text stringlengths 9 334k |
|---|
## 👇 **Practice Daily on iCodeThis.com** 👇
[](https://iCodeThis.com/?ref=app-ideas)
# :ledger: App Ideas Collection
Have you ever wanted to build something but you had no idea what to do? Just as
authors sometimes have "writers block" it's also true for developers.... |
# ICE
Deploy & hack into a Windows machine, exploiting a very poorly secured media server.
[Ice](https://tryhackme.com/room/ice)
## Topic's
* Network Enumeration
* CVE-2004-1561 - Icecast 2.0.1
* Metasploit (local_exploit_suggester)
* Metasploit (bypassuac_eventvwr)
## [Task 1] Connect
Connect to the TryHackMe ne... |
<a href="https://github.com/nvm-sh/logos">
<picture>
<source media="(prefers-color-scheme: dark)" srcset="https://raw.githubusercontent.com/nvm-sh/logos/HEAD/nvm-logo-white.svg" />
<img src="https://raw.githubusercontent.com/nvm-sh/logos/HEAD/nvm-logo-color.svg" height="50" alt="nvm project logo" />
</pictu... |
# Awesome OSCP
[](https://github.com/sindresorhus/awesome)
> A curated list of awesome OSCP resources
## Contents
- [Resources](#resources)
- [OSCP Reviews and Guides](#oscp-reviews-and-guides)
- [Ch... |
# Dictionary-Of-Pentesting
## 简介
收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。
收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。
涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。
该项目计划持续收集。
## 更新记录
**2022.12.07**
1. 增加trickest/wordlists字典,主要包括robots.txt 文件中的disallow的路径汇总和168的子域名字典。
**2022.07.16**
... |
# Bug Bounty Tips and Information
## Getting Started
- [Bug Bounties 101](https://whitton.io/articles/bug-bounties-101-getting-started/)
- [The life of a bug bounty hunter](http://www.alphr.com/features/378577/q-a-the-life-of-a-bug-bounty-hunter)
- [Awesome list of bugbounty cheatsheets](https://github.com/EdOverflow... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![pypi-version]][pypi]
**Awesome web-browsable Web APIs.**
Full documentation for the project is available at [http://www.django-rest-framework.org][docs].
---
**Note**: We have now released Django REST framework 3.0. For older codebases you may want... |
# Dictionary-Of-Pentesting
## 简介
收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。
收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。
涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。
该项目计划持续收集。
## 更新记录
**2021.10.04**
1. 增加Burp的Software Version Checks的识别规则
2. 增加Client-Side Prototype Pollution的规则(基于Burp的... |
# oneliner commands for bug bounties
## Find Subdomain
> projectdiscovery
```bash
subfinder -d target.com -silent | httpx -silent -o urls.txt
```
## Search Subdomain using Gospider
> https://github.com/KingOfBugbounty/KingOfBugBountyTips/
```bash
gospider -d 0 -s "https://site.com" -c 5 -t 100 -d 5 --blacklist jpg,jpe... |
---
description: nmap cheatsheet
---
# Nmap
## Tool
### Scope
```
nmap <host list>
nmap -6 <host list>
nmap -iL <path to file>.txt
nmap <host list> --exclude <host list>
```
### Host discovery
```
-sL No Scan. List targets only
-sn Disable port scanning. Host discovery only.
-Pn Disable host discovery. P... |
# netpwn
A framework made to automate tasks of pentesting.
Written in python 2.7 <br />
__Modules__ <br />
reverse_shell - Creates a reverse shell with python to connect to a specific machine of your choice. <br />
send_file - Allows you to send a file to target server. <br />
php_backdoor - Generates a simple backdoo... |
# Information Collection For Pentest SRC
## 声明
```
Author:Qftm
Data:2020/01/18
ProjectAddress:https://github.com/Qftm/Information_Collection_Handbook
GitbookAddress:https://qftm.github.io/Information_Collection_Handbook/
```
## 正文
"只有不努力的黑客,没有攻不破的系统"。
在SRC漏洞挖掘或渗透测试中,信息收集占很大一部分,能收集到别人收集不到的资产,就能挖到别人挖不到的洞。
项目已整... |
<h1 align="center">
<br>
<img width="200" src="https://cdn.rawgit.com/sindresorhus/awesome/master/media/logo.svg" alt="awesome">
