Reconnaissance - Questions and Answers with Gilbert Oviedo
Can you explain the concept of the reconnaissance phase in the cyber kill chain? Why is it critical to cyber …
Dark Web Reconnaissance: The Art of Uncovering the Hidden Adversaries
Introduction The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that …
Strategies for Defending Against Kill Chain Reconnaissance
Introduction Recent cyberattacks attributed to advanced persistent threat (APT) groups linked with nation-states have exposed their expanding capabilities when it …
Security Implications of Serverless Computing in the Cloud
Abstract The promise of easier development, scalability, and cost-effectiveness has made serverless computing quite popular in recent years. But this …
PhoneInfoga - Advanced information gathering & OSINT framework for phone numbers
PhoneInfoga is one of the most advanced tools to scan international phone numbers. It allows you to first gather standard …
Tool-X is a Kali Linux hacking tools installer for Termux and linux system
Tool-X was developed for Termux and other android terminals. Using Tool-X, you can install almost 370+ hacking tools in Termux …
Beast Bomber - SMS bomber, email spammer, WhatsApp spammer, Telegram spammer, Discord spammer and DoS attacker.
Beast Bomber in Telegram: https://t.me/beast_bomberr_bot (in development) Beast Bomber in GitLab: https://gitlab.com/ebankoff/Beast_Bomber See also: https://github.com/ebankoff/CleanerPRO Possibilities SMS spammer(works better with …
TBomb v2.1b An open-source SMS/call bomber for Linux And Termux.
NOTE: Due to the overuse of script, a bunch of APIs has been taken offline. It is okay if you …
MOSINT - gather information about the target email
❓ What is MOSINT? MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. …
hackingtool - All in One Hacking tool For Hackers
All in One Hacking tool For Hackers Your favorite tool is not in hackingtool or Suggestions Please CLICK HERE Update …
Python Cheat sheet for hackers and developers
This cheat sheet is about Python. It is one of the most used high-level programming languages. Most coders prefer using …
GHunt - Investigate Google Accounts with emails.
GHunt is a modulable OSINT tool designed to evolve over the years and incorporates many techniques to investigate Google accounts, …
Osintgram is a OSINT tool on Instagram
Disclaimer: FOR EDUCATIONAL PURPOSE ONLY! The contributors do not assume any responsibility for the use of this tool. Warning: It …
OpenCTI - Open Cyber Threat Intelligence Platform
OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been …
PyPhisher - Easy to use phishing tool with 65 website templates
PyPhiser is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, Github, Reddit, Gmail, and many …
Car Hacking: The Ultimate Guide! - Part I by Anastasis Vasileiadis
Car safety is really exciting and is an interesting topic of study for many safety researchers. With the arrival of …
Live Forensicator - Powershell Script to aid Incidence Response and Live Forensics
___________ .__ __ \_ _____/__________ ____ ____ _____|__| ____ _____ _/ |_ ___________ | __)/ _ \_ __ \_/ __ …
HackBrowserData - Decrypt passwords/cookies/history/bookmarks from the browser
HackBrowserData is an open-source tool that could help you decrypt data (password|bookmark|cookie|history|credit card|downloads link) from the browser. It supports the …
Onex - a Kali Linux hacking tools installer for Termux and other linux distribution.
"Onex a hacking tools library." Onex is a Kali Linux hacking tools installer for termux and other Linux distribution. It's …
Docker-OSX - Run Mac in a Docker container
Docker-OSX now has a Discord server & Telegram! The Discord is active on #docker-osx and anyone is welcome to come …
Reconnaissance - Questions and Answers with Gilbert Oviedo
Can you explain the concept of the reconnaissance phase in the cyber kill chain? Why is it critical to cyber …
Dark Web Reconnaissance: The Art of Uncovering the Hidden Adversaries
Introduction The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that …
Strategies for Defending Against Kill Chain Reconnaissance
Introduction Recent cyberattacks attributed to advanced persistent threat (APT) groups linked with nation-states have exposed their expanding capabilities when it …
Security Implications of Serverless Computing in the Cloud
Abstract The promise of easier development, scalability, and cost-effectiveness has made serverless computing quite popular in recent years. But this …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …