text
stringlengths
9
334k
# CTF Writeups <p align="center"> <img src="resources/images/logo.jpg"> <br> <i>Writeups Challenges I have solved</i> [![HSNHK - CTF-writeups](https://img.shields.io/static/v1?label=HSNHK&message=CTF-writeups&color=blue&logo=github)](https://github.com/HSNHK/CTF-writeups) [![stars - CTF-writeups](https://img.shields.i...
# CTF-BIBLE ##### tags `ctf` `web` `crypto` `reversing` `pwn` `forensics` `OSINT` ## TL;DR ### Writeups - [Mobile](./Mobile) - [Web](./Web) - [Forensics](./Forensics) - [pwn](./pwn) - [crypto](./crypto) - [reversing](./reversing) - [OSINT](./Osint) ### Archived CTFs - [Archive](https://github.com/sajjadium...
# Payloads_All_The_Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I <3 pull requests :) You can also contribute with a beer IRL or with `buymeacoffee.com` [![Coffee](https://www.buymeacoffee.com/assets/img/custom_images/orange_im...
# HackTheBox – Blunder - Write-Up Author: [Calvin Lai](http://security.calvinlai.com) ## **Question:** > Blunder ![img](./img/1.png) ## Background Blunder is a Linux machine from HackTheBox, which is a real-life similar box that required CVE exploit technique, for training your ethical hacking and penetration test...
# [![OWASP Logo](https://github.com/OWASP/Amass/blob/master/images/owasp_logo.png) OWASP Amass](https://www.owasp.org/index.php/OWASP_Amass_Project) [![CircleCI Status](https://circleci.com/gh/OWASP/Amass/tree/master.svg?style=shield)](https://circleci.com/gh/OWASP/Amass/tree/master) [![GitHub release](https://img.sh...
# awesome-cybersec [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) ![](https://img.shields.io/badge/Contribuitions-Welcome-brightgreen) Um acervo de incríveis plataformas, blogs, documentos, livros, recursos e ...
# Awesome Bug Bounty Tools [![Awesome](https://awesome.re/badge.svg)](https://awesome.re) > A curated list of various bug bounty tools ## Contents - [Recon](#Recon) - [Subdomain Enumeration](#Subdomain-Enumeration) - [Port Scanning](#Port-Scanning) - [Screenshots](#Screenshots) - [Technologies](#Tech...
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.37.2-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
# SQLMap - Cheetsheat <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong...
Linux Kernel Exploitation ========================= A collection of links related to Linux kernel security and exploitation. Updated bimonthly. Pull requests are welcome as well. Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified of updates. Subscribe to @linkersec on [Telegram](https://...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
# Algernon ## Table of Contents * [Summary](#summary) * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [FTP](#ftp) * [HTTP](#http) * [RPC](#rpc) * [NetBIOS](#netbios) * [SMB](#smb) * [OS](#os) * [Nmap OS Discovery Scan](#nmap-os-discovery-scan) * [Nmap OS Discovery...
# SCS Cyber Team Resources This is the repository that will store the UGA SCS Cyber Team information, resources, and challenges. The Resources section is broken up into the General and CTF folders: **General**: Resources that contain general cyber security information and other interesting articles **CTF**: Resource...
_ __ ___ ___ ___ ___ | | \ \ / _ \ / _ \ / _ \ / _ \ ___ __ _ __| |_ __ __ _ \ \ | | | | | | | (_) | (_) | / __|/ _` |/ _` | '__/ _` | > > | | | | | | |\__, |> _ < \__ \ (_| | (_| | | | (_| | / / |...
.................. I use this function in my `.zshrc` file ## Fuzz with stdin ``` fuzz-in() { strip=$(echo $1|sed 's/:\/\///') strip=$(echo $strip| sed 's/\\/\-/g') strip=$(echo $strip| sed 's/\//-/g') ffuf -u $1 -t 10 -o $strip.fuzz.txt -of md -p 1 "${@:2}" -w - echo "cat $strip.fuzz.txt" } ``` `cat ~/tool...
