A list of hardware crypto wallets for use in digital forensics.
▫️https://github.com/INTERPOL-Innovation-Centre/HardwareWallets_DF_List
▫️https://github.com/INTERPOL-Innovation-Centre/HardwareWallets_DF_List
GitHub
GitHub - INTERPOL-Innovation-Centre/HardwareWallets_DF_List: List of Hardware Wallets for Digital Forensics
List of Hardware Wallets for Digital Forensics. Contribute to INTERPOL-Innovation-Centre/HardwareWallets_DF_List development by creating an account on GitHub.
Proxy list Http Https Proxies Auto-updated
#free #Proxy #virtualhumint #osintil
https://proxylist.fatezero.org/
https://github.com/rdavydov/proxy-list
https://github.com/mmpx12/proxy-list
https://github.com/monosans/proxy-list
https://github.com/TheSpeedX/PROXY-List
#free #Proxy #virtualhumint #osintil
https://proxylist.fatezero.org/
https://github.com/rdavydov/proxy-list
https://github.com/mmpx12/proxy-list
https://github.com/monosans/proxy-list
https://github.com/TheSpeedX/PROXY-List
GitHub
GitHub - rdavydov/proxy-list: proxy list that updates every 30 minutes
proxy list that updates every 30 minutes. Contribute to rdavydov/proxy-list development by creating an account on GitHub.
1. haveibeenpwned.com — check in leaked databases
2. emailrep.io — find websites where account has been registered by email
3. dehashed.com — checking mail in leaked databases
4. @Smart_SearchBot — find full name, DoB, address and phone number
5. pwndb2am4tzkvold.onion — search in pwndb, also search by password
6. intelx.io — multifunctional search engine, the search is also carried out on the darknet
7. @mailsearchbot — search in database, gives password partially
8. @shi_ver_bot — breached passwords
9. @info_baza_bot — show from what base mail leaked, 2 free scans
10. leakedsource.ru — show from what base mail leaked
11. mostwantedhf.info — find skype account
12. email2phonenumber (t) — automatically collects data from account recovery pages, and finds the phone number
13. spiderfoot.net (r) — automatic search using a huge number of methods, tool available in the cloud with registration
14. reversegenie.com — find location, first letter of the name and phone numbers
15. @last4mailbot — bot will find the last 4 digits of the Sberbank client’s phone number
16. searchmy.bio — find instagram account with email in description
17. leakprobe.net — it will find nickname and source of leaked database
18. Leakpoint.com - It will give you every thing whatever you wants that's why its in last because it never dehope people
2. emailrep.io — find websites where account has been registered by email
3. dehashed.com — checking mail in leaked databases
4. @Smart_SearchBot — find full name, DoB, address and phone number
5. pwndb2am4tzkvold.onion — search in pwndb, also search by password
6. intelx.io — multifunctional search engine, the search is also carried out on the darknet
7. @mailsearchbot — search in database, gives password partially
8. @shi_ver_bot — breached passwords
9. @info_baza_bot — show from what base mail leaked, 2 free scans
10. leakedsource.ru — show from what base mail leaked
11. mostwantedhf.info — find skype account
12. email2phonenumber (t) — automatically collects data from account recovery pages, and finds the phone number
13. spiderfoot.net (r) — automatic search using a huge number of methods, tool available in the cloud with registration
14. reversegenie.com — find location, first letter of the name and phone numbers
15. @last4mailbot — bot will find the last 4 digits of the Sberbank client’s phone number
16. searchmy.bio — find instagram account with email in description
17. leakprobe.net — it will find nickname and source of leaked database
18. Leakpoint.com - It will give you every thing whatever you wants that's why its in last because it never dehope people
❤4
Mind Maps
Collection of mind maps for pentesters, bug bounty hunters and other cybersecurity professionals.
Mobile Security Mindmap
Web App Pentest
Nmap Scanc Mindmap
Cross Site Request Frogery Mindmap
and much more
https://github.com/imran-parray/Mind-Maps
Collection of mind maps for pentesters, bug bounty hunters and other cybersecurity professionals.
