text stringlengths 9 334k |
|---|
# CTF Writeups
<p align="center">
<img src="resources/images/logo.jpg">
<br>
<i>Writeups Challenges I have solved</i>
[](https://github.com/HSNHK/CTF-writeups)
[
- [Web](./Web)
- [Forensics](./Forensics)
- [pwn](./pwn)
- [crypto](./crypto)
- [reversing](./reversing)
- [OSINT](./Osint)
### Archived CTFs
- [Archive](https://github.com/sajjadium... |
# Payloads_All_The_Things
A list of useful payloads and bypasses for Web Application Security.
Feel free to improve with your payloads and techniques !
I <3 pull requests :)
You can also contribute with a beer IRL or with `buymeacoffee.com`
[
## **Question:**
> Blunder

## Background
Blunder is a Linux machine from HackTheBox, which is a real-life similar box that required CVE exploit technique, for training your ethical hacking and penetration test... |
# [ OWASP Amass](https://www.owasp.org/index.php/OWASP_Amass_Project)
[](https://circleci.com/gh/OWASP/Amass/tree/master)
[](https://github.com/sindresorhus/awesome)

Um acervo de incríveis plataformas, blogs, documentos, livros, recursos e ... |
# Awesome Bug Bounty Tools [](https://awesome.re)
> A curated list of various bug bounty tools
## Contents
- [Recon](#Recon)
- [Subdomain Enumeration](#Subdomain-Enumeration)
- [Port Scanning](#Port-Scanning)
- [Screenshots](#Screenshots)
- [Technologies](#Tech... |
# Node Version Manager [][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/684)... |
# SQLMap - Cheetsheat
<details>
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong... |
Linux Kernel Exploitation
=========================
A collection of links related to Linux kernel security and exploitation.
Updated bimonthly. Pull requests are welcome as well.
Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified of updates.
Subscribe to @linkersec on [Telegram](https://... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
# Algernon
## Table of Contents
* [Summary](#summary)
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [FTP](#ftp)
* [HTTP](#http)
* [RPC](#rpc)
* [NetBIOS](#netbios)
* [SMB](#smb)
* [OS](#os)
* [Nmap OS Discovery Scan](#nmap-os-discovery-scan)
* [Nmap OS Discovery... |
# SCS Cyber Team Resources
This is the repository that will store the UGA SCS Cyber Team information, resources, and challenges. The Resources section is broken up into the General and CTF folders:
**General**: Resources that contain general cyber security information and other interesting articles
**CTF**: Resource... |
_ __ ___ ___ ___ ___
| | \ \ / _ \ / _ \ / _ \ / _ \
___ __ _ __| |_ __ __ _ \ \ | | | | | | | (_) | (_) |
/ __|/ _` |/ _` | '__/ _` | > > | | | | | | |\__, |> _ <
\__ \ (_| | (_| | | | (_| | / / |... |
..................
I use this function in my `.zshrc` file
## Fuzz with stdin
```
fuzz-in() {
strip=$(echo $1|sed 's/:\/\///')
strip=$(echo $strip| sed 's/\\/\-/g')
strip=$(echo $strip| sed 's/\//-/g')
ffuf -u $1 -t 10 -o $strip.fuzz.txt -of md -p 1 "${@:2}" -w -
echo "cat $strip.fuzz.txt"
}
```
`cat ~/tool... |
# Notes
> March 11, 2022
- Didn't actually "solve" crypto. The encryption algorithms weren't that computationally expensive, so I just bruteforced them
- Credit to [CryptoCat's](https://github.com/Crypto-Cat/CTF/blob/main/HackTheBox/pwn/bat_computer/batcomputer.py) bat\_computer solution for teaching me how to set it u... |
# SQL Injection Type:
## In-band SQLi (Classic SQLi):
In-band SQL Injection is the most common and easy-to-exploit of SQL Injection attacks. In-band SQL Injection occurs when an attacker is able to use the same communication channel to both launch the attack and gather results. The two most common types of in-band SQL... |
# command
收集渗透中会用到的常用命令 。
建议直接[Ctrl+F]查找
# java命令执行
如下编码网站:
https://ares-x.com/tools/runtime-exec/
https://r0yanx.com/tools/java_exec_encode/
https://www.bugku.net/runtime-exec-payloads/
手动编码操作
```
bash -c {echo,cGluZyAxMjcuMC4wLjE7ZWNobyAxID50ZXN0LnR4dA==}|{base64,-d}|{bash,-i}
```
## 命令执行,定位资... |
# CTF / Hacking Practice
## [gameofhacks](https://www.gameofhacks.com/)
* Multiple choice-based source code review
## [hbh](https://hbh.sh/challenges)
## [hackthebox](https://app.hackthebox.eu/)
### boxes
| Machines | Difficulty | Write-up | Vulnerabilities |
| :--- | :---: | :--- | :-- |
| Luke | Medium | [Read](ht... |
# Nuclear Pond
<img src="assets/logo.png" width="400" height="300" align="right">
Nuclear Pond is used to leverage [Nuclei](https://github.com/projectdiscovery/nuclei) in the cloud with unremarkable speed, flexibility, and [perform internet wide scans for far less than a cup of coffee](https://devsecopsdocs.com/blog... |
<h1 align="center">
webscan
</h1>
<h4 align="center">web信息收集工具</h4>
<p align="center">
<a href="https://opensource.org/licenses/MIT">
<img src="https://img.shields.io/badge/license-MIT-_red.svg">
</a>
<a href="https://github.com/niudaii/webscan/actions">
<img src="https://img.shields.io/github/workflow... |
# Offensive Security / PenTesting Cheatsheets
## Reconnaissance / Enumeration
### Extracting Live IPs from Nmap Scan
```bash
nmap 10.1.1.1 --open -oG scan-results; cat scan-results | grep "/open" | cut -d " " -f 2 > exposed-services-ips
```
### Simple Port Knocking
```bash
for x in 7000 8000 9000; do nmap -Pn –hos... |
## Usage
```
docker run -it --rm -v $(pwd):/data nuclei -l $url_input -t /templates/cves/CVE-2020-9484.yaml -c 12
```
## Manual
```
Usage of nuclei:
-H value
Custom Header.
-c int
Number of concurrent requests to make (default 10)
-debug
Allow debugging of request/responses
-json
... |
# awesome-bloodhound
A curated list of awesome Bloodhound resources

