text
stringlengths
9
334k
<p align="center"> [![GitHub stars](https://img.shields.io/github/stars/harisqazi1/Cybersecurity)](https://github.com/harisqazi1/Cybersecurity/stargazers) [![GitHub forks](https://img.shields.io/github/forks/harisqazi1/Cybersecurity)](https://github.com/harisqazi1/Cybersecurity/network) [![GitHub license](https://im...
# `awesome-game-security` [![GitHub license](https://img.shields.io/github/license/gmh5225/awesome-game-security)](https://github.com/gmh5225/awesome-game-security/blob/main/LICENSE) ``` If you find that some links are not working, you can simply replace the username with gmh5225. Or you can send an issue for me. `...
[![Build Status](https://github.com/ytdl-org/youtube-dl/workflows/CI/badge.svg)](https://github.com/ytdl-org/youtube-dl/actions?query=workflow%3ACI) **This repository is for unofficial nightly builds.** **Please do not open any issues nor pull requests.** youtube-dl - download videos from youtube.com or other video ...
<p align="center"> <a href="https://github.com/pablosnt/rekono/actions/workflows/unit-testing.yml" alt="Unit testing" target="_blank"> <img src="https://github.com/pablosnt/rekono/actions/workflows/unit-testing.yml/badge.svg"/> </a> <a href="https://github.com/pablosnt/rekono/actions/workflows/desktop-ui.yml"...
--- description: a welcome README page --- # kashz jewels ## UPDATES * 12/20/2021: I am PNPT Certified :trophy:. * 11/01/2021: I am OSCP Certified :trophy: . [My reddit post](https://www.reddit.com/r/oscp/comments/qlay94/passed\_oscp\_my\_thoughts/). ## <mark style="color:blue;">About this book</mark> This book ...
## Description **sqlmap** is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches includin...
# Awesome CTF Cheatsheet [![Awesome](https://awesome.re/badge-flat.svg)](https://awesome.re)[<img src="media/icons8-hacking.svg" align="right" width="150">](https://uppusaikiran.github.io/hacking/Capture-the-Flag-CheatSheet/) > A currated list of all capture the flag tips and strategies to solve Online CTF challenges...
# EzpzCheatSheet ## ## # https://raw.githubusercontent.com/H0j3n/EzpzCheatSheet/main/README.md # ## ## This CheatSheet will not have much explanation. It just a commands that has been used pwning all of the machines from various platform and something that I have encounter before. Also any notes, CTF and others that ...
# Shibboleth - HackTheBox - Writeup Linux, 30 Base Points, Medium ![info.JPG](images/info.JPG) ## Machine ![‏‏Shibboleth.JPG](images/Shibboleth.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding port ```80``` and by UDP scanning we found also the port ```623```. ...
# Kubernetes > Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and management. It was originally designed by Google, and is now maintained by the Cloud Native Computing Foundation. ## Summary - [Tools](#tools) - [RBAC Configuration](#rbac-configuration) ...
# Devel URL: https://app.hackthebox.com/machines/Devel Level: Easy Date 31 May 2020 ## Walkthrough - [Enumeration](#enumeration) - [Privesc](#privesc) # Enumeration ## NMAP ``` # Nmap 7.91 scan initiated Sat Apr 3 11:13:46 2021 as: nmap -Pn -p- -T4 -oN nmap.txt 10.10.10.5 Nmap scan report for 10.10.10.5 Host i...
# Java-Deserialization-Cheat-Sheet A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries. Please, use **#javadeser** hash tag for tweets. ## Table of content - [Java Native Serialization (binary)](#java-native-serialization-binary) - [Overvi...
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) (Devboard/WROOM)! Looking for a Linux/Mac version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFlash) (WIP for Windows too including full automated downloads.) Or do you want t...
# Cap - HackTheBox - Writeup Linux, 20 Base Points, Easy ## Machine ![‏‏Cap.JPG](images/Cap.JPG) ## TL;DR To solve this machine, we begin by enumerating open services using ```namp``` – finding port ```21```, ```22``` and ```80```. ***User***: By enumerating the website we found a link [http://10.10.10.245/data/0]...
