text
stringlengths
9
334k
# HackTheBox Writeups * [Armageddon](Armageddon.md) * [Arctic](Arctic.md) * [Aragog](Aragog.md) * [Apocalyst](Apocalyst.md) * [Access](Access.md)
<h1 align="center"> <img src="https://user-images.githubusercontent.com/2679513/131189167-18ea5fe1-c578-47f6-9785-3748178e4312.png" width="150px"/><br/> Speckle | Oct'21 Hackathon </h1> <h3 align="center"> Report Generator — A carbon cost estimator tool </h3> <p align="center"><b>Speckle</b> is data infrastruct...
# BugBounty Tips Collection of `#bugbountytips` from twitter and my bash-jutsu. # Recon ``` Google the company copyright footer to get more domains. Use whoxy.com to perform reverse whois lookups with the email used to register the main domain/ Search for slide,docs,demos and video tutorials by your target. Manny inno...
# The_Growth_Path_Of_A_CTFer/Pwner(一名CTF爱好者、安全从业者的成长之路❌ 一名安全菜鸟的成长之路✅) 作者:中科院某所网络安全方向研究生在读,(菜狗狗🐶),对网络安全,CTF非常感兴趣.学习的领域包括但不限于二进制、系统安全、红队攻防等. 这个仓库会记录自己的成长历程以及精心整理,学习收集的资料. 欢迎pr! !这些资料自己基本上都看过或者正在学习~ 会给出对资料的自己的理解,所以相对有较好的参考价值!(应该吧..) 此外,还包含了一些网安的活动日历,ctf日历等(目前没时间管这个了..大家可以多关注ctftime和一些安全社区等,会有通知).可以参考! Table of Conte...
# Awesome Python Books [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) > Directory of Python books ## Table of Contents - [Grammar](#grammar) - [Data Structures and Algorithms](#data-structures-and-algorithms) ...
### IP `10.10.128.87` # Recon ### nmap `nmap -sC -sV 10.10.128.87 -oN init.nmap` ``` Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-27 20:21 EDT Nmap scan report for 10.10.128.87 Host is up (0.11s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0...
# Course Overview Welcome to the Beginner Network Pentesting course. Previously, the course was delivered weekly on Twitch and built from lessons learned in the previous week. The course provides an opportunity for those interested in becoming an ethical hacker / penetration tester the chance to learn the practical s...
--- title: 'WPScan' path: 'scanners/wpscan' category: 'scanner' type: "CMS" state: "released" appVersion: "3.8.5" usecase: 'Wordpress Vulnerability Scanner' --- ![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png) WPScan is a free, for non-commercial use, black box WordP...
# Cheatsheet Repository Glad you made it to our little corner of the interwebs. We know that being a programmer can be tough. It's a constantly-changing landscape, and it can be hard to keep up. That's why we've put together this cheatsheet repository, so you can get all the info you need in one place. ## Our Cheatsh...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.3"> <img src="https://img.shiel...
HTTP2WebSocket =============== **Latest release**: 1.0<br> **License**: GNU GPL HTTP2WebSocket is tool to translate HTTP/1.1 traffic into Web Sockets traffic. It can be used in conjunction with standard pentesting tools like sqlmap, dirb, commix or others.<br> It supports: * SSL (wss://) * Proxy * WS connection initia...
# Contributors This is a list of people who have contributed to the [bugbounty-tools](https://github.com/maurosoria/bugbounty-tools) project. Contributions can come in many forms: coding, documentation, testing, discussions, and more. We follow the [all-contributors](https://allcontributors.org/) specification and us...
# Awesome CTF Cheatsheet [![Awesome](https://awesome.re/badge-flat.svg)](https://awesome.re)[<img src="media/icons8-hacking.svg" align="right" width="150">](https://uppusaikiran.github.io/hacking/Capture-the-Flag-CheatSheet/) > A currated list of all capture the flag tips and strategies to solve Online CTF challenges...
# [![](https://raw.githubusercontent.com/wiki/zaproxy/zaproxy/images/zap32x32.png) ZAP](https://www.zaproxy.org) [![License](https://img.shields.io/badge/license-Apache%202-4EB1BA.svg)](https://www.apache.org/licenses/LICENSE-2.0.html) [![GitHub release](https://img.shields.io/github/release/zaproxy/zaproxy.svg)](https...
