Bitcoin Account Hijacking Using OSINT Techniques
Analysis of data that comes purely from open sources could reveal a practical weakness of an algorithm that is the fundamental basis of secure internet communication, public key infrastructures, and cryptocurrency transactions.
Cyber Counter-Terrorism: Shutdown
Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …
New frontiers, new worlds, new threats
Where are you going?There.What time will you be back?I will be back soon. Mr.Cardoso Image created in midjourney Introduction Since …
Hacking Blockchain based APIs (W69)
Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.
The process of developing tactics with the purpose of preparing for a cyberwar
Who are the cyber military powers today? Cyber military defenses are being developed by most of the developed countries in …
PhoneInfoga - Advanced information gathering & OSINT framework for phone numbers
PhoneInfoga is one of the most advanced tools to scan international phone numbers. It allows you to first gather standard …
TBomb v2.1b An open-source SMS/call bomber for Linux And Termux.
NOTE: Due to the overuse of script, a bunch of APIs has been taken offline. It is okay if you …
Tool-X is a Kali Linux hacking tools installer for Termux and linux system
Tool-X was developed for Termux and other android terminals. Using Tool-X, you can install almost 370+ hacking tools in Termux …
Beast Bomber - SMS bomber, email spammer, WhatsApp spammer, Telegram spammer, Discord spammer and DoS attacker.
Beast Bomber in Telegram: https://t.me/beast_bomberr_bot (in development) Beast Bomber in GitLab: https://gitlab.com/ebankoff/Beast_Bomber See also: https://github.com/ebankoff/CleanerPRO Possibilities SMS spammer(works better with …
MOSINT - gather information about the target email
❓ What is MOSINT? MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. …
Osintgram is a OSINT tool on Instagram
Disclaimer: FOR EDUCATIONAL PURPOSE ONLY! The contributors do not assume any responsibility for the use of this tool. Warning: It …
hackingtool - All in One Hacking tool For Hackers
All in One Hacking tool For Hackers Your favorite tool is not in hackingtool or Suggestions Please CLICK HERE Update …
GHunt - Investigate Google Accounts with emails.
GHunt is a modulable OSINT tool designed to evolve over the years and incorporates many techniques to investigate Google accounts, …
OpenCTI - Open Cyber Threat Intelligence Platform
OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been …
HackBrowserData - Decrypt passwords/cookies/history/bookmarks from the browser
HackBrowserData is an open-source tool that could help you decrypt data (password|bookmark|cookie|history|credit card|downloads link) from the browser. It supports the …
Python Cheat sheet for hackers and developers
This cheat sheet is about Python. It is one of the most used high-level programming languages. Most coders prefer using …
VAmPI - Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
VAmPI is a vulnerable API made with Flask and it includes vulnerabilities from the OWASP top 10 vulnerabilities for APIs. …
Rekono - Execute full pentesting processes combining multiple hacking tools automatically
Rekono combines other hacking tools and their results to execute complete pentesting processes against a target in an automated way. …
Cyber Counter-Terrorism: Shutdown
Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …
New frontiers, new worlds, new threats
Where are you going?There.What time will you be back?I will be back soon. Mr.Cardoso Image created in midjourney Introduction Since …
The process of developing tactics with the purpose of preparing for a cyberwar
Who are the cyber military powers today? Cyber military defenses are being developed by most of the developed countries in …
Dynamic SQLIA Detection with PHP
Introduction We’re going to discuss a dynamic approach to detect an SQL Injection Attack (SQLIA) based on a static pattern …

Hacking Blockchain based APIs (W69)
Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.
Penetration testing OWASP Top 10 Vulnerabilities (W68)
OWASP Top 10 is the standard awareness for web application security and developers; it covers a broad area of most critical security risks to web application security. Almost every company adopts OWASP Top 10 approach to secure web applications and minimize the risks. Any penetration testers going to work within an organization need to follow the Top 10 to ensure application security and minimize the risks to the organization. This course is going to do the same in the practical scenario of how you can test for OWASP Top 10 vulnerabilities in more effective ways.
IoT Security - the DVID Challenge - NEW EDITION (W67)
IoT is a growing market and will be the future of our daily lives. Because of its emergence, there is no standard to steward the development process but many protocols and custom solutions to connect hardware to a cloud. Sometimes, a middleware (like smartphone application) could be encountered between hardware and cloud.
OSINT Fundamentals (W66)
This course focuses on Open-Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in: *Gaining a better understanding of OSINT techniques *Improving investigative skill set *Improving overall research methodology *Improving personal OPSEC OSINT is one of the key skills required for both Red and Blue Team jobs - if you want to put these skills in your resume with confidence, this course will help!
