xxx bookmarks: hacking - page: 1urn:uuid:{ACA057E7-3707-87C5-035B-3A30B88D8E66}2024-03-29T02:40:23ZBreaking down Reverse shell commands | Aditya Telange14204042023-05-20T08:42:01ZZ1xxxFlipper Zero — Portable Multi-tool Device for Geeks12219732022-08-01T15:03:54ZZ1xxxGitHub - mytechnotalent/Hacking-Windows: A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.10744882022-04-07T18:15:10ZZ1xxxthe_cyber_plumbers_handbook/cph_version_1.4_20210829.pdf at master · opsdisk/the_cyber_plumbers_handbook · GitHub10162222022-01-28T17:34:37ZZ1xxxGitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 9803972021-12-31T23:14:34ZZ1xxxO.MG Cable - * to USB-A - Hak57883202021-09-10T20:05:20ZZHacking cable with WiFi and keylogger1xxxRefined Blog7445982021-07-30T20:29:56ZZList of programming blogs and bloggers1xxxThe Full Story of the Stunning RSA Hack Can Finally Be Told | WIRED6841772021-05-27T17:55:36ZZ1xxxGitHub - ihebski/DefaultCreds-cheat-sheet: One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 4857962021-01-14T20:49:28ZZ1xxxCutter4382482020-11-21T20:12:30ZZFree and Open Source RE Reverse Engineering Platform powered by radare21xxxI'll Let Myself In: Tactics of Physical Pen Testers - YouTube2536792019-06-26T16:44:08ZZ1xxxGhidra - reverse engineering framework2438132019-03-09T19:24:09Z2021-08-01T10:37:25Z1xxxWeb Application Penetration Testing Cheat Sheet | JDow.io595082018-04-06T18:29:20ZZThis cheatsheet is intended to run down the typical steps performed when conducting a web application penetration test. I will break these steps down into sub-tasks and describe the tools I recommend using at each level.1xxxGitHub - vitalysim/Awesome-Hacking-Resources: A collection of hacking / penetration testing resources to make you better!397242017-11-02T15:44:53ZZAwesome-Hacking-Resources - A collection of hacking / penetration testing resources to make you better!1xxxפשיעה קיברנטית: מבט מבפנים | Newsgeek3822011-12-04T14:38:39ZZ1xxxWabLab - The house of web and application developers4322011-08-15T20:35:10ZZ1xxxDetecting Firefox Extensions | Primate Brow Flash4972011-06-06T05:20:38ZZ1xxx10K Apart | Inspire the web with just 10K.6372010-10-26T07:51:21ZZ1xxxBeta - Crictor8352010-01-24T15:56:40ZZ1xxxהפורום הישראלי לאבטחת מידע9152009-11-22T12:16:39ZZ1xxxXSS (Cross Site Scripting) Cheat Sheet11732008-01-25T12:40:18ZZ1xxxWeb Application Security Consortium - Web hacking Incidents Database (WHID) - The Web Hacking Incidents Database11822008-01-08T15:05:50ZZOfer Shezaf AppSec tracking1xxxTop 15 free SQL Injection Scanners - Security-Hacks.com12332007-05-20T21:29:25ZZ1xxxUndocumented CreateProcess13342006-08-29T09:48:46ZZ1xxxאתר אבטחת מידע ממשלתי13392006-08-24T08:46:36ZZ1xxxKeyBoard Hooks - The Code Project - DLLs13852006-04-29T21:19:50ZZ1xxxTrap CtrlAltDel; Hide Application in Task List on Win2000/XP - The Code Project - System13862006-04-29T21:17:50ZZ1xxxHow to Send Anonymous/Traceless Email » BlogIsEverything.com14052006-03-19T13:00:27ZZ1xxxYnet - דו"ח סימנטק: הווירוסים בירידה, גידול בפשיעה המקוונת - מחשבים14072006-03-14T17:31:46ZZ1xxxDetecting and Removing Trojans and Malicious Code from Win2K14082006-03-13T15:26:38ZZ1xxxBasic Computer Intrusion Detection and Forensics Checklist14092006-03-13T15:26:01ZZ1xxxCodeFromThe70s.org14132006-02-23T23:15:42ZZpoke game cracker - changes the game "money" in the ram1xxxComsec Consulting: Demonstrating the organizations operational risk map, emphasizing and mitigating risks14152006-02-22T11:12:01ZZ1xxxHow to hide your application from the Windows process list14192006-02-21T16:31:47ZZ1xxxNikto - sniffer for valunerabilities14572006-01-15T14:26:55ZZ1xxx2 Ways To Bypass Genuine Xp Update Protection14642006-01-10T08:08:03ZZ1xxxThe Ethical Hacker Network - Essential Wireless Hacking Tools14752005-12-14T16:39:20ZZ1xxxIWHAX - FAQ - and how to install14762005-12-13T18:48:13ZZ1xxxDecryptum - Open MS Word and MS Excel password protected files in seconds.14822005-12-08T10:46:55ZZ1xxxPassword Recovery Software, ElcomSoft14912005-12-02T15:56:59ZZ1xxxPassword Cracking Library (PCL)14932005-11-29T10:19:27ZZ1xxxNewOrder - computer security and networking portal14952005-11-29T10:16:35ZZ1xxxNirSoft - freeware utilities: password recovery, system utilities, desktop utilities14972005-11-29T06:55:37ZZ1xxx0day exploits15042005-11-24T15:53:06ZZ1xxxIE exploits 0day: remote code using bug in javascript window() object15052005-11-24T15:51:29ZZ1xxxrootkit.com15062005-11-23T16:18:53ZZ1xxxSysinternals Freeware - RootkitRevealer15072005-11-23T16:03:01ZZ1xxxThe Magic of magic byte15102005-11-20T15:47:17ZZ1xxxauto events macros for power point ppt and excel / word15132005-11-16T14:42:10ZZ1xxxinfecting files using packager15142005-11-16T10:09:21ZZ1xxx