text
stringlengths
9
334k
### wp-scan * `wpscan --url http://$IP/ --enumerate` <- Enum mode won't find any plugins by default. * `-e ap,t,tt,u` to enumerate all plugins, popular themes, timthumbs, and users * `wpscan --url http://$IP/ --api-token <SNIP>` ```bash [i] Plugin(s) Identified: [+] site-editor | Location: http://192.168.200.166/wp...
Android Open Source Projects [https://codekk.com](https://p.codekk.com/) for more ==================== Welcome to recommend good android open source projects, you can [Commit](https://github.com/Trinea/android-open-project/wiki/Standard-of-adding-and-editing-content "Standard of adding and editing content") directly o...
<p align="center"> <img src="img/kb_logo.png?raw=true" width="200"/> </p> # kb. A minimalist knowledge base manager [![Build Status](https://travis-ci.com/gnebbia/kb.svg?branch=master)](https://travis-ci.com/gnebbia/kb) Author: gnc <nebbionegiuseppe@gmail.com> Copyright: © 2020, gnc Date: 2022-09-21 Version...
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
SQL INJECTION ATTACK The following are implemented the SQl Injectoin attack: 1. How would you find if a site is vulnerable to SQL injection or not? 2. Implement SQL Injection Attack and perform the following on the Test Site 3. Find the database names 4. Find the relation/table names 5. Find the attribute/column name...
# GOAD (Game Of Active Directory) - version 2 ![goad.png](./docs/img/GOAD.png) ## Description GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack techniques. ## Warning This lab is extremely vuln...
This is a curated list of resources for those who want to get started with ethical hacking. # The Internet ### IP Addresses * https://www.cloudflare.com/learning/dns/glossary/what-is-my-ip-address/ * https://www.codedbrain.com/2019/12/one-hell-of-an-ip-addresspart-1-non-technical-perspective/ * https://www.iplocation....
# Guide-CEH-Practical-Master ### **Exame Details** - Exam Title: Certified Ethical Hacker (Practical) - Number of Practical Challenges: 20 - Duration: 6 hours - Availability: Aspen – iLabs - Test Format: iLabs Cyber Range - Passing Score: 70% (14 Questions) -------------------------------------------- **Exam Tips...
# Docker-OSX · [Follow @sickcodes on Twitter](https://twitter.com/sickcodes) ![Running Mac OS X in a Docker container](/running-mac-inside-docker-qemu.png?raw=true "OSX KVM DOCKER") Run Mac OS X in Docker with near-native performance! X11 Forwarding! iMessage security research! iPhone USB working! macOS in a Docker c...
# Awesome WebSockets Security [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) A collection of CVEs, research, and reference materials related to WebSocket security ------ ## Contents - [WebSocket Library Vul...
<p align="center"> <a href="https://wpscan.com/"> <img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo"> </a> </p> <h3 align="center">WPScan</h3> <p align="center"> WordPress Security Scanner <br> <br> <a href="https://wpscan.com/" title="home...
# HackTheBox Writeups for rooms and challenges on [HackTheBox](https://app.hackthebox.com/home), in the order of completion: 1. [Dancing - Very Easy](Dancing.md) 2. [Redeemer - Very Easy](Redeemer.md) 3. [Appointment - Very Easy](Appointment.md) 4. [Sequel - Very Easy](Sequel.md) 5. [Crocodile - Very Easy](...
# HTTP/HTTPS Enumeration ## Directory Brute Force A number of tools can be used to brute force directories on a web server in order to find hidden files and folders that are not publically available. ### Gobuster Gobuster can be used to bruteforce a web server in order to discover directories and files: `gobuster ...
# 所有收集类项目: - [收集的所有开源工具](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式 - [逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Boot...
# Access URL: https://app.hackthebox.com/machines/Access Level: Easy Date 7 May 2021 ## Walkthrough - [Enumeration](#enumeration) - [User flag](#user-flag) - [Privesc](#privesc) # Enumeration ## NMAP Let's start with a basic nmap scan: ``` # Nmap 7.91 scan initiated Fri May 7 23:48:44 2021 as: nmap -T4 -p- -o...
