mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-01 22:36:05 -04:00
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
botnetscryptographyctfforensicsgray-hacker-resourceshackinginfoseciocslinuxmalwaresnetworkpenetration-testingpentestingpost-exploitationreverse-engineeringrubber-duckysteganographyvulnerabilitieswargameweb-security
![]() Bumps [tornado](https://github.com/tornadoweb/tornado) from 2.2.1 to 6.3.3. - [Changelog](https://github.com/tornadoweb/tornado/blob/master/docs/releases.rst) - [Commits](https://github.com/tornadoweb/tornado/compare/v2.2.1...v6.3.3) --- updated-dependencies: - dependency-name: tornado dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com> |
||
---|---|---|
Cloud_and_K8s_Hacking | ||
Cryptography | ||
CTFs_and_WarGames | ||
Forensics | ||
Linux_Hacking | ||
Mobile_Hacking | ||
Network_and_802.11 | ||
Other_Hackings | ||
Pentesting_Scripts | ||
Reverse_Engineering | ||
Steganography | ||
Vulnerabilities_and_Exploits | ||
Web_Hacking | ||
FML.png | ||
README.md | ||
requirements.txt |
🏴☠️🛠 pentesting toolkit
👋🏻 hi, anon. i am bt3gl, and this repository contains resouces I used when I was a ctf player in 2014-2015.
🌚 some context of those good old days:
- 👾 my two teams in ctf times: snatch the root and hacking for soju.
- 👾 my former blog, "chmod a+x singularity.sh", with several ctf writeups.
- 👾 my coderwall page with several writeups on linux, security, python.
- 👾 some entertaining: my DEF CON 23 talk on hacking quantum computing.
- 👾 a proof that this repo used to have 1.2k stars and 500 forks before 💩 happened.
- 👾 threat-intel, i project i led while working at the security team at yelp.
directories
- CTFs and Wargames
- Cloud and K8s Hacking
- Cryptography
- Forensics
- Linux Hacking
- Mobile Hacking
- Network and 802.11
- Other Hackings
- Pentesting Scripts
- Reverse Engineering
- Steganography
- Vulnerabilities and Exploits
- Web Hacking
external resources
general hacking
- The Art of Intrusion.
- Krebs Series on how to be in InfoSec: Thomas Ptacek, Bruce Schneier, Charlie Miller.
- How to be a InfoSec Geek.
- Continuous security.
- How to not get hacked.
- Awesome Privilege Escalation.
post-exploitation
- Metasploit Post Exploitation Command List.
- Obscure Systems (AIX, Embeded, etc) Post-Exploit Command List.
- OSX Post-Exploitation.
- Windows Post-Exploitation Command List.
- Linux/Unix/BSD Post-Exploitation Command List.
books
- Bulletproof SSL and TLS.
- Reversing: Secrets of Reverse Engineering.
- The Art of Memory Forensics.
- The C Programming Language.
- The Unix Programming Environment.
- UNIX Network Programming.
- Threat Modeling: Designing for Security.
- The Tangled Web.
- The Art of Exploitation.
- The Art of Software Security Assessment.
- Practical Packet Analysis.
- Gray Hat Python.
- Black Hat Python.
- Violent Python.
- Shellcoders Handbook.
- Practice Malware Analysis.
- This Machine Kills Secrets.