text
stringlengths
9
334k
# 📖 ReadMe [![License: CC BY-SA 4.0](https://raw.githubusercontent.com/7h3rAm/7h3rAm.github.io/master/static/files/ccbysa4.svg)](https://creativecommons.org/licenses/by-sa/4.0/) <a name="contents"></a> ## 🔖 Contents - ☀️ [Methodology](#methodology) * ⚙️ [Phase 0: Recon](#mrecon) * ⚙️ [Phase 1: Enumerate](#menum...
## What is One_liner Project ? The main goal is to share tips from some well-known bug hunters. Using recon methodology, we can find subdomains, APIs, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters. ...
Pull requests welcome. # Preparing your environment Clone the following repositories: * https://github.com/superkojiman/onetwopunch - Wrapper around nmap/unicorn scanner * https://github.com/AutoRecon/AutoRecon - Another recon script * https://github.com/codingo/Reconnoitre - Recon script with suggested follow-up co...
# Jurassic Park - What is the SQL database called which is serving the shop information? - `scilla port -target <TARGET_IP>` - Visit `http://<TARGET_IP>` - Interesting content here: `http://<TARGET_IP>/item.php?id=5` - `scilla dir -target <TARGET_IP>` - `/assets` accessible, but nothing interesting. - `http://<...
# Bug Bounty Reference A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty # Introduction I have been reading for Bug Bounty write-ups for a few months, I found it extremely useful to read relevant write-up when I found a certain type...
# Recon cheatsheet for pentesting and bugbounty ## 1) Subdomain enumeration: ### 1.1 )Sublist3r ``` python sublist3r.py -d yahoo.com ``` ### 1.3) subbrute: ``` python subbrute.py google.com ``` ### 1.4) subfinder: ``` ./subfinder -d target.com ./subfinder -d target.com -b -w all.txt ``` ### 1.5) Amass: ``` amass -d...
### IP `10.10.10.15` # Recon ### nmap `nmap -sC -sV 10.10.10.15 -o Grannynmap` ``` Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-19 11:27 EST Nmap scan report for 10.10.10.15 Host is up (0.11s latency). Not shown: 999 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 6.0 | http...
# hackthebox-writeups Writeups for HacktheBox machines (boot2root) and challenges written in Spanish or English. https://www.hackthebox.eu/ ## Important notes about password protection Machines writeups until 2020 March are protected with the corresponding root flag. But since this date, HTB flags are dynamic and...
# [Django REST framework][docs] [![build-status-image]][travis] [![coverage-status-image]][codecov] [![pypi-version]][pypi] [![Gitter](https://badges.gitter.im/tomchristie/django-rest-framework.svg)](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) **Awesome...
# Relevant Penetration Testing Challenge [Relevant](https://tryhackme.com/room/relevant) ## Topic's - Network Enumeration - SMB Enumeration - Cryptography - Base64 - Security Misconfiguration - msfvenom (Aspx) - Abusing Impersonation Privileges (PrintSpoofer) ## Appendix archive Password: `1 kn0w 1 5h0uldn'7!` ...
# AWAE-Prep AWAE course preparation to OSWE certification with hackthebox machines # NetSecFocus prep list https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=665299979 # Upgraded script for 'Fighter HTB' [Here](https://gitlab.com/s0j0hn/awae-prep/snippets/1967151) # WIP: M...
# VAULT 101 --- > Android Reverse Engineering > 500 points > 15 solves --- Short Writeup : [Medium](https://medium.com/bugbountywriteup/vault-101-samsung-ctf-android-reverse-engineering-challenge-write-up-d5a2b16a9212) Detailed Writeup : [Personal Blog](https://saket-upadhyay.github.io/2020/08/18/sstf-vault-wtir...
