text stringlengths 9 334k |
|---|
# OSCP Journey - A Step Forward

This August, I've successfully completed the Penetration Testing with Kali (PWK) course and passed the Offensive Security Certified Professional... |
# A statically generated blog example using Next.js and dotCMS
This example showcases Next.js's [Static Generation](https://nextjs.org/docs/basic-features/pages) feature using [dotCMS](https://dotcms.com/) as the data source.
## Demo
### [https://nextjs-dotcms-blog.vercel.app/](https://nextjs-dotcms-blog.vercel.app/... |
* 公众号:关注安全技术
* Author:小y
* wiki:https://www.heresecurity.wiki/

# Pentest_Note
查找内容请配合wiki食用或使用CTRL+F搜索
## 主目录
- [个人卫生](https://github.com/xiaoy-sec/Pentest_Note/blob/master/wiki/个人卫生.md)
- [收集信息](https://github.com/xiaoy-sec/Pentest_Note... |
# Beelzebub
Link: https://www.vulnhub.com/entry/beelzebub-1,742/
Level: Easy
Credits: Shaurya Sharma
## Description
Difficulty: Easy
You have to enumerate as much as you can and don't forget about the Base64.
For hints add me on
Twitter- ShauryaSharma05
---
## Enumeration
Nmap
```
PORT STATE SER... |
[](https://travis-ci.org/sqshq/PiggyMetrics)
[](https://codecov.io/github/sqshq/PiggyMetrics?branch=master)
[
### One Line
- [One line `crt.sh` subdomain discover code](信息收集/one-line.md)
### Google Dork Tips
- [Google Dork Tips](信息收集/Google-Dork.md)
### 信息收集
- [基于浏览器的子域名爆破](信息收集/run.js)
### Bypass
- [Bypass WAF by Shortening IP Addresses](bypass/bypas... |
# 所有收集类项目:
- [收集的所有开源工具: sec-tool-list](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式
- [全平台逆向资源: awesome-reverse-engineering](https://github.com/alphaSeclab/awesome-reverse-engineering):
- Windows平台安全: PE/DLL/DLL-Injection/Dll-Hijack/Dll-Load/UAC-Bypass/Sysmon/AppLocker/ETW/WSL/.NET/Pro... |
# Recovery
Not your conventional CTF
[Recovery](https://tryhackme.com/room/recovery)
## Topic's
- Network Enumeration
- Reverse Engineering (Bash)
- Exploiting Crontab
- Reverse Engineering (Cpp)
## Appendix archive
Password: `1 kn0w 1 5h0uldn'7!`
## Task 1 Help Alex!
Hi, it's me, your friend Alex.
I'm not goi... |
# TL;DR
This repository contains code to turn your Kali Linux machine into a router
that
- records all traffic with wireshark
- sends HTTP and HTTPS traffic to an intercepting proxy, such as BurpSuite, running on another machine.
This setup is only appropriate in a lab setting where you want to learn how a device work... |
# API Key Leaks
> The API key is a unique identifier that is used to authenticate requests associated with your project. Some developers might hardcode them or leave it on public shares.
## Summary
- [Tools](#tools)
- [Exploit](#exploit)
- [Google Maps](#google-maps)
- [Algolia](#algolia)
- [Slack API To... |
# Anthem CTF [TryHackMe](https://tryhackme.com/room/anthem)
---

---
## Index
- [Enumeration](#enumeration)
- [Flag Hunting](#finding-those-flags)
- [Machine Access](#gaining-access-to-the-machine)
- [PrivEsc](#priviledge-escalation)
- [Final Thoughts](#final-thoughts)
---
```bash
... |
## 23.07.2023
https://blog.doyensec.com/2023/07/18/streamlining-websocket-pentesting-with-wsrepl.html
## Github
[Awesome CTF Cheatsheet](https://github.com/uppusaikiran/awesome-ctf-cheatsheet)
[Bug Bounty](https://github.com/m0chan/BugBounty)
## Blog-Posts & Write-ups
[CVE-2020-13379-Write-Up/Unauthenticated SS... |
# Helpdesk
## Table of Contents
* [Summary](#summary)
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [RPC](#rpc)
* [NetBIOS](#netbios)
* [SMB](#smb)
* [RDP](#rdp)
* [Exploit](#exploit)
* [Metasploit](#metasploit)
* [Explore](#explore)
* [Escalate](#escalate)
* [Effect](#effe... |
# Static - HackTheBox - Writeup
Linux, 30 Base Points, Medium
## Machine

## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```2222``` and ```8080```.
