text
stringlengths
9
334k
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
# XML External Entity > An XML External Entity attack is a type of attack against an application that parses XML input and allows XML entities. XML entities can be used to tell the XML parser to fetch specific content on the server. **Internal Entity**: If an entity is declared within a DTD it is called as internal e...
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.35.3-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
### CTF-Challenges-Machines-Writeups-Walkthroughs WriteUps/ Walkthroughs for CTF challenges or machines - Twitter [@1r0Dm48O](https://twitter.com/1r0Dm48O) | Challenge/Machine | Writeup/Walkthrough | MD5 | Posted On | | ------------ | ------------ | ------------ | ------------ | | [peaCTF2019-Crypyo-School](https://2...
# SetupHelpDesk(Under Development) Index | Contents --- | --- ResetHacker | [Hacker Daily Utility and OSINT](https://github.com/RESETHACKER-COMMUNITY/Resources/blob/main/setup/HackersUtilities.md) Crhuber | [Linix Cheetsheet ](https://github.com/crhuber/linux-cheatsheet) 0xblackbird - Developer Tools | [Developer Too...
sqlmap == sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from datab...
# InfoSec Resources ## Tools ### General - https://www.metasploit.com/ - https://www.zaproxy.org/ - https://nmap.org/ - https://www.metasploit.com/ - https://www.wireshark.org/ - https://portswigger.net/burp - https://www.wigle.net/ - https://www.openwall.com/john/ - https://www.aircrack-ng.org/ - https://finchsec.c...
<div align="center"> <img width="500" height="350" src="iot_awesome_logo.svg" alt="Awesome"> <br /> </div> # Awesome Embedded and IoT Security [![Awesome](https://awesome.re/badge.svg)](https://awesome.re) > A curated list of awesome resources about embedded and IoT security. The list contains software and hardwar...
<h1 align="left"> <img src="static/nuclei-logo.png" alt="nuclei" width="200px"></a> <br> </h1> [![License](https://img.shields.io/badge/license-MIT-_red.svg)](https://opensource.org/licenses/MIT) [![Go Report Card](https://goreportcard.com/badge/github.com/projectdiscovery/nuclei)](https://goreportcard.com/report/...
# Pit - HackTheBox - Writeup Linux, 30 Base Points, Medium ## Machine ![‏‏Pit.JPG](images/Pit.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```9090```. ***User***: Using ```nmap``` UDP port scanning we found another two ports ```1...
# Cybersecurity Notes My Markdown notes for all things cybersecurity. Best viewed in Obsidian. Read on to find out how to install this repository, and where to start finding the information you need. **DISCLAIMER:** These notes are for educational purposes only. Use them as a learning resource or a reference guide wh...
NmaptoCSV ============ Description ----------- A simple python script to convert Nmap output to CSV Features -------- * Support of Nmap version 5, 6, 7 normal format output (default format, `-oN` option) * Support of Nmap any version Grepable format output (`-oG` option) and XML (`-oX`) * Parsing main information : I...
Resources for Mobile Application Testing # Android ### Blogs, Papers, How To's * [An Android Hacking Primer](https://medium.com/swlh/an-android-hacking-primer-3390fef4e6a0) * [Secure an Android Device](https://source.android.com/security) * [Security tips](https://developer.android.com/training/articles/security-t...
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
<br /> <p align="center"> <a href="https://hub.docker.com/u/l34r00t"> <img alt="mainRecon for bugbounty hunter" src="img/banner.png" width="600" /> </a> <h3 align="center">mainRecon</h3> </p> <p align="center"> <a href="https://github.com/l34r00t/"><img alt="GitHub code size in bytes...
# OSCP Links Just a collection of links useful to take OSCP. ### Buffer Overflows - [dostackbufferoverflowgood](https://github.com/justinsteven/dostackbufferoverflowgood/blob/master/dostackbufferoverflowgood_tutorial.md) - [PWK/OSCP - Stack Buffer Overflow Practice](https://www.vortex.id.au/2017/05/pwkoscp-stack-buf...
# Pikaboo - HackTheBox - Writeup Linux, 40 Base Points, Hard ## Machine ![‏‏Pikaboo.JPG](images/Pikaboo.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```21```, ```22``` and ```80```. ***User***: By browsing to [http://pikaboo.htb/admin](http://pikaboo....
