Jump to content

BiosHell

Active Members
  • Content Count

    263
  • Joined

  • Last visited

  • Days Won

    5

BiosHell last won the day on May 28

BiosHell had the most liked content!

Community Reputation

130 Excellent

6 Followers

About BiosHell

  • Rank
    Active Member

Recent Profile Visitors

2122 profile views
  1. Small gem : https://www.dr-farfar.com Enjoy
  2. Honeybadger is a collection of Metasploit modules with a plugin to help automate Post-Exploitation actions on target systems using the Metasploit Framework. The content of the project can be placed in the .msf4 folder in the users home directory for use when Metasploit starts. Link : https://github.com/trustedsec/HoneyBadger
  3. Hack.me hosts a number of vulnerable apps and allows its community to build, host and share their vulnerable application code for educational and research purposes. Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with other members of similar interests. Hack This Site is more than just another hacker wargames site, it’s a living, breathing community with many active projects in development. Try2Hack provides several security oriented challenges for your entertainment. HackThis is a legal and safe network security resource where users test their hacking skills on various challenges and learn more about hacking. CTF365 allows you to defend your servers and launch attacks on others, all using the exact same techniques that work in the real world. OverTheWire helps you learn and practice security concepts in the form of fun-filled games. Hacking-Lab is providing CTF and mission style challenges for international competitions, like the European Cyber Security Challenge. Pwnable.kr is a non-commercial wargame site which provides various pwn challenges regarding system exploitation. SmashTheStack is a wargaming Network hosting several wargames. IO is a wargaming community with several free wargames available. Microcorruption is an embedded security CTF where you have to reverse engineer fictional Lockitall electronic lock devices. W3Challs is a penetration testing platform, which offers various computer challenges, in categories related to security: Hacking, Cracking, Wargame, Forensic, Cryptography, Steganography and Programming. PWN0 is the VPN where (almost) anything goes, that allows you to go up against pwn0bots or other users and score points by gaining root on other systems. Hellbound Hackers is a completely legal, web-based security training ground, offering challenges that teach you how computer based exploits work. Damn Vulnerable iOS App (DVIA) provides a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. Root Me allows you to practice your ethical hacking skills across a variety of scenarios. CTFtime is great resource to stay up-to-date on CTF events happening around the globe. WebGoat is an insecure app available for Windows, OS X Tiger and Linux and also runs in Java and .NET environments. Juice Shop is an insecure web application based on JavaScript for anyone that’s into coding or testing JavaScript but don’t understand the security issues that can arise. Hackademic is an OWASP open-source project and offers 10 realistic scenarios which are full of vulnerabilities Hackxor is a web app hacking game focusing on cross-site scripting, cross-site request forgery and SQL injection vulnerabilities. BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing. EnigmaGroup is designed for anyone that wishes to improve their security knowledge and hosts a wide variety of vulnerabilities Google Gruyere is designed for the absolute beginner to learn how hackers find security vulnerabilities, how they exploit web applications and how to protect applications from being exploited. Tools to legally practice your ethical hacking skills are not what’s missing on the web, and some really good ones are even free to use. Let us know if you’ve tried some other good ones and think they’d be a great addition to this list. Link : https://blog.elearnsecurity.com/free-resources-to-legally-practice-ethical-hacking.html?fbclid=IwAR1qJBUQoGjlQJXiOjJatb85nGl_FHwLg9_BZyq-qweg7fM615mo2TXpQ7M
  4. oferi ? ...sau cauti ?
  5. Link : https://www.itu.int/en/ITU-D/Regional-Presence/Europe/Pages/Events/2019/CyberDrill/ITU-Cyber-Drill-for-Europe-Region-.aspx The ITU Cyber Drill for Europe Region will be held from 27 to 31 May 2019 in Bucharest, Romania. Within the framework of the ITU Regional Initiative for Europe on Enhancing Trust and Confidence in the use of ICTs, adopted by the World Telecommunication Development Conference 2017 (WTDC-17) in Buenos Aires, this event will be organized by the Telecommunication Development Bureau (BDT) of the International Telecommunication Union (ITU) at the kind invitation of the Ministry of Communications and Information Society of Romania and will be held within the framework of the Romanian Presidency in the Council of the European Union. This capacity building exercise aims to enhance the communication and incident response capabilities of the participating teams as well as to ensure a continued collective effort in mitigating cyber threats among the regions' national Computer Incident Response Teams (CIRTs) and Computer Security Incident Response Teams (CSIRTs). The Cyber drill is open to national CIRTs/CSIRTs, ministries, regulators, telecommunication operators, universities and general education institutions, telecommunication equipment manufacturers, research and design institutes, software developers and other interested stakeholders of the ITU Member States, Sector Members and Associates. It is strongly recommended that at least two technical team members and one management level staff be present. This event has three key components, namely: Day 1 & 2: Two trainings Training Track I: CSIRT management by NRD Cyber Security Training II: Advanced training on Malware Analysis by FIRST Day 3: Open Conference on Cybersecurity Day 4 & 5: Cyberattack simulation exercises
  6. stiu man, ziceam ca seamana cu malone tipul asta #copt
  7. Sa inteleg ca ti-a raspuns din nou dealerul?
  8. Sursa : https://kalilinuxtutorials.com/bandit-security-issues/ Download Link : https://github.com/PyCQA/bandit Bandit is a tool designed to find common security issues in Python code. To do this it processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once it has finished scanning all the files it generates a report. It was originally developed within the OpenStack Security Project and later rehomed to PyCQA.
  9. guccifer....by day taximetrist...by night hacer quote : "is not a justice" Marcel Lazăr Lehel (born in 1971/1972) sursa Wikipedia Singurul om care a scos primul picior din vagina la 11:50 si al 2 lea la 00:10 ...doctorii fiind confuzi...au hotarat sa ii dea 2 zile de nastere
  10. adevaratul aismen e complet autostiutor...nimeni nu are ce sa il invete ....asta e quote Acum preda cursuri de offsec la Jilava
  11. traiasca cele 2 speakere si sound-blaster ul
  12. Si uite asa avanseaza AMD-ul ...abia astept sa iasa ultima nebunie....64 cores let the vm games begin
×
×
  • Create New...