text
stringlengths
9
334k
# OSCP Journey - A Step Forward ![Alt text](https://github.com/gh0x0st/OSCP_Journey/blob/master/Screenshots/offsec-student-certified-emblem-rgb-oscp.png?raw=true "OSCP Logo") This August, I've successfully completed the Penetration Testing with Kali (PWK) course and passed the Offensive Security Certified Professional...
# A statically generated blog example using Next.js and dotCMS This example showcases Next.js's [Static Generation](https://nextjs.org/docs/basic-features/pages) feature using [dotCMS](https://dotcms.com/) as the data source. ## Demo ### [https://nextjs-dotcms-blog.vercel.app/](https://nextjs-dotcms-blog.vercel.app/...
* 公众号:关注安全技术 * Author:小y * wiki:https://www.heresecurity.wiki/ ![image](https://github.com/xiaoy-sec/Pentest_Note/blob/master/img/wechat.png) # Pentest_Note 查找内容请配合wiki食用或使用CTRL+F搜索 ## 主目录 - [个人卫生](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/个人卫生.md) - [收集信息](https://github.com/xiaoy-sec/Pentest_Note...
# Beelzebub Link: https://www.vulnhub.com/entry/beelzebub-1,742/ Level: Easy Credits: Shaurya Sharma ## Description Difficulty: Easy You have to enumerate as much as you can and don't forget about the Base64. For hints add me on Twitter- ShauryaSharma05 --- ## Enumeration Nmap ``` PORT STATE SER...
[![Build Status](https://travis-ci.org/sqshq/PiggyMetrics.svg?branch=master)](https://travis-ci.org/sqshq/PiggyMetrics) [![codecov.io](https://codecov.io/github/sqshq/PiggyMetrics/coverage.svg?branch=master)](https://codecov.io/github/sqshq/PiggyMetrics?branch=master) [![GitHub license](https://img.shields.io/github/li...
# BugBountyTips 记录一些国外漏洞赏金猎人的挖洞技巧和一些有意思的东西 ### 微信公众号 ![](we-public.jpg) ### One Line - [One line `crt.sh` subdomain discover code](信息收集/one-line.md) ### Google Dork Tips - [Google Dork Tips](信息收集/Google-Dork.md) ### 信息收集 - [基于浏览器的子域名爆破](信息收集/run.js) ### Bypass - [Bypass WAF by Shortening IP Addresses](bypass/bypas...
# 所有收集类项目: - [收集的所有开源工具: sec-tool-list](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式 - [全平台逆向资源: awesome-reverse-engineering](https://github.com/alphaSeclab/awesome-reverse-engineering): - Windows平台安全: PE/DLL/DLL-Injection/Dll-Hijack/Dll-Load/UAC-Bypass/Sysmon/AppLocker/ETW/WSL/.NET/Pro...
# Recovery Not your conventional CTF [Recovery](https://tryhackme.com/room/recovery) ## Topic's - Network Enumeration - Reverse Engineering (Bash) - Exploiting Crontab - Reverse Engineering (Cpp) ## Appendix archive Password: `1 kn0w 1 5h0uldn'7!` ## Task 1 Help Alex! Hi, it's me, your friend Alex. I'm not goi...
# TL;DR This repository contains code to turn your Kali Linux machine into a router that - records all traffic with wireshark - sends HTTP and HTTPS traffic to an intercepting proxy, such as BurpSuite, running on another machine. This setup is only appropriate in a lab setting where you want to learn how a device work...
# API Key Leaks > The API key is a unique identifier that is used to authenticate requests associated with your project. Some developers might hardcode them or leave it on public shares. ## Summary - [Tools](#tools) - [Exploit](#exploit) - [Google Maps](#google-maps) - [Algolia](#algolia) - [Slack API To...