# Python API WpScan ## Web API Server using Python and WpScan This tool is writed in python and we have a web API server using flask and python. We need to make a POST request passing an output file from WpScan tool and the api.py will return a clean json answer. ## Features - API creation using Python with few line...
# Free Learning Resources For Software Testers An ongoing project to create a set of links to free online learning resources for new and experienced Software Testers (Click Readme.md to view). Since computer science and IT university departments don't invariably offer dedicated software testing modules and resources a...
<!-- Use `grip 8080` to render the markdown locally --> # THC's favourite Tips, Tricks & Hacks (Cheat Sheet) A collection of our favourite tricks. Many of those tricks are not from us. We merely collect them. We show the tricks 'as is' without any explanation why they work. You need to know Linux to understand how an...
<p align='center'> <img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br> <a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.0"><img src="https://img.shields.io/badge/Version-1.1.0-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/Tuhinshubhra/CMSeeK/"...
![Reconnnoitre](https://github.com/codingo/Reconnoitre/blob/master/tank-152362_640.png) A reconnaissance tool made for the OSCP labs to automate information gathering and service enumeration whilst creating a directory structure to store results, findings and exploits used for each host, recommended commands to execut...
# Red Team Attack ⚠️此项目同步至:https://forum.ywhack.com/bountytips.php?redteam 🙏欢迎提Issues进行推荐! ### **红队武器库** > 信息收集类 * [2021.01.19] - [EHole(棱洞)-红队重点攻击系统指纹探测工具](https://github.com/EdgeSecurityTeam/EHole) * [2021.01.19] - [ESTeye(棱眼)-红蓝攻防中快速定位目标的真实资产](https://github.com/EdgeSecurityTeam/ESTeye) * [2021.01.19] - [Nmap...
--- title: "Nuclei" category: "scanner" type: "Website" state: "released" appVersion: "v2.9.10" usecase: "Nuclei is a fast, template based vulnerability scanner." --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -------------------------- This fi...
# Timelapse ## Introduction Welcome to my another writeup! In this HackTheBox [Timelapse](https://app.hackthebox.com/machines/Timelapse) machine, you'll learn: Enumerating SMB shares, cracking password protected zip file and `pfx` certificate, anti-virus bypass, privilege escalation via clear-text credentials in Powe...
# Awesome Awesome A curated list of awesome curated lists of many topics. - [Awesome Awesome](#awesome-awesome) - [Computer management](#computer-management) - [Data processing](#data-processing) - [Editors](#editors) - [Front-end development](#front-end-development) - [Programming languages](#pro...
# Writeup: 10.10.10.138 ## Hints - Getting a foothold revolves around finding what "builds/runs" the website and finding a suitable exploit for the software. - Password reuse is a thing! - Privesc is a fun and interesting method about abusing writable paths and finding executables that are run without the full path. ...
# Nmap | https://tryhackme.com/room/rpnmap ### [Task 2] Nmap Quiz #1 First, how do you access the help menu? : `-h` #2 Often referred to as a stealth scan, what is the first switch listed for a 'Syn Scan'? : `-sS` #3 Not quite as useful but how about a 'UDP Scan'? : `-sU` #4 What about operating system...
<a href="https://www.spiderfoot.net/r.php?u=aHR0cHM6Ly93d3cuc3BpZGVyZm9vdC5uZXQv&s=os_gh"><img src="https://www.spiderfoot.net/wp-content/themes/spiderfoot/img/spiderfoot-wide.png"></a> [![License](https://img.shields.io/badge/license-MIT-blue.svg)](https://raw.githubusercontent.com/smicallef/spiderfoot/master/LICENS...
<details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</stro...
# Script de reconocimiento ## Simple Port Scanning Bash Script Bash script to automate some types of port scans using Nmap. It includes some scan profiles to identify common open ports and services, web servers, UDP services, high ports, live hosts, etc., using TCP/SYN/UDP and other port scanning techniques. ### Us...
# CMSeeK ## Official Documentation Reference: https://github.com/Tuhinshubhra/CMSeeK ## Description **CMSeeK** scans WordPress, Joomla, Drupal and over 180 other CMSs. A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative e...
## Mobile Application Penetration Testing Cheat Sheet The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics. - [All-in-one Mobile Security Frameworks](#all-in-one-mobile-security-frameworks) - [Android Applicat...
