Announcement
Collapse
No announcement yet.
Forums
Collapse
Collapse
Please log in to your account to view your subscribed posts.
Directory | Topics | Posts | Last Post |
---|---|---|---|
New User Area | |||
Presentation
Tell a bit about yourself. This is no replacement for your profile
Topics: 5
Posts: 5
Last Post:
New old member saying hi
|
5 | 5 | |
Suggestions
Suggestions & Change Requests
Topics: 2
Posts: 8
Last Post:
Moving "News" nearer to the top
|
2 | 8 | |
Security in General | |||
News
Public News & Hot Topics
Topics: 117
Posts: 137
|
117 | 137 |
![]()
by Resheph
04-06-2022, 09:52 PM
|
Terms & Subjects
These are Subjects that best stand alone.
Topics: 216
Posts: 216
Last Post:
DOS Obfuscation Part 3
|
216 | 216 | |
Law Considerations
Summary of Laws, Regulations and Directives
Topics: 13
Posts: 13
Last Post:
1996: U.S. Digital Millennium Copyright Act
|
13 | 13 | |
Cryptography
Cryptography, Cryptosystems, Algorithms etc
Topics: 9
Posts: 10
Last Post:
WiFi - Encryption Mechanisms
|
9 | 10 | |
Security Policies
Policy Examples & Considerations
Topics: 1
Posts: 1
Last Post:
Types of Security Policies
|
1 | 1 | |
Risk Assessment
CRAMM, SARAH, IS1 & IS2, VISART, Delphi, B.A.S.E. etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Penetration & Security Testing Methodology
EC-Counsil LPT, OSSTMM, OWASP, ISSAF etc.
Topics: 9
Posts: 11
Last Post:
Web Application Pentesting Methodology
|
9 | 11 | |
DDoS Attacks & Stresstesting
Booters, Bots & Related Topics
Topics: 4
Posts: 4
Last Post:
DoS - Mitigations
|
4 | 4 | |
IR - Incident Response
Subject revolving around IR such as detections, Usecases, Runbooks, EDR, pivoting and general investigations
Topics: 0
Posts: 0
|
0 | 0 |
|
HowTo guides
Guides that contain several tools & techniques and guides that just doesn't fit anywhere else.
Topics: 1
Posts: 1
|
1 | 1 | |
Links
Wordlists, Dictionaries, Passwords etc.
Topics: 16
Posts: 17
Last Post:
Links - Useful Powershell scripts
|
16 | 17 | |
Social Engineering & Physical Access | |||
Human-Based & Computer-Based
Interactions with People Face-to-Face, over the Phone, Phishing, Spear Phishing etc.
Topics: 16
Posts: 16
|
16 | 16 |
![]()
by Resheph
11-04-2017, 10:41 PM
|
Awareness Training
Training, Improving & Testing Employees about Security, Privacy etc.
Topics: 1
Posts: 1
Last Post:
Detecting Phishing Emails
|
1 | 1 | |
Physical & Non-Destructive Entry
Lockpicking, Security Control Bypass, Key Reuse, Cameras, Mantraps, Elevators, Alarm systems etc.
Topics: 13
Posts: 13
Last Post:
Physical Security - Fire Service Key Reuse
|
13 | 13 | |
Frameworks | |||
Exploitation & Scanning
Automated Exploitation & Scanning, Security Compliance Testing Frameworks
Topics: 1
Posts: 1
|
1 | 1 |
![]()
by Resheph
04-19-2017, 05:40 PM
|
Living Off the Land
Useful tools and tactics for RedTeaming existing in the OS or installed software.
Topics: 0
Posts: 0
|
0 | 0 |
|
Reporting Tools
Reporting & Information Management Tools for Pentesting, Forensic Investigation etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
SIEM/SOAR Platforms
Also MITRE ATT&CK, RE&CT and other related tools.
Topics: 0
Posts: 0
|
0 | 0 |
|
Security ISO/IEC Standards etc. | |||
PCI DSS
All about the PCI DSS from the PCI Security Standards Council
Topics: 1
Posts: 1
Last Post:
PCI DSS Overview
|
1 | 1 | |
ISO/IEC 27000 Series
ISMS Family of Standards - best practice recommendations on information security management, risks and controls.