# Anthem CTF [TryHackMe](https://tryhackme.com/room/anthem) --- ![Room Logo](./.assets/logo.gif) --- ## Index - [Enumeration](#enumeration) - [Flag Hunting](#finding-those-flags) - [Machine Access](#gaining-access-to-the-machine) - [PrivEsc](#priviledge-escalation) - [Final Thoughts](#final-thoughts) --- ```bash ...
## 23.07.2023 https://blog.doyensec.com/2023/07/18/streamlining-websocket-pentesting-with-wsrepl.html ## Github [Awesome CTF Cheatsheet](https://github.com/uppusaikiran/awesome-ctf-cheatsheet) [Bug Bounty](https://github.com/m0chan/BugBounty) ## Blog-Posts & Write-ups [CVE-2020-13379-Write-Up/Unauthenticated SS...
# Helpdesk ## Table of Contents * [Summary](#summary) * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [RPC](#rpc) * [NetBIOS](#netbios) * [SMB](#smb) * [RDP](#rdp) * [Exploit](#exploit) * [Metasploit](#metasploit) * [Explore](#explore) * [Escalate](#escalate) * [Effect](#effe...
# Static - HackTheBox - Writeup Linux, 30 Base Points, Medium ## Machine ![‏‏Static.JPG](images/Static.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```2222``` and ```8080```. ***User***: On ```robots.txt``` file we found two URL's [/vpn] and...
## <span id="head1"> Penetration_Testing_POC</span> 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 **请注意所有工具是否有后门或者其他异常行为,建议均在虚拟环境操作。** - [ Penetration_Testing_POC](#head1) - [ 请善用搜索[`Ctrl+F`]查找](#head2) - [IOT Device&Mobile Phone](#head3) - [Web APP](#head4) - [ 提权辅助相关](#head5) - [ PC](#head6) - [ tools-小工具集合](#head7) -...
[![Build Status](https://travis-ci.org/sqshq/PiggyMetrics.svg?branch=master)](https://travis-ci.org/sqshq/PiggyMetrics) [![codecov.io](https://codecov.io/github/sqshq/PiggyMetrics/coverage.svg?branch=master)](https://codecov.io/github/sqshq/PiggyMetrics?branch=master) [![GitHub license](https://img.shields.io/github/li...
# Track Awesome Hacking Updates Weekly A curated list of awesome Hacking tutorials, tools and resources [🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/carpedm20/awesome-hacking/week/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list...
# Node Version Manager [![Build Status](https://travis-ci.org/creationix/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.33.8-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/...
# malware-gems ## NOTE: WORK IN PROGRESS! (Updated 19 July 2022) ### What's this all about? This page contains a list of mostly malware analysis / reverse engineering related tools, training, podcasts, blog posts, literature and just about anything else closely related to the topic. This page serves as a catalog of ...
# Awesome Cloud Native Security 🐿 ![](images/banner.png) This repository is used to collect **AWESOME** resources on the topic of cloud native security found during research. Note: - All resources will be suffixed and ordered by date of conferences, blogs or other formats of publication, if applicable. - Resources...
<p align="center"> <a href="https://github.com/trimstray/the-book-of-secret-knowledge"> <img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master"> </a> </p> <p align="center">"<i>Knowledge is powerful, be careful how you us...
# Offensive-Resources V3 ((اللَّهُمَّ انْفَعْنِي بِمَا عَلَّمْتَنِي، وَعَلِّمْنِي مَا يَنْفَعُنِي، وَزِدْنِي عِلْمًا)) <hr> # A Huge Learning Resources with Labs For Offensive Security Players. <br> # What is new in V3 ? - Added Blockchain Security Section - Added Game Hacking Section - Added Car Hacking Section ...
--- title: "Nuclei" category: "scanner" type: "Website" state: "released" appVersion: "v2.7.0" usecase: "Nuclei is a fast, template based vulnerability scanner." --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -------------------------- This fil...