***User***: On ```robots.txt``` file we found two URL's [/vpn] and... |
## <span id="head1"> Penetration_Testing_POC</span>
搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。
**请注意所有工具是否有后门或者其他异常行为,建议均在虚拟环境操作。**
- [ Penetration_Testing_POC](#head1)
- [ 请善用搜索[`Ctrl+F`]查找](#head2)
- [IOT Device&Mobile Phone](#head3)
- [Web APP](#head4)
- [ 提权辅助相关](#head5)
- [ PC](#head6)
- [ tools-小工具集合](#head7)
-... |
[](https://travis-ci.org/sqshq/PiggyMetrics)
[](https://codecov.io/github/sqshq/PiggyMetrics?branch=master)
[ · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/carpedm20/awesome-hacking/week/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list... |
# Node Version Manager [][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/... |
# malware-gems
## NOTE: WORK IN PROGRESS! (Updated 19 July 2022)
### What's this all about?
This page contains a list of mostly malware analysis / reverse engineering related tools, training, podcasts, blog posts, literature and just about anything else closely related to the topic. This page serves as a catalog of ... |
# Awesome Cloud Native Security 🐿

This repository is used to collect **AWESOME** resources on the topic of cloud native security found during research.
Note:
- All resources will be suffixed and ordered by date of conferences, blogs or other formats of publication, if applicable.
- Resources... |
<p align="center">
<a href="https://github.com/trimstray/the-book-of-secret-knowledge">
<img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master">
</a>
</p>
<p align="center">"<i>Knowledge is powerful, be careful how you us... |
# Offensive-Resources V3
((اللَّهُمَّ انْفَعْنِي بِمَا عَلَّمْتَنِي، وَعَلِّمْنِي مَا يَنْفَعُنِي، وَزِدْنِي عِلْمًا))
<hr>
# A Huge Learning Resources with Labs For Offensive Security Players.
<br>
# What is new in V3 ?
- Added Blockchain Security Section
- Added Game Hacking Section
- Added Car Hacking Section
... |
---
title: "Nuclei"
category: "scanner"
type: "Website"
state: "released"
appVersion: "v2.7.0"
usecase: "Nuclei is a fast, template based vulnerability scanner."
---
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
--------------------------
This fil... |
# ペネトレーションテスト用チートシート
# Enum
## Nmap
```
kali@kali:$ sudo nmap -sC -sV -oN nmap/initial 10.10.10.1
```
```
kali@kali:$ sudo nmap -sC -sV -p- -oN nmap/full 10.10.10.1
```
```
kali@kali:$ sudo nmap --min-rate=10000 -p- -v 10.10.10.1
(上記の結果を元に)kali@kali:$ sudo nmap -sC -sV -oN nmap/fast -v -p 22,80,3000 10.10.... |
## sqlmap_chunked_proxy



## Usage:
```bash
python3 sqlmap_chunked_proxy.py
sqlmap -u '' --data '' --proxy=http://127.0.0.1:9999
``` |
# Swagger Code Generator
[](https://travis-ci.org/swagger-api/swagger-codegen)
[](https://maven-badges.herokuapp.com/maven-c... |
[](https://travis-ci.org/rg3/youtube-dl)
youtube-dl - download videos from youtube.com or other video platforms
- [INSTALLATION](#installation)
- [DESCRIPTION](#description)
- [OPTIONS](#options)
- [CONFIGURATION](#configuration)
- [OUTPUT TEMPLAT... |
[](https://github.com/sindresorhus/awesome)
> A curated list of awesome academic and practical resources for Computer Science students.
