text
stringlengths
9
334k
# SQLMap - Cheetsheat <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong...
# Mr. Robot ## Table of Contents * [Summary](#summary) * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [SSH](#ssh) * [FTP](#ftp) * [SMTP](#smtp) * [DNS](#dns) * [HTTP](#http) * [POP3](#pop3) * [RPC](#rpc) * [IMAP](#imap) * [NetBIOS](#netbios) * [SMB](#s...
# SecNotes URL: https://app.hackthebox.com/machines/SecNotes Level: Medium Date 29 Apr 2021 ## Walkthrough - [Enumeration](#enumeration) - [User flag](#user-flag) - [Privesc](#privesc) # Enumeration ## NMAP ``` # Nmap 7.91 scan initiated Sat Apr 17 15:29:48 2021 as: nmap -T4 -A -p- -oN 01_nmap.txt 10.10.10.97 N...
<div align="center"> <h1> AD-Pentesting-Notes :nepal: </h1> <a href="https://twitter.com/nirajkharel7" ><img src="https://img.shields.io/twitter/follow/nirajkharel7?style=social" /> </a> </div> **AD Basics** - Domains - Domains are used to group and manage objects in an organization - An administrative boundary f...
# Awesome-Android-Security ![awesome](https://awesome.re/badge.svg) ![Screenshot](img/androidsec.png) # Table of Contents - [Blog](#blog) - [How To's](#how-tos) - [Paper](#paper) - [Books](#books) - [Course](#course) - [Tools](#tools) * [Static Analysis Tools](#Static-Analysis) * [Dynamic Analysis Tools](#Dyna...
# 80,443 - Pentesting Web Methodology <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/s...
# OSCP_BIBLE > This is a collection of resources, scripts, bookmarks, writeups, notes, cheatsheets that will help you in OSCP Preparation as well as for general pentesting and learning. ### If you feel like you can contribute in it. Please do that, I'll appreciate you. ## Resources * [OSCP Survival Guide](https://gi...
# Blunder: 10.10.10.191 ## Hints - Search for hidden directories on the website... and hidden files with common file extensions - To get a foothold you will need two exploits, one to bypass login restrictions and one to get code execution - Try to make a password wordlist instead of using the common options - Moving ...
# Website Security Being hacked means that someone (or something) has gained access to your website files without your permission. There are many things a hacker might do once they are inside your website: Steal personal information like client data and credit card details. Watch this youtube channel to know all abo...
# Recon-bugbounty Simple recon using multiple tools! ![enum](https://raw.githubusercontent.com/hackerspider1/Recon-bugbounty/main/enum.png) If you have Go installed and configured (i.e. with $GOPATH/bin in your $PATH): ### Install Assetfinder ` ▶ go get -u github.com/tomnomnom/assetfinder ` ### Install anew ` ▶...
# CyberSecurity_Resources A collection of awesome software, libraries, documents, books, resources and cool stuff about security. Inspired by [awesome-php](https://github.com/ziadoz/awesome-php), [awesome-python](https://github.com/vinta/awesome-python). Thanks to all [contributors](https://github.com/sbilly/awesome...
# OVIC Benchmarker for NIPS 2018 This folder contains the SDK for track one of the [Low Power ImageNet Recognition Challenge workshop at NIPS 2018.](https://lpirc.ecn.purdue.edu/) ## Pre-requisite Follow the steps [here](https://www.tensorflow.org/lite/demo_android) to install Tensorflow, Bazel, and the Android NDK ...
<p align='center'> <img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br> <a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.2"><img src="https://img.shields.io/badge/Version-1.1.2-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/Tuhinshubhra/CMSeeK/"...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) English version goes [here](README_EN.md). `Arthas` 是Alibaba开源的Java诊断工具,深受开发者喜爱。 当你遇到以下类似问题而束手无策时,`Arthas`可以帮助你解决: 0. 这个类从哪个 jar 包加载的?为什么会报各种类相关的 Exception? 0. 我改的代码为什么没有执行到?难道是我没 commit?分支搞错了? 0. 遇到问题无法在线上 debug,难道只能通过加日志再重新发布吗? 0. 线上遇到某个用户的数据处理有问题,但线上同样无法 de...
