text stringlengths 9 334k |
|---|
# 📖 ReadMe
[](https://creativecommons.org/licenses/by-sa/4.0/)
<a name="contents"></a>
## 🔖 Contents
- ☀️ [Methodology](#methodology)
* ⚙️ [Phase 0: Recon](#mrecon)
* ⚙️ [Phase 1: Enumerate](#menum... |
## What is One_liner Project ?
The main goal is to share tips from some well-known bug hunters. Using recon methodology, we can find subdomains, APIs, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters.
... |
Pull requests welcome.
# Preparing your environment
Clone the following repositories:
* https://github.com/superkojiman/onetwopunch - Wrapper around nmap/unicorn scanner
* https://github.com/AutoRecon/AutoRecon - Another recon script
* https://github.com/codingo/Reconnoitre - Recon script with suggested follow-up co... |
# Jurassic Park
- What is the SQL database called which is serving the shop information?
- `scilla port -target <TARGET_IP>`
- Visit `http://<TARGET_IP>`
- Interesting content here: `http://<TARGET_IP>/item.php?id=5`
- `scilla dir -target <TARGET_IP>`
- `/assets` accessible, but nothing interesting.
- `http://<... |
# Bug Bounty Reference
A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty
# Introduction
I have been reading for Bug Bounty write-ups for a few months, I found it extremely useful to read relevant write-up when I found a certain type... |
# Recon cheatsheet for pentesting and bugbounty
## 1) Subdomain enumeration:
### 1.1 )Sublist3r
```
python sublist3r.py -d yahoo.com
```
### 1.3) subbrute:
```
python subbrute.py google.com
```
### 1.4) subfinder:
```
./subfinder -d target.com
./subfinder -d target.com -b -w all.txt
```
### 1.5) Amass:
```
amass -d... |
### IP
`10.10.10.15`
# Recon
### nmap
`nmap -sC -sV 10.10.10.15 -o Grannynmap`
```
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-19 11:27 EST
Nmap scan report for 10.10.10.15
Host is up (0.11s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 6.0
| http... |
# hackthebox-writeups
Writeups for HacktheBox machines (boot2root) and challenges written in Spanish or English.
https://www.hackthebox.eu/
## Important notes about password protection
Machines writeups until 2020 March are protected with the corresponding root flag. But since this date, HTB flags are dynamic and... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![coverage-status-image]][codecov]
[![pypi-version]][pypi]
[](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge)
**Awesome... |
# Relevant
Penetration Testing Challenge
[Relevant](https://tryhackme.com/room/relevant)
## Topic's
- Network Enumeration
- SMB Enumeration
- Cryptography
- Base64
- Security Misconfiguration
- msfvenom (Aspx)
- Abusing Impersonation Privileges (PrintSpoofer)
## Appendix archive
Password: `1 kn0w 1 5h0uldn'7!`
... |
# AWAE-Prep
AWAE course preparation to OSWE certification with hackthebox machines
# NetSecFocus prep list
https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=665299979
# Upgraded script for 'Fighter HTB'
[Here](https://gitlab.com/s0j0hn/awae-prep/snippets/1967151)
# WIP: M... |
# VAULT 101
---
> Android Reverse Engineering
> 500 points
> 15 solves
---
Short Writeup : [Medium](https://medium.com/bugbountywriteup/vault-101-samsung-ctf-android-reverse-engineering-challenge-write-up-d5a2b16a9212)
Detailed Writeup : [Personal Blog](https://saket-upadhyay.github.io/2020/08/18/sstf-vault-wtir... |
# SecurityTips
This repo contains full collection of HackerScrolls tips.