# ペネトレーションテスト用チートシート # Enum ## Nmap ``` kali@kali:$ sudo nmap -sC -sV -oN nmap/initial 10.10.10.1 ``` ``` kali@kali:$ sudo nmap -sC -sV -p- -oN nmap/full 10.10.10.1 ``` ``` kali@kali:$ sudo nmap --min-rate=10000 -p- -v 10.10.10.1 (上記の結果を元に)kali@kali:$ sudo nmap -sC -sV -oN nmap/fast -v -p 22,80,3000 10.10....
## sqlmap_chunked_proxy ![](sqlmap_chunked_proxy.jpeg) ![](sqlmap.jpeg) ![](Wireshark.jpeg) ## Usage: ```bash python3 sqlmap_chunked_proxy.py sqlmap -u '' --data '' --proxy=http://127.0.0.1:9999 ```
# Swagger Code Generator [![Build Status](https://travis-ci.org/swagger-api/swagger-codegen.png)](https://travis-ci.org/swagger-api/swagger-codegen) [![Maven Central](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project/badge.svg?style=plastic)](https://maven-badges.herokuapp.com/maven-c...
[![Build Status](https://travis-ci.org/rg3/youtube-dl.svg?branch=master)](https://travis-ci.org/rg3/youtube-dl) youtube-dl - download videos from youtube.com or other video platforms - [INSTALLATION](#installation) - [DESCRIPTION](#description) - [OPTIONS](#options) - [CONFIGURATION](#configuration) - [OUTPUT TEMPLAT...
[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) > A curated list of awesome academic and practical resources for Computer Science students. - [Contribution guide](CONTRIB.md) ## Table of Contents - [General ...
## nmap #### Useful Links [OSCP Survival Guide - port-scanning](https://github.com/frizb/OSCP-Survival-Guide#port-scanning) #### NMAP Script details ##### List all available scripts `locate nse | grep scripts` ##### Enumerate SMB `nmap -oN nmap_vuln_scan_enum_users_$ip.txt -Pn --script smb-enum-users.nse $ip` `nm...
# My Notes for CTF's # monitoring ### CMD ``` curl "https://185.199.111.153/" -H "host: sa1.lt" --insecure -w "HTTP %{http_code}, TCP Connect: %{time_connect} s, SSL connect: %{time_appconnect} s, First byte: %{time_starttransfer} s, Down speed: %{speed_download} B/s, Total time: %{time_total}\n" -so NUL ``` # Recon...
# Video tutorial series to go with the HTB challenges [![HackTheBox Challenges](https://img.youtube.com/vi/0jCGyf32rHs/0.jpg)](https://www.youtube.com/watch?v=0jCGyf32rHs&list=PLHUKi1UlEgOIn12nvhwwq2aTU8bG-FE0I "HackTheBox Challenges") [Sign up for HackTheBox!](https://affiliate.hackthebox.com/cryptocat-htb)
# 👨🏻‍💻 Bug Bounty Blogs and Writeups of different vulnerablities ## This is how they hacked Apple ***Some of the vulnerailities are explained here, take a look down here*** > ***https://samcurry.net/hacking-apple/*** ## HTTP Request Smuggling Tips from honoki > ***https://honoki.net/2020/02/18/http-request-smuggling...
THIS PROJECT IS IN LIFE-SUPPORT MODE ------------------------------------ This repo tracks the old version of Wifite (*v1*) which does not receive frequent updates and has many bugs (check out the *Isuses* tab!). There's a new version of Wifite (*Wifite2*) available at [https://github.com/derv82/wifite2](https://gith...
# PyRDP ![pipeline status](https://github.com/GoSecure/pyrdp/workflows/Build/badge.svg?branch=master) [![Black Hat Arsenal 2019](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2019.svg?sanitize=true)](https://www.blackhat.com/us-19/arsenal/schedule/index.html) [![Black Hat Arsenal 2021](https:/...
<p align="center"> <img width="200" height="200" src="https://github.com/Ralireza/Android-Security-Teryaagh/blob/main/android-security-teryagh-logo.png"> </p> <div align="center"> # AST - Android Security Teryaagh :fire: </div> <div align="center"> Android security guides, roadmap, tools, docs, courses,...
