167 lines
25 KiB
Plaintext
167 lines
25 KiB
Plaintext
[38;5;14m[1mTHIS REPOSITORY IS DEPRECATED.[0m[38;5;12m [39m
|
||
|
||
[38;5;14m[1mALL OF ITS CONTENT HAS BEEN UPDATED AND MOVED TO [0m[38;5;12mawesome-pentest-cheat-sheets[39m[38;5;14m[1m (https://github.com/ByteSnipers/awesome-pentest-cheat-sheets)[0m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Pentest Cheat Sheets [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||
|
||
[38;5;12mCollection of cheat sheets useful for pentesting[39m
|
||
|
||
[38;2;255;187;0m[4mContribution[0m
|
||
[38;5;12mYour contributions and suggestions are heartily welcome. Please check the [39m[38;5;14m[1mContributing Guidelines[0m[38;5;12m (.github/CONTRIBUTING.md) for more details.[39m
|
||
|
||
|
||
[38;2;255;187;0m[4mSecurity Talks and Videos[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInfoCon - Hacking Conference Archive[0m[38;5;12m (https://infocon.org/cons/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCurated list of Security Talks and Videos[0m[38;5;12m (https://github.com/PaulSec/awesome-sec-talks)[39m
|
||
|
||
[38;2;255;187;0m[4mGeneral[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDocker Cheat Sheet[0m[38;5;12m (https://github.com/wsargent/docker-cheat-sheet)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMobile App Pentest Cheat Sheet[0m[38;5;12m (https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOSX Command Line Cheat Sheet[0m[38;5;12m (https://github.com/herrbischoff/awesome-osx-command-line)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerShell Cheat Sheet[0m[38;5;12m (https://pen-testing.sans.org/blog/2016/05/25/sans-powershell-cheat-sheet) - SANS PowerShell Cheat Sheet from SEC560 Course [39m[38;5;14m[1m(PDF version)[0m[38;5;12m (docs/PowerShellCheatSheet_v41.pdf)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRawsec's CyberSecurity Inventory[0m[38;5;12m (https://inventory.raw.pm/) - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ([39m[38;5;14m[1mSource[0m[38;5;12m (https://gitlab.com/rawsec/rawsec-cybersecurity-list))[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRegexp Security Cheat Sheet[0m[38;5;12m (https://github.com/attackercan/regexp-security-cheatsheet)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecurity Cheat Sheets[0m[38;5;12m (https://github.com/teamghsoftware/security-cheatsheets) - A collection of security cheat sheets[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUnix / Linux Cheat Sheet[0m[38;5;12m (http://cheatsheetworld.com/programming/unix-linux-cheat-sheet/)[39m
|
||
|
||
[38;2;255;187;0m[4mDiscovery[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGoogle Dorks[0m[38;5;12m (https://www.exploit-db.com/google-hacking-database) - Google Dorks Hacking Database (Exploit-DB)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShodan[0m[38;5;12m (docs/shodan.md) - Shodan is a search engine for finding specific devices, and device types, that exist online[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mZoomEye[0m[38;5;12m (http://zoomeye.org) - Zoomeye is a Cyberspace Search Engine recording information of devices, websites, services and components etc.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAmass[0m[38;5;12m (https://github.com/OWASP/Amass) - OWASP Network mapping of attack surfaces and external asset discovery using open source information[39m
|
||
|
||
[38;2;255;187;0m[4mEnumeration[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1menum4linux-ng[0m[38;5;12m (https://github.com/cddmp/enum4linux-ng) - Python tool for enumerating information from Windows/Samba systems[39m
|
||
|
||
