H4x0r5 Playground
Follow
Find
47.3K views | +23 today
 
Scooped by 0xerror
onto H4x0r5 Playground
Scoop.it!

Cyber Attacks Explained: Network Sniffing - LINUX For You

Cyber Attacks Explained: Network Sniffing - LINUX For You | H4x0r5 Playground | Scoop.it
Let's focus on a wider hacking approach called network sniffing, something commonly used by prying hackers. We will look at a few tools typically used as sniffers and also figure out how to protect IT infrastructure from such attacks.
more...
No comment yet.
H4x0r5 Playground
Reading is knowledge, knowledge is power, power is to use it wisely.
Curated by 0xerror
Your new post is loading...
Your new post is loading...
Scooped by 0xerror
Scoop.it!

Security 101 - Algorithms

Security 101 - Algorithms | H4x0r5 Playground | Scoop.it
In this post we take a look at the encryption algorithms that are in common use today and those that are no longer in vogue. We’ll also see how encryption can be used both to obscure and to validate data and when you want to use one type of algorithm over another.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

isowall - Completely Isolate A Device From The Local Network - Darknet - The Darkside

isowall - Completely Isolate A Device From The Local Network - Darknet - The Darkside | H4x0r5 Playground | Scoop.it
isowall is a nifty tool if you are doing forensics, running a honeypot or just want to completely isolate a device from the local network.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

SQL Injection Tutorial: Tackling SQLi with Source Code Analysis - Checkmarx.com

SQL Injection Tutorial: Tackling SQLi with Source Code Analysis - Checkmarx.com | H4x0r5 Playground | Scoop.it
The SQL injection has been in the headlines for years. But developers today can use Source Code Analysis (SCA) to eliminate the SQLi vulnerability.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Linux Commands In Structured Order with Detailed Reference | LinOxide

Linux Commands In Structured Order with Detailed Reference | LinOxide | H4x0r5 Playground | Scoop.it
A guide that includes all the most required Linux commands. There is a reference page to each command for its detailed explanation..
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Arch Linux Cheat Sheet

Arch Linux Cheat Sheet | H4x0r5 Playground | Scoop.it
When it comes to administering servers, even Windows servers, Linux is a much better choice in my opinion.  Many of the tools needed come pre-installed and are generally of a higher quality then th...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Google Dorks For SQL Injection - 1337 MiR

Google Dorks For SQL Injection - 1337 MiR | H4x0r5 Playground | Scoop.it
1500+ google Dorks for sql injection.; Definition of google dorks: Advanced Google searches used to find security loopholes on websites and allow hackers to break in to or disrupt the site.; allinurl:*.php?txtCodiInfo=; inurl:read.php?=; inurl:"ViewerFrame?Mode="; inurl:index.php?id=; inurl:trainers.php?id=; inurl:buy.php?category=; inurl:article.php?ID=; inurl:play_old.php?id=
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

XSS, SQL Injection and Fuzzing Bar Code Cheat Sheet

XSS, SQL Injection and Fuzzing Bar Code Cheat Sheet | H4x0r5 Playground | Scoop.it
Irongeek's Information Security site with tutorials, articles and other information.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

How to access Linux command cheat sheets from the command line

How to access Linux command cheat sheets from the command line | H4x0r5 Playground | Scoop.it
The power of Linux command line is its flexibility and versatility. Each Linux command comes with its share of command line options and parameters. Mix and match them, and even chain different commands with pipes and redirects. You get yourself literally hundreds of use cases even with a few basic commands, and it's hard even …Continue reading...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

How to Write a Twitter Bot in 5 Minutes

How to Write a Twitter Bot in 5 Minutes | H4x0r5 Playground | Scoop.it
This step-by-step tutorial explains how you can create your own Twitter bot using Google Scripts and the new Twitter API. The bot runs inside the Google cloud.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

From SQL Injection To 0wnage Using SQLMap - Checkmate

From SQL Injection To 0wnage Using SQLMap - Checkmate | H4x0r5 Playground | Scoop.it
SQL injection - one of the most critical vulnerabilities till now -is still included in the OWASP Top 10 list’s Injection flaws section. SQLMap is a tool that helps penetration testers prove that SQL injection is one the most critical vulnerabilities present in enterprise security.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Good PenTest Report Writing

Good PenTest Report Writing | H4x0r5 Playground | Scoop.it
I got a ping from a reader who apparently is a big fan of a previous article I wrote on bad penetration testing (the famous Scumbag Penetration ...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Simple yet Effective Methods to Solve Java Security Issues - InfoSec Institute

Simple yet Effective Methods to Solve Java Security Issues - InfoSec Institute | H4x0r5 Playground | Scoop.it
It is true that Java cannot take credit in being among the safest options to use online, due to the vulnerabilities that emerge within its applications on
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

mitmprotector released – Protects from arpspoofing and Man in the Middle Attacks.

mitmprotector released – Protects from arpspoofing and Man in the Middle Attacks. | Security List Network™
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

explainshell.com - match command-line arguments to their help text

match command-line arguments to their help text
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

@unixfreaxjp unlocked tons of hidden research video in youtube

@unixfreaxjp unlocked tons of hidden research video in youtube | H4x0r5 Playground | Scoop.it
Video explains more than words. These are my private video channel contains of good videos that worth to share. Some I made it myself, some are not. Seeing s...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

How to turn Vim into a full-fledged IDE

How to turn Vim into a full-fledged IDE | H4x0r5 Playground | Scoop.it
If you code a little, you know how handy an Integrated Development Environment (IE) can be. Java, C, Python, they all become a lot more accessible when the IDE software is checking the syntax for you, compiling in the background, or importing the libraries you need. On the other hand, if you are on Linux, …Continue reading...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Browser Extension Brings Encrypted Messaging to Facebook, Twitter, and Any Other Website | MIT Technology Review

Browser Extension Brings Encrypted Messaging to Facebook, Twitter, and Any Other Website | MIT Technology Review | H4x0r5 Playground | Scoop.it
A new tool brings simple encrypted messaging to any webmail or social networking site.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Update: XORSearch With Shellcode Detector

Update: XORSearch With Shellcode Detector | H4x0r5 Playground | Scoop.it
XORSearch allows you to search for strings and embedded PE-files brute-forcing different encodings. Now I added shellcode detection. This new version of XORSearch integrates Frank Boldewin's shellc...
more...
No comment yet.