Updating conversion, creating readmes
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
|
||||
[38;5;14m[1mALL OF ITS CONTENT HAS BEEN UPDATED AND MOVED TO [0m[38;5;12mawesome-pentest-cheat-sheets[39m[38;5;14m[1m (https://github.com/ByteSnipers/awesome-pentest-cheat-sheets)[0m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Pentest Cheat Sheets [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Pentest Cheat Sheets [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
|
||||
[38;5;12mCollection of cheat sheets useful for pentesting[39m
|
||||
|
||||
@@ -21,8 +21,7 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMobile App Pentest Cheat Sheet[0m[38;5;12m (https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOSX Command Line Cheat Sheet[0m[38;5;12m (https://github.com/herrbischoff/awesome-osx-command-line)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerShell Cheat Sheet[0m[38;5;12m (https://pen-testing.sans.org/blog/2016/05/25/sans-powershell-cheat-sheet) - SANS PowerShell Cheat Sheet from SEC560 Course [39m[38;5;14m[1m(PDF version)[0m[38;5;12m (docs/PowerShellCheatSheet_v41.pdf)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRawsec's[0m[38;5;14m[1m [0m[38;5;14m[1mCyberSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mInventory[0m[38;5;12m [39m[38;5;12m(https://inventory.raw.pm/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAn[39m[38;5;12m [39m[38;5;12mopen-source[39m[38;5;12m [39m[38;5;12minventory[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools,[39m[38;5;12m [39m[38;5;12mresources,[39m[38;5;12m [39m[38;5;12mCTF[39m[38;5;12m [39m[38;5;12mplatforms[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mOperating[39m[38;5;12m [39m[38;5;12mSystems[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mCyberSecurity.[39m[38;5;12m [39m[38;5;12m([39m[38;5;14m[1mSource[0m[38;5;12m [39m
|
||||
[38;5;12m(https://gitlab.com/rawsec/rawsec-cybersecurity-list))[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRawsec's CyberSecurity Inventory[0m[38;5;12m (https://inventory.raw.pm/) - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ([39m[38;5;14m[1mSource[0m[38;5;12m (https://gitlab.com/rawsec/rawsec-cybersecurity-list))[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRegexp Security Cheat Sheet[0m[38;5;12m (https://github.com/attackercan/regexp-security-cheatsheet)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecurity Cheat Sheets[0m[38;5;12m (https://github.com/teamghsoftware/security-cheatsheets) - A collection of security cheat sheets[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUnix / Linux Cheat Sheet[0m[38;5;12m (http://cheatsheetworld.com/programming/unix-linux-cheat-sheet/)[39m
|
||||
@@ -58,8 +57,8 @@
|
||||
|
||||
[38;2;255;187;0m[4mLearn Privilege Escalation[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows[0m[38;5;14m[1m [0m[38;5;14m[1m/[0m[38;5;14m[1m [0m[38;5;14m[1mLinux[0m[38;5;14m[1m [0m[38;5;14m[1mLocal[0m[38;5;14m[1m [0m[38;5;14m[1mPrivilege[0m[38;5;14m[1m [0m[38;5;14m[1mEscalation[0m[38;5;14m[1m [0m[38;5;14m[1mWorkshop[0m[38;5;12m [39m[38;5;12m(https://github.com/sagishahar/lpeworkshop)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mPrivilege[39m[38;5;12m [39m[38;5;12mEscalation[39m[38;5;12m [39m[38;5;12mWorkshop[39m[38;5;12m [39m[38;5;12mcovers[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mknown[39m[38;5;12m [39m[38;5;12m(at[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtime)[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mvectors[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mlocal[39m[38;5;12m [39m[38;5;12muser[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m
|
||||
[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mboth[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12moperating[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mslides,[39m[38;5;12m [39m[38;5;12mvideos,[39m[38;5;12m [39m[38;5;12mtest[39m[38;5;12m [39m[38;5;12mVMs.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows[0m[38;5;14m[1m [0m[38;5;14m[1m/[0m[38;5;14m[1m [0m[38;5;14m[1mLinux[0m[38;5;14m[1m [0m[38;5;14m[1mLocal[0m[38;5;14m[1m [0m[38;5;14m[1mPrivilege[0m[38;5;14m[1m [0m[38;5;14m[1mEscalation[0m[38;5;14m[1m [0m[38;5;14m[1mWorkshop[0m[38;5;12m [39m[38;5;12m(https://github.com/sagishahar/lpeworkshop)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mPrivilege[39m[38;5;12m [39m[38;5;12mEscalation[39m[38;5;12m [39m[38;5;12mWorkshop[39m[38;5;12m [39m[38;5;12mcovers[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mknown[39m[38;5;12m [39m[38;5;12m(at[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtime)[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mvectors[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mlocal[39m[38;5;12m [39m[38;5;12muser[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mboth[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mWindows[39m[38;5;12m [39m[38;5;12moperating[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mslides,[39m[38;5;12m [39m[38;5;12mvideos,[39m[38;5;12m [39m[38;5;12mtest[39m[38;5;12m [39m[38;5;12mVMs.[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mLinux Privilege Escalation[0m
|
||||
