👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Find a file
dr. mia von steinkirch, phd aa8200792c
FML reminder 😫
2023-02-05 21:02:17 -08:00
Cloud_and_K8s_Hacking 👱🏻‍♀️Some notes in Flask 2019-10-29 19:04:03 -07:00
Cryptography 🧕🏽Clean up readme 2019-10-29 19:04:41 -07:00
CTFs_and_WarGames 🧓🏻Clean up readme 2019-10-29 19:02:44 -07:00
Forensics 💁‍♂️Clean up readme 2019-10-29 19:05:25 -07:00
Linux_Hacking Add modern unix 2023-01-23 10:09:24 -08:00
Mobile_Hacking 👩🏾‍🦳 Update readme 2019-10-27 21:09:55 -07:00
Network_and_802.11 🧓🏻 Delete DS_STORE 2019-10-29 19:01:10 -07:00
Other_Hackings 👨🏽‍🦳Clean up readme 2019-10-29 19:06:35 -07:00
Pentesting_Scripts 👵🏾Clean up readme 2019-10-29 19:07:32 -07:00
Reverse_Engineering 👩🏻‍🦱Update README 2020-01-21 17:04:55 -08:00
Steganography 👨🏿 Clean up Readme 2019-10-27 21:01:58 -07:00
Vulnerabilities_and_Exploits 👩🏾‍🦰Clean up readme 2019-10-29 19:08:12 -07:00
Web_Hacking 🧒🏻Clean up web vulnerabilities 2019-10-29 19:09:20 -07:00
FML.png FML reminder 😫 2023-02-05 21:02:17 -08:00
README.md 👾 here is a proof that this repo used to have 1.2k stars and 500 forks before shit happened 2022-11-13 14:23:00 -08:00
requirements.txt Bump rsa from 3.1.4 to 4.7 (#42) 2022-12-18 18:08:31 -08:00
STARS.png 😵 fml 2022-11-13 14:21:38 -08:00

🏴‍☠️ Pentesting Toolkit


Hello anon 👋🏻

I am bt3gl, and this repository contains the resouces I used when I was a professional CTF player in 2014 and 2015.


👾 here is some entertaining: my DEF CON 23 talk on Hacking Quantum Computing

👾 here is a proof that this repo used to have 1.2k stars and 500 forks before shit happened



Disclaimer:

All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages caused. The views expressed on this site are our own and do not necessarily reflect those of our employers.

Usage of all tools on this site for attacking targets without prior mutual consent is illegal. It is the end users responsibility to obey all applicable local, state and federal laws. We assume no liability and are not responsible for any misuse or damage caused by this site.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



Sub-directories:



Resources


General Hacking

Privilege Escalation

Post-Exploitation

Books