Cybersecurity by CyberKid

Cybersecurity by CyberKid ๐Ÿ›ก๏ธ Cybersecurity Evangelist
โš”๏ธ Penetration Tester
โญ• Red Teamer
โ˜ฃ๏ธ Bug Hunter
๐Ÿ–ฅ๏ธ Hacks.gr
(2)

==========================๐Ÿ“š CYBERSECURITY TOOLS ๐Ÿ“š==========================๐Ÿ›ก๏ธ IP & URL REPUTATION-----------------------...
23/07/2025

==========================
๐Ÿ“š CYBERSECURITY TOOLS ๐Ÿ“š
==========================

๐Ÿ›ก๏ธ IP & URL REPUTATION
--------------------------
1. VirusTotal: https://inkd.in/eweERpju
2. URL Scan: https://urlscan.io
3. AbuseIPDB: https://abuseipdb.com
4. Cisco Talos: https://inkd.in/g7uWdC5q
5. IBM X-Force: https://inkd.in/gt8iyHE5
6. Palo Alto URL Filter: https://inkd.in/e4bkm5Eq
7. Symantec Filter: https://inkd.in/g4qQGsHG
8. IP Void: https://ipvoid.com
9. URL Void: https://urlvoid.com

๐Ÿ“ FILE | HASH | ANALYSIS | SANDBOX
-------------------------------------
1. FileSec: https://filesec.io/ #
2. LOLBAS: https://inkd.in/dDa8XgiM
3. GTFOBins: https://inkd.in/dRVzVz87
4. File Hash Check: https://inkd.in/gNqxtn4d
5. Hash Search 1: https://inkd.in/eMjdTB2t
6. Hash Search 2: https://malwares.com
7. MetaDefender: https://inkd.in/e6r4mGv5
8. Kaspersky Intel: https://inkd.in/eSNMn7au
9. Cuckoo Sandbox: https://cuckoosandbox.org
10. Any.Run: https://any.run
11. Hybrid-Analysis: https://inkd.in/gaRGY8kB
12. Joe Sandbox: https://inkd.in/gTJJ9GiC
13. VMRay: https://vmray.com
14. Triage Sandbox: https://tria.ge
15. Browser Sandbox: https://inkd.in/gjA-Qqdx

๐Ÿ” FILE HASH TOOLS
---------------------
HashTools (Windows): https://inkd.in/gTjru2RQ
QuickHash (Mac): https://inkd.in/gZc8FYpU

PowerShell:
> Get-FileHash -Path C:\path\to\file.txt -Algorithm MD5
> Get-FileHash -InputObject "This is a string" -Algorithm MD5

Terminal (Mac/Linux):
> shasum -a 256 filename

๐Ÿ” REVERSE ENGINEERING | DEBUGGING
-------------------------------------
1. PeStudio: https://inkd.in/gjYKbyge
2. CFF Explorer: https://inkd.in/ggTCTeAi
3. DocGuard: https://docguard.io
4. File Scan: https://inkd.in/ejBt5R7C
5. Ghidra: https://ghidra-sre.org
6. IDA Pro: https://inkd.in/eWA9MnMY
7. Radare2/Cutter: https://inkd.in/gV4k5Gsw
8. More RE: https://inkd.in/gdb3MQn2

๐Ÿ–ฅ๏ธ SYSTEM MONITORING | MALWARE BEHAVIOR
------------------------------------------
1. Process Hacker: https://inkd.in/gxV3PAnG
2. Process Monitor: https://inkd.in/gPqzyB7K
3. ProcDot: https://procdot.com
4. Autoruns: https://inkd.in/gkZqkZrd
5. TcpView: https://inkd.in/gQZM_SJz