# SecurityTips This repo contains full collection of HackerScrolls tips. Socials: <a href="https://twitter.com/hackerscrolls" target="_blank"> <img src="https://raw.githubusercontent.com/hackerscrolls/SecurityTips/master/.images/twitter.png" align="center" width="25" /> </a> <a href="https://t.me/hackerscrolls" targ...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
# Swagger Code Generator [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https:/...
### IP `10.10.11.180` # Recon ### nmap `nmap -sC -sV 10.10.11.180 -oN init.nmap` ``` Starting Nmap 7.80 ( https://nmap.org ) at 2022-12-02 01:59 EST Nmap scan report for 10.10.11.180 Host is up (0.12s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11...
# bugbounty_checklist <img src="./doc_images/BClist.png" alt="logo" width="340" height="270"/><br> This tool may help you to have a good methodology for bug bounty hunting this tool based on [Bug Bounty Checklist for Web App](https://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md#Single_domain) <br> Th...
#NOTICE <table width="100%" align="center" class="table_border_both"> <tr class="heading_table_top"> <td> Updated youtube-dl to 2017.07.23</td> </tr> <td> This project has some issues,so is delayed </td> </tr> <tr> <td> Cleaning will take place soon </td> </tr> <tr> <td> a well documented html is in prog...
# Retro ![image](https://user-images.githubusercontent.com/5285547/131119489-6feda4b6-44b3-41aa-b3fa-bcb22ece0b84.png) Room link: https://tryhackme.com/room/retro Room IP: 10.10.22.148 *\* for me your's will be different* ## Enumeration * Nmap ``` PORT STATE SERVICE 80/tcp open http 3389/tcp open ms-w...
## CSec A comprehensive collection of all things [Computer Security.](https://en.wikipedia.org/wiki/Computer_security) Collection of awesome software, libraries, documents, books, resources and cool stuff about security. ## Table of Contents - [Computer Security](#CSec) - [Network](#network) - [Web](#web) -...
# 📖 ReadMe [![License: CC BY-SA 4.0](https://raw.githubusercontent.com/7h3rAm/7h3rAm.github.io/master/static/files/ccbysa4.svg)](https://creativecommons.org/licenses/by-sa/4.0/) <a name="contents"></a> ## 🔖 Contents - ☀️ [Methodology](#methodology) * ⚙️ [Phase 0: Recon](#mrecon) * ⚙️ [Phase 1: Enumerate](#menum...
2018/9/16 福师大黑盾杯 ![1537107338208](images/1537107338208.png) # 信息泄露+代码审计 svn泄露源码:http://192.168.200.200/web/codeaudit/.svn/text-base/index.php.svn-base.txt ```php <?php error_reporting(0); $user = $_COOKIE['user']; $code = $_GET['code']?(int)$_GET['code']:''; if($user == 'admin' && !empty($code)) { $hex = (int)$c...
# CyberTruckChallenge19 Android security workshop taught at the CyberTruck Challenge 2019 (Detroit USA). Further info at https://www.cybertruckchallenge.org ## Description A new mobile remote keyless system "CyberTruck" has been implemented by one of the most well-known car security companies "NowSecure Mobile Vehic...
### Read from top to bottom * https://github.com/austin-lai/HackTheBox-WriteUp/tree/main/HackTheBox(HTB)-Devzat * https://book.hacktricks.xyz/pentesting/8086-pentesting-influxdb#dump-table * https://github.com/LorenzoTullini/InfluxDB-Exploit-CVE-2019-20933 * https://stackoverflow.com/questions/33198428/jwt-module-objec...
- [IPVS](#ipvs) - [What is IPVS](#what-is-ipvs) - [IPVS vs. IPTABLES](#ipvs-vs-iptables) - [When ipvs falls back to iptables](#when-ipvs-falls-back-to-iptables) - [Run kube-proxy in ipvs mode](#run-kube-proxy-in-ipvs-mode) - [Prerequisite](#prerequisite) - [Local UP Cluster](#local-up-cluster) - [...