<br>
</h1>
# Awesome Hacking Resources  *
#### Twitter: @GRuMPzSux
### Collection of notes to prepare for the eLearnSecurity eJPT certification exam.
### Before you continue reading, please do the following:
###### 1. Please sign up for a **FREE** https://ine.com account, and complete the Penetrat... |
# Popcorn: 10.10.10.6
## Hints
- Enumeration helps find a "hidden" web application
- Getting a foothold is all about a malicious PHP file upload vulnerability
- For privesc, think about how old the Linux system is
## nmap
Starting with the usual `nmap` scan. Interesting ports:
```none
22/tcp open ssh OpenSSH ... |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https:/... |
## Description
**jSQL Injection** is a lightweight application used to find database information from a server.
It's **free**, **open source** and **cross-platform** for Windows, Linux and Mac and it works with Java from version 11 to 20.

* [Interception of Android implicit intents](https://blog.over... |
# WEEKLY INFOSEC UPDATE : v0.7
- An initiative by [ResetHacker Community](https://github.com/RESETHACKER-COMMUNITY/What-Is-RESETHACKER)



* banner
* default creds (hydra)
* Anonymous login
* Put files
* if exists web service, check if web a... |
# nmap

[Official Website](https://nmap.org)
# Table of Contents
- [nmap](#nmap)
- [Table of Contents](#table-of-contents)
- [Installation](#installation)
- [Cheatsheet](#cheatsheet)
- [Use](#use)
- [Scan IP address (Targets)](#scan-ip-address-targets)
- [Scan a single host IP](#... |
# Blocky-HTB
Blocky is a Linux machine that is rated as easy, but it need a lot of enumerating.
# Recon
I started by runing nmap scan on the machine and found 3 open ports.
```
┌──(kali㉿kali)-[~/Desktop]
└─$ nmap -sC -sV 10.10.10.37
Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-24 11:38 EDT
Nmap... |

## What is CommandoVM?
**Complete Mandiant Offensive VM ("CommandoVM")** is a comprehensive and customizable, Windows-based security distribution for penetration testing and red teaming. CommandoVM comes packaged with a variety of offensive tools not included in [Kali Linux... |
<a href="https://www.spiderfoot.net/r.php?u=aHR0cHM6Ly93d3cuc3BpZGVyZm9vdC5uZXQv&s=os_gh"><img src="https://www.spiderfoot.net/wp-content/themes/spiderfoot/img/spiderfoot-wide.png"></a>
[](https://raw.githubusercontent.com/smicallef/spiderfoot/master/LICE... |
<h1 align="center">
<br>
<a href="https://github.com/R0X4R/Pinaak/"><img src="images/logo.png" width="500px" alt="Pinaak"></a>
</h1>
<h4 align="center">
A vulnerability fuzzing tool written in bash, it contains most commonly used tools to perform vulnerability scans.
</h4>
<p align="center">
<a href="#"><img src="... |
# Sense: 10.10.10.60
## Hints
- Admin access is all about directory enumeration and default creds
- Code execution is all about software version
- Privesc may not be required!
## nmap
Starting with the usual `nmap` scan. Interesting ports:
```none
80/tcp open http lighttpd 1.4.35
443/tcp open ssl/https?
`... |
# hackthebox-c1-encryptbd-2018

HackTheBox C1 by EnctyptBD
## Challenge 1:
Richard Tolar is working in a organization as a Vice President of Accounting. A recent data breach leaks this information. Find out the sourc... |
# OVIC Benchmarker for NIPS 2018
This folder contains the SDK for track one of the [Low Power ImageNet Recognition Challenge workshop at NIPS 2018.](https://lpirc.ecn.purdue.edu/)
## Pre-requisite
Follow the steps [here](https://www.tensorflow.org/lite/demo_android) to install Tensorflow, Bazel, and the Android NDK ... |
# Recon_and_bugbounty_methodology
recon from my perspective and combining different methodlogies of security reasearchers such as jason haddix , nahamsec and more
### Access playlist here : <a href="https://www.youtube.com/watch?v=W8XT_KIzxBA&list=PLf3J-S0CLK3VSusI8Gn4f4ZKS16UIn720">Recon Playlist </a>
### POCs play... |
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) on the Wifi Devboard!