This list is for links to learn and use the awesome Active Directory reconnaissance tool Bloodhound. It will for the most part consist of tools available on Github, videos demonstrating the tools, blog posts and wikis.
You can ... |
Atlas - Quick SQLMap Tamper Suggester v1.0
---
__Atlas__ is an open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS, the tool is based on returned status code.

Screen
---

Installation
---
``... |
# machinescli
[](https://creativecommons.org/licenses/by-sa/4.0/)
This tool provides commandline access for [HackTheBox](https://www.hackthebox.eu), [TryHackMe](https://tryhackme.com/) and [VulnHub](http... |
# Awesome Android Security [](https://github.com/NetKingJ/awesome-android-security) [](https://g... |
# Backdoor - HackTheBox - Writeup
Linux, 20 Base Points, Easy

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```1337```.
***User***: By running ```wpscan``... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.3.1">
<img src="https://img.shi... |
<h1 align="center">BountyReport <a href="https://twitter.com/intent/tweet?text=BountyReport%20-%20Make%20your%20bug%20bounty%20report%20easy%20and%20fast.%0A%0Ahttps://github.com/khanjanny/BountyReport&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitter&style=s... |
# Awesome Rust [](https://github.com/rust-unofficial/awesome-rust/actions/workflows/rust.yml) [](https://www.trackawesomelist.com/rust-unoffici... |
# OSWE-Prep
Useful tips and resources for preparing for exam.
### Learning Material
| Order | Name | Link |
|--- | ----- | ----- |
| 1 | A Deep Dive into XXE | https://www.synack.com/blog/a-deep-dive-into-xxe-injection/ |
| 2 | Testing and Exploiting Java Deserialization | https://afinepl.medium.com/testing-and-expl... |
# Kubernetes
> Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and management. It was originally designed by Google, and is now maintained by the Cloud Native Computing Foundation.
## Summary
- [Tools](#tools)
- [RBAC Configuration](#rbac-configuration)
... |
# File Inclusion
> The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application.
> The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ... |
# Cyber Security Resources
The following are the resources which i use and like the most.
### This will be regularly updated.
## Web Penetration Testing :
### Online Resources
1. Hacker101: https://www.hacker101.com
2. Bugcrowd University: https://www.bugcrowd.com/hackers/bugcrowd-university/
3. Hacking Article... |
## Arthas

