text stringlengths 9 334k |
|---|
# Evil Twin - Mark VII
Learn how to set up a fake authentication web page on a fake WiFi network.
Read the comments in these two files to get a better understanding on how all of it works:
* [/src/evil-twin/index.php](https://github.com/ivan-sincek/evil-twin/blob/master/src/evil-twin/index.php)
* [/src/evil-twin/MyP... |
<p align="center">
<img src="https://i.imgur.com/VeEYEkT.png" alt="Hacker roadmap" /><br>
<img src="https://img.shields.io/github/issues/Sundowndev/hacker-roadmap.svg" alt="GitHub issues">
<img src="https://img.shields.io/badge/license-MIT-brightgreen.svg" alt="license">
</p>
This repository is a guide for... |
<p align='center'>
<img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br>
<a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.3"><img src="https://img.shields.io/badge/Version-1.1.3-brightgreen.svg?style=style=flat-square" alt="version"></a>
<a href="https://github.com/Tuhinshubhra/CMSeeK/"... |
# Bug Bounty Resources
Some resources for learning and updating your methodology.
## Write-ups
| Link | Tags |
| :------------- | ------------- |
| https://ysamm.com/?p=763 | `XSS` `OAuth` |
| https://ahmdhalabi.medium.com/pii-disclosure-of-apple-users-10k-d1e3d29bae36 | `PII` `IDOR` |
| https://blog.shiftleft.io/a... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![coverage-status-image]][codecov]
[![pypi-version]][pypi]
[](https://gitter.im/tomchristie/django-rest-framework?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge)
**Awesome... |
# 0day
############################
# VIP Tools
############################
Acunetix
Hotspot Shield
AppSpider 7
L0phtCrack 7 (Win64)
Asoftis IP Changer
Metasploit Console
Maltego xl
Avira Phantom VPN
Metasploit Web UI.url
Betternet
Micro Focus Fortify Audit Workbench
BlackBullet 2.1.6
Micro Focus Fortify Custom Rul... |
# One-Liners [](https://awesome.re)
###### Thanks to all who create these Awesome One Liners❤️
----------------------

---------------------------
# Subdomain Enu... |
# OSCP personal cheatsheet
# Enumeration
> nmap -sn -v <IP>/CIDR
> nmapAutomator <IP> All
> autorecon <IP>/CIDR
# NMAP
**TCP**
> sudo -sS -sC -sV -oA <NAME>.tcp <IP> -v
**UDP**
> sudo -sU -sS -sC -sV -oA <NAME>.udp <IP> -v
# FTP - 21
**Brute force**
> hydra -V -f -L <USERS_LIST> -P <PASSWORDS_LIST> ftp://<IP> -... |
# Crime: voice translation challenge (featuring IBM Watson)
**[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/cKTRtvhm710)** |
# Learn365
This repository contains all the information shared during my Learn 365 Challenge. Learn 365 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for the whole year, it can be anything from infosec to general life. Follow me on Twitter for Regular Updates: [Harsh... |
# OSCP-Archives
During my journey to getting the OSCP, I always come across many articles, Git repo, videos, and other types of sources of great and valuable information that helps me during my studies. While having all of these in a bookmark folder is great, I wanted to also build a curated list of the resources that... |
## Pentester Tools ?
Here is a selection of tools to install on a Kali Linux distribution 64 bits (https://www.kali.org/)
Kali Linux Tools Listing : https://tools.kali.org/tools-listing
## Installation
1. Ensure you have root access via SSH
2. Install [Ansible](https://www.ansible.com/) on your local machine
3. Insta... |
# Timelapse - HackTheBox - Writeup
Windows, 20 Base Points, Easy

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports related to ```SMB```, ```wsman``` etc.
***User 1***: By enumerat... |
# PEN TESTERS (Under Development)
1. Company have PEN TESTERS team to conduct pentesting.
2. Company HIRING PEN TEST SERVICES - on hourly basis or project basis.
- A list of [Privacy & Security Resources](https://docs.hackliberty.org/books/privacy-security/page/privacy-security-resources)
# PentestingEbook overvi... |
# 100daysofcyber
Tracking my progress for 100 days learning something new daily....