# Wpscan with Tor proxy Easily run Wpscan with Tor proxy in docker. This project uses the default wpscan docker image and a lightweight alpine image for Tor proxy. Use this tool **only** for WordPress websites you own, to assess the security of them and plan accordingly. ## Usage For convience use the simple bash s...
# OSCP-PWK-Notes ## Exam Proofs Linux: ```bash hostname cat /path/to/flag/proof.txt ifconfig ``` Windows: ```bash hostname type C:\path\to\flag\proof.txt ipconfig ``` ## Useful services ### SSHd ```bash sudo systemctl start ssh sudo systemctl stop ssh ``` Add this line to `/etc/s...
# Swagger Code Generator [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https:/...
## <span id="head1"> Penetration_Testing_POC</span> 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 - [ Penetration_Testing_POC](#head1) - [ 请善用搜索[`Ctrl+F`]查找](#head2) - [IOT Device&Mobile Phone](#head3) - [Web APP](#head4) - [ 提权辅助相关](#head5) - [ PC](#head6) - [ tools-小工具集合](#head7) - [ 文章/书籍/教程相关](#head8) - [ 说明](#head9)...
# Poster The sys admin set up a rdbms in a safe way. [Poster](https://tryhackme.com/room/poster) * Network Enumeration * Metasploit (postgres_login) * Metasploit (postgres_sql) * Metasploit (postgres_hashdump) * Metasploit (postgres_readfile) * Metasploit (postgres_copy_from_program_cmd_exec) * Stored Passwords & Ke...
# Paper Writeup ## Enumeration ### Nmap First, let's scan for open ports using `nmap`. We can quickly scan for open ports and store them in a variable: `ports=$(nmap -p- --min-rate=1000 -T4 10.10.11.143 | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//)`. Then, we can scan those specific ports in depth by r...
# Crimson v3 > Crimson is a tool that automates `ASSET DISCOVERY` and `VULNERABILITY SCANNING`. > The container is built on top of the Kali distro. <p align="center"> <img src="crimson_logo.png" /> </p> #### It consists of fourth partially interdependent modules: * `crimson_IPcon` - tests the single IP or ran...
### IP `192.168.211.217` # Reconnaissance ### nmap `nmap -sC -sV 192.168.211.217` ``` 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 951d828f5ede9a00a80739bdacadd344 (RSA) | 256 d7b452a2c8fab70ed1a8d070cd6b3690 (ECDSA) |_ 256 dff24f773344d593d77917455aa...
## node-webkit is renamed NW.js [![Gitter](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/nwjs/nw.js?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge) Official site: https://nwjs.io ## Introduction NW.js is an app runtime based on `Chromium` and `node.js`. You can write nat...
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) (Devboard/WROOM)! Looking for a Linux/Mac version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFlash) (WIP for Windows too including full automated downloads.) Or do you want t...
![Visitors](https://visitor-badge.laobi.icu/badge?page_id=thehackingsage.thehackingsage) [![Open Source Love](https://badges.frapsoft.com/os/v1/open-source.svg?v=102)](https://github.com/thehackingsage?tab=repositories) [![Mr.SAGE](https://thehackingsage.com/assets/images/thehackingsage.com.png)](https://thehackingsag...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) [![Build Status](https://github.com/alibaba/arthas/workflows/JavaCI/badge.svg)](https://github.com/alibaba/arthas/actions) [![codecov](https://codecov.io/gh/alibaba/arthas/branch/master/graph/badge.svg)](https://codecov.io/gh/alibaba/arthas) [![maven](https://img.s...
____ ___ _____ .__ | | \______ _____/ ____\_ __| | ______ ______ | | / ___// __ \ __\ | \ | ______ ______ /_____/ /_____/ | | /\___ \\ ___/| | | | / |__ /_____/ /____...
