text
stringlengths
9
334k
# Evil Twin - Mark VII Learn how to set up a fake authentication web page on a fake WiFi network. Read the comments in these two files to get a better understanding on how all of it works: * [/src/evil-twin/index.php](https://github.com/ivan-sincek/evil-twin/blob/master/src/evil-twin/index.php) * [/src/evil-twin/MyP...
<p align="center"> <img src="https://i.imgur.com/VeEYEkT.png" alt="Hacker roadmap" /><br> <img src="https://img.shields.io/github/issues/Sundowndev/hacker-roadmap.svg" alt="GitHub issues"> <img src="https://img.shields.io/badge/license-MIT-brightgreen.svg" alt="license"> </p> This repository is a guide for...
<p align='center'> <img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br> <a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.3"><img src="https://img.shields.io/badge/Version-1.1.3-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/Tuhinshubhra/CMSeeK/"...
# Bug Bounty Resources Some resources for learning and updating your methodology. ## Write-ups | Link | Tags | | :------------- | ------------- | | https://ysamm.com/?p=763 | `XSS` `OAuth` | | https://ahmdhalabi.medium.com/pii-disclosure-of-apple-users-10k-d1e3d29bae36 | `PII` `IDOR` | | https://blog.shiftleft.io/a...
# [Django REST framework][docs] [![build-status-image]][travis] [![coverage-status-image]][codecov] [![pypi-version]][pypi] [![Gitter](https://badges.gitter.im/tomchristie/django-rest-framework.svg)](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) **Awesome...
# 0day ############################ # VIP Tools ############################ Acunetix Hotspot Shield AppSpider 7 L0phtCrack 7 (Win64) Asoftis IP Changer Metasploit Console Maltego xl Avira Phantom VPN Metasploit Web UI.url Betternet Micro Focus Fortify Audit Workbench BlackBullet 2.1.6 Micro Focus Fortify Custom Rul...
# One-Liners [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re) ###### Thanks to all who create these Awesome One Liners❤️ ---------------------- ![image](https://user-images.githubusercontent.com/75373225/180003557-59bf909e-95e5-4b31-b4f8-fc05532f9f7c.png) --------------------------- # Subdomain Enu...
# OSCP personal cheatsheet # Enumeration > nmap -sn -v <IP>/CIDR > nmapAutomator <IP> All > autorecon <IP>/CIDR # NMAP **TCP** > sudo -sS -sC -sV -oA <NAME>.tcp <IP> -v **UDP** > sudo -sU -sS -sC -sV -oA <NAME>.udp <IP> -v # FTP - 21 **Brute force** > hydra -V -f -L <USERS_LIST> -P <PASSWORDS_LIST> ftp://<IP> -...
# Crime: voice translation challenge (featuring IBM Watson) **[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/cKTRtvhm710)**
# Learn365 This repository contains all the information shared during my Learn 365 Challenge. Learn 365 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for the whole year, it can be anything from infosec to general life. Follow me on Twitter for Regular Updates: [Harsh...
# OSCP-Archives During my journey to getting the OSCP, I always come across many articles, Git repo, videos, and other types of sources of great and valuable information that helps me during my studies. While having all of these in a bookmark folder is great, I wanted to also build a curated list of the resources that...
## Pentester Tools ? Here is a selection of tools to install on a Kali Linux distribution 64 bits (https://www.kali.org/) Kali Linux Tools Listing : https://tools.kali.org/tools-listing ## Installation 1. Ensure you have root access via SSH 2. Install [Ansible](https://www.ansible.com/) on your local machine 3. Insta...
# Timelapse - HackTheBox - Writeup Windows, 20 Base Points, Easy ![info.JPG](images/info.JPG) ## Machine ![‏‏Timelapse.JPG](images/Timelapse.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports related to ```SMB```, ```wsman``` etc. ***User 1***: By enumerat...
# PEN TESTERS (Under Development) 1. Company have PEN TESTERS team to conduct pentesting. 2. Company HIRING PEN TEST SERVICES - on hourly basis or project basis. - A list of [Privacy &amp; Security Resources](https://docs.hackliberty.org/books/privacy-security/page/privacy-security-resources) # PentestingEbook overvi...