## Day 1
Revisiting Computer Networks:
1. [Computer Networking Full Course - OSI Model Deep Dive with Real Life Examples](https://www.youtube.com/watch?v=IPvYjXCsTg8&t=2063s)
2. [OSI MODEL in easiest Way (best way to remember OSI lay... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.2.2">
<img src="https://img.shi... |
# ToolsRus
Practise using tools such as dirbuster, hydra, nmap, nikto and metasploit
[ToolsRus](https://tryhackme.com/room/toolsrus)
## Topic's
* Web Enumeration
* Web Application Analysis
* Network Enumeration
* Brute Forcing HTTP-GET
* Exploiting Tomcat
## Task 1 ToysRus
Your challenge is to use the tools list... |
# Transparent Policy Block Analyzer
<img src="screenshot.png" width="600px">
What does it do? Have you ever wanted to run NGINX App Protect in transparent mode, and be able to determine what requests _would_ be blocked if it were in blocking mode? Now you can.
This utility receives App Protect WAF's syslog messages ... |
# Antique
URL: https://app.hackthebox.com/machines/Antique
Level: Easy
Date 16 Oct 2021
## Walkthrough
- [Enumeration](#enumeration)
- [User flag](#user-flag)
- [Privesc](#privesc)
# Enumeration
## NMAP
Let's start with a basic nmap scan:
```
# Nmap 7.91 scan initiated Sat Oct 16 15:00:00 2021 as: nmap -T4 -p-... |
<p align='center'>
<img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br>
<a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.3"><img src="https://img.shields.io/badge/Version-1.1.3-brightgreen.svg?style=style=flat-square" alt="version"></a>
<a href="https://github.com/Tuhinshubhra/CMSeeK/"... |

# Cybersecurity-Roadmap
# The Ultimate Hacker's Roadmap 2022
Donwload the roadmaps here: https://github.com/0xTRAW/Cybersecurity-Roadmap/tree/main/maps
1. Basic Computer Skills - Computer skills refer to the knowledge and abilities required to operate computers and related tech... |
# Pandora - HackTheBox - Writeup
Linux, 20 Base Points, Easy

## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```161``` (UDP).
***User 1***: By scanning for UD... |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https://maven-badges.herokuapp.com/maven-c... |
# pythem - Penetration Testing Framework




: 超过18K, 包括Markdown和Json两种格式
- [安全资源收集类的 Repo](https://github.com/alphaSeclab/awesome-security-collection): 1000+各类安全资源收集的Github Repo
- [全平台逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering):
- Windows平台安全: PE/DLL/DL... |
<p align="center">
<img alt="opensnitch" src="https://raw.githubusercontent.com/evilsocket/opensnitch/master/ui/opensnitch/res/icon.png" height="160" />
<p align="center">
<img src="https://github.com/evilsocket/opensnitch/workflows/Build%20status/badge.svg" />
<a href="https://github.com/evilsocket/opensni... |
WEB CTF CheatSheet
===
Table of Contents
=================
* [Webshell](#php-webshell)
* [Reverse Shell](#reverse-shell)
* [PHP Tag](#php-tag)
* [PHP Weak Type](#php-weak-type)
* [PHP Feature](#php-其他特性)
* [Bypass open\_basedir](#open_basedir繞過)
* [Bypass disable\_functions](#disable_functions繞過)
* [Com... |
# Tenet - HackTheBox
Linux, 30 Base Points, Medium
## Machine

## Tenet Solution
### User
So let's start with ```nmap``` scanning:
```console
┌─[evyatar@parrot]─[/hackthebox/Tenet]
└──╼ $nmap -sC -sV -oA nmap/Tenet 10.10.10.223
Starting Nmap 7.80 ( https://nmap.org ) at 2021-04-01... |
<!---
DO NOT EDIT THIS FILE!!!
This file is statically generated by the scripts in the scripts/ folder!!!
- If you want to add a youtube channel, edit the data/ytChannels.yml file!!!
