text stringlengths 9 334k |
|---|
# SQLMap - Cheetsheat
<details>
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong... |
# Mr. Robot
## Table of Contents
* [Summary](#summary)
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [SSH](#ssh)
* [FTP](#ftp)
* [SMTP](#smtp)
* [DNS](#dns)
* [HTTP](#http)
* [POP3](#pop3)
* [RPC](#rpc)
* [IMAP](#imap)
* [NetBIOS](#netbios)
* [SMB](#s... |
# SecNotes
URL: https://app.hackthebox.com/machines/SecNotes
Level: Medium
Date 29 Apr 2021
## Walkthrough
- [Enumeration](#enumeration)
- [User flag](#user-flag)
- [Privesc](#privesc)
# Enumeration
## NMAP
```
# Nmap 7.91 scan initiated Sat Apr 17 15:29:48 2021 as: nmap -T4 -A -p- -oN 01_nmap.txt 10.10.10.97
N... |
<div align="center">
<h1> AD-Pentesting-Notes :nepal: </h1>
<a href="https://twitter.com/nirajkharel7" ><img src="https://img.shields.io/twitter/follow/nirajkharel7?style=social" /> </a>
</div>
**AD Basics**
- Domains
- Domains are used to group and manage objects in an organization
- An administrative boundary f... |
# Awesome-Android-Security 

# Table of Contents
- [Blog](#blog)
- [How To's](#how-tos)
- [Paper](#paper)
- [Books](#books)
- [Course](#course)
- [Tools](#tools)
* [Static Analysis Tools](#Static-Analysis)
* [Dynamic Analysis Tools](#Dyna... |
# 80,443 - Pentesting Web Methodology
<details>
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/s... |
# OSCP_BIBLE
> This is a collection of resources, scripts, bookmarks, writeups, notes, cheatsheets that will help you in OSCP Preparation as well as for general pentesting and learning.
### If you feel like you can contribute in it. Please do that, I'll appreciate you.
## Resources
* [OSCP Survival Guide](https://gi... |
# Blunder: 10.10.10.191
## Hints
- Search for hidden directories on the website... and hidden files with common file extensions
- To get a foothold you will need two exploits, one to bypass login restrictions and one to get code execution
- Try to make a password wordlist instead of using the common options
- Moving ... |
# Website Security
Being hacked means that someone (or something) has gained access to your website files without your permission. There are many things a hacker might do once they are inside your website: Steal personal information like client data and credit card details.
Watch this youtube channel to know all abo... |
# Recon-bugbounty
Simple recon using multiple tools!

If you have Go installed and configured (i.e. with $GOPATH/bin in your $PATH):
### Install Assetfinder
`
▶ go get -u github.com/tomnomnom/assetfinder
`
### Install anew
`
▶... |
# CyberSecurity_Resources
A collection of awesome software, libraries, documents, books, resources and cool stuff about security.
Inspired by [awesome-php](https://github.com/ziadoz/awesome-php), [awesome-python](https://github.com/vinta/awesome-python).
Thanks to all [contributors](https://github.com/sbilly/awesome... |
# OVIC Benchmarker for NIPS 2018
This folder contains the SDK for track one of the [Low Power ImageNet Recognition Challenge workshop at NIPS 2018.](https://lpirc.ecn.purdue.edu/)
## Pre-requisite
Follow the steps [here](https://www.tensorflow.org/lite/demo_android) to install Tensorflow, Bazel, and the Android NDK ... |
<p align='center'>
<img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br>
<a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.2"><img src="https://img.shields.io/badge/Version-1.1.2-brightgreen.svg?style=style=flat-square" alt="version"></a>
<a href="https://github.com/Tuhinshubhra/CMSeeK/"... |
## Arthas

English version goes [here](README_EN.md).
`Arthas` 是Alibaba开源的Java诊断工具,深受开发者喜爱。
当你遇到以下类似问题而束手无策时,`Arthas`可以帮助你解决:
0. 这个类从哪个 jar 包加载的?为什么会报各种类相关的 Exception?