# Notes > March 11, 2022 - Didn't actually "solve" crypto. The encryption algorithms weren't that computationally expensive, so I just bruteforced them - Credit to [CryptoCat's](https://github.com/Crypto-Cat/CTF/blob/main/HackTheBox/pwn/bat_computer/batcomputer.py) bat\_computer solution for teaching me how to set it u...
# SQL Injection Type: ## In-band SQLi (Classic SQLi): In-band SQL Injection is the most common and easy-to-exploit of SQL Injection attacks. In-band SQL Injection occurs when an attacker is able to use the same communication channel to both launch the attack and gather results. The two most common types of in-band SQL...
# command 收集渗透中会用到的常用命令 。 建议直接[Ctrl+F]查找 # java命令执行 如下编码网站: https://ares-x.com/tools/runtime-exec/ https://r0yanx.com/tools/java_exec_encode/ https://www.bugku.net/runtime-exec-payloads/ 手动编码操作 ``` bash -c {echo,cGluZyAxMjcuMC4wLjE7ZWNobyAxID50ZXN0LnR4dA==}|{base64,-d}|{bash,-i} ``` ## 命令执行,定位资...
# CTF / Hacking Practice ## [gameofhacks](https://www.gameofhacks.com/) * Multiple choice-based source code review ## [hbh](https://hbh.sh/challenges) ## [hackthebox](https://app.hackthebox.eu/) ### boxes | Machines | Difficulty | Write-up | Vulnerabilities | | :--- | :---: | :--- | :-- | | Luke | Medium | [Read](ht...
# Nuclear Pond <img src="assets/logo.png" width="400" height="300" align="right"> Nuclear Pond is used to leverage [Nuclei](https://github.com/projectdiscovery/nuclei) in the cloud with unremarkable speed, flexibility, and [perform internet wide scans for far less than a cup of coffee](https://devsecopsdocs.com/blog...
<h1 align="center"> webscan </h1> <h4 align="center">web信息收集工具</h4> <p align="center"> <a href="https://opensource.org/licenses/MIT"> <img src="https://img.shields.io/badge/license-MIT-_red.svg"> </a> <a href="https://github.com/niudaii/webscan/actions"> <img src="https://img.shields.io/github/workflow...
# Offensive Security / PenTesting Cheatsheets ## Reconnaissance / Enumeration ### Extracting Live IPs from Nmap Scan ```bash nmap 10.1.1.1 --open -oG scan-results; cat scan-results | grep "/open" | cut -d " " -f 2 > exposed-services-ips ``` ### Simple Port Knocking ```bash for x in 7000 8000 9000; do nmap -Pn –hos...
## Usage ``` docker run -it --rm -v $(pwd):/data nuclei -l $url_input -t /templates/cves/CVE-2020-9484.yaml -c 12 ``` ## Manual ``` Usage of nuclei: -H value Custom Header. -c int Number of concurrent requests to make (default 10) -debug Allow debugging of request/responses -json ...
# awesome-bloodhound A curated list of awesome Bloodhound resources ![Bloodhound](bh.png) This list is for links to learn and use the awesome Active Directory reconnaissance tool Bloodhound. It will for the most part consist of tools available on Github, videos demonstrating the tools, blog posts and wikis. You can ...
Atlas - Quick SQLMap Tamper Suggester v1.0 --- __Atlas__ is an open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS, the tool is based on returned status code. ![atlas_main](https://i.imgur.com/G2bXF3A.png) Screen --- ![atlas_run](https://i.imgur.com/I6cXSKd.png) Installation --- ``...
# machinescli [![License: CC BY-SA 4.0](https://raw.githubusercontent.com/7h3rAm/7h3rAm.github.io/master/static/files/ccbysa4.svg)](https://creativecommons.org/licenses/by-sa/4.0/) This tool provides commandline access for [HackTheBox](https://www.hackthebox.eu), [TryHackMe](https://tryhackme.com/) and [VulnHub](http...
# Awesome Android Security [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/NetKingJ/awesome-android-security) [![GitHub stars](https://img.shields.io/github/stars/NetKingJ/awesome-android-security.svg?style=flat&label=Star)](https://g...