Socials: <a href="https://twitter.com/hackerscrolls" target="_blank">
<img src="https://raw.githubusercontent.com/hackerscrolls/SecurityTips/master/.images/twitter.png" align="center" width="25" />
</a>
<a href="https://t.me/hackerscrolls" targ... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https:/... |
### IP
`10.10.11.180`
# Recon
### nmap
`nmap -sC -sV 10.10.11.180 -oN init.nmap`
```
Starting Nmap 7.80 ( https://nmap.org ) at 2022-12-02 01:59 EST
Nmap scan report for 10.10.11.180
Host is up (0.12s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11... |
# bugbounty_checklist
<img src="./doc_images/BClist.png" alt="logo" width="340" height="270"/><br>
This tool may help you to have a good methodology for bug bounty hunting
this tool based on [Bug Bounty Checklist for Web App](https://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md#Single_domain) <br>
Th... |
#NOTICE
<table width="100%" align="center" class="table_border_both">
<tr class="heading_table_top">
<td> Updated youtube-dl to 2017.07.23</td>
</tr>
<td> This project has some issues,so is delayed </td>
</tr>
<tr>
<td> Cleaning will take place soon </td>
</tr>
<tr>
<td> a well documented html is in prog... |
# Retro

Room link: https://tryhackme.com/room/retro
Room IP: 10.10.22.148
*\* for me your's will be different*
## Enumeration
* Nmap
```
PORT STATE SERVICE
80/tcp open http
3389/tcp open ms-w... |
## CSec
A comprehensive collection of all things [Computer Security.](https://en.wikipedia.org/wiki/Computer_security)
Collection of awesome software, libraries, documents, books, resources and cool stuff about security.
## Table of Contents
- [Computer Security](#CSec)
- [Network](#network)
- [Web](#web)
-... |
# 📖 ReadMe
[](https://creativecommons.org/licenses/by-sa/4.0/)
<a name="contents"></a>
## 🔖 Contents
- ☀️ [Methodology](#methodology)
* ⚙️ [Phase 0: Recon](#mrecon)
* ⚙️ [Phase 1: Enumerate](#menum... |
2018/9/16 福师大黑盾杯

# 信息泄露+代码审计
svn泄露源码:http://192.168.200.200/web/codeaudit/.svn/text-base/index.php.svn-base.txt
```php
<?php
error_reporting(0);
$user = $_COOKIE['user'];
$code = $_GET['code']?(int)$_GET['code']:'';
if($user == 'admin' && !empty($code)) {
$hex = (int)$c... |
# CyberTruckChallenge19
Android security workshop taught at the CyberTruck Challenge 2019 (Detroit USA). Further info at https://www.cybertruckchallenge.org
## Description
A new mobile remote keyless system "CyberTruck" has been implemented by one of the most well-known car security companies "NowSecure Mobile Vehic... |
### Read from top to bottom
* https://github.com/austin-lai/HackTheBox-WriteUp/tree/main/HackTheBox(HTB)-Devzat
* https://book.hacktricks.xyz/pentesting/8086-pentesting-influxdb#dump-table
* https://github.com/LorenzoTullini/InfluxDB-Exploit-CVE-2019-20933
* https://stackoverflow.com/questions/33198428/jwt-module-objec... |
- [IPVS](#ipvs)
- [What is IPVS](#what-is-ipvs)
- [IPVS vs. IPTABLES](#ipvs-vs-iptables)
- [When ipvs falls back to iptables](#when-ipvs-falls-back-to-iptables)
- [Run kube-proxy in ipvs mode](#run-kube-proxy-in-ipvs-mode)
- [Prerequisite](#prerequisite)
- [Local UP Cluster](#local-up-cluster)
- [... |
# [Web-Security-Note](https://github.com/Smi1e521/Web-Security-Note)
Record some common Web security sites
由于平常读过的文章以及遇到的比较好的开源项目都被渐渐遗忘了,所以利用这个项目来记录一下,以便查阅。
# 目录:
- [CTF](#CTF)
- [Online-Tools](#Online-Tools)
- [漏洞环境](#%E6%BC%8F%E6%B4%9E%E7%8E%AF%E5%A2%83)
- [信息搜集](#%E4%BF%A1%E6%81%AF%E6%90%9C%E9%9B%86)
- [工具](#%E5%... |
docker-cheat-sheet
https://github.com/wsargent/docker-cheat-sheet
Data-Science--Cheat-Sheet
https://github.com/georgearun/Data-Science--Cheat-Sheet
Web-Attack-Cheat-Sheet
https://github.com/riramar/Web-Attack-Cheat-Sheet
machine-learning-cheat-sheet
https://github.com/soulmachine/machine-learning-cheat-sheet
go... |
# Pentest Tools

The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ
## TODO
* [x] Directory
* [ ] Browser bookmarks
* [ ] Tools Usage
* [... |
# MACHINE CHALLENGE: CALAMITY
## Challenge Description
##### Own system
Type below the hash that is inside the root.txt file in the machine. The file
can be found under /root on Linux machines and at the Desktop of the
Administrator on Windows.