0. 我改的代码为什么没有执行到?难道是我没 commit?分支搞错了?
0. 遇到问题无法在线上 debug,难道只能通过加日志再重新发布吗?
0. 线上遇到某个用户的数据处理有问题,但线上同样无法 de... |
# Official info
The Wifi devboard ships with [Blackmagic firmware](https://github.com/flipperdevices/blackmagic-esp32-s2) installed. The Flipper documentation [is here](https://docs.flipperzero.one/development/hardware/wifi-debugger-module), and Blackmagic is [over here](https://black-magic.org/).
Quick start: Connec... |
# Awesome Pentest Cheat Sheets [](https://github.com/sindresorhus/awesome)
Collection of cheat sheets useful for pentesting
### Contribution
Your contributions and suggestions are heartily welcome. Please c... |
# Penetration Testing and Capture the Flag Cheatsheets
## Overview
This repository is for capturing commonly used commands and tools used during penetration testing and capture the flag exercises (e.g. hackthebox.eu). |
# MITM-cheatsheet
We tried to put together all known MITM attacks and methods of protection against these attacks. Here is also contains tools for carrying out MITM attacks, some interesting attack cases and some tricks associated with them.
**Note:** Almost all attack tools, described here, doesn't have any sniffer ... |
# Venom

#### Offensive Security Framework for Vulnerability Scanning & Pentesting

[](https://www.python.org/downloads/release/python-3614)
[](https://github.com/sindresorhus/awesome)
A curated list of awesome Hacking. Inspired by [awesome-machine-learning](https://github.com/josephmisiti/awesome-machine-lea... |
<h1 align="center">
<img src="static/cloudlist-logo.png" alt="cloudlist" width="400px"></a>
<br>
</h1>
<p align="center">
<a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a>
<a href="https://github.com/projectdiscovery/cloudlist/issues"><img src="https:/... |
# Payloads All The Things
A list of useful payloads and bypasses for Web Application Security.
Feel free to improve with your payloads and techniques !
I <3 pull requests :)
You can also contribute with a beer IRL or with `buymeacoffee.com`
[
Hopefully it will help you a lot :D
Credits are also included for some google docs
Thanks to
- [Dasith](https://github.com/dasithsv)
- [YVS37](https://github.com/YVS37)
- [Swanand](https://swanandx.github.io/)
- [... |
- Group Members Disclosure
- https://bugreader.com/onehackzero@determine-members-in-a-closed-facebook-group-83
- https://philippeharewood.com/determine-members-in-a-closed-facebook-group/
- https://philippeharewood.com/view-former-members-of-a-facebook-group/
- Page Admin Disclosure
- https://bugreader.com/j... |
# Practical Cyber Security Resources 🌟
This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝 I hope you find it useful.🌸😌
In addition, other platforms where you can connect with me for articles, repositories, and more that I will publish in the new year;
- https://www.linkedi... |
# CC - PENTESTING // TRYHACKME
### [Section 1 - Network Utilities] - nmap
- What does nmap stand for?
- `network mapper`
- How do you specify which port(s) to scan?
- `-p`
- How do you do a "ping scan" (just tests if the host(s) is up)?
- `-sn`
- What is the flag for a UDP scan?
- `-sU`
- How do you run ... |
# Example app using Netlify CMS
## How to use
### Using `create-next-app`
Execute [`create-next-app`](https://github.com/segmentio/create-next-app) with [Yarn](https://yarnpkg.com/lang/en/docs/cli/create/) or [npx](https://github.com/zkat/npx#readme) to bootstrap the example:
```bash
npx create-next-app --example w... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v1.6.0.2">
<img src="https://img.sh... |
# Enumeration-Guide
Enumeration Guide
A port of all ports Enumeration Guide. I began working on something similar myself involving excel, until I came into this little gem. The original document can be found here:
https://github.com/six2dez/OSCP-Human-Guide/blob/master/oscp_human_guide.md
I decided to archive here ... |
# InfoSec-Resources4All
-Only the best quality InfoSec-resources shared, based on regular sourcing of publicly available content found on the internet.
