Announcement
Collapse
No announcement yet.
Forums
Collapse
Collapse
Directory | Topics | Posts | Last Post |
---|---|---|---|
New User Area | |||
Presentation
Tell a bit about yourself. This is no replacement for your profile
Topics: 5
Posts: 5
Last Post:
New old member saying hi
|
5 | 5 | |
Suggestions
Suggestions & Change Requests
Topics: 2
Posts: 8
Last Post:
Moving "News" nearer to the top
|
2 | 8 | |
Security in General | |||
News
Public News & Hot Topics
Topics: 117
Posts: 137
|
117 | 137 |
![]()
by Resheph
04-06-2022, 09:52 PM
|
Terms & Subjects
These are Subjects that best stand alone.
Topics: 216
Posts: 216
Last Post:
DOS Obfuscation Part 3
|
216 | 216 | |
Law Considerations
Summary of Laws, Regulations and Directives
Topics: 13
Posts: 13
Last Post:
1996: U.S. Digital Millennium Copyright Act
|
13 | 13 | |
Cryptography
Cryptography, Cryptosystems, Algorithms etc
Topics: 9
Posts: 10
Last Post:
WiFi - Encryption Mechanisms
|
9 | 10 | |
Security Policies
Policy Examples & Considerations
Topics: 1
Posts: 1
Last Post:
Types of Security Policies
|
1 | 1 | |
Risk Assessment
CRAMM, SARAH, IS1 & IS2, VISART, Delphi, B.A.S.E. etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Penetration & Security Testing Methodology
EC-Counsil LPT, OSSTMM, OWASP, ISSAF etc.
Topics: 9
Posts: 11
Last Post:
Web Application Pentesting Methodology
|
9 | 11 | |
DDoS Attacks & Stresstesting
Booters, Bots & Related Topics
Topics: 4
Posts: 4
Last Post:
DoS - Mitigations
|
4 | 4 | |
IR - Incident Response
Subject revolving around IR such as detections, Usecases, Runbooks, EDR, pivoting and general investigations
Topics: 0
Posts: 0
|
0 | 0 |
|
HowTo guides
Guides that contain several tools & techniques and guides that just doesn't fit anywhere else.
Topics: 1
Posts: 1
|
1 | 1 | |
Links
Wordlists, Dictionaries, Passwords etc.
Topics: 16
Posts: 17
Last Post:
Links - Useful Powershell scripts
|
16 | 17 | |
Social Engineering & Physical Access | |||
Human-Based & Computer-Based
Interactions with People Face-to-Face, over the Phone, Phishing, Spear Phishing etc.
Topics: 16
Posts: 16
|
16 | 16 |
![]()
by Resheph
11-04-2017, 10:41 PM
|
Awareness Training
Training, Improving & Testing Employees about Security, Privacy etc.
Topics: 1
Posts: 1
Last Post:
Detecting Phishing Emails
|
1 | 1 | |
Physical & Non-Destructive Entry
Lockpicking, Security Control Bypass, Key Reuse, Cameras, Mantraps, Elevators, Alarm systems etc.
Topics: 13
Posts: 13
Last Post:
Physical Security - Fire Service Key Reuse
|
13 | 13 | |
Frameworks | |||
Exploitation & Scanning
Automated Exploitation & Scanning, Security Compliance Testing Frameworks
Topics: 1
Posts: 1
|
1 | 1 |
![]()
by Resheph
04-19-2017, 05:40 PM
|
Living Off the Land
Useful tools and tactics for RedTeaming existing in the OS or installed software.
Topics: 0
Posts: 0
|
0 | 0 |
|
Reporting Tools
Reporting & Information Management Tools for Pentesting, Forensic Investigation etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
SIEM/SOAR Platforms
Also MITRE ATT&CK, RE&CT and other related tools.
Topics: 0
Posts: 0
|
0 | 0 |
|
Security ISO/IEC Standards etc. | |||
PCI DSS
All about the PCI DSS from the PCI Security Standards Council
Topics: 1
Posts: 1
Last Post:
PCI DSS Overview
|
1 | 1 | |
ISO/IEC 27000 Series
ISMS Family of Standards - best practice recommendations on information security management, risks and controls.