<p align='center'> <img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br> <a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.2"><img src="https://img.shields.io/badge/Version-1.1.2-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/Tuhinshubhra/CMSeeK/"...
# Shared - HackTheBox - Writeup Linux, 30 Base Points, Medium ![info.JPG](images/info.JPG) ## Machine ![‏‏Shared.JPG](images/Shared.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80```, and ```443```. ***User***: Found subdomain ```checkou...
### Web Application Security _1.1 Cross-Site Scripting (XSS)_ ``` Reflected/Stored XSS <H1>Test</H1> //Simple test for sanitization of input <script>alert('XSS');</script> //Typical XSS test input field script <script>alert(document.cookie)</script> //Display current session cookie in alert DOM XSS - Runs on Client-...
<p align="center"> <a href="https://github.com/trimstray/the-book-of-secret-knowledge"> <img src="https://github.com/correia-jpv/fucking-the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master"> </a> </p> <p align="center">"<i>Knowledge is powerful, be careful ...
# My Ethical Hacking Notes * This is where I'll be writing my notes on the topic of Ethical Hacking and whatever I learn about it: * [Learn Ethical Hacking From Scratch - Udemy](LearnEthicalHackingFromScratch_Udemy/README.md) * [CompTIA A+ 220-1001 - Professor Messer](CompTIA_220-1001/README.md) * [CompTIA A+...
## 👑 What is KingOfOneLineTips Project ? 👑 Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understan...
## Web-Hacking Cheatsheet ### Gathering info on a web server #### Finding default content of web server using nikto ```sh nikto -h [HOST] -Tuning x ``` #### Analyze website using skipfish ```sh skipfish -o /root/output -S /usr/share/skipfish/dictionaries/complete.wl [HOST:8080] ``` #### Discover w...
<h1 align="center"> <br> <a href="https://github.com/robotshell/magicRecon"><img src="https://github.com/robotshell/magicRecon/blob/master/images/logo.png" alt="magicRecon"></a> <br> MagicRecon: Fast, simple and effective <br> </h1> <p align="center"> <a href="https://github.com/robotshell/magicRecon/rel...
<h1 align="center">dsieve <a href="https://twitter.com/intent/tweet?text=dsieve%20-%20Filter%20and%20enrich%20a%20list%20of%20subdomains%20by%20level%20%40trick3st%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fdsieve&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitte...
# File Inclusion > The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application. > The Path Traversal vulnerability allows an attacker to access a file, usually exploiting a "reading" mechanism implemented in the ...
# [09 - Mirai](https://app.hackthebox.com/machines/Mirai) * [description](#description) * [walkthrough](#walkthrough) * [recon](#recon) * [80](#80) * [53](#53) * [back to 80](#back-to-80) * [32400](#32400) * [still digging](#still-digging) * [pi](#pi) * [flag](#flag) ![Mirai.png](Mira...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
# CTF-resources ![alt text](https://github.com/tcrosby56/CTF-resources/blob/master/skull.jpg) **SSH Tricks and Tips** [SSH Tunneling](https://github.com/tcrosby56/CTF-resources/blob/master/SSH_TUNNEL.md) **CTF RESOURCES** [Over the Wire](https://overthewire.org/) [Hack This Site](https://www.hackthissite.org/) [...
# SQL injection > A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. Attempting to manipulate SQL queries may have goals including: - Information Leakage - Disclosure of stored data - Manipulation of stored data - Bypassing authorisation c...
# TensorFlow Lite C++ image classification demo This example shows how you can load a pre-trained and converted TensorFlow Lite model and use it to recognize objects in images. Before you begin, make sure you [have TensorFlow installed](https://www.tensorflow.org/install). You also need to [install Bazel](https://do...
# Optixal's OSCP Notes > Try Harder # Welcome ## Finding Your Way Around Kali ### Find, Locate, and Which #### locate Reads from a database prepared by `updatedb` ```sh updatedb locate sdb.exe ``` #### which Returns pathnames of files or links which would be executed in the current environment. It does this by s...