# [Web-Security-Note](https://github.com/Smi1e521/Web-Security-Note) Record some common Web security sites 由于平常读过的文章以及遇到的比较好的开源项目都被渐渐遗忘了,所以利用这个项目来记录一下,以便查阅。 # 目录: - [CTF](#CTF) - [Online-Tools](#Online-Tools) - [漏洞环境](#%E6%BC%8F%E6%B4%9E%E7%8E%AF%E5%A2%83) - [信息搜集](#%E4%BF%A1%E6%81%AF%E6%90%9C%E9%9B%86) - [工具](#%E5%...
docker-cheat-sheet https://github.com/wsargent/docker-cheat-sheet Data-Science--Cheat-Sheet https://github.com/georgearun/Data-Science--Cheat-Sheet Web-Attack-Cheat-Sheet https://github.com/riramar/Web-Attack-Cheat-Sheet machine-learning-cheat-sheet https://github.com/soulmachine/machine-learning-cheat-sheet go...
# Pentest Tools ![](logo.png) The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ ## TODO * [x] Directory * [ ] Browser bookmarks * [ ] Tools Usage * [...
# MACHINE CHALLENGE: CALAMITY ## Challenge Description ##### Own system Type below the hash that is inside the root.txt file in the machine. The file can be found under /root on Linux machines and at the Desktop of the Administrator on Windows. ##### Own User Type below the hash that is inside the user.txt file in t...
# PENTESTING-BIBLE # Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY. # Created By Ammar Amer (Twitter @cry__pto) ## Support. *Paypal:* [![Donate via Paypal](https://www.paypalobjects.com/en_GB/i/btn/btn_donateCC_LG.gif)](https://paypal.me/AmmarAmerHacker) -1- 3 Ways Extract Password...
# awesome-industrial-control-system-security A curated list of resources related to Industrial Control System (ICS) security. Feel free to [contribute](CONTRIBUTING.md). ## Tools <table> <tr> <td> <a href="https://gitlab.com/jhcastel/attkfinder" target="_blank">AttkFinder</a> </td> ...
# Oneliner-Bugbounty A collection oneliner scripts for bug bounty ## List tools - [Subfinder](https://github.com/projectdiscovery/subfinder) - [Naabu](https://github.com/projectdiscovery/naabu) - [httpx](https://github.com/projectdiscovery/httpx) - [Nuclei](https://github.com/projectdiscovery/nuclei) - [Waybackurls](h...
#### 1. About - URL: `https://github.com/sullo/nikto` - Nikto web server scanner #### 2. Build ``` # git clone https://github.com/sullo/nikto && cd nikto # docker build -t nikto . ``` #### 3. Run ``` # docker run --rm -it nikto -h http://192.168.9.11:8080 # cat urls.txt | docker run --rm -it nikto -h - ```
# BugBounty.zip :beetle: :moneybag: Welcome to BugBounty.zip, a collection of tools aimed at making your bug hunting experience smoother and more efficient. ## Tools :wrench: Here's a brief overview of the tools BugBountyZIP provides: 1. **Add HTTPS:** Automatically adds HTTPS to domain list. 2. **Remove a Word:** ...
# sql 注入 ## [sqlmap](https://github.com/sqlmapproject/sqlmap) > sqlmap 是一个开源的渗透测试工具,可以用来自动化的检测,利用SQL注入漏洞,获取数据库服务器的权限。它具有功能强大的检测引擎,针对各种不同类型数据库的渗透测试的功能选项,包括获取数据库中存储的数据,访问操作系统文件甚至可以通过外带数据连接的方式执行操作系统命令。 使用方法 ``` python sqlmap.py -h ``` 使用demo ``` python sqlmap.py -u "http://someurl?name=a" --eval="sessionid='56782f23-24...
--- title: "CMSeeK" category: "scanner" type: "CMS" state: "released" appVersion: "v.1.1.3" usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities" --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -----------...
![](jewel_banner.png) <p align="right"> <a href="https://www.hackthebox.eu/home/users/profile/391067" target="_blank"><img loading="lazy" alt="x00tex" src="https://www.hackthebox.eu/badge/image/391067"></a> </p> # Scanning ## Nmap `ports=$(sudo nmap -p- --min-rate=1000 "$1" | grep open | awk -F / '{print $1}' ORS...