Topics: 1
Posts: 1
Last Post:
ISO/IEC 27001:2013 Overview
|
1 | 1 | |
GDPR
The EU General Data Protection Regulation (GDPR)
Topics: 0
Posts: 0
|
0 | 0 |
|
STIGs
Security Technical Implementation Guides
Topics: 0
Posts: 0
|
0 | 0 |
|
Reverse Engineering | |||
OpCode
Reversing in Assembly
Topics: 0
Posts: 0
|
0 | 0 |
|
ByteCode
Reversing Microsoft Intermediate Language (MSIL)/Common Intermediate Language(CIL), Java Bytecode etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Malware Analysis
Anti-Decompilation, Anti-Debugging Techniques for ELF/PE files, Office documents etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Vulnerabilities & Research
Common Vulnerabilities and Exposures (CVE) & Technical Research
Topics: 1
Posts: 2
Last Post:
How to know about vulnerabilities?
|
1 | 2 | |
Hardware Hacking
UART, JTAG & other hardware related topics such as firmware hacking.
Topics: 0
Posts: 0
|
0 | 0 |
|
Debuggers
Tools for Debugging & Reverse Engineering in general
Topics: 0
Posts: 0
|
0 | 0 |
|
Programming | |||
Python
Examples, code samples, useful scripts, etc.
Topics: 2
Posts: 2
Last Post:
Python - TTY Shell Escape
|
2 | 2 | |
Ruby
Examples, code samples, useful scripts, Metasploit scripts, etc.
Topics: 3
Posts: 3
|
3 | 3 |
|
Perl
Examples, code samples, useful scripts, etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
C/C++
Examples, code samples, useful programs, etc.
Topics: 1
Posts: 1
Last Post:
C - Common source code for testing shellcode
|
1 | 1 | |
PowerShell
Examples, code samples, useful scripts, etc.
Topics: 1
Posts: 1
|
1 | 1 | |
Assembly Language
x86, x64, IA64, ARM/Thumb ISA code samples, shellcode etc.
Topics: 1
Posts: 1
Last Post:
Assembly - XOR & NOT decoder stub example
|
1 | 1 | |
Javascript & Ajax
JScript, Javascript, Ajax, XML & JSON including jQuery, Node.js etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
VBScript
Examples, code samples, useful scripts, etc.
Topics: 1
Posts: 1
|
1 | 1 | |
Bash Scripting
Examples, code samples, useful scripts, etc.
Topics: 3
Posts: 3
|
3 | 3 | |
Lua
Examples, code samples, useful scripts, namp NSE scripts, etc.
Topics: 1
Posts: 1
Last Post:
LUA - Example nmap NSE Script
|
1 | 1 | |
C#, .NET & .NET Core
Examples, code samples, useful scripts, etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
Java
Examples, code samples, etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
PHP
Examples, code samples, useful scripts, etc.
Topics: 2
Posts: 2
|
2 | 2 |
|
SQL
DDL (Data Definition Language), DML (Data Manipulation Language), DQL (Data Query Language), DCL (Data Control Language) & DTL (Data Transaction Language)
Topics: 2
Posts: 2
|
2 | 2 |
|
Forensics | |||
Microsoft Windows
UserAssist, Prefetcher, Registry, Deleted Files, Slack Space etc.
Topics: 1
Posts: 3
Last Post:
Detecting Trojans & Viruses
|
1 | 3 | |
Topics: 0
Posts: 0
|
0 | 0 |
|
Topics: 0
Posts: 0
|
0 | 0 |
|
Topics: 0
Posts: 0
|
0 | 0 |
|
Topics: 0
Posts: 0
|
0 | 0 |
|
Wireless Technologies | |||
Wireless 802.11
PSK & Enterprise Related Topics
Topics: 12
Posts: 12
Last Post:
WiFi - Honeyspot Attack
|
12 | 12 | |
Bluetooth
Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves at 2.45 GHz.
Topics: 1
Posts: 1
Last Post:
Hacking Bluetooth
|
1 | 1 | |
RFID Technologies
Radio-Frequency Identification Topics
Topics: 0
Posts: 0
|
0 | 0 |
|
Mobile Technologies
GSM, 3G, 4G etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Zigbee
Zigbee is a low-cost, low-power, wireless mesh network standard by Zigbee Alliance defining IEEE 802.15.4, ranging 10-20 meters.
