<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 09:24:27 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/penetrationtesting/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Why Organizations Need Manual Penetration Testing]]></title><description><![CDATA[In this era of rising cybercrimesand never-ending cyber attacks, having proactive cybersecurity policies is a must for every organization. Many organizations have realized the importance of information]]></description><link>http://direct.ecency.com/manualpenetrationtesting/@twr/whyorganizationsneedmanualpenetrationtesting-7cf3ncofe7</link><guid isPermaLink="true">http://direct.ecency.com/manualpenetrationtesting/@twr/whyorganizationsneedmanualpenetrationtesting-7cf3ncofe7</guid><category><![CDATA[manualpenetrationtesting]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 30 Jan 2020 12:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQstst1uynghrX8KfVsMRABQCve2x2UaAUpxsPn7jyc4XP8J9QBASmBnx1T7spZisZJmYVtvgMJpdJXD3hty3mH6hd1rwx8gvDyLWxoqfR95izVDkAWLSMt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hello World!]]></title><description><![CDATA[Hi everyone, I'm new to this social platform so I'd like to present and tell a little of myself ☺️ My name's Marco, I'm a (not too young) guy that lives in Tuscany, Italy, together with my wife and two]]></description><link>http://direct.ecency.com/introduceyourself/@mark.hack/hello-world</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@mark.hack/hello-world</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[mark.hack]]></dc:creator><pubDate>Tue, 27 Aug 2019 13:58:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHRfvmtd53nmEJ94xpKydwmbSC5H5svBACH81BUWmpZr2xaBzXscRyGtGwNP3UbmaQUuTnRzZKkAFhUafuQxsKCjB4Hbve9MUd9jng1sbwiESt1YbfmYkcsdXdpegV8Mt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[how to perform call flooding attack tutorial]]></title><description><![CDATA[in this tutorial, we will learn How to perform Call Flooding Attack using Kali Linux Twilio Account Textnow Number a 10 min Email First of all you need to get nodejs Those are the commands use them in]]></description><link>http://direct.ecency.com/dtube/@pentesting/r4cmnzx6</link><guid isPermaLink="true">http://direct.ecency.com/dtube/@pentesting/r4cmnzx6</guid><category><![CDATA[dtube]]></category><dc:creator><![CDATA[pentesting]]></dc:creator><pubDate>Thu, 23 May 2019 20:36:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCM6wwbqya8cunnYhSNUGeSe2Lym746BqksVB932AFHWzJ4QDwmpQxhLrkkmubp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[hello]]></title><description><![CDATA[hello everyone just to let you know i would be posting contents on cyber security and penetration testing ,y'all can follow my story on]]></description><link>http://direct.ecency.com/penetrationtesting/@p3wned/hello</link><guid isPermaLink="true">http://direct.ecency.com/penetrationtesting/@p3wned/hello</guid><category><![CDATA[penetrationtesting]]></category><dc:creator><![CDATA[p3wned]]></dc:creator><pubDate>Sat, 08 Sep 2018 19:03:06 GMT</pubDate></item><item><title><![CDATA[SecPoint WIFI PEN TESTING MATRIX]]></title><description><![CDATA[CLICK HERE ?? Be sure to subscribe to SecPoint's YouTube channel, watch some of the previous videos and Playlists, and look us up on Facebook, Twitter, and Instagram. Email: info@secpoint.com Video Sites:]]></description><link>http://direct.ecency.com/dlive/@secpoint/186dab44-9a50-11e8-bb3a-0242ac110003</link><guid isPermaLink="true">http://direct.ecency.com/dlive/@secpoint/186dab44-9a50-11e8-bb3a-0242ac110003</guid><category><![CDATA[dlive]]></category><dc:creator><![CDATA[secpoint]]></dc:creator><pubDate>Tue, 07 Aug 2018 14:45:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiCuSt3rCYguvZ98x2mj34d8wdisrGMxse1hLSTKKT2MygPATaMXJYR9ahNM5wL8cfjaFAqER?