text stringlengths 9 334k |
|---|
### wp-scan
* `wpscan --url http://$IP/ --enumerate` <- Enum mode won't find any plugins by default.
* `-e ap,t,tt,u` to enumerate all plugins, popular themes, timthumbs, and users
* `wpscan --url http://$IP/ --api-token <SNIP>`
```bash
[i] Plugin(s) Identified:
[+] site-editor
| Location: http://192.168.200.166/wp... |
Android Open Source Projects [https://codekk.com](https://p.codekk.com/) for more
====================
Welcome to recommend good android open source projects, you can [Commit](https://github.com/Trinea/android-open-project/wiki/Standard-of-adding-and-editing-content "Standard of adding and editing content") directly o... |
<p align="center">
<img src="img/kb_logo.png?raw=true" width="200"/>
</p>
# kb. A minimalist knowledge base manager
[](https://travis-ci.com/gnebbia/kb)
Author: gnc <nebbionegiuseppe@gmail.com>
Copyright: © 2020, gnc
Date: 2022-09-21
Version... |
# Swagger Code Generator
- Master (2.3.0): [](https://travis-ci.org/swagger-api/swagger-codegen)
[ - version 2

## Description
GOAD is a pentest active directory LAB project.
The purpose of this lab is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack techniques.
## Warning
This lab is extremely vuln... |
This is a curated list of resources for those who want to get started with ethical hacking.
# The Internet
### IP Addresses
* https://www.cloudflare.com/learning/dns/glossary/what-is-my-ip-address/
* https://www.codedbrain.com/2019/12/one-hell-of-an-ip-addresspart-1-non-technical-perspective/
* https://www.iplocation.... |
# Guide-CEH-Practical-Master
### **Exame Details**
- Exam Title: Certified Ethical Hacker (Practical)
- Number of Practical Challenges: 20
- Duration: 6 hours
- Availability: Aspen – iLabs
- Test Format: iLabs Cyber Range
- Passing Score: 70% (14 Questions)
--------------------------------------------
**Exam Tips... |
# Docker-OSX · [Follow @sickcodes on Twitter](https://twitter.com/sickcodes)

Run Mac OS X in Docker with near-native performance! X11 Forwarding! iMessage security research! iPhone USB working! macOS in a Docker c... |
# Awesome WebSockets Security
[](https://github.com/sindresorhus/awesome)
A collection of CVEs, research, and reference materials related to WebSocket security
------
## Contents
- [WebSocket Library Vul... |
<p align="center">
<a href="https://wpscan.com/">
<img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo">
</a>
</p>
<h3 align="center">WPScan</h3>
<p align="center">
WordPress Security Scanner
<br>
<br>
<a href="https://wpscan.com/" title="home... |
# HackTheBox
Writeups for rooms and challenges on [HackTheBox](https://app.hackthebox.com/home), in the order of completion:
1. [Dancing - Very Easy](Dancing.md)
2. [Redeemer - Very Easy](Redeemer.md)
3. [Appointment - Very Easy](Appointment.md)
4. [Sequel - Very Easy](Sequel.md)
5. [Crocodile - Very Easy](... |
# HTTP/HTTPS Enumeration
## Directory Brute Force
A number of tools can be used to brute force directories on a web server in order to find hidden files and folders that are not publically available.
### Gobuster
Gobuster can be used to bruteforce a web server in order to discover directories and files:
`gobuster ... |
# 所有收集类项目:
- [收集的所有开源工具](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式
- [逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Boot... |
# Access
URL: https://app.hackthebox.com/machines/Access
Level: Easy
Date 7 May 2021
## Walkthrough
- [Enumeration](#enumeration)
- [User flag](#user-flag)
- [Privesc](#privesc)
# Enumeration
## NMAP
Let's start with a basic nmap scan:
```
# Nmap 7.91 scan initiated Fri May 7 23:48:44 2021 as: nmap -T4 -p- -o... |
# Wpscan with Tor proxy
Easily run Wpscan with Tor proxy in docker. This project uses the default wpscan docker image and a lightweight alpine image for Tor proxy.
