<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 23:34:51 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/pentesting/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Pentera secures $60 Million in funding to train Cybersecurity Teams through Network Attack  Simulation]]></title><description><![CDATA[Cybersecurity has seen the need to strengthen itself through new methods and various mechanisms associated with practices that take artificial intelligence into account. This means that, nowadays, attackers]]></description><link>http://direct.ecency.com/hive-106817/@vikvitnik/pentera-secures-60-million-in-funding-to-train-cybersecurity-teams-through-network-attack-simulation-cq5</link><guid isPermaLink="true">http://direct.ecency.com/hive-106817/@vikvitnik/pentera-secures-60-million-in-funding-to-train-cybersecurity-teams-through-network-attack-simulation-cq5</guid><category><![CDATA[hive-106817]]></category><dc:creator><![CDATA[vikvitnik]]></dc:creator><pubDate>Wed, 12 Mar 2025 15:13:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/TZjG7hXReeVqFW2gBd8G6U79f2iitdUz6XDKewr2ghqcXJZRNUZTAqbFZc41QYqaSJ4KPjSFUrsvFUhFr7Q4nzGo3DdXxzcvrRgWmAjXrJDRzEE8qYe25RCzmnXvgtWQn7PHyBWcvva6kW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Democracies Surveill Their People?]]></title><description><![CDATA[Catalonia's parliament, Spain's autonomous region, is housed on the outskirts of Barcelona's Old City, in the ruins of a fortified citadel built by King Philip V to keep an eye on the restive local population.]]></description><link>http://direct.ecency.com/pegasus/@cryptoanonymo/how-democracies-surveill-their-people</link><guid isPermaLink="true">http://direct.ecency.com/pegasus/@cryptoanonymo/how-democracies-surveill-their-people</guid><category><![CDATA[pegasus]]></category><dc:creator><![CDATA[cryptoanonymo]]></dc:creator><pubDate>Thu, 12 May 2022 15:39:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/21PRtjKRXPQygJ5a3PGGYDUDAUQfmdSVQys4xPJjg96BTXJxGodbNRU4CQUSXDSbUwBDC1MMUu1zvGbiuMTmaQqQBEBk2JZ2cDC7VcyLvEHot8V4TCgwqxZjQmdnUaWwyfcGBjiShwu4zUfr9wqnt9c?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Pwnagotchi - The Open Source Wi-Fi Hand Shake Hacker]]></title><description><![CDATA[I love this little gadgets, especially when they make sense Reminds me of the times when wardriving was still a thing... I will build this cutey sooner or later 😏 Would you build and use something like]]></description><link>http://direct.ecency.com/pentesting/@ash/pwnagotchi-the-open-source-wi-fi-hand-shake-hacker</link><guid isPermaLink="true">http://direct.ecency.com/pentesting/@ash/pwnagotchi-the-open-source-wi-fi-hand-shake-hacker</guid><category><![CDATA[pentesting]]></category><dc:creator><![CDATA[ash]]></dc:creator><pubDate>Tue, 25 Aug 2020 08:16:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dvCVw3Wuy73dENKGJvcenyiz74NVTgeySNr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Pentration Testing]]></title><description><![CDATA[Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you]]></description><link>http://direct.ecency.com/aage/@aage/pentration-testing</link><guid isPermaLink="true">http://direct.ecency.com/aage/@aage/pentration-testing</guid><category><![CDATA[aage]]></category><dc:creator><![CDATA[aage]]></dc:creator><pubDate>Tue, 23 Jun 2020 21:15:00 GMT</pubDate></item><item><title><![CDATA[Make your own PWN phone (A phone hacking hacking tools) [Part1]]]></title><description><![CDATA[Hello people , in this post we are going to help you , to make a hacking device from your android phone . Until now I just could make it work with android , and cause the android is Linux based , I like]]></description><link>http://direct.ecency.com/linux/@bizhan/make-your-own-pwn-phone-a-phone-for-hacking-part1</link><guid isPermaLink="true">http://direct.ecency.com/linux/@bizhan/make-your-own-pwn-phone-a-phone-for-hacking-part1</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[bizhan]]></dc:creator><pubDate>Sun, 05 Jan 2020 