-The resources shared below have personally benefited me greatly in persuing a career within the IT Security & Information Security job sectors.
-The content essentia... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.7">
<img src="https://... |
# Security
>_[Training](https://github.com/simplonco/training) / Security_

Plusieurs axes se dégagent :
- bonnes pratiques personnelles (mots de passe et autres),
- comprendre la cryptographie (toujours les mots de passe mais pas que),
- comprendre ... |
[](https://github.com/ytdl-org/youtube-dl/actions?query=workflow%3ACI)
youtube-dl - download videos from youtube.com or other video platforms
- [INSTALLATION](#installation)
- [DESCRIPTION](#description)
- [OPTIONS](#options)
- [CONFIGURAT... |
SQL INJECTION ATTACK
The following are implemented the SQl Injectoin attack:
1. How would you find if a site is vulnerable to SQL injection or not?
2. Implement SQL Injection Attack and perform the following on the Test Site
1. Find the database names
2. Find the relation/table names
3. Find the attribute/column ... |
# Swagger Code Generator
- Master: [](https://travis-ci.org/swagger-api/swagger-codegen)
[][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/684)... |
# SMB Scanning
This module contains method sof gathering information from targets that have Samaba, or the Windows sharing service (SMB) enabled.
## Enum4LINUX
[Enum4Linux](https://github.com/portcullislabs/enum4linux) can be used to gather information from a target system via the SMB protocol as so,
```
root@attacker-... |
## Usage
```bash
$ docker run --rm sqlmap -h
___
__H__
___ ___["]_____ ___ ___ {1.1.11#pip}
|_ -| . ['] | .'| . |
|___|_ [.]_|_|_|__,| _|
|_|V |_| http://sqlmap.org
Usage: python sqlmap [options]
Options:
-h, --help Show basic help message and exit
-hh ... |
# Information security / Hacking for noobs
A gentle introduction for beginners that want to start in information security. Though, the core concepts part will benefit anyone that wants to start in IT. Pull requests welcome.
The background for this is that @twowreck said one day, hey @kisasondi let’s write a docume... |
# Swagger Code Generator
- Master (2.3.0): [](https://travis-ci.org/swagger-api/swagger-codegen)
[
[Math](https://www.youtube.com/user/numberphile)
[Hundreds of talks from Security Professionals](https://www.youtube.com/user/DEFCONCo... |
# My Security Resources
- 來幫我按星星啦 Q__Q
- https://github.com/stevenyu113228/My-Security-Resources
---
[TOC]
## Scan
### Portscan
- nmap
- Static Binary
- https://github.com/ernw/static-toolbox/releases
- https://github.com/andrew-d/static-binaries/blob/master/binaries/windows/x86/nmap.exe
... |
# HackTheBox.eu - Misc
[Hack The Box - Challenges - Misc](https://www.hackthebox.eu/home/challenges/Misc)
All walkthroughs are in encrypted PDFs. The password is the flag to that particular challenge.
## Challenges
- [fs0ciety](fs0ciety.pdf) - We believe that there is an SSH Password inside password protected 'ZIP' ... |
# Web Challenge: Cartographer (30 Points)
**Some underground hackers are developing a new command and control server. Can you break in and see what they are up to?**
<img src="cartographer-index.png">
We have a login page for this challenge and we need to break in. I guess we can use SQL Injection for this challenge... |
## 👑 What is KingOfBugBounty Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understandi... |
## Tabelas de conteúdos 📚
- [Imagens](#-imagens)
- [Ilustrações](#-ilustrações)
- [Emojis](#-emojis)
- [Paletas de cores](#-paletas-de-cores)
- [Fontes](#-fontes)
- [Ícones](#-ícones)
- [Animações](#-animações)
- [Logos](#-logos)
- [Livros](#-livros)
- [Cursos](#-cursos)
- [Podcasts](#-podcasts)
- [Sites e blogs](#-s... |
# Paper - HackTheBox - Writeup
Linux, 20 Base Points, Easy

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```443```.