# Backdoor - HackTheBox - Writeup Linux, 20 Base Points, Easy ![info.JPG](images/info.JPG) ## Machine ![‏‏Backdoor.JPG](images/Backdoor.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```1337```. ***User***: By running ```wpscan``...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.3.1"> <img src="https://img.shi...
<h1 align="center">BountyReport <a href="https://twitter.com/intent/tweet?text=BountyReport%20-%20Make%20your%20bug%20bounty%20report%20easy%20and%20fast.%0A%0Ahttps://github.com/khanjanny/BountyReport&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitter&style=s...
# Awesome Rust [![build badge](https://github.com/rust-unofficial/awesome-rust/actions/workflows/rust.yml/badge.svg?branch=main)](https://github.com/rust-unofficial/awesome-rust/actions/workflows/rust.yml) [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/rust-unoffici...
# OSWE-Prep Useful tips and resources for preparing for exam. ### Learning Material | Order | Name | Link | |--- | ----- | ----- | | 1 | A Deep Dive into XXE | https://www.synack.com/blog/a-deep-dive-into-xxe-injection/ | | 2 | Testing and Exploiting Java Deserialization | https://afinepl.medium.com/testing-and-expl...
# Kubernetes > Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and management. It was originally designed by Google, and is now maintained by the Cloud Native Computing Foundation. ## Summary - [Tools](#tools) - [RBAC Configuration](#rbac-configuration) ...
# File Inclusion > The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application. > The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ...
# Cyber Security Resources The following are the resources which i use and like the most. ### This will be regularly updated. ## Web Penetration Testing : ### Online Resources 1. Hacker101: https://www.hacker101.com 2. Bugcrowd University: https://www.bugcrowd.com/hackers/bugcrowd-university/ 3. Hacking Article...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) [![Build Status](https://travis-ci.org/alibaba/arthas.svg?branch=master)](https://travis-ci.org/alibaba/arthas) [![codecov](https://codecov.io/gh/alibaba/arthas/branch/master/graph/badge.svg)](https://codecov.io/gh/alibaba/arthas) [![maven](https://img.shields.io/m...
## Files: - [Domain Enumeration](./Domain-enumeration.md) - [Recon ](./recon.md) - [Tools](./tools.md) ## Bug Bounty Resources - [The Bug Hunters Methodology](https://github.com/jhaddix/tbhm) - [Awesome Bug Bounty](https://github.com/djadmin/awesome-bug-bounty) - [ Bug Bounty Guide is a launchpad for bug bount...
# CTF-Learning-Resources ## `General Wargames & Practice Platforms` - [Over The Wire](http://overthewire.org/wargames/) - [cmdchallenge](https://cmdchallenge.com/) - [PicoCTF](https://picoctf.com) - [CTFLearn](https://ctflearn.com) - [247ctf](https://247ctf.com/) - [Intro. to CTF Course](https://www.hoppersroppers....
# Raw Text File Writeup
# Cheatsheet * Frida : [[ 1 ]](https://erev0s.com/blog/frida-code-snippets-for-android/) - [[ 2 ]](https://codeshare.frida.re/) - [[ 3 ]](https://awakened1712.github.io/hacking/hacking-frida/) - [[ 4 ]](https://github.com/cyberheartmi9/Frida-Guide/blob/main/Frida%20Guide/Frida%20Guide.md) * ADB : [[ 1 ]](https://devh...
# [Django REST framework][docs] [![build-status-image]][travis] [![coverage-status-image]][codecov] [![pypi-version]][pypi] [![Gitter](https://badges.gitter.im/tomchristie/django-rest-framework.svg)](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) **Awesome...
- [个人卫生](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/个人卫生.md) - [收集信息](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/收集信息/README.md) - [域名信息](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/收集信息/域名信息/README.md) - [CDN是否存在](https://github.com/xiaoy-sec/Pentest_Note/blob/maste...
# HayStack ![eyER9x.png](https://s2.ax1x.com/2019/08/04/eyER9x.png) ## Introduction Target: 10.10.10.115(Linux) Kali: 10.10.16.61 HayStack is an easy box in hack the box. But it does isn't easy at all. It's annoying to find the user and password in the messy Spanish. For the root, you should have a basic understan...