- [Contribution guide](CONTRIB.md)
## Table of Contents
- [General ... |
## nmap
#### Useful Links
[OSCP Survival Guide - port-scanning](https://github.com/frizb/OSCP-Survival-Guide#port-scanning)
#### NMAP Script details
##### List all available scripts
`locate nse | grep scripts`
##### Enumerate SMB
`nmap -oN nmap_vuln_scan_enum_users_$ip.txt -Pn --script smb-enum-users.nse $ip`
`nm... |
# My Notes for CTF's
# monitoring
### CMD
```
curl "https://185.199.111.153/" -H "host: sa1.lt" --insecure -w "HTTP %{http_code}, TCP Connect: %{time_connect} s, SSL connect: %{time_appconnect} s, First byte: %{time_starttransfer} s, Down speed: %{speed_download} B/s, Total time: %{time_total}\n" -so NUL
```
# Recon... |
# Video tutorial series to go with the HTB challenges
[](https://www.youtube.com/watch?v=0jCGyf32rHs&list=PLHUKi1UlEgOIn12nvhwwq2aTU8bG-FE0I "HackTheBox Challenges")
[Sign up for HackTheBox!](https://affiliate.hackthebox.com/cryptocat-htb) |
# 👨🏻💻 Bug Bounty Blogs and Writeups of different vulnerablities
## This is how they hacked Apple
***Some of the vulnerailities are explained here, take a look down here***
> ***https://samcurry.net/hacking-apple/***
## HTTP Request Smuggling Tips from honoki
> ***https://honoki.net/2020/02/18/http-request-smuggling... |
THIS PROJECT IS IN LIFE-SUPPORT MODE
------------------------------------
This repo tracks the old version of Wifite (*v1*) which does not receive frequent updates and has many bugs (check out the *Isuses* tab!).
There's a new version of Wifite (*Wifite2*) available at [https://github.com/derv82/wifite2](https://gith... |
# PyRDP

[](https://www.blackhat.com/us-19/arsenal/schedule/index.html)
[ - comprehensive guide to testing the security of web applications and web services created by the OWASP foundation.
* [https://owasp... |
# First steps
**Summery:**
- [First steps](#first-steps)
- [1. Port Scan](#1-port-scan)
- [2. Version detection/banner grabbing](#2-version-detectionbanner-grabbing)
- [3. Service Analyses](#3-service-analyses)
- [Notes](#notes)
- [Nmap scripts Path](#nmap-scripts-path)
- [Add nmap vuln script](#add-n... |
<h1 align="center">dsieve <a href="https://twitter.com/intent/tweet?text=dsieve%20-%20Filter%20and%20enrich%20a%20list%20of%20subdomains%20by%20level%20https%3A%2F%2Fgithub.com%2Ftrickest%2Fdsieve&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitter&style=social... |
# Relativity - Security Tools for Windows Environment
(Actualmente en desarrollo algunas funciones no estan disponibles)
Prepara un entorno con herramientas orientadas al pentesting.
Instalación de forma desatendidad en sistemas Microsoft Windows 10 , contiene una recopilación de herramientas que cubre las necesidad... |
# Awesome AWS Security [](https://awesome.re)
A common curated list of links, references, books videos, tutorials (Free or
Paid), Exploit, CTFs, Hacking Practices etc. which are obviously related to AWS Security.
_List inspired by the [awesome](https://github.com/sindresorhus/aw... |
# Master-Cheat-Sheet
* [General usefull Powershell Scripts](#General-usefull-Powershell-Scripts)
* [AMSI Bypass restriction Bypass](#AMSI-Bypass-restriction-Bypass)
* [Payload Hosting](#Payload-Hosting)
* [Network Share Scanner](#Network-Share-Scanner)
* [Lateral Movement](#Lateral-Movement)
* [Reverse Shellz](#Rever... |
# Track Awesome Hacking Updates Daily
A curated list of awesome Hacking tutorials, tools and resources
[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/carpedm20/awesome-hacking/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manag... |
Protocol Buffers - Google's data interchange format
===================================================
Copyright 2008 Google Inc.
https://developers.google.com/protocol-buffers/
C++ Installation - IBM zOS
-----------------------
To build protobuf from source, no additional tools is needed on zOS, build is only reli... |
# Mullvad VPN desktop and mobile app
Welcome to the Mullvad VPN client app source code repository.
This is the VPN client software for the Mullvad VPN service.
For more information about the service, please visit our website,
[mullvad.net](https://mullvad.net) (Also accessible via Tor on our
[onion service](http://o54... |
# Mac&IOS HackStudy
# Mac&IOS安全学习资料汇总
# Mac&IOS安全学习网站收集:
http://samdmarshall.com
https://www.exploit-db.com
https://reverse.put.as
http://highaltitudehacks.com/security/
http://www.dllhook.com/
http://www.securitylearn.net/archives/
http://securitycompass.github.io/iPhoneLabs/index.html
http://security.i... |

[](https://travis-ci.org/wpscanteam/wpscan)
[
*针对所有 Wordpress 网站的测试,首先都应该使用 wpscan 进行扫描:*
```
wpscan --url http://192.168.1.28/
```
扫描结果中中重点关注 WordPress 的版本?使用了什么 Plugin ?Plugin 版本是什么?