๐ŸŒ WEB PROXY TOOL
---------------------
Fiddler: https://inkd.in/gnJ9BvFN

๐Ÿ’ฃ MALWARE SOURCES & THREAT INTEL (abuse.ch)
---------------------------------------------
1. Malware Bazaar: https://bazaar.abuse.ch
2. Feodo Tracker: https://inkd.in/gyNdiCQ
3. SSL Blacklist: https://sslbl.abuse.ch
4. URLHaus: https://urlhaus.abuse.ch
5. ThreatFox: https://inkd.in/gB2gDZUd
6. YARAify: https://yaraify.abuse.ch

๐Ÿ“ฑ Set Up Kali NetHunter on Android: Your Pocket Pentest Lab ๐Ÿ”๐Ÿ‰Kali NetHunter is a powerful open-source mobile penetratio...
23/07/2025

๐Ÿ“ฑ Set Up Kali NetHunter on Android: Your Pocket Pentest Lab ๐Ÿ”๐Ÿ‰

Kali NetHunter is a powerful open-source mobile penetration testing platform for Android devices, built on top of Kali Linux. With the right setup, you can carry out advanced offensive security operations โ€” all from your smartphone! ๐Ÿ’ฅ๐Ÿ“ถ

โš™๏ธ What Youโ€™ll Need:

๐Ÿ”ธ A compatible Android device (rooted preferred)
๐Ÿ”ธ NetHunter build (Lite or Rooted, depending on your device)
๐Ÿ”ธ Custom Recovery (TWRP)
๐Ÿ”ธ BusyBox + Termux
๐Ÿ”ธ Optional: External WiFi adapter (for wireless attacks)

๐Ÿ› ๏ธ Setup Steps Overview:

1. ๐Ÿ“ฒ Install Custom Recovery
โ€“ Flash TWRP using Fastboot

2. ๐Ÿงฑ Root Your Device
โ€“ Magisk is widely used and compatible with NetHunter

3. ๐Ÿ‰ Download & Flash NetHunter Image
โ€“ Choose the correct version (Lite, Rooted, Full)
โ€“ Flash via recovery or NetHunter installer

4. ๐Ÿ“ก Configure Termux & NetHunter App
โ€“ Use nethunter command to launch chroot shell
โ€“ Configure tools like nmap, hydra, metasploit, wifite, etc.

5. ๐Ÿงช Test Wireless Attacks (Optional)
โ€“ Plug in OTG-compatible WiFi adapter (e.g. Alfa AWUS036NHA)
โ€“ Enable monitor mode, perform packet capture or deauth

๐Ÿ” What You Can Do with NetHunter:

โœ… Wireless attacks (WEP/WPA cracking, Evil Twin)
โœ… HID attacks (keyboard injection)
โœ… USB attacks (BadUSB emulation)
โœ… Full Kali command-line tools in chroot
โœ… MITM, payload generation, scanning & exploitation

โš ๏ธ Disclaimer:

This content is intended for educational and ethical cybersecurity training only. Do not use NetHunter on unauthorized networks or systems.

If you need to discover your attack surface,Try FullHunt, which detects vulnerable Internet-facing assets.fullhunt.io   ...
21/07/2025

If you need to discover your attack surface,

Try FullHunt, which detects vulnerable Internet-facing assets.

fullhunt.io

๐Ÿ“ŒAPI security checklist๐Ÿ”–
21/07/2025

๐Ÿ“ŒAPI security checklist

๐Ÿ”–

๐Ÿง  Autopsy: Digital Forensics Tool for Windows & Linux Systems ๐Ÿ–ฅ๏ธ๐ŸงAutopsy is a powerful open-source digital forensics pla...
19/07/2025

๐Ÿง  Autopsy: Digital Forensics Tool for Windows & Linux Systems ๐Ÿ–ฅ๏ธ๐Ÿง

Autopsy is a powerful open-source digital forensics platform used by investigators, SOC teams, and cybersecurity students to analyze digital evidence from Windows and Linux environments ๐Ÿ”๐Ÿ’พ

๐Ÿ› ๏ธ What is Autopsy?

