详情

全站展示位

Server Side JavaScript Injection with NodeXP (Usage Example, SSJI, Metasploit) | CYBERPUNK

Server Side JavaScript Injection with NodeXP: A quick & practical SSJI example and a system takeover (metasploit), for the sake of Cybersecurity awareness.。。。

推荐

Symbolic Execution ToolManticore | CYBERPUNK

Manticore: Symbolic Execution Tool with command line interface which can be used to easily symbolically execute a supported program/smart contract. It's ...

The Fastest TCP Port ScannerMasscan | CYBERPUNK

Masscan: very fast TCP Port Scanner, which can scan the entire Internet in under 6 minutes, transmitting 10 million packets/s. Similar to nmap, zmap, scan..

Automatic SQL Injection and DB Takeover ToolSQLmap | CYBERPUNK

SQLMap: Open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database serve...

心灵鸡汤

小故事、三个金人

  曾经有个小国到中国来,进贡了三个一模一样的金人,金碧辉煌,把皇帝高兴坏了。可是这小国不厚道,同时出一道题目:这三个金人哪个最有价值?

  皇帝想了许多的办法,请来珠宝匠检查,称重量,看做工,都是一模一样的。怎么办?使者还等着回去汇报呢。泱泱大国,不会连这个小事都不懂吧?

  最后,有一位退位的老大臣说他有办法。

  皇帝将使者请到大殿,老臣胸有成足地拿着三根稻草,插入第一个金人的耳朵里,这稻草从另一边耳朵出来了。第二个金人的稻草从嘴巴里直接掉出来,而第三个金人,稻草进去后掉进了肚子,什么响动也没有。老臣说:第三个金人最有价值!使者默默无语,答案正确。

  心得:最有价值的人,不一定是最能说的人的人。老天给我们两只耳朵一个嘴巴,本来就是让我们多听少说的。善于倾听,才是成熟的人最基本的素质。

列表展示

主站展示位

Let's Encrypt Free SSL podešavanjeNginx (Ubuntu 18.04) | CYBERPUNK

Kratak tutorial sa osnovnim koracima za Free SSL podešavanje Let’s encrypt sertifikata na Ubuntu 18.04 serveru koji se oslanja na Nginx web server.

Wireless Security Protocols: WEP, WPA, WPA2 and WPA3 | CYBERPUNK

Wireless Security Protocols: WEP, WPA, WPA2 and WPA3: A very short overview of Wireless Security Protocols. For each of them we'll try to point out both ...

pwndrop: Self-deployable File Hosting Service | CYBERPUNK

Pwndrop - Self-hosting Your Red Team Payloads: Pwndrop is a self-deployable file hosting service which allows to easily upload and transfer payloads over...

Packet Squirrel [Hak5] | CYBERPUNK

The Packet Squirrel [Hak5] is a nifty little pocket-sized MiTM multi-tool that simplifies Ethernet exploits, provides remote access, VPN based secure conn..

Lock Picking Tools | CYBERPUNK

Lock Picking Tools: It's well-known that the lock picking represents one of the basic elements in hacker culture, but why? It's simple. Physical lock pic...

YARD Stick One | Yet Another Radio Dongle | CYBERPUNK

YARD Stick One - Yet Another Radio Dongle: Sub-1 GHz wireless transceiver, created by Mike Ossmann of Great Scott Gadgets, which can be controlled from ...

Buffer Overflow [Linux, GDB] | CYBERPUNK

Buffer Overflow [Linux, GDB]: Buffer overflow attack is a great example of how simple software "anomaly" can lead to complete system vulnerablity. This is..

DDoor: Cross-platform Backdoor Using DNS txt Records | CYBERPUNK

DDoor - Cross-platform Backdoor Using DNS txt Records: An advanced multi-platform tool that allows you to use DNS txt records when executing command-based..

CYBERPUNK | The Best Tutorials & CyberSecurity Tool Reviews

CyberPunk: The Best Tutorials & CyberSecurity Tool Reviews. Get informed about the latest ethical hacking and cybersecurity tool releases. Read Cyberpunk's ethical hacking tutorials/articles and watch usage videos...

Hacktronian: Hacking Suite for Linux | CYBERPUNK

Hacktronian - Hacking Suite for Linux: Hacktronian is an all in one hacking suite for Linux and Android. It contains tools for different phases from wifi..

Wireless Security Protocols: WEP, WPA, WPA2 and WPA3 | CYBERPUNK

Wireless Security Protocols: WEP, WPA, WPA2 and WPA3: A very short overview of Wireless Security Protocols. For each of them we'll try to point out both ...

King PhisherPhishing Campaign Toolkit | CYBERPUNK

King Phisher - Phishing Campaign Toolkit: A tool for testing and promoting user awareness by simulating real world phishing attacks. Its flexible architec..

CYBERPUNK | The Best Tutorials & CyberSecurity Tool Reviews

CyberPunk: The Best Tutorials & CyberSecurity Tool Reviews. Get informed about the latest ethical hacking and cybersecurity tool releases. Read Cyberpunk's ethical hacking tutorials/articles and watch usage videos...

Kako poboljšati brzinu učitavanja web stranice | CYBERPUNK

Gornja granica učitavanja stranice iznosi do 2 sekunde, a idealna između 0.5-1 sekunde. Evo nekoliko saveta kako poboljšati brzinu učitavanja web stranice.

Hacker Stories | CYBERPUNK

Hackers stories featuring real experiences, personal endeavours, humble beginnings or terrible endings. Read or leave your own..

Wireshark: v3.1.2rc0 | CYBERPUNK

Wireshark-3.1.2 Released! Build 3.1.2. Read directly related posts about WireShark - A Well Known Network Protocol Analyzer. To download the latest releas..

Bettercap: 2.24.1 | CYBERPUNK

Bettercap 2.24.1 - Fixes: correctly setting the RemoteAddr field of a proxied request; fixed a nil pointer dereference in the

Kako povezati Bootstrap sa WordPress temom | CYBERPUNK

Kratko upuststvo: Kako povezati Bootstrap sa WordPress temom. Postoje tri standardna načina na koji možete povezati Bootstrap, ali ovde su prikazana dva...

Bash Bunny [Hak5] | CYBERPUNK

Bash Bunny is a simple and powerful multi-function USB attack device and automation platform for all pentesters and sysadmins which allows you to easily p..

博客寄语:

    CyberPunk: The Best Tutorials & CyberSecurity Tool Reviews. Get informed about the latest ethical hacking and cybersecurity tool releases. Read Cyberpunk's ethical hacking tutorials/articles and watch usage videos...

实时播报:

博客号-学习成长

相信每一分耕耘都有每一分收获,致力帮助博客主所创作的博客能更快的被收录! 如果有其它需求,可联系下方邮箱。