# Awesome Bug Bounty [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) A comprehensive curated list of Bug Bounty Programs and write-ups from the Bug Bounty hunters. ## Table of Contents - [Getting Started](#getti...
# Windows-Privilege-Escalation-Resources Compilation of Resources from TCM's Windows Priv Esc Udemy Course ### General Links Link to Website: https://www.thecybermentor.com/ Links to course: * https://www.udemy.com/course/windows-privilege-escalation-for-beginners/ (udemy) * https://academy.tcm-sec.com/p/windows-p...
--- title: 'WPScan' category: 'scanner' type: "CMS" state: "released" appVersion: "v3.8.22" usecase: "Wordpress Vulnerability Scanner" --- ![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png) <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier...
# Awesome WAF [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg "Awesome")](https://github.com/0xinfection/awesome-waf) > Everything awesome about web application firewalls (WAFs). 🔥 > > __Foreword:__ This was originally my own collection on WAFs. I am ope...
# 渗透测试实践指南:必知必会的工具与方法(原书第2版) - [侦查](#侦查) - [扫描](#扫描) - [漏洞利用](#漏洞利用) - [维持访问](#维持访问) ## 侦查 - 主动侦查 – 包括与目标系统的直接交互,在这个过程中,目标可能会记录下我们的IP地址及活动。 - 被动侦查 – 利用可以从网上获取的信息。 ### HTTrack 网站复制机 能够创建与目标网站完全相同的脱机副本。 需要注意的是,克隆网站很容易被跟踪,同时也会被视为极具攻击性,没有事先获得授权的话,不要运用该工具。 特别关注“新闻”和“公告”之类的信息,这类报道中可能不小心泄漏出有用的信息。还要搜索目标公司挂在网上的招聘启示,之类启示经...
<h1 align="left"> <img src="static/nuclei-logo.png" alt="nuclei" width="200px"></a> <br> </h1> [![License](https://img.shields.io/badge/license-MIT-_red.svg)](https://opensource.org/licenses/MIT) [![Go Report Card](https://goreportcard.com/badge/github.com/projectdiscovery/nuclei)](https://goreportcard.com/report/...
# Linux Yetki Yükseltme (Privilege Escalation) Sağda solda denk geldiğim ve yetki yükseltme için işe yarayabilecek scriptler. Linux ve unix sistemler için konfigürasyon eksikliklerine ve yetki yükseltmeye sebep olabilecek zafiyetlere bakıyorlar. tools klasörünün altında README dosyaları ile beraber bulunmakta. ## Ba...
## Environment My basic testing environment includes: - Docker container (see [Dockerfile](Dockerfile)) - Standard config (see my [config](https://github.com/JakobRPennington/config) repo) - BurpSuite - Firefox - Terminal ## Methodology - [Choose a Program](methodology/00-choose-program.md) - [Recon](methodology/01-...
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) on the Wifi Devboard! Looking for a Linux/OS X version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFlash) (WIP for Windows too including full automated downloads.) Looking for...
# Dictionary-Of-Pentesting ## 简介 收集一些常用的字典,用于渗透测试、SRC漏洞挖掘、爆破、Fuzzing等实战中。 收集以实用为原则。目前主要分类有认证类、文件路径类、端口类、域名类、无线类、正则类。 涉及的内容包含设备默认密码、文件路径、通用默认密码、HTTP参数、HTTP请求头、正则、应用服务默认密码、子域名、用户名、系统密码、Wifi密码等。 该项目计划持续收集,也欢迎感兴趣的大佬一起来完善。可直接提交PR,也可以提建议到issue。 ## 更新记录 **2020.09.18** 1. 增加11k+用户名密码组合 **2020.09.17** 1. 增加action后缀 to...