<h1 align="center"> <img src="screenshots/axiom_banner.png" alt="axiom"></a> <br> </h1> [![License](https://img.shields.io/badge/license-MIT-_red.svg)](https://opensource.org/licenses/MIT) [![contributions welcome](https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat)](https://github.com/...
# HackTheBox Walkthrough of HackTheBox Challenges ## Solved Boxes 1. Emdee five for life 1. Templated 1. Phonebook
# awesome-cyber-skills **A curated list of hacking environments where you can train your cyber skills free, legally and safely** ![](https://user-images.githubusercontent.com/24913656/230711515-f0848676-f967-4690-9914-40646ec40c4a.png) ## About the List In the field of Information Security, understanding the enemy, ...
# Overview This directory contains source code for PHP implementation of gRPC layered on shared C library. The same installation guides with more examples and tutorials can be seen at [grpc.io](https://grpc.io/docs/quickstart/php.html). gRPC PHP installation instructions for Google Cloud Platform is in [cloud.google....
# Simple CTF Beginner level ctf [Simple CTF](https://tryhackme.com/room/easyctf) ## Topic's * Web Enumeration * Network Enumeration * CVE-2019-9053 - CMS Made Simple < 2.2.10 * Brute Forcing (SSH) * Misconfigured Binaries ## Simple CTF Deploy the machine and attempt the questions! ``` kali@kali:~/CTFs/tryhackme/...
# Bolt - HackTheBox - Writeup Linux, 30 Base Points, Medium ## Machine ![‏‏Bolt.JPG](images/Bolt.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```443```. ***User***: From port ```80``` we get a tar file which contains docker imag...
## SQLMap Default set Parameter ``` --batch never ask for UserInput --level=5 --risk=3 --passwords ``` --- ``` --u URL -v VERBOSE Verbosity level: 0-6 (default 1) ```
<p align="center"> <strong>Star this repo and keep track of awesome new updates.</strong> </p> ![Banner](./img/Banner.png) [![PRs Welcome](https://img.shields.io/badge/PRs-welcome-brightgreen.svg?style=flat-square)](http://makeapullrequest.com) ![GitHub last commit](https://img.shields.io/github/last-commit/h-parikh/...
# 总结赏金技巧和工作技巧 ``` 本列表,收集一些在服务器上运行的一些工具,组件自动化,服务器长期挂跑项目 欢迎提issues,来丰富工作流程,比如自己挖洞时候的一些简易流程,工具+调用命令, 在我的日常渗透中,我发现我重复调用几个工具,但是不同的调用组合渗透的工作流程,有时候调用命令会忘记,所以有了这个列表,来达到帮助我记忆一些流程命令的文档,未来还会细化过程,脚本小子福音了 其中有些连接和笔记从17年我的笔记所摘取,有错误请提醒,我修改一下,有些技巧也很老了,现在信息收集分为主动化和被动化,主动化更偏向于发现新资产,被动化稍微弱点。 ``` **//子域名获取** ``` subdomain3 https://gith...
# One-Liners [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re) ###### Thanks to all who create these Awesome One Liners❤️ ---------------------- ![image](https://user-images.githubusercontent.com/75373225/180003557-59bf909e-95e5-4b31-b4f8-fc05532f9f7c.png) --------------------------- # Subdomain Enu...
![logo](screenshots/logo.png) ![GitHub](https://img.shields.io/github/license/nullt3r/jfscan) ![GitHub release (latest by date)](https://img.shields.io/github/v/release/nullt3r/jfscan) ![Rating](https://img.shields.io/github/stars/nullt3r/jfscan?style=social) [![Code style: black](https://img.shields.io/badge/code%20st...
# MACHINE CHALLENGE: MIRAI ## Challenge Description ##### Own system Type below the hash that is inside the root.txt file in the machine. The file can be found under /root on Linux machines and at the Desktop of the Administrator on Windows. ##### Own User Type below the hash that is inside the user.txt file in the ...
