RedCloud OS
#RedTeam #Azure #AWS #GCP #Cloud #Vulnerability
#Exploit #Malware #Bugbounty #VAPT #Security
https://reconshell.com/redcloud-os/
Wireless Pentesting Cheat Sheet
#OSWP #Wireless #Pentesting #OffensiveSecurity
#WiFi #Hacking #Vulnerability #KaliLinux #Exploit
#VAPT #Malware #BugBounty #RedTeam #WiFiHack
https://reconshell.com/wireless-pentesting-cheat-sheet/
MySQL Cheat Sheet
#postgresql #Database #MySQL #SQL #plsql
https://neevahost.com/blog/mysql-cheat-sheet/
Industrializing Financial Services with DevOps
#DevOps #eBook
https://neevahost.com/blog/industrializing-financial-services-with-devops/
RTSP Simple Server
#RTSP #Server #WebServer #ProxyServer
#RTSPSimpleServer #RaspberryPi #HTTPServer
https://neevahost.com/blog/rtsp-simple-server/
Intelligent Mobile Malware Detection
#cyber #security #Spyware #Mobile #Malware #Android
#Vulnerability #Exploit #Virus #Infosec #Appsec #VAPT
#Bugbounty #Hacking #APT #attacks #Pentesting #OSINT
https://reconshell.com/intelligent-mobile-malware-detection/
Web Application Firewall fingerprinting tool
#fingerprinting #WAF #Firewall #Hacking #Pentesting
#Infosec #Appsec #Exploit #Malware #Bugbounty #VAPT
#Vulnerability #RedTeam #BlueTeam #OSINT #Wafw00f
https://reconshell.com/web-application-firewall-fingerprinting-tool/
Local Privilege Escalation Vulnerability
#PrivalegeEscalation #vulnerability #Exploit #VAPT #LPE
#DCOMPotato #Bugbounty #Redteam #BlueTeam #Malware #APT
#Appsec #Microsoft #Hacking #infosec #Windows #Pentesting
https://reconshell.com/dcompotato-local-privalege-escalation-vulnerability/
Athena OS Distro focused on Cybersecurity
#Cybersecurity #AthenaOS #Pentesting #InfoSec #Appsec
#BugBounty #Hacking #Vulnerability #Malware #Exploit
#RedTeam #BlueTeam #VAPT #OffensiveSecurity #Cyber
https://reconshell.com/athena-os-distro-focused-on-cybersecurity/
DevOps Learning resources
#Git #DevOps #Linux #Security #Networking #Cloud
#DevSecOps #PowerShell #Engineering #eBook #Cyber
https://reconshell.com/devops-learning-resources/
Web Application Advanced Hacking
#cyber #security #vulnerability #Hacking #Exploit
#Bugbounty #OSCP #Malware #Pentest #VAPT #Appsec
#Infosec #RedTeam #SecurityResearcher #OSINT
https://reconshell.com/web-application-advanced-hacking/
NodeJS Web Development Guide
#Javascript #NodeJS #WebDevelopment #JSON #JS
https://reconshell.com/nodejs-web-development-guide/
Linux Ultimate Guide
#Debian #Ubuntu #Fedora #RedHatLinux #Linux
https://reconshell.com/linux-ultimate-guide/
Awesome Malware Techniques
#Appsec #Infosec #Vulnerability #Malware #Bugs #APT
#VAPT #Exploit #Bugbounty #Pentesting #Hacking #C&C
https://reconshell.com/malware-techniques/
Azure Exploitation Toolkit
#Azure #RedTeam #Microsoft #OSCP #Vulnerability #Bugbounty
#VAPT #Infosec #Appsec #Explit #Cyber #ThreatHunter
#BlueTeam #Pentesting #CloudSecurity #SecurityResearch
https://reconshell.com/azure-exploitation-toolkit/
WordPress Social Login and Register Authentication Bypass
#AuthenticationBypass #WordPress #Exploit #Malware #Vulnerability
#Hacking #Bugbounty #RedTeam #bugs #CVE-2023-2982 #Nuclei
https://reconshell.com/wordpress-social-login-and-register-authentication-bypass/
Foundations of Linux Debugging eBook
#Linux #Hacking #Maleare #Exploit #Debug
https://reconshell.com/foundations-of-linux-debugging-ebook/
Process Injection Enumeration Tool
#OffensiveSecurity #payloads #Vulnerability #VAPT
#RedTeam #Blueteam #ProcessInjection #Enumeration
#Bugbounty #Infosec #Appsec #Hacking #Cyber #APT
https://reconshell.com/process-injection-enumeration-tool/
SSH based reverse shell
#windows #shell #Hacking #Vulnerability #Pentesting
#RedTeam #BlueTeam #Exploit #Malware #Bugbounty #SSH
#VAPT #Infosec #Appsec #Cyber #Security #Proxy #APT
https://reconshell.com/ssh-based-reverse-shell/
XRAY GUI Starter Web Vulnerability Scanner
#Vulnerability #Scanner #Bugbounty #RedTeam #VAPT
#Pentesting #Exploit #Malware #BlueTeam #Infosec
#Appsec #OSINT #Hacking #APT #Cyber #Security
https://reconshell.com/xray-gui-starter-web-vulnerability-scanner/
Tor based shared web hosting
#WebHosting #SharedHosting #VPS #DedicatedServer
#CloudHosting #VPShosting #SecuredHosting
https://neevahost.com/blog/tor-based-shared-web-hosting/
Red Hat Enterprise Linux 9 Administration
#Linux #RedHat #RHEL #Shell #RHCSA #Ebook
https://neevahost.com/blog/red-hat-enterprise-linux-9-administration/
Awesome Azure Policy
#Microsoft #Azure #Cloud #AzurePolicy #Kubernetes
https://reconshell.com/awesome-azure-policy/
Awesome Forensics
#MemoryForensics #CyberForensics #ComputerForensics
#NetworkForensics #DigitalForensics #DFIR #IR #Hacking
#MobileForensics #DockerForensics #Steganography #VAPT
https://reconshell.com/awesome-forensics/
OSINT automation for hackers
#Scanning #OSINT #Hacking #Malware #Exploit #VAPT
#Appsec #Infosec #RedTeam #BlueTeam #vulnerability
#Pentest #Bugbounty #Enumeration #Neo4j #Cyber
https://reconshell.com/osint-automation-for-hackers/
GitFive OSINT tool
#Hacking #Malware #Vulnerability #OSINT #VAPT
#Exploit #GitFive #Appsec #Infosec #pentest
#Cyber #Security #Github #Bugbounty #RedTeam
https://reconshell.com/gitfive-osint-tool/
Data Science Command Line
#eBook #Python #programming #DataScience
https://reconshell.com/data-science-command-line/
Hidden parameters discovery suite
#BurpSuite #RedTeam #Vulnerability #Exploit #Malware
#Infosec #Appsec #BlueTeam #Pentest #Bugbouty #VAPT
#InformationSecurity #Cyber #OSINT #Hacking #APT
https://reconshell.com/hidden-parameters-discovery-suite-2/
Awesome Event IDs
#DigitalForensics #IncidentResponse #IR #DFIR #Malware
#SecurityAuditing #Hacking #APT #vulnerability #VAPT
#Infosec #Appsec #RedTeam #Pentesting #CyberForensics
https://reconshell.com/awesome-event-ids/
Cyber Security Conferences
#ThreatIntelligence #Cyber #Security #Hacking #Vulnerability
#Exploit #Malware #Pentesting #Infosec #Appsec #Bugbounty
https://reconshell.com/awesome-cyber-security-conferences/