# RedTeam-Tools <p align="center"> <img src="https://user-images.githubusercontent.com/100603074/210680426-20a92131-56f9-43ad-be82-f449e3215dda.png" height="300"> </p> This github repository contains a collection of **130+** **tools** and **resources** that can be useful for **red teaming activities**. Some of the ...
# HTBWalkthroughs Hello and welcome to my walkthroughs for Hack the Box (HTB). I've challenged myself with completing 50 HTB machines over the course of 6 months to learn hacking tools and skills that will prepare me for a career in the field. Being that I am very much a beginner at the time of writing this, I won't be...
Repository to index interesting Capture The Flag tools and other stuff. * [Table of Contents](#table-of-contents) - [Platforms to practice](#platforms-to-practice) - [Cryptography](#cryptography) * [Main](#main) * [Secondary](#secondary) * [Hashes](#hashes) * [Esoteric Languag...
# SQLMap - Cheetsheat <details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong...
<p align="center"><img src="src/banner.png" alt="Banner"></img></p> <p align="center">Creator: <a href="https://app.hackthebox.eu/profile/94858">egotisticalSW</a></p> # Personal thoughts This is a custom exploitation box, and you obviously need to know about `PHP Object Injection` and a bit of scripting.. Enjoyed solv...
# oswe-learning-plan ### Vulns to study - Deserialization - Java - https://www.youtube.com/watch?v=VviY3O-euVQ - https://i.blackhat.com/eu-19/Thursday/eu-19-Zhang-New-Exploit-Technique-In-Java-Deserialization-Attack.pdf - https://owasp.org/www-community/vulnerabilities/Deserialization_of_untru...
# OSCP-PWK-Prep-Resources- UPDATE 06/01/2020: Hey there friends, I have been very quiet on here, I was surprised to see more people have starred this "guide" more than I expected, so I am glad this provides some use to folks. I do plan on being more active now on here now as I start my OSCP jouney once again. Unfortuna...
# awesome-computer-science-opportunities An awesome list of events and fellowship opportunities for computer science students ## Contents - [Learning Platform](#learning-platform) - [Competitive Programming](#competitive-programming) - [Web Development](#web-development) - [Mobile Development](#mobile-devel...
# Archangel CTF [TryHackMe](https://tryhackme.com/room/archangel) ![Logo](./assets/archangel.jpeg) --- ```bash export IP=10.10.62.137 ``` --- ## Index - [Enumeration](#enumeration) - [Gaining access](#getting-access-to-the-machine) - [PrivEsc](#escalating-priviledges) --- ### Enumeration ```bash $ nmap -sC -sV -v...
<img src="https://raw.githubusercontent.com/3xp10it/pic/master/xwafWhite.png"> # xwaf <a href="https://github.com/3xp10it/bypass_waf/blob/master/xwaf.py">xwaf</a>是一个python写的waf自动绕过工具,上一个版本是<a href="https://github.com/3xp10it/bypass_waf/blob/master/bypass_waf.py">bypass_waf</a>,xwaf相比bypass_waf更智能,可无人干预,自动暴破waf ### ...
# The NoteBook @Hackthebox ![image](https://user-images.githubusercontent.com/5285547/127499612-feb4ebdf-63f1-4899-b91f-14c7d161d146.png) Link: https://app.hackthebox.eu/machines/TheNotebook ## Enumeration ### Nmap ``` PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 1234/tcp open hot...
```bash ████████╗██╗ ██╗███████╗ ██╗ ██╗ ██╗███╗ ██╗██╗ ██╗ ████████╗███████╗ █████╗ ███╗ ███╗ ╚══██╔══╝██║ ██║██╔════╝ ██║ ╚██╗ ██╔╝████╗ ██║╚██╗██╔╝ ╚══██╔══╝██╔════╝██╔══██╗████╗ ████║ ██║ ███████║█████╗ ██║ ╚████╔╝ ██╔██╗ ██║ ╚███╔╝ ██║ █████╗ ███████║██╔████╔██║ ...
<details> <summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a><a href="https://twitter.com/carlospolopm"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></...