# eWPT Preparation by Joas ## Recon and Enumeration Domain ### https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6 ### https://medium.com/qualityholics/ewpt-exam-review-tips-8a4d9cebf5f9 ### https://elearnsecurity.com/uncategorized/pentesting-101-fingerprinting-continued/ ...
[![Build Status](https://travis-ci.org/ytdl-org/youtube-dl.svg?branch=master)](https://travis-ci.org/ytdl-org/youtube-dl) youtube-dl - download videos from youtube.com or other video platforms # ACKNOWLEDGEMENT OF GITHUB'S CHANGED POLICIES FOR 1201 CLAIMS FOLLOWING youtube-dl TAKEDOWN _Statement added 23rd of Decemb...
# 所有收集类项目: - [收集的所有开源工具: sec-tool-list](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式 - [逆向资源: awesome-reverse-engineering](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/i...
# Tmux 101 tmux, the terminal multiplexer, is easily one of the most used tools by the Linux community (and not just pentesters!). While not a malicious tool, tmux makes running simultaneous tasks throughout a pentest incredibly easy. ![tmux](./Tmux_cheatsheet.png) ## Getting started All tmux commands start with a ke...
# Bastion | August 4, 2023 ## Introduction Welcome to my another writeup! In this HackTheBox [Bastion](https://app.hackthebox.com/machines/Bastion) machine, you'll learn: Mounting Virutal Hard Disk image via `guestmount`, extracting NTLM hashes via SAM and SYSTEM files and crack them via `samdump2`, privilege escalat...
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.37.2-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
# Swagger Code Generator [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https://app.sh...
<!--lint disable double-link--> <!--lint disable awesome-heading--> <div align="center"> <h1> Awesome YouTubers <a href="https://awesome.re"> <img src="https://awesome.re/badge-flat2.svg" alt="Awesome"> </a> </h1> <br /> <div> <a href="https://github.com/JoseDeFreitas/awesome-youtubers"> <img w...
## Description **Nikto** is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks fo...
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos) # Persistence - 跟驻留/持久化有关的工具和文章,多平台。包括80个工具和350左右文章。 - [English Version](https://github.com/alphaSeclab/persistence/blob/master/Readme_en.md) # 目录 - [Windows](#778ee28406147330e50ce8e39e1e0510) -> [(8)工具](#a563fd944f51033ab1823cc51ce5cc84) [(4...
nikto ====== Docker image for [Nikto web server scanner](https://cirt.net/Nikto2) Usage: $ docker run --rm -it infoslack/nikto -host www.example.com
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.35.0-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
# CyFon Tools ## Description: Hacking Tools - Bug Bounty, Mobile, Web, IOT, Cloud, Network, Hardware, ReCon Tools ### Author: Jonathan Scott Villarreal @jonathandata1 Distribution - Unlimited, you can use these tools anyway and anyhow you want to ## CURRENT VERSION 2.0 ## NEW: Method 7 > Subdomain Status Code, Get ...
# Merlin Modules Modules are used to perform a set of pre-defined actions or execute a program on an agent. The modules are described using JavaScript Object Notation (JSON). Modules will be stored in `platform/arch/language/type` directories. Every module _must_ have the `base` object and _may_ have additional objec...
# 漏洞赏金备忘录</h1> 在线观看:https://www.hacking8.com/bugbounty-cheatsheet/cheatsheets/bugbountyplatforms.html | 📚 Reference | 🔎 Vulnerabilities | | ------------------------------------------------- | -------------------------------------------------...
# This is a curated list of resources for collecting information about cloud providers. #### A presentation that covers the concept of Cloud OSINT and its application in third party cloud provider review https://docs.google.com/presentation/d/113N-x1ocz7xDS5rXcmhmTqDyv2to028yAzedJlKq1J8/edit?usp=sharing ### Asset ...
# Elsfa7110-Oneliner-bughunting ### Dalfox scan to bugbounty targets. - [Explained command](https://bit.ly/3nnEhCj) ```bash xargs -a xss-urls.txt -I@ bash -c 'python3 /dir-to-xsstrike/xsstrike.py -u @ --fuzzer' ``` ### Dalfox scan to bugbounty targets. - [Explained command](https://bit.ly/324Sr1x) ```bash wget http...
