2018-06-14 15:52:28 -07:00
2015-07-04 12:44:13 -07:00
2015-09-04 17:17:48 -07:00
2015-11-26 20:06:00 -08:00
2015-08-30 12:06:08 -07:00
2016-11-22 00:37:59 -05:00
2015-02-12 18:42:26 -08:00
2015-07-04 12:53:18 -07:00
2016-08-06 12:50:04 -07:00
2016-08-06 12:50:04 -07:00
2015-08-30 12:11:59 -07:00
2014-11-03 10:49:17 -05:00
2014-12-02 15:18:31 -05:00
2014-11-19 12:07:24 -05:00
2014-12-28 16:25:47 -05:00
2018-06-14 15:41:17 -07:00
2014-09-27 11:16:45 -04:00
2018-06-14 15:52:28 -07:00
2015-01-03 10:04:52 -05:00

👾Gray Hacker Resources 👾

A big bag of Fun. Educational purposes.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* VULNERABILITIES AND EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS

* PEN TESTING

* MOBILE

* BOTNETS


Post-Exploitation


Useful Command Line

Searching

grep word f1

sort | uniq -c

diff f1 f2

find -size f1

Compressed Files

zcat f1 > f2

gzip -d file

bzip2 -d f1

tar -xvf file

Connecting to a Server/Port


nc localhost 30000

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000

openssl s_client -connect localhost:30001 -quiet

nmap -p 31000-32000 localhost

telnet localhost 3000

References:

Books I Recommend

Technical

Fun

Other Resources


License

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License

Description
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Readme 258 MiB
Languages
C 69.3%
Python 11.1%
Makefile 9%
HTML 5.8%
PHP 1.2%
Other 3.5%