08:37:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/gPCasciUWmF7YQUnfV1XYFwcZTW23aDxrriZFqaauV65iEqKT9RusHZYhh9uKo3bjswW71jvDSzjit9fpW8o4fTUdXfnqik7GAhKN2hTDnHHigxeQKJwCnRhzCK11EVdrKUdvCJ7wVbouxAJKQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[NEW Year, NEW skills! ]]></title><description><![CDATA[Happy new year 2020!!! Take advantage of the biggest Packt Publishing sale of the year! You can get the book for the lowest price ever of 5 $! #wifi #pentesting #kalilinux #linux #hacking]]></description><link>http://direct.ecency.com/wifi/@mark.hack/new-year-new-skills-dzz7pfs3</link><guid isPermaLink="true">http://direct.ecency.com/wifi/@mark.hack/new-year-new-skills-dzz7pfs3</guid><category><![CDATA[wifi]]></category><dc:creator><![CDATA[mark.hack]]></dc:creator><pubDate>Fri, 03 Jan 2020 19:20:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVtYhc8EyUCS1n2TpsbpKuDhBkZTQTi2NsGVP3cuDYfbsXixUwvVK8Mn7XywqoFhX1XFjvmx42LKBQTXVmfeq9cYG15hbo1J4yNzwCQyrWJr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Black Friday of Skills and Knowledge ]]></title><description><![CDATA[#BlackFriday is here! Take advantage of it and improve your skills and knowledge about wifi penetration testing with the Kali Linux distribution. Get the book for only 10$!]]></description><link>http://direct.ecency.com/blackfriday/@mark.hack/black-friday-of-skills-and-knowledge-ew8qds4q</link><guid isPermaLink="true">http://direct.ecency.com/blackfriday/@mark.hack/black-friday-of-skills-and-knowledge-ew8qds4q</guid><category><![CDATA[blackfriday]]></category><dc:creator><![CDATA[mark.hack]]></dc:creator><pubDate>Wed, 27 Nov 2019 14:47:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVtYhc8EyUCS1n2TpsbpKuDhBkZTQTi2NsGVP3cuDYfbsXixEekS14jLvufQ4kqem4H4PdFwxdY6dDBYxgB3JBP8mYy4tjgZQWfQ63eAibLy?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[4] Blog Update 20th November 2019]]></title><description><![CDATA[Picture coming soon Good evening, Steemit, and all you geeks who are reading my blogs! Today's topic is about Scanning and Enumeration of a network (or a network of hosts)- And I promise that it's going]]></description><link>http://direct.ecency.com/online/@genezyz/4-blog-update-20th-november-2019</link><guid isPermaLink="true">http://direct.ecency.com/online/@genezyz/4-blog-update-20th-november-2019</guid><category><![CDATA[online]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Wed, 20 Nov 2019 12:20:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/vM1pGHgNcyCXUWJECrZbvn1NMPj1oFGUo3gYfF3NNPRD9ZrD2hZzWWJmCHdz8vR7MnH6K7htP9eAQXtfZiWYHSUuDVCfgG49MBRRsRWLdHTR5wDDtvRPQnoXVxYg16MG1GyJVVQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Installing Malware On a Computer: Reverse Shells(Hacking-106a)]]></title><description><![CDATA[In this hands-on tutorial you'll install persistent malware on to a system. There are many methods to do so including: Uploading malware into webpage code(this tutorial) Using Metasploit to use pre-made]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/getting-malware-on-a-computer-reverse-shells-hacking-106a</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/getting-malware-on-a-computer-reverse-shells-hacking-106a</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sat, 16 Nov 2019 00:33:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvZdXF1cDXGaVEQy2MsXsigZwzoGKSjopa4hR2fKNG3LwkXeiLaZD7qKmV5xm3pfZriWAuYdMKXJDVbV8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Gaining Initial Access: Bruteforcing Wordpress Logins (Hacking-105a)]]></title><description><![CDATA[Wordpress powers 34% of websites & today you'll learn to hack it! You'll be able to apply this knowledge to 1 out of every 3 websites (over 75,000,000)! This tutorial will be broken up into two separate]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/hacking-tutorial-getting-initial-access-bruteforcing-wordpress-logins-hacking-105a</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/hacking-tutorial-getting-initial-access-bruteforcing-wordpress-logins-hacking-105a</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Wed, 06 Nov 2019 02:22:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPdNA3DrWywb22Eie3csnb8iZs8h1wgbCv4UkTQXPXS1s7XKkigKcaDoqdZoxeTh6hDFR57C79g?