Mobile Security Mindmap
Web App Pentest
Nmap Scanc Mindmap
Cross Site Request Frogery Mindmap
and much more
https://github.com/imran-parray/Mind-Maps
❤2
Murphy Oil Corporation, a $6billion company based in the U.S.
Included in the leak is reports and information on their employees such as emails, names, departments, vehicle information, etc!
https://anonfiles.com/abz1K7l5z8/Murphy_Oil_Corporation_zip
Included in the leak is reports and information on their employees such as emails, names, departments, vehicle information, etc!
📓 Hacking APIs: Breaking Web Application Programming Interfaces.
📌 Download.
https://t.iss.one/+6QMXyHWJRCQ2ZDNh
#Eng #GraphQL #API #Web #OWASP #Hack
• You’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you’ll learn to perform common attacks, like those targeting an API’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You’ll also learn techniques for bypassing protections against these attacks.📌 Download.
https://t.iss.one/+6QMXyHWJRCQ2ZDNh
#Eng #GraphQL #API #Web #OWASP #Hack
❤1
Communication Tools
• Adobe Connect
• AnyDesk
• AnyMeeting
• BeamYourScreen
• Blackboard
• blind
• Campfire
• Digital Samba
• Discourse
• eBLVD
• Ekiga
• Encrypted Cloud
• Exo Platform
• FaceFlow
• Fleep
• Flowdock
• FreeConferenceCall
• FreeScreenSharing
• Friends
• Glance
• GoToMeeting
• Highfive
• Icq
• iLinc
• Infinite
• Intercall
• iWowWe
• Jitsi
• Join.me
• Jostle
• Lets Chat
• lifesize
• Linphone
• Live Conference Pro
• Lucid Meetings
• LumoFlow
• Mashme tv
• MeetingOne
• MeWe
• mikogo
• mobilimeet
• MyBB
• omNovia
• ooVoo
• Personify
• PGi iMeet
• Phorum
• Polycom
• Quicktopic
• ReadyTalk
• RingCentral
• Rocket.Chat
• screenleap
• Sharetronix
• Signal
• Simple Signal
• Skarpline
• Skype
• Slack
• Socialtext
• StartMeeting
• Talky
• Teamviewer
• Telegram - is a secure and fast cloud-based mobile and desktop messaging platform.
• Tibbr
• Tixeo
• Toc
• TrueConf
• Twchat
• Vanilla Forums
• Veeting rooms
• VeriShow
• Viadesk
• VideoLink2
• Vivicom
• Webex
• WhatsApp
• Zeetings
• Zoho Meeting
• Zoom
• Zulip
• Adobe Connect
• AnyDesk
• AnyMeeting
• BeamYourScreen
• Blackboard
• blind
• Campfire
• Digital Samba
• Discourse
• eBLVD
• Ekiga
• Encrypted Cloud
• Exo Platform
• FaceFlow
• Fleep
• Flowdock
• FreeConferenceCall
• FreeScreenSharing
• Friends
• Glance
• GoToMeeting
• Highfive
• Icq
• iLinc
• Infinite
• Intercall
• iWowWe
• Jitsi
• Join.me
• Jostle
• Lets Chat
• lifesize
• Linphone
• Live Conference Pro
• Lucid Meetings
• LumoFlow
• Mashme tv
• MeetingOne
• MeWe
• mikogo
• mobilimeet
• MyBB
• omNovia
• ooVoo
• Personify
• PGi iMeet
• Phorum
• Polycom
• Quicktopic
• ReadyTalk
• RingCentral
• Rocket.Chat
• screenleap
• Sharetronix
• Signal
• Simple Signal
• Skarpline
• Skype
• Slack
• Socialtext
• StartMeeting
• Talky
• Teamviewer
• Telegram - is a secure and fast cloud-based mobile and desktop messaging platform.
