2014-12-01 09:48:40 -05:00
2014-12-01 09:48:40 -05:00
2014-11-29 22:16:26 -05:00
2014-11-19 12:26:51 -05:00
2014-11-23 19:59:28 -05:00
2014-11-20 13:48:39 -05:00
2014-11-24 21:06:58 -05:00
2014-11-03 10:49:17 -05:00
2014-12-01 09:46:27 -05:00
2014-11-20 20:45:07 -05:00
2014-11-03 10:49:17 -05:00
2014-11-19 12:26:51 -05:00
2014-11-19 14:46:14 -05:00
2014-11-20 17:46:32 -05:00
2014-11-19 12:07:24 -05:00
2014-09-27 11:16:45 -04:00
2014-12-01 09:46:15 -05:00
2014-11-23 19:59:28 -05:00

My-Gray-Hacker-Resources

All in one big bag. For fun, profits, or CTFs.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* VULNERABILITIES AND EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS

* PEN TESTING


Useful Command Line

Searching

grep word f1

sort | uniq -c

diff f1 f2

find -size f1

Compressed Files

zcat f1 > f2

gzip -d file

bzip2 -d f1

tar -xvf file

Connecting to a Server/Port


nc localhost 30000

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000

openssl s_client -connect localhost:30001 -quiet

nmap -p 31000-32000 localhost

telnet localhost 3000

References:

Books

  • The Tangled Web
  • The Art of Exploitation
  • The Art of Software Security Assessment:
  • Practical Packet Analysis

Resources


License

The material in this repository is licensed under the Creative Commons Attribution-Noncommercial 3.0 license. All code is dedicated to the public domain. If your country does not recognize my right to dedicate work to the public domain, you may the MIT license.

Description
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Readme 258 MiB
Languages
C 69.3%
Python 11.1%
Makefile 9%
HTML 5.8%
PHP 1.2%
Other 3.5%