Looking for a Linux/OS X version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFlash) (WIP for Windows too including full automated downloads.)
Looking for... |
# Evil-WinRM [![Version-shield]](https://raw.githubusercontent.com/Hackplayers/evil-winrm/master/evil-winrm.rb) [![Ruby2.3-shield]](https://www.ruby-lang.org/en/news/2015/12/25/ruby-2-3-0-released/) [![Gem-Version]](https://rubygems.org/gems/evil-winrm) [![License-shield]](https://raw.githubusercontent.com/Hackplayers/... |
# macOS and iOS Security Related Tools [](https://awesome.re) <a href="https://github.com/ashishb/osx-and-ios-security-awesome/actions"></a>
## Contents
- [macOS Security](#macos-secur... |
# SQLI tricks
## GET
### Error-Based
### Simple test
`Adding a simpe quote '`
Example: `http://192.168.1.104/Less-1/?id=5'`
### Checking Privileges
Using Sql-map
`./sqlmap.py -u http://localhost/Less-1/?id=1 --privileges | grep FILE`
### Reading file
`./sqlmap.py -u <URL> --file-read=<file to read>`
`./sqlma... |
# SQL injection
A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application.
Attempting to manipulate SQL queries may have goals including:
- Information Leakage
- Disclosure of stored data
- Manipulation of stored data
- Bypassing authorization con... |
# Nmap
- Deploy the attached VM
no answer needed
- What networking constructs are used to direct traffic to the right application on a server?
- `ports`
- How many of these are available on any network-enabled computer?
- `65535`
- [Research] How many of these are considered "well-known"? (These are the "st... |
## Web Enumeration
Web enumeration means to look out info about services running on port, versions, languages, directories and more.
- [Web Enumeration](#web-enumeration)
- [Ports](#ports)
- [nmap](#nmap)
- [Finding Open Ports](#finding-open-ports)
- [Checking Running Service Version](#check-running-service-... |
## Arthas

[](https://travis-ci.org/alibaba/arthas)
[](https://codecov.io/gh/alibaba/arthas)

# BurpSuite
- 400+ 开源Burp插件,400+文章和视频。
- [English Version](https://github.com/alphaSeclab/awesome-burp-suite/blob/master/Readme_en.md)
# 目录
- [资源收集](#6366edc293f25b57bf688570b11d6584) -> [(7)工具](#6d0f7103a93a06f0ecb1f977d84b5de6) [(2)文章](#2c32... |
# Web Application Hacking List
A list of web application checks sorted by functionality
- [Web Applications](#web-applications)
- [Categories](#categories)
- [Signup/Register Form](#signupregister-form)
- [Login Forms](#login-forms)
- [Forgotten Password Form](#forgotten-password-form)
- [Contact For... |
# Private Docker Registry in Kubernetes
Kubernetes offers an optional private Docker registry addon, which you can turn
on when you bring up a cluster or install later. This gives you a place to
store truly private Docker images for your cluster.
## How it works
The private registry runs as a `Pod` in your cluster.... |
# hackthebox
[](https://opensource.org/licenses/MIT)
 <br />


[](https://travis-ci.org/wpscanteam/wpscan)
[
And attached file: [web_blitzprop.zip](web_blitzprop.zip)
# BlitzProp Solution
Let's start the docker and browse it:

By intercepting the request/response using [BurpSuite... |
# Ethical-Hacking-Tools
<br>
[](https://forthebadge.com)
<br>


- [Creating a Trojan](https://github.com/1d8/trojan)
## Blogs
- [Google Project Zero](https://googl... |
# Wall
<h1 align="center">
<br>
<a href="https://www.hackthebox.eu/home/machines/profile/208"><img src="images/img.png" alt="wall"></a>
<br>
</h1>
<h4 align="center"> Author: <a heref="https://www.hackthebox.eu/home/users/profile/91108" > thek</a></h4>
***
__Machine IP__: 10.10.10.157
__DATE__ : 20/09/2019
*... |
# Traverxec - Linux (Easy)
## Summary
Traverxec was an interesting box that involved exploiting a RCE vulnerability in a webserver called Nostromo. I was able to get SSH access eventually and escalate this to fully compromise the machine.
