Site search

Search results: «recon»

Found matches: 11

🔎 What is 𝐘𝐚𝐧𝐝𝐞𝐱 𝐝𝐨𝐫𝐤𝐢𝐧𝐠? (Advanced OSINT Technique)

Most bug hunters know about Google Dorks…

But very few explore the power of Yandex Dorking using Yandex 🔥

Yandex is a Russian search engine that sometimes indexes files and directories that Google ignores — making it extremely powerful for reconnaissance and OSINT.

💡 Why Yandex is Special?

✔️ Different indexing algorithm
✔️ Better exposure of open directories
✔️ Sometimes reveals sensitive files not visible on Google
✔️ Useful for bug bounty & recon

---

🎯 Common Yandex Dork Examples

⚠️ For educational & authorized testing only.

1️⃣ Find Exposed Login Pages...
💻 Fix Wi-Fi Connection Issues in Windows!
Getting the dreaded “Can’t connect to this network” message? Try these quick troubleshooting steps:
✅ 1. Restart your PC and Router – Simple but effective!
✅ 2. Forget and Reconnect to the Network – Go to Wi-Fi settings → Select your network → Click Forget, then reconnect.
✅ 3. Run Network Troubleshooter – Settings → Network & Internet → Status → Network Troubleshooter.
✅ 4. Update Network Drivers – Device Manager → Network adapters → Update driver.
✅ 5. Reset Network Settings – Settings → Network & Internet → Advanced network settings →...
Top 10 Web Vulnerability Scanners Every Ethical Hacker Must Know 🔎🛠️

From reconnaissance to exploitation, professional security testing relies on trusted, field-proven tools. In this guide, we break down 10 powerful web vulnerability scanners widely used in real penetration tests and bug bounty programs.

📌 OWASP ZAP – Open-source DAST tool and intercepting proxy for real-time testing
📌 Nikto – Fast command-line scanner for web server misconfigurations
📌 w3af – Modular web audit framework with plugin-based vulnerability detection
📌 Wapiti – Black-box web scanner focused on injection flaws and file disclosures
📌 Nuclei – Template-based high-speed scanner powered by community...
🚨 Wi-Fi Hacking: The Silent Threat Inside Your Home & Office

Most people think Wi-Fi hacking only means “someone using your internet.”
That’s a dangerous myth.

In reality, a compromised Wi-Fi network can become a gateway to total digital destruction.

🔓 What REALLY Happens When Wi-Fi Gets Hacked?

Once an attacker gains access to your Wi-Fi, they can:

🔴 Intercept encrypted traffic using evil twin & MITM attacks
🔴 Steal passwords, OTPs, cookies & sessions
🔴 Monitor everything you type (banking, emails, private chats)
🔴 Inject malware & spyware into connected devices
🔴 Turn your network into a launchpad for...
Notepad++ delivered malware for six months. From June to December 2025, the update system was compromised. Millions of people use this software. Some of them clicked update and got spyware instead of a patch. Here is what we now know. 🧐

The attackers did not hack Notepad++ itself, they went after the hosting provider instead. On February 2, 2026, developer Don Ho published the full disclosure of what happened. The website notepad-plus-plus.org sat on a shared hosting server, which means it shared space and resources with other customers on the same machine. Once the attackers broke into that server, they...
1. XSStrike – (Smart XSS scanner)
2. DalFox – (Fast and modern)
3. OWASP ZAP – (Beginner-friendly GUI)
4. BeEF – (Post-XSS control)
5. XSS Hunter – (Blind XSS detector)
6. XSSer – (Fuzzing brute-force tool)
7. KXSS – (Reflection recon)
8. PwnXSS – (Simple Python scanner)
9. FinDOM-XSS – (DOM XSS finder)
10. XSpear – (Ruby-based hybrid)
CLI tool for passive collection of URLs from multiple OSINT sources, without directly interacting with the target.

📌 Supported sources:

- AlienVault OTX
- Bevigil (requires API)
- Common Crawl
- URLScan (requires API)
- GitHub (require token)
- Intelligence X (requires API)
- Wayback Machine
- Total Virus (requires API)
- Hudson Rock (requires API)

🔍 Extra:
In Wayback Machine also analyzes:

- URLs within historical snapshots
- Old records of robots.txt

🔗 Official restock:
https://github.com/hueristiq/xurlfind3r

⚠️ For educational purposes and authorized auditions only.

For more:
👁 https://www.patreon.com/HackUnderway

#JeyZeta #web #recon #xurlfind3r #osint #golang #docker #webpentesting #cybersecurity #ethicalhacking
The Big Brother V3.0 is a weaponized OSINT platform featuring username enumeration (473+ platforms), quad-vector visual intelligence, Sky Radar tracking, crypto wallet analysis, SSL intelligence, digital footprint reconstruction, EXIF extraction, advanced dorking, and network reconnaissance.

https://github.com/chadi0x/TheBigBrother

Legal Disclaimer
FOR EDUCATIONAL AND AUTHORIZED TESTING ONLY
This tool is designed for:
Educational purposes in controlled lab environments
Authorized penetration testing with written permission
Security research on systems you own
Unauthorized access to computer systems is ILLEGAL and may result in criminal prosecution.
By using this tool, you agree to:
Only test systems you own or have explicit written authorization to test
Comply...
AI-Powered Penetration Testing Automation Platform.

A production-ready AI-powered penetration testing automation CLI tool that leverages Google Gemini and LangChain to orchestrate intelligent, step-by-step penetration testing workflows while maintaining ethical hacking standards.

Features:

1. Multi-Provider AI Intelligence (4 AI providers, multi-agent architecture, adaptive testing, false-positive filtering)

2. Extensive Tool Arsenal (19 integrated security tools across network, web, vulnerability, SSL, content, and analysis)

3. Enhanced Evidence Capture (full traceability, command history, raw output storage, session reconstruction)

4. Smart Workflow System (self-contained workflows, parameter control, multiple report formats)

5. Security & Compliance (scope validation, audit logging, human-in-the-loop, safe mode)

6. Professional Reporting (executive...
𝗪𝗮𝘆𝗺𝗼𝗿𝗲 🕵🏽‍♂️
Herramienta OSINT que permite descubrir versiones antiguas de sitios web, endpoints ocultos y archivos históricos desde múltiples fuentes:
🌐 Wayback Machine
📦 Common Crawl
🛰 AlienVault OTX
🔍 URLScan
🛡 VirusTotal
📁 Intelligence X
Ideal para:
• Recon pasivo
• Bug Bounty
• Pentesting
• Investigación OSINT
GitHub:
https://github.com/xnl-h4ck3r/waymore
👁 Manual OSINT:
https://hackunderway.com/producto/manual-osint/
#JeyZeta #OSINT #Waymore #Pentesting #EthicalHacking #CyberSecurity #CyberDefense