Skip to content
View dokDork's full-sized avatar

Block or report dokDork

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
dokDork/README.md

👨‍💻 About me

Hi, I’m @dokDork. I think that loving security means loving knowledge.

🏴‍☠️ Cyber Security Uncertainty principles

Cyber security offers few certainties. Below I have tried to summarize some uncertainty principles that I have experienced in real life:

  • First principle: there is no upper limit to the amount of security that can be applied to a system.
  • Second principle: no matter how much security has been inserted into a system, the system will still be hackable.
  • Third principle: Time erodes the security of a system.

📖 So what can we do?

To make a system secure you must get as much information as possible about that system, you must analyze it from many points of view trying to understand how to change its predefined behavior. Hacking is a methodology that allows you to analyse system much deeply then most people can.
Hacking requires you to increase your knowledge every day.
So start now; read, experiment, verify the results, correct your beliefs, learn new things and start again, broadening the field of your knowledge each time.

Popular repositories Loading

  1. SiteSniper SiteSniper Public

    bash script to automate the penetration test

    Shell 7

  2. dokDork dokDork Public

    Config files for my GitHub profile.

  3. CommandInjectionShield CommandInjectionShield Public

    This script will prepare some tmux session precompiled to test command injection on some web page parameter (on a GET or POST request).

  4. DNSWatchdog DNSWatchdog Public

    it analyzes TCP and UDP packets that have been captured by a wireshark session during a DNS spoofing attack. This allows us to understand which hostnames our target is trying to connect to and whic…

    Python

  5. webDataExtractor webDataExtractor Public

    It explores all the web pages of a specific web site and extract from them: emails, Usernames, HTML comments, Telephone number and Links.

    Python

  6. stager stager Public

    In this section, we present several stagers that, as of December 2024, can be used on Windows to download simple backdoors (for example, those obtained from https://www.revshells.com/) without trig…

    PowerShell