# SwagShop <h1 align="center"> <br> <a href="https://www.hackthebox.eu/home/machines/profile/194"><img src="images/img.png" alt="Jarvis"></a> <br> </h1> <h4 align="center"> Author: manulqwerty & Ghostpp7 </h4> *** __Machine IP__: 10.10.10.143 __DATE__ : 16/07/2019 __START TIME__: 7:41 PM *** ## NMAP ![...
wpscan ====== Docker image for [wpscan](http://wpscan.org/) Usage with my image: $ docker run --rm -it infoslack/wpscan --url www.example.com If you want to generate the image: $ git clone git@github.com:infoslack/sec-tools.git $ cd sec-tools/wpscan $ docker build -t wpscan . You can create a bash wrapper...
## <span id="head1"> Penetration_Testing_POC</span> 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 - [ Penetration_Testing_POC](#head1) - [ 请善用搜索[`Ctrl+F`]查找](#head2) - [IOT Device&Mobile Phone](#head3) - [Web APP](#head4) - [ 提权辅助相关](#head5) - [ PC](#head6) - [ tools-小工具集合](#head7) - [ 文章/书籍/教程相关](#head8) - [ 说明](#head9)...
# Seal - HackTheBox - Writeup Linux, 30 Base Points, Medium ## Machine ![‏‏Seal.JPG](images/Seal.JPG) ### TL;DR; To solve this machine, we begin by enumerating open services – finding the ports ```22```,```443``` and ```8080```. ***User 1:*** Found ```luis``` credentials (On ```seal_market``` commit) to ```GitBuc...
<h1 align="center">Packages <a href="https://twitter.com/intent/tweet?text=Trickest%20Packages%20-%20Automated%20compromise%20detection%20of%20the%20world's%20most%20popular%20packages%20%40trick3st%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fpackages&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shiel...
# CTF Style Laravel Pentesting Excercise This exercise has been test driven and developed on MacOS & Docker. Any other configurations will certainly need tweaking in certain parts, so be prepared to debug as you go along. Debian based distros like Ubuntu and Kali Linux should work pretty well. Basic PHP...
# Cheatsheet of Payloads and Testing Guide :computer: :top: :new: <hr> <h2>XSS Filter Evasion Cheat Sheet</h2> <a href="https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet#URL_encoding">XSS Filter Evasion Cheat Sheet</a> <h2>XSS-Polyglots</h2> <a href="https://github.com/0xsobky/HackVault/wiki/Unleashing-an-...
# HackTheBox_writeup_Resolute User: e***4___x Brute for user ###use what you have got Enum Root: D**Admins: PriEsc or Ps***x : PrivEsc
# Arsenal ![](img/logo.png) Arsenal is just a quick inventory, reminder and launcher for pentest commands. <br>This project written by pentesters for pentesters simplify the use of all the hard-to-remember commands ![](img/arsenal.gif) In arsenal you can search for a command, select one and it's prefilled directly ...
# fishfry replaces fish history with a history tailored to pentesters for efficency and newbie pentesters for learning, new linux users, and several distro specific commands over 250 total commands with full discriptions. replace the stock fishshell history located at '~/.config/fish/fish_history' with '~/.config/fish...
# web 批量根据域名访问判活网页 &#x20; httprobe&#x20; AQUATONE fff [https://github.com/tomnomnom/fff](https://github.com/tomnomnom/fff) 记了好多工具,其实还没有用过应该都差不多还是想自己写,其实自己写的应该也差不多 fuzzing&#x20; ``` ffuf preferred !change user-agent! #######directory 403 but file still can be read if have right name if target is a li...
## 👑 What is KingOfOneLineTips Project ? 👑 Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan...
# Gobuster v3.1.0 Gobuster is a tool used to brute-force: * URIs (directories and files) in web sites. * DNS subdomains (with wildcard support). * Virtual Host names on target web servers. * Open Amazon S3 buckets ## Tags, Statuses, etc [![Build Status](https://travis-ci.com/OJ/gobuster.svg?branch=master)](https://...