![Supported Python versions](https://img.shields.io/badge/python-3-brightgreen.svg) # macro\_pack ## Short description MacroPack Community is a tool used to automatize obfuscation and generation of retro formats such as MS Office documents or VBS like format. It also handles various shortcuts formats. This tool can...
# Post-Exploitation on Linux ## Data Haversting and Enumaration ### Common users `awk -F: '{ if($3 >= 1000) print $1}' passwd >> users` ### Reading bash_history files Mapping users directories `ls /home/ > users_home` Reading files `for user in $(cat home_users); do echo $user; cat /home/$user/.bash_history ; ...
<h1 align="center"> <br> <a href="https://nuclei.projectdiscovery.io"><img src="static/nuclei-logo.png" width="200px" alt="Nuclei"></a> </h1> <h4 align="center">Fast and customisable vulnerability scanner based on simple YAML based DSL.</h4> <p align="center"> <img src="https://img.shields.io/github/go-mod/go-ve...
sqlmap == sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from data...
## <span id="head1"> Penetration_Testing_POC</span> 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 - [ Penetration_Testing_POC](#head1) - [ 请善用搜索[`Ctrl+F`]查找](#head2) - [IOT Device&Mobile Phone](#head3) - [Web APP](#head4) - [ 提权辅助相关](#head5) - [ PC](#head6) - [ tools-小工具集合](#head7) - [ 文章/书籍/教程相关](#head8) - [ 说明](#head9)...
# Cheatsheet for finding vulnerable PHP code using grep This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabilities you generally find with that function. Some of this came from a source long forgotten. If you know the source of the o...
<p align="center"> <img src="assets/apt42_banner.png" alt="APT42 logo" /> </p> <h1 align="center"> Resources for 42 students </h1> <h3 align="center"> Share resources, assets and information :robot: </h3> In this repository, you will find various resources, tutorials, FAQs and so forth to improve your infosec s...
```ruby ███████╗ █████╗ ███████╗██╗ ██╗ ██████╗ ██╔════╝██╔══██╗██╔════╝╚██╗ ██╔╝██╔════╝ █████╗ ███████║███████╗ ╚████╔╝ ██║ ███╗ ██╔══╝ ██╔══██║╚════██║ ╚██╔╝ ██║ ██║ ███████╗██║ ██║███████║ ██║ ╚██████╔╝ ╚══════╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═════╝ Made with <3 by Riccardo Malatesta (@seeu) ``` [![License...
# command_mapper [![CI](https://github.com/postmodern/command_mapper.rb/actions/workflows/ruby.yml/badge.svg)](https://github.com/postmodern/command_mapper.rb/actions/workflows/ruby.yml) [![Code Climate](https://codeclimate.com/github/postmodern/command_mapper.rb.svg)](https://codeclimate.com/github/postmodern/command...
## Cyber-Security Roadmap The roadmap is broken into different steps. - STEP 1: Educational Qualification. - STEP 2: Technical and soft skill required. - STEP 3: Learning materials and practical skills experience. - STEP 4: Relevant Certification. - STEP 5: Job Application. - STEP 6: Recommended Books. - ST...
# Active Directory Kill Chain Attack & Defense <img width="650" src="https://camo.githubusercontent.com/9547d8152e3490a6e5e3da0279faab64340885be/68747470733a2f2f646f63732e6d6963726f736f66742e636f6d2f656e2d75732f616476616e6365642d7468726561742d616e616c79746963732f6d656469612f61747461636b2d6b696c6c2d636861696e2d736d616c...
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
<b>Table of Contents</b> - [Enumeration](#enumeration) * [Generic Enumeration](#genumeration) * [HTTP Enumeration](#httpenumeration) * [SSH Enumeration](#sshenumeration) * [SMB Enumeraion](#smbenumeration) * [SNMP Enumeration](#snmpenumeration) - [Explotation](#explotation) * [BOF Based Exploits](#bof) *...
# Private Docker Registry in Kubernetes Kubernetes offers an optional private Docker registry addon, which you can turn on when you bring up a cluster or install later. This gives you a place to store truly private Docker images for your cluster. ## How it works The private registry runs as a `Pod` in your cluster....
