mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-17 06:02:17 -04:00
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
botnetscryptographyctfforensicsgray-hacker-resourceshackinginfoseciocslinuxmalwaresnetworkpenetration-testingpentestingpost-exploitationreverse-engineeringrubber-duckysteganographyvulnerabilitieswargameweb-security
![]() Bumps [paramiko](https://github.com/paramiko/paramiko) from 1.15.1 to 2.0.9. - [Commits](https://github.com/paramiko/paramiko/compare/1.15.1...2.0.9) --- updated-dependencies: - dependency-name: paramiko dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com> |
||
---|---|---|
Botnets | ||
Cryptography | ||
CTFs_and_WarGames | ||
Dockerfiles | ||
Forensics | ||
IOCs | ||
Linux_Hacking | ||
Memory_Exploits | ||
Mobile | ||
Network_and_802.11 | ||
Other_guides | ||
Other_Hackings | ||
Pen_Testing | ||
Reverse_Engineering | ||
Rubber_Duck | ||
Steganography | ||
Vulnerabilities_and_Exploits | ||
Web_Security | ||
.gitignore | ||
.travis.yml | ||
DJI_0062.jpg | ||
LICENSE | ||
README.md | ||
requirements.txt |
👾 Gray Hacker Resources 👾
A big bag of Fun. Educational purposes.
⚡️ Resource Links
* CTFs and WARGAMES
* CRYPTOGRAPHY
* FORENSICS
* LINUX HACKING
* MEMORY EXPLOITS
* VULNERABILITIES AND EXPLOITS
* NETWORK and 802.11
* REVERSE ENGINEERING
* RUBBER DUCK
* STEGANOGRAPHY
* WEB EXPLOITS
* OTHER HACKINGS
* PEN TESTING
* MOBILE
* BOTNETS
⚡️ Post-Exploitation
⚡️ Useful Command Line
Searching
grep word f1
sort | uniq -c
diff f1 f2
find -size f1
Compressed Files
zcat f1 > f2
gzip -d file
bzip2 -d f1
tar -xvf file
Connecting to a Server/Port
nc localhost 30000
echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000
openssl s_client -connect localhost:30001 -quiet
nmap -p 31000-32000 localhost
telnet localhost 3000
⚡️ References:
Books I Recommend
Technical
- Bulletproof SSL and TLS
- Reversing: Secrets of Reverse Engineering
- The Art of Memory Forensics
- The C Programming Language
- The Unix Programming Environment
- UNIX Network Programming
- Threat Modeling: Designing for Security
- The Tangled Web
- The Art of Exploitation
- The Art of Software Security Assessment
- Practical Packet Analysis
- Gray Hat Python
- Black Hat Python
- Violent Python
- Shellcoders Handbook
- Practice Malware Analysis
Fun
Other Resources
- Krebs Series on how to be in InfoSec: Thomas Ptacek, Bruce Schneier, Charlie Miller
- How to be a InfoSec Geek
- My Blog
License
When making a reference to my work, please use my website.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.