[38;2;255;187;0m[4mExploitation[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEmpire Cheat Sheet[0m[38;5;12m (https://github.com/HarmJ0y/CheatSheets/blob/master/Empire.pdf) - [39m[38;5;14m[1mEmpire[0m[38;5;12m (http://www.powershellempire.com) is a PowerShell and Python post-exploitation framework [39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit Development Cheat Sheet[0m[38;5;12m (docs/pentest-exploit-dev-cheatsheet.jpg) - [39m[38;5;14m[1m@ovid[0m[38;5;12m (https://twitter.com/ovid)'s exploit development in one picture[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mJava Deserialization Cheat Sheet[0m[38;5;12m (https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet) - A cheat sheet for pentesters about Java Native Binary Deserialization vulnerabilities[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLocal File Inclusion (LFI) Cheat Sheet #1[0m[38;5;12m (https://highon.coffee/blog/lfi-cheat-sheet/) - Arr0way's LFI Cheat Sheet[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLocal File Inclusion (LFI) Cheat Sheet #2[0m[38;5;12m (https://www.aptive.co.uk/blog/local-file-inclusion-lfi-testing/) - Aptive's LFI Cheat Sheet[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetasploit Unleashed[0m[38;5;12m (https://www.offensive-security.com/metasploit-unleashed/) - The ultimate guide to the Metasploit Framework[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetasploit Cheat Sheet[0m[38;5;12m (https://www.tunnelsup.com/metasploit-cheat-sheet/) - A quick reference guide [39m[38;5;14m[1m(PNG version)[0m[38;5;12m (docs/Metasploit-CheatSheet.png)[39m[38;5;14m[1m(PDF version)[0m[38;5;12m (docs/Metasploit-CheatSheet.pdf)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerSploit Cheat Sheet[0m[38;5;12m (https://github.com/HarmJ0y/CheatSheets/blob/master/PowerSploit.pdf) - [39m[38;5;14m[1mPowerSploit[0m[38;5;12m (https://github.com/PowerShellMafia/PowerSploit) is a powershell post-exploitation framework[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerView 2.0 Tricks[0m[38;5;12m (https://gist.github.com/HarmJ0y/3328d954607d71362e3c)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerView 3.0 Tricks[0m[38;5;12m (https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPHP htaccess Injection Cheat Sheet[0m[38;5;12m (https://github.com/sektioneins/pcc/wiki/PHP-htaccess-injection-cheat-sheet) - htaccess Injection Cheat Sheet by PHP Secure Configuration Checker[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReverse Shell Cheat Sheet #1[0m[38;5;12m (http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet) - Pentestmonkey Reverse Shell Cheat Sheet[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReverse Shell Cheat Sheet #2[0m[38;5;12m (https://highon.coffee/blog/reverse-shell-cheat-sheet) - Arr0way's Reverse Shell Cheat Sheet[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSQL Injection Cheat Sheet[0m[38;5;12m (https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet) - Netsparker's SQL Injection Cheat Sheet[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSQLite3 Injection Cheat Sheet[0m[38;5;12m (http://atta.cked.me/home/sqlite3injectioncheatsheet)[39m
|
||
|
||
[38;2;255;187;0m[4mPrivilege Escalation[0m
|
||
|
||
[38;2;255;187;0m[4mLearn Privilege Escalation[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows / Linux Local Privilege Escalation Workshop[0m
|
||
[38;5;12m (https://github.com/sagishahar/lpeworkshop) - The Privilege Escalation Workshop covers all known (at the time) attack vectors of local user privilege escalation on both Linux and Windows operating systems and includes slides, videos, test VMs.[39m
|
||
|
||
|
||
[38;2;255;187;0m[4mLinux Privilege Escalation[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBasic Linux Privilege Escalation[0m[38;5;12m (https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) - Linux Privilege Escalation by [39m[38;5;14m[1m@g0tmi1k[0m[38;5;12m (https://twitter.com/g0tmi1k)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mlinux-exploit-suggester.sh[0m[38;5;12m (https://github.com/mzet-/linux-exploit-suggester) - Linux privilege escalation auditing tool written in bash (updated)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinux_Exploit_Suggester.pl[0m[38;5;12m (https://github.com/PenturaLabs/Linux_Exploit_Suggester) - Linux Exploit Suggester written in Perl (last update 3 years ago)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinux_Exploit_Suggester.pl v2[0m[38;5;12m (https://github.com/jondonas/linux-exploit-suggester-2) - Next-generation exploit suggester based on Linux_Exploit_Suggester (updated)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinux[0m[38;5;14m[1m [0m[38;5;14m[1mSoft[0m[38;5;14m[1m [0m[38;5;14m[1mExploit[0m[38;5;14m[1m [0m[38;5;14m[1mSuggester[0m[38;5;12m [39m[38;5;12m(https://github.com/belane/linux-soft-exploit-suggester)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mlinux-soft-exploit-suggester[39m[38;5;12m [39m[38;5;12mfinds[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12mhelping[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mfocuses[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mpackages[39m[38;5;12m [39m