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
<p align='center'> <img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br> <a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.3"><img src="https://img.shields.io/badge/Version-1.1.3-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/Tuhinshubhra/CMSeeK/"...
# Hacking Cheatsheet List of commands and techniques to while conducting any kind of hacking :) # "The quieter you become, The more you’re able to hear" <img src="https://cdn.pixabay.com/photo/2013/07/13/11/43/tux-158547_960_720.png"/> # Apply the best nmap scanning strategy for all size networks # Host dis...
<p align="center"> <img width="300" height="300" src="https://github.com/0xsyr0/OSCP/blob/main/files/kali_logo.svg"> </p> # OSCP Cheat Sheet Commands, Payloads and Resources for the OffSec Certified Professional Certification (OSCP). Since this little project get's more and more attention, I decided to update it a...
<h1 align="center"> <img src="static/cloudlist-logo.png" alt="cloudlist" width="400px"></a> <br> </h1> <p align="center"> <a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a> <a href="https://github.com/projectdiscovery/cloudlist/issues"><img src="https:/...
--- title: 'WPScan' category: 'scanner' type: "CMS" state: "released" appVersion: "v3.8.22" usecase: "Wordpress Vulnerability Scanner" --- ![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png) <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier...
# Windows-Privilege-Escalation-Resources Compilation of Resources from TCM's Windows Priv Esc Udemy Course ### General Links Link to Website: https://www.thecybermentor.com/ Link to course: https://www.udemy.com/course/windows-privilege-escalation-for-beginners/ Link to discord server: https://discord.gg/RHZ7UF7 ...
# Bug Bounty Cheat Sheet</h1> | 📚 Reference | 🔎 Vulnerabilities | |-------------------------------------------------------------|-----------------------------------------------------------| | [Bug Bounty Platforms](cheatsheets/bu...
# Recon Style :heart_eyes: :smiling_imp: 1. Subdomain emulation and Screenshot 2. Masscan and nmap 3. Cms scan 4. Dirsearch and Wfuzz 5. GitHub 6. Webarchvie 7. Js files emulation #### 1. Subdomain emulation and Screenshot :sleepy: Tools Used- > [Aquatone](https://github.com/michenriksen/aquatone) - aquatone-dis...
# TensorFlow Android Camera Demo This folder contains an example application utilizing TensorFlow for Android devices. ## Description The demos in this folder are designed to give straightforward samples of using TensorFlow in mobile applications. Inference is done using the [TensorFlow Android Inference Interface]...
# Linux101-Resources Compilation of resources for TCM Security Linux 101 course ## General Links Cyber Mentor website: https://www.thecybermentor.com/ TCM Security Academy website: https://academy.tcm-sec.com/ The Cyber Mentor Discord channel: https://discord.gg/tcm All commands used in videos: https://github.co...
### IP `10.10.41.142` # Host Enumeration ### nmap `nmap -sC -sV 10.10.41.142 -oN init.nmap` ``` Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-26 23:04 EDT Nmap scan report for 10.10.41.142 Host is up (0.11s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubun...
# Swagger Code Generator [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https:/...
# Swagger Code Generator - Master: [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test...
# Burp Suite Certified Practitioner Exam Study >This is my study notes with over a 100 PortSwigger Academy labs that I used to pass the [Burp Suite Certified Practitioner](https://portswigger.net/web-security/certification) Exam and obtained my [BSCP qualification](https://portswigger.net/web-security/e/c/6e42f5738...
# GoBuster ## Official Documentation Reference: https://github.com/OJ/gobuster ## Description Gobuster is a tool used to brute-force: - URIs (directories and files) in web sites. - DNS subdomains (with wildcard support). - Virtual Host names on target web servers. - Open Amazon S3 buckets ## Usage ### dns Mode ```...
# Payloads All The Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I <3 pull requests :) You can also contribute with a beer IRL or with `buymeacoffee.com` [![Coffee](https://www.buymeacoffee.com/assets/img/custom_images/orange_img....