然后使用 searchsloit 来查询漏洞。
## 0x2 暴力破解
使用工具:Wfuzz(Kali 自带)
很多 WordPress 的漏洞都需要登录到后台才能利用,这里使用 Wfzuu 工具进行爆破:
```
# 按照实际情况调整-hh ... |
# Internet of Things (IoT) Hacking Resources
The Internet of Things (IoT) Hacking Resources refer to an array of tools and frameworks used to ensure the security of IoT devices and networks.
## Analysis Frameworks
- [EXPLIoT](https://gitlab.com/expliot_framework/expliot): This is a penetrating testing framework that ... |
# Nibbles - Hack the box

## Introduction
Target: 10.10.10.75(OS: Linux)
Kali linux: 10.10.16.44
## Information Enumeration
Firstly, detect the open ports:
```
nmap -sT -p- --min-rate 10000 -oA openports 10.10.10.75
```

* [nikto](#nikto)
* [gobuster](#gobuster)
* [enum4linux](#enum4linux)
* [smbclient](#smbclient)
* [ftp](#ftp)
* [snmpwalker](#snmpwalker)
* Web application
* [LFI](#LFI)
* [RFI](#RFI)
* [WordPress](#WordPress)
* Password Cr... |
# One-Liner-Scripts [](https://awesome.re)
###### Thanks to all who create these Awesome One Liners❤️
----------------------

---------------------------
# Subdom... |
---
description: >-
A collection of notes for Penetration Testers and Ethical Hackers. My journey
to OSCP and beyond.
---
# Hacker's Rest
These are my publicly accessible notes from various sources for penetration testing, red-teaming, OSCP, Capture the Flag (CTF) challenges, and my [Vulnhub](https://www.vulnhub... |
# UpDown - HackTheBox - Writeup
Linux, 30 Base Points, Medium

## Machine

## TL;DR
To solve this machine, we start by using `nmap` to enumerate open services and find ports `22` and `80`.
***User***: Discovered virtual host `dev.siteisup.htb` and dir... |
# WPScan Output Parser
**`wpscan_out_parse` is a Python parser for WPScan output files** (JSON and CLI).
It analyze vulnerabilities, miscellaneous alerts and warnings and other findings.
<a href="https://github.com/tristanlatr/wpscan_out_parse/actions" target="_blank"><img src="https://github.com/tristanlatr/wpsc... |
# Nmap commands
#This command is used to find machines connected to my network.
```
nmap -sV -sP 10.0.0.15/24
```
I use this command to find open ports
```
nmap -sV 10.0.0.21
```
scans all ports on a network
```
nmap -sV -sP 10.0.0.15/24 -p-
```
scans SYN packages on a network
```
nmap -sS -p- 10.0.0.21
```
command... |
# Enumeration
## Ports
### FTP - 21
> https://book.hacktricks.xyz/pentesting/pentesting-ftp
>
> - Fingerprint: `nc -nv <ip> 21`
> - Anonymous Access: `ftp <ip>` `ftp> anonymous` `ftp> pass`
> - Browser Access: `ftp://anonymous:anonymous@10.10.10.98`
> - Commands:
> - Binary Mode: `binary`
> - Upload File: `put <... |
# Pentest Tools

The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ
## TODO
* [x] Directory
* [ ] Browser bookmarks
* [ ] Install Scripts
*... |
# welcome to my methodolgy I collected All what I have learnt from amazing hackers , Tomnomnom , Jason Haddix , Uncle Rat , NahamSec and
More Amazing People hackers ,
I usually like to start with a very big inscope attack surface and then norrow it down ::
# mind map threat
```
note taking
https://obsidian.md/down... |
# KaliPAKU: Training Tool for Penetration Testing Using Kali Linux




![sns]... |
```ruby
███████╗ █████╗ ███████╗██╗ ██╗ ██████╗
██╔════╝██╔══██╗██╔════╝╚██╗ ██╔╝██╔════╝
█████╗ ███████║███████╗ ╚████╔╝ ██║ ███╗
██╔══╝ ██╔══██║╚════██║ ╚██╔╝ ██║ ██║
███████╗██║ ██║███████║ ██║ ╚██████╔╝
╚══════╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═════╝
Made with <3 by Riccardo Malatesta (@seeu)
```
[
| Challenge/Machine | Writeup/Walkthrough | MD5 | Posted On |
| ------------ | ------------ | ------------ | ------------ |
| [Hc0n2020-b00t2root-Machine-User-Fla... |
# Nibbles
URL: https://app.hackthebox.com/machines/Nibbles
Level: Easy
Date 2 Jun 2020
## Walkthrough
- [Enumeration](#enumeration)
- [User flag](#user-flag)
- [Privesc](#privesc)
# Enumeration
## NMAP
```
# Nmap 7.80 scan initiated Tue Jun 2 21:30:42 2020 as: nmap -T4 -A -p- -oN Nibbles_nmap.txt 10.10.10.75
N... |
# ReconScan
The purpose of this project is to develop scripts that can be useful in the pentesting workflow, be it for VulnHub VMs, CTFs, hands-on certificates, or real-world targets.