|
||
[38;5;12minstead[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mKernel[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mchecksec.sh[0m[38;5;12m (https://github.com/slimm609/checksec.sh) - bash script to check the properties of executables (like PIE, RELRO, PaX, Canaries, ASLR, Fortify Source)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mlinuxprivchecker.py[0m[38;5;12m [39m[38;5;12m(http://www.securitysift.com/download/linuxprivchecker.py)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mintended[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mexecuted[39m[38;5;12m [39m[38;5;12mlocally[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mbox[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12menumerate[39m[38;5;12m [39m[38;5;12mbasic[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12minfo[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msearch[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mvectors[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mworld[39m[38;5;12m [39m
|
||
[38;5;12mwritable[39m[38;5;12m [39m[38;5;12mfiles,[39m[38;5;12m [39m[38;5;12mmisconfigurations,[39m[38;5;12m [39m[38;5;12mclear-text[39m[38;5;12m [39m[38;5;12mpasswords[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mapplicable[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12m(@SecuritySift)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinEnum[0m[38;5;12m [39m[38;5;12m(https://github.com/rebootuser/LinEnum)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mgreat[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mrunning[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mheap[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthings[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpost[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mprocess.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12minclude[39m[38;5;12m [39m[38;5;12mfile[39m[38;5;12m [39m[38;5;12mpermissions,[39m[38;5;12m [39m[38;5;12mcron[39m[38;5;12m [39m[38;5;12mjobs[39m[38;5;12m [39m[38;5;12mif[39m[38;5;12m [39m[38;5;12mvisible,[39m[38;5;12m [39m[38;5;12mweak[39m[38;5;12m [39m[38;5;12mcredentials[39m[38;5;12m [39m
|
||
[38;5;12metc.(@Rebootuser)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mlinPEAS[0m[38;5;12m [39m[38;5;12m(https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mLinPEAS[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mPrivilege[39m[38;5;12m [39m[38;5;12mEscalation[39m[38;5;12m [39m[38;5;12mAwesome[39m[38;5;12m [39m[38;5;12mScript.[39m[38;5;12m [39m[38;5;12mCheck[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mLocal[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mPrivilege[39m[38;5;12m [39m[38;5;12mEscalation[39m[38;5;12m [39m[38;5;12mchecklist[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;14m[1mbook.hacktricks.xyz[0m[38;5;12m [39m
|
||
[38;5;12m(https://book.hacktricks.xyz)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMimiPenguin[0m[38;5;12m (https://github.com/huntergregal/mimipenguin) - A tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz. [39m
|
||
|
||
|
||
[38;2;255;187;0m[4mWindows Privilege Escalation[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerUp[0m[38;5;12m [39m[38;5;12m(https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mExcellent[39m[38;5;12m [39m[38;5;12mpowershell[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mchecking[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mvectors.[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mharmj0y[0m[38;5;12m [39m[38;5;12m(https://twitter.com/harmj0y)[39m[38;5;12m [39m[38;5;14m[1m(direct[0m[38;5;14m[1m [0m[38;5;14m[1mlink)[0m[38;5;12m [39m
|
||