# Project 7 - WordPress Pentesting Time spent: **12** hours spent in total > Objective: Find, analyze, recreate, and document **five vulnerabilities** affecting an old version of WordPress ## Pentesting Report 1. WordPress <= 4.2 - Unauthenticated Stored Cross-Site Scripting (XSS) - [ ] Summary: - Vulnerabili...
``` IP : 10.10.62.229 ``` # Nmap scan nmap -sC -sV -oN initial 10.10.62.229 ``` 21/tcp open ftp vsftpd 3.0.3 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.7 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 5a:4f:fc:b8:c8:76:1c:b5:85:1c:ac:b2:86:41:1c:5a (RSA) | 256 ac:9d:ec:44:61:0c:28...
# Red Team Attack ### **红队武器库** > 准备阶段 - [攻击队反溯源准则](https://github.com/qingluoyu/Pentest_baseline/blob/master/%E6%94%BB%E5%87%BB%E9%98%9F%E5%8F%8D%E6%BA%AF%E6%BA%90%E5%87%86%E5%88%99.md) - [红队标准手册](https://github.com/Harveysn0w/Redteam_Standard) - [红/蓝队环境自动化部署工具](https://github.com/ffffffff0x/f8x) - [红队基础设施自动化部署工具](...
# Azure-cheatsheet # Index * [General](#General) * [Authenticated enumeration](Authenticated-enumeration.md) * [Privilege Escalation & Exploitation](privilege-escalation.md) * [Cloud <-> On-Prem - Lateral Movement](Cloud-OnPrem-lateral-movement.md) * [Persistence](persistence.md) * [Post exploitation](post-exploitatio...
# PWK-CheatSheet <pre> ██▓███ █ ███ ▄█▀ ▄████▄ ██░ ██▓█████▄▄▄ ▄▄▄█████▓ ██████ ██░ ██▓█████▓████▄▄▄█████▓ ▓██░ ██▓█░ █ ░███▄█▒ ▒██▀ ▀█ ▓██░ ██▓█ ▒████▄ ▓ ██▒ ▓▒ ▒██ ▒▓██░ ██▓█ ▀▓█ ▓ ██▒ ▓▒ ▓██░ ██▓▒█░ █ ░▓███▄░ ▒▓█ ▄▒██▀▀██▒███ ▒██ ▀█▄▒ ▓██░ ▒░ ░ ▓██▄ ▒██▀▀██▒███ ▒███ ▒ ...
# Athenaeum A place of knowedge # Links - [Athenaeum](#athenaeum) - [Links](#links) - [General](#general) - [Tools](#tools) - [Hacking methodology](#hacking-methodology) - [Starting](#starting) - [Best search engines for Pentesters and Security Professionals](#best-search-engines-for-pentesters-and-securit...
<p align="center"> <img src="https://i.imgur.com/GeWQS7Y.png" width=500 /> </p> <div align="center"> <a href="https://github.com/naimkowshik/LBFH"> <img src="https://img.shields.io/badge/release-1.0-red.svg?longCache=true&style=for-the-badge" alt="build status" /> </a> <a href="https://www.python.org/"> ...
--- title: 'WPScan' path: 'scanners/wpscan' category: 'scanner' type: "CMS" state: "released" appVersion: "3.8.5" usecase: 'Wordpress Vulnerability Scanner' --- ![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png) WPScan is a free, for non-commercial use, black box WordP...
# PayDay ## Table of Contents * [Executive Summary](#executive-summary) * [Attack Vectors](#attack-vectors) * [Recommendations](#recommendations) * [Methodology](#methodology) * [Reconnaissance](#reconnaissance) * [Enumeration](#enumeration) * [Gaining Access](#gaining-access) * [Maintaining Access](#mainta...
This wiki is intended to provide a resource for setting up a resilient Red Team infrastructure. It was made to complement Steve Borosh ([@424f424f](https://twitter.com/424f424f)) and Jeff Dimmock's ([@bluscreenofjeff](https://twitter.com/bluscreenofjeff)) BSides NoVa 2017 talk "Doomsday Preppers: Fortifying Your Red Te...
# File Inclusion > The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application. > The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ...
![alt text](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png "WPScan - WordPress Security Scanner") [![Gem Version](https://badge.fury.io/rb/wpscan.svg)](https://badge.fury.io/rb/wpscan) [![Build Status](https://travis-ci.org/wpscanteam/wpscan.svg?branch=master)](https://travis-ci.or...