# 100daysofcyber Tracking my progress for 100 days learning something new daily.... ## Day 1 Revisiting Computer Networks: 1. [Computer Networking Full Course - OSI Model Deep Dive with Real Life Examples](https://www.youtube.com/watch?v=IPvYjXCsTg8&t=2063s) 2. [OSI MODEL in easiest Way (best way to remember OSI lay...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.2.2"> <img src="https://img.shi...
# ToolsRus Practise using tools such as dirbuster, hydra, nmap, nikto and metasploit [ToolsRus](https://tryhackme.com/room/toolsrus) ## Topic's * Web Enumeration * Web Application Analysis * Network Enumeration * Brute Forcing HTTP-GET * Exploiting Tomcat ## Task 1 ToysRus Your challenge is to use the tools list...
# Transparent Policy Block Analyzer <img src="screenshot.png" width="600px"> What does it do? Have you ever wanted to run NGINX App Protect in transparent mode, and be able to determine what requests _would_ be blocked if it were in blocking mode? Now you can. This utility receives App Protect WAF's syslog messages ...
# Antique URL: https://app.hackthebox.com/machines/Antique Level: Easy Date 16 Oct 2021 ## Walkthrough - [Enumeration](#enumeration) - [User flag](#user-flag) - [Privesc](#privesc) # Enumeration ## NMAP Let's start with a basic nmap scan: ``` # Nmap 7.91 scan initiated Sat Oct 16 15:00:00 2021 as: nmap -T4 -p-...
<p align='center'> <img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br> <a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.3"><img src="https://img.shields.io/badge/Version-1.1.3-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/Tuhinshubhra/CMSeeK/"...
![](maps/cybersecurityroadmap-pnpt.png) # Cybersecurity-Roadmap # The Ultimate Hacker's Roadmap 2022 Donwload the roadmaps here: https://github.com/0xTRAW/Cybersecurity-Roadmap/tree/main/maps 1. Basic Computer Skills - Computer skills refer to the knowledge and abilities required to operate computers and related tech...
# Pandora - HackTheBox - Writeup Linux, 20 Base Points, Easy ![info.JPG](images/info.JPG) ## Machine ![‏‏pandora.JPG](images/Pandora.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```161``` (UDP). ***User 1***: By scanning for UD...
# Swagger Code Generator [![Build Status](https://travis-ci.org/swagger-api/swagger-codegen.svg)](https://travis-ci.org/swagger-api/swagger-codegen) [![Maven Central](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project/badge.svg?style=plastic)](https://maven-badges.herokuapp.com/maven-c...
# pythem - Penetration Testing Framework ![](https://img.shields.io/pypi/v/pythem.svg) ![](https://img.shields.io/badge/python-2.7-blue.svg) ![](https://img.shields.io/badge/OS-GNU%2FLinux-000000.svg) ![](https://img.shields.io/docker/automated/m4n3dw0lf/pythem.svg) ![](https://img.shields.io/docker/build/m4n3dw0lf/py...
# Day1 Inventory Management ``` Elves needed a way to submit their inventory - have a web page where they submit their requests and the elf mcinventory can look at what others have submitted to approve their requests. It’s a busy time for mcinventory as elves are starting to put in their orders. mcinventory rushes int...
# 所有收集类项目: - [收集的所有开源工具: sec-tool-list](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式 - [安全资源收集类的 Repo](https://github.com/alphaSeclab/awesome-security-collection): 1000+各类安全资源收集的Github Repo - [全平台逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): - Windows平台安全: PE/DLL/DL...
<p align="center"> <img alt="opensnitch" src="https://raw.githubusercontent.com/evilsocket/opensnitch/master/ui/opensnitch/res/icon.png" height="160" /> <p align="center"> <img src="https://github.com/evilsocket/opensnitch/workflows/Build%20status/badge.svg" /> <a href="https://github.com/evilsocket/opensni...
WEB CTF CheatSheet === Table of Contents ================= * [Webshell](#php-webshell) * [Reverse Shell](#reverse-shell) * [PHP Tag](#php-tag) * [PHP Weak Type](#php-weak-type) * [PHP Feature](#php-其他特性) * [Bypass open\_basedir](#open_basedir繞過) * [Bypass disable\_functions](#disable_functions繞過) * [Com...