[38;5;12m(https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Privesc/PowerUp.ps1)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerUp Cheat Sheet[0m[38;5;12m (https://github.com/HarmJ0y/CheatSheets/blob/master/PowerUp.pdf)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Exploit Suggester[0m[38;5;12m (https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Tool for detection of missing security patches on the windows operating system and mapping with the public available exploits[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSherlock[0m[38;5;12m (https://github.com/rasta-mouse/Sherlock) - PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWatson[0m[38;5;12m (https://github.com/rasta-mouse/Watson) - Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPrecompiled Windows Exploits[0m[38;5;12m (https://github.com/abatchy17/WindowsExploits) - Collection of precompiled Windows exploits[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetasploit Modules[0m[38;5;12m (https://github.com/rapid7/metasploit-framework)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;12mpost/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;12mpost/windows/gather/enum_patches - helps to identify any missing patches[39m
|
||
|
||
|
||
[38;2;255;187;0m[4mTools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNmap Cheat Sheet[0m[38;5;12m (docs/nmap.md)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSQLmap Cheat Sheet[0m[38;5;12m (docs/sqlmap-cheatsheet-1.0-SDB.pdf)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSQLmap Tamper Scripts[0m[38;5;12m (https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423) - SQLmap Tamper Scripts General/MSSQL/MySQL[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVIM Cheatsheet[0m[38;5;12m (https://i.imgur.com/YLInLlY.png)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWireshark Display Filters[0m[38;5;12m (docs/Wireshark_Display_Filters.pdf) - Filters for the best sniffing tool[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mTools Online[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXSS'OR Encoder/Decoder[0m[38;5;12m (http://xssor.io/#ende) - Online Decoder/Encoder for testing purposes (@evilcos)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWebGun[0m[38;5;12m (https://brutelogic.com.br/webgun/) - WebGun, XSS Payload Creator (@brutelogic)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHackvertor[0m[38;5;12m (https://hackvertor.co.uk) - Tool to convert various encodings and generate attack vectors (@garethheyes)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mJSFiddle[0m[38;5;12m (https://jsfiddle.net) - Test and share XSS payloads, [39m[38;5;14m[1mExample PoC[0m[38;5;12m (https://jsfiddle.net/xqjpsh65/)[39m
|
||
|
||
[38;2;255;187;0m[4mPayloads[0m
|
||
|
||
[38;2;255;187;0m[4mGenaral[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFuzzdb[0m[38;5;12m (https://github.com/fuzzdb-project/fuzzdb) - Dictionary of attack patterns and primitives for black-box application testing[39m
|
||
[38;5;12mPolyglot Challenge with submitted solutions[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecList[0m[38;5;12m (https://github.com/danielmiessler/SecLists) - A collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more[39m
|
||
|
||
[38;2;255;187;0m[4mXSS[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXSS Polyglot Payloads #1[0m[38;5;12m (https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot) - Unleashing an Ultimate XSS Polyglot list by 0xsobky[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXSS Polyglot Payloads #2[0m[38;5;12m (http://polyglot.innerht.ml/) - [39m[38;5;14m[1m@filedescriptor[0m[38;5;12m (https://twitter.com/filedescriptor)'s XSS [39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBrowser's-XSS-Filter-Bypass-Cheat-Sheet[0m
|
||
[38;5;12m (https://github.com/masatokinugawa/filterbypass/wiki/Browser's-XSS-Filter-Bypass-Cheat-Sheet)- Excellent List of working XSS bypasses running on the latest version of Chrome / Safari, IE 11 / Edge created by Masato Kinugawa[39m
|
||
|
||
[38;2;255;187;0m[4mWrite-Ups[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBug Bounty Reference[0m[38;5;12m (https://github.com/ngalongc/bug-bounty-reference) - huge list of bug bounty write-up that is categorized by the bug type (SQLi, XSS, IDOR, etc.)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWrite-Ups for CTF challenges[0m[38;5;12m (https://ctftime.org/writeups)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFacebook Bug Bounties[0m[38;5;12m (https://www.facebook.com/notes/phwd/facebook-bug-bounties/707217202701640) - Categorized Facebook Bug Bounties write-ups[39m