***User***: By observing the HTTP response w... |
# TensorFlow Lite C++ image classification demo
This example shows how you can load a pre-trained and converted
TensorFlow Lite model and use it to recognize objects in images.
Before you begin,
make sure you [have TensorFlow installed](https://www.tensorflow.org/install).
You also need to
[install Bazel](https://do... |
---
title: "Nuclei"
category: "scanner"
type: "Website"
state: "released"
appVersion: "v2.8.6"
usecase: "Nuclei is a fast, template based vulnerability scanner."
---
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
--------------------------
This fil... |
HackTheBox Walkthrough : Devel
===
This post is writeup of the HackTheBox machine created by ch4p.
## Nmap
Quick port scan reveals FTP service and web server.
```bash
# nmap -sC -sV 10.10.10.5
Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 21:00 EDT
Nmap scan report for 10.10.10.5
Host is up (0.28s latency).
... |
# Sneaky
#### 10.10.10.20
```{r, engine='bash', count_lines}
nmap 10.10.10.20
PORT STATE SERVICE
80/tcp open http
```
The website shows that its under construction
<kbd><img src="https://github.com/jakobgoerke/HTB-Writeups/blob/master/Sneaky/images/Under-Construction.PNG">
Dirbuster Initiate!
<kbd><img src="h... |
<div class="row" id="resources">
<div class="col-md-12">
<h2> Guides, Courses, Writeups and Tools That May Be Useful for Cyber Security, Aimed for Technion Students </h2>
<br/>
<br/>
<div align="center">
<h2 class="mb-2"> General </h2>
</div>
<br/>
<div id="general" class="collapse" aria-labelledby="... |
## 👑 What is KingOfBugBounty Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understandi... |
<h1 align="center">TireFire</h1>
<p align="center">TireFire is an enumeration platform powered by <a href="https://book.hacktricks.xyz">HackTricks</a>!</p>
<p align="center">
<a><img src="https://img.shields.io/badge/price-FREE-0098f7.svg" height="20"/></a>
<a><img src="https://img.shields.io/github/license/mashape... |
# CTF-Learning-Resources
## `General Wargames & Practice Platforms`
- [Over The Wire](http://overthewire.org/wargames/)
- [cmdchallenge](https://cmdchallenge.com/)
- [PicoCTF](https://picoctf.com)
- [CTFLearn](https://ctflearn.com)
- [247ctf](https://247ctf.com/)
- [Intro. to CTF Course](https://www.hoppersroppers.... |
Android 開源項目分類匯總,最新最全版可見 [codekk.com](https://p.codekk.com/)
====================
Other: [English Version](https://github.com/Trinea/android-open-project/tree/master/English%20Version), [繁體版](https://github.com/Trinea/android-open-project/tree/master/%E7%B9%81%E9%AB%94%E4%B8%AD%E6%96%87%E7%89%88), [Website Version](htt... |
# Dictionary-Of-Pentesting
## 简介
收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。
收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。
涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。
该项目计划持续收集,也欢迎感兴趣的大佬一起来完善。可直接提交PR,也可以提建议到issue。
## 更新记录
**2020.10.15**
1. 增加一些payload
**2020.09.30**
1. 增加常见可以RCE的端口
*... |
# Devzat - HackTheBox - Writeup
Linux, 30 Base Points, Medium
## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```nmap``` – finding ports ```22```, ```80``` and ```8000```.
***User 1***: Found another vhost [http://pets.devzat.htb](http://pe... |
# Hack The Box Lab Writeups
Starting out in Cybersecurity, HackTheBox (HTB) has been the go-to resource provided to me or anyone interested in Penetration Testing and Ethical Hacking for that matter.