# Enumeration ```bash ┌──(root💀shiro)-[/home/shiro] └─# nmap -sC -sV -A 10.10.10.4 Starting Nmap 7.92 ( https://nmap.org ) at 2022-02-02 19:49 +08 Nmap scan report for 10.10.10.4 Host is up (0.0031s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 139/tcp op...
# Console: ret2system **[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/WgKFsSjTWjI)**
[![Awesome](https://awesome.re/badge.svg)](https://awesome.re) This is a list of Information Security resources and tools I've found useful at some time during my study of security and I hope that others will too. This list is will be updated whenever I've found something awesome to add. <img src="http://edwardqiu....
# PWNED 1 - CTF Available on VulnHub: https://www.vulnhub.com/entry/pwned-1,507/ ## IP Discovery ``` $ sudo netdiscover -r 192.168.1.0/16 ``` ``` Currently scanning: Finished! | Screen View: Unique Hosts 0 Captured ARP Req/Rep packets, from 0 hosts. Total size: 0 ___________________________________________...
![Docker Security](https://github.frapsoft.com/top/docker-security.jpg) # Nikto Web Server Scanner _A Collection of Docker Containers for Security and Penetration Testing can be found [here](https://github.com/ellerbrock/docker-security-container)._ [![Docker Automated Build](https://img.shields.io/docker/automated/...
# Information Collection For Pentest SRC ## 声明 ``` Author:Qftm Data:2020/01/18 ProjectAddress:https://github.com/Qftm/Information_Collection_Handbook GitbookAddress:https://qftm.github.io/Information_Collection_Handbook/ ``` ## 正文 "只有不努力的黑客,没有攻不破的系统"。 在SRC漏洞挖掘或渗透测试中,信息收集占很大一部分,能收集到别人收集不到的资产,就能挖到别人挖不到的洞。 项目已整...
# TensorFlow Android Camera Demo This folder contains an example application utilizing TensorFlow for Android devices. ## Description The demos in this folder are designed to give straightforward samples of using TensorFlow in mobile applications. Inference is done using the [TensorFlow Android Inference Interface]...
# HackTheBox.eu - Web [Hack The Box - Challenges - Web](https://www.hackthebox.eu/home/challenges/Web) All walkthroughs are in encrypted PDFs. The password is the flag to that particular challenge. ## Challenges - [Lernaean](Lernaean.pdf) - Your target is not very good with computers. Try and guess their password to...
# Awesome Cyber Security [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) A collection of awesome software, libraries, documents, books, resources and cool stuff about security. Inspired by [Awesome Security](h...
# Bug Bounty Reference A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty # Introduction Follow my Twitter @ngalongc I have been reading for Bug Bounty write-ups for a few months, I found it extremely useful to read relevant write-up...
--- title: 'WPScan' category: 'scanner' type: "CMS" state: "released" appVersion: "v3.8.22" usecase: "Wordpress Vulnerability Scanner" --- ![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png) <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier...
# Web Sockets Attacks > The WebSocket protocol allows a bidirectional and full-duplex communication between a client and a server ## Summary * [Tools](#tools) * [Using ws-harness.py](#using-ws-harness-py) ## Tools * [ws-harness.py](https://gist.githubusercontent.com/mfowl/ae5bc17f986d4fcc2023738127b06138/raw/e8e...
- [IPVS](#ipvs) - [What is IPVS](#what-is-ipvs) - [IPVS vs. IPTABLES](#ipvs-vs-iptables) - [When ipvs falls back to iptables](#when-ipvs-falls-back-to-iptables) - [Run kube-proxy in ipvs mode](#run-kube-proxy-in-ipvs-mode) - [Prerequisite](#prerequisite) - [Local UP Cluster](#local-up-cluster) - [...
# Swagger Code Generator - Master: [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test...
This guide is a collection of techniques for improving the security and privacy of a modern Apple Macintosh computer ("MacBook") running a recent version of macOS (formerly known as "OS X"). This guide is targeted to power users who wish to adopt enterprise-standard security, but is also suitable for novice users with...