<h1>Kali Linux - https://kali.org/downloads</h1> <h2>Recon and Enumeration</h2> <h3>NMAP Commands</h3> <p>Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing se...
# Awesome C++ [![Awesome](https://awesome.re/badge.svg)](https://awesome.re) [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/fffaraz/awesome-cpp/) A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff. ...
<h1 align="center">pentest-tools</h1> <h4 align="center">A collection of custom security tools for quick needs.</h4> <p align="center"> <img src="https://img.shields.io/badge/-bash-gray" alt="bash badge"> <img src="https://img.shields.io/badge/python-v3-blue" alt="python badge"> <img src="https://img.shie...
# **Disclaimer** Use the scripts, tools and workflows available in this repository at your own risk. </br> </br> Any breach of law, you can be held responsible. </br> ## Informational I made these scripts for my needs and tried to understand a little bit of how some bug hunters work and put some of those steps in a ...
[![homepage](https://img.shields.io/badge/Homepage-snovvcrash.github.io-success?style=social&logo=jekyll&logoColor=cc0000)](https://snovvcrash.github.io/) [![github](https://img.shields.io/github/stars/snovvcrash/PPN?label=Star%20on%20GitHub&style=social)](https://github.com/snovvcrash/PPN) [![twitter](https://img.shie...
# Challenge Name: Top of the Charts ![date](https://img.shields.io/badge/date-17.04.2021-brightgreen.svg) ![solved in time of CTF](https://img.shields.io/badge/solved-in%20time%20of%20CTF-brightgreen.svg) ![crypto category](https://img.shields.io/badge/category-Web-blueviolet.svg) ![value](https://img.shie...
# eJPT ![eJPT Logo](/ejpt_logo.png) ## Notes To use these commands, make sure to: - Replace ‘10.10.10.10’ with the relevant IP address - Replace ‘port’ with the relevant port number - Replace /path/to/x with the relevant path to the relevant file ## Networking | slash notation | net mask | hex | binary...
# Spectra URL: https://app.hackthebox.com/machines/Spectra Level: Easy Date: 1 Jun 2021 ## Walkthrough - [Enumeration](#enumeration) - [User flag](#user-flag) - [Privesc](#privesc) # Enumeration ## NMAP ``` # Nmap 7.91 scan initiated Mon May 31 22:34:56 2021 as: nmap -T4 -p- -oN 01_nmap.txt 10.10.10.229 Nmap sc...
<h1 align="center"> <img src="https://user-images.githubusercontent.com/8293321/174841003-01a62bad-2ecf-4874-89c4-efa53dd56884.png" width="200px"> <br> </h1> <p align="center"> <a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/license-MIT-_red.svg"></a> <a href="https://goreportcard...
> בס״ד <div align="center"> <h2 align="center"><a href="https://github.com/Anlominus">⚜️ Aภl๏miuภuຮ ⚜️</a></h2> <img align="center" width="100" src="https://user-images.githubusercontent.com/51442719/172729066-1293d382-4a31-4f03-8c23-ab0ea5f611a0.png"> ⫷ [**`HacKingPro`**](https://github.com/Anlominus/HacKingPro) ⫸ ...
# Cryptography Fundamentals course (now with some AppSec) ## Details Most of the content (and lecture recordings) are on Moodle but I'm adding a list of topics & some resources here for anyone who wants to quickly browse them. ## Book/Tutorial Recommendations * Serious Cryptography - JP Aumasson (Available as ebook a...
<div align="center"> <img src="https://github.com/mcnamee/huntkit/raw/master/docs/hero.png" alt="HuntKit" style="width:100%" /> <p></p> <sup> <a href="https://hub.docker.com/r/mcnamee/huntkit"> <img src="https://img.shields.io/docker/v/mcnamee/huntkit?style=flat-square" alt="version" /> </a> ...