## Usage ```bash docker run --rm -ti nikto - Nikto v2.1.6 --------------------------------------------------------------------------- + ERROR: No host specified -config+ Use this config file -Display+ Turn on/off display outputs -dbcheck check database and other ke...
# Besder 6024PB-XMA501 IP camera security analysis A cybersecurity analysis of a Besder 6024PB-XMA501 IP camera that started as the final project of my Bachelor's studies. A page of the Besder 6024PB-XMA501 Camera analysis hosted on Github Pages can be found by [following this link](https://kostasereksonas.github.io/...
# Ugliest Website This was an awesome challenge covering data exfiltration CSS injection. I didn't solve it during the competition, but put it together afterwords as a training exercise. The gist of the challenge / solution flow is: * We need to exfiltrate the admin/judge's timestamp and 64-character API token (the ...
<h1 align="center" style="border-bottom: none"> <div> <a href="https://www.nocodb.com"> <img src="/packages/nc-gui/assets/img/icons/512x512.png" width="80" /> <br> NocoDB </a> </div> The Open Source Airtable Alternative <br> </h1> <p align="center"> Turns...
<h2 align="center">Remember to take a look at the <code>/More</code> folder! ;)</h2> # List of Contents 1. [Links](#links) 2. [CTF Sites](#ctf-sites) 3. [Books](#books) 4. [Services](#services) 5. [Terms](#terms) 6. [Principles and Standards](#principles-and-standards) 1. [CIA Triad](#cia-triad) 2. [Principle of...
--- title: 云安全资源 --- <h1 align="center">Awesome Cloud Security 云安全资源汇总 💫 </h1> <p align="center"> <a href="https://github.com/teamssix/awesome-cloud-security/stargazers" target="_blank"><img alt="GitHub stars" src="https://img.shields.io/github/stars/teamssix/awesome-cloud-security" /></a> <a href="https://wiki.teamss...
# Awesome Exploit Development ## Buffer Overflow Concept ### https://www.imperva.com/learn/application-security/buffer-overflow/ ### https://economictimes.indiatimes.com/definition/buffer-overflow ### https://owasp.org/www-community/vulnerabilities/Buffer_Overflow ### https://www.veracode.com/security/buffer-overf...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
# TheNoteBook - HackTheBox Linux, 30 Base Points, Medium ## Machine ![TheNoteBook.JPG](images/TheNoteBook.JPG) ## TL;DR; To solve this machine, we begin by enumerating open services using namp – finding ports 80, 22, 10010. ***User:*** Find JWT token with ```"kid":"http://localhost:7070/privKey.key"``` value, Sign ...
# Wild-West---SOC-Core-Skills---Notes links collected from SOC Core Skills class, December 14 to 17, 2020. [SOC Core Skills w/ John Strand](https://wildwesthackinfest.com/training/soc-core-skills-john-strand/) ## Links from Day 1 and Day 2 * [strandjs/IntroLabs: These are the labs for my Intro class(Yes, this is pu...
# Penetration Testing Cheat Sheet This is more of a checklist for myself. May contain useful tips and tricks. Everything was tested on Kali Linux v2023.1 (64-bit). For help with any of the tools write `<tool_name> [-h | -hh | --help]` or `man <tool_name>`. Sometimes `-h` can be mistaken for a host or some other opt...
## Usage ``` docker run -it --rm -v $(pwd):/data nuclei -l $url_input -t /templates/cves/CVE-2020-9484.yaml -c 12 docker run -it --rm -v $(pwd):/data nuclei -target $url -t /templates/ -c 12 ``` ## Manual ``` Usage of nuclei: -H value Custom Header. -c int Number of concurrent requests to mak...
[Brush up your SQL skills with the advanced options](https://github.com/Ignitetechnologies/MSSQL-Pentest-Cheatsheet)
# b01lers Bootcamp 2020 Training # Table of Contents 1. [General](#general) 2. [How To Learn](#howto) 3. [Web Exploitation](#web) 4. [Reverse Engineering](#re) 5. [Cryptography](#crypto) 6. [Binary Exploitation](#pwn) 7. [Hardware Hacking + RF](#hardware) 8. [Penetration Testing](#pentesting) 9. [Resources + Practice]...
