Update and add index

This commit is contained in:
Jonas Zeunert
2024-04-23 15:17:38 +02:00
parent 4d0cd768f7
commit 8d4db5d359
726 changed files with 41721 additions and 53949 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Hacking -An Amazing Project !Awesome (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg) (https://github.com/sindresorhus/awesome)
 Awesome Hacking -An Amazing Project !Awesome (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg) (https://github.com/sindresorhus/awesome)
A curated list of awesome Hacking. Inspired by awesome-machine-learning (https://github.com/josephmisiti/awesome-machine-learning/)
@@ -46,12 +46,12 @@
 System
 System
Tutorials
 ⟡ Roppers Computing Fundamentals (https://www.roppers.org/courses/fundamentals)
* Free, self-paced curriculum that builds a base of knowledge in computers and networking. Intended to build up a student with no prior technical knowledge to be confident in their ability to 
 learn anything and continue their security education. Full text available as a **gitbook** (https://www.hoppersroppers.org/fundamentals/). 
* Free, self-paced curriculum that builds a base of knowledge in computers and networking. Intended to build up a student with no prior technical knowledge to be confident in their ability to learn anything and continue their security e 
ducation. Full text available as a **gitbook** (https://www.hoppersroppers.org/fundamentals/). 
 ⟡ Corelan Team's Exploit writing tutorial (https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
 ⟡ Exploit Writing Tutorials for Pentesters (http://web.archive.org/web/20140916085343/http://www.punter-infosec.com/exploit-writing-tutorials-for-pentesters/)
 ⟡ Understanding the basics of Linux Binary Exploitation (https://github.com/r0hi7/BinExp)
@@ -60,8 +60,7 @@
Tools
 ⟡ Metasploit (https://github.com/rapid7/metasploit-framework) A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS 
signature development.
 ⟡ Metasploit (https://github.com/rapid7/metasploit-framework) A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
 ⟡ mimikatz (https://github.com/gentilkiwi/mimikatz) - A little tool to play with Windows security
 ⟡ Hackers tools (https://www.youtube.com/playlist?list=PLyzOVJj3bHQuiujH1lpn8cA9dsyulbYRv) - Tutorial on tools.
@@ -89,7 +88,7 @@
 ⟡ Exploit database (https://www.exploit-db.com/) - An ultimate archive of exploits and vulnerable software
 Reverse Engineering
 Reverse Engineering
Tutorials
⟡ Begin RE: A Reverse Engineering Tutorial Workshop (https://www.begin.re/the-workshop)
@@ -110,8 +109,7 @@
Decompilers
⟡  JVM-based languages
  ⟡ Krakatau (https://github.com/Storyyeller/Krakatau) - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed 
to do it fully.
  ⟡ Krakatau (https://github.com/Storyyeller/Krakatau) - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
  ⟡ JD-GUI (https://github.com/java-decompiler/jd-gui)
  ⟡ procyon (https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler)
* **Luyten** (https://github.com/deathmarine/Luyten) - one of the best, though a bit slow, hangs on some binaries and not very well maintained.
@@ -173,25 +171,22 @@
 ⟡ DBeaver (https://github.com/dbeaver/dbeaver) - a DB editor.
 ⟡ Dependencies (https://github.com/lucasg/Dependencies) - a FOSS replacement to Dependency Walker.
 ⟡ PEview (http://wjradburn.com/software/) - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
⟡ BinText
 (https://web.archive.org/web/http://www.mcafee.com/kr/downloads/free-tools/bintext.aspx) - A small, very fast and powerful text extractor that will be of particular interest to programmers.
⟡ BinText (https://web.archive.org/web/http://www.mcafee.com/kr/downloads/free-tools/bintext.aspx) - A small, very fast and powerful text extractor that will be of particular interest to programmers.
General
 ⟡ Open Malware (http://www.offensivecomputing.net/)
 Web
 Web
Tools
 ⟡ Spyse (https://spyse.com/) - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains 
huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
 ⟡ Spyse (https://spyse.com/) - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is 
stored in its own database allowing get the data without scanning.
 ⟡ sqlmap (https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tool
 ⟡ NoSQLMap (https://github.com/codingo/NoSQLMap) - Automated NoSQL database enumeration and web application exploitation tool.