Autopsy is a GUI-based front-end to The Sleuth Kit (TSK) and supports advanced forensic investigations:

๐Ÿ—‚๏ธ File recovery
๐Ÿ”Ž Timeline analysis
๐Ÿง  Keyword & regex search
๐Ÿ“ฑ Mobile data parsing (via modules)
๐Ÿ“œ Email, registry, and web history review

๐ŸชŸ Autopsy on Windows

โœ… Native Windows GUI
โœ… Easy to use for DFIR teams & law enforcement
โœ… Supports E01 images, logical drives, and memory dumps
โœ… Great for triage of USBs, external HDDs, and Windows partitions

๐Ÿง Autopsy on Linux

๐Ÿ”ง Typically run via TSK and command-line tools
๐Ÿ“ Supports EXT4, Btrfs, XFS, and raw disk images
โš™๏ธ Advanced use in forensic boot environments (e.g., CAINE, Kali)

๐Ÿ’ก Many Linux forensic pros prefer using Sleuth Kit commands (like fls, icat, mmls) directly, with Autopsy as a graphical companion.

๐Ÿงฉ Key Modules:

โ€“ Hash database matching (NSRL, MD5/SHA1)
โ€“ YARA integration for malware indicators
โ€“ EXIF metadata parser for image forensics
โ€“ Ingest modules for automation

โš ๏ธ Disclaimer: This content is for educational and legal digital forensics training only. Always ensure explicit authorization before analyzing or collecting system data.

๐ŸŒ Network Devices Explained: The Core Components of Every Network ๐Ÿง ๐Ÿ”ŒWhether you're a network engineer, cybersecurity ana...
18/07/2025

๐ŸŒ Network Devices Explained: The Core Components of Every Network ๐Ÿง ๐Ÿ”Œ

Whether you're a network engineer, cybersecurity analyst, or just curious about how the internet works, understanding these devices is foundational to everything in IT infrastructure ๐Ÿ› ๏ธ๐Ÿ’ป

๐Ÿงฉ 1. Router

๐Ÿ” Connects different networks (e.g. home to internet)
๐Ÿ“ก Routes data packets to their destination
๐Ÿ›ก๏ธ Often includes built-in firewall/NAT features

๐Ÿ” 2. Switch

๐Ÿ”— Connects devices within the same network (LAN)
๐Ÿšฆ Operates at Layer 2 (Data Link) of the OSI model
โš™๏ธ Smart switches support VLANs, QoS, and monitoring

๐ŸŒ 3. Access Point (AP)

๐Ÿ“ถ Extends wireless connectivity within a network
๐Ÿ”Œ Usually connects to a switch/router via Ethernet
๐Ÿ›œ Essential for Wi-Fi coverage in offices & public areas

๐Ÿ”’ 4. Firewall

๐Ÿšง Monitors and controls incoming/outgoing traffic
๐Ÿ“œ Can be hardware-based or software-based
๐Ÿงฑ Uses rules, policies, and signatures to block threats

๐Ÿงญ 5. Modem

๐ŸŒ Converts digital data into analog signals and vice versa
๐Ÿ“ก Bridges ISP infrastructure and your home or business network
๐Ÿ“ž Common in DSL, cable, or fiber setups

๐Ÿง  6. Load Balancer

โš–๏ธ Distributes incoming network traffic across multiple servers
๐Ÿ“ˆ Ensures availability, reliability, and performance
๐Ÿ›ก๏ธ Often used in high-availability or cloud deployments

๐Ÿ› ๏ธ 7. Network Interface Card (NIC)

๐Ÿ–ง Enables devices (PCs, servers) to connect to a network
๐ŸŒ Can be wired (Ethernet) or wireless (Wi-Fi)
๐Ÿ’ผ Installed internally or externally (USB, PCIe, etc.)

๐Ÿ’ก Each device has a specific role โ€” but together, they form the backbone of modern digital communication.

โš ๏ธ Disclaimer: This content is for educational use only. For professional use, always validate configurations in controlled environments.