# [![OWASP Logo](https://github.com/OWASP/Amass/blob/master/images/owasp_logo.png) OWASP Amass](https://www.owasp.org/index.php/OWASP_Amass_Project) [![CircleCI Status](https://circleci.com/gh/OWASP/Amass/tree/master.svg?style=shield)](https://circleci.com/gh/OWASP/Amass/tree/master) [![GitHub release](https://img.sh...
# Awesome JavaScript Resources [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/rjoydip/awesome-js-resources.git) A collection of awesome [JavaScript](https://developer.mozilla.org/en-US/docs/Web/JavaScript) resources. # Table of co...
### IP `10.10.171.151` # Recon ### Ports ``` nmap -sC -sV 10.10.171.151 -o picklerick.nmap 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.6 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 a7:93:44:1d:e9:22:da:29:83:c4:f4:40:05:8c:a0:76 (RSA) | 256 76:61:34:d4:c2:31:25:fe:6b:6b:d9:01:0b:03:2c:51 (ECDSA) |...
The news hacker =============== ## Task description Only admin can see the flag :) Hint: Weak password! ## Initial analysis The site under the url provided in the challenge is a news blog. ![](https://i.imgur.com/5rFFoiW.png) Inspecting the source, we find out that the site is powered by Wordpress. ![](https://i....
# AutoRecon AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing por...
<!--lint disable awesome-contributing awesome-license awesome-list-item match-punctuation no-repeat-punctuation no-undefined-references awesome-spell-check--> # Awesome Stars [![Awesome](https://awesome.re/badge.svg)](https://github.com/sindresorhus/awesome) > A curated list of my GitHub stars! Generated by [starred](...
# Pentesting-Cheatsheet Enumeration General Enumeration: nmap -vv -Pn -A -sC -sS -T 4 -p- 10.0.0.1 nmap -v -sS -A -T4 x.x.x.x // Verbose, SYN Stealth, Version info, and scripts against services. nmap -v -p 445 --script=smb-check-vulns --script-args=unsafe=1 192.168.1.X // Nmap script to scan for vulne...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) `Arthas` is a Java Diagnostic tool open sourced by Alibaba. Arthas help developers in trouble-shooting production issues for Java applications without modifying code or restarting servers. [中文说明](README_CN.md) (For Chinese Documentation) ### Background Often ti...
--- title: 'WPScan' category: 'scanner' type: "CMS" state: "released" appVersion: "v3.8.20" usecase: "Wordpress Vulnerability Scanner" --- ![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png) <!-- SPDX-FileCopyrightText: 2021 iteratec GmbH SPDX-License-Identifier: Apach...
### Use Nikto to scan the website - nikto -h [IP] ``` root@hal:~# nikto -h 192.168.57.3 - Nikto v2.1.6 --------------------------------------------------------------------------- + Target IP: 192.168.57.3 + Target Hostname: 192.168.57.3 + Target Port: 80 + Start Time: 2019-01-10 15:01:39...
# Awesome-Android-Security ![awesome](https://awesome.re/badge.svg) <a href="https://twitter.com/0x0SojalSec"> <img src="https://img.shields.io/badge/author-@0x0SojalSec-orange.svg?style=square&logo=twitter"> </a> ![Screenshot](https://3.bp.blogspot.com/-Zd_tlE55rME/WNPHV9HdrkI/AAAAAAAAnYA/Z8EmsYzqw34JgNZXda2Kkh...
# plaintext Here you will find some of the things that I have worked or am investigating. * **CVE's - PoC** * [CVE-2018-13374](https://github.com/juliourena/plaintext/tree/master/CVE-PoC) * [CVE-2019-19470](https://github.com/juliourena/plaintext/tree/master/CVE-PoC/CVE-2019-19470) * **CSharp Tools (C#)** * [Powe...
# Tools Cyber Security Tools ### SecTools.Org: Top 125 Network Security Tools * [List of SecTools.Org: Top 125 Network Security Tools](https://sectools.org/) - For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. ### Kali Tools * [Kali Tool List](https://too...