[](https://travis-ci.org/alibaba/arthas)
[](https://codecov.io/gh/alibaba/arthas)
[
- [Recon ](./recon.md)
- [Tools](./tools.md)
## Bug Bounty Resources
- [The Bug Hunters Methodology](https://github.com/jhaddix/tbhm)
- [Awesome Bug Bounty](https://github.com/djadmin/awesome-bug-bounty)
- [ Bug Bounty Guide is a launchpad for bug bount... |
# CTF-Learning-Resources
## `General Wargames & Practice Platforms`
- [Over The Wire](http://overthewire.org/wargames/)
- [cmdchallenge](https://cmdchallenge.com/)
- [PicoCTF](https://picoctf.com)
- [CTFLearn](https://ctflearn.com)
- [247ctf](https://247ctf.com/)
- [Intro. to CTF Course](https://www.hoppersroppers.... |
# Raw Text File Writeup
|
# Cheatsheet
* Frida : [[ 1 ]](https://erev0s.com/blog/frida-code-snippets-for-android/) - [[ 2 ]](https://codeshare.frida.re/) - [[ 3 ]](https://awakened1712.github.io/hacking/hacking-frida/) - [[ 4 ]](https://github.com/cyberheartmi9/Frida-Guide/blob/main/Frida%20Guide/Frida%20Guide.md)
* ADB : [[ 1 ]](https://devh... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![coverage-status-image]][codecov]
[![pypi-version]][pypi]
[](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge)
**Awesome... |
- [个人卫生](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/个人卫生.md)
- [收集信息](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/收集信息/README.md)
- [域名信息](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/收集信息/域名信息/README.md)
- [CDN是否存在](https://github.com/xiaoy-sec/Pentest_Note/blob/maste... |
# HayStack

## Introduction
Target: 10.10.10.115(Linux)
Kali: 10.10.16.61
HayStack is an easy box in hack the box. But it does isn't easy at all. It's annoying to find the user and password in the messy Spanish. For the root, you should have a basic understan... |
<h1 align="center">
<img src="screenshots/axiom_banner.png" alt="axiom"></a>
<br>
</h1>
[](https://opensource.org/licenses/MIT)
[](https://github.com/... |
# HackTheBox
Walkthrough of HackTheBox Challenges
## Solved Boxes
1. Emdee five for life
1. Templated
1. Phonebook |
# awesome-cyber-skills
**A curated list of hacking environments where you can train your cyber skills free, legally and safely**