Use this tool **only** for WordPress websites you own, to assess the security of them and plan accordingly.
## Usage
For convience use the simple bash s... |
# OSCP-PWK-Notes
## Exam Proofs
Linux:
```bash
hostname
cat /path/to/flag/proof.txt
ifconfig
```
Windows:
```bash
hostname
type C:\path\to\flag\proof.txt
ipconfig
```
## Useful services
### SSHd
```bash
sudo systemctl start ssh
sudo systemctl stop ssh
```
Add this line to `/etc/s... |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https:/... |
## <span id="head1"> Penetration_Testing_POC</span>
搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。
- [ Penetration_Testing_POC](#head1)
- [ 请善用搜索[`Ctrl+F`]查找](#head2)
- [IOT Device&Mobile Phone](#head3)
- [Web APP](#head4)
- [ 提权辅助相关](#head5)
- [ PC](#head6)
- [ tools-小工具集合](#head7)
- [ 文章/书籍/教程相关](#head8)
- [ 说明](#head9)... |
# Poster
The sys admin set up a rdbms in a safe way.
[Poster](https://tryhackme.com/room/poster)
* Network Enumeration
* Metasploit (postgres_login)
* Metasploit (postgres_sql)
* Metasploit (postgres_hashdump)
* Metasploit (postgres_readfile)
* Metasploit (postgres_copy_from_program_cmd_exec)
* Stored Passwords & Ke... |
# Paper Writeup
## Enumeration
### Nmap
First, let's scan for open ports using `nmap`. We can quickly scan for open ports and store them in a variable: `ports=$(nmap -p- --min-rate=1000 -T4 10.10.11.143 | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//)`. Then, we can scan those specific ports in depth by r... |
# Crimson v3
> Crimson is a tool that automates `ASSET DISCOVERY` and `VULNERABILITY SCANNING`.
> The container is built on top of the Kali distro.
<p align="center">
<img src="crimson_logo.png" />
</p>
#### It consists of fourth partially interdependent modules:
* `crimson_IPcon` - tests the single IP or ran... |
### IP
`192.168.211.217`
# Reconnaissance
### nmap
`nmap -sC -sV 192.168.211.217`
```
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 951d828f5ede9a00a80739bdacadd344 (RSA)
| 256 d7b452a2c8fab70ed1a8d070cd6b3690 (ECDSA)
|_ 256 dff24f773344d593d77917455aa... |
## node-webkit is renamed NW.js
[](https://gitter.im/nwjs/nw.js?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
Official site: https://nwjs.io
## Introduction
NW.js is an app runtime based on `Chromium` and `node.js`. You can
write nat... |
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) (Devboard/WROOM)!
Looking for a Linux/Mac version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFlash) (WIP for Windows too including full automated downloads.)
Or do you want t... |

[](https://github.com/thehackingsage?tab=repositories)
[](https://thehackingsag... |
## Arthas

[](https://github.com/alibaba/arthas/actions)
[](https://codecov.io/gh/alibaba/arthas)
[
# macro\_pack
## Short description
MacroPack Community is a tool used to automatize obfuscation and generation of retro formats such as MS Office documents or VBS like format.
It also handles various shortcuts formats.
This tool can... |
# Post-Exploitation on Linux
## Data Haversting and Enumaration
### Common users
`awk -F: '{ if($3 >= 1000) print $1}' passwd >> users`
### Reading bash_history files
Mapping users directories
`ls /home/ > users_home`
Reading files
`for user in $(cat home_users); do echo $user; cat /home/$user/.bash_history ; ... |
<h1 align="center">
<br>
<a href="https://nuclei.projectdiscovery.io"><img src="static/nuclei-logo.png" width="200px" alt="Nuclei"></a>
</h1>
<h4 align="center">Fast and customisable vulnerability scanner based on simple YAML based DSL.</h4>
<p align="center">
<img src="https://img.shields.io/github/go-mod/go-ve... |
sqlmap
==
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from data... |
## <span id="head1"> Penetration_Testing_POC</span>
搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。
- [ Penetration_Testing_POC](#head1)
- [ 请善用搜索[`Ctrl+F`]查找](#head2)
- [IOT Device&Mobile Phone](#head3)
- [Web APP](#head4)
- [ 提权辅助相关](#head5)
- [ PC](#head6)
- [ tools-小工具集合](#head7)
- [ 文章/书籍/教程相关](#head8)
- [ 说明](#head9)... |
# Cheatsheet for finding vulnerable PHP code using grep
This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabilities you generally find with that function.