 ⟡ tools.web-max.ca (http://tools.web-max.ca/encode_decode.php) - base64 base85 md4,5 hash, sha1 hash encoding/decoding
 ⟡ VHostScan
 (https://github.com/codingo/VHostScan) - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
 ⟡ VHostScan (https://github.com/codingo/VHostScan) - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
 ⟡ SubFinder (https://github.com/subfinder/subfinder) - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
 ⟡ Findsubdomains (https://findsubdomains.com/) - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to 
provide accurate results.
 ⟡ Findsubdomains (https://findsubdomains.com/) - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
 ⟡ badtouch (https://github.com/kpcyrd/badtouch) - Scriptable network authentication cracker
 ⟡ PhpSploit (https://github.com/nil0x42/phpsploit) - Full-featured C2 framework which silently persists on webserver via evil PHP oneliner
 ⟡ Git-Scanner (https://github.com/HightechSec/git-scanner) - A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
@@ -205,7 +200,7 @@
 ⟡ Strong node.js (https://github.com/jesusprubio/strong-node) - An exhaustive checklist to assist in the source code security analysis of a node.js web service.
 Network
 Network
Tools
 ⟡ NetworkMiner (http://www.netresec.com/?page=NetworkMiner) - A Network Forensic Analysis Tool (NFAT)
@@ -214,8 +209,7 @@
 ⟡ findsubdomains (https://findsubdomains.com) - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
 ⟡ cirt-fuzzer (http://www.cirt.dk/) - A simple TCP/UDP protocol fuzzer.
 ⟡ ASlookup (https://aslookup.com/) - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
 ⟡ ZAP (https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web 
applications
 ⟡ ZAP (https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
 ⟡ mitmsocks4j (https://github.com/Akdeniz/mitmsocks4j) - Man-in-the-middle SOCKS Proxy for Java
 ⟡ ssh-mitm (https://github.com/jtesta/ssh-mitm) - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
 ⟡ nmap (https://nmap.org/) - Nmap (Network Mapper) is a security scanner
@@ -225,28 +219,25 @@
 ⟡ Wifi Jammer (https://n0where.net/wifijammer/) - Free program to jam all wifi clients in range
 ⟡ Firesheep (https://codebutler.github.io/firesheep/) - Free program for HTTP session hijacking attacks.
 ⟡ Scapy (https://github.com/secdev/awesome-scapy) - A Python tool and library for low level packet creation and manipulation
 ⟡ Amass
 (https://github.com/OWASP/Amass) - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
 ⟡ Amass (https://github.com/OWASP/Amass) - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
 ⟡ sniffglue (https://github.com/kpcyrd/sniffglue) - Secure multithreaded packet sniffer
 ⟡ Netz (https://github.com/spectralops/netz) - Discover internet-wide misconfigurations, using zgrab2 and others.
 ⟡ RustScan (https://github.com/rustscan/rustscan) - Extremely fast port scanner built with Rust, designed to scan all ports in a couple of seconds and utilizes nmap to perform port 
enumeration in a fraction of the time.
 ⟡ RustScan (https://github.com/rustscan/rustscan) - Extremely fast port scanner built with Rust, designed to scan all ports in a couple of seconds and utilizes nmap to perform port enumeration in a fraction of the time.
 ⟡ PETEP (https://github.com/Warxim/petep) - Extensible TCP/UDP proxy with GUI for traffic analysis & modification with SSL/TLS support.
 Forensic
 Forensic
Tools
 ⟡ Autopsy (http://www.sleuthkit.org/autopsy/) - A digital forensics platform and graphical interface to The Sleuth Kit (http://www.sleuthkit.org/sleuthkit/index.php) and other digital 
forensics tools
 ⟡ Autopsy (http://www.sleuthkit.org/autopsy/) - A digital forensics platform and graphical interface to The Sleuth Kit (http://www.sleuthkit.org/sleuthkit/index.php) and other digital forensics tools
 ⟡ sleuthkit (https://github.com/sleuthkit/sleuthkit) - A library and collection of command-line digital forensics tools
 ⟡ EnCase (https://www.guidancesoftware.com/products/Pages/encase-forensic/overview.aspx) - The shared technology within a suite of digital investigations products by Guidance Software
 ⟡ malzilla (http://malzilla.sourceforge.net/) - Malware hunting tool
 ⟡ IPED - Indexador e Processador de Evidências Digitais (https://servicos.dpf.gov.br/ferramentas/IPED/) - Brazilian Federal Police Tool for Forensic Investigation
 ⟡ CyLR (https://github.com/orlikoski/CyLR) - NTFS forensic image collector 
 ⟡ CAINE (https://www.caine-live.net/)- CAINE is a Ubuntu-based app that offers a complete forensic environment that provides a graphical interface. This tool can be integrated into existing 
software tools as a module. It automatically extracts a timeline from RAM.