# Official info The Wifi devboard ships with [Blackmagic firmware](https://github.com/flipperdevices/blackmagic-esp32-s2) installed. The Flipper documentation [is here](https://docs.flipperzero.one/development/hardware/wifi-debugger-module), and Blackmagic is [over here](https://black-magic.org/). Quick start: Connec...
# Awesome Pentest Cheat Sheets [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) Collection of cheat sheets useful for pentesting ### Contribution Your contributions and suggestions are heartily welcome. Please c...
# Penetration Testing and Capture the Flag Cheatsheets ## Overview This repository is for capturing commonly used commands and tools used during penetration testing and capture the flag exercises (e.g. hackthebox.eu).
# MITM-cheatsheet We tried to put together all known MITM attacks and methods of protection against these attacks. Here is also contains tools for carrying out MITM attacks, some interesting attack cases and some tricks associated with them. **Note:** Almost all attack tools, described here, doesn't have any sniffer ...
# Venom ![venom](../venom.png) #### Offensive Security Framework for Vulnerability Scanning & Pentesting ![os](https://img.shields.io/badge/OS-Linux,%20Windows-green.svg) [![pythonver](https://img.shields.io/badge/python-3.6%2B-green.svg)](https://www.python.org/downloads/release/python-3614) [![License: GPLV3](http...
# Awesome Hacking -An Amazing Project [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) A curated list of awesome Hacking. Inspired by [awesome-machine-learning](https://github.com/josephmisiti/awesome-machine-lea...
<h1 align="center"> <img src="static/cloudlist-logo.png" alt="cloudlist" width="400px"></a> <br> </h1> <p align="center"> <a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a> <a href="https://github.com/projectdiscovery/cloudlist/issues"><img src="https:/...
# Payloads All The Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I <3 pull requests :) You can also contribute with a beer IRL or with `buymeacoffee.com` [![Coffee](https://www.buymeacoffee.com/assets/img/custom_images/orange_img....
# Cyber Security Resources I have collected many FREE resources and will add many more in the future :) Hopefully it will help you a lot :D Credits are also included for some google docs Thanks to - [Dasith](https://github.com/dasithsv) - [YVS37](https://github.com/YVS37) - [Swanand](https://swanandx.github.io/) - [...
- Group Members Disclosure - https://bugreader.com/onehackzero@determine-members-in-a-closed-facebook-group-83 - https://philippeharewood.com/determine-members-in-a-closed-facebook-group/ - https://philippeharewood.com/view-former-members-of-a-facebook-group/ - Page Admin Disclosure - https://bugreader.com/j...
# Practical Cyber Security Resources 🌟 This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝 I hope you find it useful.🌸😌 In addition, other platforms where you can connect with me for articles, repositories, and more that I will publish in the new year; - https://www.linkedi...
# CC - PENTESTING // TRYHACKME ### [Section 1 - Network Utilities] - nmap - What does nmap stand for? - `network mapper` - How do you specify which port(s) to scan? - `-p` - How do you do a "ping scan" (just tests if the host(s) is up)? - `-sn` - What is the flag for a UDP scan? - `-sU` - How do you run ...
# Example app using Netlify CMS ## How to use ### Using `create-next-app` Execute [`create-next-app`](https://github.com/segmentio/create-next-app) with [Yarn](https://yarnpkg.com/lang/en/docs/cli/create/) or [npx](https://github.com/zkat/npx#readme) to bootstrap the example: ```bash npx create-next-app --example w...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v1.6.0.2"> <img src="https://img.sh...
# Enumeration-Guide Enumeration Guide A port of all ports Enumeration Guide. I began working on something similar myself involving excel, until I came into this little gem. The original document can be found here: https://github.com/six2dez/OSCP-Human-Guide/blob/master/oscp_human_guide.md I decided to archive here ...
# InfoSec-Resources4All -Only the best quality InfoSec-resources shared, based on regular sourcing of publicly available content found on the internet. -The resources shared below have personally benefited me greatly in persuing a career within the IT Security & Information Security job sectors. -The content essentia...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.7"> <img src="https://...
