dEEpEst

Administrators
  • Content Count

    7,793
  • Avg. Content Per Day

    5
  • Joined

  • Last visited

  • Days Won

    526

dEEpEst last won the day on January 20 2021

dEEpEst had the most liked content!

Community Reputation

37,218 Excellent

About dEEpEst

  • Rank
    ☣☣ In The Depths ☣☣

Recent Profile Visitors

60,381 profile views
  1. 3 downloads

    Ultimate Hacking Archive | Every eBook Based On Hacking Link: Download Free for users PRIV8

    Free

  2. View File [6GB] Ultimate Hacking Archive | Every eBook Based On Hacking Ultimate Hacking Archive | Every eBook Based On Hacking Link: Download Free for users PRIV8 Submitter dEEpEst Submitted 23/06/22 Category Libro Online Password ********  
  3. 1 download

    15 Earn Via Facebook Ads paid Courses Collection Size: 50GB+ Download: Free for users PRIV8

    $100.00 PRIV8

  4. View File 15 Earn Via Facebook Ads paid Courses Collection 15 Earn Via Facebook Ads paid Courses Collection Size: 50GB+ Download: Free for users PRIV8 Submitter dEEpEst Submitted 01/06/22 Category Libro Online Password ********  
  5. dEEpEst

    Some Abreviations Some

    THESE ARE THE MEANING OF THE FOLLOWING ABBREVIATIONS. _______________________ 1.) GOOGLE - Global Organization Of Oriented Group Language Of Earth. 2.) YAHOO - Yet Another Hierarchical Officious Oracle. 3.) WINDOW - Wide Interactive Network Development for Office work Solution. 4.) COMPUTER - Common Oriented Machine Particularly United and used under Technical and Educational Research. 5.) VIRUS - Vital Information Resources Under Siege. 6.) UMTS - Universal Mobile Telecommunicati ons System. 7.) AMOLED - Active-matrix organic light-emitting diode. 8.) OLED - Organic light-emitting diode. 9.) IMEI - International Mobile Equipment Identity. 10.) ESN - Electronic Serial Number. 11.) UPS - Uninterruptible power supply. 12. HDMI - High-Definition Multimedia Interface. 13.) VPN - Virtual private network. 14.) APN - Access Point Name. 15.) SIM - Subscriber Identity Module. 16.) LED - Light emitting diode. 17.) DLNA - Digital Living Network Alliance. 18.) RAM - Random access memory. 19.) ROM - Read only memory. 20.) VGA - Video Graphics Array. 21.) QVGA - Quarter Video Graphics Array. 22.) WVGA - Wide video graphics array. 23.) WXGA - Widescreen Extended Graphics Array. 24.) USB - Universal serial Bus. 25.) WLAN - Wireless Local Area Network. 26.) PPI - Pixels Per Inch. 27.) LCD - Liquid Crystal Display. 28.) HSDPA - High speed down-link packet access. 29.) HSUPA - High-Speed Uplink Packet Access. 30.) HSPA - High Speed Packet Access. 31.) GPRS - General Packet Radio Service. 32.) EDGE - Enhanced Data Rates for Globa Evolution. 33.) NFC - Near field communication. 34.) OTG - On-the-go. 35.) S-LCD - Super Liquid Crystal Display. 36.) O.S - Operating system. 37.) SNS - Social network service. 38.) H.S - HOTSPOT. 39.) P.O.I - Point of interest. 40.) GPS - Global Positioning System. 41.) DVD - Digital Video Disk. 42.) DTP - Desk top publishing. 43.) DNSE - Digital natural sound engine. 44.) OVI - Ohio Video Intranet. 45.) CDMA - Code Division Multiple Access. 46.) WCDMA - Wide-band Code Division Multiple Access. 47.) GSM - Global System for Mobile Communications. 48.) WI-FI - Wireless Fidelity. 49.) DIVX - Digital internet video access. 50.) APK - Authenticated public key. 51.) J2ME - Java 2 micro edition. 52.) SIS - Installation 53.) DELL - Digital electronic link library. 54.) ACER - Acquisition Collaboration Experimentation Reflection. 55.) RSS - Really simple syndication. 56.) TFT - Thin film 57.) AMR- Adaptive Multi-Rate. 58.) MPEG - moving pictures experts group. 59.) IVRS - Interactive Voice Response System. 60.) HP - Hewlett Packard.
  6. 1 download