# Tenet - HackTheBox Linux, 30 Base Points, Medium ## Machine ![‏‏Tenet.JPG](images/Tenet.JPG) ## Tenet Solution ### User So let's start with ```nmap``` scanning: ```console ┌─[evyatar@parrot]─[/hackthebox/Tenet] └──╼ $nmap -sC -sV -oA nmap/Tenet 10.10.10.223 Starting Nmap 7.80 ( https://nmap.org ) at 2021-04-01...
<!--- DO NOT EDIT THIS FILE!!! This file is statically generated by the scripts in the scripts/ folder!!! - If you want to add a youtube channel, edit the data/ytChannels.yml file!!! --> # InfoSec Resources ## CTFs - **PicoCTF**: [link](https://picoctf.org/) A very great start for anyone looking to ge...
# Awesome List Updates on Oct 15, 2019 20 awesome lists updated today. [🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63c2f&id=36a103854c)...
- [IPVS](#ipvs) - [What is IPVS](#what-is-ipvs) - [IPVS vs. IPTABLES](#ipvs-vs-iptables) - [When ipvs falls back to iptables](#when-ipvs-falls-back-to-iptables) - [Run kube-proxy in ipvs mode](#run-kube-proxy-in-ipvs-mode) - [Prerequisite](#prerequisite) - [Local UP Cluster](#local-up-cluster) - [...
<h1 align="center"> <br> <a href="https://nuclei.projectdiscovery.io"><img src="static/nuclei-logo.png" width="200px" alt="Nuclei"></a> </h1> <h4 align="center">Fast and customisable vulnerability scanner based on simple YAML based DSL.</h4> <p align="center"> <img src="https://img.shields.io/github/go-mod/go-ve...
# SpringBoot+Docker重构宜立方商城 ![](https://img.shields.io/badge/Java-1.8-blue.svg) ![](https://img.shields.io/badge/SpringBoot-2.0.4-blue.svg) ![](https://img.shields.io/badge/Dubbo-2.6.2-blue.svg) ![](https://img.shields.io/badge/ZooKeeper-3.4.13-blue.svg) ![](https://img.shields.io/badge/Solr-7.4-blue.svg) ![](https://i...
# Cyber Security Resources by SCSP An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by Seasoned Cyber Security Professionals community members. [1.1]: https://i.ibb.co/tHpmq2T/facebook.jpg [1]: https://www.facebook.com/scspcommunity/ [2.2]: https://i.ibb.co/1nntf1h/...
- [IPVS](#ipvs) - [What is IPVS](#what-is-ipvs) - [IPVS vs. IPTABLES](#ipvs-vs-iptables) - [When IPVS falls back to IPTABLES](#when-ipvs-falls-back-to-iptables) - [Run kube-proxy in IPVS mode](#run-kube-proxy-in-ipvs-mode) - [Prerequisite](#prerequisite) - [Local UP Cluster](#local-up-cluster) - [...
# OSCP / HackTheBox These are my notes and exploits I wrote while preparing for the OSCP and playing CTF on HackTheBox. ## Cheatsheet usage The cheatsheet is meant to be as searchable as possible. A such you have the following options to search for an entry: 1. You can search for a known **toolname**: - example: "...
# [Django REST framework][docs] [![build-status-image]][travis] [![coverage-status-image]][codecov] [![pypi-version]][pypi] **Awesome web-browsable Web APIs.** Full documentation for the project is available at [http://www.django-rest-framework.org][docs]. --- **Note**: We have now released Django REST framework 3...
[![Build Status](https://travis-ci.org/ytdl-org/youtube-dl.svg?branch=master)](https://travis-ci.org/ytdl-org/youtube-dl) youtube-dl - download videos from youtube.com or other video platforms - [INSTALLATION](#installation) - [DESCRIPTION](#description) - [OPTIONS](#options) - [CONFIGURATION](#configuration) - [OUTP...
