<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 21:59:12 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/freehackingchallenges/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[DSXS | An open source, simple and effective XSS scanner that can be easily customized]]></title><description><![CDATA[Damn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities, the tool has been developed in Python 3. It is really simple and the code can be analysed and used for learning.]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/dsxsanopensourcesimpleandeffectivexssscannerthatcanbeeasilycustomized-w4gdyxrmrb</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/dsxsanopensourcesimpleandeffectivexssscannerthatcanbeeasilycustomized-w4gdyxrmrb</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 23 Nov 2019 18:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wqmmrnxJXiTRkhcib9Wjr1iPdLDLr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Kioptrix 1.0 - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Kioptrix 1.0 is the first level of the Kioptrix machines CTF challenges. As you can understand this is the easiest challenge to solve. The main focus of this machine is to learn how to use basic enumeration]]></description><link>http://direct.ecency.com/bestkioptrix1-0hackingchallenges/@twr/kioptrix10-vulnhubctfchallengewalkthrough-zdptkb19l6</link><guid isPermaLink="true">http://direct.ecency.com/bestkioptrix1-0hackingchallenges/@twr/kioptrix10-vulnhubctfchallengewalkthrough-zdptkb19l6</guid><category><![CDATA[bestkioptrix1-0hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 28 Dec 2018 17:30:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxviCcTEcQZJDMP7ycru6jvpknK76u9SY49Er9dDrUa5mEomMbTXYeZepry1VQeWQVhUhZQuvrjaRUcnHC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Born2Root - CTF Hacking Challenge (Vulnhub)]]></title><description><![CDATA[Born2Root was developed by " HadiMene" to complete the challenge you will need to gain root access DHCP is enabled on this machine meaning it will automatically pick an IP address. In my case,]]></description><link>http://direct.ecency.com/bestborn2rootvmhackingchallenges/@twr/born2root-ctfhackingchallengevulnhub-7rjj5prfqd</link><guid isPermaLink="true">http://direct.ecency.com/bestborn2rootvmhackingchallenges/@twr/born2root-ctfhackingchallengevulnhub-7rjj5prfqd</guid><category><![CDATA[bestborn2rootvmhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 18 Nov 2018 12:00:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72RDGs8eAbHFrr6EfYFGHt4sBF76t4eY6FnztSajbbYxY8pztMY4GecrJDWRczUtscTvnyokhQigBG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Moria: 1.2 - CTF Hacking Challenge (Vulnhub)]]></title><description><![CDATA[Moria 1.2 is themed around the world of Lords of The Rings. With DHCP enabled we will need to find our target IP address trough net discover or a similar arp based tool. Use nmap command for port enumeration]]></description><link>http://direct.ecency.com/freehackingchallenges/@twr/moria12-ctfhackingchallengevulnhub-babdatry61</link><guid isPermaLink="true">http://direct.ecency.com/freehackingchallenges/@twr/moria12-ctfhackingchallengevulnhub-babdatry61</guid><category><![CDATA[freehackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 17 Nov 2018 12:00:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxviCcTEcQZJDMP7ycru6jvpknK76u9SY49Er9dDrUa5mEomMbTXYeZepry1VQeWQVhUTBLhiHDgcvURJ6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[FourAndSix:1  CTF Hacking Challenge Walkthrough (Vulnhub)]]></title><description><![CDATA[FourAndSix is a capture the flag challenge available at Vulnhub. As usual, the box grabbed an IP address on boot since DHCP is enabled: In my case the IP address was 192.168.10.100 If you are not sure]]></description><link>http://direct.ecency.com/bestfourandsix-1hackingchallenges/@twr/fourandsix1ctfhackingchallengewalkthroughvulnhub-vxct4ytvwp</link><guid isPermaLink="true">http://direct.ecency.com/bestfourandsix-1hackingchallenges/@twr/fourandsix1ctfhackingchallengewalkthroughvulnhub-vxct4ytvwp</guid><category><![CDATA[bestfourandsix-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 14 Nov 2018 10:07:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNYnhfeAYBj8aUdhSAdAFg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Billu-b0x 2 Hacking Challenge Walkthrough (Vulnhub)]]></title><description><![CDATA[The aim of this lab is to attain root privileges. As usual the first step is mapping the IP address of the box so that we can begin the enumeration process. On boot, the machine grabbed the following IP]]></description><link>http://direct.ecency.com/bestbillub0x2hackingchallenges/@twr/billu-b0x2hackingchallengewalkthroughvulnhub-nwv3ms8u4f</link><guid isPermaLink="true">http://direct.ecency.com/bestbillub0x2hackingchallenges/@twr/billu-b0x2hackingchallengewalkthroughvulnhub-nwv3ms8u4f</guid><category><![CDATA[bestbillub0x2hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 13 Nov 2018 