# openshift-waf Sidecar container that provides a WAF for openshift routers cd docker-nikto && docker build -t nikto . && docker run --net=host nikto -host http://$(ifconfig en0 | awk '$1 == "inet" {print $2}'):8080 -useragent curl
# OSCP-Human-Guide **Edit** I'm currently moving all the OSCP stuff and other things to my "[pentest-book](https://six2dez.gitbook.io/pentest-book/)". This repository will not have more updates. Sorry for the inconvenience. **This page is the jouney with some tips, the real guide is [HERE](https://github.com/six2dez/...
# BUG BOUNTY (Under Development) Note: Contents inside the **RESETHACKER Community** are to help our community members and content belongs to respective Authors and RESETHACKER Team. BugBounty HelpDesk | Title -- | -- **0** Bug bounty FAQ | [Beginners friendly](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugb...
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1> Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the...
# Dpluger tool demo This page illustrates how to use `dpluger` to generate Dsiem directives using a `dpluger_config.json` configured for suricata index. The same workflow can be used for other indices too. ## Steps First generate attack traffic to populate suricata index. Do something like this from a remote machine...
<div align="center"> <img alt="logo_hack_tools" src="https://i.postimg.cc/GtLdZ2rZ/noun-Panama-hat-1454601.png" /> <h1>Welcome to HackTools 🛠</h1> <p> <img alt="Version" src="https://img.shields.io/badge/version-0.5.0-blue.svg?cacheSeconds=2592000&style=for-the-badge" /> <a href="https://addons.mozilla.o...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.1.3"> <img src="https://img.shi...
## [CVE-2022-25003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25003) ![](https://github.com/nu11secur1ty/CVE-mitre/blob/main/2022/CVE-2022-25003/Docs/Screenshot%202022-03-01%20121609.png) ## Description: The `id` parameter from Hospital Patient Record Management System v1.0 appears to be vulnerable to ...
<details> <summary><strong>Support HackTricks and get benefits!</strong></summary> Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLAN...
<p align="center"> <a href="https://wpscan.org/"> <img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo"> </a> </p> <h3 align="center">WPScan</h3> <p align="center"> WordPress Security Scanner <br> <br> <a href="https://wpscan.com/" title="home...
# Node Version Manager [![Build Status](https://travis-ci.org/nvm-sh/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.38.0-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)...
# Netmon URL: https://app.hackthebox.com/machines/Netmon Level: Easy Date 8 Jun 2020 ## Walkthrough - [Enumeration](#enumeration) - [User flag](#user-flag) - [Privesc](#privesc) # Enumeration ## NMAP ``` # Nmap 7.80 scan initiated Mon Jun 8 23:10:00 2020 as: nmap -p- -A -T4 -oN nmap.txt 10.10.10.152 Nmap scan ...
## Description **CMSeeK** scans WordPress, Joomla, Drupal and over 180 other CMSs. A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. ## Cheatsheat ``` SPECIFING TARGET: -u URL, --url URL T...
# Nmap Get experience with Nmap, a powerful network scanning tool. [Nmap](https://tryhackme.com/room/rpnmap) ## Topic's * NMAP Fundamentals * Network Enumeration ## Task 1 Introduction to Port Scanning When it comes to hacking, knowledge is power. The more knowledge you have about a target system or network, the ...
# Penetration Testing Methodology > Penetration testing Process, Methods and Real world Attacks Collections ## Framework and Testing Guide - [OWASP](https://www.owasp.org/index.php/OWASP_Testing_Project) - Open Web Applicaiton Security Project - [PTES](http://www.pentest-standard.org/index.php/PTES_Technical_Guidelin...
![theHarvester](https://github.com/laramies/theHarvester/blob/master/theHarvester-logo.webp) ![TheHarvester CI](https://github.com/laramies/theHarvester/workflows/TheHarvester%20Python%20CI/badge.svg) ![TheHarvester Docker Image CI](https://github.com/laramies/theHarvester/workflows/TheHarvester%20Docker%20Image%20CI/...