<p align="center"> <img height="128" src="./awesome-yara.png" alt="Awesome YARA" title="Awesome YARA"> </p> <h1 align="center">Awesome YARA</h1> A curated list of awesome YARA rules, tools, and resources. Inspired by [awesome-python](https://github.com/vinta/awesome-python) and [awesome-php](https://github.com/zia...
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.35.1-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
- [创建](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/文件操作/创建.md) - [Windows查找文件](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/文件操作/Windows查找文件.md) - [Linux查找文件](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/文件操作/Linux查找文件.md) - [解压](https://github.com/xiaoy-sec/Pentest_Note/blob/...
<h1 align="center"> <br> <a href=""><img src="https://raw.githubusercontent.com/lutfumertceylan/top25-parameter/master/top25.jpg" alt=""></a> </h1> <h4 align="center">For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon</h4> <p align="center"> <a href=""><img ...
# BugBounty Image The image can be pulled from Docker Hub and started as following: ``` docker run -v $HOME/data:/data -v $HOME/wordlists:/wordlists --rm -it docker.io/nodyd/bb ``` *Disclaimer:* The image is massive big :D A recommended approach is to use the following shell function to start the container, e.g., `...
# CTF HackTheBox 2021 Cyber Apocalypse 2021 - Extortion Category: Web, Points: 300 ![info.JPG](images/info.JPG) # Extortion Solution Let's start the docker and browse it: ![index.JPG](images/index.JPG) By intercepting the request on "AIRSHIP" button click with [Burp](https://portswigger.net/burp) we can see the f...
# Tally #### 10.10.10.59 ###### Dotaplayer365 ``` nmap 10.10.10.59 PORT STATE SERVICE 21/tcp open ftp 80/tcp open http 81/tcp open hosts2-ns 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 808/tcp open ccproxy-http 1433/tcp open ms-sql-s ``` Checking the port 80 shows us...
# Awesome Windows Red Team [![Awesome](https://awesome.re/badge.svg)](https://awesome.re) > A curated list of awesome Windows talks, tools and resources for Red Teams, from beginners to ninjas. ## Contents * [Books](#books) * [Courses](#courses) * [System Architecture](#system-architecture) * [Active Directory](#a...
# OSCP Methodology Overview --------- - [Port Scan](#port-scan) - [Port 21 (FTP)](#port-21-ftp) - [Port 22 (SSH)](#port-22-ssh) - [Port 25 (SMTP)](#port-25-smtp) - [Port 53 (DNS)](#port-53-dns) - [Port 69 (udp/TFTP)](#port-69-udptftp) - [Port 79 (FINGER)](#port-79-finger) - [Port 80, 443 (HTTP/HTTPS)](#port-80-443-htt...
# kiba Identify the critical security flaw in the data visualization dashboard, that allows execute remote code execution. [kiba](https://tryhackme.com/room/kiba) ## Topic's - Network Enumeration - CVE-2019-7609 - Kibana Timelion < 5.6.15 and 6.6.1 - Capabilities ## Appendix archive Password: `1 kn0w 1 5h0uldn'7!...
# MACHINE CHALLENGE: VALENTINE ## Challenge Description ##### Own system Type below the hash that is inside the root.txt file in the machine. The file can be found under /root on Linux machines and at the Desktop of the Administrator on Windows. ##### Own User Type below the hash that is inside the user.txt file in ...
<p align="center"> <a href="https://github.com/trimstray/the-book-of-secret-knowledge"> <img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master"> </a> </p> <p align="center">"<i>Knowledge is powerful, be careful how you us...
<h1 align="center">mksub <a href="https://twitter.com/intent/tweet?text=mksub%20-%20Generate%20tens%20of%20thousands%20of%20subdomain%20combinations%20in%20a%20matter%20of%20seconds%20%40trick3st%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fmksub&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/bad...
# Hawat ## Table of Contents * [Summary](#summary) * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [SSH](#ssh) * [HTTP](#http) * [OS](#os) * [Nmap OS Discovery Scan](#nmap-os-discovery-scan) * [Nmap Scripts Scan](#nmap-scripts-scan) * [Nmap Aggresive Scan](#nmap-aggresiv...
