mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-26 10:39:08 -04:00
🏴☠️🛠 pentesting toolkit
👋🏻 hello anon. i am bt3gl, and this repository contains the resouces I used when I was a professional ctf player in 2014 and 2015.
👾 here is some entertaining: my DEF CON 23 talk on hacking quantum computing.
👾 here is a proof that this repo used to have 1.2k stars and 500 forks before shit happened.
⚠️ the resources in this repository were from my research. i am not responsible for your free-will.
directories in this repo
- CTFs and Wargames
- Cloud and K8s Hacking
- Cryptography
- Forensics
- Linux Hacking
- Mobile Hacking
- Network and 802.11
- Other Hackings
- Pentesting Scripts
- Reverse Engineering
- Steganography
- Vulnerabilities and Exploits
- Web Hacking
external resources
general hacking
- The Art of Intrusion.
- Krebs Series on how to be in InfoSec: Thomas Ptacek, Bruce Schneier, Charlie Miller.
- How to be a InfoSec Geek.
- Continuous security.
- How to not get hacked.
- Awesome Privilege Escalation.
post-exploitation
- Metasploit Post Exploitation Command List.
- Obscure Systems (AIX, Embeded, etc) Post-Exploit Command List.
- OSX Post-Exploitation.
- Windows Post-Exploitation Command List.
- Linux/Unix/BSD Post-Exploitation Command List.
books
- Bulletproof SSL and TLS.
- Reversing: Secrets of Reverse Engineering.
- The Art of Memory Forensics.
- The C Programming Language
- The Unix Programming Environment.
- UNIX Network Programming.
- Threat Modeling: Designing for Security.
- The Tangled Web.
- The Art of Exploitation.
- The Art of Software Security Assessment.
- Practical Packet Analysis.
- Gray Hat Python.
- Black Hat Python.
- Violent Python.
- Shellcoders Handbook.
- Practice Malware Analysis.
- This Machine Kills Secrets.
Description
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
botnetscryptographyctfforensicsgray-hacker-resourceshackinginfoseciocslinuxmalwaresnetworkpenetration-testingpentestingpost-exploitationreverse-engineeringrubber-duckysteganographyvulnerabilitieswargameweb-security
Readme
258 MiB
Languages
C
69.3%
Python
11.1%
Makefile
9%
HTML
5.8%
PHP
1.2%
Other
3.5%