2015-01-23 14:03:28 -08:00
2015-01-05 11:24:50 -05:00
2014-11-19 12:26:51 -05:00
2014-11-23 19:59:28 -05:00
2014-11-20 13:48:39 -05:00
2015-01-03 19:37:32 -05:00
2014-12-30 11:10:39 -05:00
2014-12-01 09:46:27 -05:00
2015-01-15 17:16:52 -06:00
2014-11-03 10:49:17 -05:00
2014-12-02 15:18:31 -05:00
2014-11-19 14:46:14 -05:00
2014-11-19 12:07:24 -05:00
2014-12-28 16:25:47 -05:00
2014-09-27 11:16:45 -04:00
2015-01-03 10:04:52 -05:00

My-Gray-Hacker-Resources

All in one big bag. For fun, profits, or CTFs.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* VULNERABILITIES AND EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS

* PEN TESTING


Useful Command Line

Searching

grep word f1

sort | uniq -c

diff f1 f2

find -size f1

Compressed Files

zcat f1 > f2

gzip -d file

bzip2 -d f1

tar -xvf file

Connecting to a Server/Port


nc localhost 30000

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000

openssl s_client -connect localhost:30001 -quiet

nmap -p 31000-32000 localhost

telnet localhost 3000

References:

Books I Recommend

Technical

Fun

Other Resources


License

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License

Description
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Readme 258 MiB
Languages
C 69.3%
Python 11.1%
Makefile 9%
HTML 5.8%
PHP 1.2%
Other 3.5%