# Security >_[Training](https://github.com/simplonco/training) / Security_ ![SQL Injection](https://imgs.xkcd.com/comics/exploits_of_a_mom.png) Plusieurs axes se dégagent : - bonnes pratiques personnelles (mots de passe et autres), - comprendre la cryptographie (toujours les mots de passe mais pas que), - comprendre ...
[![Build Status](https://github.com/ytdl-org/youtube-dl/workflows/CI/badge.svg)](https://github.com/ytdl-org/youtube-dl/actions?query=workflow%3ACI) youtube-dl - download videos from youtube.com or other video platforms - [INSTALLATION](#installation) - [DESCRIPTION](#description) - [OPTIONS](#options) - [CONFIGURAT...
SQL INJECTION ATTACK The following are implemented the SQl Injectoin attack: 1. How would you find if a site is vulnerable to SQL injection or not? 2. Implement SQL Injection Attack and perform the following on the Test Site 1. Find the database names 2. Find the relation/table names 3. Find the attribute/column ...
# Swagger Code Generator - Master: [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test...
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.36.0-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
# SMB Scanning This module contains method sof gathering information from targets that have Samaba, or the Windows sharing service (SMB) enabled. ## Enum4LINUX [Enum4Linux](https://github.com/portcullislabs/enum4linux) can be used to gather information from a target system via the SMB protocol as so, ``` root@attacker-...
## Usage ```bash $ docker run --rm sqlmap -h ___ __H__ ___ ___["]_____ ___ ___ {1.1.11#pip} |_ -| . ['] | .'| . | |___|_ [.]_|_|_|__,| _| |_|V |_| http://sqlmap.org Usage: python sqlmap [options] Options: -h, --help Show basic help message and exit -hh ...
# Information security / Hacking for noobs A gentle introduction for beginners that want to start in information security. Though, the core concepts part will benefit anyone that wants to start in IT. Pull requests welcome. The background for this is that @twowreck said one day, hey @kisasondi let’s write a docume...
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
# Learning and Resources Useful links for security professionals and students # General NetSec and Math [Network Security and Technology](https://www.youtube.com/user/Computerphile) [Math](https://www.youtube.com/user/numberphile) [Hundreds of talks from Security Professionals](https://www.youtube.com/user/DEFCONCo...
# My Security Resources - 來幫我按星星啦 Q__Q - https://github.com/stevenyu113228/My-Security-Resources --- [TOC] ## Scan ### Portscan - nmap - Static Binary - https://github.com/ernw/static-toolbox/releases - https://github.com/andrew-d/static-binaries/blob/master/binaries/windows/x86/nmap.exe ...
# HackTheBox.eu - Misc [Hack The Box - Challenges - Misc](https://www.hackthebox.eu/home/challenges/Misc) All walkthroughs are in encrypted PDFs. The password is the flag to that particular challenge. ## Challenges - [fs0ciety](fs0ciety.pdf) - We believe that there is an SSH Password inside password protected 'ZIP' ...
# Web Challenge: Cartographer (30 Points) **Some underground hackers are developing a new command and control server. Can you break in and see what they are up to?** <img src="cartographer-index.png"> We have a login page for this challenge and we need to break in. I guess we can use SQL Injection for this challenge...
## 👑 What is KingOfBugBounty Project ? 👑 Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understandi...
## Tabelas de conteúdos 📚 - [Imagens](#-imagens) - [Ilustrações](#-ilustrações) - [Emojis](#-emojis) - [Paletas de cores](#-paletas-de-cores) - [Fontes](#-fontes) - [Ícones](#-ícones) - [Animações](#-animações) - [Logos](#-logos) - [Livros](#-livros) - [Cursos](#-cursos) - [Podcasts](#-podcasts) - [Sites e blogs](#-s...
# Paper - HackTheBox - Writeup Linux, 20 Base Points, Easy ![info.JPG](images/info.JPG) ## Machine ![‏‏Paper.JPG](images/Paper.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```443```. ***User***: By observing the HTTP response w...