Some of this came from a source long forgotten. If you know the source of the o... |
<p align="center">
<img src="assets/apt42_banner.png" alt="APT42 logo" />
</p>
<h1 align="center">
Resources for 42 students
</h1>
<h3 align="center">
Share resources, assets and information :robot:
</h3>
In this repository, you will find various resources, tutorials, FAQs and so forth to improve your infosec s... |
```ruby
███████╗ █████╗ ███████╗██╗ ██╗ ██████╗
██╔════╝██╔══██╗██╔════╝╚██╗ ██╔╝██╔════╝
█████╗ ███████║███████╗ ╚████╔╝ ██║ ███╗
██╔══╝ ██╔══██║╚════██║ ╚██╔╝ ██║ ██║
███████╗██║ ██║███████║ ██║ ╚██████╔╝
╚══════╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═════╝
Made with <3 by Riccardo Malatesta (@seeu)
```
[](https://github.com/postmodern/command_mapper.rb/actions/workflows/ruby.yml)
[](https://codeclimate.com/github/postmodern/command... |
## Cyber-Security Roadmap
The roadmap is broken into different steps.
- STEP 1: Educational Qualification.
- STEP 2: Technical and soft skill required.
- STEP 3: Learning materials and practical skills experience.
- STEP 4: Relevant Certification.
- STEP 5: Job Application.
- STEP 6: Recommended Books.
- ST... |
# Active Directory Kill Chain Attack & Defense
<img width="650" src="https://camo.githubusercontent.com/9547d8152e3490a6e5e3da0279faab64340885be/68747470733a2f2f646f63732e6d6963726f736f66742e636f6d2f656e2d75732f616476616e6365642d7468726561742d616e616c79746963732f6d656469612f61747461636b2d6b696c6c2d636861696e2d736d616c... |
# Swagger Code Generator
- Master (2.3.0): [](https://travis-ci.org/swagger-api/swagger-codegen)
[
* [Generic Enumeration](#genumeration)
* [HTTP Enumeration](#httpenumeration)
* [SSH Enumeration](#sshenumeration)
* [SMB Enumeraion](#smbenumeration)
* [SNMP Enumeration](#snmpenumeration)
- [Explotation](#explotation)
* [BOF Based Exploits](#bof)
*... |
# Private Docker Registry in Kubernetes
Kubernetes offers an optional private Docker registry addon, which you can turn
on when you bring up a cluster or install later. This gives you a place to
store truly private Docker images for your cluster.
## How it works
The private registry runs as a `Pod` in your cluster.... |
# Swagger Code Generator
- Master (2.3.0): [](https://travis-ci.org/swagger-api/swagger-codegen)
[
# "The quieter you become, The more you’re able to hear"
<img src="https://cdn.pixabay.com/photo/2013/07/13/11/43/tux-158547_960_720.png"/>
# Apply the best nmap scanning strategy for all size networks
# Host dis... |
<p align="center">
<img width="300" height="300" src="https://github.com/0xsyr0/OSCP/blob/main/files/kali_logo.svg">
</p>
# OSCP Cheat Sheet
Commands, Payloads and Resources for the OffSec Certified Professional Certification (OSCP).
