mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-27 11:09:09 -04:00
Update README.md
This commit is contained in:
parent
48a6fb1823
commit
bb871896f4
47
README.md
47
README.md
@ -1,27 +1,14 @@
|
|||||||
# 🏴☠️✨ Pentesting Toolkit
|
# 🏴☠️🛠 pentesting toolkit
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
### Hello anon 👋🏻
|
#### 👋🏻 hello anon. i am bt3gl, and this repository contains the resouces I used when I was a professional ctf player in 2014 and 2015.
|
||||||
### I am bt3gl, and this repository contains the resouces I used when I was a professional CTF player in 2014 and 2015.
|
|
||||||
|
|
||||||
<br>
|
#### 👾 here is some entertaining: [my DEF CON 23 talk on hacking quantum computing](https://www.youtube.com/watch?v=1Fp6ibfOQ4Y).
|
||||||
|
|
||||||
[👾 here is some entertaining: my DEF CON 23 talk on Hacking Quantum Computing](https://www.youtube.com/watch?v=1Fp6ibfOQ4Y)
|
#### [👾 here is a proof that this repo used to have 1.2k stars and 500 forks before shit happened](https://github.com/MEV-WAIFU-LABS/pentesting_toolkit/blob/master/STARS.png).
|
||||||
|
|
||||||
[👾 here is a proof that this repo used to have 1.2k stars and 500 forks before shit happened](https://github.com/MEV-WAIFU-LABS/pentesting_toolkit/blob/master/STARS.png)
|
#### ⚠️ the resources in this repository were from my research. i am not responsible for your free-will.
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Disclaimer:
|
|
||||||
|
|
||||||
**All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages caused. The views expressed on this site are our own and do not necessarily reflect those of our employers.**
|
|
||||||
|
|
||||||
**Usage of all tools on this site for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state and federal laws. We assume no liability and are not responsible for any misuse or damage caused by this site.**
|
|
||||||
|
|
||||||
**This work is licensed under a [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses/by-sa/4.0/).**
|
|
||||||
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
@ -29,7 +16,9 @@
|
|||||||
|
|
||||||
-------
|
-------
|
||||||
|
|
||||||
## Sub-directories:
|
## directories in this repo
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
* [CTFs and Wargames](https://github.com/bt3gl/Pentesting-Toolkit/tree/master/CTFs_and_WarGames)
|
* [CTFs and Wargames](https://github.com/bt3gl/Pentesting-Toolkit/tree/master/CTFs_and_WarGames)
|
||||||
* [Cloud and K8s Hacking](https://github.com/bt3gl/Pentesting-Toolkit/tree/master/Cloud_and_K8s_Hacking)
|
* [Cloud and K8s Hacking](https://github.com/bt3gl/Pentesting-Toolkit/tree/master/Cloud_and_K8s_Hacking)
|
||||||
@ -50,24 +39,24 @@
|
|||||||
|
|
||||||
------
|
------
|
||||||
|
|
||||||
## Resources
|
## external resources
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
### General Hacking
|
### general hacking
|
||||||
|
|
||||||
|
|
||||||
- [The Art of Intrusion](http://www.amazon.com/The-Art-Intrusion-Intruders-Deceivers/dp/0471782661http://www.amazon.com/The-Art-Intrusion-Intruders-Deceivers/dp/0471782661).
|
- [The Art of Intrusion](http://www.amazon.com/The-Art-Intrusion-Intruders-Deceivers/dp/0471782661http://www.amazon.com/The-Art-Intrusion-Intruders-Deceivers/dp/0471782661).
|
||||||
- Krebs Series on how to be in InfoSec: [Thomas Ptacek](http://krebsonsecurity.com/2012/06/how-to-break-into-security-ptacek-edition/#more-15594), [Bruce Schneier](http://krebsonsecurity.com/2012/07/how-to-break-into-security-schneier-edition/#more-15592), [Charlie Miller](http://krebsonsecurity.com/category/how-to-break-into-security/).