# Table of Contents ## Networking * [Host Discovery](#Host-Discovery) * [Port Scanning](#Port-Scanning) * [Subdomains](#Subdomains) * [MAC Changer](#MAC-Changer) ## WEB * [WEB Analysis](#WEB-Analysis) * [WordPress](#WordPress) * [AWS S3](#AWS-S3) * [WEB Server](#WEB-Server) * [XSS](#XSS) * [SQL Injection](#SQL-Inje...
# Console: php-console RCE **[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/t_PJiWVIcYw)**
## Let's crowdsource our infosec learning with [ResetHacker Community](https://github.com/RESETHACKER-COMMUNITY/What-Is-RESETHACKER) ![](https://img.shields.io/github/issues/RESETHACKER-COMMUNITY/Pentesting-Bugbounty) ![](https://img.shields.io/github/forks/RESETHACKER-COMMUNITY/Pentesting-Bugbounty) ![](https://img.s...
### Resource references: https://www.zaproxy.org/getting-started/ https://devcenter.heroku.com/articles/pentest-instructions https://github.com/zaproxy/community-scripts ### Manually running scripts Ensure ZAP Proxy has been installed before running any scripts Example CLI for script execution: cd "{pathToZedProxy}Zed...
# Cronos -- hack the box ![AEpKkq.png](https://s2.ax1x.com/2019/03/14/AEpKkq.png) ## Introduction Target machine: 10.10.10.13(OS: linux) Kali linux: 10.10.16.44 ## Enumeration Firstly, detect the open ports: ``` nmap -sT -p- --min-rate 10000 -oA openports 10.10.10.13 ``` ![openports](https://github.com/neal1991...
--- title: "Nuclei" category: "scanner" type: "Website" state: "released" appVersion: "v2.5.2" usecase: "Nuclei is a fast, template based vulnerability scanner." --- <!-- SPDX-FileCopyrightText: 2021 iteratec GmbH SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -------------------------- This file is ge...
# Introduction Let's face it, we are mere mortals that keep forgetting everytime we learn something new. So that's why I created this simple cheatsheet. Every time I forget something important, I want to refer back in one single place instead of scouring the Internet for the same answer that I did before. Hope this wil...
# CTF Game Challenges I have been learning about game hacking recently and the best way I could find legally to practice is by playing [CTFs](https://ctftime.org/ctf-wtf/). But the difficult part is finding out the Game challenges from previous ctfs. This list includes game challenges I encountered while playing ...
[![Build Status](https://github.com/ytdl-org/youtube-dl/workflows/CI/badge.svg)](https://github.com/ytdl-org/youtube-dl/actions?query=workflow%3ACI) youtube-dl - download videos from youtube.com or other video platforms - [INSTALLATION](#installation) - [DESCRIPTION](#description) - [OPTIONS](#options) - [CONFIGURAT...
# 《深入理解CodeQL》 ![CodeQL](https://socialify.git.ci/ASTTeam/CodeQL/image?description=1&font=Inter&forks=1&issues=1&name=1&owner=1&pattern=Floating%20Cogs&pulls=1&stargazers=1&theme=Light) 本项目收集CodeQL相关内容,包括CodeQL的设计原理实现方法或使用CodeQL进行的漏洞挖掘案例等。其优点在于可以利用已知的漏洞信息来挖掘类似的漏洞,就像处理数据一样寻找漏洞。基于语义的代码分析思想在SAST领域更将会是一把利剑,这种思想更是下一代代码审计工...
<h2 align="center"> 🛡️ Facebook Bug Bounty Writeups Collection ✍️ </h2> <h4 align ="center"> 💖 A curated list of Facebook bug bounty writeups by various security researchers.🌙 </h4> ##### `You can contribute to this collection by submitting your own writeup or any others you know of, written in clear and concise E...
<h1 align="center">enumerepo <a href="https://twitter.com/intent/tweet?text=enumerepo%20-%20Read%20a%20list%20of%20GitHub%20usernames%20and%2For%20organizations%2C%20verify%20their%20existence%2C%20and%20list%20the%20repositories%20owned%20by%20each%20one%20%40trick3st%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fenumerepo&...
# Tools ## Super Tools > All in one features of whole the world, learn at least one of them to be super hacker :) * [RMS](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security) - Runtime Mobile Security, powered by FRIDA, is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime...
# Fowsniff CTF Hack this machine and get the flag. There are lots of hints along the way and is perfect for beginners! This boot2root machine is brilliant for new starters. You will have to enumerate this machine by finding open ports, do some online research (its amazing how much information Google can find for you)...
