HACKLIDO | Cyber Security
8.04K subscribers
161 photos
18 files
1.04K links
Hacklido – Cybersecurity & Hacking Community
⚡️ Daily Security Tips | OSINT | Bug Bounty | Pentesting
📜 Cheatsheets • Tools • Threat Intel • Cyber News
✍️ Learn • Blog • Grow Together

🧊 https://hacklido.com
Download Telegram
🔰 A Small Contribution From CyberXplore Presenting SubBuster An Subdomain #Enumeration #Tool Resolving Into Ip Address & Status Codes With Various Export Options . @hacklido

Visit -
https://subbuster.cyberxplore.com

More Features Coming Soon
- Directory Brute-forcing
- SubDomain Takeover Scanning
- Automated Sensitive Information Disclosure Lookup(With Our AI Based Model & Some Regex)
- Much More Don't Forget To Share !
🔰 Decrypting File encrypted by Monaca Plugin @hacklido

http://blog.rz.my/2020/12/decrypting-monaca-encrypt-plugin.html
🔰 #Apple Patches Tens of Code Execution Vulnerabilities in #mac OS @hacklido

http://feedproxy.google.com/~r/Securityweek/~3/Vyfzpsbhj6o/apple-patches-tens-code-execution-vulnerabilities-macos

Updates released this week by Apple for its macOS operating systems patch a total of 59 vulnerabilities, including roughly 30 that could lead to the execution of arbitrary code.
read more (
https://www.securityweek.com/apple-patches-tens-code-execution-vulnerabilities-macos)
🔰 #Nmap for Pentester: Host Discovery @hacklido
https://www.hackingarticles.in/nmap-for-pentester-host-discovery/

Nmap has become one of the most popular tools in network scanning by leaving other scanners behind. Many times the hosts in some organisations are secured using
#firewalls or intrusion prevention systems which result in the failure of #scanning due to the present set of rules which are used to block network traffic. In Nmap,... Continue reading →
The post Nmap for Pentester: Host Discovery (
https://www.hackingarticles.in/nmap-for-pentester-host-discovery/) appeared first on Hacking Articles (https://www.hackingarticles.in/).
🔰 #RAM - Generated #Wi-Fi Signals Allow Data Exfiltration From Air-Gapped Systems
@hacklido

http://feedproxy.google.com/~r/Securityweek/~3/s4lK4X-XQnU/ram-generated-wi-fi-signals-allow-data-exfiltration-air-gapped-systems

Covert Wi-Fi signals generated by DDR SDRAM
#hardware can be leveraged to exfiltrate data from air-gapped computers, a researcher claims.
read more
(
https://www.securityweek.com/ram-generated-wi-fi-signals-allow-data-exfiltration-air-gapped-systems)
🔰 Restler #Fuzzer : #API Fuzzing #Tool For Automatically Testing #Cloud Services @hacklido

https://kalilinuxtutorials.com/restler-fuzzer/

RESTler is the first stateful
#REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services. For a given cloud service with an OpenAPI/Swagger specification, RESTler analyzes its entire specification, and then generates and executes tests that exercise the service through its REST API. […]
The post Restler Fuzzer : API Fuzzing Tool For Automatically Testing Cloud Services (
https://kalilinuxtutorials.com/restler-fuzzer/) appeared first on Kali Linux Tutorials (https://kalilinuxtutorials.com/).
🔰 This overlooked feature in Visual Studio Code can speed release time @hacklido

http://techgenix.com/visual-studio-code-release-time/

Visual Studio Code is a big help when writing ARM templates. This Quick Tip spotlights a feature that can find problems before they cause headaches.
The post This overlooked feature in Visual Studio Code can speed release time (
http://techgenix.com/visual-studio-code-release-time/) appeared first on TechGenix (http://techgenix.com/).