## Contents
1. [Explore - Android (Easy)](Explore/Readme.md)
2. [Lame - Linux (Easy)](Lame/Readme.md)
3. [Shocker - ... |
# File Inclusion
> The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application.
> The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ... |
### Hackthebox Resources
- [Challenges]()
- [Crypto]()
- [Web]()
- [Misc]()
- [Pwn]()
- [stego]()
- [Forensics]()
### Vulnhub Virtual Machine - CTF - Writeups
******
1. [Toppo:1]()
2. [Wakanda:1]()
3. [Raven:1]()
4. [Raven:2]()
5. [Bulldog:1]()
6. [Bulldog:2]()
7. [W1R3S: 1.0.1(OSCP)]()
8. [SolidState: ... |
# System Programming Roadmap
A roadmap to teach myself compiler dev, malware reverse engineering and kernel dev fundamentals. To be noted they are only for the fundamental knowledge and doesn't make you a master of any. I will pick one or more of the below mentioned fields for later research in some specific topics. [... |
### IP
`10.10.10.56`
# Recon
### nmap
`nmap -sC -sV 10.10.10.56 -o Shocker.nmap`
```
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-24 16:39 EST
Nmap scan report for 10.10.10.56
Host is up (0.079s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.18 ((Ubu... |
目录导航
相关资源列表
攻防测试手册
内网安全文档
学习手册相关资源
Checklist 和基础安全知识
产品设计文档
学习靶场
漏洞复现
开源漏洞库
工具包集合
漏洞收集与 Exp、Poc 利用
物联网路由工控漏洞收集
Java 反序列化漏洞收集
版本管理平台漏洞收集
MS 与 Office 漏洞收集
Kali 环境下拓展插件
Nessus 相关工具拓展插件
Awvs 相关工具拓展插件
Burpsuit 相关工具拓展插件
Sqlmap 相关工具拓展插件
Nma... |
# Swagger Code Generator
- Master (2.3.0): [](https://travis-ci.org/swagger-api/swagger-codegen)
[](https://github.com/0xinfection/awesome-waf)
> Everything about web application firewalls (WAFs). 🔥
>
> __Foreword:__ This was originally my own collection on WAFs. I am open-sourci... |
# Overflow - HackTheBox - Writeup
Linux, 40 Base Points, Hard

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```25``` and ```80```.
***User 1***: Found ```padding-oracl... |
# eLearnSecurity Web Application Penetration Tester
Here you can find tips and resources that will help you to pass the eWPT certification from eLearnSecurity.
BTW, [here](https://github.com/CyberSecurityUP/eWPT-Preparation) you can enormous amount of useful links and resources
that are dedicated to the eWPT preparati... |
Gobuster v1.1 (OJ Reeves @TheColonial)
======================================
Alternative directory and file busting tool written in Go. DNS support recently added after inspiration and effort from [Peleus](https://twitter.com/0x42424242).
### Oh dear God.. WHY!?
Because I wanted:
1. ... something that didn't have ... |
<h5 align="center">
<code>
<a href="https://www.linkedin.com/in/dheerajtechnolegends/" title="LinkedIn Profile"><img height="22" width="22" src="https://github.com/Dheerajmadhukar/Dheerajmadhukar/blob/main/img/linkedin.svg"> LinkedIn</a></code>
<code><a href="https://twitter.com/Dheerajmadhukar/" title="Twitte... |
# IoT Resources
## OWASP Resources
- [OWASP Internet of Things Project](https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project)
- [OWASP IoT Testing Guides](https://www.owasp.org/index.php/IoT_Testing_Guides)
## IoT Hacking Communities
- [IoT Village](https://www.iotvillage.org/)
- [BuildItSecure.ly](http... |
# Node.js
Node.js is an open-source, cross-platform JavaScript runtime environment.
For information on using Node.js, see the [Node.js website][].
The Node.js project uses an [open governance model](./GOVERNANCE.md). The
[OpenJS Foundation][] provides support for the project.