## Enumeration
I started Enumeration by running Rustscan on the the target.
`... |
# Inject - HackTheBox - Writeup
Linux, 20 Base Points, Easy

## Machine

## TL;DR
To solve this machine, we start by using `nmap` to enumerate open services and find ports `22`, and `8080`.
***User***: Discovered a Local File Inclusion vulnerability o... |
# OSCP Cheatsheet
The following collection is a wild (but structured) selection of commands, snippets, links, exploits, tools, lists and techniques I personally tested and used on my journey to becoming an OSCP. I will extend, restructure and update it from time to time, so let's see where this is going.
**THIS IS W... |
# HackTheBox CTF Cheatsheet
This cheatsheet is aimed at CTF players and beginners to help them sort Hack The Box Labs on the basis of operating system and difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list based on our experience. Please ... |
# Resources
This directory contains resources for the project.
1. `pentest_records` contains studies on penetration testing with ChatGPT over sample machines (VulnHub, HackTheBox, etc.).
2. `example_chat_history` contains the penetration testing records, mostly manual communication between pentester and ChatGPT.
3. `H... |
# EasyG
EasyG started out as a script that I use to automate some information gathering tasks for PenTesting and Bug Hunting, [you can find it here](https://github.com/seeu-inspace/easyg/blob/main/easyg.rb). Now it's more than that.
Here I gather all the resources about PenTesting and Bug Bounty Hunting that I find i... |
# OSCP_Scripts
The following repo includes scripts I created to assist with automating some tasks for the OSCP v2.0 exam.
All of my scripts were made in bash.
I will not be maintaining this repo.
## my_notes/cheat-sheet.md
This is not a script, but all of my notes I took for the OSCP test. This file is huge. However i... |
# Oscp公益学习组(持续更新中……)
## 一、学习组简介
希望提供建立公益学习组帮助大家汇总学习资源、分享学习经验。
官方网站 https://xuanhu.xyz
## 二、学习资源整理
[0x0000-小技巧合集.md](https://github.com/xuanhusec/OscpStudyGroup/blob/master/0x0000-%E5%B0%8F%E6%8A%80%E5%B7%A7%E5%90%88%E9%9B%86.md)
[0x0001-Kali基本操作.md](https://github.com/xuanhusec/OscpStudyGroup/blob/master/0x0001-Ka... |
# Penetration Testing Resources
This repository has been forked from [Mia von Steinkirch](https://github.com/bt3gl). Since her repository has been archived and I intend to create one, I have forked her repository. It already has few resources available. I haven't got the time to go through all of them. I have put them... |
# [国外教程]
作者 : Guided Hacking
平台 : YouTube
语言 : C++
说明 : 实在太多视频了,你们自己去这大佬主页找吧
教程 : :smile:
## 其它
[How to solve Pride #1 CrackMe Tutorial - Beginner Level](https://youtu.be/H71G8ZRjWek)
[HackTheBox Irked Walkthrough - UnrealIRCd Exploit](https://youtu.be/bab2t0QkZd8)
[How to Unpack Malware, How to use Imprec, How... |
# Porttiskannausta ja muuta tiedustelua
Tehtäväksi annettiin käydä lävitse useita nmap -ohjelman/komennon toimintoja, ja analysoida niitä. Tätä varten käytin aikaisemmille tehtäville pystyyn pistettyä metasploitable -maalikonetta, ja Kali Linux virtuaalikonetta itse skannausten ja pakettikaappausten tekemiseen Wiresha... |
# Grandpa
URL: https://app.hackthebox.com/machines/Grandpa
Level: Easy
Date 7 Jun 2020
## Walkthrough
- [Enumeration](#enumeration)
- [Privesc](#privesc)
# Enumeration
## NMAP
```
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 6.0
| http-methods:
|_ Potentially risky methods: TRACE COPY ... |
Writeups for this box is not available but there is a video walkthrough of this challenge in my Youtube Channel.
[Link to this Youtube Video](https://www.youtube.com/watch?v=hKk9HnCwHMY).
|

-----
### Languages
##### ESP
Este libro está escrito originalmente en español. Puedes acceder en otros lenguajes usando el traductor de Google, si bien no es perfecto puede ser de utilidad.