# 3pScan ## Features - Simple tool for port scan ## Installation ```sh go install -v github.com/tangxiaofeng7/3pScan@latest ``` ## Usage ```console Simple: 3pScan -h baidu.com -top 1000 Scan with disable ping: 3pScan -h baidu.com -Pn -top 1000 Scan with read file: 3pScan -hf url.txt -top 1000 Scan with full p...
# nmapbar A Little program in Ruby that adds a progress bar to Nmap and enhances output, making it easier to identify open ports. ![](https://user-images.githubusercontent.com/51126823/102024029-1d2b3580-3d6e-11eb-807a-1f681d7d2a2a.gif) ## Installation Install tty-progressbar ```$ gem install tty-progressbar``` ...
# Oscp study Notes of my Offensive Security Certified Professional (OSCP) study plan. **Last update**: 2019-04-10 ## OSCP-like VMs on Vulnhub: - Beginner friendly: - Kioptrix: Level 1 (#1) [ok] - Kioptrix: Level 1.1 (#2) [ok] - Kioptrix: Level 1.2 (#3) [ok] - Kioptrix: Level 1.3 (#4) [ok] - FristiLeaks: 1.3 [ok...
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
# Linux
# Recon My Way. ### Tools and scripts setting up guide for personal use. This repository contains the tools and scripts, I added in my recent blog post "Recon-My way" and I personally use. Here is my blog post https://medium.com/ehsahil/recon-my-way-82b7e5f62e21 Machine Configuration I use - Debian- 9.4, 4 GB R...
## 信息收集 公司和个人网站是信息的重要来源,查看公司的LinkedIn个人资料,以确定高级经理,董事和非技术人员。 很多时候,最薄弱的密码属于许多公司的管理人员。 搜索公司网站上的“关于我们”页面也可以找到薄弱的目标。 ``` IP地址段 域名信息 邮箱 文档图片数据 公司组织架构 联系电话传真 人员姓名/职务等信息 目标系统使用的技术 公开的商业信息 ``` ### whois ``` https://wq.apnic.net/static/search.html http://littlegreenfootballs.com/nqt.php?target=14...
# Awesome CTF resources [![contributions welcome](https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat)](https://github.com/dwyl/esta/issues) A list of [Capture The Flag](https://en.wikipedia.org/wiki/Capture_the_flag#Computer_security) (CTF) frameworks, libraries, resources and software for s...
# Awesome-Android-Security ![awesome](https://awesome.re/badge.svg) ![Screenshot](img/androidsec.png) # Table of Contents - [Blog](#blog) - [How To's](#how-tos) - [Papers](#paper) - [Books](#books) - [Trainings](#Trainings) - [Tools](#tools) * [Static Analysis Tools](#Static-Analysis) * [Dynamic Analysis Tools...
# RP: Web Scanning Part of the Red Primer series, intro to web scanning. # [Task 2] ...I'm supposed to scan with that? ## #2.0 - Instructions A short quiz over the various switches used with Nikto as well as a quick scan against our target. All you'll need for this is the help menu for nikto. Include all parts of ...
## 👑 What is KingOfOneLineTips Project ? 👑 Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan...
<!-- markdownlint-disable MD033 MD041 --> <p align="center"> <a href="https://hub.docker.com/r/aaaguirrep/offensive-docker"> <img alt="Offensive Docker" src="https://github.com/aaaguirrep/offensive-docker/blob/master/img/banner.jpg" width="600" /> </a> </p> <br/> <p align="center"> <a h...
# Web Sockets > The WebSocket protocol allows a bidirectional and full-duplex communication between a client and a server ## Summary * [Tools](#tools) * [Exploit](#exploit) * [Using wsrepl](#using-wsrepl) * [Using ws-harness.py](#using-ws-harness-py) * [Cross-Site WebSocket Hijacking (CSWSH)](#cross-site-websock...