# TensorFlow Lite C++ image classification demo This example shows how you can load a pre-trained and converted TensorFlow Lite model and use it to recognize objects in images. Before you begin, make sure you [have TensorFlow installed](https://www.tensorflow.org/install). You also need to [install Bazel](https://do...
--- title: "Nuclei" category: "scanner" type: "Website" state: "released" appVersion: "v2.8.6" usecase: "Nuclei is a fast, template based vulnerability scanner." --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -------------------------- This fil...
HackTheBox Walkthrough : Devel === This post is writeup of the HackTheBox machine created by ch4p. ## Nmap Quick port scan reveals FTP service and web server. ```bash # nmap -sC -sV 10.10.10.5 Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 21:00 EDT Nmap scan report for 10.10.10.5 Host is up (0.28s latency). ...
# Sneaky #### 10.10.10.20 ```{r, engine='bash', count_lines} nmap 10.10.10.20 PORT STATE SERVICE 80/tcp open http ``` The website shows that its under construction <kbd><img src="https://github.com/jakobgoerke/HTB-Writeups/blob/master/Sneaky/images/Under-Construction.PNG"> Dirbuster Initiate! <kbd><img src="h...
<div class="row" id="resources"> <div class="col-md-12"> <h2> Guides, Courses, Writeups and Tools That May Be Useful for Cyber Security, Aimed for Technion Students </h2> <br/> <br/> <div align="center"> <h2 class="mb-2"> General </h2> </div> <br/> <div id="general" class="collapse" aria-labelledby="...
## 👑 What is KingOfBugBounty Project ? 👑 Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understandi...
<h1 align="center">TireFire</h1> <p align="center">TireFire is an enumeration platform powered by <a href="https://book.hacktricks.xyz">HackTricks</a>!</p> <p align="center"> <a><img src="https://img.shields.io/badge/price-FREE-0098f7.svg" height="20"/></a> <a><img src="https://img.shields.io/github/license/mashape...
# CTF-Learning-Resources ## `General Wargames & Practice Platforms` - [Over The Wire](http://overthewire.org/wargames/) - [cmdchallenge](https://cmdchallenge.com/) - [PicoCTF](https://picoctf.com) - [CTFLearn](https://ctflearn.com) - [247ctf](https://247ctf.com/) - [Intro. to CTF Course](https://www.hoppersroppers....
Android 開源項目分類匯總,最新最全版可見 [codekk.com](https://p.codekk.com/) ==================== Other: [English Version](https://github.com/Trinea/android-open-project/tree/master/English%20Version), [繁體版](https://github.com/Trinea/android-open-project/tree/master/%E7%B9%81%E9%AB%94%E4%B8%AD%E6%96%87%E7%89%88), [Website Version](htt...
# Dictionary-Of-Pentesting ## 简介 收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。 收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。 涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。 该项目计划持续收集,也欢迎感兴趣的大佬一起来完善。可直接提交PR,也可以提建议到issue。 ## 更新记录 **2020.10.15** 1. 增加一些payload **2020.09.30** 1. 增加常见可以RCE的端口 *...
# Devzat - HackTheBox - Writeup Linux, 30 Base Points, Medium ## Machine ![‏‏Devzat.JPG](images/Devzat.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```nmap``` – finding ports ```22```, ```80``` and ```8000```. ***User 1***: Found another vhost [http://pets.devzat.htb](http://pe...
# Hack The Box Lab Writeups Starting out in Cybersecurity, HackTheBox (HTB) has been the go-to resource provided to me or anyone interested in Penetration Testing and Ethical Hacking for that matter. ## Contents 1. [Explore - Android (Easy)](Explore/Readme.md) 2. [Lame - Linux (Easy)](Lame/Readme.md) 3. [Shocker - ...
# File Inclusion > The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application. > The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ...