# ReconScan The purpose of this project is to develop scripts that can be useful in the pentesting workflow, be it for VulnHub VMs, CTFs, hands-on certificates, or real-world targets. The project currently consists of two major components: a script invoking and aggregating the results of existing tools, and a second ...
# Web App Hacking ## **Web App Testing Resources** {% tabs %} {% tab title="Guides" %} * [OWASP Web Security Testing Guide](https://owasp.org/www-project-web-security-testing-guide/) - comprehensive guide to testing the security of web applications and web services created by the OWASP foundation. * [https://owasp...
# First steps **Summery:** - [First steps](#first-steps) - [1. Port Scan](#1-port-scan) - [2. Version detection/banner grabbing](#2-version-detectionbanner-grabbing) - [3. Service Analyses](#3-service-analyses) - [Notes](#notes) - [Nmap scripts Path](#nmap-scripts-path) - [Add nmap vuln script](#add-n...
<h1 align="center">dsieve <a href="https://twitter.com/intent/tweet?text=dsieve%20-%20Filter%20and%20enrich%20a%20list%20of%20subdomains%20by%20level%20https%3A%2F%2Fgithub.com%2Ftrickest%2Fdsieve&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitter&style=social...
# Relativity - Security Tools for Windows Environment (Actualmente en desarrollo algunas funciones no estan disponibles) Prepara un entorno con herramientas orientadas al pentesting. Instalación de forma desatendidad en sistemas Microsoft Windows 10 , contiene una recopilación de herramientas que cubre las necesidad...
# Awesome AWS Security [![Awesome](https://awesome.re/badge.svg)](https://awesome.re) A common curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are obviously related to AWS Security. _List inspired by the [awesome](https://github.com/sindresorhus/aw...
# Master-Cheat-Sheet * [General usefull Powershell Scripts](#General-usefull-Powershell-Scripts) * [AMSI Bypass restriction Bypass](#AMSI-Bypass-restriction-Bypass) * [Payload Hosting](#Payload-Hosting) * [Network Share Scanner](#Network-Share-Scanner) * [Lateral Movement](#Lateral-Movement) * [Reverse Shellz](#Rever...
# Track Awesome Hacking Updates Daily A curated list of awesome Hacking tutorials, tools and resources [🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/carpedm20/awesome-hacking/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manag...
Protocol Buffers - Google's data interchange format =================================================== Copyright 2008 Google Inc. https://developers.google.com/protocol-buffers/ C++ Installation - IBM zOS ----------------------- To build protobuf from source, no additional tools is needed on zOS, build is only reli...
# Mullvad VPN desktop and mobile app Welcome to the Mullvad VPN client app source code repository. This is the VPN client software for the Mullvad VPN service. For more information about the service, please visit our website, [mullvad.net](https://mullvad.net) (Also accessible via Tor on our [onion service](http://o54...
# Mac&IOS HackStudy # Mac&IOS安全学习资料汇总 # Mac&IOS安全学习网站收集: http://samdmarshall.com https://www.exploit-db.com https://reverse.put.as http://highaltitudehacks.com/security/ http://www.dllhook.com/ http://www.securitylearn.net/archives/ http://securitycompass.github.io/iPhoneLabs/index.html http://security.i...
![alt text](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/wpscan_logo_407x80.png "WPScan - WordPress Security Scanner") [![Build Status](https://travis-ci.org/wpscanteam/wpscan.svg?branch=master)](https://travis-ci.org/wpscanteam/wpscan) [![Code Climate](https://img.shields.io/codeclimate/github/wpscan...
<h1 align="center"> <img src="https://user-images.githubusercontent.com/8293321/196779266-421c79d4-643a-4f73-9b54-3da379bbac09.png" alt="katana" width="200px"> <br> </h1> <h4 align="center">A next-generation crawling and spidering framework</h4> <p align="center"> <a href="https://goreportcard.com/report/github.c...