The project currently consists of two major components: a script invoking and aggregating the results of existing tools, and a second ... |
# stegify
[](https://travis-ci.org/DimitarPetrov/stegify)
[](https://coveralls.io/github/DimitarPetrov/stegify?branch=master)
[
... |
For use with Kali Linux. Custom bash scripts used to automate various pentesting tasks.
# Licence
This project is licensed under the ```BSD 3-clause “New” or “Revised” License```. For more information please see the licence file
### Download, setup & usage
* git clone git://github.com/leebaird/discover.git /opt/disc... |
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.2.1.1">
<img src="https://img.s... |
---
title: "CMSeeK"
category: "scanner"
type: "CMS"
state: "released"
appVersion: "v.1.1.3"
usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities"
---
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
-----------... |
## Knowledge Repository
The Knowledge Repository is a [memex](https://en.wikipedia.org/wiki/Memex), a personal knowledge database, a collection of notes, references, book summaries and examples.
### The Problem
The more I learn the more I forget.
To avoid forgetting, I have to revise.
The more knowledge I have t... |
# HackTheBox CTF Cheatsheet
This cheatsheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list on our experience. Please sh... |
<p align="center"> <img src="GerryMeMoji2.png"> </p>
An awesome list of resources for training, conferences, speaking, labs, reading, etc that are **free** all the time that cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to ... |
# Project Black
Scope control, scope scanner and progress tracker for easier working on a bug bounty or pentest project
Anatoly Ivanov of [Positive Technologies](https://ptsecurity.com)
## What is this tool for?
The tools encourages more **methodical** work on pentest/bugbounty, tracking the progress and general sc... |
<p align="center">
<img src="https://s3.amazonaws.com/ohmyzsh/oh-my-zsh-logo.png" alt="Oh My Zsh">
</p>
Oh My Zsh is an open source, community-driven framework for managing your [zsh](https://www.zsh.org/) configuration.
Sounds boring. Let's try again.
__Oh My Zsh will not make you a 10x developer...but you may fe... |
<!-- markdownlint-disable MD033 MD041 -->
<p align="center">
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker">
<img
alt="Offensive Docker"
src="https://github.com/aaaguirrep/offensive-docker/blob/master/img/banner.jpg"
width="600"
/>
</a>
</p>
<br/>
<p align="center">
<a h... |
---
title: 更新日志
---
<center><h1>更新日志</h1></center>
---
## 2023.7.16
<p></p>
<br>
<template>
<a-timeline><a-timeline-item>
<p>
<a-tag color="red">收到补充</a-tag>收到「曾哥」师傅补充的文库信息,感谢「曾哥」师傅贡献的以下文章:
<br/>
</p>
</a-timeline-item><a-timeline-item>
<p>
<a-tag color="blue">新增文章</a... |
<p align='center'>
<img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br>
<img src="https://img.shields.io/badge/Version-1.1.0-brightgreen.svg?style=style=flat-square" alt="version">
<img src="https://img.shields.io/badge/python-3-orange.svg?style=style=flat-square" alt="Python Version">
<img src="http... |
<h1 align="left">
<img src="static/nuclei-logo.png" alt="nuclei" width="200px"></a>
<br>
</h1>
[](https://opensource.org/licenses/MIT)
[](https://goreportcard.com/report/... |
# Legacy
URL: https://app.hackthebox.com/machines/Legacy
Level: Easy
Date 26 May 2020
## Walkthrough
- [Enumeration](#enumeration)
# Enumeration
## NMAP
We found SAMBA service.
