
Reconshell
@reconshell
Followers
3K
Following
153
Media
8
Statuses
1K
Reconshell - Our tutorials, case studies, Ethical Hacking, Penetration Testing Tools will prepare you for the upcoming, potential threats in the cyber security
India
Joined August 2020
WordPress Social Login and Register Authentication Bypass. #AuthenticationBypass #WordPress #Exploit #Malware #Vulnerability.#Hacking #Bugbounty #RedTeam #bugs #CVE-2023-2982 #Nuclei.
reconshell.com
The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to,
0
0
7
Wireless Pentesting Cheat Sheet. #OSWP #Wireless #Pentesting #OffensiveSecurity.#WiFi #Hacking #Vulnerability #KaliLinux #Exploit.#VAPT #Malware #BugBounty #RedTeam #WiFiHack.
reconshell.com
This repository was originally made as a CheatSheet for OSWP Examination by Offensive Security. With the time, Offensive Security made an second version of
0
0
1
Kali Linux Cheat Sheet. #Kali #Linux #vulnerability #Metasploit #Scanner .#payload #Cryptography #Hacking #SQLMap #Exploit .#Malware #Enumeration #Powershell #BugBounty #VAPT. @Emrullah_A @D3pak .
reconshell.com
Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it
0
0
3
Data Science Interview Preparation Resources. #DataScience #MachineLearning #SQL #ML.#ArtificialIntelligence #DeepLearning #AI. @Emrullah_A @D3pak .
reconshell.com
The Data Science Interview is a github repository by Youssef Hosni
1
2
3
Foundations of Linux Debugging eBook. #Linux #Hacking #Maleare #Exploit #Debug . @Emrullah_A @D3pak .
reconshell.com
Dmitry Vostokov is an internationally recognized expert, speaker, educator, scientist, and author. He is the founder of the patternoriented software
0
2
8
Tools and Techniques for Red Team. #PenetrationTesting #RedTeam #BlueTeam #Hacking #VAPT.#Exploit #Malware #Bugbounty #OSINT #Vulnerability #APT.#InfoSec #Appsec #PrivilegeEscalation #LateralMovement . @Emrullah_A @D3pak .
reconshell.com
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.
0
4
14
Process Injection Enumeration Tool. #OffensiveSecurity #payloads #Vulnerability #VAPT.#RedTeam #Blueteam #ProcessInjection #Enumeration.#Bugbounty #Infosec #Appsec #Hacking #Cyber #APT. @Emrullah_A @D3pak .
reconshell.com
Wanderer is an open-source program that collects information about running processes. This information includes the integrity level, the presence of the AMSI
0
1
6
RTSP Simple Server. #RTSP #Server #WebServer #ProxyServer.#RTSPSimpleServer #RaspberryPi #HTTPServer. @Emrullah_A @D3pak .
0
0
6
XRAY GUI Starter Web Vulnerability Scanner. #Vulnerability #Scanner #Bugbounty #RedTeam #VAPT.#Pentesting #Exploit #Malware #BlueTeam #Infosec.#Appsec #OSINT #Hacking #APT #Cyber #Security. @Emrullah_A @D3pak .
reconshell.com
xray is an excellent web vulnerability scanning tool, But only the command line version, Start via config.yaml file. In many cases, it is difficult to get
0
1
4
Intelligent Mobile Malware Detection. #cyber #security #Spyware #Mobile #Malware #Android.#Vulnerability #Exploit #Virus #Infosec #Appsec #VAPT.#Bugbounty #Hacking #APT #attacks #Pentesting #OSINT. @Emrullah_A @D3pak .
reconshell.com
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The
0
0
4
Tor based shared web hosting. #WebHosting #SharedHosting #VPS #DedicatedServer.#CloudHosting #VPShosting #SecuredHosting . @Emrullah_A @D3pak .
0
0
4
Web Application Firewall fingerprinting tool. #fingerprinting #WAF #Firewall #Hacking #Pentesting.#Infosec #Appsec #Exploit #Malware #Bugbounty #VAPT.#Vulnerability #RedTeam #BlueTeam #OSINT #Wafw00f . @Emrullah_A @D3pak .
reconshell.com
To run the tool on a target, just use the following command.
0
1
3
Local Privilege Escalation Vulnerability. #PrivalegeEscalation #vulnerability #Exploit #VAPT #LPE.#DCOMPotato #Bugbounty #Redteam #BlueTeam #Malware #APT.#Appsec #Microsoft #Hacking #infosec #Windows #Pentesting. @Emrullah_A @D3pak .
reconshell.com
Exploit collection for some Service DCOM Object local privalege escalation vulnerability(by SeImpersonatePrivilege abuse)
0
2
4
Athena OS Distro focused on Cybersecurity. #Cybersecurity #AthenaOS #Pentesting #InfoSec #Appsec.#BugBounty #Hacking #Vulnerability #Malware #Exploit.#RedTeam #BlueTeam #VAPT #OffensiveSecurity #Cyber. @Emrullah_A @D3pak .
reconshell.com
Athena is a Arch Linux-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool! Born for InfoSec Professionals, Bug Bounty
0
4
4