-- -- File generated with SQLiteStudio v3.2.1 on Sun JUNUARY 1 11:28:28 2022 -- -- Text encoding used: System -- PRAGMA foreign_keys = off; BEGIN TRANSACTION; -- Table: Commands CREATE TABLE Commands (Command_No INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, Name TEXT REFERENCES Programs (Name) NOT NULL, Description TEXT...
# 1.滲透測試Penetration Testing(PT) >* https://en.wikipedia.org/wiki/Penetration_test >* http://devco.re/services/penetration-test ``` 滲透測試是指一個具備資安知識與經驗、技術人員受*僱主*所託, 為僱主的網路設備、主機,模擬駭客的手法對網路或主機進行攻擊測試, 為的是發掘系統漏洞、並提出改善方法 ``` ### 滲透測試方法論Penetration Testing::Standard|Framework https://www.owasp.org/index.php/Penetration_testi...
## Arthas ![arthas](site/src/site/sphinx/arthas.png) [![Build Status](https://travis-ci.org/alibaba/arthas.svg?branch=master)](https://travis-ci.org/alibaba/arthas) [![codecov](https://codecov.io/gh/alibaba/arthas/branch/master/graph/badge.svg)](https://codecov.io/gh/alibaba/arthas) ![maven](https://img.shields.io/ma...
# Busqueda - HackTheBox - Writeup Linux, 30 Base Points, Easy ![info.JPG](images/info.JPG) ## Machine ![‏‏Busqueda.JPG](images/Busqueda.JPG) ## Busqueda is still an active machine, A [Full writeup](Busqueda-Writeup.pdf) is available, Access to the writeup requires the root hash as the password. Telegram: [@evyata...
# PENTESTING-BIBLE # hundreds of ethical hacking &amp; penetration testing &amp; red team &amp; cyber security &amp; computer science resources. # ALMOST 2000 LINKS. # ALMOST 2000 PDF FILES ABOUT DIFFERENT FIELDS OF HACKING . # note:most of the pdf files is different than the links which means there is now almost 4000...
# Jack Compromise a web server running Wordpress, obtain a low privileged user and escalate your privileges to root using a Python module. Connect to our network and deploy this machine. Add `jack.thm` to `/etc/hosts` # #1 - Gain initial access and obtain the user flag. *Hint: Wpscan user enumeration, and don't us...
# Swagger Code Generator - Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen) [![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Templat...
**OSCP Notes** *NetDiscover* find out the ip of the machine in the network netdiscover -i eth1 netdiscover -r 192.168.134.0/24 *ARP Scan* arp-scan --local *Ping Sweep* namp -v -sn 10.11.1.1-254 -oG ping sweep.txt grep Up ping-sweep.txt | cut -d “ ” -f 2 **Find ports** *Fast UDP* nmap...
<h1 align="center"> <br> <img width="200" src="https://cdn.rawgit.com/sindresorhus/awesome/master/media/logo.svg" alt="awesome"> <br> </h1> # Awesome Hacking Resources ![Awesome Hacking](https://img.shields.io/badge/awesome-hacking-red.svg) ![Awesome community](https://img.shields.io/badge/awesome-community-gr...
<h1 align="center">Wordlists <a href="https://twitter.com/intent/tweet?text=Wordlists%20-%20Real-world%20infosec%20wordlists%2C%20updated%20regularly%20by%20%40trick3st%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fwordlists&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?...
# Toppo: 1 [Toppo: 1](https://www.vulnhub.com/entry/toppo-1,245/) est une machine virtuelle vulnérable, conçue par [Hadi Mene](https://twitter.com/h4d3s99) et publiée sur VulnHub au mois de juillet 2018. L'objectif, comme toujours, est de trouver et d'exploiter des vulnérabilités sur la VM fournie, afin d'obtenir le...