:warning: You are viewing the development's branch version of README which might contain documentation for unreleased features. For the README consistent with the latest released version see https://github.com/rack/rack-attack/blob/6-stable/README.md. # Rack::Attack *Rack middleware for blocking & throttling abusive...
# WordPress 测试方法论 ## 0x1 扫描 使用工具:wpscan(Kali 自带) *针对所有 Wordpress 网站的测试,首先都应该使用 wpscan 进行扫描:* ``` wpscan --url http://192.168.1.28/ ``` 扫描结果中中重点关注 WordPress 的版本?使用了什么 Plugin ?Plugin 版本是什么? 然后使用 searchsloit 来查询漏洞。 ## 0x2 暴力破解 使用工具:Wfuzz(Kali 自带) 很多 WordPress 的漏洞都需要登录到后台才能利用,这里使用 Wfzuu 工具进行爆破: ``` # 按照实际情况调整-hh ...
# Internet of Things (IoT) Hacking Resources The Internet of Things (IoT) Hacking Resources refer to an array of tools and frameworks used to ensure the security of IoT devices and networks. ## Analysis Frameworks - [EXPLIoT](https://gitlab.com/expliot_framework/expliot): This is a penetrating testing framework that ...
# Nibbles - Hack the box ![Ae0G8g.png](https://s2.ax1x.com/2019/03/17/Ae0G8g.png) ## Introduction Target: 10.10.10.75(OS: Linux) Kali linux: 10.10.16.44 ## Information Enumeration Firstly, detect the open ports: ``` nmap -sT -p- --min-rate 10000 -oA openports 10.10.10.75 ``` ![Ae19BQ.png](https://s2.ax1x.com/201...
# OSCP ### outline * Information Gathing * [nmap](#nmap) * [nikto](#nikto) * [gobuster](#gobuster) * [enum4linux](#enum4linux) * [smbclient](#smbclient) * [ftp](#ftp) * [snmpwalker](#snmpwalker) * Web application * [LFI](#LFI) * [RFI](#RFI) * [WordPress](#WordPress) * Password Cr...
# One-Liner-Scripts [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re) ###### Thanks to all who create these Awesome One Liners❤️ ---------------------- ![image](https://user-images.githubusercontent.com/75373225/180003557-59bf909e-95e5-4b31-b4f8-fc05532f9f7c.png) --------------------------- # Subdom...
--- description: >- A collection of notes for Penetration Testers and Ethical Hackers. My journey to OSCP and beyond. --- # Hacker's Rest These are my publicly accessible notes from various sources for penetration testing, red-teaming, OSCP, Capture the Flag (CTF) challenges, and my [Vulnhub](https://www.vulnhub...
# UpDown - HackTheBox - Writeup Linux, 30 Base Points, Medium ![info.JPG](images/info.JPG) ## Machine ![‏‏UpDown.JPG](images/UpDown.JPG) ## TL;DR To solve this machine, we start by using `nmap` to enumerate open services and find ports `22` and `80`. ***User***: Discovered virtual host `dev.siteisup.htb` and dir...
# WPScan Output Parser **`wpscan_out_parse` is a Python parser for WPScan output files** (JSON and CLI). It analyze vulnerabilities, miscellaneous alerts and warnings and other findings. <a href="https://github.com/tristanlatr/wpscan_out_parse/actions" target="_blank"><img src="https://github.com/tristanlatr/wpsc...
# Nmap commands #This command is used to find machines connected to my network. ``` nmap -sV -sP 10.0.0.15/24 ``` I use this command to find open ports ``` nmap -sV 10.0.0.21 ``` scans all ports on a network ``` nmap -sV -sP 10.0.0.15/24 -p- ``` scans SYN packages on a network ``` nmap -sS -p- 10.0.0.21 ``` command...
# Enumeration ## Ports ### FTP - 21 > https://book.hacktricks.xyz/pentesting/pentesting-ftp > > - Fingerprint: `nc -nv <ip> 21` > - Anonymous Access: `ftp <ip>` `ftp> anonymous` `ftp> pass` > - Browser Access: `ftp://anonymous:anonymous@10.10.10.98` > - Commands: > - Binary Mode: `binary` > - Upload File: `put <...