13:16:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNYnhfeAXdGazKR9thmcKg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[W1R3S: 1.0.1 - Vulnhub CTF Walkthrough]]></title><description><![CDATA[W1R3S is a vulnerable machine by design meant to help you polish your penetration test skills. On this box you are required to gain root access and read a flag located at /root directory. DHCP is enabled]]></description><link>http://direct.ecency.com/bestw1r3s-101hackingchallenges/@twr/w1r3s101-vulnhubctfwalkthrough-0684kuflcp</link><guid isPermaLink="true">http://direct.ecency.com/bestw1r3s-101hackingchallenges/@twr/w1r3s101-vulnhubctfwalkthrough-0684kuflcp</guid><category><![CDATA[bestw1r3s-101hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 09 Nov 2018 10:30:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72RDGs8eAbHFrr6EfYFGHt4sBF76t4eY6FnztSajbbYxY8pztMY4GecrJDWRczUtscTvnnuJUbPZYr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[MinU: 1 Vulnhub Hacking Challenge Walkthrough]]></title><description><![CDATA[MinU: 1 a boot2root challenge available at Vulnhub. It is based on Ubuntu and has DHCP enabled. In my case the box grabbed the following IP address. 192.168.1.101 To check for services running in this]]></description><link>http://direct.ecency.com/bestminu-1hackingchallenges/@twr/minu1vulnhubhackingchallengewalkthrough-z8f2lkxn0g</link><guid isPermaLink="true">http://direct.ecency.com/bestminu-1hackingchallenges/@twr/minu1vulnhubhackingchallengewalkthrough-z8f2lkxn0g</guid><category><![CDATA[bestminu-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 02 Nov 2018 09:43:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJaNXywTd35FmuBgqmH1XbTzf75TEmRcrEVSAAd2g5nM5HKhxRpZ9j17hJcLL2dYhVpCUfcANa8qLAosaDoAYBkpXUNW2zvE4U9LAzcuMg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Temple of Doom: 1 | Vulnhub Hacking Challenge Walkthrough]]></title><description><![CDATA[From my experience,I would rate this cool box posted by 0katz at Vulnhub as intermediate since you are required to think outside the box to hack it. With that in mind lets get started: Note: If DHCP is]]></description><link>http://direct.ecency.com/besttempleofdoom-1hackingchallenges/@twr/templeofdoom1vulnhubhackingchallengewalkthrough-535mz3v221</link><guid isPermaLink="true">http://direct.ecency.com/besttempleofdoom-1hackingchallenges/@twr/templeofdoom1vulnhubhackingchallengewalkthrough-535mz3v221</guid><category><![CDATA[besttempleofdoom-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 27 Oct 2018 13:00:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/ADdPNihJzmPbFsB2Gj3LJkb1g7K6uxVWQ4UDFvxP6gECJ2W3uu1hW48RYrVfe5S53EazCsfri7xPUbT2wXUd4g3ok?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lampião: 1 Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Lampião 1 is a unique challenge available at Vulnhub. The box was created for beginners. As usual, let’s find the IP address of the box using arp-scan -l: Great, we now have a list of all hosts. Now we]]></description><link>http://direct.ecency.com/bestlampiao-1hackingchallenges/@twr/lampio1vulnhubctfchallengewalkthrough-okqz5bw0ll</link><guid isPermaLink="true">http://direct.ecency.com/bestlampiao-1hackingchallenges/@twr/lampio1vulnhubctfchallengewalkthrough-okqz5bw0ll</guid><category><![CDATA[bestlampiao-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 26 Oct 2018 09:39:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/ADdPNihJzmPbFsB2Gj3LJkb1g7K6uxVWQ4UDFvxP6gECJ2W3uu1hW48RYrVfe5S53EazCsfri7xPUbT2iSUaB8cNa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Temple of Doom - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Temple of Doom is a Boot2Root CTF Challenge and is available at Vulnhub. This machine is intended for "Intermediates" and requires a lot of time and good enumeration skills to get root. In this]]></description><link>http://direct.ecency.com/besttempleofdoomhackingchallenges/@twr/templeofdoom-vulnhubctfchallengewalkthrough-6y9vpu0a7w</link><guid isPermaLink="true">http://direct.ecency.com/besttempleofdoomhackingchallenges/@twr/templeofdoom-vulnhubctfchallengewalkthrough-6y9vpu0a7w</guid><category><![CDATA[besttempleofdoomhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 25 Sep 2018 11:06:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kxUsiQNU1QSEqyBVS3nbLPaasLZxPdpH6RSbNaVNYkRJFKhDxA3tNBKXiS8Gz8RwRKwtxJYg4DVxChoThthr9X1EbGEFtHyEx5yZ6uYBYNx3TPwWh7MyP5rFASwZZo7VF6FUnwY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BTRSys - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[BTRSys is a Boot2Root Challenge and is available at Vulnhub. This is a really interesting CTF challenge, especially as its Client Side Restrictions using JavaScript. In this walkthrough, I'll be using]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/btrsys-vulnhubctfchallengewalkthrough-ji6dtglgrr</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/btrsys-vulnhubctfchallengewalkthrough-ji6dtglgrr</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 23 Sep 2018 