Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Este proyecto tiene como objetivo configurar un servidor VPS como un proxy inverso en la red TOR para mostrar el contenido de otro VPS en la clearnet. Utiliza Nginx como servidor web y proxy inverso, junto con un certificado SSL autofirmado generado por OpenSSL para proporcionar cifrado y...
Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a...
Sandman is a NTP based backdoor for red team engagements in hardened networks.
Sandman is a backdoor that is meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get and run an...
Description
What is ethical hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security...
Collection of 100+ tools and resources that can be useful for red teaming activities.
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.
Warning
The materials in this repository are for...
Este artículo explica los pasos que debe seguir un pentester para auditar la red de una empresa grande con más de 400 ordenadores. Desde la recopilación de información hasta la evaluación continua, se describen los pasos necesarios para asegurar la seguridad de la red.
Introducción
El...
The all-in-one Red Team browser extension for Web Pentesters
HackTools is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverses shells, and much more.
Current functions:
...
Description
Wireless Penetration Testing
Pentesting of the wireless systems is easier task than doing that on the wired network. You cannot really apply good physical security measures against a wireless medium, if you are located close enough, you are able to “hear” (or at least your wireless...
Aprenda sobre el hacking de red y los peligros que conlleva en la era digital. Descubra las mejores prácticas y medidas de seguridad para proteger su red y sus datos sensibles.
Introducción:
En un mundo cada vez más conectado, la seguridad de las redes es esencial para proteger los datos y la...
Protect your .NET code and IP with SmartAssembly
Protect intellectual property through obfuscation and encryption
Secure .NET Framework, .NET Core, and .NET Standard assemblies
Automatically report usage and exceptions
Redgate's .NET obfuscator
SmartAssembly is an obfuscator...
Sandman is a backdoor that is meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get and run an arbitrary shellcode from a pre defined server.
Since NTP is a protocol that is overlooked by many...
Pentesters
HackTools is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverses shells, and much more.
Current functions:
Dynamic Reverse Shell generator (PHP, Bash, Ruby...
Active Directory Pentesting With Kali Linux – Red Team
Attacking and Hacking Active Directory With Kali Linux Full Course – Red Team Hacking Pentesting
What you’ll learn
How to Use Metasploit to Exploit Active Directory
How to Use Empire to Exploit Active Directory
How to Use...
Description
What is ethical hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security...
Protect your .NET code and IP with SmartAssembly
Protect intellectual property through obfuscation and encryption
Secure .NET Framework, .NET Core, and .NET Standard assemblies
Automatically report usage and exceptions
Redgate's .NET obfuscator
SmartAssembly is an obfuscator that...
OffensiveRust
My experiments in weaponizing Rust for implant development and general offensive operations.
Why Rust?
It is faster than languages like C/C++
It is a multi-purpose language, bearing excellent communities
It has an amazing inbuilt dependency build management called...
Protect your .NET code and IP with SmartAssembly
Protect intellectual property through obfuscation and encryption
Secure .NET Framework, .NET Core, and .NET Standard assemblies
Automatically report usage and exceptions
Redgate's .NET obfuscator
SmartAssembly is an obfuscator that...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.