2020-05-19 10:39:10 -07:00
2020-03-22 10:24:29 -07:00
👱🏻‍♀️Some notes in Flask
2019-10-29 19:04:03 -07:00
🧕🏽Clean up readme
2019-10-29 19:04:41 -07:00
🧓🏻Clean up readme
2019-10-29 19:02:44 -07:00
💁‍♂️Clean up readme
2019-10-29 19:05:25 -07:00
👨🏼‍🦱Update Readme
2020-01-21 17:40:02 -08:00
👩🏾‍🦳 Update readme
2019-10-27 21:09:55 -07:00
2019-10-29 19:01:10 -07:00
👨🏽‍🦳Clean up readme
2019-10-29 19:06:35 -07:00
👵🏾Clean up readme
2019-10-29 19:07:32 -07:00
👩🏻‍🦱Update README
2020-01-21 17:04:55 -08:00
2019-10-27 21:01:58 -07:00
👩🏾‍🦰Clean up readme
2019-10-29 19:08:12 -07:00
2019-10-29 19:09:20 -07:00
👩🏻‍🎤 Add privilege escalation
2020-05-19 10:39:10 -07:00
👴🏽 Remove flask
2019-10-27 21:09:20 -07:00

Pentesting Resources

Hello. My name is Mia von Steinkirch, and this is my personal resources from when I used to play CTF professionally (2014-2015). I haven't updated this repository that much since then, but it can still be a good source in the field.


Disclaimer:

All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages caused. The views expressed on this site are our own and do not necessarily reflect those of our employers.

Usage of all tools on this site for attacking targets without prior mutual consent is illegal. It is the end users responsibility to obey all applicable local, state and federal laws. We assume no liability and are not responsible for any misuse or damage caused by this site.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Sub-directories:


Resources

General Hacking

Privilege Escalation

Post-Exploitation

Books


Description
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Readme 258 MiB
Languages
C 69.3%
Python 11.1%
Makefile 9%
HTML 5.8%
PHP 1.2%
Other 3.5%