# SeaweedFS [![Slack](https://img.shields.io/badge/slack-purple)](https://join.slack.com/t/seaweedfs/shared_invite/enQtMzI4MTMwMjU2MzA3LTEyYzZmZWYzOGQ3MDJlZWMzYmI0OTE4OTJiZjJjODBmMzUxNmYwODg0YjY3MTNlMjBmZDQ1NzQ5NDJhZWI2ZmY) [![Twitter](https://img.shields.io/twitter/follow/seaweedfs.svg?style=social&label=Follow)](ht...
# Pwn Shop: ret2libc with stack pivot **[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/RNqJjO3uf98)**
Android 开源项目分类汇总,最新最全版可见 [codekk.com](https://p.codekk.com/) ==================== Other: [English Version](https://github.com/Trinea/android-open-project/tree/master/English%20Version), [繁體版](https://github.com/Trinea/android-open-project/tree/master/%E7%B9%81%E9%AB%94%E4%B8%AD%E6%96%87%E7%89%88), [Website Version](htt...
[Shortcut to Extract Subdomains and running services] --- | Website | Comment | |--- | --- | http://zoomeye.org | Powerfull. Search automatically for exploits on running services<br> Allows only 20 requests on free tier http://netograph.io | Useless. Low data<br> https://www.nerdydata.com/ | Useless/Marketing stuff<br>...
# Awesome Pentest Cheat Sheets [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) Collection of cheat sheets useful for pentesting ### Contribution Your contributions and suggestions are heartily welcome. Please c...
# Awesome-Android-Security ![awesome](https://awesome.re/badge.svg) ![Screenshot](img/androidsec.png) # Table of Contents - [Blog](#blog) - [How To's](#how-tos) - [Paper](#paper) - [Books](#books) - [Course](#course) - [Tools](#tools) * [Static Analysis Tools](#Static-Analysis) * [Dynamic Analysis Tools](#Dyna...
# Coding Interview University > I originally created this as a short to-do list of study topics for becoming a software engineer, > but it grew to the large list you see today. After going through this study plan, [I got hired > as a Software Development Engineer at Amazon](https://startupnextdoor.com/ive-been-acquire...
<div align="center"> <a href="https://github.com/iamsarvagyaa/AndroidSecNotes"><img src="static/cover.png" alt="Android Security Notes"></a><br/> </div> <p align="center"> <a href="#getting-started">Getting Started?</a> » <a href="https://www.buymeacoffee.com/iamsarvagyaa">Buy me a coffee</a> » <a href="#contact...
# HackTheBox CTF Writeups This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list on our experience. Please share this with your connections and direct queries a...
## 👑 What is KingOfOneLineTips Project ? 👑 Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan...
# Pwnbox ![htb screenshot](images/htb_screenshot.png?raw=true "Pwnbox") Want to replicate Hack the Box very own Pwnbox? Follow the guide below! This should give you the "look and feel" of pwnbox used by Hack The Box. Everything shown here can be done in your own Parrot OS, whether it is VM or main OS. However, I sugg...
# Pentest Tools ![](logo.png) The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ ## TODO * [x] Directory * [ ] Browser bookmarks * [ ] Install Scripts *...
Сканер безопасности WEB-приложений сертифицированный по первому уровню доверия. Предназначен для Государственных корпораций. ===== Nikto web server scanner - https://cirt.net/Nikto2 Full documentation - https://github.com/sullo/nikto/wiki Run normally: ~~~ git clone https://github.com/sullo/nikto # Main script ...
<!-- PROJECT LOGO --> <br /> <p align="center"> <img src="/img/slide1.jpg" alt="Logo" width="900" height="506"> <h3 align="center">Website Pentesting Cheatsheet</h3> </p> <b>Table of Contents</b> - [Resources](#resources) * https://www.securitydrops.com/the-web-api-authentication-guide/ * https://beecept...
<h1 align="center">:skull: Awesome note-taking apps for hackers !</h1> <p align="center"> A collection of awesome note-taking <b>apps, plugins and techiques</b> for pentest report generation, bug-bounty hunting & building a knowledge base <a href="https://twitter.com/intent/tweet?text=A%20collection%20of%20awe...