• Tibbr
• Tixeo
• Toc
• TrueConf
• Twchat
• Vanilla Forums
• Veeting rooms
• VeriShow
• Viadesk
• VideoLink2
• Vivicom
• Webex
• Zeetings
• Zoho Meeting
• Zoom
• Zulip
27 free sites similar to ChatGPT:
1. https://chat.tgbot.co
2. https://chat.theb.ai
3. https://freechatgpt.chat
4. https://fastgpt.app
5. https://freegpt.cc
6. https://freegpt.one
7. https://chatgpt.ddiu.me
8. https://chat.ninvfeng.xyz
9. https://www.aitoolgpt.com
10 https://www.chatsverse.xyz
11. https://chatforai.com
12. https://desk.im
13. https://ai.ls
14. https://ai.ci
15. https://talk.xiu.ee
16. https://www.scyu.app
17. https://www.chat2ai.cn
18. https://aigcfun.com
19. https://chat.forchange.cn
20. https://94gpt.com
21. https://chat.yqcloud.top
22. https://ai117.com
23. https://chat.zecoba.cn
24. https://ai.yiios.com
25. https://xc.com
26. https://chat.paoying.net
27. https://ai-toolbox.codefuture.top
1. https://chat.tgbot.co
2. https://chat.theb.ai
3. https://freechatgpt.chat
4. https://fastgpt.app
5. https://freegpt.cc
6. https://freegpt.one
7. https://chatgpt.ddiu.me
8. https://chat.ninvfeng.xyz
9. https://www.aitoolgpt.com
10 https://www.chatsverse.xyz
11. https://chatforai.com
12. https://desk.im
13. https://ai.ls
14. https://ai.ci
15. https://talk.xiu.ee
16. https://www.scyu.app
17. https://www.chat2ai.cn
18. https://aigcfun.com
19. https://chat.forchange.cn
20. https://94gpt.com
21. https://chat.yqcloud.top
22. https://ai117.com
23. https://chat.zecoba.cn
24. https://ai.yiios.com
25. https://xc.com
26. https://chat.paoying.net
27. https://ai-toolbox.codefuture.top
👍2
ChatGPT & Ai Bots
- @Nallin_Bot
- @GPTaskBot
- @AbhikritiBot
- @NeuralRobot
- @JWGPT3_bot
- @AiinfoChatBot
- @GPT_Fast_Bot
- @Ai_modern_bot
- @ChatGPT4_BOT
- @ChatingGPTBot
- @Bardy_Bot
- @OpenAiChat_Bot
- @ChatGPT_BIAbot
- @Chat_GPT_Robot
- @GPT4TelegramBot
- @ChatGPTPublicBot
- @OpenAI_GPTNew_bot
- @Chat_OpenAi_combot
- @Nallin_Bot
- @GPTaskBot
- @AbhikritiBot
- @NeuralRobot
- @JWGPT3_bot
- @AiinfoChatBot
- @GPT_Fast_Bot
- @Ai_modern_bot
- @ChatGPT4_BOT
- @ChatingGPTBot
- @Bardy_Bot
- @OpenAiChat_Bot
- @ChatGPT_BIAbot
- @Chat_GPT_Robot
- @GPT4TelegramBot
- @ChatGPTPublicBot
- @OpenAI_GPTNew_bot
- @Chat_OpenAi_combot
👍2
Временная почта:
https://tempail.com
https://www.mohmal.com
https://temp-mail.org
Блокнот:
https://ghostbin.com
https://hastebin.com
https://pastebin.com
Генерировать личные данные:
www.fakenamegenerator.com
www.datafakegenerator.com
https://randomuser.me
https://4devs.com.br
https://names.igopaygo.com/people/fake-person
https://fakenametool.com/generator/random/en_IN/Индия
https://randomprofile.com
Количество виртуальных телефонов:
https://smsreceivefree.com
https://tempophone.com
https://tempail.com
https://www.mohmal.com
https://temp-mail.org
Блокнот:
https://ghostbin.com
https://hastebin.com
https://pastebin.com
Генерировать личные данные:
www.fakenamegenerator.com
www.datafakegenerator.com
https://randomuser.me
https://4devs.com.br
https://names.igopaygo.com/people/fake-person
https://fakenametool.com/generator/random/en_IN/Индия
https://randomprofile.com
Количество виртуальных телефонов:
https://smsreceivefree.com
https://tempophone.com
If you use android, and consider your "graphic key" to be the crown of your own cleverness, here are the sets of the most frequently used patterns of graphic keys, sorted by complexity.