Topics: 0
Posts: 0
|
0 | 0 |
|
Anonymity | |||
Anonymous Networks etc.
TOR, I2P, Proxychaining, VPNs etc.
Topics: 1
Posts: 1
Last Post:
HowTo - Create a Tor Hidden Service
|
1 | 1 | |
Online Behaviour etc.
Online Beaviour, Operating Systems Aiming at Anonymity etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Honeypots | |||
High & Low-Interaction
Code Collecting Systems & Systems for the Gathering of Methodologies
Topics: 1
Posts: 1
Last Post:
Honeypots
|
1 | 1 | |
Canaries
Users, files URLs, etc that are not supposed to be accessed, put in place to entice an attacker to investigate it and trigger an alert.
Topics: 0
Posts: 0
|
0 | 0 |
|
Networking | |||
Network & Host based IDS
NIDS & NIPS, HIDS & HIPS, WIPS etc.
Topics: 5
Posts: 5
Last Post:
IDS - Evasion Techniques using URL Encoding
|
5 | 5 | |
Theory of Networking
Information on the TCP/IP Protocol Suite etc.
Topics: 2
Posts: 2
Last Post:
ICMP Protocol Types & Codes
|
2 | 2 | |
Routing & Switching Security
Port Security, DHCP Snooping, IP Source Guard, Dynamic ARP Inspection (DAI), Source Routing, VRF etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Firewalls, Proxies & Other Devices
Software & Hardware Firewalls. Forwarding/Reverse Proxies, SSL/TLS inspection, TMG Devices, WAN Optimization, Load Balancers, VPN etc.
Topics: 4
Posts: 4
Last Post:
Firewall - Testing The Device
|
4 | 4 | |
Logging, SIEM & Log Analysis
Syslog and Log Analysis Software
Topics: 0
Posts: 0
|
0 | 0 |
|
Tools of the Trade | |||
Software Tools
Reconnaissance, footprinting, scanning, enumeration, crypters/encoders, backdoors, rootkits, tunneling, benchmarking etc.
Topics: 24
Posts: 24
Last Post:
Tool - Hashcat
|
24 | 24 | |
Hardware Tools
Devices such as the WiFi Pineapple, Bash Bunny, Lan Turtle, Rubber Ducky, NetHunter, USB Data Blockers etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Physical Tools
Tools for lockpicking, bypassing, shimming, bumping etc.
Topics: 0
Posts: 0
|
0 | 0 |
|
Server Administration & Hardening | |||
Linux
Managing the Linux Operating System Including SELinux.
Topics: 3
Posts: 3
Last Post:
Sharing a Bash Session
|
3 | 3 | |
Microsoft Windows
Managing the Microsoft Windows Operating System
Topics: 4
Posts: 4
|
4 | 4 | |
Unix
Managing the Unix Operating System
Topics: 0
Posts: 0
|
0 | 0 |
|
Authors Section | |||
Whitepapers & Small guides
Proofreading & Debate
Topics: 0
Posts: 0
|
0 | 0 |
|
Books & larger writings
Proofreading & Debate
Topics: 0
Posts: 0
|
0 | 0 |
|
Off Topic | |||
Smalltalk
A section for things not related to security.
Topics: 1
Posts: 1
Last Post:
Books worth reading
|
1 | 1 | |
Questions
General questions can be placed here
Topics: 1
Posts: 4
Last Post:
How do I stain a fence with brush?
|
1 | 4 | |
Various Challenges
Different Challenges will be posted here. These are for you to solve. Users may or may not be rewarded for solving these.
Topics: 2
Posts: 2
|
2 | 2 |
PosteXplo - Computer Security, Physical Security, Social Engineering & Hacking Statistics
Collapse
Topics: 514
Posts: 550
Members: 96
Active Members: 1
Welcome to our newest member, jamysen.
What's Going On
Collapse
There are currently 56 users online. 0 members and 56 guests.
Most users ever online was 2,730 at 11:58 PM on 03-25-2023.