## About the List
In the field of Information Security, understanding the enemy, ... |
# Overview
This directory contains source code for PHP implementation of gRPC layered on
shared C library. The same installation guides with more examples and
tutorials can be seen at [grpc.io](https://grpc.io/docs/quickstart/php.html).
gRPC PHP installation instructions for Google Cloud Platform is in
[cloud.google.... |
# Simple CTF
Beginner level ctf
[Simple CTF](https://tryhackme.com/room/easyctf)
## Topic's
* Web Enumeration
* Network Enumeration
* CVE-2019-9053 - CMS Made Simple < 2.2.10
* Brute Forcing (SSH)
* Misconfigured Binaries
## Simple CTF
Deploy the machine and attempt the questions!
```
kali@kali:~/CTFs/tryhackme/... |
# Bolt - HackTheBox - Writeup
Linux, 30 Base Points, Medium
## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```443```.
***User***: From port ```80``` we get a tar file which contains docker imag... |
## SQLMap
Default set Parameter
```
--batch never ask for UserInput
--level=5
--risk=3
--passwords
```
---
```
--u URL
-v VERBOSE Verbosity level: 0-6 (default 1)
```
|
<p align="center"> <strong>Star this repo and keep track of awesome new updates.</strong> </p>

[](http://makeapullrequest.com) ](https://awesome.re)
###### Thanks to all who create these Awesome One Liners❤️
----------------------

---------------------------
# Subdomain Enu... |

  
[](https://travis-ci.org/ytdl-org/youtube-dl)
youtube-dl - download videos from youtube.com or other video platforms
# ACKNOWLEDGEMENT OF GITHUB'S CHANGED POLICIES FOR 1201 CLAIMS FOLLOWING youtube-dl TAKEDOWN
_Statement added 23rd of Decemb... |
# 所有收集类项目:
- [收集的所有开源工具: sec-tool-list](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式
- [逆向资源: awesome-reverse-engineering](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/i... |
# Tmux 101
tmux, the terminal multiplexer, is easily one of the most used tools by the Linux community (and not just pentesters!). While not a malicious tool, tmux makes running simultaneous tasks throughout a pentest incredibly easy.

## Getting started
All tmux commands start with a ke... |
# Bastion | August 4, 2023
## Introduction
Welcome to my another writeup! In this HackTheBox [Bastion](https://app.hackthebox.com/machines/Bastion) machine, you'll learn: Mounting Virutal Hard Disk image via `guestmount`, extracting NTLM hashes via SAM and SYSTEM files and crack them via `samdump2`, privilege escalat... |
# Node Version Manager [][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/684)... |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https://app.sh... |
<!--lint disable double-link-->
<!--lint disable awesome-heading-->
<div align="center">
<h1>
Awesome YouTubers
<a href="https://awesome.re">
<img src="https://awesome.re/badge-flat2.svg" alt="Awesome">
</a>
</h1>
<br />
<div>
<a href="https://github.com/JoseDeFreitas/awesome-youtubers">
<img w... |
## Description
**Nikto** is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks fo... |
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos)
# Persistence
- 跟驻留/持久化有关的工具和文章,多平台。包括80个工具和350左右文章。
- [English Version](https://github.com/alphaSeclab/persistence/blob/master/Readme_en.md)
# 目录
- [Windows](#778ee28406147330e50ce8e39e1e0510) -> [(8)工具](#a563fd944f51033ab1823cc51ce5cc84) [(4... |
nikto
======
Docker image for [Nikto web server scanner](https://cirt.net/Nikto2)
Usage:
$ docker run --rm -it infoslack/nikto -host www.example.com
|
# Node Version Manager [][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/684)... |
# CyFon Tools
## Description: Hacking Tools - Bug Bounty, Mobile, Web, IOT, Cloud, Network, Hardware, ReCon Tools
### Author: Jonathan Scott Villarreal @jonathandata1
Distribution - Unlimited, you can use these tools anyway and anyhow you want to
## CURRENT VERSION 2.0
## NEW: Method 7
> Subdomain Status Code, Get ... |
# Merlin Modules
Modules are used to perform a set of pre-defined actions or execute a
program on an agent. The modules are described using JavaScript Object
Notation (JSON). Modules will be stored in `platform/arch/language/type`
directories. Every module _must_ have the `base` object and _may_ have
additional objec... |
# 漏洞赏金备忘录</h1>
在线观看:https://www.hacking8.com/bugbounty-cheatsheet/cheatsheets/bugbountyplatforms.html
| 📚 Reference | 🔎 Vulnerabilities |
| ------------------------------------------------- | -------------------------------------------------... |
# This is a curated list of resources for collecting information about cloud providers.
#### A presentation that covers the concept of Cloud OSINT and its application in third party cloud provider review https://docs.google.com/presentation/d/113N-x1ocz7xDS5rXcmhmTqDyv2to028yAzedJlKq1J8/edit?usp=sharing
### Asset ... |
# Elsfa7110-Oneliner-bughunting
### Dalfox scan to bugbounty targets.
- [Explained command](https://bit.ly/3nnEhCj)
```bash
xargs -a xss-urls.txt -I@ bash -c 'python3 /dir-to-xsstrike/xsstrike.py -u @ --fuzzer'
```
### Dalfox scan to bugbounty targets.
- [Explained command](https://bit.ly/324Sr1x)
```bash
wget http... |
# SwagShop
<h1 align="center">
<br>
<a href="https://www.hackthebox.eu/home/machines/profile/194"><img src="images/img.png" alt="Jarvis"></a>
<br>
</h1>
<h4 align="center"> Author: manulqwerty & Ghostpp7 </h4>
***
__Machine IP__: 10.10.10.143
__DATE__ : 16/07/2019
__START TIME__: 7:41 PM
***
## NMAP