Since this little project get's more and more attention, I decided to update it a... |
<h1 align="center">
<img src="static/cloudlist-logo.png" alt="cloudlist" width="400px"></a>
<br>
</h1>
<p align="center">
<a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a>
<a href="https://github.com/projectdiscovery/cloudlist/issues"><img src="https:/... |
---
title: 'WPScan'
category: 'scanner'
type: "CMS"
state: "released"
appVersion: "v3.8.22"
usecase: "Wordpress Vulnerability Scanner"
---

<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier... |
# Windows-Privilege-Escalation-Resources
Compilation of Resources from TCM's Windows Priv Esc Udemy Course
### General Links
Link to Website: https://www.thecybermentor.com/
Link to course: https://www.udemy.com/course/windows-privilege-escalation-for-beginners/
Link to discord server: https://discord.gg/RHZ7UF7
... |
# Bug Bounty Cheat Sheet</h1>
| 📚 Reference | 🔎 Vulnerabilities |
|-------------------------------------------------------------|-----------------------------------------------------------|
| [Bug Bounty Platforms](cheatsheets/bu... |
# Recon Style :heart_eyes: :smiling_imp:
1. Subdomain emulation and Screenshot
2. Masscan and nmap
3. Cms scan
4. Dirsearch and Wfuzz
5. GitHub
6. Webarchvie
7. Js files emulation
#### 1. Subdomain emulation and Screenshot :sleepy:
Tools Used-
> [Aquatone](https://github.com/michenriksen/aquatone)
- aquatone-dis... |
# TensorFlow Android Camera Demo
This folder contains an example application utilizing TensorFlow for Android
devices.
## Description
The demos in this folder are designed to give straightforward samples of using
TensorFlow in mobile applications.
Inference is done using the [TensorFlow Android Inference Interface]... |
# Linux101-Resources
Compilation of resources for TCM Security Linux 101 course
## General Links
Cyber Mentor website: https://www.thecybermentor.com/
TCM Security Academy website: https://academy.tcm-sec.com/
The Cyber Mentor Discord channel: https://discord.gg/tcm
All commands used in videos: https://github.co... |
### IP
`10.10.41.142`
# Host Enumeration
### nmap
`nmap -sC -sV 10.10.41.142 -oN init.nmap`
```
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-26 23:04 EDT
Nmap scan report for 10.10.41.142
Host is up (0.11s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubun... |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https:/... |
# Swagger Code Generator
- Master: [](https://travis-ci.org/swagger-api/swagger-codegen)
[ Exam and obtained my [BSCP qualification](https://portswigger.net/web-security/e/c/6e42f5738... |
# GoBuster
## Official Documentation
Reference: https://github.com/OJ/gobuster
## Description
Gobuster is a tool used to brute-force:
- URIs (directories and files) in web sites.
- DNS subdomains (with wildcard support).
- Virtual Host names on target web servers.
- Open Amazon S3 buckets
## Usage
### dns Mode
```... |
# Payloads All The Things
A list of useful payloads and bypasses for Web Application Security.
Feel free to improve with your payloads and techniques !
I <3 pull requests :)
You can also contribute with a beer IRL or with `buymeacoffee.com`
[
You can also contribute with a beer IRL or with `buymeacoffee.com`
[ - secure.py 🔒 is a lightweight package that adds optional security headers and cookie attributes for Python web frameworks.
- [Flask-HTTPAuth](https://github.com... |
[](https://github.com/ytdl-org/youtube-dl/actions?query=workflow%3ACI)
youtube-dl - download videos from youtube.com or other video platforms
- [INSTALLATION](#installation)
- [DESCRIPTION](#description)
- [OPTIONS](#options)
- [CONFIGURAT... |
## OSCP Cheatsheet
**Author:** Victor Fernandez III
### Table of Contents
| [Enumeration](#enumeration) | [Gaining Access](#gaining-access) | [Maintaining Access](#maintaining-access) |
| --------------------------------- | --------------------------- | ----------------------------------------- |
| [FTP](#ftp) | [Defa... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![coverage-status-image]][codecov]
[![pypi-version]][pypi]
**Awesome web-browsable Web APIs.**
Full documentation for the project is available at [http://www.django-rest-framework.org][docs].
---
**Note**: We have now released Django REST framework 3... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![pypi-version]][pypi]
**Awesome web-browsable Web APIs.**
Full documentation for the project is available at [http://www.django-rest-framework.org][docs].