##### Own User
Type below the hash that is inside the user.txt file in t... |
# PENTESTING-BIBLE
# Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY.
# Created By Ammar Amer (Twitter @cry__pto)
## Support.
*Paypal:* [](https://paypal.me/AmmarAmerHacker)
-1- 3 Ways Extract Password... |
# awesome-industrial-control-system-security
A curated list of resources related to Industrial Control System (ICS) security.
Feel free to [contribute](CONTRIBUTING.md).
## Tools
<table>
<tr>
<td>
<a href="https://gitlab.com/jhcastel/attkfinder" target="_blank">AttkFinder</a>
</td>
... |
# Oneliner-Bugbounty
A collection oneliner scripts for bug bounty
## List tools
- [Subfinder](https://github.com/projectdiscovery/subfinder)
- [Naabu](https://github.com/projectdiscovery/naabu)
- [httpx](https://github.com/projectdiscovery/httpx)
- [Nuclei](https://github.com/projectdiscovery/nuclei)
- [Waybackurls](h... |
#### 1. About
- URL: `https://github.com/sullo/nikto`
- Nikto web server scanner
#### 2. Build
```
# git clone https://github.com/sullo/nikto && cd nikto
# docker build -t nikto .
```
#### 3. Run
```
# docker run --rm -it nikto -h http://192.168.9.11:8080
# cat urls.txt | docker run --rm -it nikto -h -
```
|
# BugBounty.zip :beetle: :moneybag:
Welcome to BugBounty.zip, a collection of tools aimed at making your bug hunting experience smoother and more efficient.
## Tools :wrench:
Here's a brief overview of the tools BugBountyZIP provides:
1. **Add HTTPS:** Automatically adds HTTPS to domain list.
2. **Remove a Word:** ... |
# sql 注入
## [sqlmap](https://github.com/sqlmapproject/sqlmap)
> sqlmap 是一个开源的渗透测试工具,可以用来自动化的检测,利用SQL注入漏洞,获取数据库服务器的权限。它具有功能强大的检测引擎,针对各种不同类型数据库的渗透测试的功能选项,包括获取数据库中存储的数据,访问操作系统文件甚至可以通过外带数据连接的方式执行操作系统命令。
使用方法
```
python sqlmap.py -h
```
使用demo
```
python sqlmap.py -u "http://someurl?name=a" --eval="sessionid='56782f23-24... |
---
title: "CMSeeK"
category: "scanner"
type: "CMS"
state: "released"
appVersion: "v.1.1.3"
usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities"
---
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
-----------... |

<p align="right"> <a href="https://www.hackthebox.eu/home/users/profile/391067" target="_blank"><img loading="lazy" alt="x00tex" src="https://www.hackthebox.eu/badge/image/391067"></a>
</p>
# Scanning
## Nmap
`ports=$(sudo nmap -p- --min-rate=1000 "$1" | grep open | awk -F / '{print $1}' ORS... |
<h1>Kali Linux - https://kali.org/downloads</h1>
<h2>Recon and Enumeration</h2>
<h3>NMAP Commands</h3>
<p>Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing se... |
# Awesome C++ [](https://awesome.re) [](https://www.trackawesomelist.com/fffaraz/awesome-cpp/)
A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
... |
<h1 align="center">pentest-tools</h1>
<h4 align="center">A collection of custom security tools for quick needs.</h4>
<p align="center">
<img src="https://img.shields.io/badge/-bash-gray" alt="bash badge">
