👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Find a file
2015-07-04 16:38:15 -07:00
Botnets add some readme 2015-07-04 13:39:20 -07:00
Cryptography Add john the ripper cheatsheet 2015-06-21 18:04:25 -07:00
CTFs_and_WarGames Update README.md 2015-07-04 12:44:13 -07:00
Forensics readmes 2014-11-19 12:26:51 -05:00
Linux_Hacking some small fixes 2014-11-23 19:59:28 -05:00
Memory_Exploits disclaimer 2015-02-12 18:42:26 -08:00
Mobile add mobile 2015-07-04 12:53:18 -07:00
Network_and_802.11 add a third part nmap scripting (no threading) just for reference. it uses socket lib. 2015-01-30 13:41:43 -08:00
Other_Hackings Add some word lists for Hydra 2015-07-04 16:38:15 -07:00
Pen_Testing add some readme 2015-07-04 13:39:20 -07:00
Reverse_Engineering link 2015-01-15 17:16:52 -06:00
Rubber_Duck Reorganized 2014-11-03 10:49:17 -05:00
Steganography del ~ 2014-12-02 15:18:31 -05:00
Vulnerabilities_and_Exploits readmes 2014-11-19 14:46:14 -05:00
Web_Security My twitter handled is fixed ::blueheart 2015-01-23 14:03:28 -08:00
.gitignore Update .gitignore 2014-11-19 12:07:24 -05:00
.travis.yml travis 2014-12-28 16:25:47 -05:00
LICENSE Initial commit 2014-09-27 11:16:45 -04:00
README.md Update README.md 2015-07-04 13:36:12 -07:00
requirements.txt requirements 2015-01-03 10:04:52 -05:00

My-Gray-Hacker-Resources

All in one big bag. For fun, profits, or CTFs.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* VULNERABILITIES AND EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS

* PEN TESTING

* MOBILE

* BOTNETS


Useful Command Line

Searching

grep word f1

sort | uniq -c

diff f1 f2

find -size f1

Compressed Files

zcat f1 > f2

gzip -d file

bzip2 -d f1

tar -xvf file

Connecting to a Server/Port


nc localhost 30000

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000

openssl s_client -connect localhost:30001 -quiet

nmap -p 31000-32000 localhost

telnet localhost 3000

References:

Books I Recommend

Technical

Fun

Other Resources


License

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License