# Walkthrough Forwardslash HTB ## Prolog Assalamualaikum warahmatullahi wabarakatuh, Disituasi pandemic #COVID19 dan Bulan suci Ramadhan, Saya dan teman-teman di group discord yang isinya teman-teman `hacker` Dunia Maya saya hampir tiap malam sekarang Live untuk hacking mesin di `Hack The Box` (HTB). Kita mengerjaka...
# Forge - HackTheBox - Writeup Linux, 30 Base Points, Medium ## Machine ![‏‏Forge.JPG](images/Forge.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```21```, ```22``` and ```80```. ***User***: By using [Upload an Image](http://forge.htb/upload) page we c...
# Spectra - HackTheBox ?, 20 Base Points, Easy ## Machine ![‏‏Spectra.JPG](images/‏‏Spectra.JPG) ## Spectra Solution ### User So let's start with ```nmap``` scanning: ```console ┌─[evyatar@parrot]─[/hackthebox/Spectra] └──╼ $nmap -sC -sV -oA nmap/Spectra 10.10.10.229 Starting Nmap 7.80 ( https://nmap.org ) at 2...
# Enumeration Quick Reference ## Contents - [Enumeration Quick Reference](#enumeration-quick-reference) * [Contents](#contents) * [Checklist](#checklist) + [Masscan](#masscan) + [Network Enum:](#network-enum-) + [Traceroute and Ping](#traceroute-and-ping) + [NetDiscover (ARP Scanning):](#netdisc...
# [awesome-apisec](https://github.com/arainho/awesome-apisec) <h4 align="center">A collection of awesome API Security tools and resources.</h4> <p align="center"> <a href="#about">About</a> • <a href="#api-keys-find-and-validate">API Keys: Find and validate</a> • <a href="#books">Books</a> • <a href="#c...
# Guide-CEH-Practical-Master ### **Exame Details** - Exam Title: Certified Ethical Hacker (Practical) - Number of Practical Challenges: 20 - Duration: 6 hours - Availability: Aspen – iLabs - Test Format: iLabs Cyber Range - Passing Score: 70% (14 Questions) -------------------------------------------- **Exam Tips...
# Evil Twin - Mark VI Learn how to set up a fake authentication web page on a fake WiFi network. Read the comments in these two files to get a better understanding on how all of it works: * [/src/evil-twin/index.php](https://github.com/ivan-sincek/evil-twin/blob/master/mark_vi/src/evil-twin/index.php) * [/src/evil-t...
# <img src="https://raw.githubusercontent.com/swagger-api/swagger.io/wordpress/images/assets/SWC-logo-clr.png" height="80"> [![Build Status](https://img.shields.io/jenkins/build.svg?jobUrl=https://jenkins.swagger.io/job/oss-swagger-core-master-java-8)](https://jenkins.swagger.io/view/OSS%20-%20Java/job/oss-swagger-cor...
<h1>Bug Bounty Resources And Readings</h1> <h2>#100DaysOfCode</h2> <hr> ## GitHub Links for the Resources **** #### [Bug-Bounty-References](https://github.com/ngalongc/bug-bounty-reference) #### [Awesome-Bug-Bounty](https://github.com/djadmin/awesome-bug-bounty) #### [Bug-Hunting Methodology](https://github.com/jhad...
# hackthebox List of Completed Boxes Tips Spawn py shell - `python -c "import pty; pty.spawn('/bin/bash')"` Simple Http Server `python -m SimpleHTTPServer 80` See running process id `ps` To kill `kill -9 pid`
### Cheat Sheet - OSINT 🕵🏽‍♂️ https://piratemoo.gitbook.io/moo/moosint/osint ### An online tool to visualize the relationships of different entry points in an investigation (domain, email, phone, person etc). Extreme simplified analog of Maltego. https://app.netlas.io/asd/ ### Social Media #OSINT Tools Collection �...
[✔]: assets/images/checkbox-small-blue.png # Node.js Best Practices <h1 align="center"> <img src="assets/images/banner-2.jpg" alt="Node.js Best Practices"/> </h1> <br/> <div align="center"> <img src="https://img.shields.io/badge/⚙%20Item%20count%20-%20102%20Best%20Practices-blue.svg" alt="102 items"/> <img id="...