|
- Krebs Series on how to be in InfoSec: [Thomas Ptacek](http://krebsonsecurity.com/2012/06/how-to-break-into-security-ptacek-edition/#more-15594), [Bruce Schneier](http://krebsonsecurity.com/2012/07/how-to-break-into-security-schneier-edition/#more-15592), [Charlie Miller](http://krebsonsecurity.com/category/how-to-break-into-security/).
|
||||||
- [How to be a InfoSec Geek](http://www.primalsecurity.net/how-to-be-an-infosec-geek/).
|
- [How to be a InfoSec Geek](http://www.primalsecurity.net/how-to-be-an-infosec-geek/).
|
||||||
- [Continuous security](https://www.infoq.com/news/2019/08/continuous-security/).
|
- [Continuous security](https://www.infoq.com/news/2019/08/continuous-security/).
|
||||||
- [How to not get hacked](https://kubernetes.io/blog/2018/07/18/11-ways-not-to-get-hacked/).
|
- [How to not get hacked](https://kubernetes.io/blog/2018/07/18/11-ways-not-to-get-hacked/).
|
||||||
|
- [Awesome Privilege Escalation](https://github.com/m0nad/awesome-privilege-escalation).
|
||||||
### Privilege Escalation
|
|
||||||
|
|
||||||
* [Awesome Privilege Escalation](https://github.com/m0nad/awesome-privilege-escalation).
|
|
||||||
|
|
||||||
|
|
||||||
### Post-Exploitation
|
<br>
|
||||||
|
|
||||||
|
### post-exploitation
|
||||||
|
|
||||||
* [Metasploit Post Exploitation Command List](https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMNF2m3nIPEA_kekqqqA2Ywto/edit).
|
* [Metasploit Post Exploitation Command List](https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMNF2m3nIPEA_kekqqqA2Ywto/edit).
|
||||||
* [Obscure Systems (AIX, Embeded, etc) Post-Exploit Command List](https://docs.google.com/document/d/1CIs6O1kMR-bXAT80U6Jficsqm0yR5dKUfUQgwiIKzgc/edit).
|
* [Obscure Systems (AIX, Embeded, etc) Post-Exploit Command List](https://docs.google.com/document/d/1CIs6O1kMR-bXAT80U6Jficsqm0yR5dKUfUQgwiIKzgc/edit).
|
||||||
@ -75,9 +64,9 @@
|
|||||||
* [Windows Post-Exploitation Command List](https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_US).
|
* [Windows Post-Exploitation Command List](https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_US).
|
||||||
* [Linux/Unix/BSD Post-Exploitation Command List](https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM-1N-EWPRz2770K4/edit?hl=en_US).
|
* [Linux/Unix/BSD Post-Exploitation Command List](https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM-1N-EWPRz2770K4/edit?hl=en_US).
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
### books
|
||||||
### Books
|
|
||||||
|
|
||||||
- [Bulletproof SSL and TLS](http://www.amazon.com/gp/product/1907117040?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00).
|
- [Bulletproof SSL and TLS](http://www.amazon.com/gp/product/1907117040?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00).
|
||||||
- [Reversing: Secrets of Reverse Engineering](http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817).
|
- [Reversing: Secrets of Reverse Engineering](http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817).
|
||||||
@ -97,4 +86,4 @@
|
|||||||
- [Practice Malware Analysis](https://www.nostarch.com/malware).
|
- [Practice Malware Analysis](https://www.nostarch.com/malware).
|
||||||
- [This Machine Kills Secrets](http://www.amazon.com/This-Machine-Kills-Secrets-Whistleblowers/dp/0142180491/ref=sr_1_1?s=books&ie=UTF8&qid=1436039456&sr=1-1&keywords=this+Machine+Kills+Secrets).
|
- [This Machine Kills Secrets](http://www.amazon.com/This-Machine-Kills-Secrets-Whistleblowers/dp/0142180491/ref=sr_1_1?s=books&ie=UTF8&qid=1436039456&sr=1-1&keywords=this+Machine+Kills+Secrets).
|
||||||
|
|
||||||
---
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user