    Creating a Dev Environment in AWS with Terraform

    Creating a Dev Environment in AWS with Terraform by Philip Afable If you work in Azure development, this course from CloudSkills.io can show you some best practices for setting up a development environment in AWS. Instructor Philip Afable introduces you to Terraform and shows you how to...
  5. itsMe

    Detection Lab: build a lab environment complete with security tooling and logging

    Detection Lab Purpose This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to...
  6. itsMe

    VulWebaju: set up your pentesting environment for learning purpose

    VulWebaju is a script that automates to set up your pentesting environment for learning purposes. This script will help you to install common vulnerable applications. Vulnerable webapps that you can install     DVWA     Owasp Juice Shop     Web goat     Nodegoat     Damm Vulnerable GraphQL    ...
  7. itsMe

    SamuraiWTF 5.1 - a web pen-testing environment

    The Samurai Web Testing Framework (SamuraiWTF) is a live Linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of open-source and free tools that focus on testing and attacking websites. In developing this environment, we have based...
  8. itsMe

    Pentest v0.3.3 - create an pentest environment easily and quickly

    Docker for pentest Docker for pentest is an image with the more used tools to create a pentest environment easily and quickly. Features     OS, networking, developing and pentesting tools installed.     Connection to HTB (Hack the Box) vpn to access HTB machines.     Popular wordlists...
  9. itsMe

    Pentest v0.3.2 - create an pentest environment easily and quickly

    Docker for pentest Docker for pentest is an image with the more used tools to create a pentest environment easily and quickly. Features     OS, networking, developing and pentesting tools installed.     Connection to HTB (Hack the Box) vpn to access HTB machines.     Popular wordlists...
  10. itsMe

    Pentest v0.3.1 - create an pentest environment easily and quickly

    Docker for pentest Docker for pentest is an image with the more used tools to create a pentest environment easily and quickly. Features     OS, networking, developing and pentesting tools installed.     Connection to HTB (Hack the Box) vpn to access HTB machines.     Popular wordlists...
  11. itsMe

    Pentest v0.3 - Create an pentest environment easily and quickly

    Docker for pentest is an image with the more used tools to create a pentest environment easily and quickly.Docker for pentest Features     OS, networking, developing and pentesting tools installed.     Connection to HTB (Hack the Box) vpn to access HTB machines.     Popular wordlists...
  12. itsMe

    pentest v0.2.6 - create an pentest environment easily and quickly

    Docker for pentest Docker for pentest is an image with the more used tools to create a pentest environment easily and quickly. Features     OS, networking, developing and pentesting tools installed.     Connection to HTB (Hack the Box) vpn to access HTB machines.     Popular wordlists...
  13. itsMe

    ADCollector v2.0 - extract valuable information from the Active Directory environment

    ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic understanding of the configuration/deployment of the environment as a starting point. Notes: ADCollector is not an alternative to the powerful...
  14. dEEpEst

    Android Termux [Android terminal emulator and Linux environment app]

    Termux Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are available using the APT package manager. Hidden content Secure. Access remote servers...
  15. dEEpEst

    Trusty OS [Trusted Execution Environment for Android]

    Trusty is a secure Operating System (OS) that provides a Trusted Execution Environment (TEE) for Android. The Trusty OS runs on the same processor as the Android OS, but Trusty is isolated from the rest of the system by both hardware and software. Trusty and Android run parallel to each other...
  16. dEEpEst

    Windows Experience without risks in an isolated environment

    Hidden content
  17. itsMe

    SamuraiWTF 4.2.2 a web pen-testing environment

    The Samurai Web Testing Framework (SamuraiWTF) is a live Linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open-source and free tools that focus on testing and attacking websites. In developing this environment, we have...
  18. 1

    Exploits Common Desktop Environment 2.3.0 dtprintinfo Privilege Escalation

    A buffer overflow in the DtPrinterAction::PrintActionExists() function in the Common Desktop Environment 2.3.0 and earlier, as used in Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long printer name passed to dtprintinfo by a malicious lpstat...
  19. 1

    Exploits Oracle Java Runtime Environment GlyphIterator::setCurrGlyphID Heap Corruption

    A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType fonts. View the full article
  20. 1

    Exploits Oracle Java Runtime Environment sc_FindExtrema4 Heap Corruption

    A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType, implemented in a proprietary t2k library. View the full article
Back
Top