# 互联网安全 推荐 | ts | title | url| | --- | --- | ---| # 玄武实验室 推荐 | ts | title | url| | --- | --- | ---| # 安全维基 推荐 | ts | title | url| | --- | --- | ---| | 20230710 | SecWiki周刊(第488期) | https://www.sec-wiki.com/weekly/488| | 20230710 | 关于加强“自媒体”管理的通知 | https://mp.weixin.qq.com/s/4QHdCXHq7md7MqW06SuN9w| # CVE G...
[![Python 3.5](https://img.shields.io/badge/Python-3.5-yellow.svg)](http://www.python.org/download/) [![python](https://img.shields.io/badge/python-2.7-brightgreen.svg)](https://www.python.org/downloads/release/python-2714/) [![OS](https://img.shields.io/badge/Tested%20On-Linux%20%7C%20Android-yellowgreen.svg)](https:/...
<h1 align="center"> <br> <img width="200" src="https://raw.githubusercontent.com/sindresorhus/awesome/main/media/logo.svg" alt="awesome"> <br> </h1> [![Build Status](https://api.travis-ci.org/sdmg15/Best-websites-a-programmer-should-visit.svg?branch=master)](https://travis-ci.org/sdmg15/Best-websites-a-pro...
### IP `10.10.226.175` # Enumeration ### nmap `nmap -sC -sV 10.10.226.175 -oN init.nmap` ``` Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-22 15:27 EST Nmap scan report for 10.10.226.175 Host is up (0.14s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu ...
![visitor badge](https://visitor-badge.glitch.me/badge?page_id=shreyaschavhan.oscp-pre-preparation-plan-and-notes&left_text=Views) `Note: These are my notes for personal reference!` # 𝐎𝐒𝐂𝐏 𝐏𝐫𝐞-𝐏𝐫𝐞𝐩𝐚𝐫𝐚𝐭𝐢𝐨𝐧 𝐏𝐥𝐚𝐧 𝐚𝐧𝐝 𝐍𝐨𝐭𝐞𝐬 > - `21st March 2022` : Start Date > - `19th Sept 2022` : Expecte...
--- title: OpenStar(开心)说明 tags: OpenResty,OpenStar,waf+,云waf,nginx lua grammar_cjkRuby: true --- 欢迎使用 **{OpenStar}(WAF+)**,该项目是从实际需求中产生,经过多次的版本迭代,实属不易。感谢**春哥**,以及[春哥][1]的神器(**[OpenResty][2]**) 注意:使用版本一定要大于 1.11.0 因为使用了ngx.var.request_id **代码写的比较好理解,肯定不优雅 哈~** 个人的一些开发实践,有需要的朋友可以加入下 ![xq][27] 正在更新说明WIKI篇,已经更新了安装篇,请自...
# PENTESTING-BIBLE # WAYBACK MACHINE FOR HACKING ARTICLES ALL THE SCREENSHOTS IS AS PDF # hundreds of ethical hacking &amp; penetration testing &amp; red team &amp; cyber security &amp; computer science resources. # MORE THAN 2000 LINKS. # MORE THAN 2000 PDF FILES ABOUT DIFFERENT FIELDS OF HACKING . # note:most of the...
# XXE - XEE - XML External Entity <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/sched...
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos) # Android - Android安全资源收集,初版。600+工具,1500+文章 - [English Version](https://github.com/alphaSeclab/android-security/blob/master/Readme_en.md) # 目录 - [资源收集](#68d90d74dca98b4812bd082767343703) - [(11) Github Repo](#767078c52aca04c452c095f49ad7395...
# PENTESTING-BIBLE # hundreds of ethical hacking &amp; penetration testing &amp; red team &amp; cyber security &amp; computer science resources. # MORE THAN 1000 LINK # MORE TO COME -1- 3 Ways Extract Password Hashes from NTDS.dit: https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit -2- 3...