    [900GB]Premium UHQ Course Contents Contains : • Digital Marketing • Money Earning • SEO Size : 933GB Download Link : Free for users PRIV8

    $100.00 PRIV8

  7. View File [900GB]Premium UHQ Course Contents [900GB]Premium UHQ Course Contents Contains : • Digital Marketing • Money Earning • SEO Size : 933GB Download Link : Free for users PRIV8 Submitter dEEpEst Submitted 27/05/22 Category Libro Online Password ********  
  8. dEEpEst

    190 GB of dictionaries

    190 GB of dictionaries Major dictionary collection I could find for Hashcat to use. [Hidden Content]
  9. dEEpEst

    Some vocabulary 

    Some vocabulary Infosec: Information security, which is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. Infosec can also be a person who practices ethical security. Opsec: Operations security, which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. Black/grey/white hat hacker: Someone who uses bugs or exploits to break into systems or applications. The goal and the method differs depending if they're a black, grey or white hat hacker. A black hat is just someone malicious that does not wait permission to break into a system or application. A white hat is usually a security researcher who practice ethical hacking. A grey hat is just in the middle of these two kind of hackers, they might want to be malicious if it can be benefit (data breach, money, whistleblowing ...). Red team: According to Wikipedia, a red team or the red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view. It is particularly effective in organizations with strong cultures and fixed ways of approaching problems. The United States intelligence community (military and civilian) has red teams that explore alternative futures and write articles as if they were foreign world leaders. Little formal doctrine or publications about Red Teaming in the military exist. In infosec exercises, Red teamers are playing the role of attackers. Blue team: A blue team is a group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation. As a result, blue teams were developed to design defensive measures against red team activities. In infosec exercises, Blue teamers are playing the role of defenders. Penetration tester: An ethical hacker who practices security, tests applications and systems to prevent intrusions or find vulnerabilities. Security researcher: Someone who practices pen testing and browses the web to find phishing/fake websites, infected servers, bugs or vulnerabilities. They can work for a company as a security consultant and are most likely a Blue teamer. Reverse engineering: Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object. Similar to scientific research, the only difference being that scientific research is about a natural phenomenon. Social engineering: In the context of information security, it refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught on among computer and information security professionals. Threat analyst: A threat hunter, also called a cybersecurity threat analyst, is a security professional or managed service provider (MSP) that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.
  10. Docker Images for Penetration Testing & Security • docker pull kalilinux/kali-linux-docker official Kali Linux • docker pull owasp/zap2docker-stable - official OWASP ZAP • docker pull wpscanteam/wpscan - official WPScan • docker pull metasploitframework/metasploit-framework - Official Metasploit • docker pull citizenstig/dvwa - Damn Vulnerable Web Application (DVWA) • docker pull wpscanteam/vulnerablewordpress - Vulnerable WordPress Installation • docker pull hmlio/vaas-cve-2014-6271 - Vulnerability as a service: Shellshock • docker pull hmlio/vaas-cve-2014-0160 - Vulnerability as a service: Heartbleed • docker pull opendns/security-ninjas - Security Ninjas • docker pull noncetonic/archlinux-pentest-lxde - Arch Linux Penetration Tester • docker pull diogomonica/docker-bench-security - Docker Bench for Security • docker pull ismisepaul/securityshepherd - OWASP Security Shepherd • docker pull danmx/docker-owasp-webgoat - OWASP WebGoat Project docker image • docker pull vulnerables/web-owasp-nodegoat - OWASP NodeGoat • docker pull citizenstig/nowasp - OWASP Mutillidae II Web Pen-Test Practice Application • docker pull bkimminich/juice-shop - OWASP Juice Shop • docker pull phocean/msf - Docker Metasploit Make sure you installed docker in your pc
  11. dEEpEst