@@ -68,25 +67,24 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mlinux-exploit-suggester.sh[0m[38;5;12m (https://github.com/mzet-/linux-exploit-suggester) - Linux privilege escalation auditing tool written in bash (updated)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinux_Exploit_Suggester.pl[0m[38;5;12m (https://github.com/PenturaLabs/Linux_Exploit_Suggester) - Linux Exploit Suggester written in Perl (last update 3 years ago)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinux_Exploit_Suggester.pl v2[0m[38;5;12m (https://github.com/jondonas/linux-exploit-suggester-2) - Next-generation exploit suggester based on Linux_Exploit_Suggester (updated)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinux[0m[38;5;14m[1m [0m[38;5;14m[1mSoft[0m[38;5;14m[1m [0m[38;5;14m[1mExploit[0m[38;5;14m[1m [0m[38;5;14m[1mSuggester[0m[38;5;12m [39m[38;5;12m(https://github.com/belane/linux-soft-exploit-suggester)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mlinux-soft-exploit-suggester[39m[38;5;12m [39m[38;5;12mfinds[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12mhelping[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m
|
||||
[38;5;12mescalation.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mfocuses[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mpackages[39m[38;5;12m [39m[38;5;12minstead[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mKernel[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinux[0m[38;5;14m[1m [0m[38;5;14m[1mSoft[0m[38;5;14m[1m [0m[38;5;14m[1mExploit[0m[38;5;14m[1m [0m[38;5;14m[1mSuggester[0m[38;5;12m [39m[38;5;12m(https://github.com/belane/linux-soft-exploit-suggester)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mlinux-soft-exploit-suggester[39m[38;5;12m [39m[38;5;12mfinds[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12mhelping[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mfocuses[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m
|
||||
[38;5;12mpackages[39m[38;5;12m [39m[38;5;12minstead[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mKernel[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mchecksec.sh[0m[38;5;12m (https://github.com/slimm609/checksec.sh) - bash script to check the properties of executables (like PIE, RELRO, PaX, Canaries, ASLR, Fortify Source)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mlinuxprivchecker.py[0m[38;5;12m [39m[38;5;12m(http://www.securitysift.com/download/linuxprivchecker.py)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mintended[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mexecuted[39m[38;5;12m [39m[38;5;12mlocally[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mbox[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12menumerate[39m[38;5;12m [39m[38;5;12mbasic[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12minfo[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msearch[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m
|
||||
[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mvectors[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mworld[39m[38;5;12m [39m[38;5;12mwritable[39m[38;5;12m [39m[38;5;12mfiles,[39m[38;5;12m [39m[38;5;12mmisconfigurations,[39m[38;5;12m [39m[38;5;12mclear-text[39m[38;5;12m [39m[38;5;12mpasswords[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mapplicable[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12m(@SecuritySift)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinEnum[0m[38;5;12m [39m[38;5;12m(https://github.com/rebootuser/LinEnum)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mgreat[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mrunning[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mheap[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthings[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpost[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mprocess.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12minclude[39m[38;5;12m [39m[38;5;12mfile[39m[38;5;12m [39m[38;5;12mpermissions,[39m[38;5;12m [39m[38;5;12mcron[39m[38;5;12m [39m[38;5;12mjobs[39m
|
||||
[38;5;12mif[39m[38;5;12m [39m[38;5;12mvisible,[39m[38;5;12m [39m[38;5;12mweak[39m[38;5;12m [39m[38;5;12mcredentials[39m[38;5;12m [39m[38;5;12metc.(@Rebootuser)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mlinPEAS[0m[38;5;12m [39m[38;5;12m(https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mLinPEAS[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mPrivilege[39m[38;5;12m [39m[38;5;12mEscalation[39m[38;5;12m [39m[38;5;12mAwesome[39m[38;5;12m [39m[38;5;12mScript.[39m[38;5;12m [39m[38;5;12mCheck[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mLocal[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mPrivilege[39m[38;5;12m [39m[38;5;12mEscalation[39m[38;5;12m [39m
|
||||
[38;5;12mchecklist[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;14m[1mbook.hacktricks.xyz[0m[38;5;12m [39m[38;5;12m(https://book.hacktricks.xyz)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mlinuxprivchecker.py[0m[38;5;12m [39m[38;5;12m(http://www.securitysift.com/download/linuxprivchecker.py)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mintended[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mexecuted[39m[38;5;12m [39m[38;5;12mlocally[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mbox[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12menumerate[39m[38;5;12m [39m[38;5;12mbasic[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12minfo[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msearch[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mvectors[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m