![alt text](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/wpscan_logo_407x80.png "WPScan - WordPress Security Scanner") v3 BETA [![Gem Version](https://badge.fury.io/rb/wpscan.svg)](https://badge.fury.io/rb/wpscan) [![Build Status](https://travis-ci.org/wpscanteam/wpscan-v3.svg?branch=master)](https://t...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.3.1"> <img src="https://img.shi...
<p align="center"> <a href="https://github.com/trimstray/the-book-of-secret-knowledge"> <img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master"> </a> </p> <p align="center">"<i>Knowledge is powerful, be careful how you us...
Awesome Mac === <!--rehype:style=font-size: 38px; border-bottom: 0; display: flex; min-height: 260px; align-items: center; justify-content: center;--> [![Awesome](https://jaywcjlove.github.io/sb/ico/awesome.svg)](https://github.com/sindresorhus/awesome) [![jaywcjlove/sb](https://jaywcjlove.github.io/sb/lang/chinese.sv...
![alt text](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/wpscan_logo_407x80.png "WPScan - WordPress Security Scanner") [![Build Status](https://travis-ci.org/wpscanteam/wpscan.svg?branch=master)](https://travis-ci.org/wpscanteam/wpscan) [![Code Climate](https://img.shields.io/codeclimate/github/wpscan...
# Awesome-Selfhosted [![Awesome](_static/awesome.png)](https://github.com/sindresorhus/awesome) [![](https://github.com/awesome-selfhosted/awesome-selfhosted-data/actions/workflows/check-dead-links.yml/badge.svg)](https://github.com/awesome-selfhosted/awesome-selfhosted/issues/3558) [![](https://github.com/awesome-sel...
# OSCPRepo This is a list of resources and scripts that I have been gathering (and continuing to gather) in preparation for the OSCP. Now achieved, this repo will continue to grow it's resources for future certifications. These are all free resources on the Internet, so feel free to use however you want to help you in...
![logo](docs/images/logo.png) [中文简体](./README.md) # ObserverWard | 类别 | 说明 | |-----|--------------------------------------------------------| | 作者 | [三米前有蕉皮](https://github.com/cn-kali-team) | | 团队 | [0x727](https://github.com/0x727) 未来一段时间将陆续开源工具 ...
### IP `10.10.10.37` # Recon ### nmap `nmap -sC -sV 10.10.10.37 -o Blocky.nmap` ``` Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-23 16:26 EST Nmap scan report for 10.10.10.37 Host is up (0.049s latency). Not shown: 996 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.5a 22/tcp ...
[![rootx](https://img.shields.io/website?label=root-X.dev&style=for-the-badge&url=https://root-x.dev/)](https://root-x.dev/) [![Linkedin](https://img.shields.io/website?label=Linkedin&style=for-the-badge&url=https://www.linkedin.com/in/mostafa-bn-tamam-96308216a/)](https://www.linkedin.com/in/mostafa-bn-tamam-96308216a...
<details> <summary><strong>HackTricks in </strong><a href="https://twitter.com/carlospolopm"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summa...
# PENTESTING-BIBLE # hundreds of ethical hacking &amp; penetration testing &amp; red team &amp; cyber security &amp; computer science resources. # ALMOST 2000 LINKS. # ALMOST 2000 PDF FILES ABOUT DIFFERENT FIELDS OF HACKING . # note:most of the pdf files is different than the links which means there is now almost 4000...
## 👑 What is KingOfBugBounty Project ? 👑 Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understandi...
# HackTheBox CTF Cheatsheet This cheatsheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list on our experience. Please sh...
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.38.0-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
[![Sn1perSecurity](https://sn1persecurity.com/images/Sn1perSecurity-Attack-Surface-Management-header2.png)](https://sn1persecurity.com) [![GitHub release](https://img.shields.io/github/release/1N3/Sn1per.svg)](https://github.com/1N3/Sn1per/releases) [![GitHub issues](https://img.shields.io/github/issues/1N3/Sn1per.svg...
## Author: <a href="https://github.com/brimstone">@brimstone</a></b><br /> This is just a backup ## Security <table> <tr><td><a href="https://twitter.com/tmpout"><img src="https://pbs.twimg.com/profile_images/1361836075044462595/bUqtK3DT_200x200.jpg"></a></td><td> <b><a href="https://twitter.com/tmpout">@tmpout</a> (t...