##### EN
This book is orig... |
## 👑 What is KingOfBugBounty Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understandi... |
---
title: "CMSeeK"
category: "scanner"
type: "CMS"
state: "released"
appVersion: "1.1.3"
usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities"
---
<!--
SPDX-FileCopyrightText: 2021 iteratec GmbH
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
--------------------... |
<p align="center">
<a href="https://github.com/nil0x42/phpsploit" alt="master">
<img src="data/img/logo.png" alt="Master">
</a>
</p>
<h3 align="center">
Full-featured C2 framework which silently persists on <br>webserver via polymorphic PHP oneliner
<a href="https://twitter.com/intent/tweet?text=PhpSpl... |

[](https://badge.fury.io/rb/wpscan)
[](https://travis-ci.or... |
# HackTheBox CTF Cheatsheet
This cheatsheet is aimed at CTF players and beginners to help them sort Hack The Box Labs on the basis of operating system and difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list based on our experience. Please ... |
<h1 align="center">
<img src="static/cloudlist-logo.png" alt="cloudlist" width="400px"></a>
<br>
</h1>
<p align="center">
<a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a>
<a href="https://github.com/projectdiscovery/cloudlist/issues"><img src="https:/... |
# Jeeves: stack variable overwrite
**[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/SgoCGETbnZg)** |
# Bug Bounty Cheat Sheet
- [Bug Bounty Platforms](cheatsheets/bugbountyplatforms.md)
- [Books](cheatsheets/books.md)
- [Special Tools](cheatsheets/special-tools.md)
- [Recon](cheatsheets/recon.md)
- [XSS](cheatsheets/xss.md)
- [SQLI](cheatsheets/sqli.md)
- [SSRF](cheatsheets/ssrf.md)
- [CRLF Injection || HTTP Response... |
# Inteface
## Table of Contents
* [Summary](#summary)
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [SSH](#ssh)
* [HTTP](#http)
* [OS](#os)
* [Nmap OS Discovery Scan](#nmap-os-discovery-scan)
* [Nmap OS Aggresive Scan](#nmap-os-aggresive-scan)
* [Nmap OS Scripts Scan](... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
<h1 align="left">
<img src="static/nuclei-logo.png" alt="nuclei" width="200px"></a>
<br>
</h1>
[](https://opensource.org/licenses/MIT)
[](https://goreportcard.com/report/... |
# iOS Security Awesome
В данном репозитории собранны материалы по безопасности iOS-приложений, различные статьи, исследования, инструменты анализа и полезные библиотеки/инструменты для обеспечения безопасности приложений. Большая часть этого материала приходит из телеграм канала [Mobile AppSec World](https://t.me/mobi... |
# Nmap commands used so far
[Tryhackme Room](https://tryhackme.com/room/furthernmap)
[Cheat Sheet](https://www.stationx.net/nmap-cheat-sheet/)
## Basics to know
- Total 65535 ports are available in a computer
- 1024 ports are common ones
- If a syn request from nmap is dropped by firewall, nmap considers th... |
# 所有收集类项目:
- [收集的所有开源工具](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式
- [逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Boot... |
🌍
*[Čeština](README-cs.md) ∙ [Deutsch](README-de.md) ∙ [Ελληνικά](README-el.md) ∙ [English](README.md) ∙ [Español](README-es.md) ∙ [Français](README-fr.md) ∙ [Indonesia](README-id.md) ∙ [Italiano](README-it.md) ∙ [日本語](README-ja.md) ∙ [한국어](README-ko.md) ∙ [polski](README-pl.md) ∙ [Português](README-pt.md) ∙ [Română](... |
[](https://github.com/ytdl-org/youtube-dl/actions?query=workflow%3ACI)
youtube-dl - download videos from youtube.com or other video platforms
- [INSTALLATION](#installation)
- [DESCRIPTION](#description)
- [OPTIONS](#options)
- [CONFIGURAT... |
<h1 align="center">
<img src="https://user-images.githubusercontent.com/2679513/131189167-18ea5fe1-c578-47f6-9785-3748178e4312.png" width="150px"/><br/>
Speckle | Server
</h1>
<h3 align="center">
Server and Web packages
</h3>
<p align="center"><b>Speckle</b> is data infrastructure for the AEC industry.</p><br/>... |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https:/... |
####Nmap
#### 1. Introduction
When it comes to hacking, knowledge is power. The more knowledge you have about a target system or network, the more options you have available. This makes it imperative that proper enumeration is carried out before any exploitation attempts are made.
