Text
InsecureShip Walkthrough - Writeup
About the walkthrough/writeup Repo: https://github.com/TheCyberpunker/InsecureShip/blob/main/Walkthrough%20-%20Writeup.md The following analysis presents a possible approach to identifying and mitigating certain vulnerabilities observed in the application. It should not be interpreted as a definitive guide or an official security recommendation. Rather, it is intended as an educational…
0 notes
Text
InsecureShip
InsecureShip is a deliberately vulnerable REST API built with Node.js that simulates a shipping and package delivery management platform. This basic and minimalist project was created for educational purposes only to demonstrate common API security vulnerabilities and misconfigurations in an easy-to-understand format. The application features different access levels (Customer, Employee, Manager,…
0 notes
Text
Tool: reNgine - Optimal installation
reNgine is your ultimate web application reconnaissance suite, designed to supercharge the recon process for security pros, pentesters, and bug bounty hunters. It is go-to web application reconnaissance suite that’s designed to simplify and streamline the reconnaissance process for all the needs of security professionals, penetration testers, and bug bounty hunters. Source:…
0 notes
Text
Tool: houseHole - Private disposable email
Househole Househole is a self-hosted solution designed to centralize your trashmail, disposable-emails or temporary email services, offering a robust alternative to public temporary email providers. Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails. Key Features Self-Hosted Privacy: Complete control over your…
0 notes
Text
Tool: Maigret OSINT
Maigret – OSINT Tool collects a dossier on a person by username only, checking for accounts on a huge number of sites and gathering all the available information from web pages. No API keys required. Maigret is an easy-to-use and powerful fork of Sherlock. Currently, supported more than 3000 sites (full list), search is launched against 500 popular sites in descending order of popularity by…
View On WordPress
1 note
·
View note
Text
Tool: BlackStone Project 2.0 - Reporting
BlackStone project or “BlackStone Project” is a reporting tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting. In this tool we can register in the database the vulnerabilities that we find in the audit, classifying them by internal, external audit or wifi, in addition, we can put your description and recommendation, as well as…
View On WordPress
0 notes
Text
cve-maker
cve-maker is a hub for finding CVEs and exploits. It is based on the official NIST, ExploitDB and Github databases. The tool makes it quick and easy to search for CVEs and their associated exploits. It is able to detect exploit compilation options. It can also be used to list the latest critical vulnerabilities. Source: https://github.com/msd0pe-1/cve-maker

View On WordPress
0 notes
Text
Neo & Trinity
The Matrix (1999) dir. Wachowskis
938 notes
·
View notes
Text
Ciberseguridad y Privacidad para Influencers
En un mundo lleno de riesgos tanto físicos como informáticos, la integridad, disponibilidad y confidencialidad de nuestros datos son uno de los desafíos más críticos. Estos factores no solo impactan nuestra privacidad, sino que también afectan nuestra imagen frente al público. La presente guía se centra específicamente en tips/consejos fundamentales para influencers, aquellos que buscan…
View On WordPress
0 notes
Text
Certificaciones y Cursos de Ciberseguridad Gratis
Nota: esta publicación se actualizará cada mes con nuevos cursos y contenido. En el vasto e intrincado paisaje del mundo digital actual, el ámbito de la ciberseguridad se erige como el guardián de nuestras fronteras digitales. Como custodios de la integridad de la información, los profesionales de la ciberseguridad tienen la crucial misión de fortalecer nuestros dominios en línea contra las…
View On WordPress
0 notes
Text
Free Cybersecurity Certifications and Courses
In the vast and intricate landscape of today’s digital world, the realm of cybersecurity serves as the guardian of our digital frontiers. As custodians of information integrity, cybersecurity professionals have the crucial mission of fortifying our online domains against evolving threats. For those determined not only to face but to surpass the challenges of this dynamic field, a strategic…
View On WordPress
#cybersecurity #hacking #pentesting #bugbounty
0 notes