# Pentesting Cheatsheets Author | Title -- | -- **1** I-red Team | [Pentesting Cheatsheets]( https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets ) **2** Chris Dale | [BurpSuite Cheatsheet v1.0](/.PentestingCheatsheets/cheetsheets.md) **3** web pentesting Cheetsheet (Intermidiate fav)](h...
# [Django REST framework][docs] [![build-status-image]][travis] [![pypi-version]][pypi] **Awesome web-browsable Web APIs.** Full documentation for the project is available at [http://www.django-rest-framework.org][docs]. --- **Note**: We have now released Django REST framework 3.0. For older codebases you may want...
# Bug-bounty-methodology Part 1. 30 days(3 hrs average) Learn it in a sequece:- Watch this video first:- How to shot web by jason haddix Study these vulns first:- 1. IDOR 2. XSS 3. SQLi 4. Directory traversals 5. Broken web authentications Tools to learn:- 1. Sublist3r 2. Burp(In-depth) 3. NMa...
# Meteor Tool This part of the code-base is Meteor's CLI tool that reads commands from the user, builds the application, adds runtime code, provides an interface to Meteor Services ([Accounts](https://www.meteor.com/services/developer-accounts), [Packages](https://www.meteor.com/services/package-server), [Build Farms]...
# Writeup <h1 align="center"> <br> <a href="https://www.hackthebox.eu/home/machines/profile/192"><img src="images/img.png" alt="Writeup"></a> <br> </h1> <h4 align="center"> Author: jkr</h4> *** __Machine IP__: 10.10.10.138 __DATE__ : 9/06/2019 __START TIME__: 2:17 PM *** ## NMAP ![](images/nmap.png) We...
# 超棒黑客必备表单 [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) [English Version](https://github.com/carpedm20/awesome-hacking) 一份精美的黑客必备表单,灵感来自于[超棒的机器学习](https://github.com/josephmisiti/awesome-machine-learning/),如...
# Awesome List Updates on Jun 08 - Jun 14, 2020 69 awesome lists updated this week. [🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/week/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63...
# SecNotes ## Introduction Welcome to my another writeup! In this HackTheBox [SecNotes](https://app.hackthebox.com/machines/SecNotes) machine, you'll learn: Exploiting second-order SQL injection, privilege escalation via WSL, and more! Without further ado, let's dive in. - Overall difficulty for me (From 1-10 stars)...
# Bug Bounty RoadMap Bug Bounty is the technique/process of finding bugs on programs by using different methodology and reporting those bugs to the respective program organizing company. After reporting the bug you receive a amount called bounty. Not all program provides you bounty for submitting for bug , programs li...
--- title: "CMSeeK" category: "scanner" type: "CMS" state: "released" appVersion: "v.1.1.3" usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities" --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -----------...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
# Hip Flask ![image](https://user-images.githubusercontent.com/5285547/132726387-9ff991d7-a6c3-456b-9e61-e9f5dc182a7a.png) Room Link: https://tryhackme.com/room/hipflask ## Task 1 Introduction Deploy! (deply the machine) ## Task 2 ### Introduction Outline Hip Flask is a beginner to intermediate level walkthroug...
### IP `10.10.10.60` # Recon ### nmap `nmap -sC -sV 10.10.10.60 -oN Sense.nmap` ``` Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-25 05:13 EST Nmap scan report for 10.10.10.60 Host is up (0.12s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http lighttpd 1.4.35 |_htt...
# SQLMap - Cheetsheat ## Basic arguments for SQLmap ### Generic ```bash -u "<URL>" -p "<PARAM TO TEST>" --user-agent=SQLMAP --random-agent --threads=10 --risk=3 #MAX --level=5 #MAX --dbms="<KNOWN DB TECH>" --os="<OS>" --technique="UB" #Use only techniques UNION and BLIND in that order (default "BEUSTQ") --batc...
# awesome-web-hacking This list is for anyone wishing to learn about web application security but do not have a starting point. You can help by sending Pull Requests to add more information. If you're not inclined to make PRs you can tweet me at `@infoslack` Table of Contents ================= * [Books](#books) ...
