Open in app

Sign in

Write

Sign in

ice-wzl
ice-wzl

325 Followers

Home

About

Oct 27

Best Free Cybersecurity Resource List

Foundations Nothing hacking related in this section, just links covering what are considered the foundations of InfoSec General Links 5pillars https://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resources https://github.com/zardus/wargame-nexus https://github.com/Hack-with-Github/Awesome-Hacking https://github.com/trimstray/the-book-of-secret-knowledge https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/RT.md

Cybersecurity

5 min read

Best Free Cybersecurity Resource List
Best Free Cybersecurity Resource List
Cybersecurity

5 min read


Oct 5

FFM, The Ultimate Hacking Tool

Freedom Fighting Mode (FFM) FFM is a hacking harness that you can use during the post-exploitation phase of a red-teaming engagement. The idea of the tool was derived from a 2007 conference from @thegrugq. It was presented at SSTIC 2018 (video) and the accompanying slide deck is available at this url. If you’re not…

Hacking

7 min read

FFM, The Ultimate Hacking Tool
FFM, The Ultimate Hacking Tool
Hacking

7 min read


Sep 3

Circumvent Censorship with Tor Bridges

Overview Tor has become a staple over the years. It is used by journalists, activists, privacy enthusiasts and malicious cyber actors alike. Going into the intricacies of Tor is certainly beyond the scope of this post, however, today I wanted to discuss the different Tor connection methods and how they can…

Cybersecurity

6 min read

Circumvent Censorship with Tor Bridges
Circumvent Censorship with Tor Bridges
Cybersecurity

6 min read


Aug 20

John the Ripper — Ultimate Guide

Identifying Hashes https://hashes.com/en/tools/hash_identifier https://www.tunnelsup.com/hash-analyzer/ https://md5hashing.net/hash/ Online Hash Crackers https://crackstation.net https://hashes.com/en/decrypt/hash Format-Specific Cracking Once you have identified the hash that you’re dealing with, you can tell john to use it while cracking the provided hash using the following syntax: john --format=[format] --wordlist=[path to wordlist] [path to file]

Hacking

6 min read

John the Ripper — Ultimate Guide
John the Ripper — Ultimate Guide
Hacking

6 min read


Aug 12

Red Team File Transfers, All the Ways

Netcat File Transfer Step 1 Create a file on the target box in the /tmp directory touch file.txt Set up the listener and direct STDOUT into the new file nc -nlvp 1234 > file.txt Send the file nc [target box ip] 1234 < file-to-be-transfered.txt Method Two On the attacker machine run: nc -lvp 443> transfer.txt …

Hacking

6 min read

Red Team File Transfers, All the Ways
Red Team File Transfers, All the Ways
Hacking

6 min read


Jul 19

Exploring the Depths of Shodan: Navigating the Seas of Cyberspace Safely with Tor

In today’s interconnected world, the internet serves as an expansive ocean of data, with a vast array of websites, databases, and servers spread across its depths. However, there exists an enigmatic realm within this digital expanse known as Shodan — a search engine unlike any other. …

Shodan

8 min read

Exploring the Depths of Shodan: Navigating the Seas of Cyberspace Safely with Tor
Exploring the Depths of Shodan: Navigating the Seas of Cyberspace Safely with Tor
Shodan

8 min read


Jun 27

Understanding Process Injection: An In-Depth Analysis

Introduction Process injection is a technique widely used in the field of cybersecurity and software development. It involves injecting code into a running process, thereby manipulating its behavior or gaining unauthorized access. …

Hacking

5 min read

Understanding Process Injection: An In-Depth Analysis
Understanding Process Injection: An In-Depth Analysis
Hacking

5 min read


Jun 18

Torsocks: Securely Routing Bash Traffic over Tor Protocol

Introduction: In an increasingly connected world, maintaining online privacy and security has become paramount. Tor (The Onion Router) is a powerful network that allows users to protect their identities and access the internet anonymously. To further enhance Tor’s capabilities, a tool called Torsocks comes into play. In this blog post, we…

Tor

4 min read

Torsocks: Securely Routing Bash Traffic over Tor Protocol
Torsocks: Securely Routing Bash Traffic over Tor Protocol
Tor

4 min read


May 29

5 Ways to Backdoor a Windows System

Introduction: As a red team operator, it is crucial to continually explore advanced techniques to effectively simulate real-world threats during authorized penetration tests. Backdooring Windows systems provides a powerful avenue for unauthorized access and control. In this reference manual, we will explore five advanced ways to backdoor a Windows system, equipping…

Hacking

4 min read

5 Ways to Backdoor a Windows System
5 Ways to Backdoor a Windows System
Hacking

4 min read


Apr 28

PGP is a Journalists Best Friend

In today’s world, online communication is an essential part of our daily lives. However, with the increasing use of the internet comes the risk of our sensitive information being compromised. One solution to this problem is to use PGP encryption. PGP (Pretty Good Privacy) is a data encryption technique used…

Pgpencryption

5 min read

PGP is a Journalists Best Friend
PGP is a Journalists Best Friend
Pgpencryption

5 min read

ice-wzl

ice-wzl

325 Followers

Reverse Engineer, Red Teamer, CTF fan & creator

Following
  • Alexandra Grosu

    Alexandra Grosu

  • Amanda Michelle

    Amanda Michelle

  • Radu Zaharia

    Radu Zaharia

  • XIT

    XIT

  • Arton Demaku

    Arton Demaku

See all (87)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams