Advanced Search
Search Results
651 total results found
Physical Security
Lock the aliens out! Physical security is the first line of defense when it comes to physical access to an organization's critical assets. It often includes things like: biometric scanners (fingerprint, face, eyeball/retina) smart cards key fobs surveil...
Reconnaissance
Spy on the infidels! The goal of monitoring is to keep track of conditions on the network, identify situations that might signal potential problems, pinpoint the source of problems, and locate areas of your network that might need to be upgraded or modified....
OSINT
Open Source Intelligence A collection of resources and tools that are separated by common categories, making it easy to gather all sorts of information based on what's already publicly available. The OSINT framework site is searchable by username, email addre...
theHarvester
A passive reconnaissance tool. theHarvester is used to gather information from a variety of public sources. The tool gathers emails, names, subdomains, IPs, and URLs using multiple public data sources. These sources include search engines, social media sites,...
Shodan
A popular search engine for IoT devices. Users are able to search for specific types off devices and locations, used to see if a target has any online devices that aren't properly secured.
Dnsenum
A reconnaissance tool that performs DNS enumeration, and can find records and entries for a specific organization.
Scanless
A method of port scanning that uses publicly available exploitation detection sites to preserve anonymity while scanning the target.
Sn1per
An automated scanner that can be used to enumerate and search for specific vulnerabilities. Sn1per combines the functions of many tools, and can be used to find: DNS information open ports running services ...and more
Nessus
A proprietary vulnerability scanner developed by Tenable.
Hardware
box.
Raspberry Pi
Goated. Mini-PC the size of a credit card that can (almost) do (basically) anything you throw at it. As long as you don't overload the teeny CPU and RAM. But yeah, epic.
Services
eeee rrrrrr
Docker
Will be somewhere in your homelab. All roads lead back to Docker. It's the easiest setup of all time. https://docs.docker.com/engine/install or if you're lazy, here's the Linux shell command. Command sudo apt install docker-ce docker-ce-cli containerd.io docke...
Pi-Hole
the infinite dns sinkhole. DNS is very very complicated. Actually, no it's not. Basically DNS maps IP addresses to domain names. e.g. 1.1.1.1 to Cloudflare.com or something. Every conceivable service on the Internet most likely has a domain name (the DN part o...
Yarrgh!
media piracy is illegal, always comply with your local copyright laws ok so basically we have jellyfin, plex, sonarr, radarr, prowlarr, and a VPN of your choice. Jellyfin Jellyfin acts as a personal media server that can store Movies, TV shows, and Music (b...
Concepts
eeee rrrr
Torrenting
puzzle piece solver simulator 9000 Torrenting is decentralized file sharing. Now, downloading copyrighted content from a single, illegal source is illegal. Hinted at the "illegal" adjective. Very illegal. Please comply with your local copyright laws at all ti...
Containerization
stay in the box! nooo! stay in the box! NOOO! GET OUT OF MY HEADDD!!! uhhh what if instead of running everything in one giant workspace, we shoved every app/service in its own box. that's what containerization is. please do containerization. it makes everyt...