# Pentest Tools ![](logo.png) The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ ## TODO * [x] Directory * [ ] Browser bookmarks * [ ] Install Scripts *...
# welcome to my methodolgy I collected All what I have learnt from amazing hackers , Tomnomnom , Jason Haddix , Uncle Rat , NahamSec and More Amazing People hackers , I usually like to start with a very big inscope attack surface and then norrow it down :: # mind map threat ``` note taking https://obsidian.md/down...
# KaliPAKU: Training Tool for Penetration Testing Using Kali Linux ![KaliPAKU_logo](img/KaliPAKU_logo.png) ![Mark](https://img.shields.io/badge/PAKURI-Mark%20V-green) ![License](https://img.shields.io/github/license/01rabbit/KaliPAKU) ![release-date](https://img.shields.io/github/release-date/01rabbit/KaliPAKU) ![sns]...
```ruby ███████╗ █████╗ ███████╗██╗ ██╗ ██████╗ ██╔════╝██╔══██╗██╔════╝╚██╗ ██╔╝██╔════╝ █████╗ ███████║███████╗ ╚████╔╝ ██║ ███╗ ██╔══╝ ██╔══██║╚════██║ ╚██╔╝ ██║ ██║ ███████╗██║ ██║███████║ ██║ ╚██████╔╝ ╚══════╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═════╝ Made with <3 by Riccardo Malatesta (@seeu) ``` [![License...
### CTF-Challenges-Machines-Writeups-Walkthroughs WriteUps/ Walkthroughs for CTF challenges or machines - Twitter [@1r0Dm48O](https://twitter.com/1r0Dm48O) | Challenge/Machine | Writeup/Walkthrough | MD5 | Posted On | | ------------ | ------------ | ------------ | ------------ | | [Hc0n2020-b00t2root-Machine-User-Fla...
# Nibbles URL: https://app.hackthebox.com/machines/Nibbles Level: Easy Date 2 Jun 2020 ## Walkthrough - [Enumeration](#enumeration) - [User flag](#user-flag) - [Privesc](#privesc) # Enumeration ## NMAP ``` # Nmap 7.80 scan initiated Tue Jun 2 21:30:42 2020 as: nmap -T4 -A -p- -oN Nibbles_nmap.txt 10.10.10.75 N...
# ReconScan The purpose of this project is to develop scripts that can be useful in the pentesting workflow, be it for VulnHub VMs, CTFs, hands-on certificates, or real-world targets. The project currently consists of two major components: a script invoking and aggregating the results of existing tools, and a second ...
# stegify [![Build Status](https://travis-ci.org/DimitarPetrov/stegify.svg?branch=master)](https://travis-ci.org/DimitarPetrov/stegify) [![Coverage Status](https://coveralls.io/repos/github/DimitarPetrov/stegify/badge.svg?branch=master)](https://coveralls.io/github/DimitarPetrov/stegify?branch=master) [![GoDoc](https:/...
# Offensive Security Ultimate Cheatsheet The goal of this repository is not to spoil the OSCP Exam, it's to save you as much time as possible when enumerating and exploiting potential low hanging fruit. It's very easy to get caught up in the weeds of debugging and troubleshooting broken payloads only to lose out on al...
--- title: "CMSeeK" category: "scanner" type: "CMS" state: "released" appVersion: "v.1.1.3" usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities" --- <!-- SPDX-FileCopyrightText: 2021 iteratec GmbH SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. ------------------...
# HackTheBox CheckList Mark Down version of Cherry Tree template by **devzspy** : [https://github.com/devzspy/oscp-certification/blob/master/Note Taking Tools/CherryTree Template/CTF\_template.ctb](https://github.com/devzspy/oscp-certification/blob/master/Note%20Taking%20Tools/CherryTree%20Template/CTF_template.ctb) ...