### Hackthebox Resources - [Challenges]() - [Crypto]() - [Web]() - [Misc]() - [Pwn]() - [stego]() - [Forensics]() ### Vulnhub Virtual Machine - CTF - Writeups ****** 1. [Toppo:1]() 2. [Wakanda:1]() 3. [Raven:1]() 4. [Raven:2]() 5. [Bulldog:1]() 6. [Bulldog:2]() 7. [W1R3S: 1.0.1(OSCP)]() 8. [SolidState: ...
# System Programming Roadmap A roadmap to teach myself compiler dev, malware reverse engineering and kernel dev fundamentals. To be noted they are only for the fundamental knowledge and doesn't make you a master of any. I will pick one or more of the below mentioned fields for later research in some specific topics. [...
### IP `10.10.10.56` # Recon ### nmap `nmap -sC -sV 10.10.10.56 -o Shocker.nmap` ``` Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-24 16:39 EST Nmap scan report for 10.10.10.56 Host is up (0.079s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubu...
目录导航 相关资源列表 攻防测试手册 内网安全文档 学习手册相关资源 Checklist 和基础安全知识 产品设计文档 学习靶场 漏洞复现 开源漏洞库 工具包集合 漏洞收集与 Exp、Poc 利用 物联网路由工控漏洞收集 Java 反序列化漏洞收集 版本管理平台漏洞收集 MS 与 Office 漏洞收集 Kali 环境下拓展插件 Nessus 相关工具拓展插件 Awvs 相关工具拓展插件 Burpsuit 相关工具拓展插件 Sqlmap 相关工具拓展插件 Nma...
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
# Awesome WAF [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg "Awesome")](https://github.com/0xinfection/awesome-waf) > Everything about web application firewalls (WAFs). 🔥 > > __Foreword:__ This was originally my own collection on WAFs. I am open-sourci...
# Overflow - HackTheBox - Writeup Linux, 40 Base Points, Hard ![info.JPG](images/info.JPG) ## Machine ![‏‏Overflow.JPG](images/Overflow.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```25``` and ```80```. ***User 1***: Found ```padding-oracl...
# eLearnSecurity Web Application Penetration Tester Here you can find tips and resources that will help you to pass the eWPT certification from eLearnSecurity. BTW, [here](https://github.com/CyberSecurityUP/eWPT-Preparation) you can enormous amount of useful links and resources that are dedicated to the eWPT preparati...
Gobuster v1.1 (OJ Reeves @TheColonial) ====================================== Alternative directory and file busting tool written in Go. DNS support recently added after inspiration and effort from [Peleus](https://twitter.com/0x42424242). ### Oh dear God.. WHY!? Because I wanted: 1. ... something that didn't have ...
<h5 align="center"> <code> <a href="https://www.linkedin.com/in/dheerajtechnolegends/" title="LinkedIn Profile"><img height="22" width="22" src="https://github.com/Dheerajmadhukar/Dheerajmadhukar/blob/main/img/linkedin.svg"> LinkedIn</a></code> <code><a href="https://twitter.com/Dheerajmadhukar/" title="Twitte...
# IoT Resources ## OWASP Resources - [OWASP Internet of Things Project](https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project) - [OWASP IoT Testing Guides](https://www.owasp.org/index.php/IoT_Testing_Guides) ## IoT Hacking Communities - [IoT Village](https://www.iotvillage.org/) - [BuildItSecure.ly](http...
# Node.js Node.js is an open-source, cross-platform JavaScript runtime environment. For information on using Node.js, see the [Node.js website][]. The Node.js project uses an [open governance model](./GOVERNANCE.md). The [OpenJS Foundation][] provides support for the project. Contributors are expected to act in a c...
# Pentesting Methodology - Query Parameters - If the parameter name takes URL… then maybe a SSRF or Open Redirection vulnerabilities - If the parameter name takes file name … then maybe Local file inclusion or disclosure - If the parameter or any inputs takes XML .. then maybe XXE vuln - For Search feature ...
# [Django REST framework][docs] [![build-status-image]][travis] [![coverage-status-image]][codecov] [![pypi-version]][pypi] [![Gitter](https://badges.gitter.im/tomchristie/django-rest-framework.svg)](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) **Awesome...