We found that we can try Eternal Blue:
```
msf5 exploit(windows/smb/ms17_010_eternalblue) > use auxiliary/scanner/smb/smb_ms17_010
ms... |
# Tools
* [Security Tools list](https://sectools.org)
* [Kali Linux](https://www.kali.org/downloads/): Linux distro specifically for Penetration testing, strict Debian based
* [Back track Linux](https://www.backtrack-linux.org/): Precursor to Kali Linux (since 2013), Ubuntu based.
* [MacChanger](https://www.hackingtu... |
# Swagger Code Generator
- Master (2.4.0): [](https://travis-ci.org/swagger-api/swagger-codegen)
[
<a href="https://madewithml.com/#course">
<... |
### robots.txt
```
User-agent: *
Disallow: /wp-admin/
Allow: /wp-admin/admin-ajax.php
Sitemap: http://metapress.htb/wp-sitemap.xml
```
git clone https://github.com/relarizky/wpxploit.git
cd wpxploit
pip3 install -r requirements.txt
./exploit.py
wpscan --rua -e ap,at,tt,cb,dbe,u,m --url http://metapress.htb/ --pass... |
# ReconNess Web App
[](https://dev.azure.com/reconness/reconness/_build/latest?definitionId=1&branchName=master)
<a href="https://twitter.com/reconness"><img src="https://img.shields.io/twitter/follow/rec... |
# DeFi Developer Road Map
**Here we collect and discuss the best DeFi & Blockchain researches and tools - contributions are welcome.**
**Feel free to submit a pull request, with anything from small fixes to translations, docs or tools you'd like to add.**
- **Disclaimer: All information (tools, links, articles, text... |
# OSCP Prep Materials
- [TJnull’s list updated list 2021](https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=0)
## OSCP Journeys and Preparation guides:
- [parthdeshani,Pass OSCP like a Boss](https://medium.com/@parthdeshani/how-to-pass-oscp-like-boss-b269f2ea99d)
- [Tj Nul... |
# Swagger Code Generator
- Master: [](https://travis-ci.org/swagger-api/swagger-codegen)
[][3] [][4] [](https://bestpractices.coreinfrastructure.org/projects/684)... |
<p align="center">
<a href="http://nestjs.com/" target="blank"><img src="https://nestjs.com/img/logo-small.svg" width="120" alt="Nest Logo" /></a>
</p>
[circleci-image]: https://img.shields.io/circleci/build/github/nestjs/nest/master?token=abc123def456
[circleci-url]: https://circleci.com/gh/nestjs/nest
<p align=... |
[<img src="https://user-images.githubusercontent.com/1295961/45949308-cbb2f680-bffb-11e8-8054-28c35ed6d132.png" align="center" width="850">](https://flutter.dev/)
<p align="center">
<a href="https://stackoverflow.com/questions/tagged/flutter?sort=votes">
<img alt="StackOverflow" src="https://img.shields.io/badge... |
<p align="center">
<a href="https://patrickjs.com" target="_blank">
<img src="/media/awesome-angular.png" alt="Awesome Angular" />
</a>
</p>
# Awesome Angular [](https://github.com/sindresorhus/aweso... |
Welcome to our comprehensive collection of learning resources for **DevSecOps**! Here, you'll discover a curated list of the best learning materials we've assembled just for you.
Take a moment to explore these valuable resources, handpicked to enhance your understanding of **DevSecOps**. We strive to provide the most ... |
# Awesome JavaScript [](https://github.com/sorrycc/awesome-javascript/)
A collection of awesome browser-side [JavaScript](https://developer.mozilla.org/en-US/docs/Web/JavaScript) libraries, resources and shi... |
<div align="center">
<img width="500" height="350" src="media/logo.svg" alt="Awesome">
<br>
<br>
<hr>
<p>
<p>
<sup>
<a href="https://github.com/sponsors/sindresorhus">My open source work is supported by the community</a>
</sup>
</p>
<sup>Special thanks to:</sup>
<br>
<br>
<a href="https://sta... |
# Awesome Penetration Testing [](https://awesome.re)
> A collection of awesome penetration testing and offensive cybersecurity resources.
[Penetration testing](https://en.wikipedia.org/wiki/Penetration_test) is the practice of launching authorized, simulated attacks again... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.