# Payloads All The Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I <3 pull requests :) You can also contribute with a beer IRL or with `buymeacoffee.com` [![Coffee](https://www.buymeacoffee.com/assets/img/custom_images/orange_img....
[1.1]: http://i.imgur.com/tXSoThF.png [1]: https://twitter.com/TobiunddasMoe # OpenBugBounty-Scrapper This script scrapes the list of open Bug Bounty Programs from openbugbounty.org ## Overview This script uses selenium to scrape all URLS and Domains from open Bug Bounty Programs from [openbugbounty.org](https://www....
## # https://medium.com/swlh/hacking-flask-applications-939eae4bffed # ## ## Web Framework Hardening - [Secure.py](https://github.com/cakinney/secure.py) - secure.py 🔒 is a lightweight package that adds optional security headers and cookie attributes for Python web frameworks. - [Flask-HTTPAuth](https://github.com...
[![Build Status](https://github.com/ytdl-org/youtube-dl/workflows/CI/badge.svg)](https://github.com/ytdl-org/youtube-dl/actions?query=workflow%3ACI) youtube-dl - download videos from youtube.com or other video platforms - [INSTALLATION](#installation) - [DESCRIPTION](#description) - [OPTIONS](#options) - [CONFIGURAT...
## OSCP Cheatsheet **Author:** Victor Fernandez III ### Table of Contents | [Enumeration](#enumeration) | [Gaining Access](#gaining-access) | [Maintaining Access](#maintaining-access) | | --------------------------------- | --------------------------- | ----------------------------------------- | | [FTP](#ftp) | [Defa...
# [Django REST framework][docs] [![build-status-image]][travis] [![coverage-status-image]][codecov] [![pypi-version]][pypi] **Awesome web-browsable Web APIs.** Full documentation for the project is available at [http://www.django-rest-framework.org][docs]. --- **Note**: We have now released Django REST framework 3...
# [Django REST framework][docs] [![build-status-image]][travis] [![pypi-version]][pypi] **Awesome web-browsable Web APIs.** Full documentation for the project is available at [http://www.django-rest-framework.org][docs]. --- **Note**: We have now released Django REST framework 3.0. For older codebases you may want...
# CAT-Reloaded-Cyber-Security-Cirlcle-Road-Map | 📚 Content | 🔎 Roadmaps | |-------------------------------------------------------------|-----------------------------------------------------------| | [CAT Reloaded Cyber S...
# Challenge Name: Arcade Game ![date](https://img.shields.io/badge/date-17.04.2022-brightgreen.svg) ![solved in time of CTF](https://img.shields.io/badge/solved-in%20time%20of%20CTF-brightgreen.svg) ![category](https://img.shields.io/badge/category-WEB-blueviolet.svg) ![value](https://img.shields.io/badge/val...
# SQLMap - Cheetsheat <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong...
# Pentest Tools ![](logo.png) The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ ## TODO * [x] Directory * [ ] Browser bookmarks * [ ] Tools Usage * [...
# TableOfContents | File | Contents | | ---- | -------- | | [Active Directory](https://github.com/cyberwr3nch/hackthebox/blob/master/notes/Active%20Directory.md) | Bruteforce SMB, Winrm Bruteforce, AD User Enumeration, Mounting Disks, BloodHound, rpcclinet | | [Commands](https://github.com/cyberwr3nch/hackthebox/...
<!-- MANPAGE: BEGIN EXCLUDED SECTION --> <div align="center"> [![YT-DLP](https://raw.githubusercontent.com/yt-dlp/yt-dlp/master/.github/banner.svg)](#readme) [![Release version](https://img.shields.io/github/v/release/yt-dlp/yt-dlp?color=brightgreen&label=Download&style=for-the-badge)](#installation "Installation") [...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
[![N|Solid](https://insec.in/wp-content/uploads/2020/07/hackthebox.png)](https://nodesource.com/products/nsolid) # HackTheBox Writeups : --- + Writeups built by me which can give you the initial idea of how i successfully owned both user and root of some boxes that i tried to exploit. I do try to put the instructio...