# Internal ## Table of Contents * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [Web Browsing](#web-browsing) * [Web Crawling](#web-crawling) * [Vulnerability Scanning](#vulnerability-scanning) * [Exploit](#exploit) * [Password Guessing](#password-guessing) * [Local File Inclusion](#...
# [![OWASP Logo](https://github.com/OWASP/Amass/blob/master/images/owasp_logo.png) OWASP Amass](https://www.owasp.org/index.php/OWASP_Amass_Project) [![CircleCI Status](https://circleci.com/gh/OWASP/Amass/tree/master.svg?style=shield)](https://circleci.com/gh/OWASP/Amass/tree/master) [![GitHub release](https://img.sh...
# Awesome Resources For Learning Ethical Hacking & Pentesting ![Awesome Hacking](https://img.shields.io/badge/awesome-hacking-red.svg) ![Awesome community](https://img.shields.io/badge/awesome-community-green.svg) What I’m sharing here is a collection of some best resources about Hacking & Penetration Testing to make ...
# Webshell upload techniques ### INDEX ``` I. Classic Webshell upload techniques ➤ Technique 1. Webshell upload using a PHPMyAdmin Web console ➤ Technique 2. Webshell upload using an Apache Tomcat manager Web console ➤ Technique 3. Webshell upload using a JBoss administration JMX console ➤ Technique 4. We...
# BugBountyTips BugBounty (Bypasses, Payloads, y más) ## Listas de Bypassing - [Bypass 2FA](https://github.com/xNaughty/BugBountyTips/blob/main/Bypass%202FA.md) - [Bypass Captcha](https://github.com/xNaughty/BugBountyTips/blob/main/Bypass%20Captcha.md) - [Bypass 403](https://github.com/xNaughty/BugBountyTips/blob/mai...
![](images/boxInfo.png) # Recon ## nmap ```console root@kali:~# nmap -sC -sV 10.10.10.29 Starting Nmap 7.80 ( https://nmap.org ) at 2020-04-10 20:35 EDT Nmap scan report for 10.10.10.29 Host is up (0.55s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2u...
# 所有收集类项目: - [收集的所有开源工具: sec-tool-list](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式 - [安全资源收集类的 Repo](https://github.com/alphaSeclab/awesome-security-collection): 1000+各类安全资源收集的Github Repo - [全平台逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): - Windows平台安全: PE/DLL/DL...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.4"> <img src="https://img.shiel...
# Pentest Tools ![](logo.png) The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ ## TODO * [x] Directory * [ ] Browser bookmarks * [ ] Tools Usage * [...
# ColdBox Room [TryHackMe](https://tryhackme.com/room/colddboxeasy) --- ![Coldbox](./.assets/ColdboxEasy.png) --- ## Index - [Enumeration](#enumeration) - [Find vunerabilies](#finding-vunerabilies) - [Reverse shell](#gaining-a-reverse-shell) - [PrivEsc](#priviledge-escalation) --- ```bash $ export IP=10.10.94.215...
## Lists - https://github.com/D4nk0St0rM/ethical_hacker_lists #### Some Gems - https://github.com/jhaddix?tab=repositories #### Infrastructure - https://github.com/mantvydasb/Red-Team-Infrastructure-Automation #### Subdomains - https://github.com/nsonaniya2010/SubDomainizer - https://github.com/Cillian-Collins/su...
# Resources-For-OSCP ### The Overview:- * https://thehackerish.com/oscp-certification-all-you-need-to-know/ ### The OSCP:- * https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/ * https://github.com/OlivierLaflamme/Cheatsheet-God * https://github.com/foobarto/redteam-notebook/blob/master/README.md * https:/...
--- title: "CMSeeK" category: "scanner" type: "CMS" state: "released" appVersion: "v.1.1.3" usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities" --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -----------...
# Outdated - HackTheBox - Writeup Linux, 30 Base Points, Medium ![info.JPG](images/info.JPG) ## Machine ![‏‏Outdated.JPG](images/Outdated.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp```. ***User 1***: Found PDF on SMB share, From the PDF we know that we need to use ```...