|
||||
[38;5;12mworld[39m[38;5;12m [39m[38;5;12mwritable[39m[38;5;12m [39m[38;5;12mfiles,[39m[38;5;12m [39m[38;5;12mmisconfigurations,[39m[38;5;12m [39m[38;5;12mclear-text[39m[38;5;12m [39m[38;5;12mpasswords[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mapplicable[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12m(@SecuritySift)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinEnum[0m[38;5;12m [39m[38;5;12m(https://github.com/rebootuser/LinEnum)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mgreat[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mrunning[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mheap[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthings[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpost[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mprocess.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12minclude[39m[38;5;12m [39m[38;5;12mfile[39m[38;5;12m [39m[38;5;12mpermissions,[39m[38;5;12m [39m[38;5;12mcron[39m[38;5;12m [39m[38;5;12mjobs[39m[38;5;12m [39m[38;5;12mif[39m[38;5;12m [39m[38;5;12mvisible,[39m[38;5;12m [39m[38;5;12mweak[39m[38;5;12m [39m
|
||||
[38;5;12mcredentials[39m[38;5;12m [39m[38;5;12metc.(@Rebootuser)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mlinPEAS[0m[38;5;12m [39m[38;5;12m(https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mLinPEAS[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mPrivilege[39m[38;5;12m [39m[38;5;12mEscalation[39m[38;5;12m [39m[38;5;12mAwesome[39m[38;5;12m [39m[38;5;12mScript.[39m[38;5;12m [39m[38;5;12mCheck[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mLocal[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mPrivilege[39m[38;5;12m [39m[38;5;12mEscalation[39m[38;5;12m [39m[38;5;12mchecklist[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m
|
||||
[38;5;14m[1mbook.hacktricks.xyz[0m[38;5;12m [39m[38;5;12m(https://book.hacktricks.xyz)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMimiPenguin[0m[38;5;12m (https://github.com/huntergregal/mimipenguin) - A tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz. [39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mWindows Privilege Escalation[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerUp[0m[38;5;12m [39m[38;5;12m(https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mExcellent[39m[38;5;12m [39m[38;5;12mpowershell[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mchecking[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mvectors.[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mharmj0y[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/harmj0y)[39m[38;5;12m [39m[38;5;14m[1m(direct[0m[38;5;14m[1m [0m[38;5;14m[1mlink)[0m[38;5;12m [39m[38;5;12m(https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Privesc/PowerUp.ps1)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerUp[0m[38;5;12m [39m[38;5;12m(https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mExcellent[39m[38;5;12m [39m[38;5;12mpowershell[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mchecking[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mvectors.[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mharmj0y[0m[38;5;12m [39m[38;5;12m(https://twitter.com/harmj0y)[39m[38;5;12m [39m[38;5;14m[1m(direct[0m[38;5;14m[1m [0m[38;5;14m[1mlink)[0m[38;5;12m [39m
|
||||
[38;5;12m(https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Privesc/PowerUp.ps1)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerUp Cheat Sheet[0m[38;5;12m (https://github.com/HarmJ0y/CheatSheets/blob/master/PowerUp.pdf)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Exploit Suggester[0m
|
||||
[38;5;12m (https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Tool for detection of missing security patches on the windows operating system and mapping with the public available exploits[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Exploit Suggester[0m[38;5;12m (https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Tool for detection of missing security patches on the windows operating system and mapping with the public available exploits[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSherlock[0m[38;5;12m (https://github.com/rasta-mouse/Sherlock) - PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWatson[0m[38;5;12m (https://github.com/rasta-mouse/Watson) - Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPrecompiled Windows Exploits[0m[38;5;12m (https://github.com/abatchy17/WindowsExploits) - Collection of precompiled Windows exploits[39m
|
||||