Usage with my image:
$ docker run --rm -it infoslack/wpscan --url www.example.com
If you want to generate the image:
$ git clone git@github.com:infoslack/sec-tools.git
$ cd sec-tools/wpscan
$ docker build -t wpscan .
You can create a bash wrapper... |
## <span id="head1"> Penetration_Testing_POC</span>
搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。
- [ Penetration_Testing_POC](#head1)
- [ 请善用搜索[`Ctrl+F`]查找](#head2)
- [IOT Device&Mobile Phone](#head3)
- [Web APP](#head4)
- [ 提权辅助相关](#head5)
- [ PC](#head6)
- [ tools-小工具集合](#head7)
- [ 文章/书籍/教程相关](#head8)
- [ 说明](#head9)... |
# Seal - HackTheBox - Writeup
Linux, 30 Base Points, Medium
## Machine

### TL;DR;
To solve this machine, we begin by enumerating open services – finding the ports ```22```,```443``` and ```8080```.
***User 1:*** Found ```luis``` credentials (On ```seal_market``` commit) to ```GitBuc... |
<h1 align="center">Packages <a href="https://twitter.com/intent/tweet?text=Trickest%20Packages%20-%20Automated%20compromise%20detection%20of%20the%20world's%20most%20popular%20packages%20%40trick3st%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fpackages&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shiel... |
# CTF Style Laravel Pentesting Excercise
This exercise has been test driven and developed on MacOS & Docker.
Any other configurations will certainly need tweaking in certain parts, so be prepared to debug as you go along.
Debian based distros like Ubuntu and Kali Linux should work pretty well.
Basic PHP... |
# Cheatsheet of Payloads and Testing Guide :computer: :top: :new:
<hr>
<h2>XSS Filter Evasion Cheat Sheet</h2>
<a href="https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet#URL_encoding">XSS Filter Evasion Cheat Sheet</a>
<h2>XSS-Polyglots</h2>
<a href="https://github.com/0xsobky/HackVault/wiki/Unleashing-an-... |
# HackTheBox_writeup_Resolute
User:
e***4___x
Brute for user ###use what you have got
Enum
Root:
D**Admins: PriEsc
or
Ps***x : PrivEsc
|
# Arsenal

Arsenal is just a quick inventory, reminder and launcher for pentest commands.
<br>This project written by pentesters for pentesters simplify the use of all the hard-to-remember commands