<img src="https://img.shields.io/badge/python-v3-blue" alt="python badge">
<img src="https://img.shie... |
# **Disclaimer**
Use the scripts, tools and workflows available in this repository at your own risk. </br>
</br>
Any breach of law, you can be held responsible. </br>
## Informational
I made these scripts for my needs and tried to understand a little bit of how some bug hunters work and put some of those steps in a ... |
[](https://snovvcrash.github.io/)
[](https://github.com/snovvcrash/PPN)
[



## Notes
To use these commands, make sure to:
- Replace ‘10.10.10.10’ with the relevant IP address
- Replace ‘port’ with the relevant port number
- Replace /path/to/x with the relevant path to the relevant file
## Networking
| slash notation | net mask | hex | binary... |
# Spectra
URL: https://app.hackthebox.com/machines/Spectra
Level: Easy
Date: 1 Jun 2021
## Walkthrough
- [Enumeration](#enumeration)
- [User flag](#user-flag)
- [Privesc](#privesc)
# Enumeration
## NMAP
```
# Nmap 7.91 scan initiated Mon May 31 22:34:56 2021 as: nmap -T4 -p- -oN 01_nmap.txt 10.10.10.229
Nmap sc... |
<h1 align="center">
<img src="https://user-images.githubusercontent.com/8293321/174841003-01a62bad-2ecf-4874-89c4-efa53dd56884.png" width="200px">
<br>
</h1>
<p align="center">
<a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a>
<a href="https://goreportcard... |
> בס״ד
<div align="center">
<h2 align="center"><a href="https://github.com/Anlominus">⚜️ Aภl๏miuภuຮ ⚜️</a></h2>
<img align="center" width="100" src="https://user-images.githubusercontent.com/51442719/172729066-1293d382-4a31-4f03-8c23-ab0ea5f611a0.png">
⫷ [**`HacKingPro`**](https://github.com/Anlominus/HacKingPro) ⫸
... |
# Cryptography Fundamentals course (now with some AppSec)
## Details
Most of the content (and lecture recordings) are on Moodle but I'm adding a list of topics & some resources here for anyone who wants to quickly browse them.
## Book/Tutorial Recommendations
* Serious Cryptography - JP Aumasson (Available as ebook a... |
<div align="center">
<img src="https://github.com/mcnamee/huntkit/raw/master/docs/hero.png" alt="HuntKit" style="width:100%" />
<p></p>
<sup>
<a href="https://hub.docker.com/r/mcnamee/huntkit">
<img src="https://img.shields.io/docker/v/mcnamee/huntkit?style=flat-square" alt="version" />
</a>
... |
# 3pScan
## Features
- Simple tool for port scan
## Installation
```sh
go install -v github.com/tangxiaofeng7/3pScan@latest
```
## Usage
```console
Simple:
3pScan -h baidu.com -top 1000
Scan with disable ping:
3pScan -h baidu.com -Pn -top 1000
Scan with read file:
3pScan -hf url.txt -top 1000
Scan with full p... |
# nmapbar
A Little program in Ruby that adds a progress bar to Nmap and enhances output, making it easier to identify open ports.

## Installation
Install tty-progressbar
```$ gem install tty-progressbar```
... |
# Oscp study
Notes of my Offensive Security Certified Professional (OSCP) study plan.