-->
# InfoSec Resources
## CTFs
- **PicoCTF**: [link](https://picoctf.org/) A very great start for anyone looking to ge... |
# Awesome List Updates on Oct 15, 2019
20 awesome lists updated today.
[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63c2f&id=36a103854c)... |
- [IPVS](#ipvs)
- [What is IPVS](#what-is-ipvs)
- [IPVS vs. IPTABLES](#ipvs-vs-iptables)
- [When ipvs falls back to iptables](#when-ipvs-falls-back-to-iptables)
- [Run kube-proxy in ipvs mode](#run-kube-proxy-in-ipvs-mode)
- [Prerequisite](#prerequisite)
- [Local UP Cluster](#local-up-cluster)
- [... |
<h1 align="center">
<br>
<a href="https://nuclei.projectdiscovery.io"><img src="static/nuclei-logo.png" width="200px" alt="Nuclei"></a>
</h1>
<h4 align="center">Fast and customisable vulnerability scanner based on simple YAML based DSL.</h4>
<p align="center">
<img src="https://img.shields.io/github/go-mod/go-ve... |
# SpringBoot+Docker重构宜立方商城
     
- [What is IPVS](#what-is-ipvs)
- [IPVS vs. IPTABLES](#ipvs-vs-iptables)
- [When IPVS falls back to IPTABLES](#when-ipvs-falls-back-to-iptables)
- [Run kube-proxy in IPVS mode](#run-kube-proxy-in-ipvs-mode)
- [Prerequisite](#prerequisite)
- [Local UP Cluster](#local-up-cluster)
- [... |
# OSCP / HackTheBox
These are my notes and exploits I wrote while preparing for the OSCP and playing CTF on HackTheBox.
## Cheatsheet usage
The cheatsheet is meant to be as searchable as possible.
A such you have the following options to search for an entry:
1. You can search for a known **toolname**:
- example: "... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![coverage-status-image]][codecov]
[![pypi-version]][pypi]
**Awesome web-browsable Web APIs.**
Full documentation for the project is available at [http://www.django-rest-framework.org][docs].
---
**Note**: We have now released Django REST framework 3... |
[](https://travis-ci.org/ytdl-org/youtube-dl)
youtube-dl - download videos from youtube.com or other video platforms
- [INSTALLATION](#installation)
- [DESCRIPTION](#description)
- [OPTIONS](#options)
- [CONFIGURATION](#configuration)
- [OUTP... |
<p align="center">
<img height="128" src="./awesome-yara.png" alt="Awesome YARA" title="Awesome YARA">
</p>
<h1 align="center">Awesome YARA</h1>
A curated list of awesome YARA rules, tools, and resources. Inspired by [awesome-python](https://github.com/vinta/awesome-python) and [awesome-php](https://github.com/zia... |
# Node Version Manager [][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/684)... |
- [创建](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/文件操作/创建.md)
- [Windows查找文件](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/文件操作/Windows查找文件.md)
- [Linux查找文件](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/文件操作/Linux查找文件.md)
- [解压](https://github.com/xiaoy-sec/Pentest_Note/blob/... |
<h1 align="center">
<br>
<a href=""><img src="https://raw.githubusercontent.com/lutfumertceylan/top25-parameter/master/top25.jpg" alt=""></a>
</h1>
<h4 align="center">For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon</h4>
<p align="center">
<a href=""><img ... |
# BugBounty Image
The image can be pulled from Docker Hub and started as following:
```
docker run -v $HOME/data:/data -v $HOME/wordlists:/wordlists --rm -it docker.io/nodyd/bb
```
*Disclaimer:* The image is massive big :D
A recommended approach is to use the following shell function to start the container, e.g., `... |
# CTF HackTheBox 2021 Cyber Apocalypse 2021 - Extortion
Category: Web, Points: 300

# Extortion Solution
Let's start the docker and browse it:

By intercepting the request on "AIRSHIP" button click with [Burp](https://portswigger.net/burp) we can see the f... |
# Tally
#### 10.10.10.59
###### Dotaplayer365
```
nmap 10.10.10.59
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
81/tcp open hosts2-ns
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
808/tcp open ccproxy-http
1433/tcp open ms-sql-s
```
Checking the port 80 shows us... |
# Awesome Windows Red Team [](https://awesome.re)
> A curated list of awesome Windows talks, tools and resources for Red Teams, from beginners to ninjas.