 ⟡ CAINE (https://www.caine-live.net/)- CAINE is a Ubuntu-based app that offers a complete forensic environment that provides a graphical interface. This tool can be integrated into existing software tools as a module. It automatically 
extracts a timeline from RAM.
 Cryptography
 Cryptography
Tools
 ⟡ xortool (https://github.com/hellman/xortool) - A tool to analyze multi-byte XOR cipher
@@ -255,7 +246,7 @@
 ⟡ Ciphey (https://github.com/ciphey/ciphey) - Automated decryption tool using artificial intelligence & natural language processing.
 Wargame
 Wargame
System
 ⟡ OverTheWire - Semtex (http://overthewire.org/wargames/semtex/)
@@ -294,7 +285,7 @@
  ⟡ Intigriti (https://www.intigriti.com/) Europe's #1 ethical hacking and bug bounty program.
 CTF
 CTF
Competition
 ⟡ DEF CON (https://legitbs.net/)
@@ -322,10 +313,10 @@
 ⟡ Rookit Arsenal (https://amzn.com/144962636X) - OS RE and rootkit development
 ⟡ Pentest Cheat Sheets (https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Collection of cheat sheets useful for pentesting
 ⟡ Movies For Hackers (https://github.com/k4m4/movies-for-hackers) - A curated list of movies every hacker & cyberpunk must watch.
 ⟡ Roppers CTF Fundamentals Course (https://www.roppers.org/courses/ctf) - Free course designed to get a student crushing CTFs as quickly as possible. Teaches the mentality and skills 
required for crypto, forensics, and more. Full text available as a gitbook (https://www.hoppersroppers.org/ctf/).
 ⟡ Roppers CTF Fundamentals Course (https://www.roppers.org/courses/ctf) - Free course designed to get a student crushing CTFs as quickly as possible. Teaches the mentality and skills required for crypto, forensics, and more. Full text 
available as a gitbook (https://www.hoppersroppers.org/ctf/).
 OS
 OS
Online resources
@@ -334,7 +325,7 @@
 ⟡ Security @ Distrowatch (http://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing and keeping up to date with open source operating systems
 Post exploitation
 Post exploitation
tools
⟡ empire (https://github.com/EmpireProject/Empire) - A post exploitation framework for powershell and python.
@@ -342,13 +333,11 @@
⟡ PowerSploit (https://github.com/PowerShellMafia/PowerSploit) - A PowerShell post exploitation framework
⟡ ebowla (https://github.com/Genetic-Malware/Ebowla) - Framework for Making Environmental Keyed Payloads
 ETC
 ETC
 ⟡ SecTools (http://sectools.org/) - Top 125 Network Security Tools
 ⟡ Roppers Security Fundamentals (https://www.roppers.org/courses/security) - Free course that teaches a beginner how security works in the real world. Learn security theory and execute 
defensive measures so that you are better prepared against threats online and in the physical world. Full text available as a gitbook (https://www.hoppersroppers.org/security/).
 ⟡ Roppers Practical Networking (https://www.roppers.org/courses/networking) - A hands-on, wildly practical introduction to networking and making packets dance. No wasted time, no memorizing,
just learning the fundamentals.
 ⟡ Rawsec's CyberSecurity Inventory (https://inventory.raw.pm/) - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. (Source 
(https://gitlab.com/rawsec/rawsec-cybersecurity-list))
 ⟡ Roppers Security Fundamentals (https://www.roppers.org/courses/security) - Free course that teaches a beginner how security works in the real world. Learn security theory and execute defensive measures so that you are better prepared
against threats online and in the physical world. Full text available as a gitbook (https://www.hoppersroppers.org/security/).
 ⟡ Roppers Practical Networking (https://www.roppers.org/courses/networking) - A hands-on, wildly practical introduction to networking and making packets dance. No wasted time, no memorizing, just learning the fundamentals.
 ⟡ Rawsec's CyberSecurity Inventory (https://inventory.raw.pm/) - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. (Source (https://gitlab.com/rawsec/rawsec-cybersecurity-list))
 ⟡ The Cyberclopaedia (https://cr0mll.github.io/cyberclopaedia/) - The open-source encyclopedia of cybersecurity. GitHub Repository (https://github.com/cr0mll/cyberclopaedia)