02:30:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFuCTWkFvuu5WgJLySqUq4Ye72tSsp5JaXxUyES1JT1Vxo8SidJ1wquhcr9aUnsZx31AP8CT2rUHkcz4ZZDLPzPs778kP3b3pAD42Qo57oPKSCW2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Pluck - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Pluck is a Boot2Root CTF Challenge and is available at Vulnhub. This challenge is for "Intermediates" and requires some good enumeration and exploitation skills to get root. In this walkthrough,]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/pluck-vulnhubctfchallengewalkthrough-5pquq6mrzl</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/pluck-vulnhubctfchallengewalkthrough-5pquq6mrzl</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 22 Sep 2018 19:00:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SxE1dY1QTU7zGDPmiWvv4r6HWjRBJKPaHukeYjWZoSkUWmT358?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[H.A.S.T.E - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[H.A.S.T.E is available at Vulnhub. This is not a Boot2Root Challenge and getting lower shell is enough. This VM is intended for "Intermediates" and has a medium difficulty level. In this]]></description><link>http://direct.ecency.com/besth-astehackingchallenges/@twr/haste-vulnhubctfchallengewalkthrough-164wkvrhwa</link><guid isPermaLink="true">http://direct.ecency.com/besth-astehackingchallenges/@twr/haste-vulnhubctfchallengewalkthrough-164wkvrhwa</guid><category><![CDATA[besth-astehackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 18 Sep 2018 15:00:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQstst1uynghrX8KfVsMRABQCve2x2UaAUpxsPn7jyc4XP8J9QBASmBnx1T7skRfJUpzLxfcYnCHhqNM83zAFugWMwHBayoAjtWFUpJ1unVK3Udq2agvbTc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lin.Security - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Lin Security is available at Vulnhub. This VM is made for "Beginners" to master Privilege Escalation in Linux Environment using diverse range of techniques. There is no vulnerability in Kernel]]></description><link>http://direct.ecency.com/bestlin-securityhackingchallenges/@twr/linsecurity-vulnhubctfchallengewalkthrough-88snxkloxo</link><guid isPermaLink="true">http://direct.ecency.com/bestlin-securityhackingchallenges/@twr/linsecurity-vulnhubctfchallengewalkthrough-88snxkloxo</guid><category><![CDATA[bestlin-securityhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 16 Sep 2018 12:20:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBPrpKosyNE5GkXfDM8nQbhsa4YVzKuvHCHkvZMC3VEP6XPVomDj1rS6syk5H2ga9VWT8gp6XLNKzoRHs3yB2y9BhNtZf8R9CcTUktjxDQLJCRe1kxCfLz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[FristiLeaks - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[FristiLeaks is available at VulnHub. It requires a lot of enumeration to root this VM. This VM is intended for beginners. In this walkthrough, I'll be using Parrot Security OS but you can use any other]]></description><link>http://direct.ecency.com/bestfristileakshackingchallenges/@twr/fristileaks-vulnhubctfchallengewalkthrough-0w5bqi1vil</link><guid isPermaLink="true">http://direct.ecency.com/bestfristileakshackingchallenges/@twr/fristileaks-vulnhubctfchallengewalkthrough-0w5bqi1vil</guid><category><![CDATA[bestfristileakshackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 02 Sep 2018 15:00:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SwnUDDUoXSnjupcvZv2LYsMmeAotvF2ruougk2p34njR6JCBYJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Sick OS 1.1 - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[Sick OS is available at VulnHub. This machine is similar to ones you might see in OSCP labs. This is a challenging and exciting CTF that contains multiple vulnerabilities and privilege escalation vectors.]]></description><link>http://direct.ecency.com/bestsickoshackingchallenges/@twr/sickos11-vulnhubctfchallengewalkthrough-ogm630zwzj</link><guid isPermaLink="true">http://direct.ecency.com/bestsickoshackingchallenges/@twr/sickos11-vulnhubctfchallengewalkthrough-ogm630zwzj</guid><category><![CDATA[bestsickoshackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 29 Aug 2018 18:12:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPDSo5wavrnZYWhf6NUVUiYs2vVj2RvPXYxqQKVUffSViUCMUAFwxYTZbBpnSZQs9VoQDALCeuM5RhUM8q75ramuo6WCYDLLesjU7p?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BlackLight - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[Blacklight is a beginner level CTF challenge. The VM is available at VulnHub. This challenge is very easy and short as compared to other VulnHub Challenges. Import the VM into the Virtualbox and turn on.]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/blacklight-vulnhubctfchallengewalkthrough-rc81qq6m7w</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/blacklight-vulnhubctfchallengewalkthrough-rc81qq6m7w</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 26 Aug 2018 19:00:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SwnUAbPFQLjahP9NJmPyf1ACCgdGtGtiH75fzvWwByENRmbhkz?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>