• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

hunting

  1. spike

    hello

    im a bug hunter. 17 yrs old. interest on breaking rules
  2. S

    ThreatHound - tool which help you on your IR & Threat Hunting

    This tool, called "ThreatHound," is a powerful and versatile tool written in Python (with a new C version available for Linux-based systems) that helps with IR & Threat Hunting & CA. With ThreatHound, you can drop your event log file and analyze the results easily. It now supports...
  3. itsMe

    Threat Hunting Essential Training

    Description Just because an organization opts to spend a fortune on cybersecurity doesn’t mean that it’s immune to an attack. While properly configured technology can stop most of today’s cyber-attacks, hackers have become experts at evading detection. In this course, information security...
  4. itsMe

    APT-Hunter v3.0 - Threat Hunting tool for windows event logs

    APT-Hunter is a Threat Hunting tool for windows event logs which made by the purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity. This tool will make good use of the windows event logs collected and make...
  5. itsMe

    S3cret Scanner: Hunting For Secrets Uploaded To Public S3 Buckets

    S3cret Scanner: Hunting For Secrets Uploaded To Public S3 Buckets     S3cret Scanner tool is designed to provide a complementary layer for the Amazon S3 Security Best Practices by proactively hunting secrets in public S3 buckets.     Can be executed as a scheduled task or On-Demand Automation...
  6. itsMe

    Learn Bug Bounty Hunting & Web Security Testing From Scratch

    What you'll learn     95+ videos to teach you bug hunting & security testing from scratch.     80+ hands-on real-life examples - from simple to advanced.     Discover the most common web application bugs and vulnerabilities.     Discover bugs from the OWASP top 10 most common security...
  7. itsMe

    The Ransomware Hunting Team

    The Ransomware Hunting Team https://www.amazon.com/Ransomware-Hunting-Team-Improbable-Cybercrime/dp/0374603308 Hidden content
  8. itsMe

    Reverse Engineering VulFi v1.0 - Plugin To IDA Pro Which Can Be Used To Assist During Bug Hunting In Binaries

    Introduction The VulFi (Vulnerability Finder) tool is a plugin to IDA Pro which can be used to assist during bug hunting in binaries. Its main objective is to provide a single view with all cross-references to the most interesting functions (such as strcpy, sprintf, system, etc.). For cases...
  9. itsMe

    Cybersecurity Threat Hunting Professional

    What you’ll learn     To be an excellent threat hunter, you’ll need the right mentality and talents.     How to carry out simple threat hunting     How to set up environments for threat hunting, from the most basic to the most advanced.     Recognize the different techniques for danger hunting...
  10. itsMe

    Pentesters Practical Approach for Bug Hunting and Bug Bounty

    Hunting Bugs Effectively. What you'll learn     How to find out hidden bugs to get big bounty     Right approach to pentest the web application     Practical ethical hacking and penetration testing skills     Understand the security threats affecting networks and applications     Perform bug...
  11. itsMe

    h8mail: Email OSINT and password breach hunting

    Email OSINT and password finder. Use h8mail to find passwords through a different breach and reconnaissance services, or the infamous “Breach Compilation” torrent. 🍊 Features     🔎 Email pattern matching (reg exp), useful for reading from other tool outputs     🌍 Pass URLs to directly find and...
  12. itsMe

    WPHunter - Wordpress Hunting Bruteforce Tool with Google Dork

    Features -> Multiple dorks for Wordpress -> Check most commons CVE -> WPSCAN (wpscan.com) -> TOR support -> Save passwords to db Hidden content
  13. itsMe

    ANDROID Hacking and Penetration Testing : BUG BOUNTY Hunting

    What you'll learn     Free Licence to BURPSUITE PROFESSIONAL     Android App Penetration Testing     Android Bug Bounty Hunting     Earn Money by Hunting bugs in Android Applications     Ethical Hacking     Penetration Testing Requirements     Basic Internet and Computer Usage Knowledge    ...
  14. itsMe

    Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:Z

    What you'll learn     95+ ethical hacking &security video lectures.     Start from 0 to become pro hacker.     Learn ethical hacking & the different types of hackers.     Learn to install a hacking lab & needed softwares.     Learn kali linux commands and basics of using terminal...
  15. itsMe

    Watcher v1.1.1 - Open Source Cybersecurity Threat Hunting Platform

    Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should be used on webservers and available on Docker. Watcher capabilities     Detect emerging vulnerability, malware using social network & other...
  16. dEEpEst

    Pentesting & Bug Hunting Resources

    Pentesting & Bug Hunting Resources : Hidden content
  17. itsMe

    Any.Run - Interactive malware hunting service

    Malware hunting with live access to the heart of an incident Watch the epidemic as if it was on your computer, but in a more convenient and secure way, with a variety of monitoring features.      Realtime interaction     Network tracking     Process monitoring     MITRE...
Back
Top