For use with Kali Linux. Custom bash scripts used to automate various pentesting tasks. # Licence This project is licensed under the ```BSD 3-clause “New” or “Revised” License```. For more information please see the licence file ### Download, setup & usage * git clone git://github.com/leebaird/discover.git /opt/disc...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.2.1.1"> <img src="https://img.s...
--- title: "CMSeeK" category: "scanner" type: "CMS" state: "released" appVersion: "v.1.1.3" usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities" --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -----------...
## Knowledge Repository The Knowledge Repository is a [memex](https://en.wikipedia.org/wiki/Memex), a personal knowledge database, a collection of notes, references, book summaries and examples. ### The Problem The more I learn the more I forget. To avoid forgetting, I have to revise. The more knowledge I have t...
# HackTheBox CTF Cheatsheet This cheatsheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list on our experience. Please sh...
<p align="center"> <img src="GerryMeMoji2.png"> </p> An awesome list of resources for training, conferences, speaking, labs, reading, etc that are **free** all the time that cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to ...
# Project Black Scope control, scope scanner and progress tracker for easier working on a bug bounty or pentest project Anatoly Ivanov of [Positive Technologies](https://ptsecurity.com) ## What is this tool for? The tools encourages more **methodical** work on pentest/bugbounty, tracking the progress and general sc...
<p align="center"> <img src="https://s3.amazonaws.com/ohmyzsh/oh-my-zsh-logo.png" alt="Oh My Zsh"> </p> Oh My Zsh is an open source, community-driven framework for managing your [zsh](https://www.zsh.org/) configuration. Sounds boring. Let's try again. __Oh My Zsh will not make you a 10x developer...but you may fe...
<!-- markdownlint-disable MD033 MD041 --> <p align="center"> <a href="https://hub.docker.com/r/aaaguirrep/offensive-docker"> <img alt="Offensive Docker" src="https://github.com/aaaguirrep/offensive-docker/blob/master/img/banner.jpg" width="600" /> </a> </p> <br/> <p align="center"> <a h...
--- title: 更新日志 --- <center><h1>更新日志</h1></center> --- ## 2023.7.16 <p></p> <br> <template> <a-timeline><a-timeline-item> <p> <a-tag color="red">收到补充</a-tag>收到「曾哥」师傅补充的文库信息,感谢「曾哥」师傅贡献的以下文章: <br/> </p> </a-timeline-item><a-timeline-item> <p> <a-tag color="blue">新增文章</a...
<p align='center'> <img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br> <img src="https://img.shields.io/badge/Version-1.1.0-brightgreen.svg?style=style=flat-square" alt="version"> <img src="https://img.shields.io/badge/python-3-orange.svg?style=style=flat-square" alt="Python Version"> <img src="http...
<h1 align="left"> <img src="static/nuclei-logo.png" alt="nuclei" width="200px"></a> <br> </h1> [![License](https://img.shields.io/badge/license-MIT-_red.svg)](https://opensource.org/licenses/MIT) [![Go Report Card](https://goreportcard.com/badge/github.com/projectdiscovery/nuclei)](https://goreportcard.com/report/...
# Legacy URL: https://app.hackthebox.com/machines/Legacy Level: Easy Date 26 May 2020 ## Walkthrough - [Enumeration](#enumeration) # Enumeration ## NMAP We found SAMBA service. We found that we can try Eternal Blue: ``` msf5 exploit(windows/smb/ms17_010_eternalblue) > use auxiliary/scanner/smb/smb_ms17_010 ms...
# Tools * [Security Tools list](https://sectools.org) * [Kali Linux](https://www.kali.org/downloads/): Linux distro specifically for Penetration testing, strict Debian based * [Back track Linux](https://www.backtrack-linux.org/): Precursor to Kali Linux (since 2013), Ubuntu based. * [MacChanger](https://www.hackingtu...