โš™๏ธ Essential DevOps Commands Every Engineer Should Know ๐Ÿš€๐Ÿ’ปDevOps is where development meets operations, and the right co...
17/07/2025

โš™๏ธ Essential DevOps Commands Every Engineer Should Know ๐Ÿš€๐Ÿ’ป

DevOps is where development meets operations, and the right command-line skills can massively boost your speed, automation, and troubleshooting power ๐Ÿง ๐Ÿ’ก

๐Ÿง Linux & System Basics

โ€“ top, htop โ€“ Monitor system performance
โ€“ df -h, du -sh โ€“ Check disk usage
โ€“ journalctl -xe, systemctl status โ€“ View service logs & system status
โ€“ ps aux, kill -9 PID โ€“ Manage running processes

๐Ÿณ Docker Commands

โ€“ docker ps, docker images โ€“ List containers/images
โ€“ docker exec -it /bin/bash โ€“ Access running container
โ€“ docker-compose up -d โ€“ Start multi-container environments
โ€“ docker logs โ€“ View logs inside containers

โ˜๏ธ Kubernetes (kubectl)

โ€“ kubectl get pods โ€“ List pods in a namespace
โ€“ kubectl describe pod โ€“ View pod details
โ€“ kubectl logs โ€“ Debug logs
โ€“ kubectl apply -f .yaml โ€“ Deploy config
โ€“ kubectl exec -it -- /bin/sh โ€“ Interact with a container

๐Ÿ”„ CI/CD Tools (Git + Jenkins)

โ€“ git clone, git pull, git push โ€“ Version control basics
โ€“ git log --oneline โ€“ Quick commit history
โ€“ Jenkinsfile syntax: pipeline { stages { ... } } โ€“ Automate your build/test/deploy workflows

๐Ÿงช Infrastructure as Code (IaC)

Terraform
โ€“ terraform init, plan, apply โ€“ Manage infrastructure lifecycle
Ansible
โ€“ ansible-playbook .yml โ€“ Apply config to servers
โ€“ ansible -m ping all โ€“ Test host connectivity

๐Ÿ’ก Knowing these commands is like having a Swiss army knife for automation, monitoring, and rapid deployment.

โš ๏ธ Disclaimer: This list is for educational and training purposes only. Use commands responsibly within authorized and controlled environments.

Vulnerability in CUPS Amplifies DDoS Attacks
15/07/2025

Vulnerability in CUPS Amplifies DDoS Attacks

A recently disclosed vulnerability in the Common Unix Printing System (CUPS) can be exploited by malicious actors to launch attacks...

15/07/2025

๐Ÿš€ Been diving into some next-gen tracking, surveillance, and drone recon projects using AI on the Raspberry Pi ๐Ÿ›ฐ๏ธ

Honestly, having a blast building out some wildly cool stuff ๐Ÿค– โ€“ all powered by a Pi 5 running the Hailo AI HAT+ module and a simple Pi 3 Camera ๐Ÿ“ท

What you're seeing here is just the default functionality โ€“ and it already brings flat video to life ๐Ÿ”ฅ The pose estimation feature is next-level, overlaying a digital skeleton on every detected person ๐Ÿงโ€โ™‚๏ธ๐Ÿฆฟ

Ever wondered how agencies like the CIA identify people just by how they walk โ€“ even with masks on? ๐Ÿคซ Now you know...

Working on some โ€œsecret squirrelโ€ code ๐Ÿฟ๏ธ to have the AI count and analyze foot traffic, recognize license plates, and even describe passing vehicles ๐Ÿš—๐Ÿ”

And honestly, the possibilities are endless โ€“ you could build a smart home surveillance system, or mount this on a drone to look for armed individuals or follow specific vehicles ๐Ÿš

Oh, and this is all running on the slower 13 TOPS chip... and itโ€™s still lightning fast โšก If you want more horsepower, the 26 TOPS version is out there too ๐Ÿ’ฅ

The future isn't coming... it's already here ๐Ÿ”ฎ

๐Ÿ’ก

Address

Thessalonรญki

Alerts

Be the first to know and let us send you an email when Cybersecurity by CyberKid posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Share