Contributors are expected to act in a c... |
# Pentesting Methodology
- Query Parameters
- If the parameter name takes URL… then maybe a SSRF or Open Redirection vulnerabilities
- If the parameter name takes file name … then maybe Local file inclusion or disclosure
- If the parameter or any inputs takes XML .. then maybe XXE vuln
- For Search feature ... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![coverage-status-image]][codecov]
[![pypi-version]][pypi]
[](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge)
**Awesome... |
# PENTESTING-BIBLE
# Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY.
# Created By Ammar Amer (Twitter @cry__pto)
## Support.
*Paypal:* [](https://paypal.me/AmmarAmerHacker)
-1- 3 Ways Extract Password... |
# PEN TESTERS (Under Development)
1. Company have PEN TESTERS team to conduct pentesting.
2. Company HIRING PEN TEST SERVICES - on hourly basis or project basis.
# PentestingEbook overview:
Author Pentesting | Title
-- | --
1. [Practicle Hardware pentesting](https://t.me/freedomf0x/16886)
2. [Pentesting Industrial Co... |
# security-study-tutorial
Summary of online learning materials
## Awesome
* https://github.com/vinta/awesome-python
* https://github.com/Hack-with-Github/Awesome-Hacking
* https://github.com/hslatman/awesome-threat-intelligence
* https://github.com/bayandin/awesome-awesomeness
* https://github.com/enaqx/awesome-pente... |
# Twiggy
## Table of Contents
* [Summary](#summary)
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [SSH](#ssh)
* [DNS](#dns)
* [HTTP](#http)
* [ZMTP](#zmtp)
* [OS](#os)
* [Exploit](#exploit)
* [Password Guessing](#password-guessing)
* [Default Credentials](#default-cre... |
# My Personal Hacking Notes | n4ckhcker
I made this repository to help the new members on this field with my own personal notes! :D
(Maybe i forgot to add some of my notes but i'll do daily updates!)
Also you can find my own writeups/tutorials on medium : [n4ckhcker-medium](https://medium.com/@n4ckhcker)
Table Of Co... |
# API Key Leaks
> The API key is a unique identifier that is used to authenticate requests associated with your project. Some developers might hardcode them or leave it on public shares.
## Summary
- [Tools](#tools)
- [Exploit](#exploit)
- [Google Maps](#google-maps)
- [Algolia](#algolia)
- [AWS Access K... |
# Intro
CTF/Cyber Security learning source collection from beginner to neutral level
# Source
CTF入门介绍和笔记
https://mega.nz/file/el8BAIwA#uukC6wUHcXoN1NY-QFklC_PvuEh6bXE9TWWPfyskzGk
https://www.cnblogs.com/ECJTUACM-873284962/p/6691817.html
https://www.jianshu.com/p/dbf1ae90e591
https://marlous.github.io/2018/12/09/... |
# <img src="https://raw.githubusercontent.com/swagger-api/swagger.io/wordpress/images/assets/SWC-logo-clr.png" height="80">
[](https://jenkins.swagger.io/view/OSS%20-%20Java/job/oss-swagger-cor... |
# Bastard
URL: https://app.hackthebox.com/machines/Bashed
Level: Medium
Date 9 May 2021
## Walkthrough
- [Enumeration](#enumeration)
- [Privesc](#privesc)
# Enumeration
## NMAP
```
# Nmap 7.91 scan initiated Sat May 8 22:42:11 2021 as: nmap -T4 -p- -oN 01_nmap.txt 10.10.10.9
Nmap scan report for 10.10.10.9
Hos... |
# Microsoft Authentication Library (MSAL) for Go
The Microsoft Authentication Library (MSAL) for Go is part of the [Microsoft identity platform for developers](https://aka.ms/aaddevv2) (formerly named Azure AD) v2.0. It allows you to sign in users or apps with Microsoft identities ([Azure AD](https://azure.microsoft.c... |
# Tick, Tock Mr. Wick
*Solution Guide*
## Overview
For this challenge there are three (3) tasks that need to be completed to solve the challenge within a certain timeframe to earn the maximum amount of points available.