[English](README.md) | [中文](README-zh.md) # IPsec VPN Server Auto Setup Scripts [![Build Status](https://github.com/hwdsl2/setup-ipsec-vpn/actions/workflows/main.yml/badge.svg)](https://github.com/hwdsl2/setup-ipsec-vpn/actions/workflows/main.yml) [![GitHub Stars](docs/images/badges/github-stars.svg)](https://github....
# Kevin ## Table of Contents * [Summary](#summary) * [Enumerate](#enumerate) * [Ports](#ports) * [Services](#services) * [HTTP](#http) * [RPC](#rpc) * [NetBIOS](#netbios) * [SMB](#smb) * [RDP](#rdp) * [OS](#os) * [Exploit](#exploit) * [Password Guessing](#password-guessing) * [Default C...
# iplookup ## 简介 IP反查域名工具,模仿(抄袭)subfinder实现 ## 主要接口 - [x] [webscan](https://www.webscan.cc/) - [x] [rapiddns](https://rapiddns.io) - [x] [ip138](https://site.ip138.com/) - [x] [yougetsignal](https://www.yougetsignal.com/) - [x] [aizhan](https://dns.aizhan.com/) - [x] [c99](https://api.c99.nl/) - [x] [china...
# web_deal_scripts 下载链接:https://github.com/nihaohello/web_deal_scripts 这几个脚本的目的: 主要是有一些工作太繁琐重复,就写点脚本,把前面的一些操作一起做了 其中Get_Target中个人渗透流程和大纲把思路说了些 Get_Target目录中的: step1.txt 是漏洞银行列出来的target网址 漏洞银行目标选取.py 是随机选取一个step1.txt的网址(毕竟自己多了,选择起来就麻烦了) 选取目标的某个子域名.py 也是一个选取网址的脚本 0.用whatweb.py是一个处理...
## Module 18 README: Project 2 ### Module Description In the second project week, students will use the skills that they have learned in the Offensive Security unit to attack a fictional organization and determine its vulnerabilities. On **Day 1**, students will attempt to exploit vulnerabilities on the organization'...
# Jeeves URL: https://app.hackthebox.com/machines/Jeeves Level: Medium Date 7 May 2021 ## Walkthrough - [Enumeration](#enumeration) - [Privesc](#privesc) # Enumeration ## NMAP ``` # Nmap 7.91 scan initiated Sun May 2 20:55:41 2021 as: nmap -A -T4 -p- -oN 01_nmap.txt 10.10.10.63 Nmap scan report for 10.10.10.63...
Hello welcome to another write up this time on box from Hackthebox called MetaTwo. Let's start with nmap: ``` Starting Nmap 7.92 ( https://nmap.org ) at 2023-07-04 06:31 EDT Nmap scan report for 10.10.11.196 (10.10.11.196) Host is up (0.069s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE VER...
# Awesome WAF [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg "Awesome")](https://github.com/0xinfection/awesome-waf) Everything about web application firewalls (WAFs) from a security perspective. 🔥 > > __Foreword:__ This was originally my own collection...
# web-security-learning-resources This repository contains list of web security related resources that you can use to gain new skills and extend knowledge ## Content - [Awesome web security lists](#awesome-web-security-lists) - [Books](#books) - [Certifications](#certifications) - [Cheat sheets](#cheat-sheets) - [Le...
# Guide-to-SSRF # The Basics * [Server Side Request Forgery](https://owasp.org/www-community/attacks/Server_Side_Request_Forgery) * [SSRF: Web App Security Basic...
--- title: "Nuclei" category: "scanner" type: "Website" state: "released" appVersion: "v2.7.9" usecase: "Nuclei is a fast, template based vulnerability scanner." --- <!-- SPDX-FileCopyrightText: the secureCodeBox authors SPDX-License-Identifier: Apache-2.0 --> <!-- .: IMPORTANT! :. -------------------------- This fil...