<h1 align="center"> <br> <a href="https://nuclei.projectdiscovery.io"><img src="static/nuclei-logo.png" width="200px" alt="Nuclei"></a> </h1> <h4 align="center">Fast and customisable vulnerability scanner based on simple YAML based DSL.</h4> <p align="center"> <a href="https://goreportcard.com/report/github.com/...
# PENTESTING-BIBLE # Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY. # Created By Ammar Amer (Twitter @cry__pto) ## Support. *Paypal:* [![Donate via Paypal](https://www.paypalobjects.com/en_GB/i/btn/btn_donateCC_LG.gif)](https://paypal.me/AmmarAmerHacker) -1- 3 Ways Extract Password...
![Open Source Love](https://badges.frapsoft.com/os/v1/open-source.svg?v=103) # Awesome Learning <div align="center"> <img src="assets/poster.gif" width="500" height="300"/> </div> I have been into Software Testing role since last 14+ years, however I must tell you that my most of the time was spent in manu...
# For Business Reasons In your network scan, you found an unknown VM.... [For Business Reasons](https://tryhackme.com/room/forbusinessreasons) ## Topic's - Network Enumeration - Web Enumeration - Enumeration (Wordpress) - Brute Forcing (Wordpress) - Exploitation (Wordpress) - Security Misconfiguration - Stored Pass...
# Pentesting the cloud cheatsheet * [General](#General) * [Scaning tools](#Scanning-tools) * [Recon \ OSINT](/OSINT.md#Cloud) * [Initial access attacks](initial-access-attacks.md) * [Cloud Services](readme.md) * [Azure](azure/readme.md) * [Amazon Web Services](aws/readme.md) * [Google Cloud](gc/readme.md) # Ge...
![StaCoAn header](resources/header_stacoan-01.png) # StaCoAn ![Issues badge](https://img.shields.io/github/issues/vincentcox/StaCoAn.svg) ![License badge](https://img.shields.io/github/license/vincentcox/StaCoAn.svg) ![status](https://img.shields.io/badge/status-alpha-red.svg) ![Travis](https://api.travis-ci.org/vince...
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos) # Anti-AV - 跟杀软和免杀有关的资料,当前包括200+工具和1300+文章,根据功能进行了粗糙的分类 - 相关内容,在有关**Payload、Shellcode、混淆、PowerShell、隐写、注入、远控**收集里 - [English Version](https://github.com/alphaSeclab/anti-av/blob/master/Readme_en.md) # 目录 - [veil](#13fd86f84443937a29340957140ce4...
# Static Code Reverse Engineering Many malicious actors obfuscate their code so that their techniques and identity can evade detection even if their malicious code is caught and analyzed. Or, some benign coders obfuscate their code in order to protect their proprietary coding algorithms. It's hard to look at obfusca...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) [![Build Status](https://travis-ci.org/alibaba/arthas.svg?branch=master)](https://travis-ci.org/alibaba/arthas) [![codecov](https://codecov.io/gh/alibaba/arthas/branch/master/graph/badge.svg)](https://codecov.io/gh/alibaba/arthas) ![maven](https://img.shields.io/ma...
# OSINT CHEAT SHEET - List OSINT Tools [![Github Badge](https://img.shields.io/badge/-Jieyab89-black?style=flat&logo=github&logoColor=white&link=https://github.com/Jieyab89/)](https://github.com/Jieyab89) Contains a list of OSINT tools, OSINT tips, datasets, Maltego transform and others. There are free and paid tools...
<h1 align="center"> <br> <img src="https://images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com/f/d06120c6-10fa-49a6-8e5a-6de6024c71b5/ddaf69q-cbe86b59-8049-40b6-96ca-bb1929a0b073.gif?token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJ1cm46YXBwOjdlMGQxODg5ODIyNjQzNzNhNWYwZDQxNWVhMGQyNmUwIiwiaXNzIjoidXJuOmFwcDo3ZTBkMTg4...
