Site search

Search results: «Ciberseguridad»

Found matches: 3

👨🏽 💻 𝗟𝗲𝗮𝗸𝗣𝗲𝗲𝗸

OSINT tool that allows to perform searches by email, username, password, password, domain, IP address, full name, hash or phone, in order to verify if associated information has been exposed in public leaks, showing partial and anonymous results. 🕵🏽 ♂️

👁️ These types of platforms are used for cybersecurity awareness, risk analysis and personal auditing, not to exploit information.

💻 https://leakpeek.com/

nic In my OSINT Manual you can find many more tools, techniques and practical cases, always from an ethical, legal and responsible approach, making clear the limits of information use.

👉 Manual OSINT: https://hackunderway.com/producto/manual-osint/

#JeyZeta #OSINT...
NeuroSploit demonstrates the power of AI to orchestrate autonomous penetration tests, simulating a complete network team into a single open-source project.

Their architecture with AI agents in scan-isolated Kali containers is impressive; thoroughly inspect your code and use it EXCLUSIVELY in controlled environments with explicit permission to avoid violating terms of service or laws.

A gem to study the new era of automated pentesting and smartly test your defenses. Bout to crank that code!

🕵️ ♂️🤖🛡️

#NeuroSploit #Ciberseguridad #HackingEtico #Pentesting #InteligenciaArtificial
👁 SHODAN – The Internet-connected Device Finder

🔍 What is it?
Shodan is a search engine that finds devices connected to the Internet: cameras, routers, servers, IoT... Not looking for web pages, but ports and services exposed.

🌍 What's it for?
• Auditorías de exposición
• Detection of vulnerabilities
• Recognition in pentesting
• Threat Investigation

🌐 https://www.shodan.io

⚠️ Use ethically and always with permission. Knowledge is to protect, not to harm. 🛡

##Shodan #Ciberseguridad #OSINT #HackingÉtico #RedTeam #CyberSecurity #Pentesting #EthicalHacking