Say we have been given an IP (or mul... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
- [IPVS](#ipvs)
- [What is IPVS](#what-is-ipvs)
- [IPVS vs. IPTABLES](#ipvs-vs-iptables)
- [When IPVS falls back to IPTABLES](#when-ipvs-falls-back-to-iptables)
- [Run kube-proxy in IPVS mode](#run-kube-proxy-in-ipvs-mode)
- [Prerequisite](#prerequisite)
- [Local UP Cluster](#local-up-cluster)
- [... |
# A handy guide to financial support for open source.
*"I do open source work, how do I find funding?"*
This document aims to provide an exhaustive list of all the ways that people get paid for open source work. Hopefully, projects and contributors will find this helpful in figuring out the best options for them.
The... |
# web-sec-interview
Information Security Industry Practitioners (Web Security / Penetration Testing) Interview Questions 1.1
### README English | [中文](README_CN.md)
---
* Introduce the experience of burrowing (or CTF experience) that you think is interesting
* What are the more vulnerabilities you usually u... |
# Awesome CTF [](https://travis-ci.org/apsdehal/awesome-ctf) [](https://github.com/sindresorhus/awesome)
A curated list of [Captur... |
***项目简介***
一个 Red Team 攻击的生命周期,整个生命周期包括:
信息收集、攻击尝试获得权限、持久性控制、权限提升、网络信息收集、横向移动、数据分析(在这个基础上再做持久化控制)、在所有攻击结束之后清理并退出战场。
***
# 相关资源列表
- https://mitre-attack.github.io/ mitre科技机构对攻击技术的总结wiki
- https://huntingday.github.io MITRE | ATT&CK 中文站
- https://arxiv.org 康奈尔大学(Cornell University)开放文档
- http://www.owasp.org.cn/... |
# SQL injection
> A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application.
Attempting to manipulate SQL queries may have goals including:
- Information Leakage
- Disclosure of stored data
- Manipulation of stored data
- Bypassing authorisation c... |
Infrastructure help
=======
* [Infrastructure help](#infrastructure-help)
* [Enumeration](#enumeration)
* [Arp Scan](#arp-scan)
* [Ping Sweep](#ping-sweep)
* [Port Scan](#port-scan)
* [Web](#web)
* [SMB](#smb)
* [SNMP](#snmp)
* [NSE scripts](#nse-scripts)
* [Exploita... |
# Node Version Manager [][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/... |
## 👑 What is KingOfOneLineTips Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan... |
<a href="https://discordapp.com/users/850031066626129931" target="_blank"> <img src="https://img.shields.io/badge/Discord-7289DA?style=for-the-badge&logo=discord&logoColor=white"> </a>
<h1 align="center">Kaynaklar</h1>
- [[MDISEC] siber güvenlikte nasıl gelişebilirim, nerden baslamaliyim?](https://www.mehmetince.ne... |
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos)
# Windows
- 跟Windows安全有关的资源收集。当前包括的工具个数1100+,并根据功能进行了粗糙的分类。部分工具添加了中文描述。当前包括文章数3300+。
- 此页只包含部分内容. [查看完整版](https://github.com/alphaSeclab/windows-security/blob/master/Readme_full.md)
- [English Version](https://github.com/alphaSeclab/windows-secur... |
# OSCP Enumeration Cheat Sheet
A collection of commands and tools used for conducting enumeration during my OSCP journey.
## Description
This is an enumeration cheat sheet that I created while pursuing the OSCP. It also includes the commands that I used on platforms such as Vulnhub and Hack the Box. Some of these co... |
CTF-Katana
===============
> John Hammond | February 1st, 2018
--------------------------
This repository, at the time of writing, will just host a listing of tools and commands that may help with CTF challenges. I hope to keep it as a "live document," and ideally it will not die out like the old "tools" page I had... |
<h1 align="center">
<br>
<img width="200" src="https://cdn.rawgit.com/sindresorhus/awesome/master/media/logo.svg" alt="awesome">
<br>
</h1>
# Awesome Hacking Resources  ![Awesome community](https://img.shields.io/badge/awesome-community-gr... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.