# PENTESTING-BIBLE # Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY. # Created By Ammar Amer (Twitter @cry__pto) ## Support. *Paypal:* [![Donate via Paypal](https://www.paypalobjects.com/en_GB/i/btn/btn_donateCC_LG.gif)](https://paypal.me/AmmarAmerHacker) -1- 3 Ways Extract Password...
# PEN TESTERS (Under Development) 1. Company have PEN TESTERS team to conduct pentesting. 2. Company HIRING PEN TEST SERVICES - on hourly basis or project basis. # PentestingEbook overview: Author Pentesting | Title -- | -- 1. [Practicle Hardware pentesting](https://t.me/freedomf0x/16886) 2. [Pentesting Industrial Co...
# security-study-tutorial Summary of online learning materials ## Awesome * https://github.com/vinta/awesome-python * https://github.com/Hack-with-Github/Awesome-Hacking * https://github.com/hslatman/awesome-threat-intelligence * https://github.com/bayandin/awesome-awesomeness * https://github.com/enaqx/awesome-pente...
# Twiggy ## Table of Contents * [Summary](#summary) * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [SSH](#ssh) * [DNS](#dns) * [HTTP](#http) * [ZMTP](#zmtp) * [OS](#os) * [Exploit](#exploit) * [Password Guessing](#password-guessing) * [Default Credentials](#default-cre...
# My Personal Hacking Notes | n4ckhcker I made this repository to help the new members on this field with my own personal notes! :D (Maybe i forgot to add some of my notes but i'll do daily updates!) Also you can find my own writeups/tutorials on medium : [n4ckhcker-medium](https://medium.com/@n4ckhcker) Table Of Co...
# API Key Leaks > The API key is a unique identifier that is used to authenticate requests associated with your project. Some developers might hardcode them or leave it on public shares. ## Summary - [Tools](#tools) - [Exploit](#exploit) - [Google Maps](#google-maps) - [Algolia](#algolia) - [AWS Access K...
# Intro CTF/Cyber Security learning source collection from beginner to neutral level # Source CTF入门介绍和笔记 https://mega.nz/file/el8BAIwA#uukC6wUHcXoN1NY-QFklC_PvuEh6bXE9TWWPfyskzGk https://www.cnblogs.com/ECJTUACM-873284962/p/6691817.html https://www.jianshu.com/p/dbf1ae90e591 https://marlous.github.io/2018/12/09/...
# <img src="https://raw.githubusercontent.com/swagger-api/swagger.io/wordpress/images/assets/SWC-logo-clr.png" height="80"> [![Build Status](https://img.shields.io/jenkins/build.svg?jobUrl=https://jenkins.swagger.io/job/oss-swagger-core-master-java-8)](https://jenkins.swagger.io/view/OSS%20-%20Java/job/oss-swagger-cor...
# Bastard URL: https://app.hackthebox.com/machines/Bashed Level: Medium Date 9 May 2021 ## Walkthrough - [Enumeration](#enumeration) - [Privesc](#privesc) # Enumeration ## NMAP ``` # Nmap 7.91 scan initiated Sat May 8 22:42:11 2021 as: nmap -T4 -p- -oN 01_nmap.txt 10.10.10.9 Nmap scan report for 10.10.10.9 Hos...
# Microsoft Authentication Library (MSAL) for Go The Microsoft Authentication Library (MSAL) for Go is part of the [Microsoft identity platform for developers](https://aka.ms/aaddevv2) (formerly named Azure AD) v2.0. It allows you to sign in users or apps with Microsoft identities ([Azure AD](https://azure.microsoft.c...
# Tick, Tock Mr. Wick *Solution Guide* ## Overview For this challenge there are three (3) tasks that need to be completed to solve the challenge within a certain timeframe to earn the maximum amount of points available. Before attempting to find the keys needed to deactivate the countdown, you need to find the hidd...
# pandora <img src="https://i.ibb.co/CzggdwD/pandora.png"> ## Table of Contents * [Programming Sites](https://github.com/hckpls/pandora#programming-sites) * [News Feed](https://github.com/hckpls/pandora#news) * [Courses](https://github.com/hckpls/pandora#courses) * [CTF and Wargames](https://github.com/hckpls/pandor...
