• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

pentesting

  1. dEEpEst

    Hacking 🎩 Blind OS Command Injection: The Ultimate Mega-Guide

    🎩 Blind OS Command Injection: The Ultimate Mega-Guide 🚀 Created for Hack Tools Dark Community By Hack Tools Dark Community — Deep Offensive Security Knowledge Welcome to a full in-depth exploration on exploiting Blind OS Command Injection, covering basic detection, advanced exploitation...
  2. ne0s3c

    hello

    im a bug hunter. 20 yrs old. interest on breaking rules
  3. dEEpEst

    Bypassing Modern WAFs

    Bypassing Modern WAFs: Techniques and Tools Introduction Web Application Firewalls (WAFs) serve as a crucial defense mechanism against web-based threats, filtering and monitoring HTTP traffic to prevent attacks such as SQL injection, cross-site scripting (XSS), and remote command execution...
  4. dEEpEst

    Certified Red Team Professional (CRTP) 9 GB 2025

    Certified Red Team Professional Lab Objective: The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of...
  5. dEEpEst

    Practical Web Application Security and Testing 2025-01-30

    Practical Web Application Security and Testing is an entry-level course on web application technologies, security considerations for web application development, and the web application penetration testing process. We begin with the basics of HTTP, servers, and clients, before moving through...
  6. dEEpEst

    Bug Bounty Hunting and Penetration Testing v1 2025-01-12

    About This course offers a comprehensive introduction to identifying and responsibly exploiting application vulnerabilities. It covers Web Application Architecture fundamentals and the critical OWASP Top 10. Participants will learn to distinguish Bug Bounty Hunting from Penetration Testing...
  7. dEEpEst

    Pentest Find XSS Vulnerabilities in Just 2 Minutes

    Find XSS Vulnerabilities in Just 2 Minutes The process is very simple and efficient. The first step is to copy the target website URL. Now that we know the target, the next step will be to execute a very simple, yet powerful one-liner command that streamlines the testing process. Here’s how it...
  8. dEEpEst

    Pentest How to exploit open ports using Metasploit

    🛡 How to exploit open ports using Metasploit🧑‍💻 It requires knowledge of the basics of cybersecurity, as well as knowing how to use the tools effectively, I will explain the basic steps for this with a practical example. ✅ ### Basic steps to exploit open ports using Metasploit: 1️⃣ Collecting...
  9. dEEpEst

    In-Depth Red Teaming: APT & Adversary Simulation 6 GB 2024

    In-Depth Red Teaming: APT & Adversary Simulation This is an on-demand full hands-on training that focuses on developing cyber weapons that can evade AV detection, EDR logs and forensics traces like how advanced targeted attacks do, and provide you with insights on how to improve your...
  10. dEEpEst

    Courses How To Rob a Casino

    Credits: dmcxblue Casinos, some view these places as something that corrupts the soul, leading individuals astray with the allure of easy money and instant gratification. Others see casinos as an escape from reality, seeking temporary relief from stress, boredom or dissatisfaction and for...
  11. 0x1

    Pentest Secator

    The pentester's swiss knife Secator is a task and workflow runner used for security assessments. It supports dozens of well-known security toolsand it is designed to improve productivity for pentesters and security researchers. Features Curated list of commands Unified input options...
  12. LSDeep

    EyeNET - Network Security Tool

    EyeNET Network Security Tool EyeNET is a network security tool designed to provide monitoring, analysis, and protection capabilities for your network. With a range of features from real-time traffic monitoring to vulnerability scanning, EyeNET offers a robust suite of tools for network...
  13. dEEpEst

    Pentest NetSifter - LostXtools

    NetSifter NetSifter is a robust and versatile networking tool designed for comprehensive web enumeration, scanning, and information gathering. With a user-friendly interface, NetSifter simplifies various website analysis and network reconnaissance tasks. Features. WP Plugin Scanner: Identify...
  14. Cryptic_r_j

    PICO CTF Writeups | Bug bounty Practice | Beginner Friendly

    Practice Questions for Beginners ( For bug bounty Competition/Cyber security ) PicoCTF-Writeup For the sole purpose of proving people did stuff. On a side note... these are the writeups for the few questions we managed to complete. Side note x2: I don't think my team mates are going to...
  15. itsMe

    Dronesploit v1.1.13 - Drone pentesting framework console

    This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For ease of use, the interface has a layout that looks like Metasploit. Hidden content
  16. itsMe

    Pentesting Industrial Control Systems

    About this book The industrial cybersecurity domain has grown significantly in recent years. To completely secure critical infrastructure, red teams must be employed to continuously test and exploit the security integrity of a company's people, processes, and products. This is a unique...
  17. dEEpEst

    Android Pentesting & CTF

    Android Pentesting & CTF Hidden content
  18. itsMe

    BlackStone: Pentesting Reporting Tool

    BlackStone project or “BlackStone Project” is a tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting. In this tool we can register in the database the vulnerabilities that we find in the audit, classifying them by internal...
  19. itsMe

    Rekono v1.4.3 - Execute complete pentesting processes

    Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The findings obtained during the executions will be sent to the user via email or Telegram notifications and also can be imported into Defect-Dojo if advanced...
  20. dEEpEst

    Pentesting con Kali

      Hidden content
Back
Top