---
**Note**: We have now released Django REST framework 3.0. For older codebases you may want... |
# CAT-Reloaded-Cyber-Security-Cirlcle-Road-Map
| 📚 Content | 🔎 Roadmaps |
|-------------------------------------------------------------|-----------------------------------------------------------|
| [CAT Reloaded Cyber S... |
# Challenge Name: Arcade Game




The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ
## TODO
* [x] Directory
* [ ] Browser bookmarks
* [ ] Tools Usage
* [... |
# TableOfContents
| File | Contents |
| ---- | -------- |
| [Active Directory](https://github.com/cyberwr3nch/hackthebox/blob/master/notes/Active%20Directory.md) | Bruteforce SMB, Winrm Bruteforce, AD User Enumeration, Mounting Disks, BloodHound, rpcclinet |
| [Commands](https://github.com/cyberwr3nch/hackthebox/... |
<!-- MANPAGE: BEGIN EXCLUDED SECTION -->
<div align="center">
[](#readme)
[](#installation "Installation")
[... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
[](https://nodesource.com/products/nsolid)
# HackTheBox Writeups :
---
+ Writeups built by me which can give you the initial idea of how i successfully owned both user and root of some boxes that i tried to exploit. I do try to put the instructio... |
# OSCP Survival Guide by Joas
## Survival Guide
### https://github.com/wwong99/pentest-notes/blob/master/oscp_resources/OSCP-Survival-Guide.md
### https://github.com/RustyShackleford221/OSCP-Prep
### https://github.com/strongcourage/oscp
### https://github.com/six2dez/OSCP-Human-Guide
### https://sushant747.gitbo... |
# CrossFitTwo - HackTheBox - Writeup
OpenBSD, 50 Base Points, Insane
## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```80```, ```22``` and ```8953``` (Unbound DNS Server).
***<ins>User 1<ins>***: By enum... |
# File Inclusion
> The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application.
> The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ... |
<h1 align="center">
<br>
<a href=""><img src="https://user-images.githubusercontent.com/13212227/104400969-9f3d9280-5596-11eb-80f4-864effae95fc.png" alt="" width="500px;"></a>
<br>
<img src="https://img.shields.io/github/last-commit/hahwul/WebHackersWeapons?style=flat">
<img src="https://img.shields.io/badge/PRs-welc... |
# Wombo
## Table of Contents
* [Summary](#summary)
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [SSH](#ssh)
* [HTTP](#http)
* [Redis](#redis)
* [MongoDB](#mongodb)
* [OS](#os)
* [Nmap OS Discovery Scan](#nmap-os-discovery-scan)
* [Exploit](#exploit)
* [Password Gues... |
# GitTools
This repository contains three small python/bash scripts used for the Git research. [Read about it here](http://en.internetwache.org/dont-publicly-expose-git-or-how-we-downloaded-your-websites-sourcecode-an-analysis-of-alexas-1m-28-07-2015/)
## Finder
You can use this tool to find websites with their .git... |
<h1 align="center">
<img src="https://user-images.githubusercontent.com/8293321/196779266-421c79d4-643a-4f73-9b54-3da379bbac09.png" alt="katana" width="200px">
<br>
</h1>
<h4 align="center">A next-generation crawling and spidering framework</h4>
<p align="center">
<a href="https://goreportcard.com/report/github.c... |
# Try Hack Me Writeup - ColddBox: Easy
- TryHackMe room: <https://tryhackme.com/room/colddboxeasy>
- OS: `Linux (Ubuntu)`
An easy level machine with multiple ways to escalate privileges.

**WARNING: I stripped out the answers, passwords, flags and co. This writeup... |
# GPT_Vuln-analyzer
This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python modules and also use customtkinter and ... |
# Node.js
Node.js is an open-source, cross-platform JavaScript runtime environment.
For information on using Node.js, see the [Node.js website][].
The Node.js project uses an [open governance model](./GOVERNANCE.md). The
[OpenJS Foundation][] provides support for the project.
