👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Find a file
2014-11-19 12:07:31 -05:00
Cryptography readme 2014-11-05 16:05:44 -05:00
CTFs_and_WarGames reorganizing 2014-11-03 11:07:35 -05:00
Forensics Reorganized 2014-11-03 10:49:17 -05:00
Linux_Hacking glossaries 2014-11-03 11:20:37 -05:00
Memory_Exploits Reorganized 2014-11-03 10:49:17 -05:00
Network_and_802.11 Reorganized 2014-11-03 10:49:17 -05:00
Other_Hackings Reorganized 2014-11-03 10:49:17 -05:00
Pen_Testing fixin some readme 2014-11-19 12:04:17 -05:00
Reverse_Engineering dis python 2014-11-14 15:44:23 -05:00
Rubber_Duck Reorganized 2014-11-03 10:49:17 -05:00
Steganography img 2014-11-14 16:01:55 -05:00
Vulnerabilities_and_Exploits glossaries 2014-11-03 11:20:37 -05:00
Web_Exploits gitignore 2014-11-19 12:07:31 -05:00
.gitignore Initial commit 2014-09-27 11:16:45 -04:00
LICENSE Initial commit 2014-09-27 11:16:45 -04:00
README.md fixin some readme 2014-11-19 12:04:17 -05:00

My-Gray-Hacker-Resources

All in one big bag. For fun, profits, or CTFs.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS


Useful Command Line

Searching

grep word f1
 
sort | uniq -c
 
diff f1 f2
 
find -size f1

Compressed Files

zcat f1 > f2
 
gzip -d file
 
bzip2 -d f1
 
tar -xvf file

Connecting to a Server/Port

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000
 
openssl s_client -connect localhost:30001 -quiet
 
nmap -p 31000-32000 localhost
 
telnet localhost 3000

License

The material in this repository is licensed under the Creative Commons Attribution-Noncommercial 3.0 license. All code is dedicated to the public domain. If your country does not recognize my right to dedicate work to the public domain, you may the MIT license.