<p align='center'> <img src="https://i.imgur.com/5VYs1m2.png" alt="Logo"> <br> <a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.2"><img src="https://img.shields.io/badge/Version-1.1.2-brightgreen.svg?style=style=flat-square" alt="version"></a> <a href="https://github.com/Tuhinshubhra/CMSeeK/"...
安全项目收集,在此处收集一些Github以及其他开源项目 Tips:很多都是Star中的,可以去我的Star里面看看 # 安全扫描工具 ## [XRAY](https://github.com/chaitin/xray) [![GitHub stars](https://img.shields.io/github/stars/chaitin/xray.svg)](https://img.shields.io/github/stars/chaitin/xray) 说明:一款功能强大的安全评估工具 功能:XSS检测、SQL注入、命令/代码注入检测、目录枚举、弱口令检测 [DETAIL](https://github...
# Notes Links related to - https://jhalon.github.io/becoming-a-pentester/ - https://blog.it-securityguard.com - https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/ - https://securityonline.info/ - https://blackwintersecurity.com - https://www.owasp.org/index.php/Attack_Surface_Analysis_Cheat_Sh...
# PC - HackTheBox - Writeup Linux, 30 Base Points, Easy ![info.JPG](images/info.JPG) ## Machine ![‏‏PC.JPG](images/PC.JPG) ## PC is still an active machine, A [Full writeup](PC-Writeup.pdf) is available, Access to the writeup requires the root hash as the password. Telegram: [@evyatar9](https://t.me/evyatar9) Di...
<!-- START doctoc generated TOC please keep comment here to allow auto update --> <!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE --> ## Table of Contents - [Professional Programming - about this list](#professional-programming---about-this-list) - [Contributing to this list](#contributing-to-this-list...
# Devel #### 10.10.10.5 ```{r, engine='bash', count_lines} nmap -sS -sV 10.10.10.5 Nmap scan report for 10.10.10.5 Host is up (0.21s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd 80/tcp open http Microsoft IIS httpd 7.5 Service Info: OS: Windows; CPE: cpe...
# Kubernetes Exploit Hub ## Description These are a collection of methods and tools I've found useful on pentesting Kubernetes Clusters. References to setup an AKS Cluster in Azure: https://docs.microsoft.com/en-us/azure/aks/learn/quick-kubernetes-deploy-portal?tabs=azure-cli ### Microsoft Recon If you have some M...
# Bugbounty-Resources ## Web Security Topics for selfstudy - [ [+] Cache Poisoning]() - [ [+] Cash Overflow]() - [ [+] Clickjacking]() - [ [+] Command injection attacks]() - [ [+] Comment Injection Attack]() - [ [+] Content Security Policy]() - [ [+] Content Spoofing]() - [ [+] Credential stuffing]() ## Vulnerable We...
--- This library, ADAL for iOS and macOS, will no longer receive new feature improvements. Instead, use the new library [MSAL for iOS and macOS](https://github.com/AzureAD/microsoft-authentication-library-for-objc). * If you are starting a new project, you can get started with the [MSAL for iOS and macOS docs](http...
Awesome Infosec =============== [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) A curated list of awesome information security resources, inspired by the awesome-* trend on GitHub. Those resources and tools ar...
# Helpful Tech Resources _Disclaimer: Please don't get stuck in 'tutorial hell'. Try to execute what you learned in a project or task of your own and then move on to the next interesting thing.<br>_ Over the last few months I spent a lot of time on social media, collecting all kinds of interesting, educational, and he...
# SwagShop: 10.10.10.140 ## Hints - Try running a vulnerability scanner against the discovered CMS to get version information - Look for exploits that will help inject your way to authenticated access - Look for another exploit that requires authentication to get code execution - Privesc is nice and fast, even for th...
# ChatGLM-6B <p align="center"> 🌐 <a href="https://chatglm.cn/blog" target="_blank">Blog</a> • 🤗 <a href="https://huggingface.co/THUDM/chatglm-6b" target="_blank">HF Repo</a> • 🐦 <a href="https://twitter.com/thukeg" target="_blank">Twitter</a> • 📃 <a href="https://arxiv.org/abs/2103.10360" target="_blank">[GLM@...