# CTF Writeups <p align="center"> <img src="resources/images/logo.jpg"> <br> <i>Writeups Challenges I have solved</i> [![xiosec - CTF-writeups](https://img.shields.io/static/v1?label=xiosec&message=CTF-writeups&color=blue&logo=github)](https://github.com/xiosec/CTF-writeups) [![stars - CTF-writeups](https://img.shield...
<b>Table of Contents</b> - [Enumeration](#enumeration) * [Generic Enumeration](#genumeration) * [HTTP Enumeration](#httpenumeration) * [SSH Enumeration](#sshenumeration) * [SMB Enumeraion](#smbenumeration) * [SNMP Enumeration](#snmpenumeration) - [Explotation](#explotation) * [BOF Based Exploits](#bof) *...
Wordpress =========== We don't know for sure if we will have a Wordpress box in the game, but just in case, we may as well try and be prepared. wpscan --------- * [https://wpscan.org/](https://wpscan.org/) * [https://github.com/wpscanteam/wpscan](https://github.com/wpscanteam/wpscan) Scan for all plugins and outp...
<p align="center"> <a href="https://wpscan.com/"> <img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo"> </a> </p> <h3 align="center">WPScan</h3> <p align="center"> WordPress Security Scanner <br> <br> <a href="https://wpscan.com/" title="home...
# Wordpress ## Evil plugin install If you are wordpress admin. ( Upload wordpress-shell plugin that can be found under shells ) This location: --> Plugins --> Installed Plugins --> Add new --> upload ( Press Activate ) This command gives you now command execution ```sh curl http://10.11.1.xxx/wp-content/plugins/...
<p align="center"> <a href="https://wpscan.com/"> <img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo"> </a> </p> <h3 align="center">WPScan</h3> <p align="center"> WordPress Security Scanner <br> <br> <a href="https://wpscan.com/" title="home...
# 互联网安全 推荐 | ts | title | url| | --- | --- | ---| # 玄武实验室 推荐 | ts | title | url| | --- | --- | ---| | 20220427 | 2022 未知之境 腾讯网络安全T-Star高校挑战赛 WriteUp | http://tttang.com/archive/1577/| | 20220427 | Adobe Acrobat 的浏览器扩展被发现存在破坏同源策略(SOP)的漏洞 | http://palant.info/2022/04/19/adobe-acrobat-hollowing-out-same-origin-poli...
# Cybersecurity Infosec > Welcome to the World of Infosec in Cybersecurity. An ongoing open collection infosec useful links, courses, learning tutorials, libaries, and training resources. [Information Security](https://en.wikipedia.org/wiki/Information_security), sometimes shortened to InfoSec, is the practice of prot...
Docker Hacklab === > My personal hacklab, create your own. French article: https://blog.ston3o.me/creer-hacklab-virtuel-docker/ Quick Start --- ``` $ docker run --name hacklab --net=host --privileged -it ston3o/docker-hacklab zsh _ _ _ ___ _ ___ _ ___ | || | /_\ / __| |/ / | /_\ | _ ) | __ |/ _ \ (...
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) ESP32-WROOM! ## This flasher/updater will work for any ESP32-WROOM chip or the v4 OEM Marauder. Looking for a Linux/OS X version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFl...
# MY CHEAT SHEET(Only Japanese) ペネトレーションテストの練習(Hack the Box, VulnHub)等を行う際に参考にしてください。 アドバイスやミス等ありましたら[Twitter(@さんぽし)](https://twitter.com/sanpo_shiho)までお願いします (PR or issueでも勿論OKです!) This is a cheat sheet in penetration testing. Please use it when hacking Hack the Box, VulnHub, etc. **悪用厳禁 DO NOT ABUSE** # 目次(Conte...
# Help ![alt text](Images/help.png) __Machine URL__: https://www.hackthebox.eu/home/machines/profile/170 __Machine IP__: 10.10.10.121 __DATE__ : 3/05/2019 __START TIME__: 9:50 AM *** `Nmap scan` ----------- ![alt text](Images/nmap.png) There is nothing new going on in here. Just some basic ports along with a ...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) `Arthas` is a Java Diagnostic tool open sourced by Alibaba. Arthas help developers in trouble-shooting production issues for Java applications without modifying code or restarting servers. [中文说明](README_CN.md) (For Chinese Documentation) ### Background Often ti...