Before attempting to find the keys needed to deactivate the countdown, you need to find the hidd... |
# pandora
<img src="https://i.ibb.co/CzggdwD/pandora.png">
## Table of Contents
* [Programming Sites](https://github.com/hckpls/pandora#programming-sites)
* [News Feed](https://github.com/hckpls/pandora#news)
* [Courses](https://github.com/hckpls/pandora#courses)
* [CTF and Wargames](https://github.com/hckpls/pandor... |
# Infosec Learning Materials
Resource for developing infosec skills for upcoming OSCP exam
## OSCP Rules & Documents
[Exam Guide](https://support.offensive-security.com/#!oscp-exam-guide.md)
## Practice
[Exploit Exercises](https://exploit-exercises.com/)
[OverTheWire - Wargames](https://overthewire.org/wargames/)... |
## Web Application Technologies
### Table of Contents
* [General](#general)
* [Standards](#standards)
* [Content Security Policy(CSP)](#csp)
* [Common Origin Resource Sharing (CORS)](#cors)
* [Document Object Model(DOM)](#dom)
* [HTML](#html)
* [Hyper Text Transport Protocol (HTTP)]... |
## Usage
```bash
$ docker run --rm -it gobuster --h
Usage of /gobuster:
-P string ... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v1.7.4">
<img src="https://img.shi... |
<h1 align="center">!!THIS PROJECT HAS MOVED!!</H1>
<p align="center">HackTricks Automatic Commands has been integrated into <a href="https://github.com/CoolHandSquid/TireFire">TireFire</a>.</p>
<p align="center">This repository has been migrated and will no longer be updated or supported. Use TireFire in the future. Th... |
<h2>Recon and Enumeration</h2>
<h3>NMAP Commands</h3>
<p>Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or serv... |
# Awesome Google VRP Writeups
🐛 A list of writeups from the Google VRP Bug Bounty program
*\*writeups: **not just** writeups*
**Follow [@gvrp_writeups](https://twitter.com/gvrp_writeups) on Twitter to get new writeups straigt into your feed!**
## Contributing:
If you know of any writeups/videos not listed in this ... |
# OSCP Preparation Guide 2020
*Work in progress by [superhero1](https://twitter.com/_superhero1), watch the stream on [Twitch](https://twitch.tv/sup3rhero1)*
## Pre-Prep
### Public resources
- [Offensive-Security Syllabus](https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf)
- [Official... |
# Search
## Introduction
Welcome to my another writeup! In this HackTheBox [Search](https://app.hackthebox.com/machines/Search) machine, you'll learn: Enumerating Active Directory via LDAP, BloodHound, Kerberoasting, password spraying, cracking digital certificate, abusing `ReadGMSAPassword` right, and more! Without ... |
##
#
https://apisecurity.io/issue-136-oauth-2-0-security-checklist-pentesting/
#
##



### Created By [@jdonsec](https://twitter.com/jdonsec)
---
#### Learn What is SSRF
- [Vickie ... |
# PNPT-Preparation-Guide (Unofficial)
PNPT Exam Preparation - TCM Security
## OSINT/Information Gathering
### https://academy.tcm-sec.com/p/osint-fundamentals
### https://osintframework.com/
### https://github.com/jivoi/awesome-osint
### https://github.com/tracelabs/awesome-osint
### https://github.com/lockfale/O... |

## Contents
- [Cross Site Scripting (XSS)](https://github.com/bot9496/awesomeBugbounty#cross-site-scripting-xss)
- [Cross Site Request Forgery (CSRF)](https://github.com/bot9496/awesomeBugbounty#cross-... |
<h1 align="center">
<img src="static/naabu-logo.png" alt="naabu" width="200px">
<br>
</h1>
<p align="center">
<a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a>
<a href="https://github.com/projectdiscovery/naabu/issues"><img src="https://img.shields.io/b... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.