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Password Cracking Using Rainbow Tables & Hashcat (Hacking-104)]]></title><description><![CDATA[There are many reasons you may need to crack a password. Perhaps you are examining breach data or have stolen credentials and only have hashed passwords, or maybe you forgot the encryption keys to one]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/password-cracking-using-rainbow-tables-and-hashcat</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/password-cracking-using-rainbow-tables-and-hashcat</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Mon, 04 Nov 2019 22:31:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPZVLidc5bkSreXNi2sqr3ieKUAa1AeTmxaoQQ5Tqoox9g5MZ8BgVPonKFovh3UCpDGWfRRL4xE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Gathering OSINT Like a Hacker (Hacking-103a)]]></title><description><![CDATA[Today I'm going to teach you to perform recon on a REAL organization. This is the first(and most important) step in hacking. The organization we'll be performing recon on is hyatt.com. They have an open]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/perform-recon-like-a-boss-hacking-methodology-part-2a-gathering-osint</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/perform-recon-like-a-boss-hacking-methodology-part-2a-gathering-osint</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Wed, 30 Oct 2019 00:41:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvZh5js2XZXhX7EAjP9Nw1NMVPTzYru3BJv49Ls2csSyAyCzHH7rntBXxS2FCFsAz8UtxBEnA1Epza6wY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Web Pentesting für Einsteiger #2 - Cross Site Scripting]]></title><description><![CDATA[Teil 2 unserer Web #Pentesting für #Einsteiger Videoreihe ist live! Heute werfen wir einen Blick auf die drei Varianten von Cross-Site-Scripting. #XSS #CrossSiteScripting #Youtube #Video]]></description><link>http://direct.ecency.com/deutsch/@lastbreach/web-pentesting-fuer-einsteiger-2-cross-site-scripting</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@lastbreach/web-pentesting-fuer-einsteiger-2-cross-site-scripting</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[lastbreach]]></dc:creator><pubDate>Fri, 11 Oct 2019 15:10:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dxgpd4TWogqWiJLcPcjbE3ymzjxyPUARZUS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hacking Methodology- A Step-by-Step Primer(Hacking-101)]]></title><description><![CDATA[Today we'll cover the tools and tactics a hacker or pentester takes to go about an operation. Every tool and step will be elaborated upon in depth in future tutorials but before we can get to that you]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/hacking-methodology-a-step-by-step-primer-hacking-101</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/hacking-methodology-a-step-by-step-primer-hacking-101</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Thu, 10 Oct 2019 21:48:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvQoXyxfgsHSgYh6c7HBtWSjpNBRemor36Qzh9CUgceTj8KXNVow9WFpGoKPp4LwL1MjMxqvdQ846zYWa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Web Pentesting für Einsteiger - Part 1 - Brute Force mit ZAP]]></title><description><![CDATA[Unser neustes #Video ist live und wir schließen direkt an unsere "Linux für #Einsteiger"-Reihe an. Nachdem die #DVWA Anwendung jetzt installiert ist, werfen wir mit OWASP #ZAP einen Blick auf]]></description><link>http://direct.ecency.com/deutsch/@lastbreach/web-pentesting-fuer-einsteiger-part-1-brute-force-mit-zap</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@lastbreach/web-pentesting-fuer-einsteiger-part-1-brute-force-mit-zap</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[lastbreach]]></dc:creator><pubDate>Fri, 04 Oct 2019 15:31:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eFzRvHjz6sgH7rP43kXG226SWCHG8hED1eN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Linux Server Administration für Security Einsteiger - Teil 4 (DVWA)]]></title><description><![CDATA[Im heutigen Video installieren wir #OpenSSH und verbinden uns mit dem Server über den SSH-Client Putty. #SSH ist in der Linuxwelt der De-Fakto-Standard für Remote Administration und das aus gutem Grund.]]