# HackTheBox CTF Cheatsheet This cheatsheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list on our experience. Please sh...
# drone-nikto Imports XML from [Nikto](https://github.com/sullo/nikto) into a lair project. ## Note The latest version of Nikto v2.1.6 contains some flaws within the XML output format that will need to be addressed before successful execution of drone-nikto. There is currently a Nikto pull request to address this issu...
# 50-Days-Of-SQLi Q. Why I am starting this? I have always struggled as a bug hunter. Whenever I read anything new I learn from it but hardly implement it. And because of that whenever I read anything now, it feels like I know it and so couldn't digest complete information that the writeup has to offer. And so the a...
![alt tag](https://github.com/YasserGersy/cazador_unr/blob/master/imgs/cazador.png?raw=true) [![Gitter](https://badges.gitter.im/cazadorapp/community.svg)](https://gitter.im/cazadorapp/community?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) [![GitHub issues](https://img.shields.io/github/issues/YasserGersy/...
Charm ===== <p> <img src="https://stuff.charm.sh/charm/charm-header.png?14" width="220" alt="A little cloud with a pleased expression followed by the words ‘Charm from Charm’"><br> <a href="https://github.com/charmbracelet/charm/releases"><img src="https://img.shields.io/github/release/charmbracelet/charm.svg" alt...
# oscp * This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course. * [Cheat Sheet](https://github.com/so87/OSCP-PwK/blob/master/Penetration%20Testing%20Tools.docx) ## docker container for portability * kali-build contains the files necessary for running...
<h1 align="center">mgwls <a href="https://twitter.com/intent/tweet?text=mgwls%20-%20Combine%20words%20from%20two%20wordlist%20files%20and%20concatenate%20them%20with%20an%20optional%20delimiter%20%40trick3st%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fmgwls&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.sh...
# frp [![Build Status](https://circleci.com/gh/fatedier/frp.svg?style=shield)](https://circleci.com/gh/fatedier/frp) [![GitHub release](https://img.shields.io/github/tag/fatedier/frp.svg?label=release)](https://github.com/fatedier/frp/releases) [README](README.md) | [中文文档](README_zh.md) <h3 align="center">Gold Spons...
<div align="center"> <a href="https://github.com/iamsarvagyaa/AndroidSecNotes"><img src="static/cover.png" alt="Android Security Notes"></a><br/> </div> <p align="center"> <a href="#getting-started">Getting Started?</a> » <a href="https://www.buymeacoffee.com/iamsarvagyaa">Buy me a coffee</a> » <a href="#contact...
# Awesome-Cloud-PenTest ## Cloud PenTest - AWS and Azure by Joas ## What is AWS - https://docs.aws.amazon.com/ - https://github.com/awsdocs ## Extras Resources - https://github.com/enaqx/awesome-pentest - https://www.sans.org/cyber-security-courses/cloud-penetration-testing/ - https://www.udemy.com/course/cloud...
# Awesome Google VRP Writeups 🐛 A list of writeups from the Google VRP Bug Bounty program *\*writeups: **not just** writeups* ## Contributing: If you have/know of any Google writeups not listed in this repository, feel free to open a Pull Request. Please try to sort the writeups by publication date. The template t...
<h1 align="center"> <br> <a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a> <br> reconFTW <br> </h1> <p align="center"> <a href="https://github.com/six2dez/reconftw/releases/tag/v2.5.2"> <img src="http...
# Perfect: Server-Side Swift [简体中文](README.zh_CN.md) <p align="center"> <a href="http://perfect.org/get-involved.html" target="_blank"> <img src="http://perfect.org/assets/github/perfect_github_2_0_0.jpg" alt="Get Involed with Perfect!" width="854" /> </a> </p> <p align="center"> <a href="https://d...
# PEN TESTERS (Under Development) 1. Company have PEN TESTERS team to conduct pentesting. 2. Company HIRING PEN TEST SERVICES - on hourly basis or project basis. # PentestingEbook overview: Author Pentesting | Title -- | -- 1. [Practicle Hardware pentesting](https://t.me/freedomf0x/16886) 2. [Pentesting Industrial Co...