# Swagger Code Generator - Master (2.4.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
# Advent of Code 2021 These are my Advent-Of-Code style challenges for red teaming / pentesting / IT-Security. The challenges are separated into different modules: * Setup * Reconaissance * Phishing * Exploitation * Basic Windows Malware Development * Antivirus Evasion **DISCLAIMER**: Prior experience i...
# MLOps Course Learn how to combine machine learning with software engineering to design, develop, deploy and iterate on production-grade ML applications. - Lessons: https://madewithml.com/ - Code: [GokuMohandas/Made-With-ML](https://github.com/GokuMohandas/Made-With-ML) <a href="https://madewithml.com/#course"> <...
### robots.txt ``` User-agent: * Disallow: /wp-admin/ Allow: /wp-admin/admin-ajax.php Sitemap: http://metapress.htb/wp-sitemap.xml ``` git clone https://github.com/relarizky/wpxploit.git cd wpxploit pip3 install -r requirements.txt ./exploit.py wpscan --rua -e ap,at,tt,cb,dbe,u,m --url http://metapress.htb/ --pass...
# ReconNess Web App [![Build Status](https://dev.azure.com/reconness/reconness/_apis/build/status/reconness.reconness?branchName=master)](https://dev.azure.com/reconness/reconness/_build/latest?definitionId=1&branchName=master) <a href="https://twitter.com/reconness"><img src="https://img.shields.io/twitter/follow/rec...
# DeFi Developer Road Map **Here we collect and discuss the best DeFi & Blockchain researches and tools - contributions are welcome.** **Feel free to submit a pull request, with anything from small fixes to translations, docs or tools you'd like to add.** - **Disclaimer: All information (tools, links, articles, text...
# OSCP Prep Materials - [TJnull’s list updated list 2021](https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=0) ## OSCP Journeys and Preparation guides: - [parthdeshani,Pass OSCP like a Boss](https://medium.com/@parthdeshani/how-to-pass-oscp-like-boss-b269f2ea99d) - [Tj Nul...
# Swagger Code Generator - Master: [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test...
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.37.2-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
<p align="center"> <a href="http://nestjs.com/" target="blank"><img src="https://nestjs.com/img/logo-small.svg" width="120" alt="Nest Logo" /></a> </p> [circleci-image]: https://img.shields.io/circleci/build/github/nestjs/nest/master?token=abc123def456 [circleci-url]: https://circleci.com/gh/nestjs/nest <p align=...
[<img src="https://user-images.githubusercontent.com/1295961/45949308-cbb2f680-bffb-11e8-8054-28c35ed6d132.png" align="center" width="850">](https://flutter.dev/) <p align="center"> <a href="https://stackoverflow.com/questions/tagged/flutter?sort=votes"> <img alt="StackOverflow" src="https://img.shields.io/badge...
<p align="center"> <a href="https://patrickjs.com" target="_blank"> <img src="/media/awesome-angular.png" alt="Awesome Angular" /> </a> </p> # Awesome Angular [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/aweso...
Welcome to our comprehensive collection of learning resources for **DevSecOps**! Here, you'll discover a curated list of the best learning materials we've assembled just for you. Take a moment to explore these valuable resources, handpicked to enhance your understanding of **DevSecOps**. We strive to provide the most ...
# Awesome JavaScript [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sorrycc/awesome-javascript/) A collection of awesome browser-side [JavaScript](https://developer.mozilla.org/en-US/docs/Web/JavaScript) libraries, resources and shi...
<div align="center"> <img width="500" height="350" src="media/logo.svg" alt="Awesome"> <br> <br> <hr> <p> <p> <sup> <a href="https://github.com/sponsors/sindresorhus">My open source work is supported by the community</a> </sup> </p> <sup>Special thanks to:</sup> <br> <br> <a href="https://sta...
# Awesome Penetration Testing [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re) > A collection of awesome penetration testing and offensive cybersecurity resources. [Penetration testing](https://en.wikipedia.org/wiki/Penetration_test) is the practice of launching authorized, simulated attacks again...