# HackTheBox Writeup > Saikat Karmakar | Jul 18 : 2021 > ip -> 10.10.10.138 --- 1. user.txt ``` d4e493fd4068afc9eb1aa6a55319f978 ``` 2. root.txt ``` eeba47f60b48ef92b734f9b6198d7226 ```
# Awesome Linux Software ![Tux](img/tux.png) 🐧 This repo is a collection of **AWESOME** Linux applications and tools for **any users/developers**. 🐧 Feel free to **contribute** / **star** / **fork** / **pull request** . Any **recommendations** and **suggestions** are welcome. **Acknowledgement:** _Everything writ...
# BountyTips _在线访问地址:https://forum.ywhack.com/bountytips.php_ * 命令组合:https://forum.ywhack.com/bountytips.php?onecommand * Red Team:https://forum.ywhack.com/bountytips.php?redteam * XSS Tips:https://forum.ywhack.com/bountytips.php?xss * RCE Tips:https://forum.ywhack.com/bountytips.php?RCE * Bypass:https://forum.ywhack...
## Contents - [Cross Site Scripting (XSS)](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups#cross-site-scripting-xss) - [Cross Site Request Forgery (CSRF)](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups#cross-site-request-forgery-csrf) - [Clickjacking (UI Redressing Attack)](https://github....
# Inception #### 10.10.10.67 ###### Dotaplayer365 Nmap ``` PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) |_http-title: Inception 3128/tcp open http-proxy Squid http proxy 3.5.12 |_http-server-header: squid/3.5.12 ``` We have a webserver which has some template. The dude ...
# <img src="https://raw.githubusercontent.com/swagger-api/swagger.io/wordpress/images/assets/SWC-logo-clr.png" height="80"> [![Build Status](https://img.shields.io/jenkins/s/https/jenkins.swagger.io/view/OSS%20-%20Java/job/oss-swagger-core-master-java-8.svg)](https://jenkins.swagger.io/view/OSS%20-%20Java/job/oss-swag...
# Open URL Redirection > Un-validated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a ph...
# Kubernetes > Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and management. It was originally designed by Google, and is now maintained by the Cloud Native Computing Foundation. ## Summary - [Tools](#tools) - [Container Environment](#container-environme...
# Welcome to TheRokdaba ## CTF Writeups - [Hero CTF 2023 Appointment Book](https://therokdaba.github.io/2023/05/23/HeroCTF-AppointmentBook.html) - [RTL CTF 2021](https://therokdaba.github.io/2021/08/02/RTL.html) ### RingZer0 CTF: - [Looking For Password File](https://therokdaba.github.io/2021/07/16/RingZer0-Lookin...
# AWAE-Preparation This repository will contain all trainings and tutorials I have done/read to prepare for OSWE. ### Course Syllabus: https://www.offensive-security.com/documentation/awae-syllabus.pdf ### Before AWAE: I would not recommend taking the course before at least; finishing all SQL and XSS Injection challe...
--- sidebar: auto sidebarDepth: 2 --- # Useful Tools :mag_right: _This is a list of useful tools and programs for developpers, devops, admins, ... but not only. Whereas most of them are Open Source, not all of them are. Please check licences that may apply. This list contains items that i **personally** find useful, ...
# Bug Bounty RoadMap Bug Bounty is the technique/process of finding bugs on programs by using different methodology and reporting those bugs to the respective program organizing company. After reporting the bug you receive a amount called bounty. Not all program provides you bounty for submitting for bug , programs li...
# Find information med nmap * I et terminal vindue skal du køre `run.sh`. * Find ligesom sidst ip adressen for docker containeren. * Brug nu nmap til at scanne for porte og find information omkring dem * Der er 4 flag <details> <summary>Løsning</summary> `nmap -sC -sV -p- [IP]` for at få alle flag, samt at ...
# Bug Bounty Helpdesk(Under Development) > Note: Contents inside the **RESETHACKER Community** are to help our community members and content belongs to respective Authors and RESETHACKER Team. BugBounty HelpDesk | Title -- | -- **0** Bug bounty FAQ | [Beginners friendly](https://github.com/RESETHACKER-COMMUNITY/Pe...
# **OSCP Preparation Material** ## **OSCP Approach** For you to begin, I have divided the OSCP Preparation in three phases i.e. Pre-Enrolment, Post-Enrolment and Examination. Hope this helps!! **Approach for OSCP Examination - https://jagskap.blogspot.com/2020/06/approach-to-crack-oscp-examination.html** Other Blogs...