# File Upload <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twi...
# Mr Robot CTF A TryHackMe intermediate CTF room, that based on TV show "Mr Robot" ## Tasks ### #0. Recon & Enumeration 1. Find out the subdirectory of the web application, for the lookup efficiency * You can use either dirb, dirbuster or gobuster, and I am using gobuster here * ```gobuster dir -u 10.10.206.1...
# Private Docker Registry in Kubernetes Kubernetes offers an optional private Docker registry addon, which you can turn on when you bring up a cluster or install later. This gives you a place to store truly private Docker images for your cluster. ## How it works The private registry runs as a `Pod` in your cluster....
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
# File Inclusion > The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application. > The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ...
# Bug Bounty Cheat Sheet</h1> | 📚 Reference | 🔎 Vulnerabilities | |-------------------------------------------------------------|-----------------------------------------------------------| | [Bug Bounty Platforms](cheatsheets/bu...
# PENTESTING-BIBLE # Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY. # Created By Ammar Amer (Twitter @cry__pto) ## Support. *Paypal:* [![Donate via Paypal](https://www.paypalobjects.com/en_GB/i/btn/btn_donateCC_LG.gif)](https://paypal.me/AmmarAmerHacker) -1- 3 Ways Extract Password...
# Pwndbg + GEF + Peda - One for all, and all for one This is a script which installs Pwndbg, GEF, and Peda GDB plugins in a single command. Run `install.sh` and then use one of the commands below to launch the corresponding GDB environment: ``` gdb-peda gdb-peda-intel gdb-peda-arm gdb-pwndbg gdb-gef ``` For more in...
## Notes MS14-068 ------ add htb.local and mantis.htb.local to /etc/hosts impacket goldenpac <= 9.18 works, 9.19 does not work on mantis, or use pykek ms14-068<br/> ``` goldenPac.py htb.local/james:J@m3s_P@ssW0rd\!@mantis.htb.local python2 ms14-068.py -u james@htb.local -s S-1-5-21-4220043660-4019079961-2895681657-...
# Undetected - HackTheBox - Writeup Linux, 30 Base Points, Medium ![info.JPG](images/info.JPG) ## Machine ![‏‏Undetected.JPG](images/Undetected.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22``` and ```80```. ***User***: On ```/vendor``` found ```...
Writeups for this box is not available but there is a video walkthrough of this challenge in my Youtube Channel. [Link to this Youtube Video](https://www.youtube.com/watch?v=7qvePuDB7z8).
<h1 align="center"> <img src="https://user-images.githubusercontent.com/2679513/131189167-18ea5fe1-c578-47f6-9785-3748178e4312.png" width="150px"/><br/> Speckle | ArcGIS </h1> <h3 align="center"> Connector for Spatial Data from ArcGIS </h3> <p align="center"><b>Speckle</b> is the data infrastructure for the AEC...
# Awesome List Updates on Oct 09 - Oct 15, 2017 51 awesome lists updated this week. [🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/week/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63...
# Bug Bounty Reference A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty # Introduction I have been reading for Bug Bounty write-ups for a few months, I found it extremely useful to read relevant write-up when I found a certain type...
# OSCP-Notes Kali Linux ======================================================================================================== - Set the Target IP Address to the `$ip` system variable `export ip=192.168.1.100` - Find the location of a file `locate sbd.exe` - Search through directories in the `$...
# HackTricks <figure><img src=".gitbook/assets/hacktricks.gif" alt=""><figcaption></figcaption></figure> _Hacktricks logos & motion design by_ [_@ppiernacho_](https://www.instagram.com/ppieranacho/)_._ {% hint style="success" %} **Welcome to the wiki where you will find each hacking trick/technique/whatever I have l...
<hr> <a href="https://github.com/djsime1/awesome-flipperzero"> <img src="https://user-images.githubusercontent.com/8518150/158502722-2532719c-a680-4405-b230-d45474a5decd.png" align="center" alt="Awesome Flipper Zero" title="Awesome Flipper Zero"> </a> <hr> <h3 align="center"> A collection of Awesome resources fo...