Technical Devang


Kanal geosi va tili: ko‘rsatilmagan, Inglizcha
Toifa: Ta’lim


ᴍᴏʀᴇ ʏᴏᴜ sᴇᴀʀᴄʜ ᴍᴏʀᴇ ʏᴏᴜ ᴋɴᴏᴡ

instagram.com/technical_devang
Founder
🌐 protoncybersec.in
¯\_(ツ)_/¯
@Technicaldevang_bot

Связанные каналы

Kanal geosi va tili
ko‘rsatilmagan, Inglizcha
Statistika
Postlar filtri




Bug bounty Cheatsheet:


XSS
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list

SQLi
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md

SSRF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery

CRLF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection

CSV-Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection

Command Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection

Directory Traversal
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal

LFI
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion

XXE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md

Open-Redirect
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md

RCE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md

Crypto
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md

Template Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection

XSLT
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md

Content Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md

LDAP Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection

NoSQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection

CSRF Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection

GraphQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection

IDOR
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References

ISCM
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management

LaTex Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection

OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth

XPATH Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection

Bypass Upload Tricky
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files


CrossC2

Generate CobaltStrike's cross-platform payload:
   • Windows
   • Android
   • iOS
   • Linux
   • MacOS
   • Embedded

https://gloxec.github.io/CrossC2/en/






XSS to account takeover with cookie 🍪 stealer script.

')"


WHAT IF SOMEONE CREATE NUDES OF YOUR PHOTOS?


If your photo has been manipulated using AI or Photoshop to create nude and other explicit content, you can visit https://www.stopncii.org/ to report the incident.

By submitting the original and edited photos, they will ensure the edited version is removed from all online platforms.




50 penetration testing tools

1. Nmap 🌐
2. Metasploit 🛠
3. Burp Suite 🐛
4. Wireshark 🖥
5. OWASP ZAP (Zed Attack Proxy) 🛡
6. Nikto 🕵️‍♂️
7. SQLMap 🗺
8. Acunetix 🕷
9. Nessus 🚀
10. OpenVAS 🚪
11. BeEF (Browser Exploitation Framework) 🐄
12. Shodan 🔍
13. Wfuzz 🌀
14. DirBuster 🚪
15. XSStrike 💥
16. Sublist3r 🎯
17. Hydra 🐍
18. Skipfish 🐟
19. Recon-ng 🕵️‍♂️
20. Masscan 🛰
21. Gitrob 🕵️‍♂️
22. Gobuster 🔦
23. Joomscan 🕵️‍♂️
24. WPScan 🔍
25. EyeWitness 👀
26. Fiddler 🎻
27. sqlninja 🥷
28. Vega 🌟
29. Arachni 🕷
30. DirSearch 🔍
31. httrack 🏃‍♂️
32. CMSmap 🗺
33. DVWA (Damn Vulnerable Web Application) 😈
34. Docker Bench for Security 🐋
35. Amass 📈
36. Zed Attack Proxy 🛡
37. SonarQube 🛡
38. ClamAV 🦪
39. OSSEC 🔐
40. Tripwire 🛡
41. AIDE (Advanced Intrusion Detection Environment) 🛡
42. Fail2Ban 🚫
43. Lynis 🐧
44. Snort 🐽
45. Suricata 🦈
46. Security Onion 🧅
47. Maltego 🔄
48. Cobalt Strike 🌩
49. BloodHound 🩸
50. Empire 🏰
















BEST CHROME EXTENSIONS FOR HACKERS

1. Tamper Data

The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser.

2. Hackbar

The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs,

3. Open Port Check Tool

The Open Port Check Tool extension helps hackers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion.

4. Request Maker

Hackers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool.

5. Penetration Testing Kit

The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.




Awesome blogs on some popular topics of Cybersecurity

Checkout the below website for some amazing blogs on cybersecurity topics.
https://www.crackcodes.in/



20 ta oxirgi post ko‘rsatilgan.