## Contents
* [Books](#books)
* [Courses](#courses)
* [System Architecture](#system-architecture)
* [Active Directory](#a... |
# OSCP Methodology
Overview
---------
- [Port Scan](#port-scan)
- [Port 21 (FTP)](#port-21-ftp)
- [Port 22 (SSH)](#port-22-ssh)
- [Port 25 (SMTP)](#port-25-smtp)
- [Port 53 (DNS)](#port-53-dns)
- [Port 69 (udp/TFTP)](#port-69-udptftp)
- [Port 79 (FINGER)](#port-79-finger)
- [Port 80, 443 (HTTP/HTTPS)](#port-80-443-htt... |
# kiba
Identify the critical security flaw in the data visualization dashboard, that allows execute remote code execution.
[kiba](https://tryhackme.com/room/kiba)
## Topic's
- Network Enumeration
- CVE-2019-7609 - Kibana Timelion < 5.6.15 and 6.6.1
- Capabilities
## Appendix archive
Password: `1 kn0w 1 5h0uldn'7!... |
# MACHINE CHALLENGE: VALENTINE
## Challenge Description
##### Own system
Type below the hash that is inside the root.txt file in the machine. The file
can be found under /root on Linux machines and at the Desktop of the
Administrator on Windows.
##### Own User
Type below the hash that is inside the user.txt file in ... |
<p align="center">
<a href="https://github.com/trimstray/the-book-of-secret-knowledge">
<img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master">
</a>
</p>
<p align="center">"<i>Knowledge is powerful, be careful how you us... |
<h1 align="center">mksub <a href="https://twitter.com/intent/tweet?text=mksub%20-%20Generate%20tens%20of%20thousands%20of%20subdomain%20combinations%20in%20a%20matter%20of%20seconds%20%40trick3st%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fmksub&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/bad... |
# Hawat
## Table of Contents
* [Summary](#summary)
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [SSH](#ssh)
* [HTTP](#http)
* [OS](#os)
* [Nmap OS Discovery Scan](#nmap-os-discovery-scan)
* [Nmap Scripts Scan](#nmap-scripts-scan)
* [Nmap Aggresive Scan](#nmap-aggresiv... |
 v3 BETA
[](https://badge.fury.io/rb/wpscan)
[](https://t... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.3.1">
<img src="https://img.shi... |
<p align="center">
<a href="https://github.com/trimstray/the-book-of-secret-knowledge">
<img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master">
</a>
</p>
<p align="center">"<i>Knowledge is powerful, be careful how you us... |
Awesome Mac
===
<!--rehype:style=font-size: 38px; border-bottom: 0; display: flex; min-height: 260px; align-items: center; justify-content: center;-->
[](https://github.com/sindresorhus/awesome) [
[](https://travis-ci.org/wpscanteam/wpscan)
[](https://github.com/sindresorhus/awesome) [](https://github.com/awesome-selfhosted/awesome-selfhosted/issues/3558) [ in preparation for the OSCP. Now achieved, this repo will continue to grow it's resources for future certifications. These are all free resources on the Internet, so feel free to use however you want to help you in... |

[中文简体](./README.md)
# ObserverWard
| 类别 | 说明 |
|-----|--------------------------------------------------------|
| 作者 | [三米前有蕉皮](https://github.com/cn-kali-team) |
| 团队 | [0x727](https://github.com/0x727) 未来一段时间将陆续开源工具 ... |
### IP
`10.10.10.37`
# Recon
### nmap
`nmap -sC -sV 10.10.10.37 -o Blocky.nmap`
```
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-23 16:26 EST
Nmap scan report for 10.10.10.37
Host is up (0.049s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD 1.3.5a
22/tcp ... |
[](https://root-x.dev/)
[](https://www.linkedin.com/in/mostafa-bn-tamam-96308216a... |
<details>
<summary><strong>HackTricks in </strong><a href="https://twitter.com/carlospolopm"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summa... |
