👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Find a file
2014-11-03 11:12:24 -05:00
Cryptography reorganizing 2014-11-03 11:12:24 -05:00
CTFs_and_WarGames reorganizing 2014-11-03 11:07:35 -05:00
Forensics Reorganized 2014-11-03 10:49:17 -05:00
Linux_Hacking Reorganized 2014-11-03 10:49:17 -05:00
Memory_Exploits Reorganized 2014-11-03 10:49:17 -05:00
Network_and_802.11 Reorganized 2014-11-03 10:49:17 -05:00
Other_Hackings Reorganized 2014-11-03 10:49:17 -05:00
Reverse_Engineering reorganizing 2014-11-03 11:05:34 -05:00
Rubber_Duck Reorganized 2014-11-03 10:49:17 -05:00
Steganography reorganizing 2014-11-03 11:05:34 -05:00
Web_Exploits reorganizing 2014-11-03 11:05:34 -05:00
.gitignore Initial commit 2014-09-27 11:16:45 -04:00
LICENSE Initial commit 2014-09-27 11:16:45 -04:00
README.md reorganizing 2014-11-03 11:12:24 -05:00

My-Gray-Hacker-Resources

All in one big bag. For fun, profits, or CTFs.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS


Useful Command Line

Searching

grep word f1
 
sort | uniq -c
 
diff f1 f2
 
find -size f1

Compressed Files

zcat f1 > f2
 
gzip -d file
 
bzip2 -d f1
 
tar -xvf file

Connecting to a Server/Port

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000
 
openssl s_client -connect localhost:30001 -quiet
 
nmap -p 31000-32000 localhost
 
telnet localhost 3000