# bugbounty_tools Collection of scripts and tools used during bug bounty work. This will be the location of my automation scripts created for my own personal use, and occassionally public released
[![Github Release Version](https://img.shields.io/badge/release-V1.0-blue.svg)](https://github.com/flipkart-incubator/Astra) [![Github Release Version](https://img.shields.io/badge/python-2.7-blue.svg)](https://github.com/flipkart-incubator/Astra) [![BH 2018 USA](https://img.shields.io/badge/Black%20Hat%20Arsenal-USA%...
# UT99 ## Table of Contents * [Executive Summary](#executive-summary) * [Attack Vectors](#attack-vectors) * [Recommendations](#recommendations) * [Methodology](#methodology) * [Reconnaissance](#reconnaissance) * [Enumeration](#enumeration) * [Gaining Access](#gaining-access) * [Maintaining Access](#maintai...
# Awesome-Cyber-Security-List NOTE: This list is not as up to date as the html bookmarks list that is located in the repo! Please import the html bookmarks into your browser for the most up to date list and cleaner layout, since it is organized into folders rather than one large list. Bookmarks ========= ## Everythin...
# HackTheBox CTF Cheatsheet This cheatsheet is aimed at CTF players and beginners to help them sort Hack The Box Labs on the basis of operating system and difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list based on our experience. Please ...
# Penetration testing with Gobuster & Fission [Gobuster](https://github.com/OJ/gobuster) is a tool for bruteforcing websites Directory/File, DNS and VHost written in Go. It enables penetration testing and and brute forcing for hackers and testers. In this tutorial we will use Gobuster with Fission's binary environment...
# Responder/MultiRelay # IPv6/IPv4 LLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay. Author: Laurent Gaffie <laurent.gaffie@gmail.com > https://g-laurent.blogspot.com ## Intro ## Responder is an LLMNR, NBT-NS and MDNS poisoner. ## Features ## - Dual IPv6/IPv4 stack. - Built-in SMB Auth server. Supports NTLMv1...
<h1 align="center"> <br> <a href="https://github.com/R0X4R/Garud/"><img src=".github/img/garud.png" width="500px" alt="Garud"></a> </h1> <h4 align="center">An automation tool ...
# SQLMap - Cheetsheat ## Basic arguments for SQLmap ### Generic ```bash -u "<URL>" -p "<PARAM TO TEST>" --user-agent=SQLMAP --random-agent --threads=10 --risk=3 #MAX --level=5 #MAX --dbms="<KNOWN DB TECH>" --os="<OS>" --technique="UB" #Use only techniques UNION and BLIND in that order (default "BEUSTQ") --batc...
Hello and welcome to my next write up. This will be on Hackthebox box called opensource. Let's jump right into it. First we will start nmap to see which ports are open. ``` # nmap -T4 -sC -sV -p- 10.10.11.164 Starting Nmap 7.91 ( https://nmap.org ) at 2022-09-10 08:33 EDT Nmap scan report for 10.10.11.164 (...
# MassVulScan :alien: [Version Francaise](https://github.com/choupit0/MassVulScan/blob/master/README-FR.md) [![Generic badge](https://img.shields.io/badge/Version-1.9.2-<COLOR>.svg)](https://github.com/choupit0/MassVulScan/releases/tag/v1.9.2) [![GPLv3 license](https://img.shields.io/badge/License-GPLv3-blue.svg)](http...
<h1 align="center">Resolvers <a href="https://twitter.com/intent/tweet?text=Trickest%20Resolvers%20-%20The%20most%20exhaustive%20list%20of%20reliable%20DNS%20resolvers%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fresolvers&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?l...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v1.7.0"> <img src="https://img.shi...
### The credit belong to the raidforums user. Please give rep+ to them. https://raidforums.com/Thread-Tutorial-AdmireToo-HTB?page=9
<!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section --> [![All Contributors](https://img.shields.io/badge/all_contributors-103-orange.svg?style=flat-square)](#contributors-) <!-- ALL-CONTRIBUTORS-BADGE:END --> <div align=center> ![img](https://github.com/brave-people/Dev-Event/blob/master/static/...