# PENTESTING-BIBLE
# hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
# ALMOST 2000 LINKS.
# ALMOST 2000 PDF FILES ABOUT DIFFERENT FIELDS OF HACKING .
# note:most of the pdf files is different than the links which means there is now almost 4000... |
## 👑 What is KingOfBugBounty Project ? 👑
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understandi... |
# HackTheBox CTF Cheatsheet
This cheatsheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list on our experience. Please sh... |
# Node Version Manager [][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/684)... |
[](https://sn1persecurity.com)
[](https://github.com/1N3/Sn1per/releases)
[
**2** Chris Dale | [BurpSuite Cheatsheet v1.0](/.PentestingCheatsheets/cheetsheets.md)
**3** web pentesting Cheetsheet (Intermidiate fav)](h... |
# [Django REST framework][docs]
[![build-status-image]][travis]
[![pypi-version]][pypi]
**Awesome web-browsable Web APIs.**
Full documentation for the project is available at [http://www.django-rest-framework.org][docs].
---
**Note**: We have now released Django REST framework 3.0. For older codebases you may want... |
# Bug-bounty-methodology
Part 1. 30 days(3 hrs average)
Learn it in a sequece:-
Watch this video first:- How to shot web by jason haddix
Study these vulns first:-
1. IDOR
2. XSS
3. SQLi
4. Directory traversals
5. Broken web authentications
Tools to learn:-
1. Sublist3r
2. Burp(In-depth)
3. NMa... |
# Meteor Tool
This part of the code-base is Meteor's CLI tool that reads commands from the
user, builds the application, adds runtime code, provides an interface to Meteor
Services ([Accounts](https://www.meteor.com/services/developer-accounts),
[Packages](https://www.meteor.com/services/package-server),
[Build Farms]... |
# Writeup
<h1 align="center">
<br>
<a href="https://www.hackthebox.eu/home/machines/profile/192"><img src="images/img.png" alt="Writeup"></a>
<br>
</h1>
<h4 align="center"> Author: jkr</h4>
***
__Machine IP__: 10.10.10.138
__DATE__ : 9/06/2019
__START TIME__: 2:17 PM
***
## NMAP

We... |
# 超棒黑客必备表单 [](https://github.com/sindresorhus/awesome)
[English Version](https://github.com/carpedm20/awesome-hacking)
一份精美的黑客必备表单,灵感来自于[超棒的机器学习](https://github.com/josephmisiti/awesome-machine-learning/),如... |
# Awesome List Updates on Jun 08 - Jun 14, 2020
69 awesome lists updated this week.
[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/week/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63... |
# SecNotes
## Introduction
Welcome to my another writeup! In this HackTheBox [SecNotes](https://app.hackthebox.com/machines/SecNotes) machine, you'll learn: Exploiting second-order SQL injection, privilege escalation via WSL, and more! Without further ado, let's dive in.
- Overall difficulty for me (From 1-10 stars)... |
# Bug Bounty RoadMap
Bug Bounty is the technique/process of finding bugs on programs by using different methodology and reporting those bugs to the respective program organizing company. After reporting the bug you receive a amount called bounty. Not all program provides you bounty for submitting for bug , programs li... |
---
title: "CMSeeK"
category: "scanner"
type: "CMS"
state: "released"
appVersion: "v.1.1.3"
usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities"
---
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
-----------... |
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the... |
# Hip Flask

Room Link: https://tryhackme.com/room/hipflask
## Task 1
Introduction Deploy! (deply the machine)
## Task 2
### Introduction Outline
Hip Flask is a beginner to intermediate level walkthroug... |
### IP
`10.10.10.60`
# Recon
### nmap
`nmap -sC -sV 10.10.10.60 -oN Sense.nmap`
```
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-25 05:13 EST
Nmap scan report for 10.10.10.60
Host is up (0.12s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http lighttpd 1.4.35
|_htt... |
# SQLMap - Cheetsheat
## Basic arguments for SQLmap
### Generic
```bash
-u "<URL>"
-p "<PARAM TO TEST>"
--user-agent=SQLMAP
--random-agent
--threads=10
--risk=3 #MAX
--level=5 #MAX
--dbms="<KNOWN DB TECH>"
--os="<OS>"
--technique="UB" #Use only techniques UNION and BLIND in that order (default "BEUSTQ")
--batc... |
# awesome-web-hacking
This list is for anyone wishing to learn about web application security but do not have a starting point.