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Theoretically Penetrationtesting #1]]></title><description><![CDATA[In this small series I would like to give a short introduction to the theoretical procedure of penetration tests. This series is divided into the following contributions: #1 What is penetration testing,]]></description><link>http://direct.ecency.com/penetrationtesting/@security101/en-theoretically-penetrationtesting-1</link><guid isPermaLink="true">http://direct.ecency.com/penetrationtesting/@security101/en-theoretically-penetrationtesting-1</guid><category><![CDATA[penetrationtesting]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Mon, 21 May 2018 09:07:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNchGPKLQuxAL7oEwDJ42cT977qXjChP5jf4TfSrJdhvxYgMExB7mCA52nz8G2JsViugML1KTvg5JQadM5EFwLPcpqnVdtgxadHwFndNW75he6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] Penetration Testing Theorie #1]]></title><description><![CDATA[In dieser kleinen Serie möchte ich eine kurze Einleitung zur theoretischen Vorgehensweise von Penetrationstests geben. Aufgeteilt ist diese Serie in folgende Beiträge: #1 Was ist Penetrationtesting,]]></description><link>http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-1</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-1</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Mon, 14 May 2018 19:40:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVZ5NRzV2o8MyJEzowAL6rjbt8w3dTGU7kXRtR68np8UcnVkVM5AKDRYNXd7z1PuX19qgf4mkJ7NwSgCe2EDx7WsfkfVqT5J5Y2qJtT2XVRzSfK9kLn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[ FORENSICS ] How to Dump Every Saved Password from a Computer]]></title><description><![CDATA[In this post we will see a faster and easier way to dump all saved passwords from a local computer. This will recover every stored password saved by each software using different technique, all hashdumps]]></description><link>http://direct.ecency.com/forensics/@israelany/forensics-how-to-dump-every-saved-password-from-a-computer</link><guid isPermaLink="true">http://direct.ecency.com/forensics/@israelany/forensics-how-to-dump-every-saved-password-from-a-computer</guid><category><![CDATA[forensics]]></category><dc:creator><![CDATA[israelany]]></dc:creator><pubDate>Sun, 01 Apr 2018 03:35:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPDuXRaduVYiCb9hxbZWDcAb1acVYBWSAwiworRxHswfLBNxUvpJNyYW1BCguk1kpddumW8mPrz7NqiYpnUB4ndgVaBGEfyi7YnREW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Penetration Testing Tools]]></title><description><![CDATA[@JCSC we are white hat developers but security and reporting of security information are daily responsibilities. Security when applied right still needs updated and ensuring that your applications and]]></description><link>http://direct.ecency.com/penetrationtesting/@jcsc/penetration-testing-tools</link><guid isPermaLink="true">http://direct.ecency.com/penetrationtesting/@jcsc/penetration-testing-tools</guid><category><![CDATA[penetrationtesting]]></category><dc:creator><![CDATA[jcsc]]></dc:creator><pubDate>Thu, 29 Mar 2018 17:12:27 GMT</pubDate></item><item><title><![CDATA[Step by step instructions to Become A White Hat Hacker ]]></title><description><![CDATA[Moral hacking is the ideal profession decision for those keen on critical thinking, correspondence and IT security. This is what it takes to wind up a white cap programmer. A white cap programmer, or moral]]></description><link>http://direct.ecency.com/tachnology/@saddam957/step-by-step-instructions-to-become-a-white-hat-hacker</link><guid isPermaLink="true">http://direct.ecency.com/tachnology/@saddam957/step-by-step-instructions-to-become-a-white-hat-hacker</guid><category><![CDATA[tachnology]]></category><dc:creator><![CDATA[saddam957]]></dc:creator><pubDate>Fri, 09 Mar 2018 10:39:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPYxQKgSGiJEpbUQiNZ95XM3jRauwnC7zSzHXXTHLJft2a?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Wireless Security]]></title><description><![CDATA[One of the tools used for wireless network detection is Kismet. Kismet is a tool that one can use to determine which wireless access points are accessible as well as wireless clients within range (Kismet]]></description><link>http://direct.ecency.com/cybersecurity/@dkabii/wireless-security</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@dkabii/wireless-security</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[dkabii]]></dc:creator><pubDate>Sat, 06 Jan 2018 11:07:42 GMT</pubDate></item></channel></rss>