In arsenal you can search for a command, select one and it's prefilled directly ... |
# fishfry
replaces fish history with a history tailored to pentesters for efficency and newbie pentesters for learning, new linux users, and several distro specific commands over 250 total commands with full discriptions.
replace the stock fishshell history located at '~/.config/fish/fish_history' with '~/.config/fish... |
# web
批量根据域名访问判活网页  
httprobe 
AQUATONE
fff [https://github.com/tomnomnom/fff](https://github.com/tomnomnom/fff)
记了好多工具,其实还没有用过应该都差不多还是想自己写,其实自己写的应该也差不多
fuzzing 
```
ffuf preferred !change user-agent!
#######directory 403 but file still can be read if have right name
if target is a li... |
## 👑 What is KingOfOneLineTips Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan... |
# Gobuster v3.1.0
Gobuster is a tool used to brute-force:
* URIs (directories and files) in web sites.
* DNS subdomains (with wildcard support).
* Virtual Host names on target web servers.
* Open Amazon S3 buckets
## Tags, Statuses, etc
[](https://... |
# SeaweedFS
[](https://join.slack.com/t/seaweedfs/shared_invite/enQtMzI4MTMwMjU2MzA3LTEyYzZmZWYzOGQ3MDJlZWMzYmI0OTE4OTJiZjJjODBmMzUxNmYwODg0YjY3MTNlMjBmZDQ1NzQ5NDJhZWI2ZmY)
[](ht... |
# Pwn Shop: ret2libc with stack pivot
**[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/RNqJjO3uf98)** |
Android 开源项目分类汇总,最新最全版可见 [codekk.com](https://p.codekk.com/)
====================
Other: [English Version](https://github.com/Trinea/android-open-project/tree/master/English%20Version), [繁體版](https://github.com/Trinea/android-open-project/tree/master/%E7%B9%81%E9%AB%94%E4%B8%AD%E6%96%87%E7%89%88), [Website Version](htt... |
[Shortcut to Extract Subdomains and running services]
---
| Website | Comment |
|--- | --- |
http://zoomeye.org | Powerfull. Search automatically for exploits on running services<br> Allows only 20 requests on free tier
http://netograph.io | Useless. Low data<br>
https://www.nerdydata.com/ | Useless/Marketing stuff<br>... |
# Awesome Pentest Cheat Sheets [](https://github.com/sindresorhus/awesome)
Collection of cheat sheets useful for pentesting
### Contribution
Your contributions and suggestions are heartily welcome. Please c... |
# Awesome-Android-Security 

# Table of Contents
- [Blog](#blog)
- [How To's](#how-tos)
- [Paper](#paper)
- [Books](#books)
- [Course](#course)
- [Tools](#tools)
* [Static Analysis Tools](#Static-Analysis)
* [Dynamic Analysis Tools](#Dyna... |
# Coding Interview University
> I originally created this as a short to-do list of study topics for becoming a software engineer,
> but it grew to the large list you see today. After going through this study plan, [I got hired
> as a Software Development Engineer at Amazon](https://startupnextdoor.com/ive-been-acquire... |
<div align="center">
<a href="https://github.com/iamsarvagyaa/AndroidSecNotes"><img src="static/cover.png" alt="Android Security Notes"></a><br/>
</div>
<p align="center">
<a href="#getting-started">Getting Started?</a> »
<a href="https://www.buymeacoffee.com/iamsarvagyaa">Buy me a coffee</a> »
<a href="#contact... |
# HackTheBox CTF Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list on our experience. Please share this with your connections and direct queries a... |
## 👑 What is KingOfOneLineTips Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan... |
# Pwnbox

Want to replicate Hack the Box very own Pwnbox? Follow the guide below!
This should give you the "look and feel" of pwnbox used by Hack The Box.
Everything shown here can be done in your own Parrot OS, whether it is VM or main OS.
However, I sugg... |
# Pentest Tools

The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ
## TODO
* [x] Directory
* [ ] Browser bookmarks
* [ ] Install Scripts
*... |
Сканер безопасности WEB-приложений сертифицированный по первому уровню доверия. Предназначен для Государственных корпораций.
=====
Nikto web server scanner - https://cirt.net/Nikto2
Full documentation - https://github.com/sullo/nikto/wiki
Run normally:
~~~
git clone https://github.com/sullo/nikto
# Main script ... |
<!-- PROJECT LOGO -->
<br />
<p align="center">
<img src="/img/slide1.jpg" alt="Logo" width="900" height="506">
<h3 align="center">Website Pentesting Cheatsheet</h3>
</p>
<b>Table of Contents</b>
- [Resources](#resources)
* https://www.securitydrops.com/the-web-api-authentication-guide/
* https://beecept... |
<h1 align="center">:skull: Awesome note-taking apps for hackers !</h1>
<p align="center">
A collection of awesome note-taking <b>apps, plugins and techiques</b> for pentest report generation, bug-bounty hunting & building a knowledge base
<a href="https://twitter.com/intent/tweet?text=A%20collection%20of%20awe... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.