mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-27 11:09:09 -04:00
👾 Gray Hacker Resources 👾
A big bag of Fun. Educational purposes.
⚡️ Resource Links
* CTFs and WARGAMES
* CRYPTOGRAPHY
* FORENSICS
* LINUX HACKING
* MEMORY EXPLOITS
* VULNERABILITIES AND EXPLOITS
* NETWORK and 802.11
* REVERSE ENGINEERING
* RUBBER DUCK
* STEGANOGRAPHY
* WEB EXPLOITS
* OTHER HACKINGS
* PEN TESTING
* MOBILE
* BOTNETS
⚡️ Post-Exploitation
⚡️ Useful Command Line
Searching
grep word f1
sort | uniq -c
diff f1 f2
find -size f1
Compressed Files
zcat f1 > f2
gzip -d file
bzip2 -d f1
tar -xvf file
Connecting to a Server/Port
nc localhost 30000
echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000
openssl s_client -connect localhost:30001 -quiet
nmap -p 31000-32000 localhost
telnet localhost 3000
⚡️ References:
Books I Recommend
Technical
- Bulletproof SSL and TLS
- Reversing: Secrets of Reverse Engineering
- The Art of Memory Forensics
- The C Programming Language
- The Unix Programming Environment
- UNIX Network Programming
- Threat Modeling: Designing for Security
- The Tangled Web
- The Art of Exploitation
- The Art of Software Security Assessment
- Practical Packet Analysis
- Gray Hat Python
- Black Hat Python
- Violent Python
- Shellcoders Handbook
- Practice Malware Analysis
Fun
Other Resources
- Krebs Series on how to be in InfoSec: Thomas Ptacek, Bruce Schneier, Charlie Miller
- How to be a InfoSec Geek
- My Blog
Donate
Hi! I work on this project in my spare time, in addition to my primary job. I hope you enjoy using Gray Hacker Resources. If you do, please, become my patron 🤝.
Patreon | Bitcoin | Ethereum |
---|---|---|
Become a patron | 1FrPrQb6ACTkbSBAz9PduJWrDFfq41Ggb4 |
0x6aF39C917359897ae6969Ad682C14110afe1a0a1 |
![]() |
![]() |
![]() |
This is your way make a clear statement: My work is valued.
I would appreciate your support! Thank you!
License
When making a reference to my work, please use my website.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Description
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
botnetscryptographyctfforensicsgray-hacker-resourceshackinginfoseciocslinuxmalwaresnetworkpenetration-testingpentestingpost-exploitationreverse-engineeringrubber-duckysteganographyvulnerabilitieswargameweb-security
Readme
258 MiB
Languages
C
69.3%
Python
11.1%
Makefile
9%
HTML
5.8%
PHP
1.2%
Other
3.5%