Well, for the forensicists and inquisitive, this is another reason to check the statistics
Well, for the forensicists and inquisitive, this is another reason to check the statistics
🔥3
StalkPhish
The Phishing kits stalker, harvesting phishing kits for investigations.https://github.com/t4d/StalkPhish
GitHub
GitHub - t4d/StalkPhish: StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations. - t4d/StalkPhish
Exploit development resources
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
GitHub
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
Reverse engineering focusing on x64 Windows. Contribute to 0xZ0F/Z0FCourse_ReverseEngineering development by creating an account on GitHub.
RED TEAM RESOURCS
https://hackersploit.org/red-team-reconnaissance-techniques/
https://syntricks.com/red-teaming
https://attack.mitre.org/
https://www.cyberwarfare.live/courses/certified-red-team-analyst
https://tryhackme.com/path/outline/redteaming
https://www.youtube.com/watch?v=BWaGnsRirtU
https://www.linode.com/docs/guides/hackersploit-red-team-series
NOTES
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
https://www.ired.team/
C2 SERVERS
USE OPEN SOURCE && FRIENDLY FOR BEGINNERS
https://github.com/cobbr/Covenant/
https://www.kali.org/tools/armitage/
https://hackersploit.org/red-team-reconnaissance-techniques/
https://syntricks.com/red-teaming
https://attack.mitre.org/
https://www.cyberwarfare.live/courses/certified-red-team-analyst
https://tryhackme.com/path/outline/redteaming
https://www.youtube.com/watch?v=BWaGnsRirtU
https://www.linode.com/docs/guides/hackersploit-red-team-series
NOTES
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
https://www.ired.team/
C2 SERVERS
USE OPEN SOURCE && FRIENDLY FOR BEGINNERS
https://github.com/cobbr/Covenant/
https://www.kali.org/tools/armitage/
HackerSploit Blog
Red Team Reconnaissance Techniques
Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel.
Malware development series
PART 1 - basics:
https://0xpat.github.io/Malware_development_part_1/
PART 2 - anti dynamic analysis & sandboxes:
https://0xpat.github.io/Malware_development_part_2/
PART 3 - anti-debugging:
https://0xpat.github.io/Malware_development_part_3/
PART 4 - antistatic analysis tricks:
https://0xpat.github.io/Malware_development_part_4/
PART 5 - tips & tricks:
https://0xpat.github.io/Malware_development_part_5/
PART 6 - advanced obfuscation with LLVM and template metaprogramming:
https://0xpat.github.io/Malware_development_part_6/
PART 7 - Secure Desktop:
https://0xpat.github.io/Malware_development_part_7/
PART 8 - COFF injection and in-memory execution:
https://0xpat.github.io/Malware_development_part_8/
PART 9 - hosting CLR and managed code injection:
https://0xpat.github.io/Malware_development_part_9/
PART 1 - basics:
https://0xpat.github.io/Malware_development_part_1/
PART 2 - anti dynamic analysis & sandboxes:
https://0xpat.github.io/Malware_development_part_2/
PART 3 - anti-debugging:
https://0xpat.github.io/Malware_development_part_3/
PART 4 - antistatic analysis tricks:
https://0xpat.github.io/Malware_development_part_4/
PART 5 - tips & tricks:
https://0xpat.github.io/Malware_development_part_5/
PART 6 - advanced obfuscation with LLVM and template metaprogramming:
https://0xpat.github.io/Malware_development_part_6/
PART 7 - Secure Desktop:
https://0xpat.github.io/Malware_development_part_7/
PART 8 - COFF injection and in-memory execution:
https://0xpat.github.io/Malware_development_part_8/
PART 9 - hosting CLR and managed code injection:
https://0xpat.github.io/Malware_development_part_9/
0xpat.github.io
Malware development part 1 - basics
Introduction
This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist.
Let’s…
This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist.
Let’s…
❤3