|
||
|
||
|
||
[38;2;255;187;0m[4mLearning Platforms[0m
|
||
|
||
[38;2;255;187;0m[4mOnline[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHack The Box :: Penetration Testing Labs[0m[38;5;12m (https://www.hackthebox.eu)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Vulnerable Web Applications Directory Project (Online)[0m[38;5;12m (https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project#tab=On-Line_apps) - List of online available vulnerable applications for learning purposes[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentestit labs[0m[38;5;12m (https://lab.pentestit.ru) - Hands-on Pentesting Labs (OSCP style)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoot-me.org[0m[38;5;12m (https://www.root-me.org) - Hundreds of challenges are available to train yourself in different and not simulated environments[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnhub.com[0m[38;5;12m (https://www.vulnhub.com) - Vulnerable By Design VMs for practical 'hands-on' experience in digital security[39m
|
||
|
||
[38;2;255;187;0m[4mOff-Line[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDamn Vulnerable Xebia Training Environment[0m
|
||
[38;5;12m (https://github.com/davevs/dvxte) - Docker Container including several vurnerable web applications (DVWA,DVWServices, DVWSockets, WebGoat, Juiceshop, Railsgoat, django.NV, Buggy Bank, Mutilidae II and more)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Vulnerable Web Applications Directory Project (Offline)[0m[38;5;12m (https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project#tab=Off-Line_apps) - List of offline available vulnerable applications for learning purposes[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerable SOAP Web Service[0m[38;5;12m (https://github.com/anil-yelken/Vulnerable-Soap-Service) - a vulnerable SOAP web service lab environment[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerable Flask Web App[0m[38;5;12m (https://github.com/anil-yelken/Vulnerable-Flask-App) - vulnerable Flask Web App lab environment[39m
|
||
|
||
[38;2;255;187;0m[4mWireless Hacking[0m
|
||
|
||
[38;2;255;187;0m[4mTools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwifite2[0m[38;5;12m (https://github.com/coreb1t/wifite2) - Full automated WiFi security testing script [39m
|
||
|
||
[38;2;255;187;0m[4mDefence Topics[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDocker Security Cheat Sheet[0m[38;5;12m (https://container-solutions.com/content/uploads/2015/06/15.06.15_DockerCheatSheet_A2.pdf) - The following tips should help you to secure a container based system [39m[38;5;14m[1m(PDF version)[0m[38;5;12m (docs/DockerCheatSheet.pdf)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Domain Hardening[0m[38;5;12m (https://github.com/PaulSec/awesome-windows-domain-hardening) - A curated list of awesome Security Hardening techniques for Windows[39m
|
||
|
||
[38;2;255;187;0m[4mProgramming[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mJavaScript Cheat Sheet[0m[38;5;12m (https://github.com/coodict/javascript-in-one-pic) - Learn javascript in one picture [39m[38;5;14m[1m(Online version)[0m[38;5;12m (https://git.io/Js-pic) [39m[38;5;14m[1m(PNG version)[0m[38;5;12m (docs/js-in-one-pic.png) [39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPython Cheat Sheet #1[0m[38;5;12m (https://github.com/siyuanzhao/python3-in-one-pic) - Learn python3 in one picture [39m[38;5;14m[1m(PNG version)[0m[38;5;12m (docs/python-3-in-one-pic.png)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPython Cheat Sheet #2 [0m[38;5;12m (https://github.com/coodict/python3-in-one-pic) - Learn python3 in one picture [39m[38;5;14m[1m(Online version)[0m[38;5;12m (https://git.io/Coo-py3) [39m[38;5;14m[1m(PNG version)[0m[38;5;12m (docs/py3-in-one-pic.png)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPython Snippets Cheat Sheet[0m[38;5;12m (docs/python-snippets.md) - List of helpful re-usable code snippets in Python [39m
|
||
|
||
|
||
|
||
[38;5;12mpentestcheatsheets Github: https://github.com/coreb1t/awesome-pentest-cheat-sheets[39m
|