Topics: 1
Posts: 1
Last Post:
ISO/IEC 27001:2013 Overview
|
1 | 1 | |
GDPR
The EU General Data Protection Regulation (GDPR)
Topics: 0
Posts: 0
|
0 | 0 |
|
STIGs
Security Technical Implementation Guides
Topics: 0
Posts: 0
|
0 | 0 |
|
Reverse Engineering | |||
OpCode
Reversing in Assembly
Topics: 0
Posts: 0
|
0 | 0 |
|
ByteCode
Reversing Microsoft Intermediate Language (MSIL)/Common Intermediate Language(CIL), Java Bytecode etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Malware Analysis
Anti-Decompilation, Anti-Debugging Techniques for ELF/PE files, Office documents etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Vulnerabilities & Research
Common Vulnerabilities and Exposures (CVE) & Technical Research
Topics: 1
Posts: 2
Last Post:
How to know about vulnerabilities?
|
1 | 2 | |
Hardware Hacking
UART, JTAG & other hardware related topics such as firmware hacking.
Topics: 0
Posts: 0
|
0 | 0 |
|
Debuggers
Tools for Debugging & Reverse Engineering in general
Topics: 0
Posts: 0
|
0 | 0 |
|
Programming | |||
Python
Examples, code samples, useful scripts, etc.
Topics: 2
Posts: 2
Last Post:
Python - TTY Shell Escape
|
2 | 2 | |
Ruby
Examples, code samples, useful scripts, Metasploit scripts, etc.
Topics: 3
Posts: 3
|
3 | 3 |
|
Perl
Examples, code samples, useful scripts, etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
C/C++
Examples, code samples, useful programs, etc.
Topics: 1
Posts: 1
Last Post:
C - Common source code for testing shellcode
|
1 | 1 | |
PowerShell
Examples, code samples, useful scripts, etc.
Topics: 1
Posts: 1
|
1 | 1 | |
Assembly Language
x86, x64, IA64, ARM/Thumb ISA code samples, shellcode etc.
Topics: 1
Posts: 1
Last Post:
Assembly - XOR & NOT decoder stub example
|
1 | 1 | |
Javascript & Ajax
JScript, Javascript, Ajax, XML & JSON including jQuery, Node.js etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
VBScript
Examples, code samples, useful scripts, etc.
Topics: 1
Posts: 1
|
1 | 1 | |
Bash Scripting
Examples, code samples, useful scripts, etc.
Topics: 3
Posts: 3
|
3 | 3 | |
Lua
Examples, code samples, useful scripts, namp NSE scripts, etc.
Topics: 1
Posts: 1
Last Post:
LUA - Example nmap NSE Script
|
1 | 1 | |
C#, .NET & .NET Core
Examples, code samples, useful scripts, etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
Java
Examples, code samples, etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
PHP
Examples, code samples, useful scripts, etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
SQL
DDL (Data Definition Language), DML (Data Manipulation Language), DQL (Data Query Language), DCL (Data Control Language) & DTL (Data Transaction Language)
Topics: 2
Posts: 2
|
2 | 2 |
|
Forensics | |||
Microsoft Windows
UserAssist, Prefetcher, Registry, Deleted Files, Slack Space etc.
Topics: 1
Posts: 3
Last Post:
Detecting Trojans & Viruses
|
1 | 3 | |
Topics: 0
Posts: 0
|
0 | 0 |
|
Topics: 0
Posts: 0
|
0 | 0 |
|
Topics: 0
Posts: 0
|
0 | 0 |
|
Topics: 0
Posts: 0
|
0 | 0 |
|
Wireless Technologies | |||
Wireless 802.11
PSK & Enterprise Related Topics
Topics: 12
Posts: 12
Last Post:
WiFi - Honeyspot Attack
|
12 | 12 | |
Bluetooth
Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves at 2.45 GHz.
