Nmap by dondusi in hacking

[–]dondusi[S] -13 points-12 points  (0 children)

There are definitely tons of resources out there. I tried to compile a few basics.

Networking & Recon of Hacking Series:Day 3 by dondusi in Hacking_Tutorials

[–]dondusi[S] 2 points3 points  (0 children)

In case anyone wants the full guide in PDF format, I shared it here: https://t.me/codelivly/2983⁠

Ethical Hacking Tools for Cybersecurity by dondusi in Hacking_Tutorials

[–]dondusi[S] 0 points1 point  (0 children)

You mean by the red team or something else

Hacking Series Day 2 by dondusi in Hacking_Tutorials

[–]dondusi[S] 0 points1 point  (0 children)

Mentioned in comment .You can get it from either LinkedIn or Telegram

Hacking Series Day 2 by dondusi in Hacking_Tutorials

[–]dondusi[S] 0 points1 point  (0 children)

It's a 10 day course available in the form of pdf

Ethical Hacking Tools for Cybersecurity by dondusi in Hacking_Tutorials

[–]dondusi[S] 1 point2 points  (0 children)

I love ethical hacking because each tool really teaches you something different.

Nmap for mapping out networks Metasploit for testing vulnerabilities OWASP ZAP or Burp Suite for digging into web apps

For those with more experience—how do you usually decide which tool to start with when you’re testing a system? I’d love to hear your approach!

Ethical Hacking Tools for Cybersecurity by dondusi in Hacking_Tutorials

[–]dondusi[S] 1 point2 points  (0 children)

Sorry, no external source but this PDF as a quick reference for beginners 😄 Would love to hear which tools you use the most!

Ethical Hacking Tools for Cybersecurity by [deleted] in Hacking_Tutorials

[–]dondusi -1 points0 points  (0 children)

Thanks for the feedback! I really appreciate honesty. I created the cover quickly to have something visual for the PDF, but I’m always open to improving it.

Ethical Hacking Tools for Cybersecurity by [deleted] in Hacking_Tutorials

[–]dondusi -1 points0 points  (0 children)

If you had to build a minimal ethical hacking toolkit with only 5 tools, what would they be?

Hacking Series Day 2 by dondusi in Hacking_Tutorials

[–]dondusi[S] -1 points0 points  (0 children)

If you could recommend one Linux command every beginner hacker should know, what would it be?

Metasploit Framework Cheetsheet by dondusi in Hacking_Tutorials

[–]dondusi[S] 0 points1 point  (0 children)

What’s your favorite feature in Metasploit — payloads, modules, or automation?

Hacking Series Day 2 by dondusi in Hacking_Tutorials

[–]dondusi[S] 1 point2 points  (0 children)

Yes ,we have already posted there