></description><link>http://direct.ecency.com/deutsch/@lastbreach/linux-server-administration-fuer-security-einsteiger-teil-4-dvwa</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@lastbreach/linux-server-administration-fuer-security-einsteiger-teil-4-dvwa</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[lastbreach]]></dc:creator><pubDate>Sat, 28 Sep 2019 18:33:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eEMN6VRf52daUeeGTsuSn9TCJZ3x7fqtPtA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Packt Publishing Data Unlocked promotion]]></title><description><![CDATA[Get advantage of the September "Data Unlocked" promotion and get my book "Kali Linux Wireless Penetration Testing Essentials" for only 10$ or 9€!]]></description><link>http://direct.ecency.com/wifi/@mark.hack/packt-publishing-data-unlocked-promotion-knjkhbnr</link><guid isPermaLink="true">http://direct.ecency.com/wifi/@mark.hack/packt-publishing-data-unlocked-promotion-knjkhbnr</guid><category><![CDATA[wifi]]></category><dc:creator><![CDATA[mark.hack]]></dc:creator><pubDate>Sat, 07 Sep 2019 09:57:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVtYhc8EyUCS1n2TpsbpKuDhBkZTQTi2NsGVP3cuDYfbsXixUdMp9gjArQxWsGZ1UEfUxj8ohSFnNGjZpafqbzV9c5pWrADEyyABw8ZA39Ci?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Wanna learn Penetration Testing easily?]]></title><description><![CDATA[1. Metasploit Metasploit is a very popular collection of various penetration tools. Cyber security professionals and other IT experts have used it for years to accomplish various objectives, including]]></description><link>http://direct.ecency.com/pentesting/@pasan.malith94/wanna-learn-penetration-testing-easily</link><guid isPermaLink="true">http://direct.ecency.com/pentesting/@pasan.malith94/wanna-learn-penetration-testing-easily</guid><category><![CDATA[pentesting]]></category><dc:creator><![CDATA[pasan.malith94]]></dc:creator><pubDate>Fri, 06 Sep 2019 21:10:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/7258xSVeJbKkzXhyseBP4PYz11eBDT8sW2oR1a4vfVFS6JLBktpPzYJinQbkiTPBuv3KHR7FtNUqagZjyEbmyCPT6iNnq7YdkrHY8VdZRiP7BYhsrXa7KeU4vzn5Ww9aHrB2z2F1eHLuc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hack The Box - An online platform to test your skills in pentesting]]></title><description><![CDATA[Hack The Box An online platform to test your skills in pentesting Screenshots View ImageView Image Hunter's comment Hello Friends, Introducing Hack The Box is an online platform For pen testers where they]]></description><link>http://direct.ecency.com/steemhunt/@moeenali/hack-the-box-an-online-platform-to-test-your-skills-in-pentesting</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@moeenali/hack-the-box-an-online-platform-to-test-your-skills-in-pentesting</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[moeenali]]></dc:creator><pubDate>Sun, 14 Jul 2019 16:29:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBS1JC4ECJRzYdFXdWNFRcoEm9dYu5JVEbMmmAsQ4hpuqHRCc2U8qPB9nzVBw7DjUJ2br8VfHLuSNeZcvfYXNnTM3JvnLByNadKnbm8bJjRdUxz8boBJvJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[SQLMap - Automatic SQL injection and database takeover tool]]></title><description><![CDATA[SQLMap Automatic SQL injection and database takeover tool Screenshots Hunter's comment Talking about the security of a web application, attacks with SQL injection types often occur, SQL Map is a tool that]]></description><link>http://direct.ecency.com/steemhunt/@iqbaladan/sqlmap-automatic-sql-injection-and-database-takeover-tool</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@iqbaladan/sqlmap-automatic-sql-injection-and-database-takeover-tool</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[iqbaladan]]></dc:creator><pubDate>Sun, 30 Jun 2019 14:30:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLyABTyoSVEQRbohV57NdiExhyKmyGitDhyXhBJPBHQDK3yc8y57sdbZifVNXSe2U8PtFkZRwH4g7qzQSXuPGdmGmK24hN33EBbNL9qTWvfYQMse5anJZ48Az1k?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>