Topics: 1
Posts: 1
Last Post:
Hacking Bluetooth
|
1 | 1 | |
RFID Technologies
Radio-Frequency Identification Topics
Topics: 0
Posts: 0
|
0 | 0 |
|
Mobile Technologies
GSM, 3G, 4G etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Zigbee
Zigbee is a low-cost, low-power, wireless mesh network standard by Zigbee Alliance defining IEEE 802.15.4, ranging 10-20 meters.
Topics: 0
Posts: 0
|
0 | 0 |
|
Anonymity | |||
Anonymous Networks etc.
TOR, I2P, Proxychaining, VPNs etc.
Topics: 1
Posts: 1
Last Post:
HowTo - Create a Tor Hidden Service
|
1 | 1 | |
Online Behaviour etc.
Online Beaviour, Operating Systems Aiming at Anonymity etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Honeypots | |||
High & Low-Interaction
Code Collecting Systems & Systems for the Gathering of Methodologies
Topics: 1
Posts: 1
Last Post:
Honeypots
|
1 | 1 | |
Canaries
Users, files URLs, etc that are not supposed to be accessed, put in place to entice an attacker to investigate it and trigger an alert.
Topics: 0
Posts: 0
|
0 | 0 |
|
Networking | |||
Network & Host based IDS
NIDS & NIPS, HIDS & HIPS, WIPS etc.
Topics: 5
Posts: 5
Last Post:
IDS - Evasion Techniques using URL Encoding
|
5 | 5 | |
Theory of Networking
Information on the TCP/IP Protocol Suite etc.
Topics: 2
Posts: 2
Last Post:
ICMP Protocol Types & Codes
|
2 | 2 | |
Routing & Switching Security
Port Security, DHCP Snooping, IP Source Guard, Dynamic ARP Inspection (DAI), Source Routing, VRF etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Firewalls, Proxies & Other Devices
Software & Hardware Firewalls. Forwarding/Reverse Proxies, SSL/TLS inspection, TMG Devices, WAN Optimization, Load Balancers, VPN etc.
Topics: 4
Posts: 4
Last Post:
Firewall - Testing The Device
|
4 | 4 | |
Logging, SIEM & Log Analysis
Syslog and Log Analysis Software
Topics: 0
Posts: 0
|
0 | 0 |
|
Tools of the Trade | |||
Software Tools
Reconnaissance, footprinting, scanning, enumeration, crypters/encoders, backdoors, rootkits, tunneling, benchmarking etc.
Topics: 24
Posts: 24
Last Post:
Tool - Hashcat
|
24 | 24 | |
Hardware Tools
Devices such as the WiFi Pineapple, Bash Bunny, Lan Turtle, Rubber Ducky, NetHunter, USB Data Blockers etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Physical Tools
Tools for lockpicking, bypassing, shimming, bumping etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Server Administration & Hardening | |||
Linux
Managing the Linux Operating System Including SELinux.
Topics: 3
Posts: 3
Last Post:
Sharing a Bash Session
|
3 | 3 | |
Microsoft Windows
Managing the Microsoft Windows Operating System
Topics: 4
Posts: 4
|
4 | 4 | |
Unix
Managing the Unix Operating System
Topics: 0
Posts: 0
|
0 | 0 |
|
Authors Section | |||
Whitepapers & Small guides
Proofreading & Debate
Topics: 0
Posts: 0
|
0 | 0 |
|
Books & larger writings
Proofreading & Debate
Topics: 0
Posts: 0
|
0 | 0 |
|
Off Topic | |||
Smalltalk
A section for things not related to security.
Topics: 1
Posts: 1
Last Post:
Books worth reading
|
1 | 1 | |
Questions
General questions can be placed here
Topics: 1
Posts: 4
Last Post:
How do I stain a fence with brush?
|
1 | 4 | |
Various Challenges
Different Challenges will be posted here. These are for you to solve. Users may or may not be rewarded for solving these.
Topics: 2
Posts: 2
|
2 | 2 |
Latest Topics
Collapse
There are no results that meet this criteria.
Trending
Collapse
There are no results that meet this criteria.
What's Going On
Collapse
There are currently 42 users online. 0 members and 42 guests.
Most users ever online was 2,730 at 11:58 PM on 03-25-2023.
Google Side ads
Collapse