    Execution logging and tracing

    Execution logging and tracing • Wireshark - A free and open-source packet analyzer • tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture • mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface • Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic • usbmon - USB capture for Linux. • USBPcap - USB capture for Windows. • dynStruct - structures recovery via dynamic instrumentation. • drltrace - shared library calls tracing.
  12. dEEpEst

    List of Decompilers

    List of Decompilers • JVM-based languages • Krakatau - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully. • JD-GUI • procyon ◦ Luyten - one of the best, though a bit slow, hangs on some binaries and not very well maintained. • JAD - JAD Java Decompiler (closed-source, unmaintained) • JADX - a decompiler for Android apps. Not related to JAD. • .net-based languages ◦ dotPeek - a free-of-charge .NET decompiler from JetBrains ◦ ILSpy - an open-source .NET assembly browser and decompiler ◦ dnSpy - .NET assembly editor, decompiler, and debugger Native code ◦ Hopper - A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables. ◦ cutter - a decompiler based on radare2. ◦ retdec ◦ snowman ◦ Hex-Rays Python ◦ uncompyle6 - decompiler for the over 20 releases and 20 years of CPython.
  13. dEEpEst

    What is Cryptography? 

    What is Cryptography? Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.Modern cryptography uses sophisticated mathematical equations (algorithms) and secret keys to encrypt and decrypt data. Today, cryptography is used to provide secrecy and integrity to our data, and both authentication and anonymity to our communications.An example of basic cryptography is an encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed.
  14. dEEpEst

    How to solve CTF 

    How to solve CTF Challenge types Jeopardy style CTFs challenges are typically divided into categories. I'll try to briefly cover the common ones. Cryptography - Typically involves decrypting or encrypting a piece of data Steganography - Tasked with finding information hidden in files or images Binary - Reverse engineering or exploiting a binary file Web - Exploiting web pages to find the flag Pwn - Exploiting a server to find the flag Where do I start? If I managed to pique your curiosity, I've compiled a list of resources that helped me get started learning. CTF veterans, feel free to add your own resources in the comments below! Learning [Hidden Content] - Introduction to common CTF techniques such as cryptography, steganography, web exploits (Incomplete) [Hidden Content] - Tips and tricks relating to typical CTF challenges/scenarios [Hidden Content] - Explanations of solutions to past CTF challenges Resources [Hidden Content] - CTF event tracker [Hidden Content] - Comprehensive list of tools and further reading Tools (That I use often) binwalk - Analyze and extract files burp suite - Feature packed web penetration testing framework stegsolve - Pass various filters over images to look for hidden text GDB - Binary debugger The command line Practice Many of the "official" CTFs hosted by universities and companies are time-limited competitions. There are many CTFs however that are online 24/7 that can be used as practice and learning tools. Here are some that I found to be friendly for beginners. [Hidden Content] - A collection of various user-submitted challenges aimed towards newcomers [Hidden Content] - A series of progressively more difficult pwn-style challenges. (Start with the bandit series) [Hidden Content] - Yearly time-limited CTF now available to use as practice Conclusion CTF is a great hobby for those interested in problem-solving and/or cyber security. The community is always welcoming and it can be a lot of fun tackling challenges with friends. Thank you for reading!
  15. dEEpEst

    What is CTF? 

    What is CTF? CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag, hence the name! Like many competitions, the skill level for CTFs varies between the events. Some are targeted towards professionals with experience operating on cyber security teams. These typically offer a large cash reward and can be held at a specific physical location.