sec-pentesting-toolkit/README.md
2019-06-26 11:55:15 -07:00

7.8 KiB
Raw Blame History

👾 Gray Hacker Resources 👾

A big bag of Fun. Educational purposes.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* VULNERABILITIES AND EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS

* PEN TESTING

* MOBILE

* BOTNETS


Post-Exploitation


Useful Command Line

Searching

grep word f1

sort | uniq -c

diff f1 f2

find -size f1

Compressed Files

zcat f1 > f2

gzip -d file

bzip2 -d f1

tar -xvf file

Connecting to a Server/Port


nc localhost 30000

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000

openssl s_client -connect localhost:30001 -quiet

nmap -p 31000-32000 localhost

telnet localhost 3000

References:

Books I Recommend

Technical

Fun

Other Resources


Donate

Hi! I work on this project in my spare time, in addition to my primary job. I hope you enjoy using Gray Hacker Resources. If you do, please, become my patron 🤝.

Patreon Bitcoin Ethereum
Become a patron 1FrPrQb6ACTkbSBAz9PduJWrDFfq41Ggb4 0x6aF39C917359897ae6969Ad682C14110afe1a0a1

This is your way make a clear statement: My work is valued.

I would appreciate your support! Thank you!


License

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

When making a reference to my work, please use my website.