**Last update**: 2019-04-10
## OSCP-like VMs on Vulnhub:
- Beginner friendly:
- Kioptrix: Level 1 (#1) [ok]
- Kioptrix: Level 1.1 (#2) [ok]
- Kioptrix: Level 1.2 (#3) [ok]
- Kioptrix: Level 1.3 (#4) [ok]
- FristiLeaks: 1.3 [ok... |
# Swagger Code Generator
- Master (2.3.0): [](https://travis-ci.org/swagger-api/swagger-codegen)
[](https://github.com/dwyl/esta/issues)
A list of [Capture The Flag](https://en.wikipedia.org/wiki/Capture_the_flag#Computer_security) (CTF) frameworks, libraries, resources and software for s... |
# Awesome-Android-Security 

# Table of Contents
- [Blog](#blog)
- [How To's](#how-tos)
- [Papers](#paper)
- [Books](#books)
- [Trainings](#Trainings)
- [Tools](#tools)
* [Static Analysis Tools](#Static-Analysis)
* [Dynamic Analysis Tools... |
# RP: Web Scanning
Part of the Red Primer series, intro to web scanning.
# [Task 2] ...I'm supposed to scan with that?
## #2.0 - Instructions
A short quiz over the various switches used with Nikto as well as a quick scan against our target. All you'll need for this is the help menu for nikto. Include all parts of ... |
## 👑 What is KingOfOneLineTips Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan... |
<!-- markdownlint-disable MD033 MD041 -->
<p align="center">
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker">
<img
alt="Offensive Docker"
src="https://github.com/aaaguirrep/offensive-docker/blob/master/img/banner.jpg"
width="600"
/>
</a>
</p>
<br/>
<p align="center">
<a h... |
# Web Sockets
> The WebSocket protocol allows a bidirectional and full-duplex communication between a client and a server
## Summary
* [Tools](#tools)
* [Exploit](#exploit)
* [Using wsrepl](#using-wsrepl)
* [Using ws-harness.py](#using-ws-harness-py)
* [Cross-Site WebSocket Hijacking (CSWSH)](#cross-site-websock... |
# 互联网安全 推荐
| ts | title | url|
| --- | --- | ---|
# 玄武实验室 推荐
| ts | title | url|
| --- | --- | ---|
# 安全维基 推荐
| ts | title | url|
| --- | --- | ---|
| 20230710 | SecWiki周刊(第488期) | https://www.sec-wiki.com/weekly/488|
| 20230710 | 关于加强“自媒体”管理的通知 | https://mp.weixin.qq.com/s/4QHdCXHq7md7MqW06SuN9w|
# CVE G... |
[](http://www.python.org/download/)
[](https://www.python.org/downloads/release/python-2714/)
[](https:/... |
<h1 align="center">
<br>
<img width="200" src="https://raw.githubusercontent.com/sindresorhus/awesome/main/media/logo.svg" alt="awesome">
<br>
</h1>
[](https://travis-ci.org/sdmg15/Best-websites-a-pro... |
### IP
`10.10.226.175`
# Enumeration
### nmap
`nmap -sC -sV 10.10.226.175 -oN init.nmap`
```
Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-22 15:27 EST
Nmap scan report for 10.10.226.175
Host is up (0.14s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu ... |

`Note: These are my notes for personal reference!`
# 𝐎𝐒𝐂𝐏 𝐏𝐫𝐞-𝐏𝐫𝐞𝐩𝐚𝐫𝐚𝐭𝐢𝐨𝐧 𝐏𝐥𝐚𝐧 𝐚𝐧𝐝 𝐍𝐨𝐭𝐞𝐬
> - `21st March 2022` : Start Date
> - `19th Sept 2022` : Expecte... |
---
title: OpenStar(开心)说明
tags: OpenResty,OpenStar,waf+,云waf,nginx lua
grammar_cjkRuby: true
---
欢迎使用 **{OpenStar}(WAF+)**,该项目是从实际需求中产生,经过多次的版本迭代,实属不易。感谢**春哥**,以及[春哥][1]的神器(**[OpenResty][2]**)
注意:使用版本一定要大于 1.11.0 因为使用了ngx.var.request_id
**代码写的比较好理解,肯定不优雅 哈~**
个人的一些开发实践,有需要的朋友可以加入下
![xq][27]