# Infosec Learning Materials Resource for developing infosec skills for upcoming OSCP exam ## OSCP Rules & Documents [Exam Guide](https://support.offensive-security.com/#!oscp-exam-guide.md) ## Practice [Exploit Exercises](https://exploit-exercises.com/) [OverTheWire - Wargames](https://overthewire.org/wargames/)...
## Web Application Technologies ### Table of Contents * [General](#general) * [Standards](#standards) * [Content Security Policy(CSP)](#csp) * [Common Origin Resource Sharing (CORS)](#cors) * [Document Object Model(DOM)](#dom) * [HTML](#html) * [Hyper Text Transport Protocol (HTTP)]...
## Usage ```bash $ docker run --rm -it gobuster --h Usage of /gobuster: -P string ...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v1.7.4"> <img src="https://img.shi...
<h1 align="center">!!THIS PROJECT HAS MOVED!!</H1> <p align="center">HackTricks Automatic Commands has been integrated into <a href="https://github.com/CoolHandSquid/TireFire">TireFire</a>.</p> <p align="center">This repository has been migrated and will no longer be updated or supported. Use TireFire in the future. Th...
<h2>Recon and Enumeration</h2> <h3>NMAP Commands</h3> <p>Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or serv...
# Awesome Google VRP Writeups 🐛 A list of writeups from the Google VRP Bug Bounty program *\*writeups: **not just** writeups* **Follow [@gvrp_writeups](https://twitter.com/gvrp_writeups) on Twitter to get new writeups straigt into your feed!** ## Contributing: If you know of any writeups/videos not listed in this ...
# OSCP Preparation Guide 2020 *Work in progress by [superhero1](https://twitter.com/_superhero1), watch the stream on [Twitch](https://twitch.tv/sup3rhero1)* ## Pre-Prep ### Public resources - [Offensive-Security Syllabus](https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf) - [Official...
# Search ## Introduction Welcome to my another writeup! In this HackTheBox [Search](https://app.hackthebox.com/machines/Search) machine, you'll learn: Enumerating Active Directory via LDAP, BloodHound, Kerberoasting, password spraying, cracking digital certificate, abusing `ReadGMSAPassword` right, and more! Without ...
## # https://apisecurity.io/issue-136-oauth-2-0-security-checklist-pentesting/ # ## ![Untitled 10](https://github.com/babywyrm/sysadmin/assets/55672787/572ac152-4b34-4e82-ad56-26c4ca24c889) ![Untitled 12](https://github.com/babywyrm/sysadmin/assets/55672787/36ed175f-76ec-4ab8-a88a-84e5b79342d4) ![Uploading Untitled 1...
# AllThingsSSRF **This is a collection of writeups, cheatsheets, videos, related to SSRF in one single location** This is currently work in progress I will add more resources as I find them. ![SSRF Logo](/images/ssrf.jpg) ### Created By [@jdonsec](https://twitter.com/jdonsec) --- #### Learn What is SSRF - [Vickie ...
# PNPT-Preparation-Guide (Unofficial) PNPT Exam Preparation - TCM Security ## OSINT/Information Gathering ### https://academy.tcm-sec.com/p/osint-fundamentals ### https://osintframework.com/ ### https://github.com/jivoi/awesome-osint ### https://github.com/tracelabs/awesome-osint ### https://github.com/lockfale/O...
![Awesome Bugbounty Writeups](https://raw.githubusercontent.com/bot9496/awesomeBugbounty/master/static/logo.PNG) ## Contents - [Cross Site Scripting (XSS)](https://github.com/bot9496/awesomeBugbounty#cross-site-scripting-xss) - [Cross Site Request Forgery (CSRF)](https://github.com/bot9496/awesomeBugbounty#cross-...
<h1 align="center"> <img src="static/naabu-logo.png" alt="naabu" width="200px"> <br> </h1> <p align="center"> <a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a> <a href="https://github.com/projectdiscovery/naabu/issues"><img src="https://img.shields.io/b...