Contributors are expected to act in a c... |
<h1 align="center">mkpath <a href="https://twitter.com/intent/tweet?text=mkpath%20-%20Make%20URL%20path%20combinations%20using%20a%20wordlist%20%40trick3st%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fmkpath&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitter&style=... |
Pentest CheatSheet & Learning
===
Directory
===
- [Steps](#Steps)
- [Tools](#Tools)
- [Common Attack Steps](#Common-Attack-Steps)
- [Others](#Others)
Helpful Resource
===
- [Ctf CheatSheet](https://github.com/w181496/Web-CTF-Cheatsheet)
- [Cyber Chef](https://gchq.github.io/CyberChef/)
- [hash db online - md5hashing]... |
# Pre-engagement
educating the client and adjusting the contract. All necessary tests and their components are strictly defined and contractually recorded. In a face-to-face meeting or conference call, many arrangements are made, such as:
1. Non-Disclosure Agreement
2. Goals
3. Scope
4. Time Estimation
5. Rul... |
# Android-Reports-and-Resources
### HackerOne Reports
--------
### Hardcoded credentials
#### Disclosure of all uploads via hardcoded api secret
[https://hackerone.com/reports/351555](https://hackerone.com/reports/351555)
--------
### WebView
#### Android security checklist: WebView
[https://blog.oversecured.co... |
# Microsoft Authentication Extensions for Node


| <a href="https://docs.microsoft.com/azure/active-directory/develop/tutorial-v2-react" target="blank">Getting Started</a> | <a hre... |
# 笔记
根据 hack the box 的政策,只会更新出已经退休机器的walkthrough。
之前做过的机器需要慢慢整理笔记,由于年代久远和时间比较少的原因,可能更新会较慢。
|
# nList
An Nmap script to produce target lists for use with various tools.
## Installation
For the script to be run by default as part of all script scans (`-sC`), it will need to be saved in the `scripts` subdirectory of the Nmap data directory along with an `nlist.conf` file.
A `.nlist` file placed in the user's ho... |
<p align='center'>
<img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br>
<a href="https://github.com/trhacknon/CMSeeK/releases/tag/v.1.1.3"><img src="https://img.shields.io/badge/Version-1.1.3-brightgreen.svg?style=style=flat-square" alt="version"></a>
<a href="https://github.com/trhacknon/CMSeeK/"><img ... |
<h1 align="left">
<img src="static/nuclei-logo.png" alt="nuclei" width="200px"></a>
<br>
</h1>
[](https://opensource.org/licenses/MIT)
[](https://goreportcard.com/report/... |
[](https://travis-ci.org/sqshq/PiggyMetrics)
[](https://codecov.io/github/sqshq/PiggyMetrics?branch=master)
[
- [User flag](#user-flag)
- [Privesc](#privesc)
# Enumeration
## NMAP
```
# Nmap 7.91 scan initiated Tue May 25 23:12:28 2021 as: nmap -T4 -p- -oN 01_nmap.txt 10.10.10.2... |
## 🎉 26th January 2023 - Happy Republic Day and
## 🎉 Happy 4th anniversary to the ResetHacker community! 🎉
<div align=""><br>
<a href="mailto:resethackerofficail@gmail.com?subject=ResetHacker Community" target="_blank"><img src="https://img.shields.io/badge/Gmail-D14836?logo=gmail"></a>
<a href="https://github.com... |
# usr0 Security Club Resources
This repo stands as a list of resources and materials needed to succeed in CTFs and basic pen testing environments. All materials used during usr0 meetings will be posted and documented here.
Resources To Learn From
---------------------
#### Websites
- [OverTheWire](http://overthewire.... |
[](https://sn1persecurity.com)
[](https://github.com/1N3/Sn1per/releases)
[![GitHub issues](https://img.shields.io/github/issues/1N3/Sn1per.svg... |
`Note: These are my notes for personal reference!`
# 𝐎𝐒𝐂𝐏 𝐏𝐫𝐞-𝐏𝐫𝐞𝐩𝐚𝐫𝐚𝐭𝐢𝐨𝐧 𝐏𝐥𝐚𝐧 𝐚𝐧𝐝 𝐍𝐨𝐭𝐞𝐬
> - `21st March 2022` : Start Date
> - `19th Sept 2022` : Expected End Date
> - `180 days` : Goal
---
<img src="https://user-images.githubusercontent.com/68887544/159728391-b9c52bda-b711-4c63-aa... |
# Android Applications Pentesting
<details>
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/sched... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.