# OSCP Survival Guide by Joas ## Survival Guide ### https://github.com/wwong99/pentest-notes/blob/master/oscp_resources/OSCP-Survival-Guide.md ### https://github.com/RustyShackleford221/OSCP-Prep ### https://github.com/strongcourage/oscp ### https://github.com/six2dez/OSCP-Human-Guide ### https://sushant747.gitbo...
# CrossFitTwo - HackTheBox - Writeup OpenBSD, 50 Base Points, Insane ## Machine ![‏‏CrossFitTwo.JPG](images/CrossFitTwo.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```80```, ```22``` and ```8953``` (Unbound DNS Server). ***<ins>User 1<ins>***: By enum...
# File Inclusion > The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application. > The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ...
<h1 align="center"> <br> <a href=""><img src="https://user-images.githubusercontent.com/13212227/104400969-9f3d9280-5596-11eb-80f4-864effae95fc.png" alt="" width="500px;"></a> <br> <img src="https://img.shields.io/github/last-commit/hahwul/WebHackersWeapons?style=flat"> <img src="https://img.shields.io/badge/PRs-welc...
# Wombo ## Table of Contents * [Summary](#summary) * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [SSH](#ssh) * [HTTP](#http) * [Redis](#redis) * [MongoDB](#mongodb) * [OS](#os) * [Nmap OS Discovery Scan](#nmap-os-discovery-scan) * [Exploit](#exploit) * [Password Gues...
# GitTools This repository contains three small python/bash scripts used for the Git research. [Read about it here](http://en.internetwache.org/dont-publicly-expose-git-or-how-we-downloaded-your-websites-sourcecode-an-analysis-of-alexas-1m-28-07-2015/) ## Finder You can use this tool to find websites with their .git...
<h1 align="center"> <img src="https://user-images.githubusercontent.com/8293321/196779266-421c79d4-643a-4f73-9b54-3da379bbac09.png" alt="katana" width="200px"> <br> </h1> <h4 align="center">A next-generation crawling and spidering framework</h4> <p align="center"> <a href="https://goreportcard.com/report/github.c...
# Try Hack Me Writeup - ColddBox: Easy - TryHackMe room: <https://tryhackme.com/room/colddboxeasy> - OS: `Linux (Ubuntu)` An easy level machine with multiple ways to escalate privileges. ![alt text](files/writeup-image.png "Writeup Image") **WARNING: I stripped out the answers, passwords, flags and co. This writeup...
# GPT_Vuln-analyzer This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python modules and also use customtkinter and ...
# Node.js Node.js is an open-source, cross-platform JavaScript runtime environment. For information on using Node.js, see the [Node.js website][]. The Node.js project uses an [open governance model](./GOVERNANCE.md). The [OpenJS Foundation][] provides support for the project. Contributors are expected to act in a c...
<h1 align="center">mkpath <a href="https://twitter.com/intent/tweet?text=mkpath%20-%20Make%20URL%20path%20combinations%20using%20a%20wordlist%20%40trick3st%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fmkpath&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitter&style=...
Pentest CheatSheet & Learning === Directory === - [Steps](#Steps) - [Tools](#Tools) - [Common Attack Steps](#Common-Attack-Steps) - [Others](#Others) Helpful Resource === - [Ctf CheatSheet](https://github.com/w181496/Web-CTF-Cheatsheet) - [Cyber Chef](https://gchq.github.io/CyberChef/) - [hash db online - md5hashing]...
# Pre-engagement educating the client and adjusting the contract. All necessary tests and their components are strictly defined and contractually recorded. In a face-to-face meeting or conference call, many arrangements are made, such as: 1. Non-Disclosure Agreement 2. Goals 3. Scope 4. Time Estimation 5. Rul...
# Android-Reports-and-Resources ### HackerOne Reports -------- ### Hardcoded credentials #### Disclosure of all uploads via hardcoded api secret [https://hackerone.com/reports/351555](https://hackerone.com/reports/351555) -------- ### WebView #### Android security checklist: WebView [https://blog.oversecured.co...