@@ -103,7 +101,7 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVIM Cheatsheet[0m[38;5;12m (https://i.imgur.com/YLInLlY.png)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWireshark Display Filters[0m[38;5;12m (docs/Wireshark_Display_Filters.pdf) - Filters for the best sniffing tool[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mTools Online[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mTools Online[0m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXSS'OR Encoder/Decoder[0m[38;5;12m (http://xssor.io/#ende) - Online Decoder/Encoder for testing purposes (@evilcos)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWebGun[0m[38;5;12m (https://brutelogic.com.br/webgun/) - WebGun, XSS Payload Creator (@brutelogic)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHackvertor[0m[38;5;12m (https://hackvertor.co.uk) - Tool to convert various encodings and generate attack vectors (@garethheyes)[39m
|
||||
@@ -114,14 +112,14 @@
|
||||
[38;2;255;187;0m[4mGenaral[0m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFuzzdb[0m[38;5;12m (https://github.com/fuzzdb-project/fuzzdb) - Dictionary of attack patterns and primitives for black-box application testing[39m
|
||||
[38;5;12mPolyglot Challenge with submitted solutions[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecList[0m[38;5;12m [39m[38;5;12m(https://github.com/danielmiessler/SecLists)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcollection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mmultiple[39m[38;5;12m [39m[38;5;12mtypes[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mlists[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mduring[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12massessments.[39m[38;5;12m [39m[38;5;12mList[39m[38;5;12m [39m[38;5;12mtypes[39m[38;5;12m [39m[38;5;12minclude[39m[38;5;12m [39m[38;5;12musernames,[39m[38;5;12m [39m[38;5;12mpasswords,[39m[38;5;12m [39m[38;5;12mURLs,[39m[38;5;12m [39m[38;5;12msensitive[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mgrep[39m[38;5;12m [39m[38;5;12mstrings,[39m[38;5;12m [39m
|
||||
[38;5;12mfuzzing[39m[38;5;12m [39m[38;5;12mpayloads,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mmore[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecList[0m
|
||||
[38;5;12m (https://github.com/danielmiessler/SecLists) - A collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more[39m
|
||||
|
||||
[38;2;255;187;0m[4mXSS[0m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXSS Polyglot Payloads #1[0m[38;5;12m (https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot) - Unleashing an Ultimate XSS Polyglot list by 0xsobky[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXSS Polyglot Payloads #2[0m[38;5;12m (http://polyglot.innerht.ml/) - [39m[38;5;14m[1m@filedescriptor[0m[38;5;12m (https://twitter.com/filedescriptor)'s XSS [39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBrowser's-XSS-Filter-Bypass-Cheat-Sheet[0m[38;5;12m [39m[38;5;12m(https://github.com/masatokinugawa/filterbypass/wiki/Browser's-XSS-Filter-Bypass-Cheat-Sheet)-[39m[38;5;12m [39m[38;5;12mExcellent[39m[38;5;12m [39m[38;5;12mList[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mworking[39m[38;5;12m [39m[38;5;12mXSS[39m[38;5;12m [39m[38;5;12mbypasses[39m[38;5;12m [39m[38;5;12mrunning[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mlatest[39m[38;5;12m [39m[38;5;12mversion[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m
|
||||
[38;5;12mChrome[39m[38;5;12m [39m[38;5;12m/[39m[38;5;12m [39m[38;5;12mSafari,[39m[38;5;12m [39m[38;5;12mIE[39m[38;5;12m [39m[38;5;12m11[39m[38;5;12m [39m[38;5;12m/[39m[38;5;12m [39m[38;5;12mEdge[39m[38;5;12m [39m[38;5;12mcreated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mMasato[39m[38;5;12m [39m[38;5;12mKinugawa[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBrowser's-XSS-Filter-Bypass-Cheat-Sheet[0m
|
||||
[38;5;12m (https://github.com/masatokinugawa/filterbypass/wiki/Browser's-XSS-Filter-Bypass-Cheat-Sheet)- Excellent List of working XSS bypasses running on the latest version of Chrome / Safari, IE 11 / Edge created by Masato Kinugawa[39m
|
||||
|
||||
[38;2;255;187;0m[4mWrite-Ups[0m
|
||||
|
||||
@@ -156,8 +154,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mDefence Topics[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDocker[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mCheat[0m[38;5;14m[1m [0m[38;5;14m[1mSheet[0m[38;5;12m [39m[38;5;12m(https://container-solutions.com/content/uploads/2015/06/15.06.15_DockerCheatSheet_A2.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mfollowing[39m[38;5;12m [39m[38;5;12mtips[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mhelp[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcontainer[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;14m[1m(PDF[0m[38;5;14m[1m [0m[38;5;14m[1mversion)[0m[38;5;12m [39m
|
||||
[38;5;12m(docs/DockerCheatSheet.pdf)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDocker Security Cheat Sheet[0m[38;5;12m (https://container-solutions.com/content/uploads/2015/06/15.06.15_DockerCheatSheet_A2.pdf) - The following tips should help you to secure a container based system [39m[38;5;14m[1m(PDF version)[0m[38;5;12m (docs/DockerCheatSheet.pdf)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Domain Hardening[0m[38;5;12m (https://github.com/PaulSec/awesome-windows-domain-hardening) - A curated list of awesome Security Hardening techniques for Windows[39m
|
||||
|
||||
[38;2;255;187;0m[4mProgramming[0m
|
||||
|
||||
Reference in New Issue
Block a user