Awesome Infosec =============== [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) A curated list of awesome information security resources, inspired by the awesome-* trend on GitHub. Those resources and tools ar...
# Complacent (Reconnaissance · 40 pt) I used nikto to scan the chall website: ```bash nikto -h https://complacent.vuln.icec.tf - Nikto v2.1.6 --------------------------------------------------------------------------- + Target IP: 104.154.248.13 + Target Hostname: complacent.vuln.icec.tf + Target Port: ...
### Nmap --- ***Network Scanning*** - Network connections are made between two ports – an open port listening on the server and a randomly selected port on your own computer. For example, when you connect to a web page, your computer may open port 49534 to connect to the server’s port 443. - Every computer has a tot...
# =================== # Pentest-Handbook # =================== # This is a guide for Penetratation Testers how to use Penetratation Testing tools and their advanced used. Needs Upgradation. Please do pull request. ### Netcat or nc or ncat #### Use Netcat as a Simple Web Server `nano index.html` ##### Make a simpl...
<h1 align="center"> <img src="images/nerd-fonts-logo.svg" alt="Nerd Fonts Logo" /> </h1> <h2 align="center"> <img alt="Iconic font aggregator, collection, and patcher" src="images/project-subtitle-phrase.svg"> </h2> <div align="center"> [Releases][release]&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;[Fonts](#patched-font...
# Offsec It consists of machines I did for the OSCP exam preperation and also HackTheBox writeups. ![](https://geps.dev/progress/78) **131/168** done. **Active boxes and Fortresses are password protected.** <br/> ## Useful Links - [ippsec.rocks](https://ippsec.rocks/) - [kashz-jewel](https://kash...
# :boom: Free Resources to Practice: Share with your friends: ``` · Academy Hackaflag BR - https://hackaflag.com.br/ · Attack-Defense - https://attackdefense.com · Alert to win - https://alf.nu/alert1 · CTF Komodo Security - https://ctf.komodosec.com · CMD Challenge - https://cmdchalleng...
# HackTheBox – Sauna - Write-Up Author: [Calvin Lai](http://security.calvinlai.com) ## **Question:** > Sauna ![img](./img/1.png) ## Background Sauna is an easy difficulty Windows machine from HacktheBox, it requires on the Active Directory enumeration technique and Kerberos attack, for training your ethical hacki...
# Awesome-Android-Security ![awesome](https://awesome.re/badge.svg) ![Screenshot](img/androidsec.png) # Table of Contents - [Blog](#blog) - [How To's](#how-tos) - [Papers](#paper) - [Books](#books) - [Trainings](#Trainings) - [Tools](#tools) * [Static Analysis Tools](#Static-Analysis) * [Dynamic Analysis Tools...
# Google Maps API Scanner Used for determining whether a leaked/found Google Maps API Key is vulnerable to unauthorized access by other applications or not. ***[Blog Post #1 - Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care](https://medium.com/bugbountywriteup/unauthorized-google-maps-api-key-...
# Bug Bounty Cheat Sheet</h1> | 📚 Reference | 🔎 Vulnerabilities | |-------------------------------------------------------------|-----------------------------------------------------------| | [Bug Bounty Platforms](cheatsheets/bu...
--- This library, ADAL for Android, will no longer receive new feature improvements. Instead, use the new library [MSAL for Android](https://github.com/AzureAD/microsoft-authentication-library-for-android). * If you are starting a new project, you can get started with the [MSAL for Android docs](https://github.com/...
# Oneliner-Cmd oneliner scripts for bug bounty ## List tools - [Subfinder](https://github.com/projectdiscovery/subfinder) - [Naabu](https://github.com/projectdiscovery/naabu) - [httpx](https://github.com/projectdiscovery/httpx) - [Nuclei](https://github.com/projectdiscovery/nuclei) - [Waybackurls](https://github.com/...