正在更新说明WIKI篇,已经更新了安装篇,请自... |
# PENTESTING-BIBLE
# WAYBACK MACHINE FOR HACKING ARTICLES ALL THE SCREENSHOTS IS AS PDF
# hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
# MORE THAN 2000 LINKS.
# MORE THAN 2000 PDF FILES ABOUT DIFFERENT FIELDS OF HACKING .
# note:most of the... |
# XXE - XEE - XML External Entity
<details>
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/sched... |
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos)
# Android
- Android安全资源收集,初版。600+工具,1500+文章
- [English Version](https://github.com/alphaSeclab/android-security/blob/master/Readme_en.md)
# 目录
- [资源收集](#68d90d74dca98b4812bd082767343703)
- [(11) Github Repo](#767078c52aca04c452c095f49ad7395... |
# PENTESTING-BIBLE
# hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
# MORE THAN 1000 LINK
# MORE TO COME
-1- 3 Ways Extract Password Hashes from NTDS.dit:
https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit
-2- 3... |
<h1 align="center">
<br>
<a href="https://nuclei.projectdiscovery.io"><img src="static/nuclei-logo.png" width="200px" alt="Nuclei"></a>
</h1>
<h4 align="center">Fast and customisable vulnerability scanner based on simple YAML based DSL.</h4>
<p align="center">
<a href="https://goreportcard.com/report/github.com/... |
# PENTESTING-BIBLE
# Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY.
# Created By Ammar Amer (Twitter @cry__pto)
## Support.
*Paypal:* [](https://paypal.me/AmmarAmerHacker)
-1- 3 Ways Extract Password... |

# Awesome Learning
<div align="center">
<img src="assets/poster.gif" width="500" height="300"/>
</div>
I have been into Software Testing role since last 14+ years, however I must tell you that my most of the time was spent in manu... |
# For Business Reasons
In your network scan, you found an unknown VM....
[For Business Reasons](https://tryhackme.com/room/forbusinessreasons)
## Topic's
- Network Enumeration
- Web Enumeration
- Enumeration (Wordpress)
- Brute Forcing (Wordpress)
- Exploitation (Wordpress)
- Security Misconfiguration
- Stored Pass... |
# Pentesting the cloud cheatsheet
* [General](#General)
* [Scaning tools](#Scanning-tools)
* [Recon \ OSINT](/OSINT.md#Cloud)
* [Initial access attacks](initial-access-attacks.md)
* [Cloud Services](readme.md)
* [Azure](azure/readme.md)
* [Amazon Web Services](aws/readme.md)
* [Google Cloud](gc/readme.md)
# Ge... |

# StaCoAn    
# Anti-AV
- 跟杀软和免杀有关的资料,当前包括200+工具和1300+文章,根据功能进行了粗糙的分类
- 相关内容,在有关**Payload、Shellcode、混淆、PowerShell、隐写、注入、远控**收集里
- [English Version](https://github.com/alphaSeclab/anti-av/blob/master/Readme_en.md)
# 目录
- [veil](#13fd86f84443937a29340957140ce4... |
# Static Code Reverse Engineering
Many malicious actors obfuscate their code so that their techniques and identity can evade detection even if their malicious code is caught and analyzed. Or, some benign coders obfuscate their code in order to protect their proprietary coding algorithms. It's hard to look at obfusca... |
## Arthas

[](https://travis-ci.org/alibaba/arthas)
[](https://codecov.io/gh/alibaba/arthas)
](https://github.com/Jieyab89)
Contains a list of OSINT tools, OSINT tips, datasets, Maltego transform and others. There are free and paid tools... |
<h1 align="center">
<br>
<img src="https://images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com/f/d06120c6-10fa-49a6-8e5a-6de6024c71b5/ddaf69q-cbe86b59-8049-40b6-96ca-bb1929a0b073.gif?token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJ1cm46YXBwOjdlMGQxODg5ODIyNjQzNzNhNWYwZDQxNWVhMGQyNmUwIiwiaXNzIjoidXJuOmFwcDo3ZTBkMTg4... |
# File Upload
<details>
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twi... |
# Mr Robot CTF
A TryHackMe intermediate CTF room, that based on TV show "Mr Robot"
## Tasks
### #0. Recon & Enumeration
1. Find out the subdirectory of the web application, for the lookup efficiency
* You can use either dirb, dirbuster or gobuster, and I am using gobuster here
* ```gobuster dir -u 10.10.206.1... |
# Private Docker Registry in Kubernetes
Kubernetes offers an optional private Docker registry addon, which you can turn
on when you bring up a cluster or install later. This gives you a place to
store truly private Docker images for your cluster.