# Microsoft Authentication Extensions for Node ![npm (scoped)](https://img.shields.io/npm/v/@azure/msal-node-extensions) ![npm](https://img.shields.io/npm/dw/@azure/msal-node-extensions) | <a href="https://docs.microsoft.com/azure/active-directory/develop/tutorial-v2-react" target="blank">Getting Started</a> | <a hre...
# 笔记 根据 hack the box 的政策,只会更新出已经退休机器的walkthrough。 之前做过的机器需要慢慢整理笔记,由于年代久远和时间比较少的原因,可能更新会较慢。
# nList An Nmap script to produce target lists for use with various tools. ## Installation For the script to be run by default as part of all script scans (`-sC`), it will need to be saved in the `scripts` subdirectory of the Nmap data directory along with an `nlist.conf` file. A `.nlist` file placed in the user's ho...
<p align='center'> <img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br> <a href="https://github.com/trhacknon/CMSeeK/releases/tag/v.1.1.3"><img src="https://img.shields.io/badge/Version-1.1.3-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/trhacknon/CMSeeK/"><img ...
<h1 align="left"> <img src="static/nuclei-logo.png" alt="nuclei" width="200px"></a> <br> </h1> [![License](https://img.shields.io/badge/license-MIT-_red.svg)](https://opensource.org/licenses/MIT) [![Go Report Card](https://goreportcard.com/badge/github.com/projectdiscovery/nuclei)](https://goreportcard.com/report/...
[![Build Status](https://travis-ci.org/sqshq/PiggyMetrics.svg?branch=master)](https://travis-ci.org/sqshq/PiggyMetrics) [![codecov.io](https://codecov.io/github/sqshq/PiggyMetrics/coverage.svg?branch=master)](https://codecov.io/github/sqshq/PiggyMetrics?branch=master) [![GitHub license](https://img.shields.io/github/li...
# ScriptKiddie URL: https://app.hackthebox.com/machines/ScriptKiddie Level: Easy Date 27 May 2021 ## Walkthrough - [Enumeration](#enumeration) - [User flag](#user-flag) - [Privesc](#privesc) # Enumeration ## NMAP ``` # Nmap 7.91 scan initiated Tue May 25 23:12:28 2021 as: nmap -T4 -p- -oN 01_nmap.txt 10.10.10.2...
## 🎉 26th January 2023 - Happy Republic Day and ## 🎉 Happy 4th anniversary to the ResetHacker community! 🎉 <div align=""><br> <a href="mailto:resethackerofficail@gmail.com?subject=ResetHacker Community" target="_blank"><img src="https://img.shields.io/badge/Gmail-D14836?logo=gmail"></a> <a href="https://github.com...
# usr0 Security Club Resources This repo stands as a list of resources and materials needed to succeed in CTFs and basic pen testing environments. All materials used during usr0 meetings will be posted and documented here. Resources To Learn From --------------------- #### Websites - [OverTheWire](http://overthewire....
[![Sn1perSecurity](https://sn1persecurity.com/images/Sn1perSecurity-Attack-Surface-Management-header2.png)](https://sn1persecurity.com) [![GitHub release](https://img.shields.io/github/release/1N3/Sn1per.svg)](https://github.com/1N3/Sn1per/releases) [![GitHub issues](https://img.shields.io/github/issues/1N3/Sn1per.svg...
`Note: These are my notes for personal reference!` # 𝐎𝐒𝐂𝐏 𝐏𝐫𝐞-𝐏𝐫𝐞𝐩𝐚𝐫𝐚𝐭𝐢𝐨𝐧 𝐏𝐥𝐚𝐧 𝐚𝐧𝐝 𝐍𝐨𝐭𝐞𝐬 > - `21st March 2022` : Start Date > - `19th Sept 2022` : Expected End Date > - `180 days` : Goal --- <img src="https://user-images.githubusercontent.com/68887544/159728391-b9c52bda-b711-4c63-aa...
# Android Applications Pentesting <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/sched...