You can help by sending Pull Requests to add more information.
If you're not inclined to make PRs you can tweet me at `@infoslack`
Table of Contents
=================
* [Books](#books)
... |
# bugbounty_tools
Collection of scripts and tools used during bug bounty work. This will be the location of my automation scripts created for my own personal use, and occassionally public released
|
[](https://github.com/flipkart-incubator/Astra)
[](https://github.com/flipkart-incubator/Astra)
[
* [Attack Vectors](#attack-vectors)
* [Recommendations](#recommendations)
* [Methodology](#methodology)
* [Reconnaissance](#reconnaissance)
* [Enumeration](#enumeration)
* [Gaining Access](#gaining-access)
* [Maintaining Access](#maintai... |
# Awesome-Cyber-Security-List
NOTE: This list is not as up to date as the html bookmarks list that is located in the repo!
Please import the html bookmarks into your browser for the most up to date list and cleaner layout, since it is organized into folders rather than one large list.
Bookmarks
=========
## Everythin... |
# HackTheBox CTF Cheatsheet
This cheatsheet is aimed at CTF players and beginners to help them sort Hack The Box Labs on the basis of operating system and difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list based on our experience. Please ... |
# Penetration testing with Gobuster & Fission
[Gobuster](https://github.com/OJ/gobuster) is a tool for bruteforcing websites Directory/File, DNS and VHost written in Go. It enables penetration testing and and brute forcing for hackers and testers. In this tutorial we will use Gobuster with Fission's binary environment... |
# Responder/MultiRelay #
IPv6/IPv4 LLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay.
Author: Laurent Gaffie <laurent.gaffie@gmail.com > https://g-laurent.blogspot.com
## Intro ##
Responder is an LLMNR, NBT-NS and MDNS poisoner.
## Features ##
- Dual IPv6/IPv4 stack.
- Built-in SMB Auth server.
Supports NTLMv1... |
<h1 align="center">
<br>
<a href="https://github.com/R0X4R/Garud/"><img src=".github/img/garud.png" width="500px" alt="Garud"></a>
</h1>
<h4 align="center">An automation tool ... |
# SQLMap - Cheetsheat
## Basic arguments for SQLmap
### Generic
```bash
-u "<URL>"
-p "<PARAM TO TEST>"
--user-agent=SQLMAP
--random-agent
--threads=10
--risk=3 #MAX
--level=5 #MAX
--dbms="<KNOWN DB TECH>"
--os="<OS>"
--technique="UB" #Use only techniques UNION and BLIND in that order (default "BEUSTQ")
--batc... |
Hello and welcome to my next write up. This will be on Hackthebox box called opensource.
Let's jump right into it.
First we will start nmap to see which ports are open.
```
# nmap -T4 -sC -sV -p- 10.10.11.164
Starting Nmap 7.91 ( https://nmap.org ) at 2022-09-10 08:33 EDT
Nmap scan report for 10.10.11.164 (... |
# MassVulScan :alien: [Version Francaise](https://github.com/choupit0/MassVulScan/blob/master/README-FR.md)
[](https://github.com/choupit0/MassVulScan/releases/tag/v1.9.2)
[](http... |
<h1 align="center">Resolvers <a href="https://twitter.com/intent/tweet?text=Trickest%20Resolvers%20-%20The%20most%20exhaustive%20list%20of%20reliable%20DNS%20resolvers%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fresolvers&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?l... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v1.7.0">
<img src="https://img.shi... |
### The credit belong to the raidforums user. Please give rep+ to them.
https://raidforums.com/Thread-Tutorial-AdmireToo-HTB?page=9 |
<!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section -->
[](#contributors-)
<!-- ALL-CONTRIBUTORS-BADGE:END -->
<div align=center>
![img](https://github.com/brave-people/Dev-Event/blob/master/static/... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.