## How it works
The private registry runs as a `Pod` in your cluster.... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
# File Inclusion
> The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application.
> The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ... |
# Bug Bounty Cheat Sheet</h1>
| 📚 Reference | 🔎 Vulnerabilities |
|-------------------------------------------------------------|-----------------------------------------------------------|
| [Bug Bounty Platforms](cheatsheets/bu... |
# PENTESTING-BIBLE
# Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY.
# Created By Ammar Amer (Twitter @cry__pto)
## Support.
*Paypal:* [](https://paypal.me/AmmarAmerHacker)
-1- 3 Ways Extract Password... |
# Pwndbg + GEF + Peda - One for all, and all for one
This is a script which installs Pwndbg, GEF, and Peda GDB plugins in a single command.
Run `install.sh` and then use one of the commands below to launch the corresponding GDB environment:
```
gdb-peda
gdb-peda-intel
gdb-peda-arm
gdb-pwndbg
gdb-gef
```
For more in... |
## Notes
MS14-068
------
add htb.local and mantis.htb.local to /etc/hosts
impacket goldenpac <= 9.18 works, 9.19 does not work on mantis, or use pykek ms14-068<br/>
```
goldenPac.py htb.local/james:J@m3s_P@ssW0rd\!@mantis.htb.local
python2 ms14-068.py -u james@htb.local -s S-1-5-21-4220043660-4019079961-2895681657-... |
# Undetected - HackTheBox - Writeup
Linux, 30 Base Points, Medium

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22``` and ```80```.
***User***: On ```/vendor``` found ```... |
Writeups for this box is not available but there is a video walkthrough of this challenge in my Youtube Channel.
[Link to this Youtube Video](https://www.youtube.com/watch?v=7qvePuDB7z8).
|
<h1 align="center">
<img src="https://user-images.githubusercontent.com/2679513/131189167-18ea5fe1-c578-47f6-9785-3748178e4312.png" width="150px"/><br/>
Speckle | ArcGIS
</h1>
<h3 align="center">
Connector for Spatial Data from ArcGIS
</h3>
<p align="center"><b>Speckle</b> is the data infrastructure for the AEC... |
# Awesome List Updates on Oct 09 - Oct 15, 2017
51 awesome lists updated this week.
[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/week/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63... |
# Bug Bounty Reference
A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty
# Introduction
I have been reading for Bug Bounty write-ups for a few months, I found it extremely useful to read relevant write-up when I found a certain type... |
# OSCP-Notes
Kali Linux
========================================================================================================
- Set the Target IP Address to the `$ip` system variable
`export ip=192.168.1.100`
- Find the location of a file
`locate sbd.exe`
- Search through directories in the `$... |
# HackTricks
<figure><img src=".gitbook/assets/hacktricks.gif" alt=""><figcaption></figcaption></figure>
_Hacktricks logos & motion design by_ [_@ppiernacho_](https://www.instagram.com/ppieranacho/)_._
{% hint style="success" %}
**Welcome to the wiki where you will find each hacking trick/technique/whatever I have l... |
<hr>
<a href="https://github.com/djsime1/awesome-flipperzero">
<img src="https://user-images.githubusercontent.com/8518150/158502722-2532719c-a680-4405-b230-d45474a5decd.png" align="center" alt="Awesome Flipper Zero" title="Awesome Flipper Zero">
</a>
<hr>
<h3 align="center">
A collection of Awesome resources fo... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.